Joint British-American operation hacked Israeli drones, documents show

RAF base CyprusBritish and American intelligence services worked together to hack Israeli unmanned aerial vehicles in order to acquire information on the Jewish state’s military intentions in the Middle East, according to documents leaked last week. Online publication The Intercept, said the operation was code-named ANARCHIST and was a joint project of Britain’s General Communications Headquarters (GCHQ) and America’s National Security Agency (NSA). The publication said it acquired documents about the operation from former NSA contractor Edward Snowden, who defected to Russia in 2013 and was offered political asylum by Moscow.

In an article published on Thursday, The Intercept said the joint GCHQ-NSA operation was headquartered in a Royal Air Force military facility high on the Troodos Mountains in the Mediterranean island of Cyprus. The documents provided by Snowden suggest that British and American spies were able to collect footage captured by the Israeli drone for at least two years, namely in 2009 and 2010. It is not clear whether that period included the first three weeks of January 2009, when the Gaza War was fought between Israel and Hamas. During that time, there were persistent rumors that Tel Aviv was seriously considering launching air strikes against Iran.

According to The Intercept, the main goal of operation ANARCHIST was to collect information about Israeli “military operations in Gaza” and watch “for a potential strike against Iran”. Additionally, the UK-US spy program “kept tabs on the drone technology Israel exports around the world”, said the article. According to one GCHQ document cited by The Intercept, the access to Israeli drone data gained through ANARCHIST was “indispensable for maintaining an understanding of Israeli military training and operations”.

Speaking on Israel’s Army Radio on Friday, Israel’s Minister for National Infrastructure, Energy and Water, Yuval Steinitz, said he was not surprised by the revelations. “We know that the Americans are spying on the whole world, including their friends”, said Steinitz. But it was “disappointing”, he said, given that Israel had “not spied” on the US “for decades”. Israeli intelligence agencies had “not collected intelligence or attempted to crack the encryption of the United States”, said the Minister, implying that recent revelations of US spying on Israel may cause a change of strategy in Israeli intelligence policy.

Author: Joseph Fitsanakis | Date: 01 February 2016 | Permalink

Canada stops sharing intelligence with Five Eyes partners over data breach

CSE CanadaCanada says it will stop sharing certain types of intelligence with some of its closest international allies until it ensures that Canadian citizens’ information is not included in the data given to foreign spy agencies. The announcement follows an official admission, made earlier this week, that a Canadian intelligence agency failed to remove Canadian citizens’ data from information it shared with member-agencies of the so-called Five Eyes Agreement. The pact, which is sometimes referred to as the UK-USA Security Agreement, has been in existence since World War II. It provides a multilateral framework for cooperation in signals intelligence (SIGINT) between the United Kingdom, the United States, Canada, Australia, and New Zealand.

On Thursday, the Commissioner of the Communications Security Establishment (CSE) of Canada, Jean-Pierre Plouffe, published a report on the activities of the CSE —the country’s primary SIGINT agency. The document, which is published annually by the Commissioner, states that the majority of the CSE’s SIGINT collection activities took place in accordance with Canadian law. However, the report found that some of the data shared by CSE with its Five Eyes partners contained data that could potentially be used to identify the identities of Canadian citizens. According to Canadian law, the CSE is not allowed to specifically target the communications of —or information about— Canadian citizens or Canadian companies. Moreover, information pertaining to those, which may be indirectly collected in the course of legitimate targeting of foreign citizens, is supposed to be immediately purged by CSE collection staff.

However, the Commissioner’s report found that some metadata —namely information pertaining to communications other than their content— that could be used to identify Canadian citizens had been shared by the CSE with Five Eyes spy agencies. Later on Thursday, Harjit Sajjan, Canada’s Minister of Defense, announced that SIGINT intelligence-sharing would be suspended until the metadata breach identified in the Commissioner’s report could be adequately addressed and corrected. Minister Sajjan said the roots of the breach had to do with “technical deficiencies” at the CSE, but added that it was crucial that the privacy of Canadians was protected. Therefore, he said, the spy agency would “not resume sharing this information with our partners” until he was “fully satisfied” that the proper control systems were in place.

