All Posts in Archive

October 28, 2015 - Comments Off on Freedom on the Net 2015: Pakistan, The State of Insecurity

Freedom on the Net 2015: Pakistan, The State of Insecurity

The State of Freedom on the Net 2015

The State of Freedom on the Net 2015

Lahore, October 27, 2015: Freedom House's Freedom on the Net report, conducted in 60 countries, examines the civil liberty, freedom and censorship trends in Pakistan over the past year. Scoring “Not Free” for Internet Freedom, 2015 marks the fourth consecutive year that Pakistan joins the host of nations share the same worst score, with policies that curtail freedom and civil liberties.

Extensively and methodically researched by Digital Rights Foundation, Pakistan in collaboration with Freedom House, the report compiles and analyses actions undertaken by the state to limit internet freedom, to violate user rights as well as the implementation of censorship in Pakistan. The 2015 edition of Freedom on the Net contains some of the following worrying highlights:

    • January 2015: The introduction of drafted cybercrime legislation, the Prevention of Electronic Crimes Bill, which includes overly broad definitions of criminal activity online, which could negatively impact freedom of expression and the right to privacy

 

    • March 2015: Prime Minister Nawaz Sharif disbands an inter-ministerial committee responsible for censorship of 'objectionable' material, and authorises the government regulator to take oversight

 

    • The November 2014 arrest of a Christian (a religious minority in Pakistan) by police who had evaded blasphemy charges related to his blog for three years

 

    • The deaths in August 2014 of two journalists and a network account by unidentified gunmen in their offices in Balochistan

 

    • The leaking of data from the corporate surveillance firm, Hacking Team, revealing interactions with private sector representatives for Pakistani state security agencies, in regards to surveillance equipment that would work on older mobile phone models, amongst other details

 

    • The crackdown on unverified mobile SIM cards, and mandatory biometric verification protocols that were set in place, after a December 2014 attack on school that resulted in more than 150 children being killed

 

The government of Pakistan continues to take ever greater steps to gain further control over the digital spaces that its citizens use, ostensibly to protect them from terrorism and criminals. While it is the duty of the state to protect its citizens, it is also the paramount duty to ensure the right to privacy, the right to freedom of expression, and the right to civil liberties are protected. As the Freedom on the Net report will show, the government is taking further steps to further curtail these rights, to police democratic discourse and stifle dissenting voices that are already threatened offline.

"The government of Pakistan often talks about bringing the nation into the 21st century, and is quick to point to its growing tech industry. But when it blocks websites and moves to clamp down on online discourse, not to mention criminalise ethical hacking, it is choking freedom of expression and the right to privacy back into an earlier, darker age in the nation's history, “ said Nighat Dad, Digital Rights Foundation’s Executive Director. “The use of surveillance tech to monitor and control our access to the internet and to digital services in general,” she continued, “would have a chilling effect on the way that we express ourselves online. Instead of being a safe space, it will be a panopticon, where we are always watched.”

“We are troubled to report that Pakistan's poor internet freedom score failed to improve in 2015. Communications shutdowns, violence, and blasphemy charges related to online content continue to restrict the environment for ordinary internet users. The government has also failed to lift the ongoing ban on YouTube,” said Madeline Earp, Asia Research analyst for Freedom on The Net.

Freedom on the Net and the research of Freedom House seek to address the failings of the state in protecting the rights of citizens, and by compiling and analysing evidence that activists and concerned citizens can use to push for greater democracy online as well as offline.

To view the country report on Pakistan in its entirety, please click here.

October 6, 2015 - Comments Off on A History of Digital Surveillance & Censorship in Pakistan

A History of Digital Surveillance & Censorship in Pakistan

In the years following September 11, 2001, the global geopolitical landscape has undergone drastic changes, coupled with economic uncertainty. It has become de rigueur for governments to crack down on forms of freedom of expression, and to give more powers to their intelligence agencies, to tackle 'extremism' and terrorism. The work of whistleblowers such as Edward Snowden, and activist organisations such as Wikileaks, have brought to the public's attention the extent to which citizens have had their privacy violated, in the name of security. Pakistan, which came of age during the Cold War, is no different, having long been familiar with surveillance and censorship without proper oversight. Since 2001, the government of Pakistan has sought to limit the freedom of expression enjoyed by its citizens, censoring and blocking websites when possible. It has pushed for broader powers for its intelligence and security agencies, as part of its National Action Plan.

