Feed Aggregator Page 6

Rendered on Tue, 27 Dec 2016 12:30:13 GMT  newer latest older 

Friday Squid Blogging: Squidmas Cards

via Schneier on Security by Bruce Schneier on Fri, 23 Dec 2016 22:55:20 GMT

Merry Squidmas. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Rogue One: The Best Star Wars Yet?

via Emergent Chaos by adam on Fri, 23 Dec 2016 19:02:07 GMT

Someone once asked me why I like Star Wars more than Star Trek. I was a bit taken aback, and he assumed that since I use it so much, I obviously prefer it. The real reason I use Star Wars … Continue reading

Russian Military Using Smart Phones to Track Troop Movements

via Schneier on Security by Bruce Schneier on Fri, 23 Dec 2016 14:46:57 GMT

Crowdstrike has an interesting blog post about how the Russian military is tracking Ukranian field artillery units by compromising soldiers' smart phones and tracking them. News article....

NIST is Continuing to Work on Post-Quantum-Computing Cryptography Standards

via Schneier on Security by Bruce Schneier on Fri, 23 Dec 2016 12:39:19 GMT

NIST is accepting proposals for public-key algorithms immune to quantum computing techniques. Details here. Deadline is the end of November 2017. I applaud NIST for taking the lead on this, and for taking it now when there is no emergency and we have time to do this right. Slashdot thread....

The legacy of demonetisation: how India’s cashless future threatens to erode citizens' privacy 

via News by editor on Thu, 15 Dec 2016 13:45:07 GMT

Date: 
Thursday, December 15, 2016

The move to digital payments, without an adequate legal framework, is a double-blow to privacy. India is proving to be the case study of how not to do the move to the cashless society. We are seeing in India the deeper drives to digital: linking financial transactions to identity. On the 8th November, Prime Minister Modi of India announced that 500 and 1,000 rupee notes – 86% of the money supply – would be removed from circulation. The initial justification for this was to tackle the proceeds of corruption: the measure was initially described by a minister as a “surgical strike” against black money in the economy. 

Whether you’re in agreement with Modi’s motives or not, you have to agree that the impact of this measure was far from precise. Even for those least affected, queues outside of banks for changing money or withdrawals last for hours. It’s the hardest on the elderly and the sick – there are claims that over 100 people have died due to demonetisation. There are reports than one woman gave birth while in the bank queue. A woman set herself on fire after trying for three days to change the old 500 rupee notes that were the only money her family had.

Reports from the cities are harrowing enough, yet reports from rural areas are even worse: even in those villages lucky enough to have a bank, rural branches have been slow to receive cash. Rural prices have collapsed, workers have gone weeks without pay. Women looking to build a safety net, away from their husband’s knowledge, have seen years of savings suddenly become worthless. No matter whether they still support Modi’s decision or not, for many people the experience of demonetisation has been brutal.

The motives for demonetisation will continue to be debated at length. The discourse is not only the fight against “black money” towards Modi’s long-held goal of achieving a cashless society. Prior to demonetisation, Modi made clear his desire of achieving a cashless society in India, through what is referred to as the JAM trinity. This acronym refers to the accessible and poor-focused Jan Dhan bank accounts; the Aadhaar biometric identity scheme that has already enrolled over a billion people; and mobile, referring to apps and mobile Internet. After demonetisation, Modi emphasised his goal to move towards a less-cash, and eventually a cashless, society. Demonetisation, as Modi put it, “is the chance for you to enter the digital world”.

A problem with this position is that cash is not the burden to a modern, digital economy that its enemies describe. For example, a belief that cash is holding back eCommerce in India is mistaken. Prior to demonetisation, businesses running online services in India adapted to the prevalence of cash in the economy: Uber in India enables cash payments, online retailers have Cash on Delivery as an option. This approach has borne fruit for those in the eCommerce sector. A recent report by The Fletcher School on the digital future of commerce around the world found that, far from stifling the sector, the prevalence of cash in economies including India, Indonesia and Colombia still enables a fast rate of innovation in eCommerce.

Despite this, as the demonetisation shows, the push for the cashless society continues. Demonetisation is not going to be the last move towards eliminating cash from the economy. A government think-tank has suggested increasing the cost of cash transactions. The “war on cash” is far from over. 

This move towards cashless society is being made without the necessary safeguards being put in place to regulate such a system and to protect citizens and their data. When we use cashless payments, we are potentially giving the payment processor a large amount of our data: not only where we’re buying, but from who, where and when. Further to that, think what can be learnt through an analysis of our spending: the shops we shop in, and what we buy and when. It gives a clue to our religion, where we spend our time – and even our worldview. Without the necessary data protection and other sectorial regulations, and the enforcement of those regulations, this leaves us open to exploitation. In the India, the lack of these regulations is combined with a model that is looking to monetise this data.

