Random afluisteren in IndiaJuly 1, 2013
In het voorjaar van 2010 was India een paar weken in de ban van een afluisterschandaal, maar vervolgens verdween dat in de vergetelheid. Dit is opmerkelijk gezien de staat van dienst van de inlichtingenwereld in India. Schandalen die gewone Indiërs raken, maar ook corruptie, slecht management, verkeerde technologie en apparatuur en bovenal incompetentie lijken de boventoon te voeren bij de NTRO, die verantwoordelijk wordt gehouden voor het schandaal. NTRO, National Technical Research Organisation, gebruikt IMSI Catchers om voor lange tijd en op grote schaal politici, ambtenaren, zakenmensen, beroemdheden en gewone Indiërs af te luisteren.
Het gebruik van een IMSI catcher moet nauwlettend gecontroleerd worden. Het afluisterschandaal in India laat zien wat de gevaren zijn van het toelaten van het apparaat in een veiligheidsstelsel. Een IMSI catcher is een mobiele zendmast. Het International Mobile Subscriber Identity nummer is een uniek nummer dat aan een SIM kaart voor een mobiele telefoon is gekoppeld. Aan het IMSI nummer zit tevens een uniek telefoonnummer. Het IMSI nummer bestaat uit drie groepen getallen, 111/22/3333333333. Aan het nummer is te zien uit welk land de SIM kaart komt. De eerste cijfers (111) staan voor het land, Nederland heeft bijvoorbeeld 204 als code. De tweede set cijfers (22) onthullen de provider, KPN heeft bijvoorbeeld 08 en Vodafone 04. De laatste cijfers, maximaal tien cijfers, zijn het unieke abonnementsnummer. Dit is niet hetzelfde als het telefoonnummer. Telefoons waar twee SIM kaarten in zitten, hebben ook twee IMSI nummers.
De IMSI catcher fungeert als mobiele antenne die het gsm verkeer in de buurt opvangt, hierbij gaat het alleen om uitgaande gesprekken. Bij gewone mobiele telefoons vindt de versleuteling van de conversaties plaats in de dichtstbijzijnde mast. De IMSI catcher hoeft de informatie dus niet te kraken, maar kan simpelweg de gesproken of geschreven data lezen. De catcher moet het telefoonverkeer wel doorgeleiden naar een reguliere mast anders kan er geen contact worden gemaakt met de persoon die door de gsm wordt gebeld. De catcher fungeert als tussenstation om de data ofwel direct af te vangen ofwel niet versleuteld door te geleiden. Het doel van de catcher is natuurlijk ook? om het telefoonnummer van een beller te achterhalen. Voor opsporingsinstanties die het gsm nummer van een verdachte niet kunnen traceren is dit een handig middel. Men plaatst een catcher in de buurt van de persoon in kwestie, vangt de nummers allemaal af en kan nagaan welk nummer men moet hebben. Bij politie-invallen kan het apparaat ook zijn dienst bewijzen door op locatie het telefoonverkeer te monitoren, vooral als binnen een onderzoek niet alle gsm-nummers bekend zijn. Tevens kan de catcher worden gebruikt voor spionage doeleinden, vooral spionage die de overheid niet aan de grote klok wil hangen. Bij het afluisteren met een IMSI catcher heeft men namelijk geen medewerking van een Telecom provider nodig. De IMSI catcher laat echter wel een spoor achter die een gebruiker kan wijzen op onregelmatigheden in de transmissie en het apparaat is niet altijd succesvol. De IMSI catcher was tot begin 2011 ook te koop door particulieren. Verschillende bedrijven in New Delhi, Gurgaon en Noida boden de ‘off-the-air-monitoring’ systemen aan. In 2011 besloot de regering de handel van de apparaten aan banden te leggen. Private ondernemingen bleken namelijk gebruik te maken van de catcher.
NTRO
In India is de IMSI Catcher op grote schaal ingezet voor spionage doeleinden, zo onthulde het weekblad Outlook in het voorjaar van 2010. Vanaf waarschijnlijk eind 2006 tot en met april 2010 werden politieke tegenstanders, mensen die promotie zouden maken, leden van het kabinet en allerlei andere politieke en niet politieke figuren door één van de Indiase geheime diensten afgeluisterd. De gesprekken werden afgeluisterd, opgenomen en bewaard. De dienst die verantwoordelijk is voor het afluisteren is de National Technical Research Organisation, de NTRO. De NTRO werd na de Kargil oorlog in 1999 opgezet. Dit conflict ontstond toen het Pakistaanse leger posities in het district Kargil, in de regio Kashmir innam. India reageerde furieus en verdreef de Pakistanen uit een groot deel van Kargil. De laatste posities werden door Pakistan verlaten na diplomatieke druk. De Kargil Review Committee concludeerde in 1999 dat een van de redenen van het uit de hand lopen van het conflict gebrekkige inlichtingen was. De Defence Intelligence Agency (DIA) en de National Technical Facilities Organization (NTFO) die al snel NTRO werd gedoopt, werden opgezet.
De NTRO begon zijn werkzaamheden in april 2004. De NTRO is de Indiase stofzuiger van data, zowel internet als telecommunicatie data, en monitort het Indiase grondgebied en luchtruim. De NTRO gebruikt hiervoor allerlei technische hulpmiddelen, van satellieten tot IMSI catchers. De Technology Experiment Satellite (TES), een satelliet die is uitgerust met een camera die foto’s kan maken van voorwerpen van een meter, is een van de hulpmiddelen. De satelliet werd in oktober 2001 gelanceerd en de beelden worden beheerd door de Indian Space Research Organisation (ISRO). Beelden worden ook commercieel verhandeld door een bedrijf dat verbonden is aan de ISRO, Antrix Corporation. BBC News rapporteerde dat India door TES ook beelden bezit van de oorlog in Afghanistan. In 2001 was India het tweede land naast de Verenigde Staten dat een satelliet bezit die beelden kan genereren van voorwerpen van een meter groot. Een van de functionarissen die centraal staat in de introductie van de afluister praktijken door de NTRO is dhr. Narayanan. Narayanan heeft decennia lang een centrale rol gespeeld in de Indiase inlichtingenwereld. Hij was hoofd van het Intelligence Bureau van 1988 tot 1992, en diende daarbij onder vijf verschillende minister-presidenten. Daarna nam hij een adviserende rol op zich onder de directe verantwoordelijkheid van de minister-president van India. In zijn rol als National Security Advisor (NSA) introduceerde hij de nieuwe afluistertechnologie in India in 2005. Narayanan wordt wel de ‘super spook’ van India genoemd, omdat hij zijn gehele wat? leven? al in de kringen van de Research and Analysis Wing (R&AW), het Intelligence Bureau en de NSA heeft bewogen. Zijn verhouding met minister-president Manmohan Singh was toen hij National Security Advisor niet close. Hij had bezwaren tegen de nucleaire samenwerking tussen Amerika en India en de toenadering van India en Pakistan. In de Wikileaks Cables over India die begin 2011 zijn vrijgegeven door The Hindu wordt Narayanan echter wel omschreven als een belangenbehartiger van de relatie met de Verenigde Staten. In een van de berichten wordt hij omschreven als de smeerolie voor zaken die voor de Amerikanen interessant zijn.
De NTRO valt onder de verantwoordelijkheid van de inlichtingendienst buitenland van India, de Research and Analysis Wing (R&AW), hoewel het een zekere mate van onafhankelijkheid heeft. De NTRO faciliteit waar het afluisteren van de communicatie met het buitenland wordt gedaan ligt in de buurt van Kala Ghoda, zuidelijk Mumbai. Bij Malad, dat in de buurt ligt van Kala Ghoda, komen de datakabels die internet- en telecommunicatie tussen continenten mogelijk maken het Indiase vasteland binnen. De NTRO zit er letterlijk boven op. Hierbij gaat het om communicatie tussen India en het buitenland. De inlichtingendiensten van India hebben daarnaast genoeg binnenlandse capaciteit om de iedere Indiase burger af te luisteren.
Afluisteren
Het afluisterschandaal van de NTRO werd eind april 2010 door het weekblad Outlook onthuld. In de editie van 3 mei van dat jaar zegt een senior inlichtingenofficier dat de NTRO geen toestemming nodig heeft om een telefoon te tappen. Het gaat volgens hem om het onderscheppen van een signaal tussen de gsm en de antenne. Volgens de officier gaat het daarom niet om het afluisteren van een telefoonnummer. Het apparaat zou signalen binnen een cirkel van twee kilometer kunnen onderscheppen. De medewerker van de NTRO lijkt te suggereren dat er helemaal niets mis is met het afluisteren met behulp van een IMSI catcher, het signaal wordt gewoon opgevangen en bewaard. Op dezelfde wijze lijkt de minister van Binnenlandse Zaken van India, P. Chidambaram, de storm rond het afluisterschandaal te willen sussen. In een van de eerste reacties verklaarden bronnen binnen de regering dat het ging om een proef van de NTRO. De regering had geen opdracht gegeven, dus is zij niet verantwoordelijk, en er hoeft geen onderzoek te komen. Volgens de minister waren in de bestanden van de NTRO ook geen bewijzen gevonden van het afluisteren van politici. Tevens wees de regering erop dat de NTRO niet zelfstandig operaties uitvoert, maar werkt onder auspiciën van andere diensten. Bij deze diensten zou het gaan om zeven inlichtingendiensten: het Intelligence Bureau, de Research and Analysis Wing, de Directorate of Revenue Intelligence, Enforcement Directorate, Narcotics Control Bureau, Economic Intelligence Unit and Directorate-General of Investigations, Income-Tax (CBDT). Een oud medewerker van de NTRO voegde daar in de Economic Times van 24 april 2010 nog aan toe dat de dienst slechts onderzoek doet naar technische hulpmiddelen. Volgens hem luistert de dienst geen individuen af en wordt het NTRO in diskrediet gebracht door verongelijkte werknemers.
Ook de politie heeft de bevoegdheid om af te luisteren. De minister van Binnenlandse Zaken stelde dat ruim dertig instanties in de verschillende Indiase deelstaten de mogelijkheid hebben om te tappen en af te luisteren. Volgens minister Chidambaram ligt daarom de macht tot het uitvoeren van deze observaties niet alleen op nationaal niveau, maar ook op deelstaatniveau. Dat dit ook daadwerkelijk aan de hand is werd in dezelfde periode geïllustreerd door een afluisterschandaal van de CBDT. Deze dienst had lobbyisten van de telecommunicatie industrie afgeluisterd ten tijde van de toewijzing van mobiele breedband netwerken met de 2G technologie. Bij deze onthulling werd niet de CBDT beschuldigd van illegale taps, maar kregen de bedrijven het te verduren. De afgeluisterde gesprekken onthulden de grote invloed van de industrie op de besluitvorming van de regering. De CBDT luisterde de lobbyisten af in het kader van een onderzoek naar belastingfraude. Zowel politiek als binnen de juridische wereld worden er vraagtekens gezet bij het afluisteren van mensen die worden verdacht van belastingfraude.
Hoewel de onthulling in de Outlook erg gedetailleerd was, was het antwoord van de minister en de dienst dat er niets aan de hand is. Er wordt niet afgeluisterd en er is geen bewijs gevonden dat het is gebeurd, luidde het officiële regeringsstandpunt. De Indiase Telecomwet van 1885 en de toegevoegde wijziging van 2008 maken afluisteren echter wel mogelijk. Bij het afluisteren gaat het om uitzonderlijke situaties en niet om een standaard regel. Het was dus wel degelijk een schending van wettelijke regels. In de week erna bevestigden enkele inlichtingenofficieren anoniem dat er op grote schaal afgeluisterd wordt. Naast de vier politici waarover Outlook in het nummer van 3 mei 2010 publiceerde bleken er veel meer mensen te zijn afgeluisterd. Het gaat daarbij naast politici om ambtenaren, zakenmensen, gewone Indiërs en beroemdheden. Volgens de anonieme officieren werden de gesprekken zonder wettelijke toestemming afgeluisterd . De officieren vertellen in de Outlook van 10 mei 2010 dat zij de opdrachten mondeling kregen of soms op een geel memo papiertje. Volgens de officieren waren de afluisteroperaties allemaal illegaal , zonder toestemming van de NSA of het kabinet van de minister-president. Er mocht ook geen administratie van worden bijgehouden. De IMSI catchers werden ingezet om bijvoorbeeld in Delhi, de hoofdstad van India, rond te rijden om gsm verkeer op te vangen. Eigenlijk waren het ‘fishing operaties’ op zoek naar dat ene gesprek dat mogelijk een gevaar kan zijn voor de nationale veiligheid. Het systeem scant alle nummers zonder onderscheid te maken en kan alles opnemen. Op elk willekeurig moment kan het apparaat dat in India is gebruikt maximaal 64 gesprekken opnemen. Sommige gesprekken werden vernietigd, andere werden bewaard. Het wordt uit het interview met de medewerkers niet duidelijk wie er verantwoordelijk was voor het besluit om gesprekken al dan niet te vernietigen. In The Times of India worden anonieme bronnen aangehaald die zeggen dat het afluisteren van de politici was uitgevoerd door “junior officials”, maar dat hun werk deel uitmaakt van een grotere operatie.