British-based experience designer and privacy advocate Salman Chaudhri has been working with Digital Rights Foundation on the timeline below, covering Pakistan's recent history of digital surveillance and censorship up to 2015. We hope that it will provide Pakistanis with an understanding of how, rather than working for its people, the government of Pakistan has been working to undermine the rights of its citizens.

If you wish to use the timeline, please credit Salman Chaudhri and Digital Rights Foundation.

 

A History Of Digital Surveillance & Privacy in Pakistan

A History Of Digital Surveillance & Privacy in Pakistan

September 21, 2015 - Comments Off on Standing Comm. Passes Draft of PECB, Unseen by Comm. Members

Standing Comm. Passes Draft of PECB, Unseen by Comm. Members

On September 17th 2015, the National Assembly's Standing Committee on Information Technology passed the final draft form of the Prevention of Electronic Crimes Bill, which will now be sent to the National Assembly for final approval.

Disturbingly, members of the committee were not shown the draft form of the bill before its passage. PPP MNAs Shazia Marri and Nauman Islam Sheikh, and PML-N MNA Awais Ahmad Khan Leghari, rightly objected, stressing that the draft bill could not be approved until they and the other members of the committee had read the finalised draft.

Capt Mohammad Safdar (Ret'd), Standing Committee chairman, overruled these objections, saying that as he had seen the draft, that would be sufficient grounds to pass the draft.

Final Draft of the Prevention of Electronic Crimes Bill, September 17th 2015.

See our previous and ongoing coverage of the cybercrimes bill, here: http://digitalrightsfoundation.pk/work/cyber-crime-bill/

September 6, 2015 - Comments Off on It’s time to end the culture of online misogyny!

It’s time to end the culture of online misogyny!

The Last Word bookshop and Digital Rights Foundation recently collaborated on a discussion session held at the Last Word in Lahore, Pakistan, to help develop an understanding – and increase awareness of – the dangers of unchecked online harassment. The session, “A Call To Action: Online Misogyny in Pakistan, and How to Combat it”, was announced in response to a disturbing rise in online misogyny and gender-based cyber-harassment. According to Pakistan's Federal Investigation Agency, 3,027 cases of cybercrime were reported in the the period between August 2014 and August 2015, with 45% of the cases being related to cyber-harassment on social media against women.

Aysha Raja, owner of the Last Word, compering the event. On her right are Nabiha Meher Shaikh and Susan Benesch

Aysha Raja, owner of the Last Word, compering the event. On her right are (l-r) Nabiha Meher Shaikh and Susan Benesch

The recent misogyny and hyper-jingoism on display last week (http://www.dawn.com/news/1203410) highlighted how important it is to tackle misogyny, and to examine the behaviours that give rise to it. The alarming frequency with which online harassment (which often bleeds out into real world “offline” harassment, or worse) has led to much needed public discourse – not just on recognising that the danger is real, but also to come up with proactive solutions to counter such behaviour. There are signs of understanding – the DRF/Last Word session, for example, saw a good turnout, with many men not only in attendance, but also contributing to the discussion in a mostly positive manner.

Jahanzaib Haque of Dawn.com raises a point.

Jahanzaib Haque of Dawn.com raises a point.

The audience at the event

The audience at the event

The speakers at the event, included:

Susan Benesch of The Berkman Center for Internet and Society, at Harvard University, and founder of the Dangerous Speech Project, “to find ways of diminishing inflammatory speech – and its capacity to inspire violence - while protecting freedom of expression.”

http://www.voicesthatpoison.org/

https://twitter.com/dangerousspeech

Nabiha Meher Sheikh, Co-founder of Pakistan Feminist Watch, and an instructor in Critical Thinking

https://twitter.com/pakfemwatch

http://pakistanfeministwatch.blogspot.com/

Jahanzaib Haque, Chief Digital Strategist and Editor at Dawn.com

https://twitter.com/jhaque_

https://www.dawn.com

Nighat Dad, Executive Director of Digital Rights Foundation

https://twitter.com/nighatdad

http://digitalrightsfoundation.pk/

Links

We have collected the live-tweets of the session in Storify, for those unable to attend. The link can be found here.

http://www.dawn.com/news/1205235 Dawn's coverage of the session.

