tagged!

19

Click here to load reader

Upload: james-matthew-miraflor

Post on 07-Jun-2015

995 views

Category:

Business


2 download

DESCRIPTION

A survey of surveillance technologies abroad and in the Philippines, and their political implications.

TRANSCRIPT

Page 1: Tagged!

TAGGED!

James Matthew B. MiraflorNovember 25, 2008

The State, Technology, and Intelligence Gathering: A Survey

Page 2: Tagged!

Assessing Technological Intelligence (TECHINT) Initiatives

Technological Status What is possible?

Legal/Institutional Environment What is lawful?

Political-Economic Motivations For what purpose?

Page 3: Tagged!

Survey of Existing TECHINT Initiatives Global

Carnivore (Federal Bureau of Investigation - US)

Echelon (National Security Agency – primarily US, but also UK, Australia, Canada, new Zealand)

Onyx (Swiss Army) Golden Shield Project (Ministry of Public

Security - China) Local (Philippines)

MARS program (National Security Council)

Page 4: Tagged!

Project Carnivore

a Microsoft Windows-based workstation with a customizable packet-sniffing software that can monitor all of a target user's Internet traffic

implemented by the FBI during the Clinton administration with the approval of Attorney General Janet Reno

abandoned in 2003 in favor of commercially available tools, when third-party surveillance tools progressed in filtering abilities

Page 5: Tagged!

How does Carnivore work? Carnivore, a PC equipped with a network card, must

be physically connected to the network in order to monitor it

once installed, carnivore uses a packet sniffer to collect all data that passes through the network – that includes all emails sent/received, contents of all websites visited, all messages sent through instant messaging applications, and other network activities

the aggregated data is sent through an aggressive filter that discards all information that is beyond the court order e.g. if it wants to monitor emails alone, it can only tap at the

Simple Mail Transfer Protocol (SMTP) all data collected are retrieved by an FBI special

agent

Page 6: Tagged!

Project ECHELON a signals intelligence (SIGINT) collection and analysis

network operated on behalf of the five signatory states to the UK-USA Security Agreement (Australia, Canada, New Zealand, the United Kingdom, and the United States, known as AUSCANZUKUS)

can intercept communications depends on the medium used, be it radio, satellite, microwave, cellular or fiber-optic.

created to monitor the military and diplomatic communications of the Soviet Union and its Eastern Bloc allies during the Cold War in the early sixties

today, also used for counter-terrorist and anti-organized crime initiatives, and political and diplomatic intelligence

Page 7: Tagged!

How does ECHELON work? One approach is to place intercept equipment at

locations where fiber optic communications are switched. For the Internet, much of the switching occurs at a relatively small number of sites. There have been reports of one such intercept site, Room

641A, in the United States. British journalist Duncan Campbell and New Zealand

journalist Nicky Hager reported in the 1990s that the United States was exploiting ECHELON traffic for industrial espionage, rather than military and diplomatic purposes. e.g. the gear-less wind turbine technology designed by the

German firm Enercon and the speech technology developed by the Belgian firm Lernout & Hauspie

in 1995, French aerospace company Airbus lost a $6 billion contract with Saudi Arabia in 1994 after the NSA reported that Airbus officials had been bribing Saudi officials

Page 8: Tagged!

Project Onyx launched in 2000, originally under the name

SATOS-3 (the SATOS 1 and 2 systems were started in 1992, in particular to intercept faxes), and was completed in late 2005

the goal of the system is to monitor both civil and military communications, such as telephone, fax or Internet traffic, carried by satellite

not supposed to monitor internal communications, but the monitoring of a communication between a person in Switzerland and someone in another country is allowed

Page 9: Tagged!

How does Onyx work? uses lists of keywords to filter the intercepted content

for information of interest, and the choice of keywords by the intelligence community must be approved by an independent commission

on 8 January 2006, the Swiss newspaper Sonntagsblick published a secret report produced by the government using data intercepted by Onyx. the report described a fax sent by the Egyptian department

of Foreign Affairs to the Egyptian Embassy in London, and described the existence of secret detention facilities ("black sites") run by the CIA in Eastern Europe.

when the government started a military judiciary procedure against the newspaper for leakage of secret documents, the authenticity of the fax was confirmed during the trial

Page 10: Tagged!

