| 
          
         | 
        
          
            <<  
             ^ 
              >>
          
          
            
              
                Date: 2000-10-31
                 
                 
                Nicky Hager ruehrt wieder um
                
                 
-.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- 
                 
                
      Eines der Interviews, die Nicky Hager bei seinem Aufenthalt  
in Wien gegeben hat  ist via world-information.org [darüber  
mehr in einer der nexten paar q/depeschen] im Volltext  
online. Ebenfalls im Volltext attachiert ist Nickys Forward  
des Aufmachers der Sunday-Star Times über  
Polizei/ermächtigungsgesetze und standardisierte  
Abhörschnittstellen.  
 
Interview 
<http://world-information.org/html/newsroom/index.htm> 
 
 
-.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-   
Date sent: 	Tue, 31 Oct 2000 10:29:52 +1300 To: 	 
<evel@xs4all.nl>, me@erich-moechel.com From: 	Nicky  
Hager <nicky@paradise.net.nz> Subject: 	Subject: RE: NZ  
RIP Act 
 
Hi, 
 
Here is the full text of the article I wrote for that Sunday  
paper, including you Erich thank you, out of which they took  
the front page article. There's nothing new in this for you two,  
I'm sure, I'm just presenting the subject to New Zealand.  
 
Nicky 
 
 
Sunday Star-Times article 
 
The police, Security Intelligence Service and the Government  
Communications Security Bureau are pushing for major new  
surveillance powers including the ability to spy on emails.  
Nicky Hager investigates. 
 
The secretary of the anti-free trade group turns on her  
computer and types in the security password. Her computer  
holds all the group's membership lists and meeting minutes  
so she makes sure no one else knows the password. Their  
group has been unpopular with the government in the leadup  
to a major free trade conference and she doesn't want  
anyone snooping on their plans. 
 
A little later she dials up the Internet to check and reply to  
her e-mail. Without her knowledge, she is no longer alone.  
As soon as she is connected to the Internet a computer in a  
surveillance centre in another city - or even another country -  
detects she is there and the intelligence technician begins  
his work. 
 
Using techniques originally dreamt up by school-age  
hackers, the technician bypasses the computer's security  
systems, takes control of the computer operating system  
and begins searching folder by folder through the directory.  
Soon he is copying confidential files onto his own computer.  
No need for politically embarrassing banging on the front door  
and producing a search warrant these days. 
 
He doesn't bother copying any e-mail files. All the e-mails to  
and from members of the group have been forwarded  
automatically from the service provider for months. They joke  
that they often read the letters before the people to whom  
they are addressed. 
 
Part way through downloading her computer files, and others  
from networked computers, the target disconnects from the  
Internet and gets on with her other work. No matter. As soon  
as she is on-line again, they'll be back
 
 
All of this will soon be possible. New surveillance laws,  
devised under a National Government and now promoted by  
Cabinet minister Paul Swain, include legalising spying on  
Internet communications, allowing Police and intelligence  
agencies to "hack" covertly into individuals' computers and  
forcing people to hand over computer passwords and  
encyption keys so that e-mail communications and computer  
files can be read. The new legislation would also impose  
"requirements" on Internet service providers and telephone  
companies to co-operate with intelligence agencies and  
police and install systems to assist spying on their  
customers. 
 
The proposed legislation has strong similarities to the British  
Regulation of Investigatory Powers Act (R.I.P. Act), passed  
amidst major controversy three months ago, which required  
internet providers to be connected to a new MI5 e-mail  
interception centre. However, rather than announcing and  
debating the planned law changes openly as occurred in  
Britain, information on the New Zealand plans has been kept  
secret and it is planned to slip them through in stages as add- 
ons to unrelated pieces of legislation.  The first of these is  
due to be tabled in Parliament about 10 days from now. 
 
