tip off

Telstra’s deal with the devil: FBI access to its undersea cables

The US government compelled Telstra and Hong Kong-based PCCW to give it access to their undersea cables for spying on communications traffic entering and leaving the US.

Telstra

Telstra was compelled to strike a 2001 deal with the FBI and the US Department of Justice to give them surveillance access to the undersea cables owned by its subsidiary Reach, a new document released online and provided to Crikey reveals.

The document shows Telstra, at that stage majority-owned by the Howard government, and its partner Pacific Century Cyber Works (now PCCW), then controlled by Hong Kong businessman Richard Li, agreed to provide the FBI with around-the-clock access to Reach’s cables to spy on communications going into and out of the United States. It is signed by Telstra’s then-company secretary Douglas Gration, then-deputy assistant US attorney-general John G. Malcolm, Alex Arena of PCCW, Alistair Grieve of Reach and Larry R. Parkinson of the FBI.

Reach, headquartered in Hong Kong, is said to control more than 40 major telecommunications cables going into and out of the Asia-Pacific, including cables into and from China and Australia.

Claiming that “US communications systems are essential to the ability of the US government to fulfill its responsibilities to the public to preserve the national security of the United States, to enforce the laws, and to maintain the safety of the public”, the agreement places a number of requirements on Reach, Telstra and PCCW:

  • All customer billing data to be stored for two years;
  • Ability to provide to agencies any stored telecommunications or internet communications and comply with preservation requests;
  • Ability to provide any stored meta-data, billing data or subscriber information about US customers;
  • They are not to comply with any foreign privacy laws that might lead to mandatory destruction of stored data;
  • Plans and infrastructure to demonstrate other states cannot spy on US customers;
  • They are not to comply with information requests from other countries without DoJ permission;
  • A requirement to:

… designate points of contact within the United States with the authority and responsibility for accepting and overseeing the carrying out of Lawful US Process to conduct Electronic Surveillance of or relating to Domestic Communications carried by or through Domestic Communications Infrastructure; or relating to customers or subscribers of Domestic Communications Companies. The points of contact shall be assigned to Domestic Communications Companies security office(s) in the United States, shall be available twenty-four (24) hours per day, seven (7) days per week and shall be responsible for accepting service and maintaining the security of Classified Information and any Lawful US Process for Electronic Surveillance … The Points of contact shall be resident US citizens who are eligible for US security clearances…”;

  • A requirement to keep such surveillance confidential, and to use US citizens “who meet high standards of trustworthiness for maintaining the confidentiality of Sensitive Information” to handle requests;
  • A right for the FBI and the DoJ to conduct inspection visits of the companies’ infrastructure and offices; and
  • An annual compliance report, to be protected from Freedom of Information requests.

The US is able to impose the agreements even on offshore companies because of Federal Communications Commission licensing requirements for the provision of telecommunications services into and out of the US, which can be made subject to conditions relating to national security and law enforcement.

It’s important to note that “Domestic Communications” in the agreement means the “US portion” of communications that originate or terminate in the United States, although “portion” isn’t defined and could extend to all communication on infrastructure physically located in the US, which would in practice mean all communication going into or out of or through the US. Moreover, surveillance can also be conducted “relating” to customers or subscribers, regardless of where the relevant communication is.

A Telstra spokesman told Crikey:

“This agreement, at that time 12 years ago, reflected Reach’s operating obligations in the US that require carriers to comply with US domestic law.”

The existence of such agreements with cable owners was revealed by The Washington Post last weekend in the wake of revelations about the extent of FBI, National Security Agency and other US government internet and phone surveillance. On Tuesday, a long list of such agreements, complete with the documents, was published by the Public Intelligence website, covering the period from 1999 through to 2011 and a variety of cable owners from Europe, the Americas and Asia. The web of agreements ensures agencies such as the FBI can access all internet and telephone communications going into and out of the US for surveillance purposes.

Update: The article has been amended: the agreement between the companies and US agencies was filed with the FCC and thus not “secret” as originally described.

14
  • 1
    Gregor
    Posted Friday, 12 July 2013 at 1:14 pm | Permalink

    Hmm, so when Telstra sent the usage data of all of its internet customers to the US for analysis, the company was aware that that data was being collected by the FBI. Dodgy.

