Menu
Navigation

Global articles on espionage, spying, bugs, and other interesting topics.

Keep abreast of the espionage threats facing your organisation.

KGB methods suspected in eavesdropping affair

May 11, 2011
Staff and wire reports

RIGA – The Prosecutor General’s Office is looking into the information that surfaced last week about the covert bugging of VIP suites and conference rooms at the Radisson Blu Ridzene Hotel in Riga, reports news agency LETA. The Prosecutor General’s Office said that no petitions have been submitted yet on this matter, and that the person making the allegation, Latvia’s First Party/Latvia’s Way leader and MP Ainars Slesers, has not provided any evidence on his claims.
Slesers announced in an interview on the LNT program ‘900 sekundes’ on May 5 that Latvian intelligence services have been bugging rooms at the Ridzene hotel for several years.

Foreign embassies have so far not reacted to or turned to the Foreign Ministry over the accusations about possible covert listening devices in several hotel suites. Prime Minister Valdis Dombrovskis’ (Unity) spokeswoman, Zanda Sadre, said that Dombrovskis was on vacation, and could not comment on the issue.
President Valdis Zatlers, after a meeting with Slesers, agreed that Slesers and the Norwegian owners of the Ridzene would have to officially request the Prosecutor General’s Office to investigate the suspected bugging of rooms there.
Slesers said that the president clearly stated that “this matter must be pushed forward.” Slesers added that the Norwegians are “disturbed at the developments, and that their reaction will be harsh.”

Employees at the prosecutor’s office have contacted the director general at Ridzene, said Radisson Blu Group spokesperson Aiga Lapina. She pointed out that management at Radisson Blu Group learned about the supposed tapping of VIP suites and a conference room from the mass media, and that no one had ever heard such a thing before. “We are open to all inspections, as such information is bad publicity for the hotel,” she added.
Slesers named several hotel suites that he said were tapped, where foreign and local high-ranking officials used to stay. He said several representatives from Latvia’s intelligence agencies were prepared to testify in the case, but they required political guarantees from the next president of Latvia.

This would certainly “cause major international pressure, and that several Latvian officials might have to step down now,” said Slesers. He went on to say that President Zatlers is the only politically neutral official at the moment, but he will have to prove in the time remaining until the presidential elections whether he is prepared to tackle serious political problems, which most probably means that he will have to “lock horns with several politicians.”
Zatlers will have to find out who ordered foreign officials’ conversations tapped, and foreign intelligence services will have to be involved in investigating the matter, stressed Slesers. “We have a situation where the state is run not by politicians but intelligence services,” said Slesers.

He also claimed that Latvia’s authorities had been tapping VIP suites and the conference hall “for several years.”
This, however, brings into question Slesers’ own motives, and possible previous involvement or knowledge, in the case and in why he’s bringing out this information only now, and not years earlier.

Saeima Deputy Chairman and National Security Commission Chairman Gundars Daudze (Union of Greens and Farmers) said “It is hard to comment on the matter, because I only know what the media have reported. If Mr. Slesers indeed has proof of what he said, he should turn to the authorities, as prescribed in the law,” Daudze said.
“I believe that the matter must be tackled legally, not politically. This means that the Saeima National Security Committee does not have to review it either,” said Daudze. 

SOCIAL BOOKMARKS:   Delicious   Digg   Reddit   Ask   Facebook   MrWong   Netvouz


Amcor sues former executive over industrial espionage allegations

US-based Amcor Packaging Distribution is accusing Charles McHugh of plotting with his father and co-defendant William L McHugh to take confidential and proprietary customer marketing data valued at more than US$300,000, according to a report from Thomson Reuters.

In papers filed at the Orange County Superior Court, California, the company said Charles McHugh started working at Amcor in 1994 as a sales representative, reported Westlaw Journal Intellectual Property.

After performing well, McHugh was made a member of Amcor’s exclusive President Club, a reward given to the company’s elite 25 sales staff. He retained membership for a decade and his continued success meant he was promoted to vice president of sales, said the lawsuit.

Confidentiality agreement

Amcor said McHugh was bound by a confidentiality agreement for the entire period he was employed at the firm, which prohibited the disclosure of trade secrets and other confidential information about the company.

