Archive for the ‘networks’ Category
Update: I originally didn’t want to publish this because I didn’t think it was good enough, but I hit the wrong button. Anyway, Alistair Morgan read it and thinks one of the premises of the whole thing is wrong. Namely, the weapons were going in the same direction as the drugs, not the other way around. Well, at least the story moved on a bit, but this renders mostly useless a whole additional post I put together from reading a lot of crazy-but-interesting stuff out of the bottom of the Internet. Also, despite the Jessie J reference there’s better music at the bottom if you get that far.
So, Alistair Morgan’s twitter feed frequently hints at “cocaine, weapons, and Ireland” as well as police corruption as being factors involved in the case of his brother, Daniel Morgan, the private detective murdered in 1987, probably by people who were since employed by News International. It’s often been said that Morgan was on the point of publishing some sort of huge revelation when he was killed, but nobody knows what it was beyond his brother’s hints based on what the police told him at the time.
Since the eruption of the phone-hacking scandal, a number of sidelights have come up which linked the News of the World, its cadre of ex-police gumshoes, and its contacts inside the police force. Notably, it seems to have spied on the former Army intelligence agent-handler, Ian Hurst, on an NGO, British-Irish Rights Watch (because documents of theirs were on Hurst’s computer when they hacked it), and perhaps on the chief of police, Sir Philip Orde. It would have been hard for people working for the press not to have covered at least one Northern Irish story in the last 20-odd years simply because it was such a news staple, but it’s worth noting their interest.
The War Economy of Northern Ireland
So, what might link Morgan, cocaine, weapons, Ireland, and policemen? There are some fairly well-known stylised facts or stereotypes about the economy of the Troubles. The IRA mostly funded itself from money collected in the United States, from bank robberies, and from unofficial taxes it collected in the North. It also got contributions from friendly countries, specifically Libya. The Loyalists didn’t have a reliable source of their own money abroad like NorAid, and so specialised in protection and drugs. Both sides also got involved in smuggling across the border as a commercial exercise.
That’s a glib summary ‘graf; obviously, I collect a revolutionary tax for the struggle, you impose fines on drug dealers and dishonestly stick to some of the money, and they are merely thugs operating a protection racket. Traditionally, both Sinn Fein and the British tended to stereotype the Loyalists as basically criminal and the IRA as proper insurgents – there may be some truth in there, but the distinction is one of emphasis and degree and also of propaganda rather than of kind.
Having obtained money, they both needed to convert some of it into arms. The IRA got a famous delivery in the 80s from Libya in its role as Secret Santa, and also often bought guns in the US over the counter and smuggled them back. I don’t know how well characterised the sources of Loyalist arms are, which of course gives me license to speculate.
Permanently Operating Factors
Now for the cocaine, which has often been known to land in bulk quantities on the wilder, less populated bits of the Atlantic coast that also offer good harbours. This is a rare combination, as people live near ports. Two of the best bits on that score are northwest Spain and southwest Ireland. Having landed, you can move it on anywhere in the UK-Ireland common travel area without much more trouble. Since the creation of the Schengen area, Galicia is even better for this because there is such a choice of markets you can reach without a customs inspection. But in 1987 this was an un-fact, so you might as well go to Ireland.
This transit trade had important consequences – notably the rise of Martin “The General” Cahill, the assassination of Veronica Guerin, and probably a substantial chunk of the Irish property bubble via the laundering of profits and also by the boost to those ol’ animal spirits the drug provides.
Imagine, then, that an important criminal actor supplying the London market with cocaine also had access to a reliable surplus of weapons. There is the potential for trade here.
However, it’s not that simple – the famous Libyan shipment would have fit in a couple of shipping containers, and it kept the IRA going up until peace was signed, with a fair bit left over to be buried in concrete by the international commissioners on decommissioning. It is very unlikely that any plausible flow of arms to Northern Ireland would have paid for the flow of cocaine into the South-East.
