Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
NSA and GCHQ spied on G20 meeting in London
#1
More spooky fun from Tyler Durden at Zerohedge:

Quote:

NSA, UK Spied On Politicians, Intercepted Emails, Eavesdropped On Russian President's Phone Calls


[Image: picture-5.jpg]
Submitted by Tyler Durden on 06/16/2013 17:23 -0400

The espionage scandal that keeps on giving has released its latest installment, once more courtesy of the Guardian, which on the eve of tomorrow's starting G-8 meeting reveals that foreign politicians and officials who took part in two G-20 summit meetings in London in 2009 had their computers monitored, their phone calls intercepted, and fake internet cafes were set up on the instructions of the British Government Communications Headquarters (GCHQ), the sister organization to the US NSA.
Naturally, it wasn't just the GCHQ - according to the Guardian, during the 2009 G-20 meeting there was an NSA attempt to eavesdrop on then-Russian leader, Dmitry Medvedev, as his phone calls passed through satellite links to Moscow.
And while broad espionage allegations can be deflected by pretending by the rhetoric-endowed and teleprompter-aided that only terrorist threats were targeted, it will be very difficult to explain why the national information super spooks used every trick of the trade to spy on the so-called leaders of the developed world.



The disclosure raises new questions about the boundaries of surveillance by GCHQ and its American sister organisation, the National Security Agency, whose access to phone records and internet data has been defended as necessary in the fight against terrorism and serious crime.The G20 spying appears to have been organised for the more mundane purpose of securing an advantage in meetings. Named targets include long-standing allies such as South Africa and Turkey.
And like that, one more conspiracy theory is relegated to the "fact" bin, as those using the "tin foil, crack-pot conspiracy theorists" fallback, are slowly becoming the biggest laughing stock in town.
So who gave the green light for this blatant spying operation, which assuredly takes place at every meeting of the world's leading political (and other) dignitaries? Why that supreme gold top-tick timer himself, Gordon Brown:



There have often been rumours of this kind of espionage at international conferences, but it is highly unusual for hard evidence to confirm it and spell out the detail. The evidence is contained in documents classified as top secret which were uncovered by the NSA whistleblower Edward Snowden and seen by the Guardian. They reveal that during G20 meetings in April and September 2009 GCHQ used what one document calls "ground-breaking intelligence capabilities" to intercept the communications of visiting delegations.
The timing of today's release comes at a perfect time, just as yet another G-8 meeting is due to commence shortly in the UK:



The revelation comes as Britain prepares to host another summit on Monday for the G8 nations, all of whom attended the 2009 meetings which were the object of the systematic spying. It is likely to lead to some tension among visiting delegates who will want the prime minister to explain whether they were targets in 2009 and whether the exercise is to be repeated this week.
What else did the revealed G-20 spying consist of:
  • Setting up internet cafes where they used an email interception programme and key-logging software to spy on delegates' use of computers;
  • Penetrating the security on delegates' BlackBerrys to monitor their email messages and phone calls;
  • Supplying 45 analysts with a live round-the-clock summary of who was phoning who at the summit;
  • Targeting the Turkish finance minister and possibly 15 others in his party;
It just goes downhill from there:



A briefing paper dated 20 January 2009 records advice given by GCHQ
officials to their director, Sir Iain Lobban, who was planning to meet
the then foreign secretary, David Miliband. The officials summarised
Brown's aims for the meeting of G20 heads of state due to begin on 2
April, which was attempting to deal with the economic aftermath of the
2008 banking crisis. The briefing paper added: "The GCHQ intent is to
ensure that intelligence relevant to HMG's desired outcomes for its
presidency of the G20 reaches customers at the right time and in a form
which allows them to make full use of it." Two documents explicitly
refer to the intelligence product being passed to "ministers".

[Image: GCHQ-ragout-1-002.jpg]


According to the material seen by the Guardian, GCHQ generated this
product by attacking both the computers and the telephones of delegates.
Most importantly, the bullshit excuse that spying by the GCHQ and the NSA, was being done to safeguard the safety and security of "the people" will no longer fly. And if anything, the latest set of disclosures shouldgenerate a diplomatic scandal of unprecedented proportions. Alas, in a world in which everyone is broke and reliant on the goodwill of the Fed, and by implication, the Fed's code breakers, the NSA, we wouldn't be surprised if nothing happens.



Other documents record apparently successful efforts to penetrate the security of BlackBerry smartphones: "New converged events capabilities against BlackBerry provided advance copies of G20 briefings to ministers … Diplomatic targets from all nations have an MO of using smartphones. Exploited this use at the G20 meetings last year."

The operation appears to have run for at least six months. One document records that in March 2009 the month before the heads of state meeting GCHQ was working on an official requirement to "deliver a live dynamically updating graph of telephony call records for target G20 delegates … and continuing until G20 (2 April)."

Another document records that when G20 finance ministers met in London in September, GCHQ again took advantage of the occasion to spy on delegates, identifying the Turkish finance minister, Mehmet Simsek, as a target and listing 15 other junior ministers and officials in his delegation as "possible targets". As with the other G20 spying, there is no suggestion that Simsek and his party were involved in any kind of criminal offence. The document explicitly records a political objective "to establish Turkey's position on agreements from the April London summit" and their "willingness (or not) to co-operate with the rest of the G20 nations".