In 2009, it is alleged that McHugh approached a company official with a request to cut his income as he was considering divorce. Amcor said it refused to help the accused do this.

McHugh and his father are said to have started their own company shortly afterwards, called Value Added Packaging Printing. Amcor claims that while McHugh was still employed at the company he “converted, stole, misused and misappropriated” property belong to, including confidential and proprietary client and marketing files.

The accused used the information as part of an attempt to solicit Amcor clients – an act that damaged the company’s business operations, the firm contends in the court papers.

The company has accused McHugh of deliberately steering its clients away from Amcor while leading them to believe they remained its customers.

Its customers were informed by McHugh that the completion of their ordered would be done through his father’s business – Value Added.

“He led Amcor’s customers to believe that Value Added and another company were simply outside manufacturers that Amcor utilized to fulfil orders,” said the court papers. “Amcor customers were led to believe that their accounts continued to be serviced as Amcor accounts, even though the products were shipped directly from the manufacturer and the invoices were mailed by the manufacturer.”


Man arrested for bugging girls near middle school

A 27-year-old man was arrested for allegedly trying to pick up a 15-year-old middle school student, Salinas police said today.

The man, Andrew Gaytan, was allegedly following girls near La Paz Middle School as he cruised around in a charcoal colored Mazda, officials said.

 

A passerby called to report the incident to police at 9:22 a.m. Wednesday. The caller told officers that they were trying to follow Gaytan and last saw him on Moreno Street talking to the 15-year-old.

 

Officers said that when they arrived, they found Gaytan trying to talk the girl into his car.

 

Their investigation revealed that Gaytan had contacted the girl three different times, police said. Officers, believing Gaytan was drunk, gave him a field sobriety test, which officials said he failed.

 

Gaytan was three times over the legal limit, police said.
Police booked Gaytan into Monterey County Jail on suspicion of driving under the influence and three counts of annoying a child.


Chinese espionage exploits trust of Taiwanese to put US secrets in wrong hands

ALEXANDRIA, Va. – The young man stood before the judge, his usually neatly trimmed hair now long enough to brush the collar of his prison jumpsuit. Glenn Duffie Shriver had confessed his transgressions and was here, in a federal courtroom, with his mother watching, to receive his sentence and to try, somehow, to explain it all.

When the time came for him to address the court, he spoke of the many dreams he had had to serve his country.

“Mine was to be a life of service,” he said. “I could have been very valuable. That was originally my plan.”

He had been a seemingly all-American, clean-cut guy: No criminal record. A job teaching English overseas. In letters to the judge, loved ones described the 29-year-old Midwesterner as honest and caring; a good citizen. His fiancee called him “Mr. Patriot.”

Such descriptions make the one that culminated in the courtroom all the more baffling: Glenn Shriver also was a spy recruit for China. He took $70,000 from individuals he knew to be Chinese intelligence officers to try to land a job with a U.S. government agency, first the State Department, later the CIA.

Shriver is just one of at least 57 defendants in federal prosecutions since 2008 charged with espionage conspiracies with China or efforts to pass classified information, sensitive technology or trade secrets to intelligence operatives, state-sponsored entities, private individuals or businesses in China, according to an Associated Press review of U.S. Justice Department cases. Of those, nine are awaiting trial, and two are considered fugitives. The other defendants have been convicted, though some are yet to be sentenced.

Most of these prosecutions have received little public attention, especially compared with the headline splash that followed last year’s arrest of 10 Russian “sleeper agents” who had been living in suburban America for more than a decade but, according to Attorney General Eric Holder, passed no secrets.

Contrast that with this snapshot:

—In Honolulu, Hawaii, a former B-2 bomber engineer gets 32 years in prison for working with the Chinese to develop a vital part for a cruise missile in a case that a high-ranking Justice Department official said resulted in the leak of “some of our country’s most sensitive weapons-related designs.”

—In Boston, Massachusetts, a Harvard-educated businessman is sent to prison, along with his ex-wife, for conspiring for a decade to export illegally parts used in military radar and electronic warfare systems to research institutes that manufacture items for the Chinese military. The Department of Defence concluded the illegal exports “represented a serious threat to U.S. national and regional defence security interests.”