In India today, the options available for most citizens to pay cashlessly are limited to institutions that are increasingly looking to monetise citizen’s data – and it is not likely that the situation will be improving into the future. What options are available to Indians? Mobile wallets, usually accessed via a smartphone app, are one of the most common. The market leader is Paytm. This means you can pay at many – but by no means all – shops. Its mobile app offers a vast array of options that allow you to pay your electricity bill, book a flight, and buy products from socks to iPhones. Paytm is also looking to reach a broader audience: it recently introduced the option to pay at retailers through a phone call for people and places that lack a smartphone or Internet access. Thus, the amount of data that the mobile wallets are gathering about an increasingly broad user base is immense. Paytm is 40% owned, and reportedly has a very close working relationship with, the Chinese giant sales service Alibaba.

 

Demonetisation has resulted in a windfall for mobile wallets. Since demonetisation started, Paytm has been signing up half a million new customers daily. Sadly, the wallet companies are not always treating this sudden windfall with good grace, considering how millions of Indians are suffering from the shortage of cash. Take, for example, this billboard from the mobile wallet provider JioMoney:

 

Similarly, Paytm ran a campaign on Twitter, “Ab ATM nahi, Paytm karo”(No ATM, use Paytm). They also ran a TV advert with the tagline “Drama band karo, Paytm karo”, (Stop the drama, use Paytm), although this was revised. These approaches show a staggering lack of sensitivity when it comes to so much of India suffering under the burden of demonetisation.

But the problematic use of data is not limited to mobile wallets, it is also embedding itself within the banking sector. An alternative to mobile wallets, which may one day replace them, is the Unified Payments Interface (UPI). This enables the transfer of money between bank accounts via an app, if you know a unique identifier for that person such as a mobile or Aadhaar identification number. Yet the goal of UPI isn’t just to facilitate payments, it is also looking to take advantage of people’s data. At the moment, the costs of transferring money are borne by the consumer. But it is the hope of those behind UPI that this will change. Nandan Nilekani, former chair of the authority behind Aadhaar and an advisor to the National Payments Corporation of India that develops UPI, described the future in a report by Credit Suisse: “as data becomes the new currency, financial institutions will be willing to forego transaction fees to get rich digital information on their customers.” The goal of UPI is thus not merely to facilitate payments, but there is also the awareness of the value of people’s data, for example to sell services or to offer credit. As UPI develops further in the future, there is no wonder it was praised by Credit Suisse as helping “financial providers move from being data poor to data rich”. This has the potential to open-up new markets, but it is being done without little protection for the consumer and their data.

The available alternatives to cash for Indians, in the context of the limited protection available in India, all put their privacy at risk. Yet demonetisation has left many with no choice but to turn to the private entities looking to exploit their data. This is not a question of tax avoidance, criminality, or black money. Our financial transactions often stand as markers of the most intimate moments in our lives: the gift on our anniversaries, the medicine for a sick child. These intimate details are all there within our data. Taking away cash is taking away the choice that a person might make to keep these details private; taking away their agency, removing their autonomy and threatening their dignity. We may very well come to see the erosion of privacy as the legacy of demonetisation in India.

Feature Reference: 
Big Data
Communications surveillance
Data Protection
Mass Surveillance
Challenging Data Exploitation
Dr Tom Fisher
Written by: 

Social media intelligence, the wayward child of open source intelligence

via News by editor on Wed, 14 Dec 2016 18:01:52 GMT

Date: 
12 December 2016

This piece originally appeared in the Responsible Data Forum.

Would you mind if, every time you post a comment on Twitter, Facebook or another social media platform, the police logged it? I mean, it’s public — surely it’s fair game?

If you think that’s OK, then maybe it’s also OK for a police officer to follow you when you walk down a busy street. That’s also public, right?

Clearly, definitions of public and private become very problematic when you are communicating with potentially thousands of people online. The question becomes:

Are our social media posts ‘open source’ and therefore ‘open season’?

Although often conflated, Open Source Intelligence (OSINT) and Social Media Intelligence (SOCMINT) are distinct:

  • OSINT is intelligence collected from publicly available sources, including the internet, newspapers, radio, television, government reports and professional and academic literature.
  • SOCMINT can be defined as “the analytical exploitation of information available on social media networks”.

Evanna Hu is right to identify areas of concern in the use of OSINT. However, Privacy International suggests viewing SOCMINT as a distinct concept. The surveillance of social media should be removed from the definition of, and discussion about, OSINT. Instead, it should be treated as an issue its own right. This would ensure more specific regulation, policies and safeguards that take into account the very unique and specific nature of social media: a privately-owned space (i.e. owned by private companies) where people share their thoughts.

It is through social media that we express our views, our opinions and our sense of belonging to communities. To permit unconstrained monitoring of social media by the police and intelligence agencies is to give them a deep understanding of our social interactions, our politics, our habits, our location and our daily lives, even if we are not suspected of any wrongdoing whatsoever.