August 21, 2015 - Comments Off on Building The Capacity to End Online Harassment

Building The Capacity to End Online Harassment

The Internet has, in a short period of time, become a vital part of our lives. With it we are able to gain access to a dizzying amount of knowledge resources, which provide people with valuable skills and information that can enrich their lives. However, there is also a dark side to this technology. Access to information has also led to the growth of often pervasive forms of digital and offline harassment against women. Personal data will be leaked or hacked into, to try to force women offline, to stop their voices being heard, or even to instigate violence against them. According to the Federal Investigation Agency’s National Response Centre for Cyber Crime, 3027 cybercrime cases were reported in the period between August 2014 and 2015 - 45% of which were related to cyber-harassment against women and young girls via social media.

The cases that have reported are just the tip of the iceberg, as many victims keep silent out of fear of losing access to internet technology or out of fear of being attacked again. By not tackling this head-on, we risk a situation where members of a vulnerable population, one that makes up over half the population of Pakistan, are denied essentially life-enhancing knowledge and tools. The state can, via social and government institutions, provide support and assistance to women of all ages from cyber-harassment, and to give them the vital skills necessary to defend themselves.

DRF proudly join hands with Punjab Commission on the status of women in building capacity of the Punjab Women's helpline staff to effectively deal with Cyber harassment complaints

Digital Rights Foundation, Hamara Internet and the Punjab Commission on the Status of Women have joined together to help build and strengthen the capacity of the staff of the Punjab Women’s Helpline, so that they are effectively able to deal with cyber-harassment complaints, provide the assistance and support needed.

August 18, 2015 - Comments Off on Digital Rights Foundation stance on privacy and data retention provisions in the 2015 Prevention of Electronic Crimes Bill

Digital Rights Foundation stance on privacy and data retention provisions in the 2015 Prevention of Electronic Crimes Bill

Digital Rights Foundation recognises that the government must protect its citizens, as is its duty, especially in turbulent times. Digital Rights Foundation also recognises, however, that the government must do so in a manner that also protects the right to privacy and the right to freedom of expression.

Legislation that effectively tackles cybercrime and terrorism is vital. What the Prevention of Electronic Crimes Bill does, however, is move beyond what is necessary, and instead violates the civil rights of citizens, in the name of security. The government has been very reluctant in allowing for public oversight in regards to the PEC Bill, and has made amendments without sufficient involvement with, or indeed alerting civil society stakeholders to, the amendment and process.

The Bill as it stands contains a number of provisions that run of the risk of being open to very broad interpretations that could lead to sweeping penalty measures that would in effect criminalise innocent online and offline behaviours. Civil society stakeholders have submitted a legal draft to the IT Standing Committee of the National Assembly, that seeks to address and amend said provisions in a manner that balances the need for security with the need to respect the civil liberties of Pakistani citizens.

What remains, however, is that while civil society stakeholders have provided invaluable legal input, there still remain areas of great concern for Digital Rights Foundation and our colleagues in civil society.

Of concern to Digital Rights Foundation in particular are continued mandatory retention of data, as well as the decision to continue with allowing the government to forward information to international partners, if so requested. There is a lack of a clear oversight regarding this international cooperation, and this is a matter that must be addressed, as it violated the right to privacy of Pakistani citizens.

It is our concern that the Bill as it stands does not protect citizens effectively, and does not protect their right to freedom of expression and their right to privacy. Thus, Digital Rights Foundation cannot support the Government of Pakistan's cybercrime legislation.

Privacy International & Digital Rights Foundation joint legal analysis of the PEC Bill

Article 19 & Digital Rights Foundation's Legal Analysis of the PEC Bill

August 10, 2015 - Comments Off on ‘The State of Proactive Disclosure of Information in Khyber Pakhtunkhwa and Punjab Public Bodies’

‘The State of Proactive Disclosure of Information in Khyber Pakhtunkhwa and Punjab Public Bodies’

Khyber Pakhtunkhwa and Punjab government departments fail to share information with citizens via web portals; Punjab Information Department does not have even a web site: Report

Lahore, August 10, 2015:

The State of Proactive Disclosure of Information in Khyber Pakhtunkhwa and Punjab Public Bodies report reaffirms earlier findings that reveal that government departments in the provinces of K-P and Punjab have failed to comply with their own right to information laws. Khyber Pakhtunkhwa and Punjab public bodies are required to proactively disclose categories of information as mentioned in Sections 4 and 5 of Khyber Pakhtunkhwa Right to Information Act 2013 and the Punjab Transparency and Right to Information Act 2013, respectively.