—In Los Angeles, California, a man goes to jail for selling Raytheon-manufactured thermal imaging cameras to a buyer in Shanghai whose company develops infrared technology. The cameras are supposed to be restricted for export to China because of “their potential use in a wide variety of military and civilian applications,” according to court documents.

—And in Alexandra, Virginia, there is Shriver, who told the judge quite simply: “Somewhere along the way, I climbed into bed with the wrong people.”

All five of these defendants were sentenced over just an 11-day span early this year.

In Shriver’s case, when once he asked his Chinese handlers, “What, exactly, do you guys want?” the response, as detailed in court documents, was straightforward: “If it’s possible, we want you to get us some secrets or classified information.”

Despite denials from Beijing, counterintelligence experts say the cases reveal the Chinese are among the most active espionage offenders in America today, paying more money and going to greater lengths to glean whatever information they can from the United States.

___

For years, U.S. counterintelligence experts have cited a growing espionage threat from China, the product of an ever-more competitive world in which technology is as vital as political intelligence, but a sign, too, of China’s increasing prosperity, persistence and patience.

Recent cases reveal not only a high level of activity but also signs of changing tactics and emboldened efforts. In one case, a convicted spy managed to persuade not one but two U.S. government officials to pass him secret information, telling them it was going to Taiwan when he instead passed it to a Chinese official.

The recruitment of more non-Chinese, such as Shriver, also represents a shift, said Larry Wortzel, who serves on the U.S.-China Economic and Security Review Commission.

Then there are the so-called “espionage entrepreneurs,” motivated simply by money.

When asked about the recent cases, the Chinese Foreign Ministry questioned the statistics, responding in a statement: “To speak of the Chinese side’s so-called ‘espionage activities’ in the United States is pure nonsense with ulterior motives.”

However, Joel Brenner, who served as the U.S. National Counterintelligence Executive from 2006 to 2009, said: “The Chinese espionage threat has been relentless recently. … We’ve never seen anything like it. Some of it is public. Some of it is private. And some of it lies in that ambiguous area in between.”

Today’s “agents” are professors and engineers, businessmen exporting legitimate products while also shipping restricted technology and munitions, criminal capitalists who see only dollar signs. While some may be acting at the direction of a government handler, others supply information to firms for private enterprise, state-sponsored research or both.

Driving all of this, U.S. officials said, are China’s desire to develop a modernized military and its expanding wealth; last year China surpassed Japan as the world’s second-largest economy, behind only the United States.

“They have more money to pay for things,” said Steve Pelak, a deputy chief of the Justice Department’s counterespionage section who points to the amounts given to Shriver before he was ever in a position to access, much less pass, secrets.

Still more money is going to private firms to help develop and build China’s military technology, sometimes through parts obtained illegally from U.S. manufacturers.

Indeed most of the Justice Department cases reviewed by the AP involve the illegal export of restricted defence-related parts or so-called “dual-use” technology, which can have commercial or military applications. These are items such as integrated circuits for radar systems, high-power amplifiers designed for use in early-warning radar and missile target acquisition systems, and military grade night-vision technology.

That only scratches the surface. Other cases involve the theft of trade secrets by individuals once employed at major U.S. corporations, including Boeing, Motorola and Dow. In some instances, the secrets were computer source codes or, in cases still awaiting trial, related to the development of organic pesticides and telephone communications technology.

Stolen information about the space shuttle and technical data about the capabilities of the U.S. Navy’s nuclear-powered submarines have also been passed along.

While export cases and economic espionage comprise most of the China-related intelligence prosecutions in recent years, there have been a few notable instances of traditional espionage, among them the Shriver case and that of Tai Shen Kuo, a Louisiana businessman who obtained information from two federal government employees that he passed to China.

It all fits into what some experts call China’s “vacuum cleaner” approach to information-collection: Catch whatever you can.

“It’s a little like … the cancer that you don’t know your body has,” said Michelle Van Cleave, another former National Counterintelligence Executive. “You don’t know that you’re in trouble until it manifests itself in ways that really, really hurt you.”

___

“If you have customers in mainland China, please let us know if we could be of any help. In China, it seems impossible for most companies to buy directly from US. We can act as middlemen for you.”

