Altering computers without permission is planned for economic and other spies in Holland as well as Australia -- Echelon
The Dutch Intelligence Agency BVD is getting new powers. Among other things, the powers to intercept communications will be extended.
The agency is authorized, if the government gets its way, to intercept satellite communications at random and search the intercepted traffic by keywords. Also, the BVD gets a new intelligence task: the gathering of economics information. Holland goes Echelon, it seems.
From: Nizkor English Service
from: Bob Olsen
|138 CONTENTS 1-100 101-on Translate Links Events Books HOME Foot v v 140|
The new "Act on the intelligence and security agencies" (WIV), which is currently being debated by the Dutch parliament, gives the powers of the BVD a new legal basis.
Actually, it means mainly the extension of investigative powers. In each amendment on the original proposal, new powers are given.
For instance, in the first draft of the new Act, the BVD got the power to intercept, record and listen in to telecommunications. In the latest amendment, from the beginning of this year, the power to "receive" telecommunications was added.
This means the BVD is authorized to directly pluck telecommunications, for instance GSM-traffic, out of the air. In this way, the BVD is no longer dependent on the willingness of telcom operators to intercept traffic, but can create for instance their own parallel network of receivers to intercept all GSM-traffic.
DUTCH INTELLIGENCE AGENCY SEEKS AUTHORIZATION TO INTERCEPT AND SCAN SATELLITE COMMUNICATIONS THROUGH ITS OWN PARALLEL HARD SYSTEM, WHICH ALLOWS THE UTILIZATION OF SOFTWARE FOR POLITICAL AND SOCIAL CONTROL PATTERNS.
Also, this prevents providers from "leaking" about the fine work the BVD is doing in this area.
The biggest extension, however, is the newly added article 25a. In this article, the BVD is authorized to intercept at random all international telecommunication that is not cable bound and scan the intercepted communication on items of interest (persons, groups, keywords).
According to the explanatory note to the draft Act, this kind of random interception is needed to investigate if by any chance interesting messages are part of the international communication.
The government says nonchalantly that it can't be prevented that in this manner the BVD gets acquainted with the content of the intercepted communications, although that isn't - still according to the Dutch government - the main purpose of the random interception.
"The searching is primarily an instrument for the reconnaissance of the communication, to try to establish the nature of the communication and the identity of the person or organisation that is communicating.
AUSTRALIAN SECRET POLICE GET "HACKING" POWERS
RECENT legislation, passed with the usual voting co-operation seen between the Australian Coalition Government and the Labor Opposition in attacks on the rights of the people, has given the Australian Security Intelligence Organisation (ASIO) the authority to hack into computers and even alter whatís in them.
[It reminds some people of the Federal Act regarding the Goods and Services Tax (GST) that allows the authorities to state that something that did not happen, did happen, and vice-versa.)
The other parties [Australian Democrats, Australian Greens, etc.] voted against the legislation.
The extent of this intrusion is described in an Internet posting which quotes writer Andrew Taggart, reporting from Sydney.
Under the new law, the Australian Federal Attorney General can authorise legal hacking into private computer systems, as well as copying or altering data. -- Citizens' Voice, February 2000.
(A transcript can be obtained by sending a stamped addressed envelope to the Editor of Citizensí Voice Dion Giles, 53 Wood Street, Fremantle WA 6160, Tel. (08) 9335 7646 or 0411 745 538 or e-mail email@example.com or by requesting an electronic version by e-mail).
-- Now read on outside this panel about the plans of the elite in the Netherlands to "hack" our computers, worldwide.
That in this way the agency gets acquainted with a part of the content of the communication is inevitable, in order to establish who is communicating and if it's a person or a group that has the interest of the agency.
The searching however is not directed to get acquainted with the full content of the communication. In a certain way, this activity is comparable with the listening in on telephone conversations, to check if the connection is all right."
This seems like a very creative way of saying that interception isn't really interception, but a mere technical testing of connections. And for that, no legal or governmental warrant is needed...
As important parts of the international telecommunications are transmitted by satellites and beam transmitters, it is clear this article 25a authorises the Dutch BVD to intercept all these communications. This means an uncontrolled authority to intercept and scan all communication that is not cable bound.
This can have a great impact on the Internet traffic. As a message on the Internet chooses the least busy route, and the heart of Internet lies in the United States, there is a big chance that e-mail send within the Netherlands chooses an international route by satellite.
In future this can also be the case for telephone conversations. All these messages can be intercepted and randomly searched.
Even now, the phone conservations between two big Dutch cities, Amsterdam and Rotterdam, are being transmitted by beam transmitters.
In the first draft of the WIV, the Home secretary had to give permission to the keywords the intelligence agency is using to scan the intercepted traffic.