In her analysis, Hu identifies some key concerns relating to OSINT: the volume and reliability of data; the sensitivity of information; and the ability to identify individuals despite their attempts at anonymisation. These concerns are also relevant to SOCMINT. However, the ability to monitor millions of social media accounts and hashtags in real time, and to then analyse and store this data, is a concern unique to social media.

We need to challenge the argument by law enforcement agencies that this is an inexpensive strategy with little impact on people’s privacy because it relies only on so-called publicly available (i.e. non-private) information. This public/private distinction is deeply problematic. It is arguable that a tweet is not private because, by it’s nature, you cannot control its audience. However, that does not automatically make it public, or within the purview of the police. Social media does not easily fit into either the category of public or private. We would argue that it is instead a pseudo-private space, where there is an expectation of privacy from the state.

Examples of the use of SOCMINT have often come to light as a result of freedom of information requests and campaigning rather than government transparency. What is remarkable is that the consequences traditionally associated with mass surveillance of communications — such as self-censorship, targeting of certain ethnic groups, clamping down on political opposition — also apply in the context of SOCMINT.

A study from the Norwegian Board of Technology asked Norwegians if police should be monitoring open social media platforms. 40% of respondents thought they should, but 40% also said it would stop them from using words that they would expect to be monitored.

Examples of companies and law enforcement using social media to profile us are increasing on a near-daily basis:

  • The website Score Assured illustrates well the drift towards dystopian methods of gathering evidence in the use of SOCMINT by private companies. The startup aims to create a tool for landlords and employers to check the profile of their prospective tenants and employees based on their social network activity. After requesting consent from the prospective tenant or employee (which they might feel compelled to give if they want that apartment or that job), the software gathers all the information from their social media accounts and makes assessments about the reliability of a person.
  • In a disturbing example of potential consequences of use of SOCMINT, the company ZeroFOX monitored #BlackLivesMatter protesters during the funeral of Freddie Gray, a 25 year-old African American who died in police custody. Based on their social media analysis, they produced a report labelling organisers so-called ‘threat actors’ for whom ‘immediate response is recommended’.
  • In Mexico and North Dakota, law enforcement agencies used bot attacks on the hashtags used by activists on Twitter in order to to undermine protest and dissent.
  • In China, the social credit network platform Sesame assigns scores to Chinese citizens for their ‘trustworthiness’. This is based on their personal data, including what they purchase online and what they post on social media. Their Sesame score will also be affected by who their friends are; their score can be dragged down if their friends are ‘performing’ poorly on Sesame. The score is then used, not just as a credit score, but also to determine if they are entitled to social services, and by employers and landlords to assess whether they are a suitable employee or tenant. From 2020, the Chinese government plans to enrol all Chinese citizens in a database that is likely to include information collected using similar methods to Sesame.

With little information about how monitoring tools are used, we cannot effectively assess the risks of discriminatory practices and targeting of minorities.

If people’s social media interactions are monitored by an endless list of external entities, even with the consent of the user, this could result in reduced social media interaction due to the chilling effect of such surveillance. People will curate their social interactions to manipulate the system, rather than expressing themselves freely. It could also result in a system of social and political control where people are expected to behave in a compliant manner because their social, economic and government records will be based upon that behaviour.

We believe that it is wrong to think that, because social media data can be accessed by non-validated contacts, this somehow makes data ‘fair game’. We note the European Court of Human Rights have long held that “there is […] a zone of interaction of a person with others, even in a public context, which may fall within the scope of “private life.” [1]

We urgently need a public discussion about the rights of law enforcement agencies, government and companies to monitor us and make life changing decisions based on our social media posts. The first step is identifying social media intelligence as an issue in and of its own right.

Our social media interactions should not be considered totally public and without limits for law enforcement agencies, intelligence agencies and insurance companies. Instead we need strong regulation to ensure that our social interactions — whether having a coffee with a close friend, or an update to 500 friends on Facebook — remain a private matter.

[1] [Peck v. the United Kingdom, no. 44647/98, § 57, ECHR 2003‑I; Perry v. the United Kingdom, no. 63737/00, § 36, ECHR 2003‑IX (extracts); and Köpke v. Germany (dec), no. 420/07, 5 October 2010).]

 

How to Bridge the Gap? Corporate and Government Surveillance Examined at the UN

via News by editor on Wed, 14 Dec 2016 17:53:11 GMT

Date: 
7 December 2016

This piece was originally published on EJILTalk, the website of the European Journal of International Law.

On 21 November, the UN General Assembly Third Committee adopted the draft resolution on the right to privacy in the digital age. This came at the same time the UK passed a law (the Investigatory Powers Act) which codified what are arguably the most extreme surveillance powers in the history of any western democracy.