Volgens de medewerkers van de inlichtingendiensten gaat het om in totaal vijf apparaten die door de NTRO gebruikt worden. Van de ritten van de auto met de IMSI Catcher worden twee logboeken bijgehouden. Het ene logboek bevat geen enkel detail van de operatie. Het andere logboek is “top secret” en bevat gedetailleerde informatie over de locatie waar het apparaat heeft afgeluisterd. De precieze route, bestemmingen, data en tijden zijn in dat logboek te vinden. Medewerkers van de inlichtingendienst vertelden dat het niet alleen de NTRO hoeft te zijn die verantwoordelijk is voor het tappen. Verschillende van de zeven inlichtingendiensten en zelfs de politie hebben een IMSI catcher. Bronnen in de inlichtingenwereld hebben het weekblad Outlook aangegeven dat er in totaal 90 apparaten zijn aangeschaft door de verschillende instanties. Vooral in regio’s waar veel moslims wonen gebeurt dit volgens de officier. De inlichtingenofficieren die in Outlook worden geïnterviewd worden ondersteund in hun verhalen door een oud- directeur van het Intelligence Bureau (IB), dhr. Dhar. Hij vertelde het Indiase weekblad Tehelka dat de NTRO namen moet hebben gekregen om af te luisteren. Tevens verklaart hij dat politieke leiders regelmatig inlichtingendiensten de opdracht geven om mensen af te luisteren zonder schriftelijke toestemming. Medewerkers van diensten die weigeren aan deze afluisterpraktijken mee te doen, worden ontslagen volgens de oud-directeur van het Intelligence Bureau.
Iedereen is verdacht
Het is onduidelijk wat het doel is van de afluisteroperatie die zeker vier jaar heeft geduurd. Hoewel de verantwoordelijk minister in zijn eerste reactie had aangegeven niets van het afluisteren af te weten, gaven regeringsbronnen aan de The Times of India toe dat de NTRO wel toezicht uitvoerde. Welk toezicht wordt door de Times niet vermeld. Volgens de bronnen staan die activiteiten onder directe verantwoordelijkheid van de National Security Advisor of het kabinet van de minister-president waaronder de Research and Analysis Wing en de NTRO valt. Bij de NSA zou het gaan om dhr. Narayanan, de man die aan de wieg stond van het afluisteren in 2005. In de Indiase media worden ook verbanden gelegd met de lange traditie van de Indian National Congress (INC), een regeringspartij, om de oppositie in diskrediet te brengen door het verzamelen van politiek gevoelige informatie door het inzetten van inlichtingendiensten. Het dagblad The Pioneer vergelijkt het met de werkwijze van de Indiase roddelpers, maar dan veel serieuzer. Volgens de krant gaat het er bij het afluisteren om om te achterhalen wie elkaar ontmoeten, met wie iemand contact heeft, met wie personen van de elite slapen en vergelijkbare vragen uit de roddelbladen. Het lijkt er volgens de krant op dat de inlichtingendiensten de levens van politieke spelers in kaart probeert te brengen.
De Indian National Congress (INC) is echter niet de enige politieke partij die deze middelen inzet. Het lijkt erop dat het binnen de Indiase democratie de gewoonte is om de oppositie op allerlei manieren in de gaten te houden. De wijze waarop de oppositie het schandaal gebruikte om de regering onder druk te zetten, lijkt deze stelling ook te ondersteunen. De oppositie is geschokt en wil uitleg van de minister-president, maar daadwerkelijke wettelijke hervormingen werden niet met zoveel woorden geëist.
De verantwoordelijk minister voor de afluisteroperatie is Chidambaram. Chidambaram is lid van de Indian National Congress (INC). Onder de afgeluisterde politici bevond zich ook de minister voor Consumentenzaken, voedsel en distributie, Sharad Pawar van de Nationalist Congress Party (NCP), een afsplitsing van de INC. De NCP neemt op dit moment ook deel aan de regering samen met het INC. Ook leden van de partij van de minister van Binnenlandse Zaken zoals dhr. Digvijay Singh werden afgeluisterd, evenals leden van de oppositie, zoals het hoofd van de Communistische Partij India, dhr. Karat. Het afluisteren vond niet alleen nationaal plaats, ook in deelstaten van India zoals in Bihar werden hoge politici afgeluisterd, zoals de premier van Bihar, dhr. Kumar.
De onderwerpen van de gesprekken die Outlook in haar bezit heeft, zijn uiteenlopend. Bij de gesprekken van de minister van Consumentenzaken ging het om het grote schandaal rond de Indian Premier League (IPL), de Indiase cricket competitie, IPL-gate, waar sprake was van witwassen van geld en het vooraf bepalen van de winnaar van een wedstrijd. De premier van Bihar belde een collega om te lobbyen voor meer geld voor zijn deelstaat. En van de communistische partij zijn gesprekken bewaard uit 2008 toen er oppositie werd gevoerd tegen de aankoop van nucleaire technologie van de Verenigde Staten. Hoewel Karat tegenstander was van de overeenkomst tussen India en de Verenigde Staten stond hij onderhandelingen met minister-president Singh niet in weg. Hij fungeerde ook als een belangrijke exponent van de oppositie in India tegen de overeenkomst. De gegevens over de afluisterpraktijk van de NTRO geven nu aan dat dhr. Karat toen is afgeluisterd. Uiteindelijk bleef de Communistische Partij bij haar standpunt om tegen te stemmen, maar de regering behaalde toch een nipte overwinning. De Samajwadi Party (SP) en tien leden van de BJP, beide oppositie partijen, hielpen de regering aan haar meerderheid. De overeenkomst met de Amerikanen kon doorgaan. Naar nu blijkt werden er tijdens de onderhandelingen over het akkoord met de Amerikanen parlementariërs omgekocht. In documenten van de Amerikaanse vertegenwoordiging in India die door Wikileaks zijn buitgemaakt, blijkt dat de Amerikanen op de hoogte waren van de steekpenningen die parlementariërs ontvingen om voor te stemmen. Of de afgeluisterde gesprekken hebben bijgedragen aan het omkopen van leden van het parlement is niet duidelijk.
DE NTRO als schandaal
De NTRO heeft absoluut geen schoon blazoen. De korte historie van de dienst kent al vele schandalen, gebrekkig functioneren, politieke benoemingen en tekenen van corruptie. India kent geen Commissie van Toezicht op de Inlichtingen en Veiligheidsdiensten, wel een algemene controledienst, te vergelijken met de algemene Rekenkamer. De regering stelde dhr. P.V. Kumar van de Comptroller and Auditor General of India (CAG) aan om de misstanden bij de NTRO te onderzoeken. Kumar is een oud medewerker van de Research and Analysis Wing en werd na zijn onderzoek begin 2011 aangesteld om de NTRO te leiden. In hoeverre er een einde is gekomen aan de misstappen is dan ook niet duidelijk. Een van de schandalen naast het afluisteren van politici is de benoeming van de tweede man van de dienst, dhr. Vijararaghavan, en zijn betrokkenheid bij een deal met het Amerikaanse bedrijf CISCO. Na de deal met CISCO werd de dochter van Vijararaghavan door CISCO in dienst genomen. De positie van de tweede man staat ook ter discussie omdat hij naast zijn functie bij de NTRO ook nog zijn oude functie als hoofd van Defence Research and Development Organisation (DRDO) vervult en tevens directeur is van een lobbygroep van de elektronica-industrie. Ook diverse andere benoemingen worden door de CAG onderzocht op hun onvolkomenheden. Het gerechtshof in Delhi oordeelde verder dat er een onderzoek moet komen naar administratieve en financiële onregelmatigheden bij de aanstelling van ruim zeventig werknemers. Vacatures zouden zijn opgevuld met niet capabele mensen zonder de juiste opleiding en voor sommige functies is zelfs geen vacature uitgeschreven, maar die zijn onderhands opgevuld.
Naast het personeelsbeleid zijn er ook vragen gerezen over de aankoop van apparatuur door de dienst. Een medewerker schafte zonder overleg met het agentschap dat over de aankopen van gevoelige apparatuur gaat, computers aan die vitale Chinese onderdelen bevat. De spanningen tussen India en China fluctueren al decennia lang tussen gespannen en vriendschappelijk. De laatste jaren gaat het beter, maar tien jaar geleden had de verhouding tussen de twee landen een nieuw dieptepunt bereikt na Indiase kernproeven. En dat de relatie verre van close is maakten Canadese onderzoekers van de Information Warfare Monitor (IWM) duidelijk toen zij India erop wezen dat begin 2010 Chinese hackers zich de toegang hadden verschaft tot computers van het Indiase leger. IWM had de Indiase overheid er een jaar eerder al op gewezen dat haar computers en servers kwetsbaar waren voor aanvallen uit vooral China. Op de computers die in 2010 gehackt zijn, zou informatie staan over het raketprogramma van India, de artillerie-brigades van Assam, luchtmachtbases en andere militaire informatie. De Canadese onderzoekers produceerden een rapport over de Chinese elektronische infiltratie, ‘Shadow in the Cloud’. In mei 2010 bleek dat de schade van de Chinese spionage operatie aanzienlijk is. Computers en servers van diplomatieke vestigingen van India in Kabul, Moskou, Dubai, Abuja, in de Verenigde Staten, Servië, België, Duitsland, Cyprus, het Verenigd Koninkrijk en Zimbabwe waren door de Chinezen overgenomen. Ook het kantoor van de National Security Advisor was besmet en zelfs bedrijven als Tata, YKK India en DLF Limited. Naast deze militair en economisch strategische spionage hadden de Chinezen het ook gemunt op de Tibetaanse gemeenschap in Dharamshala.
Een andere medewerker kocht satelliet communicatiemiddelen van een bedrijf uit Singapore (Singapore Technologies), een bedrijf dat door de Indiase overheid op een zwarte lijst was geplaatst. Bij de aanbesteding van de satelliet communicatie apparatuur kwamen de specificaties van de NTRO precies overeen met het product van Singapore Technologies. In andere gevallen, zoals bij de aanschaf van onbemande vliegtuigen van het Israëlische bedrijf Israel Aerospace Industries (IAI) is door het NTRO geen aanbesteding uitgeschreven volgens de onderzoekers van CAG. De onbemande vliegtuigen moesten in januari 2010 aan de grond worden gehouden, omdat bleek dat de NTRO onveilige en open radiofrequenties gebruikte voor de besturing van de vliegtuigen. Volgens de India Today zouden ook de onbemande vliegtuigen van het Indiase leger op deze manier worden bediend. Bij grote uitgaven dient de NTRO een aanbesteding te doen en toestemming te vragen aan de National Security Advisor en uiteindelijk de minister-president. Ook dit laatste is bij diverse aankopen door de dienst niet gebeurd.
Naast deze personele en technische misstappen wordt de kwaliteit van het werk van de dienst in het publieke debat in India in twijfel getrokken. Hoewel haar taak het verzamelen van informatie over mogelijke terroristische aanslagen, cyber crime, opstanden en illegale grensoverschrijdingen is, heeft de dienst geen enkel duidelijk succes geboekt. De aanslagen van 26 november 2008 in Mumbai worden gezien als het bewijs van de mislukking van de dienst. Toch lijkt de dienst onaantastbaar, zoals zoveel inlichtingendiensten. Twee jaar later was het opnieuw raak. Op basis van informatie van de inlichtingendiensten werd een man gearresteerd die verantwoordelijk werd gehouden van de aanslag op de “Duitse bakkerij”, een populaire uitgaansgelegenheid voor toeristen in Pune. Minister Chidambaram feliciteerde de inlichtingendiensten, maar ze bleken het bij het verkeerde eind te hebben. De man moest worden vrijgelaten wegens ontlastend bewijs.
