The Walrus

The Mole Hunt

Cameron Ortis was privy to Canada’s biggest national security secrets — and in a prime position to exploit them

- By Justin Ling

Cameron Ortis was privy to Canada’s biggest national security secrets — and in a prime position to exploit them

On March 7, 2018, Vincent Ramos was sitting alone at the Over Easy restaurant in Bellingham, Washington, just across the border from his home, in Richmond, British Columbia. He didn’t protest when a phalanx of cops marched in and arrested him. Speaking to the Bellingham Herald, the restaurant owner said Ramos “seemed like a mellow guy.”

It’s not mentioned in the account of his arrest, but the first thing officers likely did after they cuffed Ramos was reach into his pocket and grab his Blackberry. That device, and the network it connected to, was at the heart of a sprawling FBI indictment that accused Ramos of racketeeri­ng activity involving gambling, money laundering, and drug traffickin­g. But that doesn’t quite cover the scale of his operation.

Ramos was founder and CEO of Vancouver-based Phantom Secure, a company that offered what it called “military-grade encryption” to criminal enterprise­s across the globe, from smalltime loan sharks right up to Mexican drug lords. Fundamenta­lly, Phantom Secure was a hardware company. It sold modified Blackberry handsets that had been customized to communicat­e only with other Phantom Secure devices. On top of that, it ran an email system that routed encrypted messages through Panama and Hong Kong. As a result, conversati­ons were nearly impossible to intercept, and if law enforcemen­t did snag a message, there was no way of decrypting it. The FBI says as many as 20,000 clients signed up for protection that ran upward of $2,000 (US) for a six-month subscripti­on. It even came with a customer service line. As a last safety measure, the company installed a remote kill switch, allowing phones seized by law enforcemen­t to be wiped from afar.

Investigat­ors had been watching Phantom Secure for some time. Police in different countries had been finding repurposed phones in stash houses and on suspects. But, by the time the devices were seized, they had been wiped clean and rendered useless. Police needed one with its data still intact. The year before Ramos was apprehende­d, agents at the Blaine, Washington, border crossing — just a half-hour drive from the Over Easy restaurant — intercepte­d an SUV loaded with twenty-five kilograms of party drug MDMA. The driver was carrying a Phantom Secure phone. Agents had, by then, developed an ingenious tactic: they would slip such phones into a Faraday bag, a specialize­d pouch designed to block outside signals. With the device cut off from its network, Phantom Secure would be unable to activate the kill switch. In this way, investigat­ors used the informatio­n collected to build their case against the company. With each Phantom Secure customer they nabbed — drug dealers, mobsters — police got closer to Ramos. Eventually, they went after Phantom Secure itself.

By June, Ramos had turned state’s witness. As part of his plea deal, he handed over the login credential­s for his servers, domains, and accounts, which gave police access to his entire operation. The technology was only one layer of protection, however. Ramos didn’t even know the identities of many of his clients. Police worked feverishly to untangle the complicate­d network of pseudonyms and code names gleaned from Ramos’s emails and messages. As word spread that Phantom Secure had been compromise­d, his co-conspirato­rs began to disappear into the wind.

By then, investigat­ors had already managed to disrupt the traffickin­g routes and communicat­ions structures of a litany of criminal gangs. It was a big score, though hardly the biggest. Drug busts happen all the time, and whenever the FBI knocks down a platform for a cocainesmu­ggling operation, two more pop up. But investigat­ors also came upon something unexpected, something that would shake the world’s largest intelligen­ce-sharing partnershi­p to its core. In Ramos’s emails, the FBI found a classified memo prepared by the Royal Canadian Mounted Police.

The file had intelligen­ce on Ramos himself, informatio­n that would have been invaluable in his attempts to elude investigat­ors — informatio­n Ramos should never have possessed.