This is the third time the UN General Assembly has adopted a resolution on the topic, and as it did in 2014, the UN has called on all states to review their surveillance legislation, policies, and practices “with a view to upholding the right to privacy by ensuring the full and effective implementation of all their obligations under international human rights law”.

This comes at a time in which governments around the world are adopting laws that give wider surveillance powers to state security agencies, beyond what is permitted under existing human rights law. Just to name a few, Privacy International had documented this trend in a range of countries, including in China, Colombia, France, Kenya, the Netherlands, Pakistan, Poland, Switzerland, and the United Kingdom.

So, which part of effective implementation of human rights law do governments need explained?

The past couple of years have seen a sharp increase in the scrutiny of surveillance laws and practices by human rights bodies, such as the UN Human Rights Committee. These bodies have developed analysis, raised concerns, and made concrete recommendations for reform. Governments no longer have the excuse that international human rights law does not provide a clear and universal framework for the promotion and protection of the right to privacy.

As the gap between States’ legal (and technological) capabilities and the applicable international human rights standards continues to grow, questions arise about companies and their increasing capabilities to generate, collect, process, and use personal data. In a very welcome development, the UN General Assembly draft resolution addresses the role of companies and the responsibilities of governments to regulate them, including by enacting effective data protection law.

The draft resolution urges companies to establish transparency policies. This step is fundamental: information on how companies collect, process, store, and share customer data, often remains unclear, opaque, or out-of-date. Users are not fully informed about what happens to their data, and often have no meaningful choice in controlling where their data is sent around the world, other than opting out of the digital platforms which are increasingly becoming the locus of economic and social life.

And companies, particularly telecommunication and internet service providers, often play a central role in facilitating surveillance, whether building and configuring telecommunications networks, selling surveillance technology, complying with requests for customer data, or monitoring social media. The resolution begins to address this, although the language adopted is still very cautious as not to upset the secrecy of state surveillance. So the General Assembly only goes as far as recommending states “to consider appropriate measures that would enable business enterprises to adopt adequate voluntary transparency measures with regard to requests by State authorities for access to private user data and information”.

Similarly, the draft resolution timidly approaches the issue of securing privacy of communications. While the final text adopted by the UN does not include specific reference to encryption and other privacy protection tools, it encourages companies to enable secure communication in their networks to protect against unlawful interception.

In summary, the draft resolution offers an important re-statement of the human rights framework that applies in assessing state surveillance measures, and it provides the building blocks to further develop a human rights analysis of the responsibilities of companies to respect the privacy of individuals. The General Assembly also suggests a concrete next step at the UN level, asking the Human Rights Council to convene an expert workshop with a view to contribute to a new report on the topic by the High Commissioner for Human Rights.

The draft resolution adopted by the Third Committee will be voted on by the plenary of the UN General Assembly in the next few weeks. Privacy International calls on all states to support this resolution

New investigation reveals Syria’s mass surveillance ambitions and the shadowy Western surveillance companies that profit from it

via News by editor on Wed, 14 Dec 2016 16:57:11 GMT

12 December 2016

Privacy International has today published an investigation, which sheds light on the shady deals that built Syria’s surveillance state and the role Western companies have played in its construction. The investigation also shows how Western surveillance companies seek to exploit loopholes to do business with repressive states.

Key points:

  • Technical specifications acquired by Privacy International reveal the Syrian government’s ambitious mass surveillance projects, including a nationwide voice printing project, content filtering, mobile phone surveillance, and IP monitoring at international gateways;
  • Surveillance companies based in Italy, France, Germany, the UAE, and South Africa attempted to sell, and in some cases succeeded in selling, mass surveillance equipment to the Syrian government, facilitating the construction of surveillance systems in that country;
  • A partnership of two surveillance companies, Advanced German Technology operating out of UAE and Italian-headquartered RCS, proposed the use of US-origin equipment in a surveillance project in Syria in 2008–2009, at which time US sanctions and export control regulations restricted the export of certain US-origin goods to Syria, including equipment used for communications interception;
  • The investigation also demonstrates how surveillance companies seek to exploit regulatory loopholes.

The full report is available here: https://privacyinternational.org/node/1009

Media contact: Privacy International +44 (0) 20 3422 4321 and press@privacyinternational.org

Syria

Advanced German Technology (AGT), a Dubai-based company with a letterbox office in Berlin, enabled the construction of surveillance systems in Syria and further afield over a decade leading up to the Arab Spring. In the years leading up to the revolts, regional governments spent millions of dollars developing sophisticated surveillance systems which were used against their citizens. The Syrian government was building a nationwide communications monitoring system between 2007–2012. Privacy International obtained technical specifications and capabilities of four surveillance projects, which are revealed for the first time in the new report. These included: mass internet protocol traffic monitoring at international gateways, content filtering based on specific key words, nationwide phone communications monitoring, and a project to monitor communications over a major satellite internet provider. The Syrian government also sought a solution for caller identification that relied on voice printing Syrians.

