Menu
Navigation

Global articles on espionage, spying, bugs, and other interesting topics.

Keep abreast of the espionage threats facing your organisation.

Intelligence officer facing espionage charge had top-level clearance

On Tuesday, the naval intelligence officer accused of spying had his bail hearing in a Halifax court delayed until next week at the request of his lawyer, who wanted more time to prepare. SLt. Delisle opted not to appear in court. “He doesn’t want to come up,” defence lawyer Cameron MacKeen told the judge, referring to the jail cells used by prisoners due in court.

What may be the biggest spy scandal in Canada in more than half a century exploded Monday after SLt. Delisle was charged with passing secrets to a “foreign entity” under Canada’s Information Security Act. It’s the first charge of its kind ever laid and one where the maximum penalty is the toughest possible under this country’s justice system: life in prison.

Details are slowly emerging about the Canadian Forces officer, despite a curtain of silence that’s been lowered by tight-lipped authorities, including the fact he declared bankruptcy in 1998.

The RCMP, Canadian military and the government refused to discuss the case but Defence Minister Peter MacKay took pains to insist the espionage allegations had not hurt the country’s relations with its foreign partners. “Let me assure you that our allies have full confidence in Canada.”

Sources say the Trinity communications centre was also privy to intelligence from Canada’s allies including the United States, Britain and Australia.

Officials at the U.S. and British embassies in Canada were not available for comment Tuesday.

Mr. MacKay on Tuesday refused to identify which country SLt. Delisle is alleged to have been spying for. “I’m not denying or confirming anything,” he said when asked to comment on news reports saying the recipient of the secrets was Russia.

“I am not going to play Clue,” he said.

A woman at Russia’s embassy in Ottawa said the embassy had no comment at this time on the Delisle story.

Sources said the Canadian government is currently conducting a damage assessment to discern how much national security has been compromised.

CTV reported Tuesday night that Canada is preparing a “measured response” to Russia that could include either summoning the Russian ambassador or expelling Russian diplomats.

However, the network said, the Harper government is leery of poisoning relations with Moscow and causing a public spat because the Prime Minister is headed to Russia later this year for a APEC summit.

Little is known about SLt. Delisle, 40, other than he most recently resided in Bedford, N.S., a suburb of Halifax, with a woman and three children.

His myspace.com page lists him as single as of 2008 and filings show a man with the same name and date of birth as the espionage suspect declared bankruptcy in Nova Scotia in February 1998 – less than two years after Jeffrey Delisle joined the Canadian Forces reserves.

It was barely a month before his 27th birthday, according to the record of the proceeding, and he owed $18,587 while declaring assets of $1,000.

He received a discharge from bankruptcy in November of 1998, filings show. The address given during the proceeding is currently assigned to a lower-level apartment at the back of a small house in Beaver Bank, a different suburb of Halifax.

Michael Hennessy, a professor of history and war studies at Royal Military College in Kingston, said the case is really unmatched in Canadian history – if the charges are proven. “For an officer and intelligence officer in particular to be involved in such behaviour is a massive betrayal of trust. It really is unprecedented.”

SLt. Delisle originally joined the Forces as a reservist in 1996 and later became an officer in 2008 after completing a bachelor of arts at Royal Military College.


Intelligence officer facing espionage charge had top-level clearance

On Tuesday, the naval intelligence officer accused of spying had his bail hearing in a Halifax court delayed until next week at the request of his lawyer, who wanted more time to prepare. SLt. Delisle opted not to appear in court. “He doesn’t want to come up,” defence lawyer Cameron MacKeen told the judge, referring to the jail cells used by prisoners due in court.

What may be the biggest spy scandal in Canada in more than half a century exploded Monday after SLt. Delisle was charged with passing secrets to a “foreign entity” under Canada’s Information Security Act. It’s the first charge of its kind ever laid and one where the maximum penalty is the toughest possible under this country’s justice system: life in prison.

Details are slowly emerging about the Canadian Forces officer, despite a curtain of silence that’s been lowered by tight-lipped authorities, including the fact he declared bankruptcy in 1998.

The RCMP, Canadian military and the government refused to discuss the case but Defence Minister Peter MacKay took pains to insist the espionage allegations had not hurt the country’s relations with its foreign partners. “Let me assure you that our allies have full confidence in Canada.”

Sources say the Trinity communications centre was also privy to intelligence from Canada’s allies including the United States, Britain and Australia.

Officials at the U.S. and British embassies in Canada were not available for comment Tuesday.

Mr. MacKay on Tuesday refused to identify which country SLt. Delisle is alleged to have been spying for. “I’m not denying or confirming anything,” he said when asked to comment on news reports saying the recipient of the secrets was Russia.

“I am not going to play Clue,” he said.

A woman at Russia’s embassy in Ottawa said the embassy had no comment at this time on the Delisle story.

Sources said the Canadian government is currently conducting a damage assessment to discern how much national security has been compromised.

CTV reported Tuesday night that Canada is preparing a “measured response” to Russia that could include either summoning the Russian ambassador or expelling Russian diplomats.

However, the network said, the Harper government is leery of poisoning relations with Moscow and causing a public spat because the Prime Minister is headed to Russia later this year for a APEC summit.

Little is known about SLt. Delisle, 40, other than he most recently resided in Bedford, N.S., a suburb of Halifax, with a woman and three children.

His myspace.com page lists him as single as of 2008 and filings show a man with the same name and date of birth as the espionage suspect declared bankruptcy in Nova Scotia in February 1998 – less than two years after Jeffrey Delisle joined the Canadian Forces reserves.

It was barely a month before his 27th birthday, according to the record of the proceeding, and he owed $18,587 while declaring assets of $1,000.

He received a discharge from bankruptcy in November of 1998, filings show. The address given during the proceeding is currently assigned to a lower-level apartment at the back of a small house in Beaver Bank, a different suburb of Halifax.

Michael Hennessy, a professor of history and war studies at Royal Military College in Kingston, said the case is really unmatched in Canadian history – if the charges are proven. “For an officer and intelligence officer in particular to be involved in such behaviour is a massive betrayal of trust. It really is unprecedented.”

SLt. Delisle originally joined the Forces as a reservist in 1996 and later became an officer in 2008 after completing a bachelor of arts at Royal Military College.


Industrial Espionage Gang Sends Malicious Emails in Security Vendor’s Name

A cybercrime gang that primarily targets companies from the chemical industry has launched a new series of attacks that involve malware-laden emails purporting to be from Symantec, the security vendor responsible for exposing its operation earlier this year.

Dubbed the Nitro attacks, the gang’s original industrial espionage efforts began sometime in July and lasted until September. The attackers’ modus operandi involved sending emails that carried a variant of the Poison Ivy backdoor and were specifically crafted for each targeted company.

Despite being publicly exposed by Symantec in an October report, the gang didn’t give up on its plans and, in fact, stuck to many of its techniques.

“The same group is still active, still targeting chemical companies, and still using the same social engineering modus operandi,” security researchers from Symantec said in a blog post on Monday.

“That is, they are sending targets a password-protected archive, through email, which contains a malicious executable,” they added.

The interesting aspect about the gang’s new attacks is that they are using Symantec’s own report in order to trick victims. One email intercepted by the security company was crafted to appear as if it were sent by its technical support department and warns recipients that many enterprise computers were infected with Poison Ivy.

The rogue messages claim that a special removal tool was released by Symantec in order to help its customers scan their systems. Attached to the email is a 7-Zip archive called the_nitro_attackspdf.7z containing a malicious executable file and a copy of Symantec’s original report about Nitro.

“The attackers, in an attempt to lend some validity to their email, are sending a document to targets that describes their very own activity,” Symantec said. The executable file is a new variant of Poison Ivy that connects to a command-and- control (CC) server hosted by the same provider used in the previous attacks.

The fake Symantec alert is not the only lure this gang is using. Other malicious emails that are part of the same campaign claim to originate from Adobe Systems and contain a fake upgrade for Adobe Reader.

Symantec managed to take down the domain name used by the new CC server and alerted the hosting provider. However, given the determination shown by these attackers so far, it’s unlikely that the Nitro attacks will stop.

The group’s primary goal is to steal domain administrator credentials, as well as to gain access to systems that store intellectual property. After identifying the “desired” IP, the attackers copy it to archives on internal systems used as staging servers, with the content uploaded from there to a site outside of the compromised organization, according to Symantec’s October report.


China’s cyber heist

 

p/p

Chinese espionage, especially cyber espionage, has reached extraordinary levels. ”They’re stealing everything that isn’t bolted down and it’s getting exponentially worse,” says Mike Rogers, chairman of the US permanent select committee on intelligence, in a report just released by Bloomberg.

Richard Clarke, former cyber security adviser to the White House, says China has been ”hacking its way into every corporation it can find listed in Dun and Bradstreet”. This theft of commercial intellectual property constitutes the greatest illegal transfer of wealth in history, says Scott Borg, director of the US cyber consequences unit.

We should be taking note of this in Australia for all sorts of reasons. Chinese hacking is targeting Australia and the United States, and there are national security as well as economic implications. Moreover, it is not only cyber espionage of which we need to be wary. High-level Soviet moles operated in this country during the Cold War and they have yet to be exposed.