En hoewel de NTRO de stofzuiger is van data van Indiase burgers staat zij net als de andere spelers in de Indiase inlichtingenwereld bekend om het ‘kwijtraken’ van gevoelige data. In 2003 was de Defence Research and Development Organisation (DRDO) plotseling 53 computers kwijt. Toen zij werden teruggevonden, ontbraken de harde schijven. Op de harde schijven stonden geheime codes voor communicatie met inlichtingendiensten en het leger. In 2006 raakte een belangrijke wetenschapper van de DRDO zijn laptop kwijt op het vliegveld van Delhi. Op de laptop bewaarde de wetenschapper geheime informatie over het Indiase kernwapenarsenaal en raketsystemen. En in 2008 raakte een directeur van de NTRO zijn laptop met geheime informatie over de kernwapenprogramma’s in Pakistan, China en Noord Korea kwijt in Washington DC.
Het schandaal staat niet op zich
De NTRO is niet de enige dienst die tekenen vertoont van verval. Ook de dienst waaruit zij is voortgekomen, de Research and Analysis Wing, wordt geteisterd door technische, personele, administratieve en financiële schandalen. Eigenlijk is het niet onlogisch dat er schandalen optreden binnen de Indiase inlichtingenwereld. Met zoveel onregelmatigheden is het bijna vanzelfsprekend dat er schandalen plaatsvinden die ook Indiase burgers raken. Het NTRO schandaal staat dan ook niet op zich. Vergelijkbare afluisterpraktijken zijn de afgelopen decennia aan het licht gekomen. In de jaren tachtig kwam aan het licht dat de Indiase overheid politieke leiders afluisterde. Daarnaast werden ook toen toonaangevende journalisten in de gaten gehouden. In 1990 – 1991 was het opnieuw raak met een nieuw afluisterschandaal. De Peoples Union for Civil Liberties (PUCL), een burgerrechtenbeweging, bracht de zaak voor de rechter. Tijdens de rechtzaak gaf de CBI, Central Bureau of Investigation, toe dat op grote schaal journalisten, parlementariërs en leden van het kabinet zowel op nationaal als op deelstaatniveau waren afgeluisterd. Het CBI gaf toe dat deze afluisterpartij onwettig was.
En is er wat veranderd na het schandaal in het voorjaar van 2010 dat de Indiase politiek enkele weken bezig hield? Nee, in juli van hetzelfde jaar werd de IMSI Catcher als nieuw gepresenteerd in een operatie met de codenaam Fox, alsof het om een nieuwe strijd ging tegen terrorisme en criminele bendes. De media waren het schandaal van twee maanden eerder al weer vergeten.
Buro Jansen & Janssen
Find this story at 20 April 2011
Mumbai Terrorists Relied on New Technology for AttacksJuly 1, 2013
MUMBAI, India — The terrorists who struck this city last month stunned authorities not only with their use of sophisticated weaponry but also with their comfort with modern technology.
The terrorists navigated across the Arabian Sea to Mumbai from Karachi, Pakistan, with the help of a global positioning system handset. While under way, they communicated using a satellite phone with those in Pakistan believed to have coordinated the attacks. They recognized their targets and knew the most direct routes to reach them in part because they had studied satellite photos from Google Earth.
And, perhaps most significantly, throughout the three-day siege at two luxury hotels and a Jewish center, the Pakistani-based handlers communicated with the attackers using Internet phones that complicate efforts to trace and intercept calls.
Those handlers, who were apparently watching the attacks unfold live on television, were able to inform the attackers of the movement of security forces from news accounts and provide the gunmen with instructions and encouragement, authorities said.
Hasan Gafoor, Mumbai’s police commissioner, said Monday that as once complicated technologies — including global positioning systems and satellite phones — have become simpler to operate, terrorists, like everyone else, have become adept at using them. “Well, whether terrorists or common criminals, they do try to be a step ahead in terms of technology,” he said.
Indian security forces surrounding the buildings were able to monitor the terrorists’ outgoing calls by intercepting their cellphone signals. But Indian police officials said those directing the attacks, who are believed to be from Lashkar-e-Taiba, a militant group based in Pakistan, were using a Voice over Internet Protocol (VoIP) phone service, which has complicated efforts to determine their whereabouts and identities.
VoIP services, in which conversations are carried over the Internet as opposed to conventional phone lines or cellphone towers, are increasingly popular with people looking to save money on long distance and international calls. Many such services, like Skype and Vonage, allow a user to call another VoIP-enabled device anywhere in the world free of charge, or to call a standard telephone or cellphone at a deeply discounted rate.
But the same services are also increasingly popular with criminals and terrorists, a trend that worries some law enforcement and intelligence agencies. “It’s a concern,” said one Indian security official, who spoke anonymously because the investigation was continuing. “It’s not something we have seen before.”
In mid-October, a draft United States Army intelligence report highlighted the growing interest of Islamic militants in using VoIP, noting recent news reports of Taliban insurgents using Skype to communicate. The unclassified report, which examined discussions of emerging technologies on jihadi Web sites, was obtained by the Federation of American Scientists, a Washington-based nonprofit group that monitors the impact of science on national security.
VoIP calls pose an array of difficulties for intelligence and law enforcement services, according to communications experts. “It means the phone-tapping techniques that work for old traditional interception don’t work,” said Matt Blaze, a professor and computer security expert at the University of Pennsylvania.
An agency using conventional tracing techniques to track a call from a land line or cellphone to a VoIP subscriber would be able to get only as far as the switching station that converts the voice call into Internet data, communications experts said. The switch, usually owned and operated by the company providing the VoIP service, could be located thousands of miles from the subscriber.
The subscriber’s phone number would also likely reveal no information about his location. For instance, someone in New York could dial a local phone number but actually be connected via the Internet to a person in Thailand.
In Mumbai, authorities have declined to disclose the names of the VoIP companies whose services the Lashkar-e-Taiba handlers used, but reports in Indian news media have said the calls have been traced to companies in New Jersey and Austria. Yet investigators have said they are convinced that the handlers who directed the attacks were actually sitting somewhere in Pakistan during the calls.
One senior Lashkar-e-Taiba leader who American officials believe may have played a key role in planning the Mumbai attacks is Zarrar Shah. Mr. Shah, known to be a specialist in communications technology, may have been aware of the difficulties in tracing VoIP.
To determine the location of a VoIP caller, an investigating agency has to access a database kept by the service provider. The database logs the unique numerical identifier, known as an Internet Protocol (I.P.) address, of whatever device the subscriber was using to connect to the Internet. This could be a computer equipped with a microphone, a special VoIP phone, or even a cellphone with software that routes calls over the Internet using wireless connections as opposed to cellular signals.
It would then take additional electronic sleuthing to determine where the device was located. The customer’s identity could be obtained from the service provider as well, but might prove fraudulent, experts said.
Getting the I.P. address and then determining its location can take days longer than a standard phone trace, particularly if service providers involved are in a foreign country.
“Ultimately, we can trace them,” said Mr. Gafoor, referring to VoIP calls. “It takes a little longer, but we will trace them.”
Washington is assisting the Indian authorities in obtaining this information, according to another Indian police official who also spoke anonymously because of the continuing investigation.
Further complicating this task is the fact that I.P. addresses change frequently and are less tied to a specific location than phone numbers.
Computer experts said that while these challenges were formidable, none were insurmountable. And they cautioned that security services and police forces might be disingenuous when they complain about terrorists’ use of new technologies, including VoIP.
The experts said that VoIP calls left a far richer data trail for investigators to mine than someone calling from an old-fashioned pay phone. Mr. Blaze, the computer security expert at the University of Pennsylvania, also noted that 15 years ago the Mumbai attackers would probably not have had the capacity to make calls to their handlers during the course of their attacks, depriving investigators of vital clues to their identities. “As one door closes — traditional wire line tapping — all these other doors have opened,” Mr. Blaze said.
December 9, 2008
By JEREMY KAHN
Find this story at 9 December 2008
Copyright 2008 The New York Times Company
GCHQ taps fibre-optic cables for secret access to world’s communicationsJuly 1, 2013
Exclusive: British spy agency collects and stores vast quantities of global email messages, Facebook posts, internet histories and calls, and shares them with NSA, latest documents from Edward Snowden reveal
Secret document detailing GCHQ’s ambition to ‘master the internet’
Britain’s spy agency GCHQ has secretly gained access to the network of cables which carry the world’s phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA).
The sheer scale of the agency’s ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate.
One key innovation has been GCHQ’s ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. That operation, codenamed Tempora, has been running for some 18 months.
GCHQ and the NSA are consequently able to access and process vast quantities of communications between entirely innocent people, as well as targeted suspects.
This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user’s access to websites – all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets.
The existence of the programme has been disclosed in documents shown to the Guardian by the NSA whistleblower Edward Snowden as part of his attempt to expose what he has called “the largest programme of suspicionless surveillance in human history”.
“It’s not just a US problem. The UK has a huge dog in this fight,” Snowden told the Guardian. “They [GCHQ] are worse than the US.”
However, on Friday a source with knowledge of intelligence argued that the data was collected legally under a system of safeguards, and had provided material that had led to significant breakthroughs in detecting and preventing serious crime.
Britain’s technical capacity to tap into the cables that carry the world’s communications – referred to in the documents as special source exploitation – has made GCHQ an intelligence superpower.
By 2010, two years after the project was first trialled, it was able to boast it had the “biggest internet access” of any member of the Five Eyes electronic eavesdropping alliance, comprising the US, UK, Canada, Australia and New Zealand.
UK officials could also claim GCHQ “produces larger amounts of metadata than NSA”. (Metadata describes basic information on who has been contacting whom, without detailing the content.)
By May last year 300 analysts from GCHQ, and 250 from the NSA, had been assigned to sift through the flood of data.
The Americans were given guidelines for its use, but were told in legal briefings by GCHQ lawyers: “We have a light oversight regime compared with the US”.
When it came to judging the necessity and proportionality of what they were allowed to look for, would-be American users were told it was “your call”.
The Guardian understands that a total of 850,000 NSA employees and US private contractors with top secret clearance had access to GCHQ databases.
The documents reveal that by last year GCHQ was handling 600m “telephone events” each day, had tapped more than 200 fibre-optic cables and was able to process data from at least 46 of them at a time.
Document quoting Lt Gen Keith Alexander, head of the NSA, during a visit to Britain
Each of the cables carries data at a rate of 10 gigabits per second, so the tapped cables had the capacity, in theory, to deliver more than 21 petabytes a day – equivalent to sending all the information in all the books in the British Library 192 times every 24 hours.
And the scale of the programme is constantly increasing as more cables are tapped and GCHQ data storage facilities in the UK and abroad are expanded with the aim of processing terabits (thousands of gigabits) of data at a time.
For the 2 billion users of the world wide web, Tempora represents a window on to their everyday lives, sucking up every form of communication from the fibre-optic cables that ring the world.
The NSA has meanwhile opened a second window, in the form of the Prism operation, revealed earlier this month by the Guardian, from which it secured access to the internal systems of global companies that service the internet.
The GCHQ mass tapping operation has been built up over five years by attaching intercept probes to transatlantic fibre-optic cables where they land on British shores carrying data to western Europe from telephone exchanges and internet servers in north America.
This was done under secret agreements with commercial companies, described in one document as “intercept partners”.
The papers seen by the Guardian suggest some companies have been paid for the cost of their co-operation and GCHQ went to great lengths to keep their names secret. They were assigned “sensitive relationship teams” and staff were urged in one internal guidance paper to disguise the origin of “special source” material in their reports for fear that the role of the companies as intercept partners would cause “high-level political fallout”.
The source with knowledge of intelligence said on Friday the companies were obliged to co-operate in this operation. They are forbidden from revealing the existence of warrants compelling them to allow GCHQ access to the cables.
“There’s an overarching condition of the licensing of the companies that they have to co-operate in this. Should they decline, we can compel them to do so. They have no choice.”
The source said that although GCHQ was collecting a “vast haystack of data” what they were looking for was “needles”.