In the satellite internet monitoring project, Advanced German Technology operating out of UAE, in a partnership with Italian-headquartered RCS proposed the use of US-origin equipment in a project to intercept communications. Documents also appear to reveal that AGT was prepared to sell probes from US technology firm AccessData to one of Syria’s two mobile service providers, MTN Syria. At the time, the exportation or re-exportation of such US-origin equipment to Syria without a license was restricted by US sanctions and export control regulations. All company responses, which respond to specific statements made in the report and were received before publication of the report, are included as annexes to the report.

Libya

The investigation also highlights the use of middlemen companies in the business of selling surveillance equipment. The investigation details one example where AGT facilitated a contract for the Libyan government of Colonel Muammar Gaddafi on behalf of South African surveillance company VASTech.

The lead up to the Arab Spring was open season for surveillance companies — they provided technologies to eager government clients widely known to be publicly engaged in repression. This new investigation documents how behind the scenes deals appear to be commonplace and accepted among surveillance companies.

Further context

Italian law enforcement authorities have recently raided the offices of a surveillance company discussed in the report as part of an investigation into whether or not it broke EU sanctions on Syria. They have also recently decided to allow the same company, Area SpA, to export a mass internet surveillance system to Egypt, where an investigation into the torture and murder of Italian student Giulio Regeni is still under way, and where police recently admitted to spying on Regeni prior to his murder. According to a recent PI investigation, the unit to which Area SpA has been allowed to sell the internet surveillance system, the Technical Research Department, is a shadowy unaccountable government intelligence agency responsible for implementing Egypt’s surveillance apparatus, and has procured equipment from numerous European countries.

PI is calling on Italy and other EU countries not to export surveillance equipment which is used in violations of human rights. On the day of the launch of the report, Privacy International will be speaking to over 250 government representatives and industry lobbyists in Brussels, discussing amendments to the EU export control regulation recently proposed by the European Commission. Privacy International, other NGOs, and parliamentarians have been calling for the EU to ensure human rights safeguards over the trade in surveillance technology since the Arab Uprising exposed how European companies had been selling sophisticated surveillance technology to security units in authoritarian regimes complicit in human rights violations. A recent report by Privacy International charting the development of the surveillance industry found that over half of the 528 surveillance companies it has identified worldwide are based in the EU.

The full report is available here: https://privacyinternational.org/node/1009

Privacy International Research Officer Edin Omanovic said:

“At a time when Syria’s security agencies were known to be repressing civilians, western companies were happy to cash in by providing them some of the most sophisticated surveillance kit available. They were aided by a complex web of intermediaries and accomplices, and the complete absence of any safeguards stopping them.

Sadly, little has changed since then. The demand for surveillance is still happily being met by a willing industry keen to profit from empowering repression.

After years of external pressure, the EU is currently considering whether or not to try and put limitations on the trade. This report serves as a reminder of why.”

 

END

 

Building Syria’s surveillance state: new Privacy International investigation launched today

via News by editor on Wed, 14 Dec 2016 15:58:10 GMT

Date: 
12 December 2016

The investigation was done with the assistance of Netzpolitik.

The Arab Spring of 2011 transformed the political landscape of the Middle East and Gulf. The scale of the popular uprisings seemingly caught off guard the governments of Syria, Egypt, and Libya among others, leading to brutal crackdowns, civil wars and instability that continue to this day.

Yet in the years leading up to the sweeping civilian revolt across the region, these governments spent millions of dollars developing sophisticated surveillance systems that they deployed against their citizens.

Today, Privacy International launches a new investigative report, Open Season: Building Syria’s Surveillance State, based on hundreds of original documents and pieces of correspondence related to the surveillance trade in this region leading up to and during the Arab Spring. Among these documents is evidence of the Syrian government’s ambitious plans and projects to monitor the national communications infrastructure, the technical details of which are revealed for the first time.

From 2007–2012, the Syrian government built nationwide communications monitoring systems through at least four ambitious projects, the technical specifications of which are revealed in this report. Western businesses, including RCS SpA (Italy) and VASTech (South Africa), were important contributors to Syria’s repressive surveillance state and other companies, including Amesys (France), competed for the opportunities on offer.

This report also examines the vital role of middleman companies in the surveillance trade. These companies act primarily as resellers, brokers, logistics coordinators, and intermediaries between the surveillance technology manufacturers and their clients. They court and secure clients on the ground, smooth over logistical difficulties, and provide other services for a percentage of the total profit. This report closely examines one such company, Dubai-based Advanced German Technology (AGT), in supporting the construction of surveillance systems in Syria and further afield in the decade leading up to the Arab Spring revolts of 2011 and 2012.