The similarity to the British legislation is not a coincidence.  
Officials have told Ministers that the new powers are needed  
in order to meet New Zealand law enforcement requirements.  
In fact the legislation is a direct result of influence from  
western countries, particularly the United States, which  
wants a standardised global system for communications  
interception to assist its own intelligence operations. The  
New Zealand government and Police have refused to release  
information on the links between the proposed new powers  
and secret meetings and agreements between New Zealand  
officials and western intelligence and police agencies.  
Officials did not advise Ministers of the commitments they  
had already made to overseas agencies to fall into line with  
the standardised surveillance. 
 
In the last week of July the first signs of the new plans  
appeared when Associate Justice Minister Paul Swain  
discussed additions to anti-hacking legislation and raised the  
idea that it might include allowing Police to intercept e-mails.  
He justified the plans saying that the target was electronic  
criminals: "It's ridiculous to tell police to attack organised  
crime with one hand behind their backs", he said. However,  
the plans had been developed quite separately from the  
electronic crime and anti-hacking laws. 
 
I first suspected these changes might be coming in New  
Zealand a year ago after receiving copies of European Union  
reports uncovered by European researchers. These papers  
showed that European governments had been secretly  
agreeing to adopt standardised new spying laws pushed by  
the US Federal Bureau of Investigation (FBI) onto its closest  
NATO allies. A series of European Union countries and other  
US allies, including Australia, have ignored unwilling publics  
and passed these laws in recent years. It seemed likely that  
New Zealand was receiving pressure to conform. 
 
The New Zealand officials promoting the new laws have  
refused to release information about many of the specific new  
powers sought and their links to the FBI initiative. For months  
this year, Police refused to answer any questions, even after  
the Ombudsman agreed to investigate the case. Finally,  
under pressure from the Ombudsman, Assistant Police  
Commissioner Paul Fitzharris wrote a week ago claiming no  
knowledge of collaboration with the FBI- European Union  
plans and suggesting that, if I wished to discuss these  
issues further, I could contact the officer in charge, Inspector  
Peoples, when he returned from leave next year. 
 
Details of the planned law changes have been kept under  
wraps, but can be pieced together from various sources. The  
first legislation expands the interception powers of the Police  
and GCSB to cover all forms of electronic communications  
(including e-mail, faxes and text messaging) and, for the SIS  
as well, to cover hacking into computer systems to view and  
copy people's files. (Insiders say that the police already have  
technology to intercept faxes but not currently for e-mail.) 
 
Like the British RIP Act, this is to be achieved by amending  
the Crimes Act to make it illegal to intercept electronic  
communications or hack into computers - and then  
exempting all the intelligence and law enforcement agencies  
(police, customs etc) from the new law. Police interception  
warrants will then cover all kinds of communications (not just  
telephones) and search warrants will permit covert access to  
computers from a remote terminal. According to the Police  
briefing papers to the incoming Minister last year, they are  
also seeking powers to oblige people "to assist the police to  
access computerised material when executing a search  
warrant"; forcing people to hand over passwords and  
encryption keys.  
 
The SIS has already been given powers to deal with  
encrypted communications. Last year's amendment to the  
SIS Act legalised covert entry into buildings and placing of  
"objects" there. More explicit spy legislation overseas refers  
to bugs placed inside a computer keyboard to intercept  
confidential messages before they are encrypted. 
 
The legislation will also allow a whole new (but unspecified)  
type of GCSB electronic spying to be conducted from the  
super-secret agency's Freyberg Building headquarters in  
Wellington, and will move the GCSB's existing powers into  
the Crimes Act, thereby increasing their status. It will create  
a new system of authorisation, said to be "similar" to current  
SIS warrants, to control the new types of GCSB and SIS  
spying. 
 
If the new surveillance authorisations are like SIS warrants,  
there will be nothing to stop them being issued to target  
organisations and hence allow general surveillance.  
Opponents of market economics and free trade, who have  
been extensively targeted by western intelligence agencies  
elsewhere, come to mind. The whole emphasis of the new  
legislation will be that the use of the new powers will be kept  
secret. 
 