In the latest amendment, the Home secretary only gets once a year notification of the list of keywords, whereas the BVD is authorized to add new keywords to its own discretion.
Besides that, the BVD is authorized to store all intercepted communication. Where the first proposal of the Act stipulated that the BVD has to destroy immediately all intercepted communication that isn't of interest for them, the new amendment gives the BVD the right to store all intercepted communication for a year.
In this way, the Dutch government is creating its own mini-Echelon. The BVD uses for its interception tasks the facilities of the Technical information processing centre (TIVC) of the Navy intelligence.
This centre, located at the Navy complex Kattenburg in Amsterdam, decodes satellite traffic that is being intercepted by different ground stations.
The TIVC is working the same way as its big brother NSA, as showed by the publication of internal documents in the Dutch daily De Haagse Courant in 1985.
Satellite conversations were intercepted, recorded and selected by keywords for further analysis.
The intelligence the TIVC gathered was sent to the Foreign Intelligence Service (IDB), till this unit was closed down in 1994 after a series of scandals. Since then, all signal intelligence is in the hands of Navy intelligence.
According to a study of two Dutch Intelligence experts (Bob de Graaff and Cees Wiebes, Villa Maarheeze, 1998), the TIVC is part of a broader international network and works closely with other Western agencies.
For instance in 1972, the TIVC reported to the Mossad that Egypt and Libya had developed a telephone- and telex-connection under sea.
Israeli special forces destroyed this connection, so Egypt and Libya had to communicate again by satellites, which were an easy target for interception.
According to the authors, the American CIA protested in 1992 firmly against the immanent dissolution of the IDB, because they were afraid Dutch signal intelligence capacity would diminish.
Vital economic interests
The new power to intercept satellite communications at random will undoubedly be used for economic espionage. In the past, the signal intelligence capacity already served economic purposes.
In the above-mentioned study of the intelligence experts, examples of this are mentioned. The authors speak of an "incestuous relation" between the intelligence services and Dutch industry.
Leading persons of big Dutch companies, with establishments abroad, worked for the IDB. In exchange, they got economic intelligence gathered by the TIVC.
The Dutch multinational Philips has, according to the study, close relations with Dutch intelligence.
The company installed interception devices in telephone centres it sold to foreign companies and governments, the report says.
In the proposed new "Act on the intelligence and security services", the
BVD gets officially the task of economic intelligence gathering. The
BVD has to "protect vital economic interests", which is seen as a
part of the national security.
"The Dutch economy is highly dependent of economic developments in the world; these developments are characterised by increasing internationalisation and globalisation. Decisions taken elsewhere, can have a serious impact on the Dutch economy.
"It is possible to gather intelligence on these developments in different ways, for instance by co-operation with intelligence agencies of other countries. These agencies however, will take in account their own interests.
"In order not to be dependent of information of third parties, the government thinks it is necessary to build up its own information position and enforce it."
What exactly "vital economic interests" are, is however wrapped in a cloud of mystery.
"To end with, we remark that with the explicitation [sic?] of 'vital economic interests of the Netherlands' in the terms of reference of the BVD, also the possibility is created - if it seems appropriate - to conduct investigations in this area, where national security as such isn't in danger or is difficult to argue for."
The new powers of the BVD are also interesting because some articles are related to cryptography and information technology. The BVD is authorized to break into homes and offices to bug keyboards.
Besides that, the BVD is authorized to break into computers and steal, alter or delete information that is stored in computers. In other words, the BVD is allowed to hack.
In this way, the intelligence agency can steal data from computers, manipulate software, corrupt passwords or install a Trojan Horse, so access is secured and cryptography can be bypassed.
Cryptography is a topic of special interest for the BVD. In the draft Act, the power to undo encryption is being extended.
In the first proposal the BVD got the authority to decrypt encrypted communication and data "by technical means". In the latest amendment this is extended to decryption "by all possible means".
According to the explanatory note, "practice has shown there are other ways than just technical means to decrypt encrypted communications."
This cryptic description seems to be directed at infiltrators who diddle out passwords, or look over the shoulder when messages are encrypted, or intelligence teams breaking into homes and offices in search of the little piece of paper the password is written on.
The articles on the interception of telecommunication also contain remarks on cryptography. Encrypted messages may be kept in storage as long as is necessary for the BVD to decrypt them. The explanatory note says:
"Where telecommunication is concerned, of which the encryption is not undone, and where the mere fact that cryptography has been used makes this communication interesting for the agency, it is desirable to save this communication to the moment the capacity exists or is being developed to decrypt the communication."
So the use of a perfectly normal technique to protect ones privacy, trade secrets or sensitive political information, is in the eyes of the Dutch government a highly suspected act.