In one transaction from 2008 and 2009, RCS and AGT proposed the use of US-origin equipment in a project to intercept the communications networks of a satellite internet service provider, Aramsat, according to documents analysed by Privacy International. US sanctions and export control regulations in force at the time of this project restricted the exportation or re-exportation of certain US-origin goods to the country including communications interception equipment. All responses related to the statements in the report received by PI by the time of publication are included in the annex of the report.

The Syrian government of president Bashar Al-Assad was intensifying its repression against dissidents and opposition groups at the same time as it was consolidating its surveillance capacities. Surveillance by both human and technological means was an important contributor to the repression that culminated in the 2011 crisis and ensuing civil war. To date, Al-Assad’s government reportedly continues to maintain control over access to the internet and broadband, and some of the surveillance architecture from these projects remains in place. The roles of several Western companies including AREA SpA (Italy) and Qosmos (France), who have been identified as selling surveillance technology to Syria have been the subject of inquiries in the US and France, respectively.

Neighbouring governments engaged in repression of domestic political dissent also purchased similar technologies. AGT facilitated a particularly lucrative contract for the Libyan government of Colonel Muammar Gaddafi on behalf of South African surveillance company VASTech through a complex web of consultants and companies. Funds from this single-most profitable project financed much of AGT’s affairs.

The lead up to the Arab Spring was open season for surveillance companies — they provided technologies to eager government clients widely known to be publicly engaged in repression. They should share some responsibility for how their technologies are used.

Privacy International calls on export authorities to make all exports of the surveillance technologies discussed in this report conditional on rigorous, independent human rights impact assessments, so as to minimize the potential that these technologies will be abused.

Switching hats: why South Africa’s surveillance industry needs scrutiny

via News by editor on Wed, 14 Dec 2016 10:29:02 GMT

Date: 
Wednesday, December 14, 2016

In July 2015, representatives of a private company met in a parking lot in Pretoria, South Africa to sell phone tapping technology to an interested private buyer. What they did not know was that this buyer was a police officer. The police had been tipped off that the company was looking to offload the surveillance technology, an IMSI catcher, to anyone who would buy it. It is illegal to operate such surveillance technology as a private citizen in South Africa, and illegal to buy it without a government license.

There has been an uncomfortable increase in the powers of private security companies to conduct surveillance and sell surveillance technologies, particularly as the South African government has proved incapable to control them. Not that it does not try. “Investigat[ing] and counter[ing] espionage activities by the private security industry” is a top national intelligence priority of the State Security Agency (SSA), according to a 2014 document obtained by the Daily Maverick

The South African government admits having difficulty controlling the proliferation of private security companies. Meanwhile, former intelligence public servants are running private companies that provide communications interception equipment. Some of these are actively seeking business from mining companies. How close is too close?

Switching hats

Answering this question requires taking a look at South Africa’s surveillance industry, and its actual and prospective clients.

The former Head of Technical Intelligence Collection for the National Intelligence Agency, Manala Manzini runs Afrint Solutions. The company specialises in “electronic monitoring” and has exhibited at ISS World, the biggest international surveillance trade show. Manzini concurrently runs a “risk management” company that advises on security, in addition to his surveillance tech work. 

Afrint shares an address with another surveillance tech firm, iSolv Technologies. They share a director, as well – Jayesh Nana, former Chairperson of the Technical Committee of the Office for Interception Centres (OIC), the centralised interception service for South African law enforcement. Nana has directed iSolv since 2004. 

The OIC was an early client of iSolv Technologies. What division, if any, is there between this private company and the government’s communications interception agency? When campaign group Right2Know contacted the OIC about its capacities, they were referred instead to an iSolv employee.

Afrint and iSolv Technologies, two South African surveillance technology providers linked to former intelligence officials, share an office in this Johannesburg office park. Image: Google Maps.

There is no evidence that any of the companies discussed here engaged in illegal activity. Nevertheless, it is little wonder that South Africa’s SSA prioritizes monitoring the intelligence activities of private security companies.

Mining the mining market

August 2012, Marikana, South Africa: miners working for platinum mining group Lonmin launch an unauthorized workers’ strike to demand better pay. The ensuing month-long fight involved the miners’ union, the strikers, the South African Police and security forces. By the time negotiations ended, 44 persons had been killed, most of them workers. Some had been shot in the back. Four years later, it was revealed that the foremost representative of Lonmin during the Marikana strike was a covert agent of the SSA.

There have long been calls to shut the revolving door between the mining sector and government. Sensible environmental and labour safeguards cannot work unless senior decision makers are free of conflicting interests, activists argue. But this revolving door is less of a door and more of a merry-go-round when you throw private security companies into the mix.

It goes like this: a public intelligence official holds private assets in the mining industry, as a shareholder or director. Then he or she starts a security firm once leaving public service. He or she still holds interests in mining companies. Then, his or her security firm markets its private security and surveillance services as business intelligence to mining companies of the type in which he or she may still have assets. And mining companies make particularly attractive clients.

