Menu
Navigation

Global articles on espionage, spying, bugs, and other interesting topics.

Keep abreast of the espionage threats facing your organisation.

Rebekah Brooks’s phone was hacked ‘at least 20 times’

Rebekah Brooks, the chief executive of News International and former editor of The Sun, has been shown evidence suggesting her phone was hacked more than 20 times by a private investigator employed by another Rupert Murdoch title, it emerged last night.

News International confirmed the 43-year-old media executive met detectives last week from Operation Weeting – Scotland Yard’s third investigation into phone hacking – to see records showing she was targeted by Glenn Mulcaire, the private detective employed by the News of the World to eavesdrop on the voicemails of numerous public figures.

The alleged hacking took place between 2005 and 2006, when Ms Brooks, who is also a former editor of the NOTW, was in charge of The Sun, and raises the question of whether Mr Mulcaire was at the centre of an effort by Britain’s top-selling Sunday newspaper to spy on its daily stablemate.

The revelation that Ms Brooks was a likely repeated target for Mr Mulcaire was made by Sky News, whose largest shareholder is Mr Murdoch’s News Corp. In a blog, the broadcaster’s City editor, Mark Kleinman, suggested the hacking could also have been done by the private investigator on behalf of a rival newspaper.

Before his arrest in August 2006, Mr Mulcaire was employed on an exclusive contract with the NOTW worth ÂŁ104,000 a year to supply “research and information services”. No evidence has been produced to show that the amateur footballer-turned-private detective was working for titles outside News International.

The reason why Ms Brooks, who edited The Sun between 2003 and 2009, had her voicemails intercepted was unclear, though she became the subject of media interest in her personal life in November 2005 when she was arrested for an alleged assault on her then-husband, the actor Ross Kemp. She was released without charge.

Sky News reported that legal advisers to the News International chief executive, who has always denied any knowledge of phone hacking, were considering whether to apply for a court order requiring the Yard to hand over copies of the evidence found in Mr Mulcaire’s documents.

A News International spokeswoman said: “We can confirm that Rebekah Brooks was recently shown documents by the police that proved she was a victim of illegal voicemail interception.” It was unclear last night whether Ms Brooks would consider joining the list of high-profile individuals suing the NOTW for breach of privacy.

In a sign that the revelations may be damaging Mr Murdoch’s popularity, it appears his annual summer party is no longer the hot ticket it used to be. As the media mogul stands on the verge of achieving his dream of taking complete control of the BSkyB satellite broadcasting empire, an invitation to last night’s grand bash at the ornate Orangery, in the grounds of Kensington Palace, west London, drew more refusals than acceptances.

The Culture Secretary, Jeremy Hunt, who is set to announce whether the BSkyB deal can go through, has decided not to attend the party for fear that his presence might be misinterpreted. His colleague Ed Vaizey, the Culture minister, is also expected to be give it a miss. Liberal Democrat MPs, who attended in strength with Nick Clegg last year, are also likely to be conspicuously absent as the parliamentary party is attending an annual away day.

The Independent understands the event was also expected to be less star-studded than in previous years. Downing Street would not confirm whether David Cameron was attending, as he did last year with his wife, Samantha.


Internet espionage on the rise, says CSIS

Cyberattacks waged via the Internet are the fastest growing form of espionage, Canada’s spy agency says.

The Canadian Security Intelligence Service also warns that the energy, financial and telecommunications sectors are becoming increasingly vulnerable to attack.

In its annual public report, CSIS says it investigated threats against critical systems last year by foreign countries, terrorists and hackers.

 

Internet-based tools and techniques offer a secure and low-risk means of conducting espionage, the spy service says.

“Increasingly, cyber-related tools and techniques have been added to the methods utilized by hostile actors to attack public- and private-sector systems,” says the report tabled Monday in Parliament.

“CSIS focuses its investigations on politically motivated threats or incidents where the integrity, confidentiality or availability of the critical information infrastructure is affected.”

Internet access at the Treasury Board and Finance departments was cut off in January after what officials called “an unauthorized attempt” to break into their networks.

