Politics, Rights, Technology

Secret Malware in European Union Attack Linked to US and British Intelligence

Complex malware known as Regin is the suspected technology behind sophisticated cyberattacks conducted by US and British intelligence agencies on the European Union and a Belgian telecommunications company, according to security industry sources and technical analysis conducted by The Intercept.

Regin was found on infected internal computer systems and email servers at Belgacom, a partly state-owned Belgian phone and internet provider, following reports last year that the company was targeted in a top-secret surveillance operation carried out by British spy agency Government Communications Headquarters, industry sources told The Intercept.

The malware, which steals data from infected systems and disguises itself as legitimate Microsoft software, has also been identified on the same European Union computer systems that were targeted for surveillance by the National Security Agency.

The hacking operations against Belgacom and the European Union were first revealed last year through documents leaked by NSA whistle-blower Edward Snowden. The specific malware used in the attacks has never been disclosed, however.

The Regin malware, whose existence was first reported by the security firm Symantec on Sunday, is among the most sophisticated ever discovered by researchers. Symantec compared Regin to Stuxnet, a state-sponsored malware program developed by the U.S. and Israel to sabotage computers at an Iranian nuclear facility. Sources familiar with internal investigations at Belgacom and the European Union have confirmed to The Intercept that the Regin malware was found on their systems after they were compromised, linking the spy tool to the secret GCHQ and NSA operations.

Ronald Prins, a security expert whose company Fox IT was hired to remove the malware from Belgacom’s networks, told The Intercept that it was “the most sophisticated malware” he had ever studied.

Having analysed this malware and looked at the [previously published] Snowden documents, Prins said, I’m convinced Regin is used by British and American intelligence services — via redwolf.newsvine.com

History, Politics, World

East German officer who opened Berlin Wall wept moments later

The East German lieutenant colonel who gave the fateful order to throw open the Berlin Wall 25 years ago said he wept in silence a few moments later as hordes of euphoric East Germans swept past him into West Berlin to get their first taste of freedom.

Harald Jaeger said in an interview with Reuters that he spent hours before his history-changing decision trying in vain to get guidance from superiors on what to do about the 20,000 protesters at his border crossing clamouring to get out.

When he had had enough of being laughed at, ridiculed and told by commanders to sort it out for himself, Jaeger ordered the 46 armed guards under his command to throw open the barrier.

He then stepped back and cried — tears of relief that the stand-off had ended without violence, tears of frustration that his superiors had left him in the lurch and tears of despair from a man who had so long believed in the Communist ideal.

He had joined the border guard unit in 1961. Over 28 years, he saw the barrier grow from an infancy of coiled barbed wire, to a brick wall and then to maturity as a towering 160 Km (100 mile) double white concrete screen that encircled West Berlin, cutting across streets, between families, through graveyards — via redwolf.newsvine.com

Politics, Rights, Technology

Australian government warrantless data requests pass 500,000

Requests from government agencies for Australian telecommunications customers’ phone, internet, and address data surpassed 500,000 in the last financial year, according to the Australian Communications and Media Authority (ACMA).

The figure was revealed in the ACMA’s annual report (PDF) released this month. It says that there were 563,012 authorisations granted to government agencies for access to telecommunications metadata in the 2013-14 financial year.

Under the Telecommunications (Interception and Access) Act, government agencies can force telecommunications companies to hand over details about their customers, including address, phone number, IP address, call data, SMS data, and other held information without a warrant for the purpose of enforcing the law.

The ACMA recorded that total disclosures amounted to 748,079 for the financial year including to law enforcement for a range of reasons, such as to avert a threat to life, assist the ACMA, or enforce the criminal law of a foreign country.

The number of requests by far exceeds the more than 300,000 requests made in the 2012-13 financial year reported by the Attorney-General’s Department in its Telecommunications (Interception and Access) report last year. The report for this year has yet to be tabled in parliament.

A spokesperson for the Attorney-General’s Department had not responded to a request for comment on the disparity at the time of writing; however, security agencies such as the Australian Security and Intelligence Organisation (ASIO) are not required to publicly report the number of metadata access requests they make.

The department told The Guardian that the difference between the two figures was due to the department only counting the authorisation for a particular person’s details. So if the request is made to multiple telcos for that one person’s information, the access request is only counted as one from that particular government agency. The ACMA has compiled its report based on data from the telcos themselves, leading to the higher figure — via redwolf.newsvine.com

Politics

Obituary: Gough Whitlam

Australia’s 21st prime minister and a titan of the Australian Labor Party, Edward Gough Whitlam, has died, aged 98.

Mr Whitlam leaves a legacy of unprecedented and unmatched change in Australian politics.