The Golden Shield Project

started in 1998 and began operations in November of 2003, the project aims to “integrate a gigantic online database with an all-encompassing surveillance network – incorporating speech and face recognition, closed-circuit television, smart cards, credit records, and Internet surveillance technologies” (Walton, 2001)

but the system was more known for content filtering, thus the name the Great Firefall of China

Page 11: Tagged!

The Philippine Case

MARS, NMARSC, NTC Takeover, and IALAG

Page 12: Tagged!

MARS Program in order to monitor “destabilizers”,

Malacañang issued Executive Order (EO) 492 gave power to the National Security Adviser to

supervise the creation of a surveillance program for the government and purchasing of the technology and equipments to implement this program.

the Maritime Aerial Reconnaissance and Surveillance (MARS) surveillance program is intended to enhance to coordination of military and civilian government units in various operations

a total of P5 million had been allocated for the MARS program

Page 13: Tagged!

Looking from Above EO 492, issued on February 1, 2006, orders

the NICA to activate the National Maritime Aerial Reconnaissance and Surveillance Center or NMARSC.

The NMARSC shall serve as the primary IMINT (Imagery Intelligence) provider for the Philippine intelligence community.

Under the supervision and oversight of the National Security Adviser, the NICA-directed NMARSC will operate unmanned aerial vehicles or UAVs (unmanned aerial vehicles) to cater to the imagery intelligence demands of various government agencies.

Page 14: Tagged!

EO 454: NTC Takeover After being attacked by a tirade of media-

sensationalized issues, the Arroyo administration issued EO 454 transferring the independent National Telecommunications Sector (NTC) back to the Department of Transportation of Communication (DOTC).

Since NTC have quasi-judicial and regulatory powers to cancel licenses and shutdown media corporations, it was feared that putting NTC under the direct control of the president might increase the president’s clout over the media.

Page 15: Tagged!

HB 4942: A Warning of Things to Come

If this is not enough yet, there had been proposals in the Lower House to reorganize NTC into a new super-body, the National Information and Communications Commission (NICC).

NICC, first proposed through House Bill 4942 (13th Congress), is supposed to have broader regulatory powers over information, communication, broadcast, cable TV, and other multimedia infrastructures, thus expanding the administration’s political control over all channels of discourse.

Page 16: Tagged!

Use of Intelligence Gathered In most countries, the primary purpose

of domestic intelligence gathering is profiling - synthesizing data gathered into complete informational portraits of individuals e.g. Pentagon’s Total Information

Awareness (TIA) Profiling has its use, to prepare

plausible circumstantial evidence in the event of a legal offensive.

Page 17: Tagged!

IALAG: Legal and Intelligence Super-agency On January 17, 2006, Arroyo issued Executive Order

493 directing the creation of the Inter-Agency Legal Action Group (IALAG), a super-body under the National Intelligence Board (NIB) that is tasked to investigate, prosecute, monitor, and handle litigation processes of cases involving national security.

Headed by the National Security Adviser Norberto Gonzales, the new super-agency will be coordinating the functions of the DOJ, DND, DILG, DFA, and other agencies like the NBI (under DOJ), National Intelligence Coordinating Agency (NICA), National Security Council (NSC), the AFP and the PNP

Similar to the Joint Legal Action Group (JOLAG) established during Martial Law meant to chase enemies of the Marcos regime, particularly members of the CPP-NPA-NDF during the 70’s

Page 18: Tagged!

IALAG: Legal Offensive during State of Emergency

Under these offices, the super-agency would be coordinating closely with the Intelligence Service of the AFP (ISAFP) and the PNP Criminal Investigation and Detection Group (PNP-CIDG).

Issued more than a month before Proclamation 1017, militant groups speculated that IALAG is meant to facilitate and aid arrests and legal offensives during and after the declaration of the State of Emergency.

Gonzales, in his speech before AFP 4th Infantry Division in Cagayan de Oro City, boasted that the rebellion charges filed against the Batasan 5 (five militant party-list representatives) was the first major achievement of IALAG.

Page 19: Tagged!

Thank you.