“Essentially, we have a process that allows us to select a small number of needles in a haystack. We are not looking at every piece of straw. There are certain triggers that allow you to discard or not examine a lot of data so you are just looking at needles. If you had the impression we are reading millions of emails, we are not. There is no intention in this whole programme to use it for looking at UK domestic traffic – British people talking to each other,” the source said.
He explained that when such “needles” were found a log was made and the interception commissioner could see that log.
“The criteria are security, terror, organised crime. And economic well-being. There’s an auditing process to go back through the logs and see if it was justified or not. The vast majority of the data is discarded without being looked at … we simply don’t have the resources.”
However, the legitimacy of the operation is in doubt. According to GCHQ’s legal advice, it was given the go-ahead by applying old law to new technology. The 2000 Regulation of Investigatory Powers Act (Ripa) requires the tapping of defined targets to be authorised by a warrant signed by the home secretary or foreign secretary.
However, an obscure clause allows the foreign secretary to sign a certificate for the interception of broad categories of material, as long as one end of the monitored communications is abroad. But the nature of modern fibre-optic communications means that a proportion of internal UK traffic is relayed abroad and then returns through the cables.
Parliament passed the Ripa law to allow GCHQ to trawl for information, but it did so 13 years ago with no inkling of the scale on which GCHQ would attempt to exploit the certificates, enabling it to gather and process data regardless of whether it belongs to identified targets.
The categories of material have included fraud, drug trafficking and terrorism, but the criteria at any one time are secret and are not subject to any public debate. GCHQ’s compliance with the certificates is audited by the agency itself, but the results of those audits are also secret.
An indication of how broad the dragnet can be was laid bare in advice from GCHQ’s lawyers, who said it would be impossible to list the total number of people targeted because “this would be an infinite list which we couldn’t manage”.
There is an investigatory powers tribunal to look into complaints that the data gathered by GCHQ has been improperly used, but the agency reassured NSA analysts in the early days of the programme, in 2009: “So far they have always found in our favour”.
Historically, the spy agencies have intercepted international communications by focusing on microwave towers and satellites. The NSA’s intercept station at Menwith Hill in North Yorkshire played a leading role in this. One internal document quotes the head of the NSA, Lieutenant General Keith Alexander, on a visit to Menwith Hill in June 2008, asking: “Why can’t we collect all the signals all the time? Sounds like a good summer project for Menwith.”
By then, however, satellite interception accounted for only a small part of the network traffic. Most of it now travels on fibre-optic cables, and the UK’s position on the western edge of Europe gave it natural access to cables emerging from the Atlantic.
The data collected provides a powerful tool in the hands of the security agencies, enabling them to sift for evidence of serious crime. According to the source, it has allowed them to discover new techniques used by terrorists to avoid security checks and to identify terrorists planning atrocities. It has also been used against child exploitation networks and in the field of cyberdefence.
It was claimed on Friday that it directly led to the arrest and imprisonment of a cell in the Midlands who were planning co-ordinated attacks; to the arrest of five Luton-based individuals preparing acts of terror, and to the arrest of three London-based people planning attacks prior to the Olympics.
As the probes began to generate data, GCHQ set up a three-year trial at the GCHQ station in Bude, Cornwall. By the summer of 2011, GCHQ had probes attached to more than 200 internet links, each carrying data at 10 gigabits a second. “This is a massive amount of data!” as one internal slideshow put it. That summer, it brought NSA analysts into the Bude trials. In the autumn of 2011, it launched Tempora as a mainstream programme, shared with the Americans.
The intercept probes on the transatlantic cables gave GCHQ access to its special source exploitation. Tempora allowed the agency to set up internet buffers so it could not simply watch the data live but also store it – for three days in the case of content and 30 days for metadata.
“Internet buffers represent an exciting opportunity to get direct access to enormous amounts of GCHQ’s special source data,” one document explained.
The processing centres apply a series of sophisticated computer programmes in order to filter the material through what is known as MVR – massive volume reduction. The first filter immediately rejects high-volume, low-value traffic, such as peer-to-peer downloads, which reduces the volume by about 30%. Others pull out packets of information relating to “selectors” – search terms including subjects, phone numbers and email addresses of interest. Some 40,000 of these were chosen by GCHQ and 31,000 by the NSA. Most of the information extracted is “content”, such as recordings of phone calls or the substance of email messages. The rest is metadata.
The GCHQ documents that the Guardian has seen illustrate a constant effort to build up storage capacity at the stations at Cheltenham, Bude and at one overseas location, as well a search for ways to maintain the agency’s comparative advantage as the world’s leading communications companies increasingly route their cables through Asia to cut costs. Meanwhile, technical work is ongoing to expand GCHQ’s capacity to ingest data from new super cables carrying data at 100 gigabits a second. As one training slide told new users: “You are in an enviable position – have fun and make the most of it.”
Ewen MacAskill, Julian Borger, Nick Hopkins, Nick Davies and James Ball
The Guardian, Friday 21 June 2013 17.23 BST
Find this story at 21 June 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Spy agencies win millions more to fight terror threatJuly 1, 2013
Britain’s intelligence agencies will emerge as the biggest winners from the Government’s review of public spending, The Telegraph can disclose.
MI6, MI5 and Government Communications Headquarters will see an increase in their combined £1.9 billion budget
MI6, MI5 and Government Communications Headquarters (GCHQ) will see an inflation-busting increase in their combined £1.9 billion budget, underlining the Government’s concern over the growing terrorist threat following the Woolwich attack.
Police spending on counter-terrorism will also be protected and will rise in line with inflation.
The percentage increase in the budgets of the intelligence agencies – at more than three per cent in addition to inflation – will be the largest of any item of government spending including the NHS, schools and international development.
It will lead to the agencies receiving about another £100 million in funding annually from 2015.
Local councils are also expected to emerge as winners with increased funding for elderly social care. Money from the ring-fenced NHS budget is expected to be diverted to help fund care homes and home visits for frail pensioners.
Related Articles
George Osborne: I’d rather not have tax rises but can’t rule it out 27 Jun 2013
Sketch: Dr Osborne needles Labour 26 Jun 2013
Tax rises likely after spending review cuts, says IFS 26 Jun 2013
Are the two Eds Attlee and Cripps – or Tory clones? 25 Jun 2013
Nick Clegg: even more cuts are coming 25 Jun 2013
Married couples to be offered tax breaks 24 Jun 2013
George Osborne will on Wednesday unveil the Government’s spending plans for the 2015-16 financial year following months of Whitehall wrangling.
The Spending Review, which will cut a further £11.5 billion in public expenditure, is regarded as especially sensitive as the cuts will be implemented just weeks before the next general election.
The biggest losers will include the Business department, the Culture department, the Home Office and the Justice department, which are expected to each lose about eight per cent from their budgets.
The Ministry of Defence will see its budget cut by about £1 billion, although this will not involve further reductions in front-line troops.
Mr Osborne is also expected to set out plans for long-term caps on welfare spending and other areas of government expenditure which are not tightly controlled.
The Chancellor will detail proposals to divert the money saved from Whitehall spending to fund long-term infrastructure projects such as widening major roads.
He is expected to say: “Britain is moving from rescue to recovery. But while the British economy is leaving intensive care, now we need to secure that recovery.
“We’re saving money on welfare and waste to invest in the roads and railways, schooling and science our economy needs to succeed in the future.”
The intelligence agencies have recently faced criticism that they are struggling to deal with emerging threats, amid suggestions that MI5 and MI6 could have done more to prevent the murder of Drummer Lee Rigby in Woolwich. One of the suspects had attempted to travel to Somalia and both were known to the intelligence services.
GCHQ’s activities have also come under scrutiny following accusations that it may be abusing its power in secretive projects with the United States to monitor internet traffic.
The Chancellor is understood to have contacted the heads of the three agencies last Friday to inform them of their spending increases. MI5, MI6 and GCHQ have seen their budgets fall in real terms by more than 10 per cent since 2010 and there were fears that they would face a further round of cuts.
A Whitehall source said: “This has been one of George’s personal priorities. It is vitally important we look after these budgets and they were settled last week with agreement at the very highest level.”
Mr Osborne and the Prime Minister are understood to believe the agencies need more resources to tackle the growing terrorist threat from sub-Saharan Africa and Syria, and the rising problem posed by cyber terrorism.
In the wake of the GCHQ snooping row, William Hague, the Foreign Secretary, praised the agencies’ work and cooperation with US counterparts.
Speaking in America, he said “we should have nothing but pride” in the “intelligence-sharing relationship between Britain and the United States”. He added that both countries’ intelligence work operated “under the rule of law” and “only exists to protect” people’s freedoms.
Mr Osborne confirmed on Tuesday that the NHS and schools budgets would continue to rise.
Money is also expected to be diverted from the health budget to local authorities to fund social care. Norman Lamb, a health minister, recently warned of an impending crisis in social care as councils struggled to fund enough places for ailing pensioners.
Last week, council leaders warned Mr Osborne that street lights may have to be switched off and libraries closed unless NHS funding was diverted to help pay for elderly care.
They said the amount of money spent on social care has been cut by a fifth in less than three years and they were preparing to reduce budgets further.
Mr Osborne agreed for £2 billion to be transferred from the NHS to the social care sector in his previous Spending Review, but councils said much of the money has gone on propping up the system because of the ageing population.
Ministers are also expected to set out the entitlement criteria for state help. The Government has pledged to cap the maximum bill that anyone faces for social care at £72,000 from 2016, and the details of how this will work are to be announced this week.
Earl Howe, a health minister, was asked about the growing problem in social care, with hospitals often forced not to discharge elderly patients who are infirm but not ill because they have nowhere to go. He said there would be “more news” about increased funding for social care on Wednesday and sources confirmed that the social care budget would rise after several years of cuts.
Danny Alexander, the Chief Secretary to the Treasury, also hinted that the Government may speed up the introduction of its community budgets programme, which is designed to make public sector services share operations.
He urged MPs to “listen carefully” to the Chancellor’s statement for more news after being asked about the programme’s national implementation.
By Robert Winnett, Political Editor
10:00PM BST 25 Jun 2013
Find this story at 25 June 2013
© Copyright of Telegraph Media Group Limited 2013
Operation Tempora: GCHQ in fresh snooping row as it eavesdrops on phones and the internetJuly 1, 2013
Data includes recordings of telephone calls, contents of emails, details of messages on social media and the history of internet use
Britain’s electronic eavesdropping centre, GCHQ, has started collecting data from the network of fibre-optic cables carrying the world’s telephone calls and internet traffic, it was reported tonight.
The massive programme of surveillance allows the agency to store vast volumes of information for up to 30 days which it can then study for evidence of terrorist and criminal activity.
The claims, in The Guardian, will provoke a fresh civil liberties storm following recent allegations that thousands of Britons could have been spied on by GCHQ through a covert link with the US National Security Agency (NSA).
According to the paper, the agency has been running Operation Tempora for 18 months under which it gains access to transatlantic cables carrying data about phone calls and internet use. It is said to share information gleaned from it with the NSA.
The data includes recordings of telephone calls, contents of emails, details of messages on social media and the history of internet use.
Documents seen by the paper suggest that by last year GCHQ was handling 600m “telephone events” each day, had tapped more than 200 fibre-optic cables and was able to process data from at least 46 at a time.
A source told The Guardian that the eavesdropping allowed the security services to arrest three people planning attacks on last year’s London Olympics, as well as terrorist cells in the Midlands and Luton. It has also been used against child exploitation networks and to boost cyberdefence.
A GCHQ spokesman said: “It is longstanding practice that we do not comment on intelligence matters.”
He added: “GCHQ takes its obligations under the law very seriously. Our work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Intelligence and Security Committee.”
* Edward Snowden has been charged in his absence by US prosecutors with spying and theft of government property. The charges are included in sealed documents filed by prosecutors.
Nigel Morris
Saturday, 22 June 2013
Find this story at 22 June 2013
© independent.co.uk
MI5 feared GCHQ went ‘too far’ over phone and internet monitoringJuly 1, 2013
Amid leaks from NSA whistleblower Edward Snowden, senior intelligence source reveals worries were voiced in 2008
GCHQ taps can intercept UK and US phone and internet traffic. Photograph: EPA
Senior figures inside British intelligence have been alarmed by GCHQ’s secret decision to tap into transatlantic cables in order to engage in the bulk interception of phone calls and internet traffic.