A routine assessment of both departments last year revealed they had not been following all of the government’s information technology security requirements.

CSIS is aware that certain foreign agencies are conducting intelligence operations within Canada, the service’s director, Dick Fadden, says in a foreword to the report released Monday.

The spy agency did not respond to a request to interview him.

In a speech last year, Mr. Fadden said state-sponsored espionage against Canada was being conducted at levels equal to or greater than during the Cold War.

Canada is attractive to foreign spies because it’s an innovative leader in areas such as agriculture, biotechnology, communications, mining and the aerospace industry, he said.

“Certainly, China has often been cited in media reports as an example of a country that engages in such activity but it would not be exclusive to that country. Just as the Internet is global, so is the cyber threat,” Mr. Fadden said.

Attackers target computer systems to acquire technology, intellectual property, military strategy and commercial or weapons-related information, as well as details of national strategies on a variety of domestic and foreign issues, the CSIS annual report says.

It cites public information describing the use of botnets – networks of compromised machines that can be purchased or rented by potential attackers – as well as rogue e-mails, Twitter and other social networking services to launch attacks.

“CSIS is aware that this cyber-based variant is the fastest growing form of espionage, that the threat of cyberattacks is one of the most complicated issues affecting the public and private sectors and that attacks on the latter have grown substantially and are becoming more complex and difficult to detect.”

The report notes that terrorists and other extremists use online resources – including e-mail, chat rooms, instant messaging, blogs and video-sharing sites – to plan, co-ordinate and execute operations.

“The cyber-related capabilities of various extremist groups have been publicly described as limited at present, but their abilities are developing and evolving,” the report says.

“This was not a concern in the early days of CSIS as there was no broad, worldwide use of the Internet to speak of. Communication between individuals and groups that were targets or persons of interests was much more difficult than it is today and much easier for organizations such as ours to track.”

Terrorism, primarily Islamist extremist violence, remains the greatest threat to the safety and security of the West, including Canadians, adds the report.


Researchers Successfully Eavesdrop On Quantum Encrypted Communications

The Conversation

Image via Wikipedia

A team of quantum cryptography researchers from Singapore and Norway have managed to eavesdrop on a communication that was encrypted by quantum key distribution (QKD) without being detected.

QKD is one variety of quantum cryptography, and is probably the most well known. In a nutshell, a communication encrypted by QKD is one where both the sender (known in the literature as “Alice”) and the receiver (“Bob”). Like the most common encryption protocol used today, public-key encryption, QKD relies on electronic “keys” to decrypt messages sent back and forth between Alice and Bob. In public-key encryption, the keys are very large prime numbers, which are difficult to current computers to calculate and determine through brute force.

In QKD, the key is actually in the form of stream of photons, where each photon consists of one bit of information about the key, depending on the photon’s state. In theory, this would prevent an eavesdropper (“Eve”) from breaking into the communication, because the very act of Eve trying to measure the state of the photons will actually change their state. That change would enable Bob and Alice to know that Eve was trying to listen in on their conversation, and also prevent Eve from obtaining the complete key.

In practice, however, this has turned out to be more difficult, due to the physical limitations of a QKD system. This has enabled several successful attacks on QKD systems, including the ability of Eve to obtain the key and listen to the communications. However, all of these methods still introduce some errors into the communcations and key receptions, meaning that it’s possible for Alice and Bob to notice the eavesdropping and act accordingly.

The researchers at the University of Singapore, however, have managed to go one step further — they’ve developed a method of producing a full exploit of a QKD system that allows for Eve to eavedrop on Alice’s and Bob’s communication — without introducing enough errors to allow her to be detected. Her eavesdropping appeared to be no different from the random background errors that are inevitable in the physical implementation of a QKD system.

Although the researchers were able to infiltrate this system with basically off-the-shelf parts, it’s worth noting that this exploit doesn’t mean that QKD isn’t a viable method of encryption. The researchers themselves suggest several countermeasures, and no doubt other countermeasures will be developed as this research continues. As the researchers themselves note: ”a more pointed question is what problems still lurk unnoticed in the gap between the theoretical description and the practical systems. Just as in classical cryptography, an ongoing search for backdoors is required to build hardened implementations of quantum cryptography for real-world use.”