In clear violation of Section 4 of the Punjab Transparency and Right to Information Act 2013, almost all of the government departments surveyed failed to provide information about particulars of the recipients of concessions, permits or authorizations granted by the public bodies involved. This information is glaringly absent from official Punjab government websites, and clearly suggests that these bodies do not want to be transparent and accountable to citizens. This furthers the narrative of earlier reports that even though it is a positive effort to legislate RTI laws meeting international standards, citizens will only benefit when the respective provincial commissions play their due role in implementing those laws.

Provincial government departments have begun to start sharing information regarding provincial budgets. However, these departments have failed to provide details regarding proposed expenditure goals, as well as actual spending that has taken place. Nor has any information been provided concerning remunerations, salaries, benefits, and any other such payments that respective departments provide to employed staff or beneficiaries.

While K-P provincial departments have begun to share information concerning Public Information Officers, under Khyber Pakhtunkhwa's right to information laws, Punjab's provincial government bodies have as yet failed to provide any information about Punjab's own designated Public Information Officer. This reluctance to provide information is noteworthy, considering that the website of the Punjab Information Commission contains a list of Public Information Officers as designated by government departments. The Commission itself, however, has not provided any information about Punjab Public Information Officers outside of this list, however.

The report does recognise that provincial governments have adopted the latest web standards and many of them actively maintain their web presence. It in light of this, therefore, that while positive steps are reaffirmed by the report, the lack of tangible reforms  being adopted to implement key sections of the respective laws of the provinces, including the details of expenditures, becomes more glaring and significant.

The State of Proactive Disclosure of Information in Khyber Pakhtunkhwa and Punjab Public Bodies report analysed 17 departments of the Punjab government and 13 departments of K-P, ranking the degree of sharing and openness adopted by the two provincial governments on a scale of zero-10, where zero equates to “doesn’t meet the provision”, and 10 equates to “completely follows the provision”.

This report is a joint-effort initiated by the Coalition of Right to Information (CRTI) and Digital Rights Foundation, with a broader aim to measure how public bodies have been using the web. With rapid technological advancement, and greater reliance on technology for information, it has become crucial for government bodies to start using their web presence more effectively in order to promote good governance and reduce corruption. This research looked at whether government departments are keeping properly maintained websites and promoting citizen feedback. The primary purpose of these reports, however, is to measure against respective RTI laws.

Current research reiterates the critical situation concerning the lack of public disclosure of the recipients of concessions, permits or authorizations granted by the public bodies of both provinces. While Coalition Of Right to Information and Digital Rights Foundation both appreciate efforts undertaken by the elected governments of Punjab and KP-K, in having enacted right to information laws, it is disappointing to see the unwillingness of public bodies to comply with those same regulations.

Much needs to be done by the Information Commissions of  K-P and Punjab to ensure that public bodies comply with the right to information laws and make information available for public consumption.

Link to the report: Proactive Disclosure Report 

Contact: nighat@digitalrightsfoundation.pk

– End –

“Coalition of Right to Information seeks to promote an open information and communications policies at the federal, provincial and district levels across Pakistan. With various initiatives, the coalition of civil society organizations aims to promote citizen awareness and improve dialogue between the citizens and state.” 

Digital Rights Foundation is a research based advocacy organization based in Pakistan focusing on ICTs to support human rights, democratic processes and better digital governance. DRF opposes any and all sorts of online censorship and violations of human rights both on ground and online. We firmly believe that freedom of speech and open access to online content is critically important for the development of socio-economy of the country. www.digitalrightsfoundation.pk

July 24, 2015 - Comments Off on Unlawful Interception: Pakistan’s intelligence agencies, Hacking Team, & the abuse of communication surveillance powers

Unlawful Interception: Pakistan’s intelligence agencies, Hacking Team, & the abuse of communication surveillance powers

Earlier this week, Privacy International released their in-depth report on the state of surveillance in Pakistan, Tipping the scales: Security & surveillance in Pakistan. Available to the public, the report examines the exponential rate at which communication surveillance measures have been undertaken by the government of Pakistan defended as being necessary to combat internal and external threats to the nation. However, while it is the role of the state to protect its citizens from internal and external threats to their life and liberty, this echoes an all too common rationale used by foreign governments and intelligence agencies worldwide to justify ever increasing surveillance of their own citizens, and to limit or remove the legal rights of those same citizens to push back against the invasion of their privacy.

