{"id":53598,"date":"2015-02-09T13:29:55","date_gmt":"2015-02-09T13:29:55","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=53598"},"modified":"2015-05-05T21:26:07","modified_gmt":"2015-05-05T20:26:07","slug":"western-spy-agencies-secretly-rely-on-hackers-for-intel-and-expertise","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2015\/02\/western-spy-agencies-secretly-rely-on-hackers-for-intel-and-expertise\/","title":{"rendered":"Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise"},"content":{"rendered":"<div id=\"attachment_53599\" style=\"width: 550px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/02\/hacker-being-hacked-article-display-b-usa-surveillance-spying-nsa-gchq-canada.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53599\" class=\"size-full wp-image-53599\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/02\/hacker-being-hacked-article-display-b-usa-surveillance-spying-nsa-gchq-canada.jpg\" alt=\"Hacker being hacked. Illustration: Getty Images\" width=\"540\" height=\"338\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/02\/hacker-being-hacked-article-display-b-usa-surveillance-spying-nsa-gchq-canada.jpg 540w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/02\/hacker-being-hacked-article-display-b-usa-surveillance-spying-nsa-gchq-canada-300x188.jpg 300w\" sizes=\"auto, (max-width: 540px) 100vw, 540px\" \/><\/a><p id=\"caption-attachment-53599\" class=\"wp-caption-text\">Hacker being hacked.<br \/>Illustration: Getty Images<\/p><\/div>\n<p><em>4 Feb 2015 &#8211; <\/em>The U.S., U.K. and Canadian\u00a0governments characterize hackers as\u00a0<a target=\"_blank\" href=\"http:\/\/www.theverge.com\/2012\/4\/9\/2930626\/yochai-benkler-anonymous-cybersecurity-laws\" >a criminal menace<\/a>, warn of the <a target=\"_blank\" href=\"http:\/\/www.wsj.com\/articles\/SB10001424052970204059804577229390105521090\" >threats they allegedly pose<\/a>\u00a0to critical infrastructure, and\u00a0<a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/world\/2012\/jul\/10\/gary-mckinnon-hacking-prosecution-us\" >aggressively prosecute<\/a> them, but they are also secretly exploiting their information and expertise, according to top secret documents.<\/p>\n<p>In some cases, the surveillance agencies\u00a0are obtaining the content of emails by monitoring hackers as they breach email\u00a0accounts, often without notifying the hacking victims of these breaches.\u00a0\u201cHackers are stealing the emails of some of our targets\u2026 by collecting the hackers\u2019 \u2018take,\u2019 we . . .\u00a0\u00a0get access to the emails themselves,\u201d reads one top secret 2010 National Security Agency document.<\/p>\n<p>These and other revelations about the intelligence agencies\u2019 reliance on hackers are\u00a0contained in documents\u00a0provided by whistleblower Edward Snowden. The documents\u2014which come from the\u00a0U.K. Government Communications Headquarters agency and NSA\u2014shed new light on the various means used by intelligence agencies to exploit hackers\u2019 successes and learn from their skills, while also raising questions about whether governments have overstated the threat posed by some hackers.<\/p>\n<p>By\u00a0looking out for hacking conducted\u00a0\u201cboth by state-sponsored and freelance hackers\u201d and riding on the coattails of hackers, Western intelligence agencies\u00a0have gathered what they regard as<strong>\u00a0<\/strong>valuable content:<\/p>\n<p><em>Recently, Communications Security Establishment Canada (CSEC) and Menwith Hill Station (MHS) discovered and began exploiting a target-rich data set being stolen by hackers. The hackers\u2019 sophisticated email-stealing intrusion set is known as INTOLERANT. Of the traffic observed, nearly half contains category hits because the attackers are targeting email accounts of interest to the Intelligence Community. Although a relatively new data source, [Target Offices of Primary Interest] have already written multiple reports based on INTOLERANT collect.<\/em><\/p>\n<p>The hackers targeted a wide range of diplomatic corps, human rights and democracy activists and even journalists:<\/p>\n<p><em>INTOLERANT traffic is very organized. Each event is labeled to identify and categorize victims. Cyber attacks commonly apply descriptors to each victim \u2013 it helps herd victims and track which attacks succeed and which fail. Victim categories make INTOLERANT interesting:<\/em><\/p>\n<p><em>A = Indian Diplomatic &amp; Indian Navy<br \/>\nB = Central Asian diplomatic<br \/>\nC = Chinese Human Rights Defenders<br \/>\nD = Tibetan Pro-Democracy Personalities<br \/>\nE = Uighur Activists<br \/>\nF = European Special Rep to Afghanistan and Indian photo-journalism<br \/>\nG = Tibetan Government in Exile<\/em><\/p>\n<p>In those cases, the NSA and its partner agencies in the United Kingdom and Canada were unable to determine the identity of the hackers who collected the data, but suspect a state sponsor \u201cbased on the level of sophistication and the victim set.