The other half of the plan is changes to the  
Telecommunications Act, again mirroring the RIP Act. The  
intelligence agencies and police want amendments that  
require Internet service providers and telephone companies to  
install equipment and software to make their systems  
"interceptable". (Sources say that Telecom New Zealand has  
already been paid to make its network "interception  
capable".) A controversial side-issue is whether the  
government or the telecommunications companies should  
pay for the changes. In Australia's similar 1997 legislation, it  
is the Internet and phone companies that pay.  
 
Network and service providers must also provide  
"communications data" on request, which in overseas  
legislation has included IP addresses, logon IDs and  
passwords, PIN numbers and credit card details. These will  
probably be available without the requirement for an  
interception warrant. The telecommunications companies will  
face heavy prison sentences if they refuse to co-operate or  
reveal to anyone that the interception is occurring. If they  
follow overseas laws, they will also be required to hand over  
encryption codes so that the messages can be read. There  
may not be an equivalent of the new MI5 surveillance centre,  
but the effect will be the same. 
 
The decision-making process for these changes is a model of  
bad government: the amendments are being prepared by  
officials in secret, pushed through Cabinet quickly without  
Ministers getting full information and only presented to the  
public after the government has made its decisions. Similar  
law changes in other countries have been introduced as  
specific surveillance legislation. Despite being about four  
years in the planning, this up-front approach was not adopted  
in New Zealand. 
 
The Crimes Act changes are being included in a  
Supplementary Order Paper (SOP) on "electronic crime" that  
will tack the new surveillance provisions onto anti-hacking  
legislation already before the Law and Order select  
committee. Although the select committee will invite public  
submissions on the SOP, the public will only have a few  
weeks to digest and debate the changes at the end of several  
years of secret preparation by officials. Ministers hope to  
pass the law before the end of this year. The  
Telecommunications Act amendments were drafted under the  
last government but did not get priority on the 1999 election  
year legislative programme. The manager of the  
Telecommunications and Postal Policy Group of the Ministry  
of Economic Development, David King, says that they now  
plan to attach the surveillance provisions to an unrelated bill  
arising from Hugh Fletcher's inquiry into the  
telecommunications industry. It is due to go to Cabinet, all  
going well, in December.  
 
This is not open and transparent law making.  Although the  
changes all come from the intelligence agencies and police,  
they are being pursued as two separate initiatives (the first  
sponsored by the Justice Department and the second by the  
Ministry of Economic Development). Although Paul Swain,  
wearing different Ministerial hats, is responsible for both  
processes, he has never mentioned publicly that they are two  
halves of the same plan. The first stage legalises wider  
surveillance powers while the second provides the technical  
means to use those powers. Together, they add up to a New  
Zealand RIP Bill. 
 
Paul Swain disputes this. He says the "driving force for  
making changes" is the wish to protect privacy. "At the  
moment a person's privacy is at risk because there is no  
legislation that says that wandering into someone's internal  
communications system is illegal." He said that exemptions  
for the police and syp agencies came later. However, privacy  
was "the very foundation, and fundamental reason why I am  
promoting that people should have the right to able to  
communicate, to e-mail one to another, without the fear that  
someone else is having a go at it." 
 
The Crimes Act changes were first seen by Ministers in the  
same week as the RIP Bill got royal assent around the end of  
July. Two weeks later, on August 14, Cabinet approved the  
officials' proposals without any changes. The schedule  
involved Cabinet approving the first legislation before seeing  
the subsequent telecommunications legislation and with no  
public debate on the civil liberties issues. It is yet to be seen  
how long will be allowed for the select committee  
investigation into the bill. 
 
Victoria University Professor of Public Policy, Jonathon  
Boston, says that the proposed legislation raises issues of  
fundamental importance. He hopes sufficient time will be  
allowed for careful and considered public debate of the  
proposed laws. 
 
