<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/rss-style.xsl" type="text/xsl"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	    xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	     xmlns:dc="http://purl.org/dc/elements/1.1/"
	   xmlns:atom="http://www.w3.org/2005/Atom"
	     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	  xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>
<channel>
	<title>spying &#8211; Terence Eden’s Blog</title>
	<atom:link href="https://shkspr.mobi/blog/tag/spying/feed/" rel="self" type="application/rss+xml" />
	<link>https://shkspr.mobi/blog</link>
	<description>Regular nonsense about tech and its effects 🙃</description>
	<lastBuildDate>Thu, 28 Aug 2025 07:39:10 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://shkspr.mobi/blog/wp-content/uploads/2023/07/cropped-avatar-32x32.jpeg</url>
	<title>spying &#8211; Terence Eden’s Blog</title>
	<link>https://shkspr.mobi/blog</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title><![CDATA[Spycatcher's Relevance in 2014]]></title>
		<link>https://shkspr.mobi/blog/2014/08/spycatchers-relevance-in-2014/</link>
					<comments>https://shkspr.mobi/blog/2014/08/spycatchers-relevance-in-2014/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Thu, 28 Aug 2014 10:35:50 +0000</pubDate>
				<category><![CDATA[politics]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[spying]]></category>
		<guid isPermaLink="false">http://shkspr.mobi/blog/?p=10775</guid>

					<description><![CDATA[In 1987 MI5&#039;s former Assistant Director, Peter Wright, released his autobiography.  Spycatcher: The Candid Autobiography of a Senior Intelligence Officer.    It was immediately banned by the British Government.  Although the Internet wasn&#039;t around to facilitate its distribution, it was trivial to obtain copies imported from Australia.  As a boy, I remember seeing the publicity about it on the…]]></description>
										<content:encoded><![CDATA[<p>In 1987 MI5's former Assistant Director, Peter Wright, released his autobiography.  <a href="https://en.wikipedia.org/wiki/Spycatcher">Spycatcher: The Candid Autobiography of a Senior Intelligence Officer</a>.</p>

<p><a href="http://www.amazon.co.uk/gp/product/0670820555/ref=as_li_tl?ie=UTF8&amp;camp=1634&amp;creative=19450&amp;creativeASIN=0670820555&amp;linkCode=as2&amp;tag=shkspr-21"><img src="https://shkspr.mobi/blog/wp-content/uploads/2014/08/Spycatcher-Cover.jpg" alt="Spycatcher Cover" width="340" height="500" class="aligncenter size-full wp-image-10776"></a></p>

<p>It was immediately banned by the British Government.  Although the Internet wasn't around to facilitate its distribution, it was trivial to obtain copies imported from Australia.  As a boy, I remember seeing the publicity about it on the news and being <em>very</em> upset that my parents had a copy!</p>

<p>In light of the recent revelations by <a href="http://www.theguardian.com/world/edward-snowden">Edward Snowden</a> and <a href="https://wikileaks.org/">Julian Assange</a>, I would have thought that the book would be enjoying somewhat of a reassurance.</p>

<p>It is not.</p>

<p>The physical book is long out of print and is <a href="http://www.amazon.co.uk/gp/product/0670820555/ref=as_li_tl?ie=UTF8&amp;camp=1634&amp;creative=19450&amp;creativeASIN=0670820555&amp;linkCode=as2&amp;tag=shkspr-21">available second hand on Amazon.</a></p>

<p>There's a scanned and OCR'd <a href="https://openlibrary.org/works/OL4627777W/Spycatcher">copy of the eBook available on OpenLibrary</a>.  If you are to venture to the "deep web" (i.e. the 2nd page of Google results) you'll find plenty of ersatz eBook copies floating around.</p>

<p>So, what does a book about the security state in the 1950s, 60, and 70s have to do with the world today?</p>

<p>Here are some choice quotes which I found interesting.</p>

<h2 id="metadata-and-warrants"><a href="https://shkspr.mobi/blog/2014/08/spycatchers-relevance-in-2014/#metadata-and-warrants">Metadata and Warrants</a></h2>

<blockquote><p>Each major [post] sorting office and [telephone] exchange in the country had a Special Investigations Unit Room, under the control of [Major Albert] <a href="http://books.google.co.uk/books?id=njWH7cW3aLAC&amp;lpg=PT505&amp;ots=j95B_dLon2&amp;dq=albert%20%20Denman%2C%20mi5&amp;pg=PT505#v=onepage&amp;q=albert%20%20Denman,%20mi5&amp;f=false">Denman</a>, to place taps and intercept mail.
</p><p>...
</p><p>In fact, Denman was very particular about warrants. He was prepared to install a tap or intercept an address without a warrant only on the strict understanding that one was obtained as soon as possible. MI5 were, however, allowed to request a form of letter check without a warrant. We could record everything on an envelope, such as its origin and destination and the date it was sent, as long as we did not actually open it. Denman, like everyone in the Post Office who knew of the activity, was terrified in case the Post Office role in telephone and mail intercepts was discovered.
</p><p><cite>Spycatcher - page 45-46</cite></p></blockquote>

<p>Here we have a excellent argument about why <a href="http://www.wired.com/2013/06/phew-it-was-just-metadata-not-think-again/">metadata</a> is important.  Traffic analysis about which parties are communicating and can be used to build up a detailed picture of a target - even without a warrant and probable cause.</p>

<p>We also see that the security service has always been lax about the need to obtain warrants <em>before</em> intercepting communications.</p>

<p>Finally - I wonder if ISPs today are similarly terrified about their role in <a href="https://en.wikipedia.org/wiki/PRISM_%28surveillance_program%29">PRISM</a>?  With seemingly every major ISP, social network, and telecoms company now in the hands of the intelligence services, it seems the more things change the more they stay the same...</p>

<h2 id="listening-in"><a href="https://shkspr.mobi/blog/2014/08/spycatchers-relevance-in-2014/#listening-in">Listening In</a></h2>

<blockquote><p>I had spent a lot of time researching ways in which innocuous objects, like ashtrays or ornaments, could be modified to respond to sound waves when radiated with microwaves of a certain frequency. If a system could be perfected, it promised enormous advantages. The object itself would carry no transmitter or receiver, so detection would be virtually impossible. By 1956 we had successfully developed prototypes, and decided to attempt an operation against the Russian Embassy in London.
</p><p><cite>Spycatcher - page 67</cite>
</p></blockquote>

<p>While we sit here and worry whether our phones can be used to eavesdrop on us, or wonder if <a href="http://www.theguardian.com/technology/2014/aug/05/mit-crisp-packet-eavesdrop-audio-sound">an empty crisp packet can do the same</a> - the reality is that for over 60 years MI5 has had the ability to listen in to our conversations at will.</p>

<h2 id="storing-data"><a href="https://shkspr.mobi/blog/2014/08/spycatchers-relevance-in-2014/#storing-data">Storing Data</a></h2>

<blockquote><p>In 1959, a new discovery was made which resuscitated <a href="https://en.wikipedia.org/wiki/Venona_project">VENONA</a> again. GCHQ discovered that the Swedish Signals Intelligence Service had taken and stored a considerable amount of new wartime traffic, including some <a href="https://en.wikipedia.org/wiki/Main_Intelligence_Directorate_%28Russia%29">GRU</a> radio messages sent to and from London during the early years of the war. GCHQ persuaded the Swedes to relinquish their neutrality, and pass the material over for analysis.
</p><p><cite>Spycatcher - page 186</cite>
</p></blockquote>

<p>While it is natural that wartime signals should be stored, I think it's interesting that going back over ancient data with new knowledge has been a staple of spying for years.  While we may think our PGP encryption is secure now - any future attacks will render its protection useless.</p>

<p>Of course, storing data is somewhat pointless when the sheer volume of it means it overwhelms the capacity to analyse it.</p>

<blockquote><p>A joint MI6/CIA team had tunneled under the Russian sector of Berlin in February 1955, and placed taps on the central communications of the Soviet Military Command.
</p><p>The actual electrical taps were done by Post Office personnel. <strong>Both the CIA and MI6 were reeling under the sheer volume of material being gathered from the Tunnel</strong>.
</p><p>So much raw intelligence was flowing out from the East that it was literally swamping the resources available to transcribe and analyze it. MI6 had a special transcription center set up in Earl's Court, but they were still transcribing material seven years later when they discovered that <a href="http://www.independent.co.uk/news/world/europe/the-spy-who-stayed-out-in-the-cold-george-blake-at-90-8290141.html">George Blake</a> had betrayed the Tunnel to the Russians from the outset.
</p><p><cite>Spycatcher - page 47</cite></p></blockquote>

<p>And, even if cracked and analysed - someone has to actually make use of the material!</p>

<blockquote><p>I was shown into a room in Northumberland Avenue which contained all the <a href="https://web.archive.org/web/20120927180654/https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol5no1/html/v05i1a02p_0001.htm">Dragon</a> material, stacked up in dozens and dozens of dusty volumes. Incredibly, neither MI5 nor MI6 had bothered to process any of this material for its own use.
</p><p><cite>Spycatcher - page 116</cite></p></blockquote>

<h2 id="with-friends-like-these"><a href="https://shkspr.mobi/blog/2014/08/spycatchers-relevance-in-2014/#with-friends-like-these">With Friends Like These...</a></h2>

<p>The Germans are appalled to discover <del>gambling</del> spying taking place against them.  <a href="https://www.cbsnews.com/news/wh-us-not-monitoring-german-chancellor-angela-merkels-phone/">Merkel is <em>furious!</em></a></p>

<blockquote><p>For nearly three years, between 1960 and 1963, MI5 and GCHQ read the French high grade cipher coming in and out of the French Embassy in London. Every move made by the French during our abortive attempt to enter the Common Market was monitored. The intelligence was avidly devoured by the Foreign Office, and verbatim copies of De Gaulle's cables were regularly passed to the Foreign Secretary in his red box.
</p><p><cite>Spycatcher - page 111</cite></p></blockquote>

<p>Yeah. We spied on friend and foe alike - and they spied on us.</p>

<h2 id="analysis"><a href="https://shkspr.mobi/blog/2014/08/spycatchers-relevance-in-2014/#analysis">Analysis</a></h2>

<blockquote><p>I made a series of analyses of Soviet strength in 1945, based on the VENONA material. Although we broke only a small fraction of the traffic, GCHQ were able to statistically assess the total number of spies active in Britain at between 150 and 300. (The statistical analysis was conducted using methodology devised by one of the top cryptographers, <a href="https://en.wikipedia.org/wiki/I._J._Good">I.J. Good</a>.)
</p><p><cite>Spycatcher - page 344</cite>
</p></blockquote>

<p>Again, we see that decryption isn't necessarily needed in order to analyse data.  Encrypting your email isn't enough - traffic analysis can give an excellent idea of how many people you are in communication with and the volumes of material you are exchanging.</p>

<h2 id="and-in-the-end"><a href="https://shkspr.mobi/blog/2014/08/spycatchers-relevance-in-2014/#and-in-the-end">And, in the end</a></h2>

<p>There's no doubt that Spycatcher is still a highly significant book.  What may have seemed somewhat dry and irrelevant when first published, has now become frighteningly prophetic.  It is vital that the book is republished and that all students of security - computer or otherwise - read it and learn its lessons.</p>

<p>For anyone with an interest in the development of the security state - and the evolution of computerised espionage, Spycatcher is a must.</p>

<p>Much as today, it was <a href="http://www.theguardian.com/fromthearchive/story/0,12269,1326319,00.html">The Guardian newspaper who were on the forefront of helping to reveal those who seek to spy on us</a>.</p>

<p>I'll leave the last words to the judgement of the Law Lords who decided whether Spycatcher should be banned.</p>

<blockquote><p>'In a free society,' Lord Geoff said, 'there is a continuing public interest that the workings of government should be open to scrutiny and criticism.'
</p><p>Lord Keith of Kinkeld said the Government's claim that anyone receiving confidential information from a Crown servant in any circumstances is bound by an obligation of confidence was 'untenable and impracticable, in addition to being unsupported by any authority'.
</p><p>Lord Griffiths, chairman of the Security Commission, said: 'The balance in this case comes down firmly in favour of the public interest in freedom of speech and a free press.' But he said that a member or former member of the security services could publicly disclose his concerns only as a last resort.
</p><p><cite><a href="http://www.bailii.org/uk/cases/UKHL/1988/6.html">Attorney General v Guardian Newspapers Ltd (No 2) [1988] UKHL 6 (13 October 1988) </a></cite></p></blockquote>

<p>You can buy <a href="http://www.amazon.co.uk/gp/product/0670820555/ref=as_li_tl?ie=UTF8&amp;camp=1634&amp;creative=19450&amp;creativeASIN=0670820555&amp;linkCode=as2&amp;tag=shkspr-21">used copies of Spycatcher on Amazon.</a></p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=10776&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2014/08/spycatchers-relevance-in-2014/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title><![CDATA[Cryptography and the Coventry Problem]]></title>
		<link>https://shkspr.mobi/blog/2013/07/cryptography-and-the-coventry-problem/</link>
					<comments>https://shkspr.mobi/blog/2013/07/cryptography-and-the-coventry-problem/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Tue, 09 Jul 2013 11:12:56 +0000</pubDate>
				<category><![CDATA[politics]]></category>
		<category><![CDATA[crime]]></category>
		<category><![CDATA[gchq]]></category>
		<category><![CDATA[nsa]]></category>
		<category><![CDATA[prism]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[terrorism]]></category>
		<guid isPermaLink="false">http://shkspr.mobi/blog/?p=8470</guid>

					<description><![CDATA[There&#039;s an ethical conundrum which is often posed to military strategists and philosophers alike.  In 1940, the Nazi&#039;s communications encryption had been broken by the British.  Military Intelligence were able to decrypt a signal which indicated that the city of Coventry was to be bombed.  The military chiefs took this information to the Prime Minister, Winston Churchill. If he ordered the…]]></description>
										<content:encoded><![CDATA[<p>There's an ethical conundrum which is often posed to military strategists and philosophers alike.</p>

<p>In 1940, the Nazi's communications encryption had been broken by the British.  Military Intelligence were able to decrypt a signal which indicated that the city of Coventry was to be bombed.  The military chiefs took this information to the Prime Minister, Winston Churchill.
If he ordered the evacuation of the city, he would save hundreds of thousands of lives - but the enemy would know that their encryption was compromised.</p>

<p>What, gentle reader, would you do?  Is it worth sacrificing lives now in the hope of saving more in the future?  Is revealing your hidden knowledge a price worth paying if it means saving a city?</p>

<p>This utilitarianist problem was <a href="https://winstonchurchill.org/publications/finest-hour/finest-hour-141/history-detectives-coventry-what-really-happened/">probably not actually placed in front of Winston Churchill</a> - but it is an interesting thought experiment.</p>

<p>This brings us to the recent revelation that the security services of the world are tapping our communications, listening to our phone calls, and tracking our every move.</p>

<p>So why is there still crime?</p>

<p>If "Prism" (which I'll use as a shorthand for all digital surveillance) is so good and effective, why is there still any form of crime or terrorism?</p>

<p>There are, I think, several possibilities.</p>

<ul>
    <li>It doesn't work - either it can't capture the data or it's impossible to sift.</li>
    <li>Criminals don't communicate via electronic means.</li>
    <li>The Government don't want Prism revealed.</li>
</ul>

<p>To go down the conspiracy theory route, is it acceptable to allow a major criminal attack in order not to reveal how intelligence is captured?</p>

<p>Or, to look at it through a different lens, is Prism stopping 99% of crimes, and the ones which do occur are statistical outliers?</p>

<p>If Prism is as amazing as claimed - and assuming revelations don't push criminals to secure crypto and unmonitored communications - why can't it be used to ticket speeding cars, foil bank robberies, or stop traders manipulating LIBOR?</p>

<p>Are minor and major criminal acts the price that governments are prepared to pay in order to keep Prism secret?</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=8470&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2013/07/cryptography-and-the-coventry-problem/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title><![CDATA[Is Samsung Spying on your Printer?]]></title>
		<link>https://shkspr.mobi/blog/2012/11/is-samsung-spying-on-your-printer/</link>
					<comments>https://shkspr.mobi/blog/2012/11/is-samsung-spying-on-your-printer/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Thu, 29 Nov 2012 12:00:27 +0000</pubDate>
				<category><![CDATA[/etc/]]></category>
		<category><![CDATA[samsung]]></category>
		<category><![CDATA[spying]]></category>
		<category><![CDATA[technology]]></category>
		<category><![CDATA[xerox]]></category>
		<guid isPermaLink="false">http://shkspr.mobi/blog/?p=6810</guid>

					<description><![CDATA[Compare and contrast...  [The] Xerox 914 copy machine [...] was used in soviet embassies all over the world. The machine was so complex that the CIA used a tiny camera designed by Zoppoth to capture documents copied on the machine by the soviets and retrieved them using a &#34;Xerox repairman&#34; right under the eyes of soviet security. Xerox Helped Win The Cold War   And  Samsung printers (as well as…]]></description>
										<content:encoded><![CDATA[<p>Compare and contrast...</p>

<blockquote><p>[The] Xerox 914 copy machine [...] was used in soviet embassies all over the world. The machine was so complex that the CIA used a tiny camera designed by Zoppoth to capture documents copied on the machine by the soviets and retrieved them using a "Xerox repairman" right under the eyes of soviet security.
</p><p><a href="https://seclists.org/interesting-people/1999/Sep/21">Xerox Helped Win The Cold War</a>
</p></blockquote>

<p>And</p>

<blockquote><p>Samsung printers (as well as some Dell printers manufactured by Samsung) contain a hardcoded SNMP full read-write community string that remains active even when SNMP is disabled in the printer management utility.
</p><p>A remote, unauthenticated attacker could access an affected device with administrative privileges. Secondary impacts include: the ability to make changes to the device configuration, access to sensitive information (e.g., device and network information, credentials, and information passed to the printer), and the ability to leverage further attacks through arbitrary code execution.
</p><p><a href="http://www.kb.cert.org/vuls/id/281284">Samsung Printer firmware contains a backdoor administrator account</a>
</p></blockquote>

<p>There's no evidence that Samsung are working on behalf of the security services.</p>

<p>This could just be a snafu like the constant SCADA security bugs.  The same bugs which were allegedly used to cripple Iran's alleged nuclear ambitions with <a href="https://www.computerworld.com/article/1511367/iran-was-prime-target-of-scada-worm.html">Stuxnet</a>.</p>

<p>Are Samsung viewing all your print outs and forwarding them to <a href="http://eng.nis.go.kr/">South Korea's Security Services</a>?  I honestly don't know.  You don't know. <em>No one</em> knows!</p>

<p>This is one of the reasons that Open Source software is <strong>so important</strong> - especially for appliance-like devices.</p>

<p>Could your <a href="https://web.archive.org/web/20121011224559/http://www.h-online.com/security/news/item/TVs-and-Blu-ray-players-vulnerable-to-DoS-attacks-1558245.html">Samsung TV have a vulnerability</a> that will let anyone see what you're watching?
Or <a href="http://www.nbcnews.com/technology/technolog/snooping-tvs-samsung-responds-criticism-607931">could the integrated camera start to watch you</a>?
Does your Samsung phone have spy code which <a href="http://bgr.com/2011/12/05/apple-samsung-and-six-more-companies-sued-over-carrier-iq-scandal/">forwards your information to a third party</a>?
Or does your Samsung phone <a href="http://www.kb.cert.org/vuls/id/251635">let any application access your private information</a>?</p>

<p>Open Source Software is far from perfect.  But without being able to check the code which runs on our appliances, we're at the mercy of "professionals" who fail again and again.</p>

<p>Even the most trivial device could have a significant impact - what happens if your Internet Fridge has a bug, mistakes your chicken for Halal, and then secretly reports your <a href="http://www.europarl.europa.eu/news/en/pressroom/content/20120419IPR43404/html/Parliament-gives-green-light-to-air-passenger-data-deal-with-the-US">dietary preferences to the security services</a>?</p>

<p>The first freedom of software is <a href="http://www.gnu.org/philosophy/free-sw.html">the freedom to study how the program works, and change it so it does your computing as you wish</a>.</p>

<p>I'm not paranoid.  The vital services which run our lives have bugs. Some are intentional, some are not.  We <em>must</em> be able to check for the presence of these vulnerabilities and correct them when their supplier are unable or unwilling to do so.</p>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=6810&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2012/11/is-samsung-spying-on-your-printer/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