According to one source who has been directly involved in GCHQ operations, concerns were expressed when the project was being discussed internally in 2008: “We felt we were starting to overstep the mark with some of it. People from MI5 were complaining that they were going too far from a civil liberties perspective … We all had reservations about it, because we all thought: ‘If this was used against us, we wouldn’t stand a chance’.”
The Guardian revealed on Friday that GCHQ has placed more than 200 probes on transatlantic cables and is processing 600m “telephone events” a day as well as up to 39m gigabytes of internet traffic. Using a programme codenamed Tempora, it can store and analyse voice recordings, the content of emails, entries on Facebook, the use of websites as well as the “metadata” which records who has contacted who. The programme is shared with GCHQ’s American partner, the National Security Agency.
Interviews with the UK source and the NSA whistleblower Edward Snowden raise questions about whether the programme:
■ Exploits existing law which was passed by parliament without any anticipation that it would be used for this purpose.
■ For the first time allows GCHQ to process bulk internal UK traffic which is routed overseas via these cables.
■ Allows the NSA to engage in bulk intercepts of internal US traffic which would be forbidden in its own territory.
■ Functions with no effective oversight.
The key law is the Regulation of Investigatory Powers Act 2000, Ripa, which requires the home secretary or foreign secretary to sign warrants for the interception of the communications of defined targets. But the law also allows the foreign secretary to sign certificates that authorise GCHQ to trawl for broad categories of information on condition that one end of the communication is outside the UK.
According to the UK source: “Not so long ago, this was all about attaching crocodile clips to copper wires. And it was all about voice. Now, it’s about the internet – massive scale – but still using the same law that was devised for crocodile clips. Ripa was primarily designed for voice, not for this level of interception. They are going round Ripa. The legislation doesn’t exist for this. They are using old legislation and adapting it.”
The source claimed that even the conventional warrant system has been distorted – whereas police used to ask for a warrant before intercepting a target’s communications, they will now ask GCHQ to intercept the target’s communications and then use that information to seek a warrant.
There is a particular concern that the programme allows GCHQ to break the boundary which stopped it engaging in the bulk interception of internal UK communications. The Ripa requirement that one end of a communication must be outside the UK was a significant restriction when it was applied to phone calls using satellites, but it is no longer effective in the world of fibre-optic cables. “The point is that this is an island,” the source said. “Everything comes and goes – nearly everything – down fibre-optic cables. You make a mobile phone call, it goes to a mast and then down into a fibre-optic cable, under the ground and away. And even if the call is UK to UK, it’s very likely – because of the way the system is structured – to go out of the UK and come back in through these fibre-optic channels.”
Internet traffic is also liable to be routed internationally even if the message is exchanged between two people within the UK. “At one point, I was told that we were getting 85% of all UK domestic traffic – voice, internet, all of it – via these international cables.”
Last year, the government was mired in difficulty when it tried to pass a communications bill that became known as the “snoopers’ charter”, and would have allowed the bulk interception and storage of UK voice calls and internet traffic. The source says this debate was treated with some scepticism inside the intelligence community – “We’re sitting there, watching them debate the snoopers’ charter, thinking: ‘Well, GCHQ have been doing this for years’.”
There are similar concerns about the role of the NSA. It could have chosen to attach probes to the North American end of the cables and documents shown to the Guardian by Edward Snowden suggest that key elements of the Tempora filtering process were designed by the NSA. Instead, the NSA agency has exported its computer programs and 250 of its analysts to operate the system from the UK.
Initial inquiries by the Guardian have failed to explain why this has happened, but US legislators are likely to want to check whether the NSA has sought to bypass legal or policy requirements which restrict its activity in the US. This will be particularly sensitive if it is confirmed that Tempora is also analysing internal US traffic.
The UK source challenges the official justification for the programme; that it is necessary for the fight against terrorism and serious crime: “This is not scoring very high against those targets, because they are wise to the monitoring of their communications. If the terrorists are wise to it, why are we increasing the capability?
“The answer is that you can’t stop it. It is a self-fulfilling prophecy. The more we develop communications technology, the more they develop technology to intercept it. There was MS Chat – easy. Then Yahoo chat – did that, too. Then Facebook. Then Skype. Then Twitter. They keep catching up. It is good for us, but it is bad for us.”
It is clear from internal paperwork that GCHQ has created systems to restrain the use of this powerful tool and to ensure that its use complies not only with Ripa but also with the 1998 Human Rights Act, which requires essentially that the use of the data must be proportional to the crime or threat investigated. Defenders insist that the mass of data is heavily filtered by the programme so that only that relating to legitimate targets is analysed.
However, there are doubts about the effectiveness of this. First, according to the UK source, “written definitions for targeting and filtering are very elastic. They are wide open to interpretation.” The target areas defined by the Ripa certificates are secret.
Second, there is further room for interpretation when human analysts become involved in using the filtered intelligence to produce what are known as “contact chains”. “Here is target A. But who is A talking to? Now we’re into B and C and D.” If analysts believe it is proportional, they can look at all the traffic – content and metadata – relating to all of the target’s contact.” GCHQ audits a sample of its analysts’ work – believed to be 5% every six months – but even the statistical results of these audits are also secret.
Beyond the detail of the operation of the programme, there is a larger, long-term anxiety, clearly expressed by the UK source: “If there was the wrong political change, it could be very dangerous. All you need is to have the wrong government in place. It is capable of abuse because there is no independent scrutiny.”
Nick Davies
The Observer, Saturday 22 June 2013 20.18 BST
Find this story at 22 June 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
G20 summit: NSA targeted Russian president Medvedev in LondonJuly 1, 2013
Leaked documents reveal Russian president was spied on during visit, as questions are raised over use of US base in Britain
US spies intercepted communications of the then Russian president, Dmitry Medvedev, during a G20 summit in London. Photograph: Alexander Zemlianichenko/AP
American spies based in the UK intercepted the top-secret communications of the then Russian president, Dmitry Medvedev, during his visit to Britain for the G20 summit in London, leaked documents reveal.
The details of the intercept were set out in a briefing prepared by the National Security Agency (NSA), America’s biggest surveillance and eavesdropping organisation, and shared with high-ranking officials from Britain, Australia, Canada and New Zealand.
The document, leaked by the NSA whistleblower Edward Snowden and seen by the Guardian, shows the agency believed it might have discovered “a change in the way Russian leadership signals have been normally transmitted”.
The disclosure underlines the importance of the US spy hub at RAF Menwith Hill in Harrogate, North Yorkshire, where hundreds of NSA analysts are based, working alongside liaison officers from GCHQ.
The document was drafted in August 2009, four months after the visit by Medvedev, who joined other world leaders in London, including the US president, Barack Obama, for the event hosted by the British prime minister, Gordon Brown.
Medvedev arrived in London on Wednesday 1 April and the NSA intercepted communications from his delegation the same day, according to the NSA paper, entitled: “Russian Leadership Communications in support of President Dmitry Medvedev at the G20 summit in London – Intercept at Menwith Hill station.”
The document starts with two pictures of Medvedev smiling for the world’s media alongside Brown and Obama in bilateral discussions before the main summit.
RAF Menwith Hill in North Yorkshire. Photograph: Nigel Roddis/Reuters
The report says: “This is an analysis of signal activity in support of President Dmitry Medvedev’s visit to London. The report details a change in the way Russian leadership signals have been normally transmitted. The signal activity was found to be emanating from the Russian embassy in London and the communications are believed to be in support of the Russian president.”
The NSA interception of the Russian leadership at G20 came hours after Obama and Medvedev had met for the first time. Relations between the two leaders had been smoothed in the runup to the summit with a series of phone calls and letters, with both men wanting to establish a trusting relationship to discuss the ongoing banking crisis and nuclear disarmament.
In the aftermath of their discussions on 1 April, the two men issued a joint communique saying they intended to “move further along the path of reducing and limiting strategic offensive arms in accordance with the treaty on the non-proliferation of nuclear weapons”.
A White House official who briefed journalists described the meeting as “a very successful first meeting focused on real issues”. The official said it had been important for the men to be open about the issues on which they agreed and disagreed. Obama had stressed the need to be candid, the official noted.
While it has been widely known the two countries spy on each other, it is rare for either to be caught in the act; the latest disclosures will also be deeply embarrassing for the White House as Obama prepares to meet Vladimir Putin, who succeeded Medvedev as president, in the margins of the G8 summit this week.
The two countries have long complained about the extent of each other’s espionage activities, and tit-for-tat expulsions of diplomats are common. A year after Obama met Medvedev, the US claimed it had broken a highly sophisticated spy ring that carried out “deep cover” assignments in the US.
Ten alleged Russian spies living in America were arrested.
Putin was withering of the FBI-led operation: “I see that your police have let themselves go and put some people in jail, but I guess that is their job. I hope the positive trend that we have seen develop in our bilateral relations recently will not be harmed by these events.” Last month, the Russians arrested an American in Moscow who they alleged was a CIA agent.
The new revelations underline the significance of RAF Menwith Hill and raise questions about its relationship to the British intelligence agencies, and who is responsible for overseeing it. The 560-acre site was leased to the Americans in 1954 and the NSA has had a large presence there since 1966.
It has often been described as the biggest surveillance and interception facility in the world, and has 33 distinct white “radomes” that house satellite dishes. A US base in all but name, it has British intelligence analysts seconded to work alongside NSA colleagues, though it is unclear how the two agencies obtain and share intelligence – and under whose legal authority they are working under.
Ewen MacAskill, Nick Davies, Nick Hopkins, Julian Borger and James Ball
The Guardian, Monday 17 June 2013
Find this story at 17 June 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
GCHQ intercepted foreign politicians’ communications at G20 summitsJuly 1, 2013
Exclusive: phones were monitored and fake internet cafes set up to gather information from allies in London in 2009
Documents uncovered by the NSA whistleblower, Edward Snowden, reveal surveillance of G20 delegates’ emails and BlackBerrys. Photograph: Guardian
Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts, according to documents seen by the Guardian. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic.
The revelation comes as Britain prepares to host another summit on Monday – for the G8 nations, all of whom attended the 2009 meetings which were the object of the systematic spying. It is likely to lead to some tension among visiting delegates who will want the prime minister to explain whether they were targets in 2009 and whether the exercise is to be repeated this week.
The disclosure raises new questions about the boundaries of surveillance by GCHQ and its American sister organisation, the National Security Agency, whose access to phone records and internet data has been defended as necessary in the fight against terrorism and serious crime. The G20 spying appears to have been organised for the more mundane purpose of securing an advantage in meetings. Named targets include long-standing allies such as South Africa and Turkey.
There have often been rumours of this kind of espionage at international conferences, but it is highly unusual for hard evidence to confirm it and spell out the detail. The evidence is contained in documents – classified as top secret – which were uncovered by the NSA whistleblower Edward Snowden and seen by the Guardian. They reveal that during G20 meetings in April and September 2009 GCHQ used what one document calls “ground-breaking intelligence capabilities” to intercept the communications of visiting delegations.
This included:
• Setting up internet cafes where they used an email interception programme and key-logging software to spy on delegates’ use of computers;
• Penetrating the security on delegates’ BlackBerrys to monitor their email messages and phone calls;
• Supplying 45 analysts with a live round-the-clock summary of who was phoning who at the summit;
• Targeting the Turkish finance minister and possibly 15 others in his party;
• Receiving reports from an NSA attempt to eavesdrop on the Russian leader, Dmitry Medvedev, as his phone calls passed through satellite links to Moscow.
The documents suggest that the operation was sanctioned in principle at a senior level in the government of the then prime minister, Gordon Brown, and that intelligence, including briefings for visiting delegates, was passed to British ministers.
A briefing paper dated 20 January 2009 records advice given by GCHQ officials to their director, Sir Iain Lobban, who was planning to meet the then foreign secretary, David Miliband. The officials summarised Brown’s aims for the meeting of G20 heads of state due to begin on 2 April, which was attempting to deal with the economic aftermath of the 2008 banking crisis. The briefing paper added: “The GCHQ intent is to ensure that intelligence relevant to HMG’s desired outcomes for its presidency of the G20 reaches customers at the right time and in a form which allows them to make full use of it.” Two documents explicitly refer to the intelligence product being passed to “ministers”.
