Zeeshan aims to sell RCS to the “army and another intelligence customer”.
NDAs are signed and exchanged for a customer interested in IP intrusion techniques and intrusion through WIFI, along with solutions to hack into Skype, Tango, Viber and WhatsApp. Zeeshan and the HT representatives seem relaxed, almost jovial in their exchanges.
2015
January to March: The new year brings a sudden rush of local contractors vying to become partners for HT’s surveillance software. One identifies himself as Ali Zubair, Director Strategic Planning of Islamabad-based United International Technologies (UIT). He promises sales will be for powerful end-users.
Another man, Adil Khan, who claims to be Vice President Sales and Marketing of Islamabad-based Teletrade International says he will land HT important customers — the very same as those cited by UIT. Yet another representative of Miran International chimes in with an, “inquiry from one of the premier Intelligence Agencies in Pakistan for infecting of GSM handsets.”
Edward Tufail of Italy-based Commercial Consultations claims to represent Karachi-based Vision Security, yet another company interested in a partnership. David terms this both “suspicious, and a waste of time”.
May 4: MI Fareed who claims to be President, Intertech Tradelinks, a Canada based company “currently in Dubai”, says he has received demands from Pakistani LEAs and intelligence agencies for the purchase of surveillance equipment.
He says the equipment would be used “to reduce crime levels, to protect from terrorism threats and to identify new incoming security danger as well as for similar uses in the commercial and social sector of Pakistan. He adds that:
"[Pakistan is] a front-line ally of the USA/allied forces in their war against terrorism in this region, as well as an active participant supporting Saudi Arabia in their continuing conflict in Yemen.”
He adds another “special purpose” requirement that no other contractor has requested: equipment and technologies for integration into “unmanned vehicles” i.e. air (drones) and land. Whether this request ever moved from an NDA to an actual purchase is unknown.
This is the final Pakistan-related email from the WikiLeaks HT archive.
In the name of security
Can the right to privacy be compromised in the name of a security crisis?
Should intelligence agencies be trusted not to misuse powerful surveillance tools?
“In the modern context it is necessary to have effective surveillance equipment, particularly with our deteriorating security situation,” argues defence analyst and security expert Ikram Sehgal, “But what happens is that intelligence agencies justify the use of these tools in the name of counterterrorism and countering criminal activity, while a majority of the operations end up being dedicated to surveillance of common, private citizens, or used for political pursuits etc.”
Sehgal says tools like RCS are problematic when there is a lack of checks and balances in place. “When you have a body which does not answer to anyone or at least does not answer to all authorities that it theoretically should be answering to, then that’s going to cause problems,” he adds.
A former director general of the Intelligence Bureau who requested anonymity agrees that software like RCS “are absolutely necessary tools given the complexities that now prevail in intelligence gathering and security.” He adds that “intelligence agencies do not have many other sources to turn to, and while human intelligence has always been there, it cannot be as efficient as these software and tools.”
Legislation to regulate the activities of intelligence agencies is key the former DG says, but it would still not be enough. “The best way to ensure that surveillance software is not misused is to appoint the right people to do the job. Because even if you have regulatory laws in place, if implementation is lax those laws would be of no use to anyone. If you have the right person at the helm, they would do the right thing no matter what laws may or may not be in place,” he says.
Former DG FIA Tariq Khosa voices similar views. “The government is working on a cybercrime law so it can bring these operations within its ambit,” he says.
He suggests the formation of a cybercrime task force which answers directly to the government. He stresses the need for a parliamentary committee on intelligence affairs that carries out necessary oversight. “The proceedings of this committee may be in-camera if necessary but its effective presence is critical in a democratic setup”.
The problem with surveillance software
Digital rights experts in Pakistan see good reason to be concerned about spying software like RCS.
"There is next to no public or government oversight of our agencies. The software and hardware that is being purchased by them has in the past been used by regimes to spy on citizens. As such, we have powerful intelligence agencies that are rarely investigated or even castigated in public for fears of being under surveillance for doing so.
What is needed is judicial oversight, public debate and legislation that binds security agencies to the Constitution."
Nighat Daad – Director, Digital Rights Foundation
"The first step in addressing this situation is disclosure. Not through leaked documents, but in an official capacity by relevant institutions. The danger with such technology though, is that some of it can be so invasive that oversight is impossible. Once it gets into someone’s hands, privacy will be an elusive, distant reality.
