OTTAWA - Electronic records detailing the planned overhaul of Canadian naval intelligence — created when admitted Russian spy Jeffrey Delisle was at the height of his treachery — were deleted from a National Defence data base.
Two PowerPoint slide presentations, aimed at explaining the overhaul to intelligence analysts on both the east and west coasts, were reported destroyed when copies were requested earlier this year by The Canadian Press under the Access to Information Act.
Military officials described the deletions as a clerical error.
But when the news agency asked why both the electronic and paper copies had been expunged, and whether that violated access-to-information law, the navy eventually reversed itself and claimed some copies of the presentations had survived in email accounts of officers serving overseas.
The confusion over the handling of the records alarms defence and intelligence experts.
"We should be asking questions, absolutely," said retired colonel and military law expert Michel Drapeau.
"I mean, naval intelligence goes to the security of the country, security of people, of our Armed Forces. They are issues of national interest."
Questions about the deletion of the PowerPoint presentations come at time when the military's entire handling of sensitive data is under scrutiny.
Last week, court records released in the Delisle case showed the naval officer retained top secret access even though his security clearance had lapsed and that prior screenings had failed to pick up red flags in his personal life.
Delisle had been working at HMCS Trinity, a top secret intelligence centre in Halifax, when he was arrested last January for passing highly classified information over to Russia over a five year period. He pleaded guilty in October.
The deletion of the electronic briefings on changes to naval intelligence adds to concerns raised by the Delisle case.
"You would want all intelligence documents and briefings to be handled carefully," said Wesley Wark, an intelligence expert at the University of Toronto.
"It's not just handling, but archiving and preservation of sensitive documents. It goes to the heart of what an intelligence system does. An intelligence system doesn't deal with just current information. It deals with memory and (institutional) capacity."
Delisle would most certainly have had access to the briefings — which, among other things, compare Canada's naval intelligence capability with its allies, lays out the division of responsibilities under the new system, as well as the number, disposition and function of staff within the beefed-up branch.
Wark said the navy's actions become even more serious in light of the spy case. While he's prepared to accept it may have been a mistake, the absence of those records from the data base might have significance in assessing Delisle's actions.
"You have a security breach of significant consequence on your hands, you want to be able to discover just what a person conducting a security breach might have had access to in order to be able to assess the damage, and that's a tricky business, but it's absolutely crucial," he said.
The navy has given several contradictory explanations as to why staff initially destroyed the records and whether they had authority to do so.
At first, officials said informally it was allowed because the documents were not signed and therefore not considered "official" — something Drapeau dismissed as a "silly" explanation.
"You have to ask what was the compelling reason for you to destroy — whether it was authorized or not — these documents which would very clearly have an historic value," he said.
Federal law, under the Library and Archives Act, requires departments to hold on to such briefing material because of its historical value and mandates officials to seek permission from the chief archivist if the materials are to be destroyed. Exceptions are made for draft records that do not leave the custody of the person who wrote it.
Similarly, the federal Treasury Board has a policy that requires briefing materials to be maintained. The Access to Information and Privacy Act requires documents to be retained, as well.
When The Canadian Press started asking questions last March, an internal National Defence email trail shows the navy's information manager justified the destruction by saying "they were draft documents never communicated beyond the author."
In fact, the presentations were given to the Acoustic Data Analysis Centre at Canadian Forces Base Esquimalt, B.C. and HMCS Trinity, the all-source fusion intelligence centre in Halifax where Delisle was caught spying.
The March 13, 2012 email also said the material in the briefing was pulled from a "master document that was approved and presented to (Commander Royal Canadian Navy)."
Asked about the contradiction last week, the navy acknowledged the explanation was wrong.
"The briefing deck provided to Trinity, drafted by multiple authors, was written to facilitate staff level discussion, which provided input to a Commander Royal Canadian Navy decision brief," Lt.-Cmdr. Hubert Genest said in an email statement.