Arguably, he was as much lauded for his reformist leadership and eloquence as he was lambasted for his autocratic style and profligacy.

But it is for being at the centre of Australia’s most ferocious political storm, the Dismissal, that Gough Whitlam will forever be remembered — via redwolf.newsvine.com

Photo credit: Australian Information Service, National Library of Australia collection

Politics

Three things must change for a healthier democracy

There are three drivers in Australian politics — the parties, the voting system and the media — that are all connected and self-supporting. And all are conspiring to hollow out our democracy, writes Tim Dunlop.

To listen in on any halfway serious discussion of politics these days is to eavesdrop on a cacophony of dissatisfaction. Issues come and go, but the underlying unease remains no matter how much we vent or how many logical arguments we make about a given issue.

The reason the whole kabuki is so unsatisfactory is because we spend too much time worrying about the day-to-day issues rather than addressing the underlying drivers of our problems.

There are a number of these drivers, but three in particular need our attention if we are ever to move out of the rut we are in. All three are all intimately connected — via redwolf.newsvine.com

Politics

Ill-judged politics underlies Clover attacks

New South Wales now: the new state of business. Really? Could they have found anything clunkier? Could their graphic be more redolent of some rock-jawed 1950s Texas oil-co?

Yet it is disturbingly apt, for a state so rusted-on to last-century values. A state ruled, it now seems, by an elephant-shooter, whose parliamentary office grins with the stuffed corpses of his victims. A state whose best chance now of a green future lies with China.

Excepting Sydney City, Clover Moore’s Sydney sits in Abbott’s Australia like an oasis of spring growth in a slag-heap. While Abbott snubs United Nations climate talks, scraps the carbon price and deliberately undermines renewables, the city has reduced its emissions by 21 per cent, retrofitted much of its building stock, installed LED streetlights throughout, pioneered trigeneration and, despite relentless derision, built bike-lanes.

Measured by achievement, Clover is hands down the best mayor this city has had. But she, too, is firmly in the elephant shooter’s sights.

Robert Borsak’s City of Sydney Amendment (Elections) Amendment Bill, known colloquially as the Elephant Shooter’s Bill, became law last month. It is designed to maximise the business vote by replacing one optional vote per business with two compulsory votes.

The government says it is not about Clover. They said that, too, about the last law they passed, two years ago, to oust her from parliament. (Clover jokes grimly that she is probably the only person in Australia to have provoked two statutes designed to bar her from public life.)

Yet the gentlemen protest too much. During one day of parliamentary debate on the bill, the lord mayor scored fully ninety-eight mentions. No other local politician was mentioned once.

Borsak himself is less coy, telling parliament in his second reading speech that he wanted to remove Ms Moore as Sydney Lord Mayor.

It’s easy to see Borsak’s motives. He likes limelight, couldn’t care less about the city and wants revenge for the 28 parliamentary years through which Clover steadfastly opposed the gun lobby. She doesn’t support us, we don’t support her, he says. Bush justice.

Government support is more mysterious. Business itself was content — even Alan Jones noted they weren’t exactly marching in the streets — and many Liberals, including Sydney Business Chamber head (and former MLC) Patricia Forsythe, believe the new law undemocratic.

The Melbourne model, on which it is based, has few defenders. Melbourne mayor Robert Doyle insists that city planning is just about property rights and 50 new towers are now pending, but a recent review by former federal Liberal MP Petro Georgiou describes this two-votes-per-business model as deeply flawed, and recommends its abandonment.

In NSW parliament, Premier Mike Baird also seemed embarrassed by the blatant breach of the one-entity-one-vote principle. Former premier Barry O’Farrell was openly derisive. Yet they both voted for it. So where is Borsak’s power base?

Rogue media. Here again, Borsak is disarmingly frank, explicitly thanking both Alan Jones and the Tele for campaigns waged on his behalf. The man may not be sophisticated, but he knows how to stiffen a floppy premier.

Needless to say, however, Borsak did not hatch this ugly duckling alone. It was brought to him, already mangled, by failed Liberal mayoral candidate and current city councillor Edward Mandla — via redwolf.newsvine.com

Politics, Rights

Call that a sword? This is a joke

tephen King once wrote that horror and humour were two of the most difficult story forms to master, because funny gone wrong is almost always horrifying, while a bungled horror story runs the risk of eliciting shrieks of laughter in place of terror.

It didn’t take long for the narrative threads of Death Cult in the Suburbs to unravel and the snickering to begin. And so we find, a few weeks after September’s terror raids, that the mystery sword that featured so prominently in everybody’s fever dreams of jihad come to Martin Place was not in fact the mighty blade of slashening; woe be unto the infidel. It was just a plastic toy, according to its owner. A replica artefact, as common in Shiite Muslim households as sun-faded happy snaps of Pope St John Paul II in the homes of Polish Catholics.