One of the GCHQ documents. Photograph: Guardian
According to the material seen by the Guardian, GCHQ generated this product by attacking both the computers and the telephones of delegates.
One document refers to a tactic which was “used a lot in recent UK conference, eg G20”. The tactic, which is identified by an internal codeword which the Guardian is not revealing, is defined in an internal glossary as “active collection against an email account that acquires mail messages without removing them from the remote server”. A PowerPoint slide explains that this means “reading people’s email before/as they do”.
The same document also refers to GCHQ, MI6 and others setting up internet cafes which “were able to extract key logging info, providing creds for delegates, meaning we have sustained intelligence options against them even after conference has finished”. This appears to be a reference to acquiring delegates’ online login details.
Another document summarises a sustained campaign to penetrate South African computers, recording that they gained access to the network of their foreign ministry, “investigated phone lines used by High Commission in London” and “retrieved documents including briefings for South African delegates to G20 and G8 meetings”. (South Africa is a member of the G20 group and has observer status at G8 meetings.)
Another excerpt from the GCHQ documents. Photograph: Guardian
A detailed report records the efforts of the NSA’s intercept specialists at Menwith Hill in North Yorkshire to target and decode encrypted phone calls from London to Moscow which were made by the Russian president, Dmitry Medvedev, and other Russian delegates.
Other documents record apparently successful efforts to penetrate the security of BlackBerry smartphones: “New converged events capabilities against BlackBerry provided advance copies of G20 briefings to ministers … Diplomatic targets from all nations have an MO of using smartphones. Exploited this use at the G20 meetings last year.”
The operation appears to have run for at least six months. One document records that in March 2009 – the month before the heads of state meeting – GCHQ was working on an official requirement to “deliver a live dynamically updating graph of telephony call records for target G20 delegates … and continuing until G20 (2 April).”
Another document records that when G20 finance ministers met in London in September, GCHQ again took advantage of the occasion to spy on delegates, identifying the Turkish finance minister, Mehmet Simsek, as a target and listing 15 other junior ministers and officials in his delegation as “possible targets”. As with the other G20 spying, there is no suggestion that Simsek and his party were involved in any kind of criminal offence. The document explicitly records a political objective – “to establish Turkey’s position on agreements from the April London summit” and their “willingness (or not) to co-operate with the rest of the G20 nations”.
The September meeting of finance ministers was also the subject of a new technique to provide a live report on any telephone call made by delegates and to display all of the activity on a graphic which was projected on to the 15-sq-metre video wall of GCHQ’s operations centre as well as on to the screens of 45 specialist analysts who were monitoring the delegates.
“For the first time, analysts had a live picture of who was talking to who that updated constantly and automatically,” according to an internal review.
A second review implies that the analysts’ findings were being relayed rapidly to British representatives in the G20 meetings, a negotiating advantage of which their allies and opposite numbers may not have been aware: “In a live situation such as this, intelligence received may be used to influence events on the ground taking place just minutes or hours later. This means that it is not sufficient to mine call records afterwards – real-time tip-off is essential.”
In the week after the September meeting, a group of analysts sent an internal message to the GCHQ section which had organised this live monitoring: “Thank you very much for getting the application ready for the G20 finance meeting last weekend … The call records activity pilot was very successful and was well received as a current indicator of delegate activity …
“It proved useful to note which nation delegation was active during the moments before, during and after the summit. All in all, a very successful weekend with the delegation telephony plot.”
Ewen MacAskill, Nick Davies, Nick Hopkins, Julian Borger and James Ball
The Guardian, Monday 17 June 2013
Find this story at 17 June 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
G20 summit: Britain plunged into diplomatic row over claims GCHQ spied on foreign politiciansJuly 1, 2013
Intelligence services were even said to have set up internet cafés at the summit venues which they used to read emails
Britain was plunged into a diplomatic row last night following claims that foreign politicians and diplomats were repeatedly spied upon when they attended two G20 summit meetings in London.
The allegations provoked anger in Turkey, Russia and South Africa, whose dignitaries were reportedly targeted by the covert surveillance operations in 2009 while Gordon Brown was Prime Minister.
The intelligence services were even said to have set up internet cafés at the summit venues which they used to read emails sent by visiting officials.
David Cameron refused yesterday to comment on the allegations, which proved an embarrassing distraction for him as the leaders of G8 nations gathered for a two-day meeting at Lough Erne, Northern Ireland.
However, one British source said he was not surprised by the claims and said it was always assumed other delegations tried to listen in to other countries’ private discussions at international summits.
Turkey, up to 15 of whose officials could have been snooped on in London, spelt out its fury and contacted the UK’s ambassador to Ankara to demand an explanation. It described the report in the Guardian as “very worrying”, particularly as Turkey and Britain are both members of Nato.
“We want an official and satisfactory explanation,” said a spokesman for the Turkish foreign ministry. “If these allegations are true, this is going to be scandalous for the UK.
“At a time when international co-operation depends on mutual trust, respect and transparency, such behaviour by an allied country is unacceptable.”
Clayson Monyela, a spokesman for South Africa’s foreign ministry said in his twitter feed that the matter was “extremely disturbing” and was “receiving attention”.
He said Britain and South Africa had cordial relations and called on London to investigate the claims “with a view to take strong & visible action”.
Alexei Pushkov, the chief of foreign affairs committee in the lower house of Russian parliament, tweeted: “It’s a scandal! The U.S. and British special services tapped (then President Dmitry) Medvedev’s phone at the 2009 G-20 summit. The US denies it, but we can’t trust them.”
Sergei Devyatov, a spokesman for the Federal Protection Service, which provides security for Russian government officials, said in a statement: “The Federal Protective Service is taking every necessary measure to provide the appropriate level of confidentiality of information for top-ranking officials of the country.”
According to yesterday’s report, secret documents show that delegates to the two summits had their computers monitored and phones intercepted on the Government’s orders.
The Guardian said the leaked papers suggested the operation was sanctioned at a senior level in Mr Brown’s government. One briefing paper said the head of GCHQ was about to meet David Miliband, who was the Foreign Secretary at the time.
One former Brown aide told the Independent yesterday: “We always assumed that everyone else did it at such meetings. We were advised not to plug in our laptops, use photocopiers, wi-fi or our usual Blackberrys – we would be given a different one for the duration of a summit.
“Traditionally the French were always at it. Others joined in so as not to be at a disadvantage. It was about knowing the thinking in the other delegations. But usually it didn’t yield much that was very surprising. It was regarded as fair game because every government did the same. I don’t know if it ever extended from governments to civil society or the media, that would be different and much more sinister.”
Tackled about the reports, Mr Cameron said today: “We never comment on security or intelligence issues and I am not about to start now. I don’t make comments on security or intelligence issues – that would be breaking something that no government has previously done.”
David Miliband could not be contacted last night.
Nigel Morris, Andrew Grice
Tuesday, 18 June 2013
Find this story at 18 June 2013
© independent.co.uk
UK intelligence agencies planned to spy on Commonwealth summit delegatesJuly 1, 2013
Top-secret document, prepared by GCHQ, contained proposals to target Commonwealth allies at heads of government summit
The Queen and Commonwealth leaders at the heads of government summit in Trinidad. Photograph: Luis Acosta/AFP/Getty Images
UK intelligence agencies planned to spy on delegates to the Commonwealth heads of government meeting in 2009, including being asked to obtain information to give UK ministers an advantage in talks with their Commonwealth counterparts, according to a top-secret document seen by the Guardian.
The meeting, which takes place every two years, was held in Trinidad in 2009. The UK delegation was headed by the Queen, with Prince Philip also in attendance, along with Gordon Brown, the then prime minister, David Miliband, then foreign secretary, and Douglas Alexander, then international development secretary.
A page from an internal top-secret intranet of GCHQ, shared with the NSA, discovered by the 29-year-old whistleblower Edward Snowden and seen by the Guardian, shows a list of “key intelligence requirements” set out for the summit.
Alongside notes to check for threats against the security of the UK delegation during the visit, the document lists “Intelligence to inform UK senior’s [sic] Bi-lats”, “Initelligence [sic] on South Africa’s views on Zimbabwe prior to Brown/Zuma meeting” and “climate change reporting”.
The revelation that UK intelligence agencies made plans to target ministers and officials from Commonwealth countries, as well as the targeting of G20 officials disclosed elsewhere, is likely to raise tensions among the Commonwealth nations, who may seek clarity over whether their officials were bugged, and if so to what extent.
The note, which was prepared in advance of the meeting, also sets out a schedule for different UK agencies to set up their activities in Trinidad. MI6 were tasked to set up several days before the event, with GCHQ’s operation beginning with the arrival of delegates. The Guardian is not publishing the original document as it contains logistical details and some limited references to personnel.
The 2009 Commonwealth meeting, which was also attended by Nicolas Sarkozy, then president of France, appears to have been the first time MI6 – formally known as SIS, or the Secret Intelligence Service – had been asked to gather intelligence from a Commonwealth heads of government gathering.
“SIS have no past history of targeting this meeting,” the document notes in an explanation of why operations might be limited in their scope.
As it was prepared in advance of the Commonwealth meeting, the memo does not confirm to what extent surveillance was carried out, or even whether planned operations actually took place.
However, it does stress to agency staff that “we will be measured on our ability to deliver”.
The memo also shows that the agencies were preparing to brief senior ministers, and the prime minister, during the conference.
The memo noted that Lady Kinnock was available for briefings from 25 to 29 November, David Miliband could be briefed from 26 to 29 November, and Gordon Brown on 29 November only.
There is no indication as to whether the briefings actually took place, or whether the ministers were aware of the security services’ plans for the summit.
Ewen MacAskill, Nick Davies, Nick Hopkins, Julian Borger and James Ball
The Guardian, Sunday 16 June 2013 20.47 BST
Find this story at 16 June 2013
© 2013 Guardian News and Media Limited or its affiliated companies. All rights reserved.
Warning of a ‘private army’ running Britain after government increases spending on security firm G4S by £65millionJuly 1, 2013
Controversial firm saw income from UK taxpayer rise by 20% last year
Company earned £394million in 2012-13, up from £328.5million
Labour MP Barry Sheerman warns of over-reliance on private contractors
Controversial security firm G4S has enjoyed a 20 per cent surge in government contracts despite a string of blunders, new figures show.
The company – which failed to recruit enough guards for the London Olympics – earned £394million from the taxpayer in 2012-13, up from £328.5million a year earlier.
The revelation sparked claims it was becoming the ‘private army’ of the state.
Security: The controversial firm G4S has seen a 20 per cent increase in its income from the UK government, raising fears of an over-reliance on a ‘private army’
With just weeks before the London Olympics opened in July last year, G4S admitted it would not be able to provide the thousands of guards it had promised.
Its reputation was severely damaged when 3,500 troops were called in to provide security at the biggest events.
In the wake of the debacle MPs called on the government to think again before awarding more lucrative contracts to the firm.
But it seems to have done little to dent its reputation in Whitehall, and next week it will provide security guarding the world’s most powerful men and women at the G8 summit at Lough Erne.
More…
Tories launch web assault on Labour and Lib Dems to put pressure on MPs to ‘Let Britain Decide’ on Europe
Number of over-65s still in work doubles in two decades to top 1million for the first time
Public-private pay gap widens even further: Average private sector earnings have ‘fallen faster’ than state employees during the recession
Labour MP Barry Sheerman, who obtained the figures on government spending with G4S, said he was worried about an increasing over-reliance on a small number of companies.
He warned: ‘The trouble is a lot of contractors are in a monopoly. They do seem to be swelling up and getting bigger and bigger and we are getting to the stage where the over-reliance on one company troubles you.
‘I am becoming increasingly worried about the monopoly position that G4S have in security services.
‘They are becoming the private army of Her Majesty’s Government. There is something going on that I think we need to shine a spotlight on.’
Blunder: The army had to be called in for the London Olympics after G4S failed to recruit enough guards last summer
Nick Buckles, who last month quit as G4S chief executive, admitted the Olympic security contract had been a ‘humiliating shambles’ for the company but Labour MP Barry Sheerman (right), who obtained the figures, warned of a few firms having a monopoly on state contracts
Most of the hike in Government spending on G4S contracts was down to an extra £51 million spent by the Ministry of Justice on contracts with the company.