  • 2
    zut alors
    Posted Friday, 12 July 2013 at 2:09 pm | Permalink

    One can be confident this is only the tip of the iceberg revealing the USA’s tentacles in Oz.

    The third-to-last requirement is amusing considering it would’ve once qualified Edward Snowden ie: ‘… US citizens “who meet high standards of trustworthiness for maintaining the confidentiality of Sensitive Information”…’

  • 3
    Curly Higgins
    Posted Friday, 12 July 2013 at 3:08 pm | Permalink

    Thankyou Telstra. Thanks to you we are all toast.

  • 4
    zut alors
    Posted Friday, 12 July 2013 at 3:18 pm | Permalink

    All of this done under the auspices of Richard Alston, Minister of Communications at the time.

  • 5
    @chrispydog
    Posted Friday, 12 July 2013 at 3:30 pm | Permalink

    Chinese hackers must be green with envy.

  • 6
    wally crusoe
    Posted Friday, 12 July 2013 at 3:51 pm | Permalink

    democracy” eh…..

  • 7
    ianjohnno
    Posted Friday, 12 July 2013 at 4:17 pm | Permalink

    Don’t forget the Telstra Board, Zut.

  • 8
    shepherdmarilyn
    Posted Friday, 12 July 2013 at 5:18 pm | Permalink

    Another triumph for John Winston WARmonger.

  • 9
    America Cangofuckitself
    Posted Friday, 12 July 2013 at 7:37 pm | Permalink

    I hope this leads to historically large and crippling class actions against Telstra and the US government, and a mass desertion of Telstra by its customers. It is unconscionable to use private information for any purpose other than intended, without consent and without public regulation by our government. Encrypt everything and trust no-one in government.

  • 10
    AR
    Posted Friday, 12 July 2013 at 8:47 pm | Permalink

    The Hegemon does what it wants, to whomsoever it wants, when & wherever, for any purpose, or none, it chooses.

  • 11
    Debs is dead
    Posted Saturday, 13 July 2013 at 9:11 am | Permalink

    Trying to point the finger at one of the two neo-liberal political movements that dominate Oz politics as being to blame for this is just stupid, playing their game of diversion by reducing politics to a tribal football match. It wouldn’t have mattered if it was a lib tory govt or a labour tory govt, the same cringing forelock tugging surrender would have been made in both cases.

    If you doubt this, I suggest you reconsider the current labour mobs’ acquiescence to spookdom over the banning Huawei hardware on all Oz backbones.

    Huawei aren’t banned because they have ‘backdoors’ to China - as the american & oz spooks claimed.
    Although the changes brought about by IPV6 have increased the range & availability of communications metadata, there are practicalities impacting on the construction of a data mining matrix which needs to capture 100% of metadata.
    Without supporting switch infrastructure engineered in at the design stage, such backdoors are worthless. Huawei hardware was banned because it doesn’t have amerikan backdoors built into it.
    Being pragmatic types the Huawei execs would probably put the things in if asked but amerikan/oz xenophobia induced paranoia among the spooks won’t allow them to trust an oriental.

  • 12
    exile09
    Posted Saturday, 13 July 2013 at 5:14 pm | Permalink

    John Pilger tried years ago to raise consciousness about the US Inc domination of communication in Oz, but the news never got traction. Pine Gap is a major sore. And just to think the US military are free to roam around sections of Queensland.

    Skype and Google are to be avoided at all costs.

  • 13
    Ian
    Posted Sunday, 14 July 2013 at 7:07 pm | Permalink

    Thank you Edward Snowden, Julian Assange, Barrett Brown and other brave people for revealing more frightening truths about the malevolent American state and its co-opted, cowardly allies like Australia and the big corporations. Without your explicit revelations I doubt whether the Washington Post and other establishment media would ever have gone on to reveal all the other shameless shenanigans of the US government and their allies.

  • 14
    Curly Higgins
    Posted Tuesday, 16 July 2013 at 4:42 pm | Permalink

    “This agreement, at that time 12 years ago, reflected Reach’s operating obligations in the US that require carriers to comply with US domestic law.”

    12 years ago was probably before the days of the importance and necessity of encryption . We might as well get the preliminaries over and done with. We could be a long time in the same cell-block.

Womens Agenda

loading...

Smart Company

loading...

StartupSmart

loading...

Property Observer

loading...