Worldwide Campaign to stop the Abuse and Torture of Mind Control/DEWs

Why are the intelligence agencies revealing their spying techniques?

Why are the intelligence agencies revealing their spying techniques?

Now that the security services are allowed to record us through our phones, privacy has become impossible – unless we renounce modern telecoms
Banksy’s mural depicting agents monitoring a phone box near GCHQ in Cheltenham.

Banksy’s mural depicting agents monitoring a phone box near GCHQ in Cheltenham. The spy agency now admits it can take control of a phone or computer. Photograph: Jules Annan/Bancroft

Legalised hacking in the UK now allows a third party to take control remotely of a phone’s camera or microphone and record video and conversations taking place, the Guardian’s Alan Travis reported this week. What’s the point of Apple trying to encrypt its iPhones if the spooks can switch them on remotely and monitor what we are doing?

Until recently, the security services have gone to great lengths not to disclose their operational capabilities. If the bad guys know how their communications can be monitored, they’ll look for other ways of exchanging information.

So it’s something of a surprise to see how open the agencies have now become. Ciaran Martin, director of cybersecurity at GCHQ, gave evidence recently to the investigatory powers tribunal about what’s now called “equipment interference”. If the new investigatory powers bill becomes law, warrants permitting interference with equipment will be issued by a secretary of state and approved by a judicial commissioner. Under clause 88, this would include “observing or listening to a person’s communications or other activities”.

In evidence to the tribunal, Martin explained that equipment interference might involve installing an implant into a laptop or mobile, perhaps by persuading a user to click on a link.

A simple implant would transmit information over the internet. But others “might monitor the activity of the user of the target device or take control of the computer”. This presumably includes switching on a device’s camera and microphone, even when it’s not being used to make calls. Martin accepted that such operations could be “highly intrusive”. But so is someone hiding a camera in your bedroom, which will not require prior judicial authorisation.

We can see how this works from a case study published by the Home Office in its response to the bill’s pre-legislative scrutiny. It refers to intelligence that several suspects were at large after being involved in an attempted murder.

“Equipment interference and other intelligence-gathering techniques were used to identify and locate the suspects, leading to their arrest before further offences could be committed,” it says.

“Without the use of equipment interference, it would not have been possible to arrest the suspects simultaneously, which was critical to preserving the evidence.”

It seems clear from this example that investigators managed, at the very least, to activate the suspects’ phones or computers remotely without their knowledge.

Many more examples, real or hypothetical, are given in the government’s 83-page draft code of practice for equipment interference, with the caveat that they should “not be taken as confirmation that any particular … agency undertakes the activity described”.

Agencies are advised to consider carefully whether they should conduct equipment interference against a person who is not of direct intelligence interest in order to enable surveillance through that person’s device of a wanted associate – given that this surveillance would inevitably pick up private information about the original person’s innocent family.

Other examples deal with cases in which an agency might want to acquire private information from a computer as well as intercepting a live video call. A combined warrant would be needed. There is also guidance on how analysts can use their knowledge of a particular software package commonly used by terrorist groups in the Middle East to retrieve the communications of a “Daesh [Isis]-inspired cell”.

GCHQ admits how simple it is to transmit information over the internet from your laptop or phone. Photograph: Kieran Doherty/Reuters

More examples of how equipment interference can be used are to be found in the government’s operational case for “bulk powers”, which enable the collection of vast amounts of data. These are said to be real examples, although edited to avoid “handing an advantage to those who mean us harm”. Classified details have been given to parliament’s intelligence and security committee.

We can be sure that GCHQ officials debated long and hard before allowing examples such as these to be published. They tell us the ways in which the agencies seek to use their powers, the nature of their targets and the limits the agencies impose to avoid “collateral intrusion” (the unintentional gathering of material such as a background conversation). Whether we believe them or not is for us to decide, but at least we have something to go on.

Do these revelations damage the agencies’ operational capabilities? The assumption must be that their targets have a pretty good idea of what they can do already. Sometimes it suits the agencies to make people think that their techniques are more effective than they actually are, especially if it persuades targets to switch from a secure method of communication to one that the agencies have already penetrated.

And is it a good idea to take a chainsaw to your computer or incinerate your iPhone? Certainly, if you have something illegal to hide – although doing so will inevitably limit your ability to commit more crimes. For the rest of us, it all depends on whether we value our personal privacy more highly than the convenience of using modern communications – and whether we think the agencies are on our side.

Views: 95

Comments are closed for this blog post

Latest Activity

Franco Villa replied to Franco Villa's discussion Chloridic acid hidden in radiators.
1 hour ago
ramiz berisha commented on CLS's status
"Hey CLS, how are you buddy? are you still getting targeted hard like before? and you are so right we are dealing with scumbags low lifers and shit holes...I started a business online and all of a sudden they planted 6 more chips all over my body and…"
1 hour ago
Martti Koski commented on H's group Finland
"Jouko välitän kutsusi  Jouni Toloselle, joka ei uskalla kirjoittaa tänne.  Eli meillä on kommunikointikanavana tämä, sitten Facebookin sivu New World Order etc Siinä on voimana ja heikkoutena avoimuus ja…"
1 hour ago
Franco Villa replied to Franco Villa's discussion Chloridic acid hidden in radiators.
"I remembered that I had read in a magazine the news of someone who had placed an announcement where he was looking for someone who was willing to be eaten and he found it. That one has found someone available to help him by getting himself eaten and…"
2 hours ago
4 hours ago
Gretta Fahey posted a blog post


David Icke in his book "The Biggest Secret" which he published in 1994, stated that there would be a worldwide central control system in the future and that we would be individually connected to technology by microchips which would be imbedded inside our bodies and brains.I have been illegally and non-consensually connected to such technology for the past more than sixteen years.   My thoughts are automatically transmitted and translated by said technology because each human thought generates a…See More
5 hours ago
Franco Villa replied to Franco Villa's discussion Chloridic acid hidden in radiators.
"But don't they know that in nature there is no need for artificial controls if education is correct? Have they ever watched documentaries on these animal mammals?"
5 hours ago
CLS posted a status
"Snowden is a hero. He didnt like scum sitting there watching women strip hacking cameras and stuff. These preps utter street garbage."
7 hours ago



© 2019   Created by Soleilmavis.   Powered by

Badges  |  Report an Issue  |  Terms of Service