A spokesman for the department said the increase was down to G4S being given contracts to run prisons at Birmingham and Oakwood, as well as managing the facilities of a large part of Her Majesty’s Courts and Tribunal Service.
The Department for Work and Pensions more than doubled its spend on G4S contracts – up from nearly £13.8 million to more than £32.1 million.
G4S: A HISTORY OF BLUNDERS
The UK-based security firm traces its roots back to a guarding company founded in Denmark in 1901.
G4S was formed when Group 4 merged with Securicor in 2004. The company has a long record of blunders including:
In 1993 Group 4 became the first private company to run prisoner escort services,m and lost seven inmates in three weeks
A year later a hunger striker escaped from Campsfield House detention centre, guarded by Group 4
In 1997 it emerged the firm had transferred a prisoner between two vans on a petrol station forecourt
Three prisoners escaped from Peterborough Crown Court in 2001
In 2011, G4S staff lost a set of cell keys just days after taking over Birmingham Prison Workers put an electronic tag on criminal Christopher Lowcock’s artificial limb
In 2012 the firm failed to train enough guards for the London Games which meant 3,500 soldiers had to be recalled from leave
In March this year a G4S guard at Heathrow ordered Royal Navy engineer Nicky Howse to change out of her uniform before flying to the US because it was ‘offensive’
A contract awarded to G4S for the Government’s Work Programme accounted for the increase, Employment Minister Mark Hoban said in his answer to Mr Sheerman’s question.
The figures do not include spending by the Department for Communities and Local Government which has not yet answered the MP’s question.
Mr Sheerman said it was ‘amazing’ that so much was being spent on G4S when it was failing to pay Olympic subcontractors that were ‘not complicit in the debacle’ of the company’s handling of security at London 2012.
‘I thought it was amazing that such an amount is being spent on one major contractor, also at a time when we still know that G4S have failed to pay subcontractors who have worked for them on the Olympic site,’ Mr Sheerman said.
He said some small and medium-sized businesses who worked on the Olympic site were made to subcontract to G4S by Locog, but now have not been paid.
‘I don’t know why they haven’t paid them, it is just bad principles,’ he said.
‘They were told at one stage in the development they were running the logistics and security of the athlete’s village.
‘Once that was finished they became subcontractors and told to be subcontractors to G4S.
‘One would have thought Locog would have leaned on G4S to do the honourable thing to the subcontractors.
‘They were not complicit in the debacle that occurred when the army came in.’
Kim Challis, G4S CEO of government and outsourcing solutions, said: ‘We have been working with the UK government for more than two decades, delivering the highest levels of service and under a high degree of monitoring and oversight.
‘We have won every contract we have been awarded by bidding in a highly competitive environment, based on delivering an effective service for the best deal for the taxpayer, with a number of providers challenging for the work.
‘We have a strong track record of delivering for our UK Government customers and are proud of the service our 11,000 employees provide to them, and the general public, every single day.’
Former G4S company boss Nick Buckles, who admitted the London 2012 contract had been a ‘humiliating shambles, last month quit his £1.2million-a-year role as chief executive.
He clung on to his job in the immediate aftermath of the Olympics debacle but the firm’s reputation suffered badly and in recent weeks poor trading caused shares to slump by more than 13 per cent in one day.
This month, G4S’s AGM was interrupted by protesters making reference to Jimmy Mubenga – an Angolan man who died while being deported from the UK by G4S guards.
In July last year, prosecutors said they would be taking no action against the three G4S staff over the death.
By Matt Chorley, Mailonline Political Editor
PUBLISHED: 12:36 GMT, 12 June 2013 | UPDATED: 08:42 GMT, 13 June 2013
Find this story at 13 June 2013
© Associated Newspapers Ltd
Microsoft founder Bill Gates buys into G4SJuly 1, 2013
Microsoft founder Bill Gates has given a vote of confidence to embattled British security firm G4S, despite a recent profit warning and ongoing controversy over the company’s Israeli prison contracts and the death of an Angolan man.
The US tech titan’s private investment vehicle, Cascade Investment, and his high-profile charitable fund, the Bill & Melinda Gates Foundation, poured an extra £16m into G4S stock on Thursday, to increase their joint stake in the security giant to 3.2pc. The total holding is now worth around £110m.
Mr Gates’ endorsement will come as welcome relief following a year blighted by the company’s failure to supply enough security staff for the London Olympics. The fiasco eventually claimed the scalp of chief executive Nick Buckles, but only after a difficult first quarter in Europe prompted the company to issue a profits warning in May.
Last week, board members endured a stormy annual meeting, at which they faced repeated questions over three Israeli prison contracts in occupied Palestine and the death of Angolan deportee Jimmy Mubenga in 2010. Despite protests, G4S’ new chief executive Mr Almanza insisted at the fraught meeting that an independent study concluded that the company had not breached any aspect of “international humanitarian law”.
But this would not be the first time the $36.4bn Bill & Melinda Gates Foundation, the largest of its kind, has invested in a company that has faced fierce public criticism. The charitable trust holds stakes in BP and Exxon Mobil, which have both come under fire over catastrophic oil spills.
Mr Gates also has a history of investing in British companies, including Carpetright, Diageo and JJB Sports.
“The best guess would be that given the changes that have taken place at G4S over the past year, it’s probably an opportunity for G4S to set out a clear path,” said Steve Woolf, support services analyst at Numis.
“The underlying business is still very good. The share price has been quite beleaguered over the past 12 months. Now there is a chance to begin again and reinforce the core strategy.”
The Bill & Melinda Gates Foundation was established by Mr Gates and his wife in 2000 with the goal of eradicating poverty and combating the world’s deadliest diseases.
By Denise Roland
4:29PM BST 10 Jun 2013
Find this story at 10 June 2013
© Copyright of Telegraph Media Group Limited 2013
Woolwich suspect’s brother ‘harassed and threatened by MI6 and MI5’July 1, 2013
The brother of one of the men charged with the murder of Drummer Lee Rigby in Woolwich has claimed he was “harassed and threatened” by the British security services.
Michael Adebolajo’s younger brother, Jeremiah, 26, said he met MI6 intelligence officers numerous times while he was working in Saudia Arabia and was quizzed by MI5 early last year on a trip home to London.
He described a series of meetings, at the British Embassy in Riyadh, at airports and at other locations which he says he felt compelled to attend. At one stage, he claims he was stopped from flying on holiday so he could attend a meeting.
Mr Adebolajo, who cannot discuss his brother’s case for legal reasons, says he was first approached by MI6 early in 2011 when he was teaching English at the University of Ha’il in Nejd.
The approach from the British Embassy asking him to attend a meeting to discuss “life in Saudi Arabia” came a few weeks after his brother had been arrested in Kenya near the Somali border and deported to Britain.
During the meetings he was questioned about his brother-in-law James Thompson and asked about two other men who he was told had travelled to Yemen in advance of a terror attack on the UK.
Mr Adebolajo told The Times: “They were never openly aggressive, but they were always implicitly threatening. There was never the understanding that if I wanted I could stand up and say, that’s enough. There was always the understanding that that I have to co-operate or I would lose my job and I don’t know what else.”
He said the officers, who admitted they were from the security services, were particularly interested in the two men who had travelled to Yemen but denied their claims that he had been in contact with them.
“They were always looking for my knowledge and dealings with the two main indivuals they had shown me. They asked me biographical stuff, what mosques did I go to, do I pray, that sort of thing. Like they were trying to build a profile of me.”
When Drummer Rigby was killed on May 22 in Woolwich, Mr Adebolajo says he recognised his brother from a video posted online. He contacted his parents and said: “My Dad was so upset, distraught.”
Michael Adebolajo will next appear in court alongside co-defendant Michael Adebowale, 22, of Greenwich, south-east London, for a preliminary hearing on June 28.
Justin Davenport, Crime Editor
20 June 2013
Find this story at 20 June 2013
© Evening Standard Limited
Woolwich murder, the MI6 connection: Younger brother of Michael Adebolajo ‘was paid thousands to spy in Middle East’July 1, 2013
The younger brother of one of the men accused of murdering Drummer Lee Rigby was paid thousands of pounds by MI6 as part of spying operations in the Middle East, The Mail on Sunday has discovered.
Jeremiah Adebolajo, who uses the name Abul Jaleel, was also asked to help ‘turn’ his brother, Michael, to work for MI5, who were already aware of Michael’s close links to extremist groups.
The claims are made by the Adebolajo family and a well-placed source who contacted The Mail on Sunday.
Jeremiah Adebolajo, 26, who works as an English teacher at a university in Saudi Arabia and returned to Britain this week, is to be questioned about his brother by Scotland Yard counter-terrorism detectives today.
Government sources have already confirmed that Michael Adebolajo was known to MI5. Last week it was alleged that he rebuffed efforts by the security service to recruit him as a spy.
Michael, 28, was discharged from hospital on Friday and was yesterday charged with the murder of Drummer Rigby and attempted murder of two police officers on May 22 in Woolwich, South London.
Now it has emerged that MI5’s sister agency, MI6, had targeted Jeremiah, a married teacher based at the University of Ha’il.
MI5 and MI6 work closely together on counter-terrorism operations. MI5 focuses on home security, while MI6 targets threats from overseas.
A document seen by The Mail on Sunday details concerns raised by Jeremiah’s family about MI6’s alleged harassment in April last year.
In it, Jeremiah’s sister, Blessing Adebolajo, 32, who works as a human resources assistant in London, says her brother was approached by MI6 while he was working at the University of Ha’il – an important strategic location in the Middle East because it takes only one hour by plane to reach 11 Arab capitals.
Jeremiah Adeboljao was working at the University of Ha’il in Saudi Arabia when he was approached by MI6
Complaint: A redacted copy of the allegations made by the Adebolajo family
A friend of Jeremiah has confirmed her account.
The friend said: ‘They asked him about Michael and asked him to help “turn” him to work for MI5.
‘They also told him to go to certain hotels, order a cup of tea and wait for his contact.
‘On these occasions he was handed £300, and was paid to fly first-class and stay in five-star hotels.’
The document, prepared by case workers with the charity Cageprisoners, says Blessing approached the East London charity for help because she was worried about the harassment and intimidation of both her brothers by the security and intelligence services.
She says MI6 bought a ticket so Jeremiah could fly to an Intercontinental hotel in another Middle East country (believed to be the United Arab Emirates) and that he was given local currency worth more than £1,000.
She also alleges Jeremiah told her that he was interrogated about specific people and was shown pictures of himself with named individuals taken in the UK. But Blessing told Cageprisoners that Jeremiah had ‘strongly’ rejected MI6’s offer to work as one of their agents.
Blessing Adebolajo says her brother Jeremiah was approached by MI6 and asked to become an informant
As a result of this rejection, his sister says he was ‘intimidated’ until he was finally told that he would be stopped from leaving the UK.
The friend said that two years ago Jeremiah was approached by UK security officers when he was held at Heathrow on his way back from Saudi Arabia.
During the interview, he was warned about what happens to Muslims who don’t help the Government and was shown documents that confirmed people he knew were being held in prisons throughout the world.
Police and security services are under huge pressure to explain what they know about Adebolajo and his alleged accomplice, Michael Adebowale. Despite warnings stretching back ten years, Michael Adebolajo is said to have been considered ‘low risk’ by MI5. He was photographed at high-profile protests – even standing next to hate preacher Anjem Choudary.
He was arrested in Kenyan 2010 over his alleged plans to travel to Somalia to join terror group Al-Shabaab before being returned to the UK. Jeremiah married Charlotte Patricia Taylor in 2008 at Sutton Register Office in Surrey.
Shortly afterwards the couple are believed to have left for Saudi Arabia where Jeremiah found work teaching. The University of Ha’il is one of Saudi Arabia’s most progressive education establishments and was established by Royal Decree in 2005. It consists of five colleges – Sciences, Medicine and Medical Sciences, Engineering, Computer Science and Engineering, and a Community College – and has more than 16,000 students.
By Robert Verkaik
PUBLISHED: 21:02 GMT, 1 June 2013 | UPDATED: 21:03 GMT, 1 June 2013
Find this story at 1 June 2013
© Associated Newspapers Ltd
UK pays price for MI5 courting terrorJuly 1, 2013
The brutal murder of an off-duty British soldier in broad daylight in the southeast London district of Woolwich raises new questions about the British government’s national security strategy, at home and abroad. Officials have highlighted the danger of “self-radicalizing” cells inspired by Internet extremism, but this ignores overwhelming evidence that major UK terror plots have been incubated by the banned al-Qaeda-linked group formerly known as Al Muhajiroun.