I guess it’s a lucky thing the raids only turned up a plastic sword then. What if those 800 cops had found a toy light sabre? The headlines would have screamed ISIS develops terrifying Stars Wars capability. The SAS might have been despatched to Tatooine.

There was always something dodgy about the scale of those raids, especially given the thin pickings they seemed to turn up. Very few arrests and now a prime piece of evidence negated.

Note the air quotes around the term evidence, though. The sword, which promised such horror in so many published, shared and retweeted photos, never made it into court.

If all the world’s a stage, it was a prop and the hundreds of citizens whose homes were raided weren’t even players. They were extras. Not even bit players, like the sailor whose story of being attacked while in uniform, perhaps because he was in uniform, was revealed as a bizarre fantasy, but only after that story had turned the crank on tensions a few notches further.

There’s something at play here that isn’t as simple a narrative as good v evil. For instance, in the month that Daash killers cut the heads off three captives on the internet, our Saudi Arabian allies publicly decapitated eight for various crimes including adultery, apostasy and sorcery. Woe be unto you, Harry Potter.

Our particular malady is not even a politics as theatre, however. Although Tony Abbott and the media are playing the terror card for all it’s worth and more, there are legitimate security issues buried somewhere beneath the witless hysteria, fear-mongering and click bait.

It’s fraught and complex, and the pity of our current derangement is that it not only prevents us from seeing this and dealing with the threat, it aggravates the condition — via redwolf.newsvine.com

Politics, Rights, Technology

Australian Government Scrambles to Authorise Mass Surveillance

This week, Australian Prime Minister Tony Abbott used recent terrorist threats as the backdrop of a dire warning to Australians that for some time to come, the delicate balance between freedom and security may have to shift. There may be more restrictions on some, so that there can be more protection for others.

This pronouncement came as two of a series of three bills effecting that erosion of freedoms made their way through Australia’s Federal Parliament. These were the second reading of a National Security Amendment Bill which grants new surveillance powers to Australia’s spy agency, ASIO, and the first reading of a Counter-Terrorism Legislation Amendment (Foreign Fighters) Bill that outlaws speech seen as advocating terrorism. A third bill on mandatory data retention is expected to be be introduced by the end of the year.

Whilst all three bills in this suite raise separate concerns, the most immediate concern—because the bill in question could be passed this week — is the National Security Amendment Bill. Introduced into Parliament on 16 July, it endured robust criticism during public hearings last month that led into an advisory report released last week. Nevertheless the bill was introduced into the Senate this Tuesday with the provisions of most concern still intact.

In simple terms, the bill allows law enforcement agencies to obtain a warrant to access data from a computer—so far, so good. But it redefines a computer to mean not only one or more computers but also one or more computer networks. Since the Internet itself is nothing but a large network of computer networks, it seems difficult to avoid the conclusion that the bill may stealthily allow the spy agency to surveil the entire Internet with a single warrant.

Apart from allowing the surveillance of entire computer networks, the bill also allows the addition, deletion or alteration of data stored on a computer, provided only that this would not materially interfere with, interrupt or obstruct a communication in transit or the lawful use by other persons of a computer unless … necessary to do one or more of the things specified in the warrant. Given the broad definition of computer, this provision is broad enough to authorise website blocking or manipulation, and even the insertion of malware into networks targeted by the warrant — via redwolf.newsvine.com

Politics, Rights, Technology, World

New Zealand denies it was planning mass domestic spying

New Zealand was preparing to conduct national covert surveillance last year, a US investigative journalist has said.

The claims by former Guardian newspaper reporter Glenn Greenwald were denied by New Zealand Prime Minister John Key.

The report was based on information disclosed by former US National Security Authority (NSA) contractor Edward Snowden, who said the government had planned to exploit new spying laws.

The revelations come just days ahead of a New Zealand general election — via redwolf.newsvine.com

Business, Politics, Rights, Technology

Copyright infringement is terrorism, screech the revolution’s losers

You might have thought that Australia’s debate over online copyright infringement couldn’t get any sillier. But this week the journalists’ union came out as a fan of internet censorship, only to withdraw when they realised what they’d done. And Village Roadshow equated copyright infringement with terrorism and paedophilia, and came out in support of, oh, moonbats or something. Hard to say.

Village Roadshow’s submission (PDF) to the government’s copyright infringement discussion paper is the loopiest, with so much shouting and whining that it’s hard to take their hyperbole seriously.

