William Hague: Brussels attacks mean we must destroy crypto ASAP

Facts, Willy? Don't let those trip you up, now


William Hague, the Conservative former Foreign Secretary in the UK, has claimed that the latest Brussels terrorist attacks “show the need to crack terrorist communications.”

Writing in The Telegraph, Hague claimed that the stand-out detail from the attacks in Brussels was “the communications discipline of those responsible.”

Since the attacks, the Belgian authorities have claimed that the murderers used pre-paid disposable phones, which were untraceable by any surveillance on their financial accounts. Subsequently, it was not possible to monitor the terrorists through regular communications surveillance.

Hague – who, as Foreign Secretary, held ministerial responsibility for MI6 – wrote that “the mobile phones they carried had evidently not been used before and showed no record of texts, chat or emails” – but such “discipline” should not surprise us, he said, as “every mastermind of terrorism or organised crime” had been tipped off about operational security by Edward Snowden.

The use of pre-paid phones, also known as "disposable" or "burner" phones, as part of an criminal organisations' operational security against communications surveillance, was, in fact, publicised a decade before the Snowden revelations in the television show The Wire.

Following the Brussels attacks, US Congresswoman Jackie Speier (D-SF) introduced a bill to prohibit the anonymous sale of pre-paid mobile phones in America.

She blogged that such "burner phones" were "pre-paid phones that terrorists, human traffickers, and narcotics dealers often use to avoid scrutiny by law enforcement because they can be purchased without identification and record-keeping requirements. This bill would close that legal gap."

Whether this was a legal or operational gap is unclear however. Hague, who was responsible for a note threatening to revoke the Ecuadorian embassy's diplomatic status after it provided political asylum to Julian Assange, made the curious claim that: “Whatever means of co-ordination [the Brussels attackers] used, it was sufficiently private or encrypted that the authorities do not seem to have been aware of it.”

He continued:

The UK is fortunate in having some of the world’s best intelligence agencies and capabilities. That they have prevented many attacks is publicly acknowledged. But they have been hampered in recent years by the Snowden leaks, by the rise of widespread encryption by communications firms, and by developments in technology.

Encrypted communications would not prevent the intelligence services from making connections between co-ordinated parties, as cryptography can only protect the content of a communication and not its metadata. As the Home Office has established, it is metadata which constitutes the primary means of establishing connections between individuals who are suspected of posing a threat to the public.

Hague continued:

The interception of the contents of an individual’s communications in this country can only be carried out with a warrant signed by a senior minister. For four years, I was one of those ministers, and if people could see – which they obviously can’t – the time, care and detail spent on each case, including by the minister, I believe they would be greatly reassured.

This oversight mechanism is set to be updated by the Investigatory Powers Bill, which as it stands will see ministers' decisions to sign off on such warrants "reviewed" by judges. Critics have suggested, however, that it should be judges themselves authorising these warrants.

Jim Killock, executive director of the Open Rights Group, said: “This debate is not about whether ministers take time or care when it comes to signing off warrants. It's about whether judges or politicians are better equipped to decide about matters of legal procedure and whether surveillance is necessary and proportionate. There is really no argument in favour of political authorisation, which is why every other liberal democracy has a system of judicial authorisation."

"Ministers have to sign thousands of warrants each year. You would think that they would welcome more time to focus on the strategic interests of the country rather than wading through legal cases," added Killock.

Hague noted that interception was not the only tool used for "cracking ... terrorist and criminal networks", but stressed how the spooks also needed "access to 'bulk data' [which] logs which internet sites were visited on which device, and which device was used to contact another one."

This ability "is vital in order to see patterns in the behaviour of those who might join a cell such as the one in Brussels. And it can help us to spot them if they make a mistake," wrote Hague. ®

Broader topics


Other stories you might like

  • Meg Whitman – former HP and eBay CEO – nominated as US ambassador to Kenya

    Donated $110K to Democrats in recent years

    United States president Joe Biden has announced his intention to nominate former HPE and eBay CEO Meg Whitman as Ambassador Extraordinary and Plenipotentiary to the Republic of Kenya.

    The Biden administration's announcement of the planned nomination reminds us that Whitman has served as CEO of eBay, Hewlett Packard Enterprise, and Quibi. Whitman also serves on the boards of Procter & Gamble, and General Motors.

    The announcement doesn't remind readers that Whitman has form as a Republican politician – she ran for governor of California in 2010, then backed the GOP's Mitt Romney in his 2008 and 2012 bids for the presidency. She later switched political allegiance and backed the presidential campaigns of both Hillary Clinton and Joe Biden.

    Continue reading
  • Ex-Qualcomm Snapdragon chief turns CEO at AI chip startup MemryX

    Meet the new boss

    A former executive leading Qualcomm's Snapdragon computing platforms has departed the company to become CEO at an AI chip startup.

    Keith Kressin will lead product commercialization for MemryX, which was founded in 2019 and makes memory-intensive AI chiplets.

    The company is now out of stealth mode and will soon commercially ship its AI chips to non-tech customers. The company was testing early generations of its chips with industries including auto and robotics.

    Continue reading
  • Aircraft can't land safely due to interference with upcoming 5G C-band broadband service

    Expect flight delays and diversions, US Federal Aviation Administation warns

    The new 5G C-band wireless broadband service expected to rollout on 5 January 2022 in the US will disrupt local radio signals and make it difficult for airplanes to land safely in harsh weather conditions, according to the Federal Aviation Administration.

    Pilots rely on radio altimeter readings to figure out when and where an aircraft should carry out a series of operations to prepare for touchdown. But the upcoming 5G C-band service beaming from cell towers threatens to interfere with these signals, the FAA warned in two reports.

    Flights may have to be delayed or restricted at certain airports as the new broadband service comes into effect next year. The change could affect some 6,834 airplanes and 1,828 helicopters. The cost to operators is expected to be $580,890.

    Continue reading
  • Canadian charged with running ransomware attack on US state of Alaska

    Cross-border op nabbed our man, boast cops and prosecutors

    A Canadian man is accused of masterminding ransomware attacks that caused "damage" to systems belonging to the US state of Alaska.

    A federal indictment against Matthew Philbert, 31, of Ottawa, was unsealed yesterday, and he was also concurrently charged by the Canadian authorities with a number of other criminal offences at the same time. US prosecutors [PDF] claimed he carried out "cyber related offences" – including a specific 2018 attack on a computer in Alaska.

    The Canadian Broadcasting Corporation reported that Philbert was charged after a 23 month investigation "that also involved the [Royal Canadian Mounted Police, federal enforcers], the FBI and Europol."

    Continue reading
  • German court rules cookie preference service that shared IP addresses with US firm should be halted

    Schrems II starts to be felt in Europe

    A German court has ruled that sharing IP addresses with US-based servers for the purpose of cookie consent is unlawful under EU data protection law and the EU Court of Justice Schrems II ruling.

    The university Hochschule RheinMain in Germany was this week prevented by Wiesbaden Administrative Court from using a cookie preference service that shares the complete IP address of the end user to the servers of a company whose headquarters are in the US.

    A complainant had alleged that the CookieBot consent manager from Danish provider Cybot transmitted data such that IP addresses were shared with US-based cloud company Akamai Technologies.

    Continue reading

Biting the hand that feeds IT © 1998–2021