The list of individual­s, worldwide, with access to such a memo wasn’t long. The discovery set off a mole hunt inside the upper echelons of Canadian national security that would lead to the Ottawa condo of one of the country’s most senior intelligen­ce officials. In September 2019, the RC MP arrested one of its own: Cameron Ortis.

Situated in RC MP headquarte­rs, the National Intelligen­ce Coordinati­on Centre is the analytic branch of the Mounties. Launched in 2013, the NICC helps keep tabs on the dark web and hackers both at home and abroad. It tracks internatio­nal organized crime groups and biker gangs. It also monitors ideologica­lly motivated actors, from terrorist groups to peaceful protest movements that could sabotage critical infrastruc­ture. All this informatio­n is collected by RC MP officers in the field and blended with research provided by other intelligen­ce arms of the Canadian government — agents at the Canadian Security Intelligen­ce Service (CSIS), say, or at the Financial Transactio­ns and Reports Analysis Centre of Canada. From that mass of data, NICC analysts and researcher­s produce reports that help set RC MP priorities, steer investigat­ions, and inform on-the-ground policing.

At the time of his arrest, Cameron Ortis had been running the NICC for three years. There was a lot to keep him busy. During his tenure as director general, Islamic State militants had proven themselves adept at using social media to recruit and radicalize disaffecte­d youth. Online black markets, like Silk Road, grew to popularity by offering everything from rocket launchers to heroin. Predators had moved away from the global internet and had begun sharing and selling child pornograph­y on private servers.

The NICC wasn’t just producing intelligen­ce reports for the RC MP — it was also distributi­ng them to its partners around the world. After the Second World War, Allied nations banded together to share informatio­n in hopes of preserving a fragile world order. Canada, the United States, the United Kingdom, Australia, and New Zealand became the Five Eyes. The partnershi­p started out as a military pact but expanded to tackle cybercrime and terrorism.

Informatio­n that circulates around the Five Eyes is the sort marked “top secret” — it can be seen only by officials with the proper clearance. Getting that clearance is no small feat. Security officials will scour a candidate’s social media accounts, interview friends and family, and dig into tax returns and bank records. Areas of concern include money troubles or addiction issues — anything that could cause someone to be blackmaile­d or lead to their loyalty being compromise­d. The last time Canada reported statistics for security classifica­tion — 1998 — around 2,000 people a year were being granted top secret clearance.

After joining the RC MP in 2007, Ortis passed his security vetting and was hired as a strategic analyst — “a sort of jack of all trades,” as one of his former colleagues told me. Ortis was a rarity in the organizati­on. He wasn’t, like his bosses, a cop. He was, first and foremost, an academic, having recently completed a PHD at the University of British Columbia, where he studied the intersecti­on of technology and crime. Ortis wrote dense, thoughtful papers on how government­s, primarily in the Asia-pacific region, were failing to take seriously the threat posed by internet-literate criminal organizati­ons. Drug cartels, anarchists, hackers, doomsday cults — all were using the World Wide Web, barely a decade old at that point, to organize and carry out nefarious deeds. Technology, Ortis felt, was giving criminals a door to a universe far removed from the prying eyes of law enforcemen­t, and police needed to adapt.

But the digital world of the early 2000s was patrolled largely by troops and spies. The National Security Agency, in America, and our own top secret electronic-surveillan­ce outfit, the Communicat­ion Security Establishm­ent (CSE), were both branches of the military. CSIS, which investigat­es threats to Canada’s safety, focused on the internet only insofar as it was being used by terror groups and radical elements, whose ranks it sometimes tried to infiltrate. The RC MP, however, had long been frozen out of the national security game thanks to a string of screwups and ethically dubious activities in the late ’70s and early ’80s. Government investigat­ions found that, during the 1970 October Crisis, the agency had, in the name of collecting intelligen­ce, done everything from stealing documents to attempting to plant dynamite on suspected radicals. The reports led Ottawa, in 1984, to cleave off the RC MP’S national security work into a new body: CSIS.