The “Global War on Terror” has seen law enforcement agencies worldwide request and in most instance receive millions in “anti-terrorism” funding, as well as broader powers with oft-generous leeways, to tackle terrorism as they see fit. Armed forces, intelligence agencies and law enforcement departments worldwide will direct such largesse towards the acquisition of and greater access to technologies that allow them to spy on their own citizens. Since September 11 2001, this had led to the rights of citizens abroad violated by their own governments, who will carry out surveillance without proper public oversight – if at all. Activists, journalists, politicians and other ordinary citizens with no link to terrorist groups whatsoever have found themselves under observation, and often without any legal recourse.

As a partner in this “War on Terror”, Pakistan is no different, with its military forces receiving generous levels of funding from the government as well as from its international allies, to tackle its own conflicts against armed militants. It has also given broad powers and authority to state agencies, to tackle what they argue is language and behaviour that is detrimental to the reputation and safety of Pakistan. Coupled with bans on encryption and forms of proxy software, what this has led to, according to Privacy International's report, has been an abuse of:

"...their (Pakistan's intelligence agencies) communication surveillance powers, including spying on opposition politicians and Supreme Court judges. Widespread internet monitoring and censorship has also been used to target journalists, lawyers and activists."

Privacy International's report also reveals that Pakistan's Inter-Service Intelligence Agency (ISI) wanted to expand their surveillance capabilities via the commission in 2013 of a:

"mass surveillance system to tap international under- sea cables at three cable landing sites in southern Pakistan. The “Targeted IP Monitoring System and COE [Common Operations Environments]” would allow Pakistan to collect and analyse a significant portion of communications travelling within and through the country at a centralized command centre. With a projected intake of an estimated 660 gigabytes per second, the system would amount to a significant expansion of Pakistan’s communications intelligence gathering capacities."

To create such a system to strengthen one's surveillance efforts, it has become de rigueur to reach out to the private sector for hardware and software surveillance solutions. A multi-billion dollar industry, commercial surveillance firms have found no shortage of potential clients in the wake of post-September 11th attacks attributed to terrorist organisations or lone wolves. The Privacy International report highlights how Pakistan's intelligence agencies and security forces, represented by partners in the Pakistani private sector, sought to purchase products and services to allow them to expand their surveillance abilities, to infiltrate the digital devices and computers of citizens, from international spyware firms.

Earlier this month one of these companies, the controversial Italian spyware manufacturer Hacking Team, was hacked. The firm's official twitter account was taken over on July 5, and links to over 400 GB worth of internal Hacking Team data were provided, which in turn were shared by WikiLeaks and others. This hack allows us to explore how Pakistani intelligence agencies purchase the technology and services they require for greater surveillance creep.

A controversial player in the commercial digital surveillance industry, Hacking Team has frequently asserted that it goes to great lengths to ensure that its software is not utilised to undermine human rights. The internal communications and invoices unearthed, however, strongly contradict the firm's claims. Communications with representatives indicate little concern made regarding misuse of HT's software packages to undermine human rights activities – they are, instead, reassured and informed that there will be no trouble in operating in particular regions. Hacking Team's core business centred around their Remote Control System (RCS) software suite, which allows customers to infiltrate the computer and mobile devices of targeted individuals and install backdoors, in turn allowing for undetectable monitoring at will. Hacking Team's RCS, also known as Galileo, allows customers to (according to their promotional material):

Keep an eye on all your targets and manage them remotely, all from a single screen. Be alerted in incoming relevant data and have meaningful events automatically highlighted.

Remote Control System: the hacking suite for governmental interception.

Right at your fingertips.”

If the modus operandi of Hacking Team and Galileo sounds familiar, it should: Finfisher, a surveillance software package released by Gamma International Ltd in 2007, was brought to the world's attention in August of last year, due to a 40 GB leak that exposed the company's internal communications and financial history, as well as the governments that purchased – or were interested in purchasing – Finfisher for domestic surveillance purposes. Finfisher, like Hacking Team's RCS/Galileo software suite, allowed customers to infiltrate the computer systems of targeted individuals, and install software undetected. Digital Rights Foundation has covered Finfisher and how it operates here.

Finfisher's "Remote Monitoring and Deployment Solutions" and Hacking Team's RCS have something else in common: both were of interest to Pakistani companies, working on behalf of domestic military intelligence and intelligence agency clients. An examination of Hacking Team's leaked internal data uncovered email communications between Hacking Team and Pakistani IT company representatives between 2011 and 2015. Also uncovered were internal communications, mostly in Italian, between members of Hacking Team regarding their thoughts on potential Pakistani partners, as well as sharing and discussing news articles pertaining to the security situation in Pakistan and South Asia. Unlike Finfisher, the data leaked does not appear to indicate that a successful purchase of RCS/Galileo was made by Pakistani buyers.