Quantum cryptography is still in its infancy, but it’s still more than likely the future of encrypted communications once its been further refined and developed.


Murdoch chief’s phone ‘hacked by private eye’

Rebekah Brooks.

Rebekah Brooks. Photo: Reuters

THE chief executive of Rupert Murdoch’s News International has been shown police evidence revealing that her voicemail was repeatedly hacked by a private investigator employed by one of the company’s newspapers.

The Independent last night reported that News International confirmed the 43-year-old media executive Rebekah Brooks met Metropolitan Police detectives last week to see records showing she was targeted by Glenn Mulcaire, the private detective employed by News International’s Sunday tabloid News of the World to eavesdrop on the voicemails of numerous public figures.

According to The Independent, the alleged hacking took place between 2005 and 2006, when Ms Brooks, who is also a former editor of the News of the World, was in charge of The Sun.

She became the subject of media interest in her personal life in November 2005 when she was arrested for an alleged assault on her then husband, actor Ross Kemp. She was released without charge.

The revelation that Ms Brooks was a likely repeated target for Mr Mulcaire was first made by Sky News, whose largest shareholder is Mr Murdoch’s News Corporation. Mr Murdoch is in London to attend a company board meeting.

The company’s shareholders and non-executive directors are believed to be concerned about the way the hacking affair has been handled by Mr Murdoch’s London lieutenants.

Three News of the World journalists have been arrested since the Metropolitan Police reopened its inquiry into the claims.

The Met’s original inquiry into the practice led to the conviction of NOTW royal editor Clive Goodman and Glenn Mulcaire in 2007.

A Manchester United footballer is the latest high-profile figure to sue the Murdoch tabloid for breach of privacy, claiming that his mobile phone messages were intercepted by journalists working for the paper.

Ryan Giggs has begun legal proceedings against the tabloid and Mulcaire over the phone hacking.

Scotland Yard, which is investigating multiple claims that NOTW staff hacked into the voicemail messages of celebrities and politicians, would not comment on the cases of either Ms Brooks or Giggs.

Actress Sienna Miller was last week awarded ÂŁ100,000 ($A153,810) damages at London’s High Court after bringing a privacy and harassment claim in connection with the NOTW‘s phone-hacking action.

Other well-known figures said to have been victims of mobile phone message hacking include actor Jude Law, former prime minister Gordon Brown, ex-footballer Paul Gascoigne and comedian Steve Coogan.

PA, GUARDIAN, AGENCIES


Cyber espionage a serious threat: AG

Attorney-General Robert McClelland.

Attorney-General Robert McClelland. Photo: Marco Del Grande

Cyber espionage and foreign interference pose serious threats to Australia’s national security, the federal attorney-general says.

“The next ten years will undoubtedly see a marked intensification of this activity,” McClelland told a Sydney summit discussing the decade since the attacks of September 11, 2001.

McClelland pointed to recent prominent cyber attacks such as Ghostnet, which infected computers belonging to the office of the Dalai Lama and Stuxnet which brought Estonia to a virtual standstill.

“These attacks and the threat to critical infrastructure such as banking, telecommunications and government systems is not something we can be complacent about,” he said yesterday.

The Australian government has made cyber security a top national security priority and is investing to significantly enhance Australia’s cyber security capabilities, he added.

The global and interconnected nature of the internet means the threat extends beyond nations.

“For this reason it is critical that laws designed to combat cyber threats are harmonised, or at least compatible to allow for international cooperation,” McClelland told the conference hosted by the United States Studies Centre.

The government is seeking to strengthen international arrangements by moving to accede to the Council of European Convention on Cybercrime.

This is the only binding international treaty on this “significant threat”, he said.

“[Accession to the convention] will help Australian agencies to better prevent, detect and prosecute cyber intrusions.”

AAP