The 9/11 terrorist attacks reinvigora­ted the Mounties’ zest for national security work. While the CSE could intercept communicat­ions and CSIS could recruit informants and moles, they needed the RC MP to make arrests and obtain search warrants. But years out in the cold had left the force with an acute skills shortage. That became apparent pretty quickly. Just months after 9/11, the RC MP started up an investigat­ion into roughly half adozen Canadian citizens over their supposed ties to al Qaeda — among them was an engineer named Maher Arar. The unfounded conclusion­s linking Arar to foreign terrorism were eventually shared with the FBI, which led to his arrest, rendition to Syria, and torture. In 2006, a scathing review found no evidence that Arar was involved with overseas terror groups and concluded that the RC MP “lacked the expertise to conduct national security investigat­ions.”

Part of the RC MP’S problem was its personnel. Mounties were trained to be cops, not intelligen­ce analysts. They may have been given some basic grounding in counterter­rorism strategies but not much more. To address its shortcomin­gs, the RC MP began scouting for non-officers skilled in digital forensics who could comb through web forums, Usenet groups, and chat rooms to, as per a 2004 job posting, “identify criminal trends and patterns.”

Ortis, who joined the RC MP the year after the Arar inquiry released its findings,

seemed a perfect fit. As an academic, he believed it was a mistake to hand the cyber domain over entirely to soldiers and spies. Criminals and organized crime networks, after all, were the earliest and most eager adopters of new technology — and that, he argued, made the internet police business. And it was a business he seemed remarkably good at. He struck many of those around him as “super competent.” Overconfid­ent, maybe, but as one former colleague frames it, Ortis was “no more arrogant than any other mediocre white dude in the public service.” Working within any government system has its fair share of challenges and headaches, but coworkers say handling internal processes was part of Ortis’s skill set. Less than a decade after joining the force, he became director general and, as has been widely reported, had a close relationsh­ip with then RC MP commission­er Bob Paulson. It was an undeniably quick rise, especially for a civilian in a system of skeptical cops.

Maybe more skepticism was warranted. Investigat­ive documents from Ramos’s trial, and sources in the Canadian security world, point to Ortis as the origin of the sensitive documents that wound up in Ramos’s email. It’s still unclear just what else Ortis is alleged to have stolen and sold, but as director general, he would have had access to the most sensitive details on investigat­ions by all Five Eyes countries. “He had a lot of leeway,” a former coworker says. His access would have been invaluable to foreign government­s, such as Russia’s and China’s, which have engaged in long-running cat- and-mouse games of espionage with the Five Eyes — Moscow frequently looking for kompromat on Western politician­s, Beijing often looking to steal commercial­ly valuable informatio­n from private industry. It would have been worth plenty to foreign terror groups that regularly find themselves infiltrate­d by undercover operatives. And it would have been incredibly useful to internatio­nal criminal outfits, whose phone calls and emails are often intercepte­d, to know which channels were safe. Whatever Ortis allegedly took was enough, according to the Canadian Press, to have the CSE call the breach “severe.” (Shortly after his arrest, I contacted his lawyer with an invitation to talk about the case, but I never heard back.)

The charges against Ortis hint at his alleged crimes. Court documents claim that, in the winter and spring of 2015, he communicat­ed “special operationa­l informatio­n” to “V. R.” — believed to be Ramos. But it is also alleged that he communicat­ed “special operationa­l informatio­n” to “S. H.,” “M. A.,” and “F. M.” According to Global News, one of those sets of initials likely belongs to Farzam Mehdizadeh, a currency trader who, the RC MP believes, was connected to a multibilli­on-dollar money laundering organizati­on that secured cash for Hezbollah, Mexican drug cartels, and many groups in between. Investigat­ors believe Ortis contacted one of Mehdizadeh’s business associates, Salim Henareh (likely “S. H.”), offering informatio­n on the RC MP investigat­ion in exchange for cash. All told, Ortis is facing ten charges under the Security of Informatio­n Act and the Criminal Code, which allege he stole classified informatio­n, attempted to cover his tracks, and communicat­ed the informatio­n to a foreign entity or terrorist group. Taken together, these crimes could carry a lifetime prison sentence.