"You can compare them to MI5": Pakistan's Interest in Hacking Team's Tech

The extensive data leak reveals the manner in which Hacking Team communicates with representatives of potential clients in Pakistan. Sensitivity is requested by representatives in regards to the identities of their clients; preferential treatment; verification of identities by clients, visa invitation letters; VIP guest ticket requests; interest in specific software and service demonstrations, and internal discussions regarding client representatives are covered in the emails. Below are samples of the email communications between Hacking Team and potential customers:

January 18th 2011 marks the earliest recorded communication (as collected by Wikileaks and other sources) between Hacking Team and Pakistani client representatives. Marco Bettini, HT's International Sales Manager, is in communication with Zeeshan Zakaria, Chief Executive of Defence Solutions & Systems Ltd (DSS), a Lahore, Pakistan-based company. The email, part of a long response thread entitled “R: R: R: R: Demokit” in response to Mr. Zakaria's previous email that states that there will be “4 guests who will see the demo. We will require you to do the demo.” In the email Mr. Zakaria also says that he will “appreciate if you dont (sic) offer your prices or product to anyone else in Pakistan for the time being.” Mr. Bettini asks for the name of the guest “in order to require the badges for ISS admittance” and if he, Mr. Zakaria, will be attending as well. Hacking Team does not”give any exclusivity based on country”, says Bettini, but they can “block” other companies asking for “any activity or quotation for the same customer” if Mr. Zakaria can provide the name of the agencies he is working with.

(As ISS comes up quite often in Hacking Team emails, it should be explained at this point that ISS in the context of the emails is an abbreviation of “Intelligence Support Systems for Lawful Interception, Electronic Surveillance and Cyber Intelligence Gathering”. The website for the ISS describes it as thus:

ISS World Middle East is the world's largest gathering of Middle East Law Enforcement, Intelligence and Homeland Security Analysts as well as Telecom Operators responsible for Lawful Interception, Hi-Tech Electronic Investigations and Network Intelligence Gathering.”

In 2011, the ISS conference was held in Dubai from February 21-23, 2011. Among the conference's sponsors as of 2015? Hacking Team, Finfisher, and Gamma Group. Though a separate entity since October 1st 2013, Finfisher was established in 2007 as part of the Gamma Group.

The following day, an email from Ali Ahmed of Miran International – according to its website, a Karachi-based “company specialising in security, defence and telecommunications” - is forwarded by David Vincenzetti, Hacking Team's CEO, to rsales@hackingteam.it, concerning an inquiry “from one the premier Intelligence Agencies in Pakistan” in regards to “infecting of GSM handsets.” (sic). Unaware of the earlier communication to HT by DSS, Miran International is interested in partnering with the Italian firm in Pakistan for the project if the latter has not already found a partner in the country.

"K Block" refers to the HQ of the Intelligence Bureau, at the Secretariat in Islamabad, Pakistan. Image Via Wikileaks.

"K Block" refers to the HQ of the Intelligence Bureau, at the Secretariat in Islamabad, Pakistan. Image Via Wikileaks.

The following day Hacking Team contacts Mr. Zakaria of DSS, asking him to provide the names of his guests. He is also informed by HT that they “are already involved in other opportunities in Pakistan.” “To protect your job,” the email from Mr. Bettini continues, “please inform me as soon as you can the agencies and contacts you are working with.” (sic). Following this email, Mr. Ahmed of MI is sent anemail by Mostapha Maana, Hacking Team's account manager for the Middle East region, similar to the one sent by Mr. Vincenzetti, asking for the agency letter, to check if they are already “in contact” with the client in question. It bounces back, and is sent again on the 21st by Mr. Maana. Mr. Maana gets in touch with Mr. Zakaria of DSS , and knows that “ we have been trying to work together since 2008”. As before, Mr. Zakaria is asked for the names of his clients “in order to protect your job”. Mr. Zakaria responds that “at this stage I think we should not discuss the names of the customers as it is a little sensitive.” Mr. Maana then responds, saying that he needs to know the names of the clients “otherwise I cannot refuse to meet the other Pakistan company at the ISS. By the way, I already know the name of this company's customer.”

It is at this point that Mr. Zakaria identifies the customer/client as being the National Police Bureau, with names of the officers attending the conference being named in the email. He requests that VIP invitations be arranged for the officers as “they are very interested your product.”

