http://www.washingtonpost.com/wp-dyn/content/article/2010/07/02/AR2010070201324.html?wpisrc=nl_tech


ยป Follow The Post On: 
Spy suspects allegedly used regular consumer tech

PHOTOS
  Previous        Next    
   
  This undated image taken from the Russian social networking website 
"Odnoklassniki", or Classmates, shows a woman journalists have identified as 
Anna Chapman, who appeared at a hearing Monday, June 28, 2010 in New York 
federal court. Chapman, along with 10 others, was arrested on charges of 
conspiracy to act as an agent of a foreign government without notifying the 
U.S. attorney general. The caption on Odnoklassniki reads "Russia, Moscow. Left 
4 dead???" (AP Photo) (AP) 
   
  This undated image taken from the Russian social networking website 
"Odnoklassniki", or Classmates, shows a woman journalists have identified as 
Anna Chapman, who appeared at a hearing Monday, June 28, 2010 in New York 
federal court. Chapman, along with 10 others, was arrested on charges of 
conspiracy to act as an agent of a foreign government without notifying the 
U.S. attorney general. (AP Photo) (AP) 

      
By PETER SVENSSON
The Associated Press 
Friday, July 2, 2010; 11:12 AM 

NEW YORK -- Before James Bond heads out on a mission, he has to stop in Q's 
laboratory for custom-made gadgets such as an exploding watch. Life wasn't so 
dashing for the suspected Russian spies arrested this week: They allegedly 
relied heavily on off-the-shelf consumer electronics. 

"In the old days, they'd have special KGB-type equipment. Now they use normal 
computers, normal laptops," said Sujeet Shenoi, professor of computer science 
at the University of Tulsa and a frequent consultant to the FBI. "Technology is 
so powerful now that you don't have to have special-purpose equipment anymore." 

According to the FBI's complaints that sought the arrest of the 11 suspects, 
the array of tools included laptops, flash memory cards and at least one 
prepaid cell phone. The suspects are accused of backing that up with 
old-fashioned spy technology such as short-wave radios, invisible ink, and a 
classic, manual encryption method known as a "one-time pad." 

Short-wave radios were once relatively common in homes. Today, they're a bit of 
a giveaway if the FBI already suspects you're a spy. Not so with laptops, cell 
phones or flash drives. But that doesn't mean spies can feel safe. The way the 
Russian suspects used these gadgets was revealing to FBI agents who followed 
them for years. 

The use of "spy-fi" is a case in point. 

The FBI said that one of the suspects, Anna Chapman, would go to a coffee shop 
in Manhattan on Wednesdays and set up her laptop. A little while later, a 
minivan the FBI knew was used by a Russian official would drive by. To the 
naked eye, there was no contact between them. 

But the FBI said it figured out that Chapman's computer was set to link 
wirelessly to a laptop in the minivan, using a standard, built-in Wi-Fi chip. 
In the short time the computers were close, they could transfer encrypted files 
between each other. 

The agency figured this out with commercial Wi-Fi analysis software, not with 
something from Q's lab. 

Glenn Fleishman, editor of the Wi-Fi Net News blog, said that from a technical 
standpoint, the Wi-Fi link appeared to be fairly amateurish and laughably easy 
to sniff out. He pointed out that there's at least one other commercially 
available technology for short-range transmissions, known as ultra-wideband 
radio, that would likely have been impossible for the FBI to pick up. 

On the contrary, Keith Melton, who co-authored the book "Spycraft" with the 
former director of the CIA's Office of Technical Service, said the use of Wi-Fi 
could have been "very smart" because no data passed through the Internet. The 
connection would have been impossible to trace - if the FBI hadn't been smart 
and dogged enough to have Wi-Fi analysis equipment in place at the right time. 

Melton said the technique is reminiscent of a precursor to today's BlackBerry, 
developed by the CIA in the 1970s to give its spies in Russia some way to pass 
messages unseen to receivers close by. The downfall was that being caught with 
the equipment could lead to a death sentence. 

In another example of an everyday item allegedly being used for secret 
communications, the FBI said Chapman bought a cell phone last Saturday under a 
fake name. This was probably a "prepaid" phone, which doesn't come with a 
contract. Because there's no long-term commitment from the buyer, the sellers 
don't check the IDs of the buyers. That means law enforcement don't know which 
numbers suspects are using, making wiretapping very difficult. 

Not surprisingly, prepaid phones used once or twice and then thrown away are a 
favorite tool of criminals and terrorists. Faisal Shahzad, who admitted to 
trying to bomb New York's Times Square on May 1, used a prepaid phone. A 
proposed Senate bill would require buyers to show ID. 

In the FBI's documents, there is no mention of the agency intercepting a call 
from Chapman's disposable cell phone. She bought it just after meeting an 
undercover FBI agent posing as a Russian official. He told her to meet another 
spy the next day, but she didn't show up. Presumably, she had been suspicious 
of the "Russian," called her handler on the cell phone and was warned to stay 
away. 

But again, her behavior was a giveaway, according to the FBI. She bought the 
phone in a Brooklyn store, then immediately threw away the bag containing the 
charger and the customer agreement. The FBI retrieved the bag, and found she'd 
given her name as "Irine Kutsov," living on "99 Fake Street." 

Another person charged in the case, Richard Murphy, received a bag with cash 
and a memory card from a Russian official at a White Plains, N.Y., train 
station in 2009, according to the FBI. That would be a classic "brush pass," 
where conspirators walk by each other and quickly pass an item from one to the 
other. The FBI said it caught this exchange on surveillance video. It was only 
later that the agency figured out, by eavesdropping, that the bag contained a 
memory card. 

For more than a century, spies have employed methods to miniaturize documents, 
usually by photographic means that require special equipment. Flash memory 
chips, the kind used in cameras, phones and USB drives, make it child's play to 
stuff thousands of documents in a tiny, concealable area. 

It's surprising, then, that the spy ring is also alleged to have used one of 
the oldest ways to conceal writing: invisible ink. Its height of popularity in 
intelligence circles was World War I, Melton said. Now, it's mainly found in 
the toy aisle, but that doesn't mean it's obsolete. 

"The beauty of it is that no one is looking for it. It's so old that it's been 
forgotten," Melton said. 

Indeed, the FBI's complaint doesn't mention that it found any documents written 
in invisible ink. It just says that it overheard suspect Juan Lazaro telling 
his wife, Vicky Pelaez, that he was going to write something in "invisible" 
that she was supposed to pass along to someone on a trip to South America. 

A modern update on invisible ink is digital steganography. Messages can be 
hidden in images, songs or other files, then uploaded to public sites on the 
Internet. No one's the wiser without knowing which images to look for, and how 
they are encoded. In three homes belonging to suspects, the FBI found disks 
that it suspects were used for steganography. Agents also said they found a 
password written on a piece of paper in the Hoboken, N.J., home of Richard and 
Cynthia Murphy during a 2005 search. (The couple later moved to nearby 
Montclair.) This allowed agents to decode more than a hundred messages between 
the Murphys and Moscow, the FBI said. 

Although the FBI used high-tech techniques such as surveillance cameras and 
Wi-Fi sniffing, it got its biggest payoffs from old-fashioned, risky and 
expensive methods like tailing and house searches. You can use all the 
technology you want to hide your tracks, but if you leave the password to your 
secrets on your desk, old-fashioned sleuthing can still beat high-tech. 


[Non-text portions of this message have been removed]

Kirim email ke