Foresight Advisory Group is a good example of this phenomenon. Foresight bills itself as a “fusion intelligence firm”; they offer to gather intelligence on internal and external rivals for companies. In 2015, Foresight CEO and former intelligence official Mthuthuzeli Jacob Madikiza went hunting for business at the African Mine Security Summit in Johannesburg, delivering a key note and sponsoring the event with a clear message that his company “has the tools and experience to minimise risk and make mining profitable.” In one pitch to the media, Njenje stated his case clearly: “If companies like Lonmin had advisers like Foresight perhaps they could have averted the tragedy that occurred on the day”.

Foresight was founded in 2014 by former Deputy Director General of South African Secret Service Gibson Njenje and a number of other intelligence and law enforcement bosses. Foresight is also an investment of investment firm Anglo African Capital – run by Njenje and top mining executive Heine Van Niekerk. Van Niekerk and his company Sable Mining were recently accused of improper payments to Liberian officials. As for Njenje, he started off in industry before resigning from a few companies, including mining outfits, to become an intelligence agent. He then boomeranged back to business after leaving the service in 2011.

Isisele Technologies, a surveillance technology company, fits this same pattern. It sells a solution for the interception of communications directly off networks of service providers. Njenje again was also a director at this company and another, Freewheel Trade & Invest 16 (“Freewheel”). He is still an active director at a subsidiary of Isisele, the specialized logistics company Isisele Transtec Aviation.

 

Isisele sells network lawful interception technologies, such as this system. Image: Isisele.

A collection of mining interests orbits this small surveillance company. Freewheel, which also trades as Isisele, was first set up in 2008 by Dennis Jacobus Bishop, an early 100% shareholder of Sable Mining. (The same Sable Mining that was accused of bribery in Liberia). Other directors have included a former National Intelligence Agency agent (who also served at the Department of Environmental Affairs as a compliance specialist). A director of Isisele Technologies was coal and mining investor, Landlord Mojalefa Mbethe. All three companies, Freewheel, Isisele (the surveillance tech company) and Isisele Transtec (the logistics company) currently share the same active director.

Dizzy yet? Other companies are more explicit in the surveillance services they provide to the mining industry. One sponsor of the Mine Security SummitBlue Thistle Consulting Solutions, offers “GSM listening equipment”, which could range from simple bugs to interception devices. Cobham, a large international defense technology company, also exhibited there, promoting its cell phone interception technologies and tracking equipment in the event brochure.

Mining companies are now being dangled powerful surveillance technology that, by law, is only supposed to be operated by public officials. Top (former) intelligence officials are heavily involved in mining interests, and concurrently involved in private companies that market surveillance technologies to the mining sector. The shadow of bloody strikes at Marikana makes for impressionable and eager buyers. This is, companies say, a “war” scenario in which police cannot be trusted but they can. “No longer can the police be expected to assist during times of labour unrest”, advertises D&K management services, a risk consultancy that also offers surveillance services. “Companies now need to take responsibility …into their own hands.” Are they taking communications surveillance into their own hands too?

Revolving doors

A quick review of existing conflict of interest policies in this sector shows a striking, near-complete absence of any guideline on navigating this terrain to prevent conflicts of interest on sensitive matters related to people’s fundamental human rights. 

Active office holders in the police service, military and intelligence services cannot concurrently be registered as security service providers according to the Private Security Industry Regulation Act 2001. The Public Service Act 1994, too, prohibits public office holders to take on extra paid work that could reasonably be expected to interfere with their official functions (section 30). This was the focus of the recent case in which a police officer, Paul Scheepers, was charged with illegally performing cell phone interception allegedly on behalf of a politician. (Scheepers’ security firm was also a distributor for a British company selling interception devices). There’s also an Executive Ethics Code. A recent report from the Public Protector Advocate found President Zuma to be in apparent breach of the code over a series of appointments allegedly influenced by the powerful Gupta family.

But absent is any more specific guidance on conflicts of interest in the law enforcement and intelligence sector. With help from the indefatigable South African History Archive, we filed requests under the Public Access to Information Act for the conflict of interest policies of five military, law enforcement and intelligence agencies – the Department of Defence, the South African Police Service, the Department of State Security – and two further departments in natural resource management and environmental affairs, the Department of Mineral Resources, and the Department of Environmental Affairs. We wanted to know if these agencies in any way regulated or monitored the employment, voluntary positions, company ownership or directorship of staff; former staff; consultants; and other paid representatives. We also asked the government’s security industry regulator, the Private Security Industry Regulatory Authority (PSIRA), for lists of all companies registered to operate in South Africa and the nature of their services.

