Watchdog: Western tech used for hacking in Turkey, Syria

Procera offices are seen on Thursday, March 8, 2018, in Fremont, Calif. Researchers have found evidence that the company's hardware - now sold by Canadian firm Sandvine - is being used to hack internet users along Turkey's border with Syria. Forbes has reported that engineers at the firm were so troubled at the prospect of supplying surveillance hardware for use by a Turkish telecoms company that six of them quit in protest.

Fri, 09 Mar 2018 00:27:08 -0500

PARIS (AP) — A Canadian company's hardware is being used to hack internet users along Turkey's border with Syria, researchers said Friday, adding that there were signs that Kurdish forces aligned with the United States might have been targeted.

The revelation comes as Turkey presses its offensive against the Kurds dug in along the country's frontier with northwestern Syria — a conflict that threatens to disrupt the American-led effort to extinguish the Islamic State group. The apparent use of Canadian technology to target a U.S. ally was an irony underlined by Ron Deibert, the director of the internet watchdog group Citizen Lab, which published a report on the spying.

"These companies are not closely regulated — and that can lead to a lot of unintended consequences, including consequences that harm our foreign policy interests and human rights interest as well," said Deibert. "It's a strong argument for government control over this kind of technology."

Citizen Lab identified the hardware behind the hacking as PacketLogic devices produced by Procera — a Fremont, California-based company that was recently folded into Canada-based network management firm Sandvine, which is owned by American private equity group Francisco Partners.

In a statement, Sandvine said it investigates all allegations of abuse but would not be looking into the concerns raised by Citizen Lab — communicated to the company nearly a month ago — until it sees the watchdog group's full report. The statement also said Citizen Lab's allegations were "technically inaccurate and intentionally misleading," but a representative for the company did not respond when asked to supply an example of a misleading or inaccurate claim.

Citizen Lab said it discovered the hacking after a European cybersecurity company reported that network service providers in two unidentified countries were trying to compromise their users using a powerful hacking technique known as network injection. Citizen Lab scoured the internet for signs of the spying and eventually traced the activity to the Turkish provinces of Adana, Hatay, Gaziantep, Diyarbakir and to the Turkish capital, Ankara, as well as parts of northern Syria and Egypt.

Network injection — so-called because malicious software is injected into everyday internet traffic by whoever controls the network — has long been feared as a particularly powerful form of government spying.

"This can potentially be used to target anyone in the country with the click of the button," said Bill Marczak, the lead author of the Citizen Lab report.

Although the identities of those being spied on in Turkey and Egypt aren't clear, Marczak said that the devices appeared to be installed on the network belonging to Turk Telekom, a leading phone and internet provider in Turkey as well as parts of northern Syria. He said there were hints suggesting some of the targets are affiliated with the YPG, the Kurdish Marxist rebel group which is fighting Turkish forces for control of the northwestern Syrian province of Afrin. Although Turkey considers the YPG a terrorist organization, the group provides the backbone of the U.S.-backed operations against the Islamic State in eastern Syria.

American officials acknowledged Monday that ground operations against the jihadist group's remnants in eastern Syria were on hold because Kurdish fighters were being diverted to the battle against Turkey.

Turk Telekom said in a statement that it complies with Turkish law and doesn't interfere with internet users' access. It added that the company "does not redirect any internet user to receive malicious downloads of popular software applications." A representative for the company did not immediately respond to follow-up questions.

Sandvine's ties to the Turkey government have been the subject of previous reporting. In 2016, Forbes reported that engineers at Procera were so troubled at the prospect of supplying surveillance hardware for use by Turk Telekom that six of them quit in protest.

"I do not wish to spend the rest of my life with the regret of having been a part of (Turkish President Recep Tayyip) Erdogan's insanity, so I'm out," one the engineers said in a letter of resignation quoted by Forbes.

LinkedIn shows at least 16 Procera-Sandvine employees listed as working in Egypt or Turkey. One Sandvine engineer based in Cairo listed "lawful interception" — a commonly used euphemism for state-sanctioned surveillance — as one of his interests.

Copyright 2018 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.