12.07.2015 Views

C. Wiebes - Intelligence en de oorlog in Bosnië 1992-1995. De rol van de inlichtingen- en veiligheidsdiensten - Engels

C. Wiebes - Intelligence en de oorlog in Bosnië 1992-1995. De rol van de inlichtingen- en veiligheidsdiensten - Engels

C. Wiebes - Intelligence en de oorlog in Bosnië 1992-1995. De rol van de inlichtingen- en veiligheidsdiensten - Engels

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

224range of the RC-135 and U-2R reconnaissance aircraft, as these usually flew over the Adriatic. Due toall these reasons, a <strong>de</strong>tailed and substantial Sig<strong>in</strong>t coverage of Serb military activities was fairly difficult.The previously m<strong>en</strong>tioned taps on hardware sometimes pres<strong>en</strong>ted an alternative.The cryptography off<strong>en</strong>sive aga<strong>in</strong>st the SerbsThe use of cryptography equipm<strong>en</strong>t by the Serbs also ma<strong>de</strong> it har<strong>de</strong>r to monitor their communicationstraffic. <strong>De</strong>spite this it was possible to discover weak po<strong>in</strong>ts: <strong>in</strong> the past the VJ and the former Yugoslavgovernm<strong>en</strong>t had bought most of their equipm<strong>en</strong>t from Crypto AG <strong>in</strong> Switzerland. The VRS and thecurr<strong>en</strong>t Serbian governm<strong>en</strong>t <strong>in</strong>herited most of this equipm<strong>en</strong>t. It is now known that this company had asecret agreem<strong>en</strong>t with the NSA to build <strong>in</strong> a ‘back door’ <strong>in</strong> the computer software of the supplied<strong>en</strong>cryption equipm<strong>en</strong>t. This <strong>en</strong>abled the Americans to read the co<strong>de</strong>d messages. 1189 Interviewed persons<strong>in</strong> Wash<strong>in</strong>gton and London claimed that as a result of this secret agreem<strong>en</strong>t the co<strong>de</strong>d traffic betwe<strong>en</strong>Belgra<strong>de</strong> and various Serbian embassies abroad was systematically <strong>in</strong>tercepted and read by the NSA,thanks <strong>in</strong> part to the use of Crypto AG equipm<strong>en</strong>t. Other countries were also ‘victims’. Officials at theVatican ev<strong>en</strong> labelled Crypto AG as ‘bandits’. 1190 Repres<strong>en</strong>tatives of a European <strong>in</strong>tellig<strong>en</strong>ce serviceconfirmed this weak l<strong>in</strong>k <strong>in</strong> the Serb communications, but they also po<strong>in</strong>t out that <strong>in</strong> the past theCroats had supplied much computer equipm<strong>en</strong>t to Belgra<strong>de</strong>. This equipm<strong>en</strong>t too was provi<strong>de</strong>d with a‘back door’. 1191Another rele<strong>van</strong>t fact <strong>in</strong> this context is that the western (and above all the Fr<strong>en</strong>ch) <strong>in</strong>tellig<strong>en</strong>ceservices had long suspected that the NSA had ma<strong>de</strong> an agreem<strong>en</strong>t with the producer of the most wi<strong>de</strong>lyused computer software, Microsoft. Accord<strong>in</strong>g to a report by the Fr<strong>en</strong>ch M<strong>in</strong>istry of <strong>De</strong>f<strong>en</strong>ce, thisagreem<strong>en</strong>t meant that Microsoft reportedly provi<strong>de</strong>d all its W<strong>in</strong>dows software with a ‘back door’.Microsoft immediately d<strong>en</strong>ied all the accusations and stated it was prepared to cooperate with theFr<strong>en</strong>ch Governm<strong>en</strong>t. The author of the Fr<strong>en</strong>ch report, Admiral J. Margu<strong>in</strong>, was frank <strong>in</strong> his comm<strong>en</strong>tsto journalists: ‘After all, what would we do if we possessed such an effective group as Microsoft?’ 1192Furthermore the NSA is said to have ma<strong>de</strong> agreem<strong>en</strong>ts with American, British, Swiss, Dutch, Belgian,Swedish, Italian, F<strong>in</strong>nish and Hungarian software companies <strong>en</strong>gaged <strong>in</strong> market<strong>in</strong>g <strong>en</strong>cryptionprograms. 1193The scandal <strong>in</strong> Wash<strong>in</strong>gton <strong>in</strong>volv<strong>in</strong>g the Cyl<strong>in</strong>k Corporation is another <strong>in</strong>dication that both therequired <strong>en</strong>cryption software and the <strong>en</strong>cryption equipm<strong>en</strong>t can be p<strong>en</strong>etrated from outsi<strong>de</strong>. Cyl<strong>in</strong>k hasbe<strong>en</strong> produc<strong>in</strong>g <strong>en</strong>cryption software for foreign governm<strong>en</strong>ts and companies for more than 16 years.However, the company had always managed to export its products, ev<strong>en</strong> to countries officially subjectto a tra<strong>de</strong> embargo, such as Libya, Cuba, North Korea, Iran, Iraq and probably also Serbia. Follow<strong>in</strong>gall ev<strong>en</strong>ts around Cyl<strong>in</strong>k, the Cryptome website put the question: ‘How is Cyl<strong>in</strong>k able to freely exportsecurity products, while other <strong>en</strong>cryption companies were punished?’ 1194 It is <strong>in</strong> fact also known fromother sources that Wash<strong>in</strong>gton constantly <strong>en</strong>courages companies mak<strong>in</strong>g co<strong>de</strong> equipm<strong>en</strong>t or <strong>en</strong>cryptionsoftware to <strong>in</strong>clu<strong>de</strong> a back door <strong>in</strong> their products; this was confirmed to the US Congress by FBIdirector Freeh. 11951189 Interview with Wayne Mads<strong>en</strong>, 21/06/99.1190 Confid<strong>en</strong>tial <strong>in</strong>terviews (6), (11) and (91) and <strong>in</strong>terview with Wayne Mads<strong>en</strong>, 21/09/96. See also: Wayne Mds<strong>en</strong>, ‘CryptoAG. The NSA’s Trojan Horse?’, Covert Action Quarterly, No. 63 (W<strong>in</strong>ter 1998), passim and ‘Huge NSA Encryption Scam’,GSReport, 10/02/99.1191 Confid<strong>en</strong>tial <strong>in</strong>terview (48).1192 Charles Bremner, ‘Fr<strong>en</strong>ch accuse Gates of bugg<strong>in</strong>g software’, The Sunday Times, 23/02/00.1193 Mads<strong>en</strong>, Data, pp. 6-7.1194 ‘Cyl<strong>in</strong>k <strong>de</strong>crypted?’, op: http://cryptome.org/cyl<strong>in</strong>ked.htm, 10/03/00. Cyl<strong>in</strong>k’s lawyers - Morrison & Foerster –threat<strong>en</strong>ed to take the owner of this website, John Young, to court for libel. However, noth<strong>in</strong>g more has come of this threat– which is unusual for American circumstances. See letter Morrison & Foerster to John Young, 09/03/00.1195 E-mail from Steph<strong>en</strong> Peacock about Encryption on Intelforum, 10/03/00.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!