The dangers posed by piracy are so great, the goal should be total eradication or zero tolerance. Just as there is no place on the internet for terrorism or paedophilia, there should be no place for theft that will impact the livelihoods of the 900,000 people whose security is protected by legitimate copyright, the submission says.

Oh get a grip.

The tone is clearly that of Village Roadshow’s co-CEO Graham Burke, whose manner at the best of times can most generously be described as eccentric. But to equate the abstract problem of a reduction in your profit margin with the damage done to the victims of child sexual abuse and the slaughter of innocents? That takes some chutzpah — via redwolf.newsvine.com

Politics, Rights, Technology

Leaked paper reveals Australia’s obsessive metadata secrecy

Last Friday, the Australian Attorney-General’s Department sent internet service providers (ISPs) a confidential discussion paper — subsequently leaked to Fairfax Media — that attempts to clarify exactly what metadata they’ll be required to store under the government’s proposed mandatory data-retention scheme. The detailed requirements are presumably designed to feed into the statutory specification of metadata that will be included in legislation to be introduced to parliament in coming weeks.

Until now, the only official government description of metadata we’d seen — apart from that breathtakingly confused TV performance by Australia’s favourite Attorney-General Senator George Brandis QC — was the hilariously inadequate one-pager (PDF) that the Attorney-General’s Department (AGD) tabled in Senate Estimates on October 15, 2012, after much prodding by Greens Senator Scott Ludlam.

You might therefore think that the description of the government’s metadata needs in Friday’s document was a recent development.

You’d be wrong.

A confidential document obtained by ZDNet shows that even more detailed descriptions of the government’s data-collection ambitions had been discussed with ISPs as far back as early 2010.

The document, Carrier-Carriage Service Provider Data Set Consultation Paper version 1.0 (PDF), is a 16-page PDF file created on 9 March 2010, at 14:49. Its core sections are similar in structure to the nine-page document obtained by Fairfax Media this week, with the addition of tables of sample data to further illustrate the expected type of data to be retained for each specific retention requirement from the data set, discussion questions for industry to answer, and an introductory background section rather than an executive summary.

The 2010 version of the document was quite specific about the data to be collected. For mobile calls, for example, the data would include the IMSI and IMEI of both the calling party’s and called party’s devices, whereas the current version simply specifies the identifier(s) of the devices. This is in line with the government’s intention to make the legislation technology neutral.

References to web-browser sessions and file transfers that were in the 2010 version have vanished, too, in line with such ideas being dropped as the data-retention debate has evolved — via redwolf.newsvine.com

Politics, Rights

Al Jazeera journalists teargassed by security forces – in Ferguson, Missouri, USA

Here is a sentence that will be immediately familiar to anyone who has ever followed even a little news out of the Middle East:

Journalists from the Qatari news outlet Al Jazeera were attacked by state security forces today and blanketed in tear gas, as they attempted to film an ongoing protest; this is the latest in a string of attacks on journalists by security forces.

Now see if you can guess the country. It’s not Egypt. Not Tunisia.

Nope: this happened, exactly as described, in the United States of America on Wednesday night, in the Missouri town of Ferguson. Here is the video of Al Jazeera America journalists in Ferguson being clearly targeted with tear gas by Ferguson police (apologies for the poor quality) — via redwolf.newsvine.com

Business, Politics

Meet the Beer Bottle Dictator

Widely regarded as an eccentric bureaucrat, Kent ‘Battle’ Martin approves essentially every beer label in the United States, giving him awesome power over a huge industry.

For years, one man has approved virtually every beer label design in the United States. Among brewers, he’s a tyrant. A legend.

A pedantic pain in the ass.

Brewers and legal experts speak of him in hushed tones, with equal parts irritation and reverence.

He’s the king of beer. His will is law, said one lawyer who works with him regularly. The lawyer asked to remain anonymous, for fear of crossing the beer specialist. There’s one dude in the government who gets to control a multibillion-dollar industry with almost no supervision.

And he goes by the name Battle.

Any brewery that wants to market its wares in this country needs to get it through Kent Battle Martin, giving the federal official extraordinary power. With only vague regulations outlining what is and isn’t permissible, he approves beer bottles and labels for the Tax and Trade Bureau, or TTB, a section of the Treasury Department.

Those who have interacted with him describe him as brusque, eccentric, clenched. He is tensely and formally dressed on all occasions, with an encyclopedic memory of beer labels. He is bespectacled and somewhat awkward.

This year, Battle has singlehandedly approved over 29,500 beer labels, the only fact his press handler would provide. The TTB would not even provide basic biographical details about the famed regulator, much less make him available for an interview — via redwolf.newsvine.com