Author: Joseph Fitsanakis | Date: 29 January 2016 | Permalink

Russia says it uncovered spy satellites disguised as space debris

Space debrisBy JOSEPH FITSANAKIS | intelNews.org
The Russian government says it recently detected a group of satellites that are spying on Russia while orbiting the Earth camouflaged as “space junk”. The finding was announced on Sunday, April 12, on the Moscow-based Zvezda television station, which is wholly owned by Russia’s Ministry of Defense. For much of the day, Zvezda marked “Space Day”, which has been annually commemorated in Russia ever since 1961, when cosmonaut Yury Gagarin journeyed in outer space.

The station hosted Major General Oleg Maidanovich, of the country’s Aerospace Defense Forces (ADF), in a program entitled “Special Operations in Space”. Maidanovich told the program that specialists in the ADF’s Intelligence Center uncovered “a newly deployed group of space satellites” that were designed to collect signals intelligence (SIGINT) from Russian telecommunications and other electronic systems. However, the satellites had been disguised to appear and behave like “space junk”, he said. By “space junk”, Maidanovich was referring to rocket stages, old and defunct communications satellites, and various other fragments of manmade devices that have ended up in outer space since the 1950s and are endlessly orbiting the Earth.

Maidanovich said that it was not unusual for space reconnaissance agencies to camouflage their spy satellites as space debris and deploy them into Earth’s orbit in a dormant state for several years. Then, once the target country’s space reconnaissance counterintelligence forces disregard the device as a piece of space junk, the satellite is suddenly reawakened and begins to collect SIGINT. For that reason, he said, Russia’s ADF monitors at least a fifth of a total of 100,000 objects orbiting planet Earth on any given day, due to concerns that such objects may be used for SIGINT collection by rival spy agencies.

The Russian ADF commander declined a request to identify the country believed to be behind the alleged camouflaged spy satellites, saying it was “not necessary to do so at the present time”. He added that his office typically notifies the Kremlin when it detects disguised spy satellites, and that the decision on whether to shoot them down is made “on a national level”.

American spies use NZ embassies to collect intelligence

NSA headquartersBy IAN ALLEN | intelNews.org
Embassies belonging to the government of New Zealand are secretly being used by the United States as part of a worldwide network of intelligence-collection facilities, according to documents leaked over the weekend. The documents were released by Edwards Snowden, an American former technical expert for the Central Intelligence Agency (CIA) and the National Security Agency (NSA), who is currently living in Russia and is responsible for countless leaks of classified information in recent years. The latest disclosure concerns Project STATEROOM, a highly secretive signals intelligence (SIGINT) collection program targeting international Internet, radio and telecommunications traffic. The existence of the program was disclosed in the summer of 2013 by Snowden, who told German newsmagazine Der Spiegel that it consisted of SIGINT collection facilities in nearly 100 US embassies and consulates in almost as many countries. According to the Snowden, STATEROOM operations are handled by a unit called Special Collection Service (SCS), which is jointly operated by the CIA and the NSA. In October of 2013, Professor Des Ball, an intelligence expert, claimed that Australian embassies served as collection sites for Project STATEROOM, by helping the SCS monitor the Asia Pacific region. Dr. Ball said the Australian Signals Directorate was sharing information with the NSA as part of the UKUSA agreement (also known as Five Eyes), an intelligence cooperation network comprising agencies from Australia, New Zealand, Britain, Canada and the United States. Now new documents made available by Snowden appear to show that New Zealand’s embassies and consulates around the world are also being used as part of Project STATEROOM. The documents date from 2003, and contain a synopsis of a number of NSA intelligence-collection programs, along with their operational titles and status. The list, which is marked “Top Secret” is titled “Exceptionally Controlled Information”, and contains several entries under the heading “STATEROOM”. Underneath the heading appears the description: “SIGINT from diplomatic missions abroad”. The document then states that “this activity is conducted by USA, AUS, CAN, GBR and NZL”. Although the existence of STATEROOM has been known for over a year, this is the first time that New Zealand diplomatic missions are specifically identified in documents as collection sites for the program. Read more of this post