We received no response to three requests, to the Department of State Security, the Department of Defence, and PSIRA. The Department of Mineral Resources reported holding no conflict of interest policies. A full response from the Police Services is still pending.

Only the Department of Environmental Affairs offered an insight into how it manages conflicts of interest. DEA staff who evaluate service provision bids are required to declare their interests, including stakes that they hold, family or friends with interests in the bidding company. They also must respect regulations around remunerative employment out of public service, which is generally prohibited if it would interfere with their ability to carry out their duties.

Recommendations

To the Private Security Industry Regulatory Authority:

  • Publish register of private security companies that have registered with the Private Security Industry Regulation Authority in accordance with the Private Security Industry Regulation Act and its obligations as regulator of Private Security Industry.
  • Undertake investigations into private security companies offering communications interception equipment for sale which, if used by private actors, would be in breach of both the Regulation of Interception of Communications and Provision of Communications Related Information Act, and the Electronic Communications Act, and publish results.
  • Release results of any conflict of interest investigations involving private security firms, national security agencies, and/or mining companies.
  • Release any internal guidance on conflict of interest policies currently operated, or previously used.

To the South African Police Service:

  • Investigate potential sales of surveillance equipment to mining firms, which if used by private actors would be in breach of both the Regulation of Interception of Communications and Provision of Communications Related Information Act, and the Electronic Communications Act.

To the Department of State Security, and The Department of Defence:

  • Reveal any internal guidance on conflict of interest policies currently or previously used. 

Send comments, reactions and tips to research@privacyinternational.org

Feature Reference: 
Communications surveillance
Mass Surveillance
Contesting Surveillance

The Future of Faking Audio and Video

via Schneier on Security by Bruce Schneier on Thu, 22 Dec 2016 21:35:01 GMT

This Verge article isn't great, but we are certainly moving into a future where audio and video will be easy to fake, and easier to fake undetectably. This is going to make propaganda easier, with all of the ill effects we've already seen turned up to eleven. I don't have a good solution for this....

The Pro-PGP Position

via Schneier on Security by Bruce Schneier on Thu, 22 Dec 2016 13:59:34 GMT

A few days ago I blogged an excellent essay by Filippo Valsorda on why he's giving up on PGP. Neal Walkfield wrote a good rebuttal. I am on Valsorda's side. I don't like PGP, and I use it as little as possible. If I want to communicate securely with someone, I use Signal....

Earthrise

via Emergent Chaos by adam on Wed, 21 Dec 2016 21:29:07 GMT

Image credit: Bill Anders, Apollo 8, launched Jan 21, 1968.

Encryption Working Group Annual Report from the US House of Representatives

via Schneier on Security by Bruce Schneier on Wed, 21 Dec 2016 15:25:20 GMT

The Encryption Working Group of the House Judiciary Committee and the House Energy and Commerce Committee has released its annual report. Observation #1: Any measure that weakens encryption works against the national interest. Observation #2: Encryption technology is a global technology that is widely and increasingly available around the world. Observation #3: The variety of stakeholders, technologies, and other factors...

Google Releases Crypto Test Suite

via Schneier on Security by Bruce Schneier on Tue, 20 Dec 2016 12:12:11 GMT

Google has released Project Wycheproof a test suite designed to test cryptographic libraries against a series of known attacks. From a blog post: In cryptography, subtle mistakes can have catastrophic consequences, and mistakes in open source cryptographic software libraries repeat too often and remain undiscovered for too long. Good implementation guidelines, however, are hard to come by: understanding how to...

Smartphone Spying as Art

via Schneier on Security by Bruce Schneier on Mon, 19 Dec 2016 20:29:29 GMT

A film student put spyware on a smartphone and then allowed it to be stolen. He made a movie of the results....

UN Considering Killer Robot Ban

via Schneier on Security by Bruce Schneier on Mon, 19 Dec 2016 14:57:11 GMT

This would be a good idea, although I can't imagine countries like the US, China, and Russia going along with it -- at least not right now....

Friday Squid Blogging: Woman Throws Squid at Her Boyfriend

via Schneier on Security by Bruce Schneier on Fri, 16 Dec 2016 22:52:38 GMT

This is what passes for news these days. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Giving Up on PGP

via Schneier on Security by Bruce Schneier on Fri, 16 Dec 2016 11:36:09 GMT

Filippo Valsorda wrote an exellent essay on why he's giving up on PGP. I have long believed PGP to be more trouble than it is worth. It's hard to use correctly, and easy to get wrong. More generally, e-mail is inherently difficult to secure because of all the different things we ask of it and use it for. Valsorda has...

Impressive Social Engineering Display

via Schneier on Security by Bruce Schneier on Thu, 15 Dec 2016 21:43:34 GMT

In this impressive lc7scxvKQOo">social-engineering display, a hacker convinces a cell phone tech-support person to change an account password without being verified in any way....

 newer latest older