It was 1996 and Zhen Zhou “Alex” Wu, a one-time schoolteacher in his native China who later studied at Harvard, was emailing a pitch for his business: A company dedicated to selling electronics components to Chinese customers. Based in Shenzhen, China, the company, Chitron, opened a single U.S. office in Waltham, Massachusetts, to acquire desired technology.

The Massachusetts firm, federal authorities now say, was merely a front to facilitate the export of defence technology from U.S. manufacturers to Chinese institutes related to the military. Wu now sits in a federal prison after being sentenced in January to eight years for conspiring to export restricted technologies illegally.

According to the Department of Defence, the exported items are “vital for Chinese military electronic warfare, military radar, fire control, military guidance and control equipment, and satellite communications.” Also included: parts “that the People’s Liberation Army actively seeks to acquire.”

The use of front companies, or private firms that may also do legitimate business, is a common way that China seeks information, said Pelak, who in 2007 was appointed the Justice Department’s first national export control co-ordinator, focusing on illegal export of munitions and sensitive technology. Prosecutions have since gone up, and today two-thirds of federal illegal export cases involve either China or Iran.

Take the case of William Chi-Wai Tsu, an electrical engineer serving a three-year prison sentence for illegally shipping several hundred thumbnail-size integrated circuits to a Beijing company called Dimagit Science Technology. Investigators said the circuits have a variety of applications, including use in sophisticated communications and military radar systems.

Among Dimagit’s clients: a research institute affiliated with the state-owned China Aerospace Science and Technology Corp. Dimagit’s catalogue, according to court records, promised: “We unswervingly take providing the motherland with … electronic technical support to revitalize the national defence industry as our mission.”

Court records describe how Tsu went about acquiring restricted parts: He created a fictitious company and used the California address of a friend for shipping. He then provided false end-user statements to American electronics distributors, promising that the parts he sought were not for export but for domestic use, specifically a project with Cisco Systems. If a distributor pressed Tsu, he would claim that nondisclosure agreements prevented him from providing more detail.

Similar tactics were used in a case still awaiting sentencing in Seattle, Washington. Lian Yang, a former software engineer at Microsoft, pleaded guilty in late March to attempting to buy restricted technology for a “partner” in China — specifically 300 radiation-hardened programmable semiconductor devices that are used in satellites. In conversations with a confidential FBI source, Yang suggested creating a fake U.S. company to list as the end-user.

Yang was arrested last Dec. 3 after he handed $20,000 to undercover agents in exchange for five of the devices. His sentencing is set for June 30.

Prosecutors argued in court papers that the offence “amounted to a form of espionage on behalf of” China.

However, some defence attorneys counter that these export cases are not espionage at all or even deliberate attempts to circumvent U.S. laws, but rather an outgrowth of confusing policies and, perhaps, overzealous prosecutors.

In the Chitron case, appeals lawyers for Alex Wu insist U.S. export regulations do not make clear enough what can and cannot be exported legally.

“Wu and others at his firm were not equipped and did not have the training needed to understand this country’s extremely complicated export control laws,” said his lawyer, Michael Schneider.

Stephanie Siegmann, the assistant U.S. attorney who prosecuted the case, responded that evidence clearly showed that Wu did understand the restrictions. One spreadsheet found on his computer was titled, “GP (Gross Profit) for USA Restricted Military Parts.” Among the parts exported: phase shifters used in military radar systems.

“With such equipment,” the Defence Department’s Defence Technology Security Administration concluded, “China could defeat U.S. weapon systems.”

___

This year, retired FBI agent I.C. Smith gave a speech called “China’s Mole” at the International Spy Museum in Washington, D.C. It was about a man who landed a job with the Central Intelligence Agency and later turned out to be a spy for China.

He was referring to one of the most damaging Chinese espionage cases of all time: the infiltration of Larry Chin, who in 1986 admitted to spying for China during his almost three decades with the CIA. As a former Chinese counterintelligence supervisor, Smith helped investigate Chin, and he was stunned to learn of the 5 1/2-year recruitment of Glenn Shriver and China’s “run at the front door” of America’s pre-eminent intelligence agency.

“The Chinese,” Smith said, “still have the capacity to surprise.”

How did they do it in Shriver’s case? Standing before a federal judge on a blustery day in January, Shriver tried to explain how he went down the path to betrayal.