Hacking Team outlines to how RCS/Galileo works to the representative for a potential client.

Hacking Team outlines to how RCS/Galileo works to the representative for a potential client. Image via Wikileaks.

We come back to Miran International, who, whilst requesting a Non Disclosure Agreement (NDA) have listed their clients: Pakistan's Intelligence Bureau (IB) and Inter-Services Intelligence (ISI). “You can compare them to MI5 and MI6” Mr. Ali Ahmed offers helpfully. According to the Miran representative, “they're the only 2 agencies in Pakistan allowed to use voice interception and location products like A5-1 gsm interception systems.” (sic) *. “ISI and IB are the top agencies in Pakistan with no budget issues” he continues, “allowed to purchase without the tendering process.”

(*An example of what they could be referring to, for a point of reference, could be this: http://www.cellularintercept.com/ecom-prodshow/gsm_intercept.html)

Miran International and Hacking Team continue to discuss potential cooperation until early 2015, when internal emails between members of Hacking Team appear to look upon Miran International, and its sister company Vision Metric with some concern, and there is no update after February 26th of this year, when David Vincenzetti appears to remark that it is “una perdita di tempo” - a waste of time.

Hacking Team's CEO appears to have become fed up with this potential deal, calling it "a waste of time."

Hacking Team's CEO appears to have become fed up with this potential deal, calling it "a waste of time." Image via Wikileaks.

The communications between Hacking Team and Miran International may have been fruitless from the former's perspective, but a perusal of the communications between the two unearths other details. We learn, for instance, Gamma Group's representative in Pakistan was “very active in Islamabad with ISI” (sic) (though unsuccessful), and that Gamma Group's Sales Director, Edgar Bucheli, was in touch with senior ISI officials.

Here the representative passes on the information that the Intelligence Bureau (IB) is interested. Image via Wikileaks

Here the representative passes on the information that the Intelligence Bureau (IB) is interested. Image via Wikileaks.

As for DSS, communications between them and Hacking Team continue until early 2014, and then stop, apparently due to a lack of success on the part of this company as well.

This does not stop Hacking Team from being approached by Pakistani companies, such as United International Technologies (UIT), which “has been in the Pakistan market for 35 years and is the Pakistan company representative for global defense and aerospace companies such as BAE Systems, Rockwell Collins, QinetiQ, Chemring Group and Poongsan among others.” UIT contacts Hacking Team via email on February 27th 2015, and until the 5th of March discuss NDAs and the “end users” or clients of UIT, “Pakistan Army Military Intelligence and/or ISI.” UIT informs them that they will be at the 2015 ISS conference in Dubai, from the 16th to the 18th of March. As of the 5th of March, UIT is “at a very preliminary stage.” Nothing else follows.

Hacking Team and its international partners discussing a new ISI head, as any work with the "current one is a waste of time.

Hacking Team and its international partners discussing a new ISI head, as any work with the "current one is a waste of time.

What is noticeable about communications between Hacking Team and the representatives of potential client is the plainly laid out request for software that provides the customer with the ability to infiltrate and monitor communication traffic. What is conspicuous by their absence are any concerns raised about human rights or other ethical considerations.

Here the representative clearly states what the client wants.

Here the representative clearly states what the client wants. Image via Wikileaks

The private companies mentioned in this post are just a few of the many that vie for contracts from the armed forces, the police forces and intelligence agencies of Pakistan, to offer the latest in software packages that ostensibly help protect the citizens of Pakistan. The reality is that the tools that are purchased on behalf of the forces and agencies mentioned are being chosen specifically because they are advertised as being able to bypass security measures that allow users privacy and a sense of safety, with next to nothing in terms of official restraint or public oversight.

To purchase and utilise such measures without clear lawful authority violates the rights of Pakistani citizens, as laid out in the International Covenant on Civil and Political Rights, to which Pakistan became a signatory in 2010. The representative from Miran International wrote in his email that ISI and IB have “no budget issues”. On the contrary, the money which pays for the supposed free rein of these agencies comes from the taxes paid by Pakistani citizens. With no public oversight, the taxes collected from citizens are being used to finance the purchase – or research the purchase of – equipment that violates their rights.

Privacy International's report, Tipping the scales: Security & surveillance in Pakistan, can be downloaded here.