"As a result of a misunderstanding of the Treasury Board policy & Library and Archives Canada rules by a member of Naval Staff Headquarters, the document was removed from the document management system, but when the error was discovered, the document was recovered and put back on the system."
Extensively censored copies of the presentations, and the overall Naval Intelligence Roadmap, were released to The Canadian Press on Nov. 19.
Had the navy not restored the briefings, Drapeau said it would have broken both the archives law as well as Treasury Board policy. And had it not eventually released them, the navy could have been accused of obstruction under the Access to Information Act.
Wark said the contents of the briefings would have been of particular interest to the Russians because, while they didn't expose potential sources, they did provide an organizational framework and insight into how Canada was beefing up its intelligence apparatus.
The government has refused to discuss what sort of information Delisle siphoned off.
Previously released court documents show the Harper government is still trying to assess how badly Delisle compromised the country's intelligence apparatus. But the country's international electronic eavesdropping service, the Communications Security Establishment, has acknowledged the damage was high.
Also on HuffPost:
The Japanese government counter-terrorism practice of <a href="http://www.reuters.com/article/2007/11/20/us-japan-fingerprinting-idUST23858020071120" target="_hplink">fingerprinting foreigners who enter the country</a> may have inspired Doctor Tsutomu Matsumoto to invent "fingerprinting gels", a way of <a href="http://cryptome.org/gummy.htm" target="_hplink">faking fingerprints for scanners</a>. <a href="http://www.dansdata.com/uareu.htm" target="_hplink">Learn how</a> to make your own here.
White Noise Generator
Worried someone around you is <a href="http://articles.businessinsider.com/2011-07-28/strategy/29998051_1_bank-employee-consent-conversation" target="_hplink">secretly recording everything you do?</a> No fear! There's a relatively low-tech way to defeat such snoops, via white-noise-producing <a href="http://www.amazon.com/Productive-Home-Security-Prducts-Jammer/dp/B002PJ7PYS" target="_hplink">audio jammers</a>. These tiny devices use good ol' white noise to blur the sound picked up by hidden microphones and other surreptitious recording devices.
<a href="http://www.technologyreview.com/view/421768/silence-smart-phones-at-thanksgiving-dinner-with/" target="_hplink">MIT's Technology Review</a> calls it the newest, hottest Thanksgiving accessory -- but you can use phone-size "<a href="http://en.wikipedia.org/wiki/Faraday_cage" target="_hplink">Faraday cages</a>" like this (sold by <a href="http://www.uncommongoods.com/product/phonekerchief?9gtype=search&9gkw=phone kerchief&9gad=6315569457&gclid=CKWq9s2krLICFcRM4AodwDoAAw" target="_hplink">uncommongoods</a>) to block your cellphone's call signal, WiFi and GPS. Handy now that<a href=" http://arstechnica.com/tech-policy/2012/08/federal-court-rules-cops-can-warantlessly-track-suspects-via-cellphone/" target="_hplink"> federal courts are ruling that cops can track suspects via cellphone sans warrant</a>, and <a href="http://www.zdnet.com/apple-patent-could-remotely-disable-protesters-phone-cameras-7000003640/" target="_hplink">Apple can remotely disable your phone camera with a click</a>. As security researcher <a href="http://nplusonemag.com/leave-your-cellphone-at-home" target="_hplink">Jacob Appelbaum said in an interview with N+1 back in April</a>, "Cell phones are tracking devices that make phone calls." So shouldn't you be prepared for when you <em>don't</em> want to be tracked?
Hidden cameras got you down? Blind them all with a simple baseball cap lined with infrared LEDs. <a href="http://creator.wonderhowto.com/amiehold/" target="_hplink">Amie, a hacker on WonderHowTo</a>, shows the world <a href="http://mods-n-hacks.wonderhowto.com/how-to/make-infrared-mask-hide-your-face-from-cameras-201280/#" target="_hplink">how to make one</a>, while <a href="http://translate.google.com/translate?u=http%3A%2F%2Fwww.oberwelt.de%2Fprojects%2F2008%2FFilo%2520art.htm&langpair=de%7Cen&hl=en&ie=UTF8" target="_hplink">this German art exhibition</a> lays out how these ingenious devices work.
