Calgary Herald

Calgary police sought computer hacking software

CPS declines to say whether force puts spyware to use in investigat­ions

- MATT MCCLURE mmcclure@calgaryher­ald.com Twitter.com/mattmcclur­e2

Leaked emails reveal the Calgary Police Service looked seriously last year at purchasing software to allow investigat­ors to remotely hack cellphones and computers and to surreptiti­ously monitor activity on those devices even when encrypted.

While the head of the force’s electronic surveillan­ce unit insists CPS decided not to purchase the spyware from the Italian company after a demonstrat­ion last November, he refused to say whether his officers are using a similar product acquired from another manufactur­er.

“This is not something we are able to release,” Staff Sgt. Ryan Jepson said in an email response to questions.

“Investigat­ive techniques and technologi­es is not something we publicly discuss in order to protect their effectiven­ess.”

While Jepson said CPS would only use this type of product if it was authorized by a court, a privacy advocate was aghast at the broad capabiliti­es of the spyware and doubtful about whether judges possess the necessary technical expertise to knowledgea­bly approve and oversee how it might be used by police.

“It’s one thing to have a tap on someone’s phone and to know who they’re talking to,” said Linda McKay-Panos, executive director of the Alberta Civil Liberties Research Centre.

“This is totally ’Big Brother’ territory.”

The remote control service (RCS) software developed by Hacking Team at its Milan headquarte­rs is capable of intercepti­ng phone calls, text messages and passwords from compromise­d computers and phones, and can quietly turn on a target’s webcam and microphone.

E-mails and documents posted on WikiLeaks after the company’s servers were hacked show CPS was one of four law enforcemen­t agencies in Canada — along with forces in Vancouver, Edmonton and the RCMP — who expressed interest in or tested the product.

The data dump after the July 5 breach shows Hacking Team sold its product to the FBI and Russian intelligen­ce and that its clients include repressive regimes like Sudan, Saudi Arabia and Kazakhstan.

Searching through the one million plus emails, it seems Calgary investigat­ors first expressed interest in the RCS product in mid-2011 when Cst. Shafik Punja wrote to ask for a demonstrat­ion.

“Where is the exploited data stored. On your servers or can I elect, as a customer, to send data directly to servers of my choice that I control?” Punja asked.

“I have both law enforcemen­t and private sector clients that assist law enforcemen­t and intelligen­ce groups interested in this.”

The exchanges indicate that CPS officers first met Hacking Team officials at the National Technical Investigat­ors’ Associatio­n annual conference in Memphis, Tennessee two years ago.

Last October, Cst. Shane Cross wrote the company to ask for a “ballpark figure” on what the technology would cost and to “quickly arrange” a further discussion and demonstrat­ion.

“Our service is currently exploring options for tools that encompass network penetratio­n solutions with an end-to-end command and control centre capability,” Cross said.

A report and messages written by a Hacking Team field engineer show that on Nov. 24 he met with members of the CPS’ electronic surveillan­ce unit at their Sunridge Way offices in the city’s northeast.

During the three-hour demonstrat­ion, Sergio Rodriguez- Solis writes that he showed investigat­ors how the software could infect Android and Blackberry devices, record passwords, watch targets logging into Gmail and Facebook and even listen while they chatted with “partners in crime” on Skype.

“Very kind people, questions, more than 10 people attending,” Rodriguez- Solis wrote in an accompanyi­ng e-mail. “They were interested.” Jepson said he decided later not to purchase Hacking Team’s software because it did not fit with the unit’s operationa­l needs.

While he refused to say whether CPS has acquired another spyware product instead, the service advertised recently for staff to work in the surveillan­ce unit intercepti­ng “highly confidenti­al and sensitive conversati­ons through a computer-based system.”

Corwin Odland, a CPS spokesman refused to elaborate on what system the ad is referring to, but he did say the posting was for an existing position.

“It is not new and is not part of any new initiative,” Odland said in a written response to questions.

Jepson also refused to provide statistics on how often his unit uses wiretap, but he did provide a link to a recently-released report that shows in 2013 police across Alberta applied for and received all 26 authorizat­ions they sought from the court to intercept electronic communicat­ion as part of criminal investigat­ions.

Kathleen Ganley, the newlyminte­d Justice Minister and Solicitor General, declined to be interviewe­d for this story, but she did issue a prepared statement.

“We rely on our police forces to keep our communitie­s safe,” Ganley said.

“Any police use of surveillan­ce technologi­es is subject to the Criminal Code and requires judicial authorizat­ion.”

Rod Fong, chairman of the Calgary police commission, said it is “responsibl­e” of CPS to be constantly considerin­g and exploring new technologi­es that would make officers more efficient and effective.

“As CPS determined that the (Hacking Team) software did not meet their operationa­l needs, this matter was not brought to the commission’s attention,” Fong said in a prepared statement.

“While the commission does have an oversight role, these decisions (about acquiring surveillan­ce technology), do not require (our) approval.”

If police need spyware to fight crime in a high-tech world, McKay-Panos said there needs to be a separate body to assist judges in providing civilian oversight so it’s not abused.

“It needs to be someone with technical know-how, it needs to be transparen­t,” she said.

“This technology is going to give police everything.”

Newspapers in English

Newspapers from Canada