Snowden documents reveal New Zealand spy program in Bangladesh
April 17, 2015 1 Comment
By JOSEPH FITSANAKIS | intelNews.org
New documents released by American defector Edward Snowden reveal an extensive intelligence-collection operation in Bangladesh, operated by New Zealand with American and Indian collaboration. The documents were analyzed by The New Zealand Herald in association with The Intercept, which received them from Snowden, a former technical expert with the US National Security Agency, who now lives in Russia.
The principal file, entitled “National Security Agency Relationship with New Zealand”, marked “Top Secret”, is dated April 2013. It states that New Zealand’s Government Communications Security Bureau (GCSB), has been actively intercepting mobile telephone communications in Bangladesh since at least 2004. The document, which was authored by the NSA, describes the GCSB as the leading agency involved in collecting counterterrorist-related signals intelligence in Bangladesh.
Another file, also released by Snowden, and dated 2009, explains that the interception is carried out by a special GCSB unit named Signals Intelligence Development Team and codenamed OCR. It also mentions that the operation is headquartered in a “special collection site” in the Bangladeshi capital Dhaka, which is equipped with interception systems. The Herald notes that New Zealand does not have an embassy or any other official buildings in Bangladesh in which to operate listening facilities. It thus speculates that the interception systems must be located in an American-controlled building.
The NSA documents describe the Bangladesh operation as “a success story” for New Zealand’s intelligence community, adding that it has provided “unique intelligence leads”, whcih have “enabled successful counterterrorist operations” by a host of agencies. The latter include Bangladesh’s own State Intelligence Service, the US Central Intelligence Agency and intelligence agencies from nearby India.










North Korea is now robbing banks, says US intelligence official
March 23, 2017 by Joseph Fitsanakis Leave a comment
Forensic investigators described the heist as technically advanced. The antivirus company Symantec said it identified a piece of code in the malware that is known to have been used by North Korean government hackers in the past. Not everyone agreed with the claim that Pyongyang was behind the bank heist. But those who did, said that it was unprecedented in scope and aggressiveness. Some even said that the heist showed that North Korea’s cyber capabilities were among the most sophisticated and powerful in the world.
Meanwhile the United States government did not comment on the matter. However, this past Tuesday the deputy director of the National Security Agency appeared to confirm reports that North Korea was behind the Bangladesh Bank heist. Rick Ledgett, a 30-year veteran of the NSA, who is due to retire in 2018, was speaking at a public event hosted by the Aspen Institute in Washington, DC. He reminded the audience that private researchers had connected the malware code used in the Bangladesh Bank heist with that used in previous hacking attempts launched by North Korea. “If that linkage […] is accurate”, said Ledgett, it “means that a nation state is robbing banks”. When asked by the moderator whether he believes that to be the case, Ledgett responded “I do. And that’s a big deal”. Foreign Policy magazine reached out to Ledgett following his talk and asked him for clarification about his comments regarding the Bangladesh Bank heist. But the NSA official simply said that “the public case [about the heist] was well-made”. Foreign Policy also contacted the NSA, but the agency said it preferred not to comment on the matter.
► Author: Joseph Fitsanakis | Date: 23 March 2017 | Permalink
Filed under Expert news and commentary on intelligence, espionage, spies and spying Tagged with Bangladesh, Bangladesh Bank, computer hacking, cyber crime, cybersecurity, News, North Korea, NSA, Rick Ledgett