\u201d<\/p>\n<p>In instances where hacking may compromise data from the U.S. and U.K. governments, or their allies, notification was given to the \u201crelevant parties.\u201d<\/p>\n<p>In a separate document, GCHQ officials discuss plans to use open source discussions among hackers to improve their own knowledge. \u201cAnalysts are potentially missing out on valuable open source information relating to cyber defence because of an inability to easily keep up to date with specific blogs and Twitter sources,\u201d according to one document.<\/p>\n<p>GCHQ created a program called LOVELY HORSE to monitor and index public discussion by hackers on Twitter and other social media. The Twitter accounts designated for collection in the 2012\u00a0document:<\/p>\n<div id=\"attachment_53600\" style=\"width: 550px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/02\/lovely-horse-doc-540x431-surveillance-spying-nsa-gchq-usa-uk-canada-hacking.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-53600\" class=\"size-full wp-image-53600\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/02\/lovely-horse-doc-540x431-surveillance-spying-nsa-gchq-usa-uk-canada-hacking.jpg\" alt=\"Illustration: Getty Images\" width=\"540\" height=\"431\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/02\/lovely-horse-doc-540x431-surveillance-spying-nsa-gchq-usa-uk-canada-hacking.jpg 540w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2015\/02\/lovely-horse-doc-540x431-surveillance-spying-nsa-gchq-usa-uk-canada-hacking-300x239.jpg 300w\" sizes=\"auto, (max-width: 540px) 100vw, 540px\" \/><\/a><p id=\"caption-attachment-53600\" class=\"wp-caption-text\">Illustration: Getty Images<\/p><\/div>\n<p>These accounts represent a\u00a0cross section of the hacker community and security scene. In addition to monitoring multiple accounts affiliated with Anonymous, GCHQ monitored the <a target=\"_blank\" href=\"https:\/\/twitter.com\/kevinmitnick\" >tweets of Kevin Mitnick<\/a>, who was sent to prison in 1999 for various computer and fraud related offenses. The U.S. Government once characterized Mitnick as one of the world\u2019s most villainous hackers, but\u00a0he has since turned security consultant and <a target=\"_blank\" href=\"http:\/\/www.wired.com\/2014\/09\/kevin-mitnick-selling-zero-day-exploits\/\" >exploit broker<\/a>.<\/p>\n<p>Among others, GCHQ monitored the tweets of reverse-engineer and Google employee, <a target=\"_blank\" href=\"https:\/\/twitter.com\/halvarflake\" >Thomas Dullien<\/a>.\u00a0Fellow Googler\u00a0<a target=\"_blank\" href=\"https:\/\/twitter.com\/taviso\" >Tavis Ormandy<\/a>, from Google\u2019s vulnerability research team Project Zero, is featured on the list, along with other well known offensive security researchers, including Metasploit\u2019s <a target=\"_blank\" href=\"https:\/\/twitter.com\/hdmoore\" >HD Moore<\/a> and <a target=\"_blank\" href=\"https:\/\/twitter.com\/egyp7\" >James Lee (aka Egypt)<\/a> together with <a target=\"_blank\" href=\"https:\/\/twitter.com\/dinodaizovi\" >Dino Dai Zovi<\/a> and <a target=\"_blank\" href=\"https:\/\/twitter.com\/alexsotirov\" >Alexander Sotirov<\/a>, who at the time both worked for New York-based offensive security\u00a0company, Trail of Bits (Dai Zovi has since taken up a position at payment company, Square). The list also includes notable anti-forensics and operational security expert \u201c<a target=\"_blank\" href=\"https:\/\/twitter.com\/thegrugq\" >The Grugq.\u201d<\/a><\/p>\n<p>GCHQ monitored the tweets of former NSA agents <a target=\"_blank\" href=\"https:\/\/twitter.com\/daveaitel\" >Dave Aitel<\/a> and <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/2015\/02\/04\/demonize-prosecute-hackers-nsa-gchq-rely-intel-expertise\/0xcharlie\" >Charlie Miller<\/a>, and former Air Force intelligence officer <a target=\"_blank\" href=\"https:\/\/twitter.com\/taosecurity\" >Richard Bejtlich<\/a> as well as French exploit vendor, <a target=\"_blank\" href=\"https:\/\/twitter.com\/vupen\" >VUPEN<\/a> (who sold a one year <a target=\"_blank\" href=\"https:\/\/muckrock.s3.amazonaws.com\/foia_files\/9-11-13_MR6593_RES.pdf\" >subscription<\/a> for its binary analysis and exploits service to the NSA in 2012).<\/p>\n<p>The GCHQ document states\u00a0that they\u00a0\u201ccurrently have a list of around 60 blog and Twitter sources\u201d that were identified by analysts for collection.\u00a0A prototype of the LOVELY HORSE program ensured that \u201cTwitter and (and subject to legal\/security approval) blog content [was] manually scraped and uploaded to GCDesk.\u201d A later version would upload content in real time.