The draft Act also introduces the obligation for "every one" the authorities believes has access to the keys, to co-operate with the intelligence agency in decrypting the encryption. Refusal is punishable with a sentence of two years.
The Dutch parliament has asked the government if this means that suspects also are obliged to hand over the keys.
The answer is not available yet. But if the government confirms this obligation also applies to suspects, this will be a clear violation of the fundamental human rights, as stated for instance in the Treaty on the protection of the Human Rights and Fundamental Freedoms.
It means an obligation to co-operate on your own condemnation and the reversal of the burden of proof.
[Source: Jelle van Buuren. Verlag Heinz Heise, Hannover. 11abr00]
*International campaign against Echelon Global System: EchelonWatch http://www.aclu.org/echelonwatch/index.html
*Global Internet Liberty Campaign - GILC (Main issues: free speech, privacy, cryptography, access) http://www.gilc.org/
* Report on International Status of Privacy: "Privacy and Human Rights 1999".
*Electronic Privacy Information Center Washington, DC, USA.Privacy International London, UK http://www.privacyinternational.org/survey/
*"Cryptography and Liberty 1999: An international Survey of Encryption Policy". Electronic Privacy Information Center Washington, DC, http://www2.epic.org/reports/crypto1999.html#_Toc450793110
*"An Appraisal of Technologies of Political Control". Scientific and Technological Options Assessment - STOA. 06jan98. http://cryptome.org/stoa-atpc.htm
*Echelon: Development of surveillance technology and risk of abuse of economic information - STOA reports - PDF Files - 10/1999 - European Parliament [ENG/ING] http://www.europarl.eu.int/dg4/stoa/en/publi/default.htm
Information is an Urgent Solidarity service edited and disseminated by Nizkor International Human Rights Team. Nizkor is a member of the Peace and Justice Service-Europe (Serpaj), Derechos Human Rights (USA), and GILC (Global Internet Liberty Campaign).
Mailbox: Desenganho, 12 - 5 Piso - 28004 - Madrid - Espanha [Spain].
Fax: +34.91.526.7515 http://www.derechos.org/nizkor
In Spanish only Mailto: firstname.lastname@example.org The content of this message is protected under the Spanish Criminal Code according to Title X-Chapter I and Title XIII-Chapter XI. If you do not wish to receive Information messages send "unsubscribe" as subject.
** NOTICE: In accordance with Title 17 U.S.C. Section 107, this material is displayed without profit to those who have an interest in reading the included information for research and educational purposes. If you quote from this, PLEASE acknowledge the source. **
See also Nexus, October-November 1999, "Echelon: The NSA's Global Spying Network," by Patrick S. Poole, Part 2 of 2, pages 19-23 and 83-85. Nexus, P.O. Box 30, Mapleton, Queensland, 4560, Australia, 07 5442 9280, Fax 07 5442 9381, email@example.com Mr Poole's e-mail address is firstname.lastname@example.org
Australian plans to allow security agents and possibly vested interests to intrude into and actually alter people's computers and search people's desks and homes by a new law, under which the Australian Federal Attorney General can authorise legal hacking into private computer systems, as well as copying or altering data. -- Citizens' Voice, February 2000. See the original online series starting page at http://www.iinet.net.au/~jenks/CV.html (For a free transcript of one issue send a stamped addressed envelope to the Editor of Citizens’ Voice Dion Giles, email@example.com 53 Wood Street, Fremantle WA 6160, Tel. (08) 9335 7646 or 0411 745 538 or e-mail to ask for an e-mail version). Subscriptions $10 for five issues and donations are received with thanks by post to 42 Central Avenue, Beaconsfield, WA, 6162, Tel. (08) 9335 5939 (mornings or after 3 pm best). Write cheques out to "STOP-MAI Coalition", not "Citizens' Voice" (inserted 27 Apr 00)
Big Business to be allowed by the Australian Parliament to
have unauthorised databases and to attack Australians' personal and
computer privacy; see outline at:
Where to protest:
(inserted 27 Apr 00)
Tagged with AOLPress/2.0™ (spellings and links checked 22 April 00, 26kb, 6pp), 22 April 2000, double-marquee for "The End" invented 06 May 00, last modified 04 August 2001
|138 Top ^ ^ CONTENTS 1-100 101-on Translate Links Events Books HOME 140|
To translate whole Webpages into French, German, Italian,
Portuguese, and Spanish out of English, or out of
those languages into English, click:
For these and 11 other languages including Esperanto and
Just World Campaign, 46 Cobine Way, Greenwood (a Perth suburb), WA, 6024, Australia. Tel [+61 8] (08) 9343 9532, Mobile 0408 054 319 firstname.lastname@example.org
DOC. 139 : URL (Internet address) = http://www.multiline.com.au/~johnm/alter.htm