Two main arguments have been proposed by officials and  
Paul Swain to justify the changes - exactly the same  
arguments that were used in Britain and elsewhere. The first  
is that the two laws would not "change or extend in any way  
the existing powers and accountabilities"; that they merely  
update current powers relating to telephone monitoring to  
cover new technologies. Ministers were told that the changes  
were merely maintaining the status quo. This is not true. 
 
The availability of new technologies means that more and  
more of people's personal lives, work, political activities,  
entertainment and even shopping occur via electronic  
communications. Interception of these communications  
provides unprecedented power for intrusive monitoring, and  
faster computers and digital communications continuously  
increase monitoring capabilities. Much more spying is  
possible with less manpower. There is no comparison  
between this and telephone bugging of past decades.  
 
In addition, totally new powers are proposed, including  
covertly snooping inside people's computers. The Privacy  
Commissioner strongly opposed these powers in a private  
submission to the government this year. He argued that  
police search warrant legislation requires the person being  
searched to be aware of the search and see the warrant. He  
argued that this new, surreptitious surveillance power raised  
worrying privacy and accountability issues. Paul Swain  
recommended to Cabinet to put aside these concerns,  
leaving them for a future review of police search powers, and  
Cabinet accepted this.  
 
Likewise there may be new provisions to force people to hand  
over passwords and encryption keys. In Europe when this  
occurred, civil liberties lawyers pointed out that it reverses  
the fundamental right to be presumed innocent until proven  
guilty. It would be similar to removing someone's right to  
remain silent. 
 
Finally, Internet experts argue that e-mail interception will be  
quite different from old-fashioned telephone interception,  
where a single line is monitored. Modern networks mix data  
packets of various origins in a broad stream and so,  
according to Erich Moechel, an Austrian researcher into the  
FBI- European Union surveillance plans, "you simply have to  
analyse at least all their headers [including sender and  
address] to know which ones to intercept." 
 
While there is equipment available that could target a single  
e-mail user, other countries introducing similar new laws have  
required an "interception interface" to be built into every  
Internet and phone company's system. For e-mail, this  
involves specialised software being installed by Internet  
service providers that can be remotely controlled by  
intelligence and police agencies. This provides capabilities  
that Moechel describes as "spooks' heaven". This is what the  
New Zealand legislation will permit. 
 
This would not yet mean electronic "trawling" of all e-mail  
traffic, as the GCSB does. But, as the British Statewatch  
organisation wrote (about the RIP Bill), "Over the past ten  
years secret and clandestine methods of gathering  
'intelligence' previously employed in the days of the Cold War  
by internal security agencies have been permeating policing  
practice." 
 
The other argument used by Paul Swain and officials to  
justify the new laws is that organised criminals are using the  
Internet to avoid Police surveillance and that the changes are  
necessary "to prevent law enforcement capability being  
seriously eroded". Officials provided no evidence to  
substantiate this claim. 
 
Detective Sergeant Cam Stokes, who works with gangs in  
Auckland, told NZPA earlier this year that he knew of no  
instances where a crime had been plotted using email and  
said criminals would be cautious about what they said on- 
line. While e-mail tapping might not prove a significant  
advantage to Police, he said, "it would certainly be no  
disadvantage to us to know who criminals were  
corresponding with."  
 
This is heart of the issue: whether there is a clear and  
present danger to justify increased police and spy powers.  
After all, police solved crime statistics are improving, not  
getting worse; and the Cold War is long gone. But it is easy  
to speak of crime and national secrutiy. How do we judge?  
Paul Swain says the intelligence agencies need updated  
powers to fight "international criminal activities and  
international terrorist activities". And he especially backs the  
police having these powers so that they can "monitor  
criminals, particularly gangs".  
 
He says he agrees there must be a balance between  
surveillance powers and civil liberties but he "very strongly"  
supports the police having new powers in "the war against  
criminal behaviour, particularly in relation to drugs". 
 