The September meeting of finance ministers was also the subject of a new technique to provide a live report on any telephone call made by delegates and to display all of the activity on a graphic which was projected on to the 15-sq-metre video wall of GCHQ's operations centre as well as on to the screens of 45 specialist analysts who were monitoring the delegates.

"For the first time, analysts had a live picture of who was talking to who that updated constantly and automatically," according to an internal review.

A second review implies that the analysts' findings were being relayed rapidly to British representatives in the G20 meetings, a negotiating advantage of which their allies and opposite numbers may not have been aware: "In a live situation such as this, intelligence received may be used to influence events on the ground taking place just minutes or hours later. This means that it is not sufficient to mine call records afterwards real-time tip-off is essential."
The surveillance got so far as reading people's emails at the same time as they typed!



One document refers to a tactic which was "used a lot in recent UK conference, eg G20". The tactic, which is identified by an internal codeword which the Guardian is not revealing, is defined in an internal glossary as "active collection against an email account that acquires mail messages without removing them from the remote server". A PowerPoint slide explains that this means "reading people's email before/as they do".
End result: a very grateful GCHQ:



In the week after the September meeting, a group of analysts sent an internal message to the GCHQ section which had organised this live monitoring: "Thank you very much for getting the application ready for the G20 finance meeting last weekend … The call records activity pilot was very successful and was well received as a current indicator of delegate activity …

"It proved useful to note which nation delegation was active during the moments before, during and after the summit. All in all, a very successful weekend with the delegation telephony plot."
And now we go back to your regularly scheduled prime-time soap opera tragicomedy for idiots, in which the protagonists read from teleprompters advising the same idiots, that only terrorist suspects are targeted by the totalitarian superstate, and that no matter what, one should trust the government - after all they are only here to help you.

The shadow is a moral problem that challenges the whole ego-personality, for no one can become conscious of the shadow without considerable moral effort. To become conscious of it involves recognizing the dark aspects of the personality as present and real. This act is the essential condition for any kind of self-knowledge.
Carl Jung - Aion (1951). CW 9, Part II: P.14
Reply
#2
Quote:One document refers to a tactic which was "used a lot in recent UK conference, eg G20". The tactic, which is identified by an internal codeword which the Guardian is not revealing, is defined in an internal glossary as "active collection against an email account that acquires mail messages without removing them from the remote server". A PowerPoint slide explains that this means "reading people's email before/as they do".
End result: a very grateful GCHQ:

Web-based email.

Like cloud computing, it's effectively inviting the spooks into your house and into your every thought.
"It means this War was never political at all, the politics was all theatre, all just to keep the people distracted...."
"Proverbs for Paranoids 4: You hide, They seek."
"They are in Love. Fuck the War."

Gravity's Rainbow, Thomas Pynchon

"Ccollanan Pachacamac ricuy auccacunac yahuarniy hichascancuta."
The last words of the last Inka, Tupac Amaru, led to the gallows by men of god & dogs of war
Reply
#3
I also strongly suspect they can spin up your wifi connected hard-drive and read it even when your laptop has it's lid down, or your desktop is in sleep mode or even off. Basically, they can covertly access any type of electronic communication devices.
The shadow is a moral problem that challenges the whole ego-personality, for no one can become conscious of the shadow without considerable moral effort. To become conscious of it involves recognizing the dark aspects of the personality as present and real. This act is the essential condition for any kind of self-knowledge.
Carl Jung - Aion (1951). CW 9, Part II: P.14
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  London shoot-out: Inside the CIA's secret war plans against WikiLeaks Magda Hassan 5 2,962 30-09-2021, 12:13 PM
Last Post: Magda Hassan
  London attack a false flag Hei Sing Tso 4 9,489 28-03-2017, 01:53 AM
Last Post: Rolf Zaeschmar
  Police find body in bag at MI6 man's London flat Danny Jarman 197 68,290 01-09-2015, 05:29 PM
Last Post: Michael Barwell
  BELGACOM hacked by GCHQ Carsten Wiethoff 6 6,248 13-12-2014, 10:36 AM
Last Post: Magda Hassan
  At Last! Someone takes on GCHQ surveillance David Guyatt 2 3,060 05-05-2014, 01:38 PM
Last Post: Magda Hassan
  London 'slavery' case: suspect was communist activist in 1970s Danny Jarman 3 4,079 26-11-2013, 12:54 PM
Last Post: David Guyatt
  Does kidnapped U.S. lesbian blogger in Syria actually exist... or did she steal London woman's ID? Magda Hassan 6 5,840 14-06-2011, 11:02 PM
Last Post: Magda Hassan
  the artist who spied on M16 Bernice Moore 0 2,009 15-02-2011, 04:35 AM
Last Post: Bernice Moore
  London Bombings - Hanky Panky - By Eyewitness & Victim Peter Lemkin 0 3,462 18-12-2008, 11:54 AM
Last Post: Peter Lemkin

Forum Jump:


Users browsing this thread: 1 Guest(s)