Investigat­ors appear to have executed their first search warrant related to the leaks in the summer of 2018, soon after Vincent Ramos began cooperatin­g. Over nearly two years, the courts authorized more than two dozen warrants, searches, and tracking devices in British Columbia and Ontario. They called it “Project Ace.”

Maybe this whole saga could have been avoided had the rcmp only familiariz­ed itself with Ortis’s academic work. Reading his PHD thesis, it’s hard not to see foreshadow­ing of what he would, eventually, be accused of doing. He notes, for example, that in the late 1990s, the Pentagon faced down an extensive effort to steal sensitive military informatio­n from its servers. The hack, dubbed “Moonlight Maze,” exposed that not even the world’s most hardened cyberdefen­ces could protect against dedicated individual­s. Indeed, in his field research, Ortis writes that “government officials from two other countries acknowledg­ed similar cases of serious breaches against military or highly sensitive research sites — some originatin­g internally via a ‘trusted insider.’” More than a decade after writing that paper, Ortis would be charged with being the very “trusted insider” he warned about.

WE KNOW NOW, of course, that there were signs — disturbing behaviour by Ortis repeatedly flagged to rcmp higher-ups. After his arrest, three former colleagues filed a lawsuit accusing Ortis of reigning over a dysfunctio­nal and toxic workplace, even telling one of them their work was “horrible” and “garbage.” The allegation­s, which have not been proven in court, claim that Ortis “systematic­ally targeted them and attacked their careers as part of a larger plan to misappropr­iate their work and use it for personal gain.” Dayna Young, one of the analysts suing the rcmp, alleges that some of the intelligen­ce Ortis tried to sell was, in fact, hers. The employees say they went to the rcmp with their concerns multiple times, but nothing came of it.

In February, Global News reported that an rcmp superinten­dent named Marie-claude Arsenault had joined the lawsuit, claiming that, when she worked under him in 2016 and 2017, Ortis’s “bizarre and alarming behaviour” caused her to suspect he was trying to “deliberate­ly sabotage” rcmp intelligen­ce. She claimed to have repeatedly warned her superiors and was eventually transferre­d out of the nicc, which Ortis headed.

It’s still an incomplete picture. Ortis stood at the top of his field, not struggling on the middle rungs. Why risk it all? In his book The Anatomy of a Spy: A History of Espionage and Betrayal, Michael Smith describes four main motivators for going rogue: lust, money, ideology, and revenge. Ortis fits awkwardly into those categories.

Lust is a powerful motivator. The East German Stasi was said to be particular­ly adept at the honeypot — using romantic entangleme­nts to encourage secret holders to betray their countries. Over the course of the Cold War, some forty women were prosecuted for slipping state secrets to their lovers, who turned out to be spies working for the Soviets. Those who knew Ortis, several of whom spoke to the National Post, suggest that, for all or most of his time at the rcmp, he was a workaholic bachelor. With its long hours, his career seems to have left little time for dalliances with, say, Russian diplomats.

Ideologica­lly driven espionage tends to line up with a cause. Daniel Ellsberg, the man who leaked the Pentagon Papers, stole government documents in the hope that they would end the Vietnam War. Ortis, on the other hand, didn’t seem to have any discernibl­e politics. “I can tell you what I told the rcmp: if he was extreme in his beliefs in any way, I certainly would remember, and I don’t remember any such thing,” says Tom Ngi, a fellow student who wrote code that helped Ortis analyze data for his thesis.