We Don’t Need Your Money, Money, Money, We Just Wanna Make The World Dance…
There’s something else going on – Diego Gambetta would have already pointed out that you need to understand the trade in protection. To sell protection, you need weapons, which are the capital equipment of the business of private protection. In so far as the buyers in the UK were paying in guns as well as cash, they were arguably expressing a protector-protectee relationship. While on our territory, we protect you, and license you to provide protection. This was also reciprocated. In accepting them, were the sellers of the cocaine undertaking to protect it in transit on their own territory?
Another way of looking at this, which Gambetta would also approve of, would be in terms of costly signalling. Being both a supplier and a protector is a powerful position, but it might be worth letting the other side have it as a guarantee or hostage, to signal that you didn’t intend to break the agreement and deal with some other supplier. This makes even more sense given that you still have a regular supply of guns you could cut off or use against them, and therefore both parties have something to lose.
Now, Gambetta’s work mostly deals with Sicily, where a very important protection supplier has often been irrelevant. London is a very different society from this point of view. Whatever you think of the police, you can’t just ignore them as a factor. In some other societies, the police might be protection consumers, but here, police corruption usually takes the form of policemen selling protection. (In a sense, the more effective the police, the more tempting this will be. Nothing sells like the good stuff.)
So, gazing down on this complex, neo-medieval exchange of cash, credit, and protection, there is a sort of Sun King whose permission is required for any protection contract to be signed. It’s like a feudal society. My liege lord is only so, because he is the King’s subject, and the King at least theoretically owes duties to the Emperor, or later, directly to God. Our buyer is in a position to offer protection for his end of the business because he enjoys protection supplied by the police.
Who were the recipients, the sellers? They might have been drug dealers who needed to buy protection from one or other paramilitary group. They might have been drug dealers who wanted to build up enough arms that they could stop buying protection, or rather, change protector. Or they might have been paramilitaries who sold protection to the drugs trade. The distinction is surprisingly unimportant.
So, to put the pieces together, there was some group of South-East London villains importing cocaine from transit providers in Ireland, who were also exporting weapons in the opposite direction as part of an exchange of protection for their common business. This required buying protection from the police. Where did the weapons come from? And why is News International involved?
The Independent on Sunday has another really excellent piece on Liam Fox including a very good network visualisation. See the power of the radial graph paradigm, and understand why I want Lobster to look like that! kc claffy wasn’t wrong.
OK, so “Not All That” Foxy Liam Fox is in trouble.
“He is an odd bloke,” said one fellow minister. “He has fingers in so many pies that you kind of think one of them will land him in trouble somewhere along the line.”
Another Tory MP said Fox’s tendency to name-drop and brag about his close friendships with Republicans in the US, media magnates such as David and Frederick Barclay (owners of the Daily Telegraph), and his endless globe-trotting, even before he entered the cabinet, has made many bristle and help explain why he has plenty of enemies in the Tory party and in Whitehall. “I think you either roll with the bluster or find it repellent,” said a Tory MP.
Ah, one of them. Anyway. Part of the problem is this famous meeting where his bestie Adam Werritty just happened to turn up. What was on offer? Well, a product called Cellcrypt, whose makers were trying to sell it to the MoD to stop evilly-disposed persons from eavesdropping on British soldiers’ phone calls back to the UK. (Note: this is going to be long. Technical summary: voice encryption apps for GSM-style mobile networks can guarantee that your call will not be overheard, but not that your presence cannot be monitored, and not necessarily that the parties to your calls cannot be identified.)
Back in the early days of Iraq, the CPA permitted one mobile phone operator in each of its three zones to set up. The British zone, CPA-South/Multinational Division South-East, let the Kuwaiti national telco, MTC (now Zain and busy running Mo Ibrahim’s old Celtel business into the ground) set up there with a partner some of us may have heard of. It’s from Newbury and it’s not a pub or an estate agency and its logo is a big red comma…funny how Vodafone never talked that particular investment up, innit? Anyway. Later the Iraqi government did a major tender for permanent licences and Orascom got most of it, but that’s another story.