We are even more vulnerable to Chinese espionage now than we were to Soviet espionage then. It’s time this hidden history was made public, if only to put the problem of Chinese (and revitalised Russian) espionage into sober perspective for an Australian public too given to complacency or cynicism in such matters.

Thirty years ago, in The National Times, Brian Toohey wrote about Soviet operations in Australia, based on an extended interview with CIA operations veteran Ted Shackley. His opening paragraph was stunning in its implications: ”The Soviet intelligence service, the KGB, has been more successful in its penetration operations in Australia than in any other country, according to hard evidence available to the American Central Intelligence Agency. The long standing CIA assessment is that the KGB has planted a mole in a key position in Canberra – probably high in the Foreign Affairs, Defence or the Prime Minister’s Department.”

The CIA’s hard evidence, Toohey wrote, had been built up over many years from both human and electronic sources. It demonstrated that the KGB had for years ”been able to obtain a much higher level of classified information from Canberra than anywhere else”. This was especially significant because much of what was obtained was sensitive intelligence shared with Australia by the United States.

Yet, as of 1981, the CIA had been baffled in trying to establish who exactly the Soviet mole or moles in Canberra were. Between 1993 and 1995, two highly secretive investigations, Operation Liver and the Cook inquiry, were conducted for the Keating government.

The investigators concluded that there had, indeed, been high-level, long-term penetration by Soviet intelligence, but the federal government has kept their findings under lock and key.

It’s high time they were unlocked, because they provide an insight into the danger now presented by China, which is far better placed than the Soviet Union was to plant moles and agents in Australia.

China is a huge trading partner of Australia, which the Soviet Union never was. It is ascendant at a time when the United States is floundering in economic and strategic terms. And, despite its sinister communist past and the ongoing ruthlessness of the communist regime there, it cultivates a ”Middle Kingdom” mystique.

Only a few well-placed people need be seduced for very serious damage to be done to our national security.

In his new book Tiger Trap: America’s Secret Spy War with China, David Wise fills in the deeper background behind the Bloomberg report. The book places recent developments in the context of ancient Chinese traditions of espionage going back to Sun Tzu. It shows that Chinese espionage has grown relentlessly in the past few decades, even as many of us came to see China as a reformed totalitarian state with a market economy and a growing stake in global order. It describes the structure of the Chinese intelligence agencies, their modus operandi and their recent strategic successes against the United States.

Wise tells, for example, of Chinese acquisition of the top-secret technology for the W-88 nuclear warhead for the missiles carried by the Trident submarine, stealth technology for fighters, and a great deal more from the high-tech sectors of the American economy and defence sector.

Even more disturbing is that the spies who are supplying this technology to China remain mostly undetected. A four-year investigation, from 1999 to 2003, by a veteran counter-intelligence officer, Stephen Dillard, was unable to pinpoint the source of the W-88 breach.

As with China’s relentless military build-up, there will be those who’ll say, ”Well, they’re not doing anything the Americans aren’t doing, so who are we to complain?”

That is to forget where we stand in the world and where our interests lie. We are a key ally of the United States; it is the bastion of our own strategic security; we depend on it for cutting-edge military technology; we house major joint facilities on our soil; we have a new agreement for increased US presence here; and China’s rising power and aspirations are, by regional agreement, the major uncertainty in Asia-Pacific stability for as far ahead as we can currently see.

Dr Paul Monk is a former China analyst with the Defence Intelligence Organisation and author of Thunder From The Silent Zone: Rethinking China.



New device lets you eavesdrop on others

    MIAMI – There’s a new device that lets you be James Bond. It’s called DetectiGo. DetectiGo can track someone anywhere in the world and listen to what they’re saying.

It’s small enough to be hidden in a backpack, a briefcase or in a glove compartment, according to founder Esteban Delaossa. Gustavo Roldan was one of the first people to own one of the devices. He wants to know where his teenage kids are.

“I use it for safety for my kids. It gives me an opportunity to know where they’re at, what they’re doing and when they’re doing it,” Roldan said.

“Why shouldn’t you have the right to know what you need to know?” said Delaossa.

If you set the device with a maximum speed, it can also alert you if the driver goes over it.

Soon it will give you constant, almost instant, GPS tracking and you will be able to set up a perimeter to notify you if the person you are tracking travels outside that zone.

“The typical average response by women is ‘I need this.’ The response of men is ‘You’re killing us,’ said Yesenia Hernandez of DetectiGo.

Legal expert David Milian says it’s not breaking the law to track someone. The legality of listening in on someone depends on where the person is located, he said.

“If it’s just tracking location, it’s the same thing you can do if you are watching someone and following them as long as you don’t do anything else,” said Milian.

DetectiGo costs $149 plus the cost of an air card to cover the cell charges.