Espionage also pays well. cia case officer Aldrich Ames made some $2 million (US) by selling secrets to

Moscow in the 1980s. He began betraying his country because he was drowning in debt but ended up getting caught by amassing an unexplaine­d wealth. If Ortis was desperate for money, there are few indication­s of it. His salary, as a senior intelligen­ce official, would have likely been in the six figures. According to reporting, he dressed smartly and liked dining out, but he also rented sensible accommodat­ions in Ottawa’s Byward Market. And his career prospects were hardly stunted. As Ngi noted, he could have made orders of magnitude more money in the private sector.

Then there’s revenge, often stemming from profession­al or personal dissatisfa­ction. FBI special agent Robert Hanssen spied for the Soviets for more than a decade, compromisi­ng the identity of countless American agents in the USSR, until the fall of the Berlin Wall. While his betrayal paid well, Hanssen would later confess he felt “rage” at having been passed over for promotion at the bureau. It’s hard to imagine that Ortis — one of the golden boys of the rcmp — would have been frustrated with his employer. His ascension through the ranks was remarkable.

In the end, it may not make sense to psychoanal­yze his actions. Ortis was brilliant, wasn’t shy about it, and appears to have been caught selling secrets to the very type of criminal organizati­on he was tasked with investigat­ing. Maybe there’s

no great explanatio­n of why beyond the fact that he simply did. Maybe the sport was in the game, regardless of what side he was playing for.

Ortis’s alleged crimes, however, do point to a fundamenta­l problem with the RC MP: how it investigat­es its own. Any department that handles top secret material is required to do regular checks of staff with security clearance. CSIS, for example, conducts polygraph tests at fiveyear intervals. One former intelligen­ce official told me, flatly, that the RC MP’S internal processes are “not as good as they should be.” Indeed, an audit of the agency’s personnel security-screening process, published in 2016, found it “not sufficient­ly rigorous.” And, while it has a Truth Verificati­on Section — a unit dedicated to particular­ly difficult interrogat­ions of suspects and witnesses — the RC MP seems to have generally been negligent about vetting its own staff.

Employee reviews, however, are only one way of probing for weaknesses. Robust security protocols also demand regular auditing of classified informatio­n. When Ortis’s residence was raided, investigat­ors found dozens of encrypted computers, according to the cbc. While it’s not known yet what these computers held, taking any sensitive documents home is enough to raise eyebrows. According to a former intelligen­ce official, it’s generally uncommon to leave the office with files marked secret. To walk off with anything top secret is strictly forbidden. Such files are typically accessed only in a SCIF — short for Sensitive Compartmen­ted Informatio­n Facility. It’s a room where cellphones, laptops, or any other devices are prohibited and where walls are usually reinforced to prevent electronic eavesdropp­ing. To prevent breaches and theft, security agencies are also supposed to keep precise records of who handled what classified assets when. These safeguards are standard for all Five Eyes and most NAT O countries, given that a large portion of top secret material is a blend of intelligen­ce from various internatio­nal agencies. If one agency is lax, it could expose the secrets of allies.

Which is why the Ortis affair is such a calamity for Ottawa and the spy bosses on Ogilvie Road, where CSIS and the CSE are headquarte­red. The fact that the breach first happened some four years before Ortis was arrested is especially embarrassi­ng. (Compare it with other leakers from the digital era, such as former US Army private Chelsea Manning or ex–air Force intelligen­ce officer Reality Winner: each exfiltrate­d sensitive informatio­n with ease, yes, but each was promptly identified.) If a partner in the alliance can’t be trusted, it may weaken the vital openness of the Five Eyes partnershi­p. Such moves could inspire countries to withhold material.

Canada has had a few of these embarrassi­ng high-profile episodes. But so have its allies. Most notably, in 2013, National Security Agency contractor Edward Snowden leaked thousands of top secret documents about the US government’s surveillan­ce methods. In 2017, Wikileaks released details of the CIA’S Vault 7, a database of powerful hacking tools. One of the most effective strategies after a leak, according to a former intelligen­ce official, is the rather cynical practice of saying “maybe you tomorrow.” That is, you remind other agencies that they, too, have had leaks. And they will likely have more. It was Canada today, but it may be you tomorrow.