The New Zealand Council for Civil Liberties does not agree.  
Chair Tony Ellis says the proposed surveillance laws are a  
major civil liberties concern. The council wrote to Mr Swain  
three months ago asking about possible e-mail surveillance  
laws. On 21 September he replied that he was "confident that  
the rights of New Zealanders are not being diminished but  
rather enhanced" by the proposed laws. Ellis says the  
council is waiting to see details of the legislation and will be  
taking it up. "It is a major and disturbing intrusion into civil  
liberties", he said. 
 
 
 
Breakout: 
 
The new surveillance laws being proposed are not a New  
Zealand initiative. They can be traced back directly to FBI  
plans. 
 
The FBI began campaigning for new surveillance laws in the  
US in 1991. Its 1992 report, "Law enforcement  
REQUIREMENTS for surveillance of electronic  
communications", expressed concern that new  
communications systems and a proliferation of networks  
made interception much harder than previously. An updated  
version of these "Requirements", which were to be imposed  
on telecommunications companies to make their networks  
easier to intercept, was issued in 1994 and became the  
basis of new surveillance legislation signed into law by Bill  
Clinton in October that year. US civil liberties groups have  
fought this legislation ever since. The FBI "Requirements" are  
virtually word for word the same as the 24-point so-called  
"International User Requirements" that New Zealand officals  
later secretly agreed to implement in New Zealand. They are  
the basis of the current moves. 
 
At the same time as seeking US legislation, the FBI began  
pushing other countries to adopt the requirements. This is  
because the US intelligence agencies wanted allied countries  
to have standardised spy systems that they could use to  
ensure interception of increasingly mobile telephone and e- 
mail. For instance, US intelligence agencies might want to  
monitor someone from one country using a mobile phone in  
another country, that is routed through the phone system of a  
third country. Thus, as a 1995 European Union police report  
noted, the need "to create new regulations for international co- 
operation so that the necessary surveillance will be able to  
operate." 
 
In 1993, the FBI arranged a meeting to promote the  
Requirements at its headquarters in Quantico, south of  
Washington DC. Confidential European Union (EU) papers  
record that the meeting included EU representatives plus  
Canada, Norway, Hong Kong, Australia and New Zealand. In  
January 1995, the 15 EU governments secretly agreed to the  
requirements without any reference to their national  
parliaments. Since then, there has been controversy as the  
legislation was pushed through in each country. 
 
The next move was a "Memorandum of Understanding" drawn  
up to extend the US-EU system to the non-EU countries.  
The key group for promoting this co-operation in internal  
surveillance has the innocuous title, the International Law  
Enforcement Telecommunications Seminar (ILETS). Founded  
by the FBI in 1993, its membership is the same 20 countries  
that met in Quantico that year. 
 
The core of ILETS is the five "UKUSA" intelligence allies: the  
US, Britain, Canada, Australia and New Zealand. There are  
thus two global surveillance systems involving those five  
countries: the US-led Echelon system for international spying  
(including New Zealand's GCSB), and the ILETS co-operation  
for co-ordinated internal spying on the people within each  
member country. New Zealand has been represented at  
ILETS meetings by GCSB and police staff, including  
meetings in Canberra in November 1995 and Ottawa in May  
1998.  
 
Other European Union documents reveal that by October  
1996 Australia and Canada had formally supported the  
International User Requirements and New Zealand and Hong  
Kong were "considering the means by which they could  
support the 'Requirements'". New Zealand officials began  
work on legislation to enforce the International User  
Requirements in this country the following year.  
 
Both the police and Paul Swain have, in letters to me, denied  
that the new legislation has links to the FBI plans. However  
Assistant Commissioner Paul Fitzharris did admit in writing  
last week that "discussions have occurred" and the  
"proposed legislative changes would bring New Zealand into  
conformity with most, if not all, of the International User  
Requirements". 
 
 
 
 
 
 
-.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
    
                 
- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- 
                
edited by  
published on: 2000-10-31 
comments to office@quintessenz.at
                   
                  
                    subscribe Newsletter
                  
                   
                
- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- 
                
                  <<  
                   ^ 
                    >> 
                
                
               | 
             
           
         | 
         | 
        
          
         |