Secret Russian spy base in Syria seized by Western-backed rebels

Screenshot from FSA videoBy JOSEPH FITSANAKIS | intelNews.org
Rebel forces aligned to Syria’s Western-backed opposition have announced the seizure of a joint Syrian-Russian spy base, which observers say reveals the extent of Russia’s intelligence cooperation with Syria. The base is located at the base of the Tel Al-Hara Mountain, in southern Syria’s Golan Heights region, just south of the border crossing with Israel in the now largely destroyed Syrian city of Quneitra. The Western-backed Free Syrian Army (FSA) said it took over the spy base on Sunday, following several weeks of fighting against rival groups, including Syrian government soldiers and members of Jabhat al-Nusra, al-Qaeda’s branch in Syria. The FSA said the base, referred to as “Center C” by Russian intelligence, had been under Russian command until it was abandoned at a time and for reasons that remain unknown. In a three-minute video released by the Western-backed rebel group on YouTube, an FSA officer appears to be guiding the cameraman around part of the seized base. He points to several diagrams and captions on the walls, which are both in Arabic and in Russian. At some point in the video, the seal of Syrian intelligence is clearly visible, placed next to the seal of the GRU’s 6th Directorate, the branch of Russian military intelligence that is tasked with collecting signals intelligence (SIGINT). At another point in the video, a series of photographs can be seen that depict Syrian and Russian intelligence officers working together in gathering and analyzing intelligence. Interestingly, one of the walls in the base features a map of northern Israel, an area that is adjacent to the Golan Heights, and appears to show the location of Israeli SIGINT stations and military encampments. It is unclear when exactly the spy base was abandoned by the Russian and Syrian intelligence officers that staffed it, Read more of this post

Secret program gives US, UK spies access to German telecoms

 Deutsche Telekom headquarters in BerlinBy JOSEPH FITSANAKIS | intelNews.org
American and British intelligence services have access to the network structure of German telecommunications through a top-secret program likened to a “Google Earth of the global Internet”, say reports. The program, codenamed TREASURE MAP, was first revealed late last year by The New York Times. The paper described it as a “sophisticated tool” that was designed by the United States National Security Agency as a “massive Internet mapping, analysis and exploration engine”. The paper said at the time that TREASURE MAP provided the NSA with a “near real-time, interactive map of the Internet” and gave it a “300,000 foot view” of the World Wide Web. Now German newsmagazine Der Spiegel has said that the top-secret program allows the NSA and its British counterpart, the General Communications Headquarters, to map the entire network of German telecommunications providers. The latter include the partially government-owned Deutsche Telekom, as well as several large local service providers, such as Stellar Telecommunications, Cetel, Inc., and NetCologne. Der Spiegel said TREASURE MAP collected network and geo-location data from each of these companies, thus allowing the NSA and GCHQ to map “any device, anywhere, all of the time”. These data permit the immediate identification of the owner and location of any computer or mobile device, by connecting the latter with unique Internet protocol addresses. The German magazine likened TREASURE MAP to “the Google Earth of the Internet” and said it gave its users access to the mapping of the German Internet, but also pointed to the addresses and locations of individual subscribers’ routers, as well as to targeted computer and smart phone devices. The data acquired through TREASURE MAP included “trade secrets and sensitive information, said Spiegel. Read more of this post

Russian jet ‘chased US spy plane into Swedish airspace’

RC-135 Rivet Joint reconnaissance aircraftBy IAN ALLEN | intelNews.org
An American spy plane was forced to enter Swedish airspace without permission in order to avoid a potentially serious encounter with a Russian military jet, which tried to intercept it in international airspace. Swedish news agency Svenska Dagbladet said on Monday that the incident happened on July 18, one day after Malaysia Airlines Flight 17 was shot down over Ukraine. According to Swedish sources, the US plane was an RC-135 Rivet Joint reconnaissance aircraft, which had been flying in international airspace on an eavesdropping mission, collecting signals intelligence on Russian military positions. All of a sudden, however, the American pilot noticed that Russian land-based military radars had begun to track the plane. Eventually, the Russians “locked” their radar on the US plane, which is usually interpreted as a step before firing at the aircraft. Such a move is not illegal, but is described by experts as “highly unusual”, especially when involving unarmed aircraft flying in international airspace. Shortly afterwards, the Russian Air Force sent “at least one” fighter jet toward the US aircraft in an apparent effort to intercept it. Swedish officials were later told by their US counterparts that the American pilot became seriously concerned that his aircraft might get fired upon, so he decided to abort his mission as soon as he could. He therefore ended up flying the plane over Sweden’s airspace without approval from Swedish air controllers. It is believed that the US plane may have crossed into other nations’ airspace, also without permission. Stephan Persson Tyrling, director of air operations at Sweden’s National Defense College, told Svenska Dagbladet that “Russia may have felt provoked” and embarked on an interception operation in order to “tell the US that they flew too close to their airspace or interfered with their [military] exercises”. Read more of this post

Follow

Get every new post delivered to your Inbox.

Join 1,120 other followers