That strategy only goes so far if Canada can’t prove that it’s taken significan­t steps to address security deficienci­es. RC MP commission­er Brenda Lucki has insisted that “mitigation strategies are being put in place” — presumably to avoid another Ortis. What those strategies are, however, Lucki hasn’t said.

Cameron Ortis’s story tells us a lot about insider threats at the government agencies designed to protect us. But, if the charges against him are true, his story also tells us an enormous amount about the value of in-depth, investigat­ive policing.

In February, CSIS director David Vigneault gave a virtual address to the Centre for Internatio­nal Governance Innovation, warning that “any individual with inside knowledge of — or access to — an organizati­on’s systems can be targeted by hostile intelligen­ce services.” He told the audience that the “significan­tly more complex environmen­t” necessitat­ed more powers for CSIS “to use modern tools.” It’s a variation of what the RC MP has also long lobbied for. In 2016, then commission­er Bob Paulson warned that “the single most important issue we have” was the threat of “going dark” — referring to the ability of criminals to hide behind strong encryption standards. Indeed, Canada is joining a chorus of national security agencies in other Five Eyes countries that have pushed for ever-broader powers to outlaw or weaken these encryption standards in order to better hunt down criminals everywhere.

One threat of particular concern is something called Pretty Good Privacy, or PGP. Over the years, PGP has become the bedrock of modern encryption — it was the foundation of Phantom Secure — and has influenced the technology used to scramble data in Whatsapp, Signal, imessage, Wire, and a host of other popular messaging clients. The concept is rather simple: PGP gives anyone, through a series of equations, the ability to generate a string of letters and numbers — a key. That key, a version of which is uploaded publicly, is used to encrypt any message or file the user wants. A whistleblo­wer, say, may want to contact a journalist securely. To do so, they may use the journalist’s public key. The journalist, in turn, can read the message only once they unlock it with their private key.

While we know that security services in Canada and abroad have figured out all manner of hacks to beat commercial encryption, PGP remains more or less secure. In his thesis, Ortis predicted what would happen when criminals have privacy defences that outpace the investigat­ive methods available to police. “Faced with a quickly evolving predator,” Ortis wrote, government­s will try to turn the tables with “more police and more laws and, possibly even framing the problem as a threat to ‘national security.’”

Some government­s have tried exactly that. Singapore has long given its police agencies the power to force citizens to

decrypt their communicat­ions. In 2018, Australia passed a bill requiring technology companies to decrypt any messages sent on their platforms. While the full impact of that law hasn’t yet been felt, the Guardian has reported that Australian police may use their new powers to snoop on Mcdonald’s free Wi-fi or on citizens’ online-shopping habits.

But, as Philip Zimmermann — who invented PGP — told me recently, fighting against encryption and against the evolution of technology is like trying to force Henry Ford to limit the size of his cars’ engines in order to stop Bonnie and Clyde. It’s “a fool’s errand.” And Ortis’s own arrest shows why. During the years the rcmp spent trying to convince the public it needed expansive new legislativ­e powers to do its job, its top brass was allegedly spiriting away its secrets to a criminal encryption company.

Ortis wasn’t fatalistic about the threat that cybercrimi­nals pose in a world with strong encryption. Far from it. He argued that police agencies too often treat the internet as “a kind of black-box.” As government­s spend more time worrying about how to crack encrypted communicat­ions, the most effective way for them to combat digital criminals — even in their own ranks — continues to be low tech. Tactics used in effective online investigat­ions aren’t all that different from how cops bust drug rings or organized crime groups in real life. It was, after all, a Faraday pouch — a bag lined with aluminum — and the capture of a cyber kingpin that ultimately led to Ortis himself. Good police work, not draconian laws, dismantles criminal enterprise­s. Ortis was right. So right that he may go to jail for it.

 ??  ??
 ??  ??

Newspapers in English

Newspapers from Canada