CBC on CSE cyberwarfare plans and capabilities
The CBC has a major new release on CSE's cyberwarfare plans and capabilities today (Amber Hildebrandt, Michael Pereira & Dave Seglins, "Communication Security Establishment's cyberwarfare toolbox revealed: Mexico, North Africa, Middle East among targets of cyber-spy hacking," CBC News, 23 March 2015):
Top-secret documents obtained by the CBC show Canada's electronic spy agency has developed a vast arsenal of cyberwarfare tools alongside its U.S. and British counterparts to hack into computers and phones in many parts of the world, including in friendly trade countries like Mexico and hotspots like the Middle East.There's a lot in the CBC report that I won't try to summarize here. Go read it.
The little known Communications Security Establishment wanted to become more aggressive by 2015, the documents also said.
Revelations about the agency's prowess should serve as a "major wakeup call for all Canadians," particularly in the context of the current parliamentary debate over whether to give intelligence officials the power to disrupt national security threats, says Ronald Deibert, director of the Citizen Lab, the respected internet research group at University of Toronto's Munk School of Global Affairs.
"These are awesome powers that should only be granted to the government with enormous trepidation and only with a correspondingly massive investment in equally powerful systems of oversight, review and public accountability," says Deibert.
Details of the CSE’s capabilities are revealed in several top-secret documents analyzed by CBC News in collaboration with The Intercept, a U.S. news website co-founded by Glenn Greenwald, the journalist who obtained the documents from U.S. whistleblower Edward Snowden.
See also this sidebar: Amber Hildebrandt, Michael Pereira & Dave Seglins, "From hacking to attacking, a look at Canada's cyberwarfare tools: The secret techniques developed by the Communications Security Establishment," CBC News, 23 March 2015.
A couple of short videos are also part of the package:
- Cyberwarfare toolbox revealed
- Disruption possibilities
There is a great deal of additional information on EONBLUE and many other topics in the documents that the CBC based its reporting on, which it released with mostly minor redactions:
- CASCADE: Joint Cyber Sensor Architecture
- NSA memo on intelligence relationship with CSE
- CSEC Cyber Threat Capabilities
- Cyber Threat Detection
- CSEC SIGINT Cyber Discovery
CSE's response to CBC's questions, a much less informative document, was also published.
The NSA memo on the intelligence relationship with CSE was also released in redacted form by the CBC in December 2013 as part of these two stories. The redactions in the current version are nearly identical, but this time it is clearer that the document is actually four pages long.
The current version also briefly left unredacted the fact that the "unique geographic access to areas unavailable to the U.S." that CSE provides to its U.S. partner is our "sites in the PRC", the People's Republic of China.
Update 6:00 pm 23 March 2015:
- Christopher Parsons, "Canada has a spy problem," National Post, 23 March 2015.
- Nick Taylor-Vaisey, "QP Live: The CSE is no longer a secret," Maclean's, 23 March 2015.
- Martin Anderson, "‘Create unrest’: Canada’s CSE agency includes ‘false flag’ operations as part of newly-revealed cyberwarfare scope," The Stack, 23 March 2015.
- Nestor E. Arellano, "Leaked documents reveal Canada’s cyber warfare tools," IT World Canada, 23 March 2015.
Update 10 pm:
Further CBC coverage:
- Dave Seglins, "Canada's cyberwarfare capabilities revealed," segment on The National, 23 March 2015.
- The Intercept reporter Ryan Gallagher interviewed on As It Happens, 23 March 2015 (interview begins at 9:00 minutes). The Intercept's own coverage of the story is here.
Update 24 March 2015:
Added link to FVEYdocs.org copy of the slightly less redacted version of the NSA-CSE relationship document originally released by CBC yesterday.
Update 25 March 2015:
- Amber Hildebrandt, "CSE spying in Mexico: Espionage aimed at friends 'never looks good'," CBC News, 25 March 2015.
- Iain Thomson, "Snowden dump details Canadian spies running false flag ops online," The Register, 24 March 2015.
Update 28 March 2015:
Christopher Parsons analyzes the newly released documents here: "Five New Additions to the SIGINT Summaries," Technology, Thoughts & Trickets blog, 27 March 2015.