One thing that did happen was that soldiers took their mobiles with them to Iraq, and some of them pretty soon realised that buying a local SIM card in the bazaar was much cheaper than making roaming calls back to the UK. Either way, lots of +44 numbers started showing up in their VLR, the big database that keeps track of where phones are in a GSM network so it can route incoming calls.
Pretty soon someone who – presumably – worked for the MTC-Voda affiliate and whose purposes were not entirely aligned with Iraq The Model realised that you could use the VLR to follow the Brits (and the Yanks and the Danes and the Dutchmen and Kiwis and all sorts of contractors) around. Not only that, you could ring up their families in the UK and make threats with the benefit of apparently supernatural knowledge.
This obviously wasn’t ideal. Efforts were made to mitigate the problem; soldiers were discouraged from using local GSM networks, more computers and public phones were made available. The eventual solution, though, was to get some nice new ruggedised small-cell systems from companies like Private Mobile Networks Ltd., which basically pack a small base station and a base station controller and a satellite backhaul terminal into a tough plastic box of a suitably military colour. You open it up, unfold the antenna, turn on the power, and complete some configuration options. It logs into the mobile operator who’s providing service to you via the satellite link.
Now, because radio signals like all radiation lose intensity with the inverse square of the distance, you’ll be vastly louder than everyone else. So any mobile phone nearby will roam onto your private mobile network and will be in the UK for mobile phone purposes, a bit like the shipping container that’s technically in Egypt at the end of Four Lions. And none of this will touch any other mobile network that might be operating in your area. Obviously you can also use these powers for evil, by snarfing up everyone else’s traffic, and don’t for a moment think this isn’t also done by so-called IMSI catchers.
You’re not meant to do this, normally, because you probably don’t have a licence to use the GSM, GSM/PCS, or UMTS frequencies. But, as the founder of PMN Ltd. told a colleague of mine, the answer to that is “we’ve got bigger tanks”.
So, where were we? Well, the problem with trying to do…something…with Cellcrypt is that it doesn’t actually solve this problem, because the problem wasn’t originally that the other side could listen to the content of voice calls. Like all telecoms interception stories, it was about the traffic analysis, not the content. Actually, they probably could listen in as well because some of the Iraqi and Afghan operators may not have been using up-to-date or even *any* air interface encryption.
But if you’re going to fix this with an encryption app like Cellcrypt, you’ve got to make sure that every soldier (and sailor and diplomat and journo and MoD civilian) installs it, it works on all the phones, and you absolutely can’t make calls without it. Also, you’ve got to make sure all the people they talk to install it.
And the enemy can still follow you because the phones are still registering in the VLRs!
So, there’s not much point relying on OTA voice encryption to solve a problem that’s got nothing to do with the voice bearer channel. However, bringing your own small cell network certainly does solve the problem, elegantly, and without needing to worry about what kind of phones people bring along or buy locally.
And the military surely understand this, as by the time of the famous meeting, they’d already started deploying them. Also, back when this was a big problem, 19 year-old riflemen usually didn’t have the sort of phones that would run a big hefty application like Cellcrypt, which also uses the mobile data link and therefore would give them four figure phone bills.
To sum up, Werritty was helping someone market gear that the MoD didn’t need, that was hopelessly unfit for purpose, wouldn’t actually do what the MoD wanted, and would cost individual soldiers a fortune, by providing privileged access to the Secretary of State for Defence.
The Obscurer has possibly the first intelligent article on the whole “turn off their Facebook! that’ll learn em!” furore. Notably, they interviewed one-man UK mobile industry institution Mike Short. Go, read, and up your clue. I especially liked that the piece provided some facts about the 7th July 2005 terrorist incident and the mobile networks.