On a global level, the debate as far as the sale of communications surveillance equipment goes, hinges on what is ethical for companies to make and sell. Around the world, governments and security agencies had taken excessive steps in the name of security and terrorism. We see all of that being rolled back now. The door on bulk data collection, blanket surveillance, overbroad and discretionary powers is shutting globally. It’s slow and gradual, but it is happening. We should be cognisant of that and not repeat the mistakes of others."
Farieha Aziz – Director, Bolo Bhi
"The intention of the state is evident. A China-like Internet governance model is becoming a reality in the name of sovereignty, and national security.
There is great concern regarding this, especially the targeting of human rights defenders and journalists. Our fears are now being verified on a daily basis, and the threat is as real as it gets. Civil society needs to unite to take on these undemocratic and dangerous decisions by state institutions.
Shahzad Ahmad – Director, Bytes for All
India wants HT to meet expansive surveillance needs
Hacking Team conducts webinar for RAW; CABSEC is already a customer of HT Israeli partner
Elements of the Indian state have been in steady talks with Hacking Team (HT) till June this year to obtain spying software for internal as well as cross border surveillance. In the trove of emails, the Italian firm implicates the desire of India’s intelligence agency and government to obtain spying tools, also indicating the Cabinet Secretariat’s satisfaction with a demo of the controversial RCS surveillance software.
From the Wikileaks HT archive, an email dated May 14, 2015 was sent by one Deepak Patel representing Evincesis Info Solutions, who said he was aware of “government establishment” demands.
“[Need is] to acquire tools and services which can help them stay ahead of law bending elements [sic] specially when the Indian soil is under constant threat from cross border attacks,” he explained to HT, assuring them he works closely with agencies on “various levels”.
An email exchange in February 2014 reveals that HT staff conducted a webinar demonstrating their hacking tools to the Research and Analysis Wing (RAW), National Investigation Agency (NIA), Intelligence Bureau (IB) and the National Tech Research Organization (NTRO).
Further examination of leaked emails sent from India in 2015 reveal that HT was actively trying to hire an Indian field officer, and was also in advanced stages of finalising a visit to Hyderabad for a demonstration to law enforcement agencies. An email request dated June 12, 2015 was made by a Prabhakar Kasu of Ortus Consulting, who proposed cellular interception hardware solutions to the South Indian state.
Kasu asked for an estimate on costs for 24 and 50 mobile licenses so he could share it with his client — the Andhra Pradesh police intelligence — to try and convince them to use it. He said he wished to know the price for mobile hacking only “given their current urgent priority”.
A figure of $1 million was given to Kasu, who later prepared visa documents and hotel options for the HT staff. The visit was set for early July and HT staff confirmed their travel dates and flights.
An indication of what the Indian authorities were looking for can be gleaned from an email sent by Amit Kumar of company Vis Exec. He listed the needs of an ‘end user’ that included penetration of Skype, Whatsapp, email, call data records, IP addresses, locations, posts, images, email and contact lists.
While the Indian government agencies did not directly approach HT, the contractors who reached out to the Italian firm appeared to have worked closely with them.
In one startling 2011 exchange, HT staff discussed a new opportunity in India through their Israeli partner NICE Systems. The customer interested in purchasing RCS was the Cabinet Secretariat (CABSEC).
When asked to explain what CABSEC was, HT employee Marco Bettini was told it was an intelligence organisation directly under the Prime Minister office. “They are already [sic] a customer of us (for other solutions…).”
Later in 2012, NICE writes to HT after a meeting with CABSEC in Delhi where RCS was demonstrated. “The customer was happy with the solution capabilities… we would like you [HT] to prepare a proposal that we will hand to our contacts at CABSEC”.
Additionally in 2013, Rohit Bhambri who identified himself as Director India Operations of NICE Systems, said his customer was keen for a solution that focused on mobile phone devices. In internal emails, HT said Bhambri’s client was CABSEC, “but for the moment we are not supposed to know that”.
India, however, remains unclear about the procurement of such software.
Talking to NDTV, UPA’s Home Minister P Chidambaram said he could not recall the Intelligence Bureau or the National Investigation Agency (NIA) acquiring the sort of technology discussed in the emails. “Nothing of this nature came to me,” he said.