Feeds

'New' document shows how US forces carriers to allow snooping

Contract with submarine cable company an illustration, not a revelation

Securing Web Applications Made Simple and Scalable

Post-Snowden sensitivities to American spookery have been further inflamed after Australian website Crikey revealed a document that it says is a contract between the Federal Bureau of Investigation, the US Department of Justice and submarine cable operator Reach that allows the US entities to tap Reach's cables for national security purposes.

The document's making waves because it is easy to verify - (PDF) it is dated November 29th, 2001, and bears the signatures Deputy Assistant Attorney General John G Malcolm and FBI general Counsel Larry R. Parkinson. A web search quickly produces little reason to doubt their signatures are genuine, while this document (PDF) appears to be a superset of the one Crikey found and looks decently official. Another signatory, Alex Arena of Reach's half-owner Pacific Century CyberWorks (PCCW), also likely worked for that company at the time.

But it's also easy to find documents that carry identical terms and conditions, such as this one (PDF) signed by carrier TerreStar.

We can therefore set aside any conclusion that the documents represent new revelations into the US spookery apparatus. But they remain of interest, for two reasons.

The first is that at the time the deal was signed, Reach was half-owned by Australia's dominant Telstra, which at the time had the government of Australia as its majority shareholder. The document therefore represents, if one looks at it in just the right way, one government giving another the right to inspect traffic and store data carried by an entity it owns. Throw in the fact that Australia's government of the day was a very, very, firm US ally and things get even more interesting.

The second notable element is that the document offers more detail about how the USA's intelligence agencies go about their business.

The TerreStar document is text and the Reach document is a scan, so in the name of authenticity it's best if we bring you screen grabs of its contents rather than transcribing it. If you want to verify the text, the TerreStar document gives you the chance to do so.

Here's a telling clause on data retention:

Article 2.1

Article 2.1 (b) of the document

Here's an example of what the FBI and DoJ expected Reach would “have the ability to provide in the United states,” if and when asked nicely.

Article 2.3

Article 2.3, clauses (d) and (e)

There's even a reporting requirement in case some other pesky government makes a monitoring request.

Reach Article 3.4

Little seems to have changed from the time of the Reach document's signing, 2001, and the 2009 date on the TerreStar document.

In these post-Snowden times, it's not hard to suggest the document looks like another smoking gun for those building a case that US snooping knows no bounds and no shame. Throw in the fact that the Reach document was signed just weeks after 9/11 may see conspiracy-lovers get even foamier, although the missing signature from Telstra may cool that ardour. A sounder conclusion could be that this is more or less a pro forma document, albeit a pro forma that confirms the US is peering into all sorts of stuff.

One last thing to consider: PCCW now operates UK Broadband, provider of the Now wireless broadband service. We're sure its customers will be interested to know its owner has form signing up for snooping charters. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.