There is only one reported case of a UK network being closed by police. During the 7/7 London suicide bombings, O2 phone masts in a 1km square area around Aldgate tube station were disconnected for a number of hours.
Police have an emergency power to order masts to be put out of action known as MTPAS – Mobile Telecommunication Privileged Access Scheme. The move has to be approved by Gold Command, by the officers in highest authority during a major incident, and is designed to restrict all but emergency service phones with registered sim cards from making calls. But a shutdown can have dangerous knock-on effects. Short says that phones within the Aldgate zone automatically sought a signal from live masts outside it, overloading them and causing a network failure that rippled out “like a whirlpool”.
On the day, other networks were simply overloaded as Londoners sought reassurance and information. Vodafone alone experienced a 250% increase in call volumes
MTPAS is the GSM-land equivalent of the old fixed phone Telephone Preference Scheme (not to be confused with the new one that blocks cold-callers), which permitted The Authorities to turn off between 1% and 90% of phone lines in order to let official traffic through. As far as I know, the Met never asked for it and it was City of London Police who initiated it without asking the Met or anyone else, and in fact O2 UK’s network had been keeping up with demand up to that point, before the closure caused the cascade failure Short describes.
The significance of O2 is that it used to be “Surf the Net, Surf the BT Cellnet” and some residual gaullist/spook reflex in the government tried to keep official phones on what was then one of two British-owned networks.
Anyway, this weekend seems to have the theme “The Intersection of Charlie Stross and the August 2011 Riots”. Charlie’s talk at USENIX is sensibly sceptical about some tech dreams as they apply to networking.
This leaves aside a third model, that of peer to peer mesh networks with no actual cellcos as such – just lots of folks with cheap routers. I’m going to provisionally assume that this one is hopelessly utopian, a GNU vision of telecommunications that can’t actually work on a large scale because the routing topology of such a network is going to be nightmarish unless there are some fat fibre optic cables somewhere in the picture. It’s kind of a shame – I’d love to see a future where no corporate behemoths have a choke hold on the internet – but humans aren’t evenly distributed geographically.
Especially as the theoretical maximum bandwidth of one fibre is about the same as the entire radio spectrum. And the point about routing table size and complexity is a very good one, especially as it’s assumed that the routers aren’t CRS-1s but rather Linksys fifty quidders or mobile phones.
However, one thing the liberation technologists should take away from the riots is that you shouldn’t get hung up on bandwidth. It’s great to be able to post the photos on Flickr, but it’s more useful to have your own secure voice and messaging. When the Egyptian government relented on its GSM cut-off, the Egyptian Twitter feeds lit up with calls for more people to this or that exit of Tahrir Square or medical supplies to the clinic or (and I remember this) that a lost child was waiting at the press tent.
It was what NANOG users would call operational content. There was of course no need whatsoever for it to go via a Bay Area website – all Twitter provided was the one-to-many element, very important, and the publicity on the Web. The latter is a nice-to-have feature, the former, critical. Text, or even voice, is not a high bandwidth application and doesn’t necessarily need access to the global Internet.
So yes – perhaps there is in fact quite a bit of angular momentum to be had in a mobile mesh-WLAN client as an instrument of democracy, as long as you’re willing to accept that it’s not the sort of thing that can be exclusive to people who agree with you. But then, that’s the test of whether or not you actually believe in democracy.
Something else, between Charlie’s USENIX talk and the riots. Isn’t one of the biggest disappointments, from a police point of view, the performance of CCTV? No doubt it will help put some of the rioters in jail. But it didn’t prevent the riots and neither did it seem to help quell them much. It’s possible that the whole idea that potential surveillance (like the original panopticon) is a policing influence isn’t as strong as it’s made out to be.
