German engineers being told they've been targeted by GCHQ

Ever wondering about the facial expression of someone who's being told about government espionage targeted at him?

Look no further. Filmmakers Katy Scoggin and Laura Poitras follow reporter Marcel Rosenbach as he informs the staff of a German communications firm that they have been targeted for surveillance by British spies. -- Vimeo
siftbotsays...

Promoting this video and sending it back into the queue for one more try; last queued Sunday, September 14th, 2014 3:57am PDT - promote requested by dingens.

mxxconsays...

Maybe there's some article that covers this in more details, but the video is very sensationalist and does not really show anything particularly outrageous. It's not that difficult to find company employee info; network routing table is public information; cracked password of some service provider and ability to turn on/off service is annoying but not exactly "spying".

SpaceOdditysays...

I disagree with the meaning of "tasked."
In this context, I believe it means to develop the engineers as an asset, and task them with espionage.
The engineers in this case seem like they wouldn't comply voluntarily, which means they'd have to be threatened or blackmailed.

Scary.

mxxconsays...

Bleh. This is hype and scaremongering by Germany.
It is nowhere even near to the crap that NSA was/is trying to pull with their efforts.
Other than the password for that one router/system, everything else is a publicly available information.
Here's interactive map of every single IP on the internet http://internetcensus2012.bitbucket.org/hilbert/index.html
Here's the same scary looking "Top Secret" Robtex graph for videosift.com https://www.robtex.com/en/advisory/dns/66/228/54/105/#graph

If Germany is trying to stir public outrage, they should do better than this.

radxsays...

Last week, The Intercept published the Quadrennial Intelligence Community Review of 2009 which outlined industrial espionage.

Let's look at the list of German companies in question today: DTAG, NetCologne, Stellar, CETel and IABG. Two internet providers, two operators of satellite communications and a service provider with close ties to Airbus, ESA and EPCIP. All prime targets for industrial espionage, IABG and DTAG in particular.

A penetration of DTAG alone should be quite enough to convince our Attorney General to start an investigation, and the records about the penetration into Stellar's server centre are even more detailed.

So it's not just another violation of Article 10 of our Basic Law, it's industrial espionage. But I know very well that fuck all is going to come out of it, given how subservient our government is.

By the way, Firstlook Media and DER SPIEGEL does not equal Germany.

---------------
Edit:

Sorry for being cranky, anyway. I suppose for people outside Germany the interesting parts are that a) NSA/GCHQ own global communications and b) security for satellite net access is appaling.

The second, in particular, is rather frustrating, given that a great number of users of these are bound to be persons of interest otherwise unreachable through HUMINT. Quite the low hanging fruit, isn't it...

mxxconsaid:

Bleh. This is hype and scaremongering by Germany.
(...)
If Germany is trying to stir public outrage, they should do better than this.

DuoJetsays...

I think the issue is quite well documented in the video.

In the video, the engineer learns that the NSA has stolen his credentials and used them to gain access to his company's private, otherwise secure network.

The map shown in the video is not a routing table, nor is it a colorful map of domain records associated with a given domain such as appears in your Robtex link. It's actually a copy of the NSA's rendering of the network map denoting the number of nodes they have penetrated.

He then realizes that the NSA can use this particular access to intercept communications from any and all of his company's customers, and, in the case of satellite customers, use geolocation to pinpoint the physical origin of a given communication.

If you don't agree that this is outrageous, then there's nothing more to discuss.

mxxconsaid:

Maybe there's some article that covers this in more details, but the video is very sensationalist and does not really show anything particularly outrageous. It's not that difficult to find company employee info; network routing table is public information; cracked password of some service provider and ability to turn on/off service is annoying but not exactly "spying".

mxxconsays...

I don't think your read the same article, read the same document or watched the same video...
The video and the released document does not show that NSA stole his credentials. It shows that NSA cracked password to a 3rd party company that resells their service.

Furthermore, "network map" they showed on pages 3, 4 and 5 are simply AS interconnection maps. You can easily see it here https://www.robtex.com/as/as35207.html#graph or here https://stat.ripe.net/widget/bgplay#w.resource=35207

THEY CAN NOT INTERCEPT COMMUNICATIONS from "any and all of his company's customers". The only thing they can do that password is see physical location of satellite service users and turn on or turn off their service. HE SPECIFICALLY SAID THAT THIS SPECIFIC LOGIN IS LIMITED IN WHAT IT CAN DO!!!!!!!

If it obvious that you have no technical understanding of the issue at hand and this is a perfect example of how this article is scaremongering hype!

DuoJetsaid:

I think the issue is quite well documented in the video.

In the video, the engineer learns that the NSA has stolen his credentials and used them to gain access to his company's private, otherwise secure network.

The map shown in the video is not a routing table, nor is it a colorful map of domain records associated with a given domain such as appears in your Robtex link. It's actually a copy of the NSA's rendering of the network map denoting the number of nodes they have penetrated.

He then realizes that the NSA can use this particular access to intercept communications from any and all of his company's customers, and, in the case of satellite customers, use geolocation to pinpoint the physical origin of a given communication.

If you don't agree that this is outrageous, then there's nothing more to discuss.

Send this Article to a Friend



Separate multiple emails with a comma (,); limit 5 recipients






Your email has been sent successfully!

Manage this Video in Your Playlists




notify when someone comments
X

This website uses cookies.

This website uses cookies to improve user experience. By using this website you consent to all cookies in accordance with our Privacy Policy.

I agree
  
Learn More