“It started out fairly innocuous,” he recalled. During a college study-abroad program in Shanghai, he was taken with Chinese culture and became proficient in Mandarin. After graduating from Grand Valley State University in Michigan in 2004, he returned to China to look for work.

Shriver was just 22 years old when, in October 2004, he first met a woman in Shanghai called “Amanda.” According to court documents, he had responded to an English-language ad looking for scholars of East Asian studies to write political papers. He wrote one about U.S.-China relations regarding North Korea and Taiwan, and was paid $120.

“Amanda” later asked Shriver if he would be interested in meeting some other people, two men he came to know as “Mr. Wu” and “Mr. Tang.”

As outlined in court documents and Shriver’s own statements, their conversations, at first, focused on developing a “friendship.” The men asked Shriver what type of work he was interested in and said that if he planned to seek a job with a U.S. government agency, “we can be close friends.” Had he ever thought about working for the U.S. State Department or, perhaps, the CIA? “That would be pretty good,” they told him.

“Only one time was I told that they would like secrets,” Shriver told the judge.

Six months after first meeting “Amanda,” Shriver applied for a job with the U.S. State Department. Although he failed the foreign service exam, the intelligence officers paid him $10,000. A year later, in April 2006, he took the exam a second time but again failed. He was nevertheless paid $20,000.

Then, in June 2007, Shriver applied for a position in the clandestine branch of the CIA. A few months later, he asked the Chinese intelligence officers for $40,000 for his efforts.

During all this time, friends and family, Shriver’s mother, especially, thought he was just trying to figure out what to do with his life. He talked about becoming a police officer or joining the Peace Corps. Eventually he returned overseas, this time to Korea, where he taught English and got engaged.

No one knew he was continuing to communicate with his Chinese handler, “Amanda.”

In June 2010, Shriver underwent a series of final security screening interviews at the CIA in Virginia. A week later, he was arrested — U.S. officials would not disclose what led them to him — and his clandestine life unraveled.

“Nobody knew. Nobody,” said his mother, Karen Chavez. “He was a good kid. … I don’t know what he was thinking.”

The closest her son came to an explanation was when he told the sentencing judge: “I think I was motivated by greed.”

In a telephone interview from prison in April, Shriver tried to expand on that.

“When you’re 23 years old living in a very fun city, you almost get addicted to money,” he told the AP. “After a while it’s kind of like: OK, I’m kind of up on what these guys are doing. But by then it’s just money getting thrown at you. I’m just like … I can apply to this, get some money and then just continue on with my life.”

Shriver pleaded guilty to conspiracy to communicate national defence information and is serving a four-year prison term.

It is true that he was, after all, never in a position to do any real spying. No harm done? That may depend on how you look at it.

“This case shows an aggressive attempt by (China) to recruit an American citizen and attempt to place him in one of the nation’s premier intelligence agencies,” said Neil MacBride, the U.S. attorney for the Eastern District of Virginia, whose office has handled a number of China-related intelligence cases.

“Foreign intelligence services are watching,” he said, “and they’re looking for any weakness they can identify and exploit.”

___

Pauline Arrillaga, a Phoenix-based national writer for The Associated Press, can be reached at features(at)ap.org.


Hackers turn Cisco phones into remote bugging devices

Internet phones sold by Cisco Systems ship with a weakness that allows them to be turned into remote bugging devices that intercept confidential communications in a fashion similar to so many Hollywood spy movies, SC Magazine reported.

The publication quoted consultants from Australia-based HackLabs, who said customers had lost $20,000 a day from exploits, which also included attacks that forced the devices to make calls to premium phone numbers. The consultants said the underlying weaknesses were present in the default settings and could be fixed only by making changes to the phones’ configuration settings.

“The book says to shut off web services,” HackLabs’ Peter Wesley was quoted as saying, referring to the manual that shipped with the phones. “Who’s going to read all that.”

SC Magazine said that a Cisco spokesman advised users to “apply the relevant recommendations in manuals to secure their systems. There was no explanation why phones are by default open to the attacks described in the article. A more sensible policy might be to ship the phones with the features disabled and allow customers who have a specific need for them to turn them on.

The magazine didn’t name the specific make of phone, which is also susceptible to denial of service attacks. The article is here. ®