<\/p>\n<p>Several of the accounts to be mined for expertise are associated with the hactivist collective Anonymous. Documents <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2014\/07\/14\/jtrig-tools-techniques\/\" >previously published<\/a> by <em>The Intercept <\/em><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/2014\/07\/14\/manipulating-online-polls-ways-british-spies-seek-control-internet\/\" >reveal\u00a0extensive<\/a>, and <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/2014\/02\/24\/jtrig-manipulation\/\" >sometimes extreme<\/a>, <a target=\"_blank\" href=\"http:\/\/msnbcmedia.msn.com\/i\/msnbc\/sections\/news\/snowden_anonymous_nbc_document.pdf\" >tactics employed<\/a> by GCHQ to infiltrate, discredit and disrupt that group. The agency employed some of the same hacker methods against Anonymous (e.g., mass denial of service) as governments have prosecuted Anonymous for using.<\/p>\n<p>A separate GCHQ document details the open-source sites monitored and collected by the agency, including blogs, websites, chat venues and Twitter. It describes Twitter monitoring undertaken for \u201creal-time alerting to new security issues reported by known security professionals, or planned activity by hacking groups, e.g. Anonymous.\u201d The agency planned to expand its monitoring and aggregation\u00a0program to a wide range of web locations, including IRC chat rooms and Pastebin, where \u201can increasing number of tip-offs are coming from . . . as this is where many hackers anonymously advertise and promote their exploits, by publishing stolen information.\u201d<\/p>\n<p>One classified document casts serious doubt on warnings about the <a target=\"_blank\" href=\"http:\/\/www.theverge.com\/2012\/4\/9\/2930626\/yochai-benkler-anonymous-cybersecurity-laws\" >threat<\/a> posed by Anonymous (in early 2012 then-<a target=\"_blank\" href=\"http:\/\/www.wsj.com\/articles\/SB10001424052970204059804577229390105521090\" >NSA chief Keith Alexander reportedly warned<\/a> that Anonymous could shut down parts of the power grid).<\/p>\n<p>That document, containing \u201ctalking points\u201d prepared by Jessica Vielhuber of the National Intelligence Council in September 2011\u00a0for a NATO meeting on cyber-threats, describes the threat from Anonymous as relatively small.\u00a0\u201cAlthough \u2018hacktivist\u2019 groups such as Anonymous have made headlines recently with their theft of NATO information, the threat posed by such activity is minimal relative to that of nation-states,\u201d she wrote.<\/p>\n<p>In response to <em>The\u00a0Intercept<\/em>\u2018s questions, an agency spokesperson said that \u201cNSA will not comment on the\u00a0Intercept\u2019s speculation,\u201d and noted that NSA \u201cdefends the nation and our allies from foreign threats while going to great lengths to safeguard privacy and civil liberties.\u201d The spokesperson added that \u201cover the last year, at the president\u2019s direction, the U.S. intelligence community engaged in an unprecedented effort to examine and strengthen the privacy and civil liberty protections afforded to all people, regardless of nationality.\u201d<\/p>\n<p>GCHQ declined to answer questions for this article, or to comment on the\u00a0programs involved, but instead provided a boiler plate statement, which says the agency\u2019s work is legal and subject to government oversight. \u201cIt is longstanding policy that we do not comment on\u00a0intelligence matters,\u201d the agency notes.<\/p>\n<p><em>Documents published with this article:<\/em><\/p>\n<ul>\n<li><em><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2015\/02\/04\/lovely-horse-gchq-wiki-overview\/\" >LOVELY HORSE \u2013 GCHQ Wiki Overview<\/a><\/em><\/li>\n<li><em><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2015\/02\/04\/intolerant-else-targeting-target-collecting-data-stolen-hackers\/\" >INTOLERANT \u2013 Who Else Is Targeting Your Target? Collecting Data Stolen by Hackers \u2013\u00a0SIDtoday<\/a>\u00a0<\/em><\/li>\n<li><em><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2015\/02\/04\/happy-triggerlovely-horsezooltwo-face-open-source-cyber-defenceprogress\/\" >HAPPY TRIGGER\/LOVELY HORSE\/Zool\/TWO FACE \u2013\u00a0Open Source for Cyber Defence\/Progress<\/a><\/em><\/li>\n<li><em><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/document\/2015\/02\/04\/nato-civilian-intelligence-council-cyber-panel-us-talking-points\/\" >NATO Civilian Intelligence Council \u2013 Cyber Panel\u00a0\u2013 US Talking Points<\/a><\/em><\/li>\n<\/ul>\n<p>_________________________________<\/p>\n<p><em>Morgan Marquis-Boire contributed reporting to this article.<\/em><\/p>\n<p><em>Email the author: <a href=\"mailto:glenn.greenwald@theintercept.com\">glenn.greenwald@theintercept.com<\/a><\/em><\/p>\n<p><a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/2015\/02\/04\/demonize-prosecute-hackers-nsa-gchq-rely-intel-expertise\/\" >Go to Original \u2013 firstlook.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>4 Feb 2015 &#8211; The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-53598","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/53598","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=53598"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/53598\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=53598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=53598"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=53598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}