Your Source for Leaks Around the World!

Archive for January 31st, 2014|Daily archive page

CSEC Taps Airport Wi-Fi to Track Travellers, Tested Program on Canadians in 2012

In Archive, Canada, CSEC, NSA, NSA Files, Snowden on January 31, 2014 at 7:48 PM


Greg Weston/Glenn Greenwald/Ryan Gallagher/CBC News:

A top secret document retrieved by U.S. whistleblower Edward Snowdenand obtained by CBC News shows that Canada’s electronic spy agency used information from the free internet service at a major Canadian airport to track the wireless devices of thousands of ordinary airline passengers for days after they left the terminal.

The document dated May 2012 is a 27-page power-point presentation by CSEC describing its airport tracking operation. While the document was in the trove of secret NSA files retrieved by Snowden, it bears CSEC’s logo and clearly originated with the Canadian spy service.

CSEC DOCUMENT: IP Profiling Analytics & Mission Impacts

After reviewing the document, one of Canada’s foremost authorities on cyber-security says the clandestine operation by the Communications Security Establishment Canada (CSEC) was almost certainly illegal.

Ronald Deibert told CBC News: “I can’t see any circumstance in which this would not be unlawful, under current Canadian law, under our Charter, under CSEC’s mandates.” Deibert says that whatever CSEC calls it, the tracking of those passengers was nothing less than an “indiscriminate collection and analysis of Canadians’ communications data,” and he could not imagine any circumstances that would have convinced a judge to authorize it.

The spy agency is supposed to be collecting primarily foreign intelligence by intercepting overseas phone and internet traffic, and is prohibited by law from targeting Canadians or anyone in Canada without a judicial warrant.

The latest Snowden document indicates the spy service captured metadata information from unsuspecting travellers’ wireless devices by the airport’s free Wi-Fi system over a two-week period.

The document shows the federal intelligence agency was then able to track the travellers for a week or more as they — and their wireless devices — showed up in other Wi-Fi “hot spots” in cities across Canada and even at U.S. airports. That included people visiting other airports, hotels, coffee shops and restaurants, libraries, ground transportation hubs, and any number of places among the literally thousands with public wireless internet access.

The document shows CSEC had so much data it could even track the travellers back in time through the days leading up to their arrival at the airport, these experts say.

While the documents make no mention of specific individuals, Deibert and other cyber experts say it would be simple for the spy agency to have put names to all the Canadians swept up in the operation.

The document indicates the passenger tracking operation was a trial run of a powerful new software program CSEC was developing with help from its U.S. counterpart, the National Security Agency.

In the document, CSEC called the new technologies “game-changing,” and said they could be used for tracking “any target that makes occasional forays into other cities/regions.”

Sources tell CBC News the technologies tested on Canadians in 2012 have since become fully operational.

The document does not say exactly how the Canadian spy service managed to get its hands on two weeks’ of travellers’ wireless data from the airport Wi-Fi system, although there are indications it was provided voluntarily by a “special source.”

It is also unclear from the document how CSEC managed to penetrate so many wireless systems to see who was using them — specifically, to know every time someone targeted at the airport showed up on one of those other Wi-Fi networks elsewhere.

Deibert and other experts say the federal intelligence agency must have gained direct access to at least some of the country’s main telephone and internet pipelines, allowing the mass-surveillance of Canadian emails and phone calls.

Experts say the document makes clear CSEC intended to share both the technologies and future information generated by it with Canada’s official spying partners — the U.S., Britain, New Zealand and Australia, the so-called Five Eyes intelligence network.

The spy agency boasts in its leaked document that, in an apparently separate pilot project, it obtained access to two communications systems with more than 300,000 users, and was then able to “sweep” an entire mid-sized Canadian city to pinpoint a specific imaginary target in a fictional kidnapping.

Operation Sovereign Borders – Senate Inquiry 31st Jan 2014

In Activism, Air Force, Amnesty, Archive, Army, ASIO, ASIS, Australia, China, DAILY NEWS ARCHIVE, Economy, Indonesia, Internet, INTERPOL, leaksource, New Zealand, UN on January 31, 2014 at 2:00 AM

via digitalfolklore

In the first time a minister from parliament’s lower house has fronted a Senate inquiry since 1992, immigration Minister Scott Morrison and Operation Sovereign Borders commander Lieutenant General Angus Campbell are giving evidence before an inquiry into government secrecy over border protection operations.

The Senate’s legal and constitutional affairs committee is examining the government’s public interest immunity claim to deny the upper house access to official documents.

Lieutenant-General Campbell warned the disclosure of certain documents could undermine international cooperation and agreements.

Lieutenant-General Campbell also believed it was too early to provide more information on the 22 boat arrivals that took place in the early phase of the operation, which started on September 18.

Operation Sovereign Borders would not have achieved the objectives it had without a limit on the information it released publicly.


Pakistan Government’s Secret Report on CIA Drone Strikes Leaked

In Archive, CIA, Drones, Pakistan on January 31, 2014 at 12:31 AM



The Bureau has obtained a secret Pakistani document showing the assessment by local officials of over 330 CIA drone strikes dating back as far as 2006.

Officials in the FATA Secretariat, which oversees the tribal areas, compile the document using information obtained from local sources by field agents. Each day the local Political Agent, the ranking officer in the field, submits a Daily Situation Report to the FATA Secretariat, listing any violent incidents in the area that day. The document published here is compiled from those reports.

The Bureau previously obtained and published a section of the same document showing strikes from 2006 to late 2009. The new version includes strikes dating up to the end of September 2013.

Although in some respects the document is detailed – showing the exact times and locations of strikes, for example – it also has striking omissions: none of 2007′s five strikes are shown, and the report almost never notes the names or alleged militant affiliations of the dead. Most strikingly, almost all civilian casualties after the start of 2009 are missing, even in incidents where the Pakistani government has acknowledged civilian deaths.

The overall casualties recorded by the document are broadly similar to those compiled by the Bureau, which uses sources including media reports, sworn affidavits and field investigations. The Bureau estimates that at least 2,371 people died in the time covered by the document (excluding 2007, which is missing from the record), while it records 2,217 deaths in total.



In the latest episode of the Bureau’s podcast Drone News, Alice Ross who obtained this document on a trip to Pakistan talks more about what it reveals.

Related Links:

Every Drone Attack in Pakistan 2004-2013

Naming the Dead: TBIJ Project Identifies People Killed By CIA Drone Strikes in Pakistan

Amnesty & HRW Reports on US Drone Strikes in Pakistan/Yemen: Violate Int’l Law, Officials Should Be Charged with War Crimes

%d bloggers like this: