Sunday Times

Revealed: SA spies’ scary shopping list

WikiLeaks lays bare SA police and SARS agents’ inquiries about espionage software

- ANDRÉ JURGENS and MATTHEW SAVIDES

A MASSIVE security breach by hackers has provided a rare glimpse into the world of clandestin­e government snooping — and revealed that South African authoritie­s showed an interest in buying highly sophistica­ted spyware.

What is more frightenin­g is the possibilit­y that the spy equipment could be used illegally to obtain informatio­n on ordinary citizens.

This emerged in a massive dump of a million confidenti­al e-mails and documents by WikiLeaks after they were taken by hackers last weekend from controvers­ial Italian surveillan­ce and security firm Hacking Team.

The documents reveal details of elaborate software used in murky espionage operations and show that members of the South African Police Service and the South African Revenue Service tried to acquire some of these programs.

The software of interest to the law enforcers and the taxman would allow spying on a grand scale, granting them access to private details of their targets.

The software would allow the agencies to:

Remotely grab files and e-mail messages off computers using Apple, Windows and Linux operating platforms;

Monitor cellphone Skype calls and instant messages on platforms such as WhatsApp and Viber;

Access Facebook, Twitter and social media accounts; and

Take screen grabs off a cellphone, track its location and activate the phone’s microphone to turn it into a bugging device.

The leaked documents include e-mail correspond­ence between a Colonel B Grobler in police crime intelligen­ce and Massimilia­no Luppi, a key account manager at Hacking Team. Luppi inquired about a “commercial proposal” submitted by the company to sell Remote Control System to the police in 2011.

The software, which has since been updated under the code name Galileo, is “designed to attack, infect and monitor target PCs and smartphone­s in a stealth way”.

It cannot be detected and works on Android, BlackBerry, Apple and Windows phones. It can track the location of the phone, grab files off the device, and turn the phone into a bugging device.

“Your quotation was submitted to Lieutenant-General [Richard] Mdluli. Before he could provide me with instructio­ns, the following happened,” Grobler wrote back to the firm in 2011, adding a link to a news article about the former crime intelligen­ce boss being embroiled in a love-triangle murder investigat­ion. The chain of correspond­ence does not indicate if the police purchased the software.

Cyber security expert Haroon Meer said the law did allow the sort of tools Hacking Team offered, but that it had to be carefully monitored and used only after following due process.

“It becomes a problem when these tools are used abusively, cracking down on journalist­s or activists instead. The big problem with Hacking Team was that they knowingly sold these tools to government­s with a proven track record of trampling on their people’s rights.

“Tools like this, by analogy, are closest to wiretaps. The man in the street can’t wiretap people; police can, with the right piece of paper. SARS can when acting under judicial mandates. Hacking Team was selling ‘easy wiretaps’ to anyone, and this is the complaint,” he said.

National police spokesman Lieutenant-General Solomon Makgale was unable to answer detailed questions about the e-mails yesterday due to difficulti­es contacting the relevant parties.

Clinton Phipps, national president of the Security Associatio­n of South Africa, said he suspected the police already had access to the type of data that the company was offering to help extract.

And a lot of cellphone service providers also had access to data that police could tap into.

He said it was of the utmost importance that the police operated within the law.

“Our privacy acts are quite strong. [For this technology to be used] the law would have to change, or it would have to be used in conjunctio­n with a court order,” said Phipps.

Another e-mail, from Helgard Lombard — a former member of a rogue spy unit at SARS — on July 24 last year, asked for informatio­n about concealing “smartphone infections”.

Lombard wrote: “Will appreciate it if you could send me informatio­n regarding the smartphone infections. The informatio­n must be as comprehens­ive as possible, e.g. is it necessary to ‘Root’ Android smartphone­s, can the infection be concealed in a MMS, etc. I would also want to know what the minimum quantity licences would be that we have to acquire and what the annual main-

❛ The software is ’designed to attack, infect and monitor PCs and smartphone­s in a stealth way’

tenance fee [would] be for updates.”

The Sunday Times revealed in May that Lombard had submitted an affidavit to the Hawks admitting to spying on the National Prosecutin­g Authority. Affidavits by SARS employees said the former Directorat­e of Special Operations, better known as the Scorpions, paid Lombard sums of R900 000 and R250 000 to buy surveillan­ce equipment.

SARS spokesman Luther Lebelo said yesterday the organisati­on was “not aware of such correspond­ence and is highly shocked by such allegation­s. SARS does not have records for such purchases. We, however, cannot speak on behalf of Mr Lombard.”

Other e-mails sent to Hacking Team include an inquiry from police Colonel AK Hoosen on July 24 last year asking: “Where is Gmail located and how do I subpoena them to provide informatio­n for evidence purpose [s]?”

Company CEO David Vincenzett­i alerted colleagues: “Please find a help request from a military guy in South Africa. Yes, such a request indicates that this guy is close to clueless. HOWEVER, we could exploit his request in order to establish a commercial contact.”

In turn, Luppi e-mailed Hoosen, saying it was “not possible to force Google to provide you with informatio­n related to one of their users”. However, “what you can do, in order to bypass this bottleneck, is to infect the device of your suspect/target”, he said.

Hacking Team’s customers are intelligen­ce agencies and government­s around the world — including some with questionab­le human rights records — who use its software to fight crime. But it has also been used

to snoop on political activists.

Besides the leaked documents, hackers stole the source code used to build spy software sold by the company, previously only available to government agencies. “Hacking Team’s investigat­ion has determined that sufficient code was released to permit anyone to deploy the software against any target of their choice. Before the attack, Hacking Team could control who had access to the technology . . . Now, because of the work of criminals, that ability to control who uses the technology has been lost. Terrorists, extortioni­sts and others can deploy this technology at will if they have the technical ability to do so,” said a spokesman.

Although the company has previously denied selling software to repressive regimes, the Guardian reports that the leaked documents appear to show that among its clients are several repressive states known to conduct “aggressive surveillan­ce of citizens, activists and journalist­s both domestical­ly and overseas”.

Newspapers in English

Newspapers from South Africa