Feeds

Angela Merkel's phone was being listened in on by FIVE foreign powers

If your spooks aren't tapping Merkel, you should fire them really

High performance access to file storage

German chancellor Angela Merkel's mobile was wire-tapped by at least five foreign intelligence agencies, unnamed German security officials have told Focus magazine.

The bugging of the premier's BlackBerry by the US provoked an international diplomatic incident and a promise by the Obama administration to lay off in future. But the phone was also under surveillance by the Russian, Chinese, North Koreans and Britain's GCHQ, according to Focus. The German government has declined requests to comment on the report.

It's unclear whether some strain of mobile malware or over the air interception was at play in the apparent hackfest against the German's leader's mobile (which now even has its own parody Twitter account). Cloned phones and manipulation in telephone exchanges were used to tap the mobiles of Greek politicians around the time of the Athens Olympics, suggesting one possible communications interception technique.

Berlin, arguably the epicentre of Cold War intrigue, remains a focus point for spies. Quite apart from electronic surveillance, foreign human-intelligence agencies are always busy trying to recruit German politicians, civil servants, military personnel and scientists as agents, with the Russians particularly active in the field. It's known that a "high-ranking official in the ministry of finance" was secretly working for the British Secret Intelligence Service (aka "MI6") during the 1990s*, and this individual is unlikely to have been the only such mole.

German intelligence officials reportedly plan to strengthen their counter-surveillance capabilities in response to revelations about NSA spying on Germany's long time political leader. Both the Russian and UK embassies in Berlin are suspecting of running electronic eavesdropping. The existence of a GCHQ listening nest located outside Blighty's Berlin embassy was leaked by Snowden, since when it has become the subject of several picture special stories.

Christopher Soghoian, principal technologist and senior policy analyst at the ACLU, said in a series of updates to his personal Twitter account that the security shortcomings in Merkel's mobile set-up should have been apparent. The vulnerabilities offer lessons for other political leaders, he added.

"Even if the US stops tapping Merkel's phone, other countries will continue," he said. "The solution is encrypted phones for all."

"If Russia & China are tapping Merkel's calls in Germany, they've gotta be doing the same to politicians in the US. The smartphones that members of Congress use to to call, tweet (and in some cases, sext)? They are no more secure than Merkel's," he added (here and here).

Soghoian added that for years German security researchers have "warned about the ease of cell phone interception [but] the German government ignored them", pointing to research presented at the Chaos Computer Club conference three years ago by Karsten Nohl to support his point.

In related news, a WSJ article on how the Snowden revelations have shaken the NSA notes in passing that the bugging operation against Merkel was done to "fulfil intelligence requests from the State Department", according to two unnamed officials.

The story also notes that NSA director General Keith Alexander offered to resign shortly after Snowden outed himself as the source of leaks about the agency's work. However Obama administration officials turned down the offer out of concerns "that letting him leave would wrongly hand Snowden a win", according to an unnamed former defense official. ®

Bootnote

*The former British spy Richard Tomlinson let this slip in his memoir of life in the SIS, The Big Breach (readily available online). The German mole was apparently codenamed ORCADA and had his own dedicated case officer in the British embassy, who - unusually - was not known to be a spook by the normal diplomats.

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
Bad PUPPY: Undead Windows XP deposits fresh scamware on lawn
Installing random interwebs shiz will bork your zombie box
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.