Equally, it is no surprise that the attackers had been seen earlier on the radar of MI5, the UK’s domestic counter-intelligence and security agency. While Al Muhajiroun’s emir, Syrian cleric Omar
Bakri Mohammed – currently self-exiled to Tripoli in northern Lebanon – has previously claimed “public immunity” due to murky connections with British intelligence, compelling evidence suggests such connections might still be operational in the context of foreign policy imperatives linked to oil and gas interests.
Security services and the Woolwich suspect
Despite being proscribed, Al Muhajiroun has continued to function with impunity in new incarnations, most recently under the banner of Izhar Ud-Deen-il-Haq – run under the tutelage of Bakri’s London-based deputy, British-born Anjem Choudary.
Almost every major terrorist attack and plot in the UK has in some way been linked to Choudary’s extremist network. The Woolwich attack was no exception. Anjem Choudary himself admitted to knowing one of the attackers, Michael “Mujahid” Adebolajo, as someone who “attended our meetings and my lectures”.
Adebolajo was a regular at Al Muhajiroun’s Woolwich High Street dawah (propagation) stall, was “tutored” by Omar Bakri himself, and had attended the group’s meetings between 2005 and 2011.
According to intelligence sources, both attackers were known to MI5 and MI6, which is concerned with foreign intelligene, and had appeared on “intelligence watch lists”, and Adebolajo had “featured in several counter-terrorist investigations” as a “peripheral figure” for the “last eight years” – suggesting his terrorist activities began precisely when he joined Al Muhajiroun.
In particular, credible reports suggest he was high on MI5’s priority for the past three years, with family and friends confirming that he was repeatedly harassed by the agency to become an informant – as late as six months ago.
In this context, the touted “lone wolf” hypothesis is baseless. For instance, while the recently convicted “Birmingham 11”, sentenced last month for their role in a bombing plot in the UK, had access to al-Qaeda’s Inspire magazine and Anwar al-Awlaki’s video speeches, they had also attended al-Qaeda terrorist training camps in Pakistan. This could only happen through an established UK-based Islamist network with foreign connections.
Al Muhajiroun is the only organization that fits the profile. One in five terrorist convictions in the UK for more than a decade were for people who were either members of or had links to Al Muhajiroun. Last year, four Al Muhajiroun members were convicted at Woolwich Crown Court of planning to bomb the London Stock Exchange.
Inspired by Awlaki’s teachings, the plotters had also been taught by Choudary’s longtime Al Muhajiroun colleague, ex-terror convict Abu Izzadeen. But this is just the tip of the iceberg.
MI6’s terror Network
In 1996, Omar Bakri founded Al Muhajiroun with Anjem Choudary. According to John Loftus, a former US Army Intelligence Officer and Justice Department prosecutor, three senior Al Muhajiroun figures at the time – Bakri, Abu Hamza, and Haroon Rashid Aswat – had been recruited by MI6 that year to facilitate Islamist activities in the Balkans.
The objective was geopolitical expansion – destabilizing former Soviet republics, sidelining Russia and paving the way for the Trans-Balkan oil pipeline protected by incoming North Atlantic Treaty Organization “peacekeeping” bases.
“This is about America’s energy security”, said then US energy secretary Bill Richardson: “It’s also about preventing strategic inroads by those who don’t share our values. We’re trying to move these newly independent countries toward the West. We would like to see them reliant on Western commercial and political interests rather than going another way. We’ve made a substantial political investment in the Caspian, and it’s very important to us that both the pipeline map and the politics come out right.”
On February 10, 1998, Bakri and Choudary issued and signed a “fatwa” – a religious ruling – titled “Muslims in Britain Declare War Against the US and British governments”, which warned that the governments of “non-Muslim countries” must “stay away from Iraq, Palestine, Pakistan, Arabia, etc or face a full scale war of jihad which will be the responsibility of every Muslim around the world to participate in” – “including the Muslims in the USA and in Britain” who should “confront by all means whether verbally, financially, politically or militarily the US and British aggression”.
The same year, Bakri was one of a select few to receive a fax from Osama bin Laden in Afghanistan outlining four objectives for a jihad against the US, including hijacking civilian planes.
Public Immunity
In 2000, Bakri admitted to training British Muslims to fight as jihadists in Palestine, Kashmir, Chechnya or South Lebanon. Recruits were “learning firearms and explosives use, surveillance and other skills” and “would be expected to join a jihad being waged in one country or another”. That year, he boasted: “The British government knows who we are. MI5 has interrogated us many times. I think now we have something called public immunity. There is nothing left. You can label us … put us behind bars, but it’s not going to work.”
Labour Party MP Andrew Dismore told parliament the following year about a month after 9/11 that Bakri’s private security firm, Sakina Security Services, “sends people overseas for jihad training with live arms and ammunition”, including training camps “in Pakistan and Afghanistan”, and even at “many different sites in the United Kingdom”.
Hundreds of Britons were being funneled through such training only to return to the UK advocating that Whitehall and Downing Street be attacked as “legitimate targets”. Though Sakina was raided by police and shut down, Bakri and Hamza were not even arrested, let alone charged or prosecuted.
It later emerged that the US’ Federal Bureau of Investigation had flagged up the unusual presence of Al Muhajiroun activists at Arizona flight schools in the US in the summer preceding 9/11, many of whom had terrorist connections, including one described as a close bin Laden associate.
The London bombings
In 2003, two Al Muhajiroun members carried out a suicide bombing in Tel Aviv, Israel. That year, authorities began tracking an al-Qaeda ringleader in Britain, Mohammed Quayyum Khan. By 2004, the surveillance operation uncovered a plot to plant fertilizer bombs around the UK, prepared by a cell of 18 people, most of whom were Al Muhajiroun members who had studied under Bakri and Choudary. Quayyum Khan, like the latter, remains free.
The 7/7 bombers, also Al Muhajiroun members, were connected to both terror plots – Mohamed Sidique Khan had been friends with the Tel Aviv bombers, and had even travelled to Israel weeks before their suicide attack. Khan went on to learn to make explosives in a terrorist training camp set up by Al Muhajiroun’s British and American members in northern Pakistan.
A year before 7/7, Bakri warned of a “well-organized group” linked to al-Qaeda “on the verge of launching a big operation” against London. Then just months before the 7/7 bombings, The Times picked up Bakri telling his followers in Internet lectures: “I believe the whole of Britain has become Dar al-Harb [land of war]. The kuffar [non-believer] has no sanctity for their own life or property.” Muslims are “obliged” to “join the jihad… wherever you are”, and suicide bombings are permitted because “Al-Qaeda… have the emir”.
Entrapment gone crazy
The strange reluctance to prosecute Al Muhajiroun activists despite their support for al-Qaeda terrorism seems inexplicable. But has Britain’s support for al-Qaeda affiliated extremists abroad granted their Islamist allies at home “public immunity”?
In early 2005, shortly before the July 7 London bombings, the Wall Street Journal’s Pulitzer Prize winning journalist Ron Suskind interviewed Bakri after he was told by an MI5 official that the cleric “had helped MI5 on several of its investigations”.
Suskind recounts in his book, The Way of the World, that when asked why, Bakri told him: “Because I like it here. My family’s here. I like the health benefits.” Bakri reiterated this in an interview in early 2007 after his move to Tripoli, Lebanon, claiming, “We were able to control the Muslim youth… The radical preacher that allows a venting of a point of view is preventing violence.”
Suskind observed: “Bakri enjoyed his notoriety and was willing to pay for it with information he passed to the police… It’s a fabric of subtle interlocking needs: the [British authorities] need be in a backchannel conversation with someone working the steam valve of Muslim anger; Bakri needs health insurance”.
Why would MI5 and MI6 retain the services of someone as dangerous as Bakri given the overwhelming evidence of his centrality to the path to violent radicalization? On the one hand, it would seem that, through Al Muhajiroun, MI5 is spawning many of the plots it lays claim to successfully foiling – as the FBI is also doing.
On the other, the strategy aligns conveniently with narrow geopolitical interests rooted in Britain’s unflinching subservience to wider US strategy in the Muslim world.
The not-so-new great game
Little has changed since the Great Game in the Balkans. According to Alastair Crooke, a former MI6 officer and Middle East adviser to EU foreign policy chief Javier Solana, the Saudis are mobilizing Islamist extremists to service mutual US-Saudi interests: “US officials speculated as to what might be done to block this vital corridor [from Iran to Syria], but it was Prince Bandar of Saudi Arabia who surprised them by saying that the solution was to harness Islamic forces. The Americans were intrigued, but could not deal with such people. Leave that to me, Bandar retorted.”
This region-wide strategy involves sponsorship of Salafi jihadists in Syria, Libya, Egypt, Lebanon, Yemen, and Iraq. Praising Obama’s appropriation of this policy, John Hannah – former national security advisor to vice president Dick Cheney – rejoiced that the idea was to “weaken the Iranian mullahs; undermine the Assad regime; support a successful transition in Egypt; facilitate Gaddafi’s departure; reintegrate Iraq into the Arab fold; and encourage a negotiated solution in Yemen.”
The strategy’s endgame? Petro-politics, once again, is center-stage, with the US-UK seeking to dominate regional oil and gas pipeline routes designed, in the words of Saudi expert John Bradley “to disrupt and emasculate the awakenings that threaten absolute monarchism” in the Persian Gulf petro-states.
The seeds of this clandestine alliance with Islamists go back more than six years, when Seymour Hersh reported that the George W Bush administration had “cooperated with Saudi Arabia’s government, which is Sunni, in clandestine operations” intended to weaken the Shi’ite Hezbollah in Lebanon.
“The US has also taken part in clandestine operations aimed at Iran and its ally Syria,” wrote Hersh, “a byproduct of which is ‘the bolstering of Sunni extremist groups’ hostile to the United States and sympathetic to al-Qaeda”. He also noted that “the Saudi government, with Washington’s approval, would provide funds and logistical aid to weaken the government of President Bashir Assad, of Syria.”
In April 2007, the Lebanese Daily Star reported that the United States had earmarked US$60 million to reinforce Interior Ministry forces and Sunni organizations identified as “jihadists”.
Did Omar Bakri benefit from this? Having settled in Lebanon, Bakri told one journalist at the time, “Today, angry Lebanese Sunnis ask me to organize their jihad against the Shi’ites… Al-Qaeda in Lebanon… are the only ones who can defeat Hezbollah.”
And last year, Bakri boasted, “I’m involved with training the mujahideen [fighters] in camps on the Syrian borders and also on the Palestine side.” The trainees included four British Islamists “with professional backgrounds” who would go on to join the war in Syria. Bakri also claimed to have trained “many fighters”, including people from Germany and France, since arriving in Lebanon.
That Bakri appears to be benefiting from the US strategy to support Islamist extremists in the region is particularly worrying given the British government’s acknowledgement that a “substantial number” of Britons are fighting in Syria, who “will seek to carry out attacks against Western interests… or in Western states”.
With the EU embargo against supplying arms to Syrian rebels lifted this month after UK Prime Minister David Cameron’s pledge to support the rebels – some of whom are al-Qaeda affiliated Islamists with links to extremists at home – the question must be asked whether Britain’s security services remain compromised by short-sighted geopolitical interests rooted in our chronic dependency on fossil fuels.
Unfortunately the British government’s latest proposals to deal with violent radicalization – Internet censorship, a lower threshold for banning “extremist” groups – deal not with the failures of state policy, but with the symptoms of those failures. Perhaps governments have tacitly accepted that terrorism, after all, is the price of business as usual.
Dr Nafeez Mosaddeq Ahmed is an international security expert who writes for The Guardian at his Earth Insight blog. He is the author of The London Bombings: An Independent Inquiry (2006). His work was used by the Coroner’s Inquiry into the July 7 2005 bombings in London and the 9/11 Commission.
May 30, ’13
By Nafeez Mosaddeq Ahmed
Find this story at 30 May 2013
© Copyright 1999 – 2013 Asia Times Online (Holdings), Ltd.
© Copyright 2013 Nafeez Mosaddeq Ahmed
<< oudere artikelen nieuwere artikelen >>