Another point; not all crimes are punished or even taken notice of. This is obvious. Less obvious is that the degree to which the police ignore crime is an important political fact. Is it possible that CCTV, by forcing them to make at least a token response to everything that passes in camera range, actually contributed to using up the police strength? In a riot, the police aim is to demonstrate public, mass control. They are usually willing to ignore quite a lot of individual criminality in the process. It’s possible that surveillance culture and technology are opposed to strategy.
Did you know ISAF has been carrying out air missions to destroy Taliban radio towers? You do now, thanks to Thomas Wiegold’s blog. Specifically, Task Force Palehorse includes UAE Apache Longbow attack helicopters and American Kiowa Warrior reconnaissance helicopters, plus (according to comments) German ELINT specialists. And they go out and identify Taliban radio networks, and kill them.
There’s much interesting stuff for German-speakers in comments, notably that the technologies include old fashioned VHF, pirate GSM, and possibly other systems as well, that the relays are often solar-powered, and that the Taliban are significant users of IMSI-catchers – fake GSM/UMTS base stations used to monitor mobile phone activity.
So are the Germans, in order to prevent leakage from their own camps. The British have been using ruggedised, highly portable small cells for some time to stop soldiers using the Afghan GSM networks, for fear both of security leaks and also that (as in Iraq) their relatives in the UK might get nasty phone calls.
Am I right in thinking that Andy Hayman’s testimony yesterday fingered Met press chief Dick Fedorcio? Hayman admitted he’d regularly had dinner with News International executives while he was meant to be investigating them. He mentioned that he had done this in the company of the head of communications of the Met, presumably with his approval, although Hayman was also acting in his capacity as ACPO media lead.
Fedorcio has had the same job since 1997. He was named by Nick Davies as having been present in the meeting where the Met demanded to know why Dave Cook was being followed by News International private detectives, and apparently intervened with senior police officers to get them to go easy on NI. Surely the guy in charge of police-press-political relations is a key figure in a scandal that’s all about relations between the press, the police, and politics?
Like the key News International men, Alex Marunchak and Greg Miskiw, there’s no sign of him. The Home Affairs committee, and indeed anyone else who wants the truth about this, must call Fedorcio without delay. Oh, and is Greg Miskiw in the UK?
Second point. Yesterday’s New York Times claims that Miskiw and others on the NOTW were able to locate mobile phones by paying £500 a shot to a corrupt police officer. That is to say, this policeman had access to the lawful intercept systems that are part of all GSM and UMTS cellular networks, or at least he could task people who did. ETSI Specification 01.33 defines this as a standard element of all GSM networks and the corresponding 3GPP TS 33.106 does so for UMTS ones.
If this is so, they could certainly also get pen-register information – lists of calls to and from given phone numbers – and even tap the calls themselves.
This is a massive violation of the UK’s critical national infrastructure security, of the Regulation of Investigatory Powers Act, and of the Data Protection Act. News International, their police contact, and the police force responsible (not necessarily the Met) should all be prosecuted.
There is an urgent need to audit the lawful interception systems’ logs, among other things to find out if there are other unauthorised users out there. International standards foresee a detailed audit trail as part of these systems in order to preserve the legal chain-of-evidence. If the Interception Request message was submitted in proper form from the police to the telcos, the operators are legally in the clear, but if I was in charge of their network security I’d suspend processing the requests until such an audit was carried out as we now know that an unknown but significant percentage of them are illegal.
Thank fuck we didn’t build that giant national ID card database.
Third point. Not that anyone will answer this, but were any of the Prime Minister’s designated deputies for nuclear retaliation subject to illegal telecoms surveillance?
Fourth point. Circling back to the Defence Vetting Agency and Andy Coulson, the vetting procedure as described on the DVA Web site states that in some cases, the decision may be taken to issue a security clearance subject to risk management measures taken by the department involved. In these cases, the DVA will disclose information to the sponsoring department that it would usually keep confidential. Did they make such a recommendation to the Prime Minister’s office, and if so, what was the information?