These receivers reveal the telltale electronic crackle of hidden mics and cameras. Strangely enough, they were around long before "surveillance culture" became a <a href="http://digitalcommons.law.yale.edu/ylsspps_papers/64/" target="_hplink">common phrase</a>. Today they're sold in all sorts of <a href="http://www.gadget-playground.com/bug-detection.html" target="_hplink">shops for surveillance paranoids</a>.
Sometimes hiding your face isn't enough; sometimes you don't want to be seen at all. For those days, there's camera maps. The <a href="http://www.mediaeater.com/cameras/locations.html " target="_hplink">NYC Surveillance Camera Project</a> is currently working to document the location of and working status of every security camera in New York City. This project has been replicated by others in <a href="http://www.notbored.org/boston.html" target="_hplink">Boston</a>, <a href="http://www.notbored.org/chicago-SCP.html" target="_hplink">Chicago</a> and <a href="http://www.bloomingtonsecuritycameras.com/map.html" target="_hplink">Bloomington</a>, Indiana. <a href="http://www.notbored.org" target="_hplink">Notbored.org</a> has even published a guide to making your own surveillance camera maps (<a href="http://www.notbored.org/map-making.html " target="_hplink">here</a>).
Credit to artist <a href="http://ahprojects.com/" target="_hplink">Adam Harvey</a> for this one. Inspired by the <a href="http://www.bobolinkbooks.com/Camoupedia/DazzleCamouflage.html" target="_hplink">"dazzle camouflage" </a>used on submarines and warships during World War I, he designed a series of face paint principles meant to fool the facial recognition schemas of security cameras. Check out <a href="http://dismagazine.com/dystopia/evolved-lifestyles/8115/anti-surveillance-how-to-hide-from-machines/ " target="_hplink">The Perilous Glamour of Life Under Surveillance</a> for some tips on designing your own camera-fooling face paint.
Walmart may be the premier symbol of corporate America, but its disposable cellphone selection can help you start a thoroughly maverick lifestyle. <a href="http://www.walmart.com/ip/TracFone-Samsung-S125G-Prepaid-Cell-Phone-Bundle/20933059" target="_hplink">$10 TracFones</a> work on most major networks, including <a href="http://www.prepaidphonenews.com/2011/12/how-to-get-tracfone-net10-or-straight.html" target="_hplink">AT&T, T-Mobile, Sprint and Verizon</a>, and come with minutes prepaid so you can dispose of the devices when you're done.
Radio-Frequency Identification (RFID) chips are now <a href="http://electronics.howstuffworks.com/gadgets/high-tech-gadgets/rfid.htm" target="_hplink">regularly implanted</a> in passports, ID cards, credit cards and travel papers. These tiny chips make machine-reading your documents easier -- but could also let anyone with the right type of scanner <a href="http://articles.cnn.com/2006-07-10/tech/rfid_1_rfid-industry-rfid-journal-rfid-chips?_s=PM:TECH " target="_hplink">scrape your information <em>and</em> track your whereabouts</a>. Luckily, gadget geeks have come to the rescue again, this time with<a href="http://www.thinkgeek.com/product/8cdd/" target="_hplink"> RFID-blocking wallets</a>. Working on the same principle as the "phonekerchief", these wallets create a Faraday cage around your items, keeping their data secure until you take them out to be scanned where they're supposed to be scanned. Destroying the chip is simpler: <a href="http://www.instructables.com/id/How-to-blockkill-RFID-chips/" target="_hplink">just nuke it in the microwave for five seconds</a>. Of course, whatever you're microwaving might <a href="http://www.youtube.com/watch?v=4_5UYcyO3Pg" target="_hplink">burst into flames</a> first...