Written by Adnan Chaudhri

June 23, 2015 - Comments Off on Press Release: British intelligence agency hacked into Pakistan Internet Exchange

Press Release: British intelligence agency hacked into Pakistan Internet Exchange

Digital Rights Foundation is seriously concerned by revelations of the infiltration of Pakistan's Internet Exchange by Britain's GCHQ intelligence agency. We urge the government of Pakistan to take action to protect the right to privacy of Pakistani citizens, and to condemn the actions of GCHQ.

From documentation published by The Intercept, it was revealed that Britain's intelligence agency GCHQ as a result of its Computer Network Exploitation (hacking) operations had gained presence on the Pakistan Internet Exchange prior to 2008. This gave GCHQ according to the document published “access to almost any user of the internet inside Pakistan” and the ability “to re-route selected traffic across international links towards GCHQ's passive collection systems.”

This hacking operation, at a scale never previously seen before from the British intelligence agency, seriously undermines the right to privacy of all users of the internet in Pakistan. By targeting a key point in Pakistan's communications infrastructure, GCHQ have put at risk the security and integrity of a significant portion of Pakistan's communications infrastructure.

The Pakistan Internet Exchange is a core part of the communications infrastructure in Pakistan. It is a common point of transfer for a significant portion of Pakistanis' communications. This makes the intrusion all the more concerning. Any vulnerability that allows British intelligence to access the exchange is also available to any other malicious actor.

The operation from GCHQ targeted Cisco routers. Cisco routers have previously been caught up in intelligence agencies cross-border spy games. It was revealed that America's National Security Agency had been intercepting Cisco routers and installing firmware onto them before they were delivered to customers. Steps should be taken immediately by Cisco to fix any vulnerabilities discovered in their routers to protect their customers right to privacy.

This is not the first time that Pakistan has been involved in the mass surveillance programmes from intelligence agencies of a “friendly” nation. Earlier this year it was reported that the NSA had determined that Al-Jazeera's Islamabad bureau chief was a person of interest, via metadata collected from 55 million Pakistani mobile phone records, and entered in SKYNET, a computer programme designed to analyse metadata.

It is unclear whether the Pakistan government knew of these operations. The Pakistan government has an obligation to protect Pakistanis right to privacy and this level of intrusion onto critical national infrastructure undermines that obligation. It is of paramount importance that the government does all it can to account for this intrusion and to take meaningful steps to ensure the right to privacy in Pakistan and prevent it from being brazenly interfered with by foreign intelligence agencies.

-------------

Nighat Dad, Executive Director of Digital Rights Foundation:

"The GCHQ operation highlights the growing mission creep on the part of intelligence agencies and other state actors, who frequently request more sweeping surveillance powers and authority, and who bristle at any attempts to enforce effective oversight upon them. This hacking not only does not protect ordinary people, but leaves them more vulnerable to malicious actors that can exploit the same vulnerabilities that GCHQ has infiltrated. ”

When ostensibly democratic nations carry out such draconian and unethical actions against the citizens of nations they are 'allies' of, it sets a troubling precedent. The government of Pakistan could point to the actions of the US or the UK as justification for passing greater surveillance measures against its own people."

------------

Further sources:

Original story here:

https://firstlook.org/theintercept/2015/06/22/gchq-reverse-engineering-warrants/

Document can be found here:

https://firstlook.org/theintercept/document/2015/06/22/gchq-warrant-renewal/

National Security Agency interdiction of Cisco routers:

http://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/

Al-Jazeera's Bureau Chief designated as “member of Al Qaeda” and the SKYNET programme

https://firstlook.org/theintercept/2015/05/08/u-s-government-designated-prominent-al-jazeera-journalist-al-qaeda-member-put-watch-list/

http://digitalrightsfoundation.pk/2015/05/spectrum-eyes-the-nsa-pakistani-metadata/

June 5, 2015 - Comments Off on Time Magazine Honours Nighat Dad as a Next Generation Leader

Time Magazine Honours Nighat Dad as a Next Generation Leader

Digital Rights Foundation founder Nighat Dad with Nobel Prize winner and activist Malala Yousafzai.

Digital Rights Foundation founder Nighat Dad with Nobel Prize winner and activist Malala Yousafzai.

Nighat Dad, Digital Rights Foundation's founder, was recently honoured by Time Magazine, by being named one of its Next Generation Leaders of 2015. She joins five other young innovators who are leading by example and inspiring others to have the courage to follow their convictions. Read Time's profile on Nighat and the important of Digital Rights Foundation's work here.