Sputnik: Why would London seek to hack Belgium's telecommunications company? Why did the UK target its ally?
Kevin Curran: Proximus group which was formerly known as Belgacom really have core routers and they're responsible for routing a lot of the phone and data traffic in Africa and the Middle East, and it's been reported that British espionage operations were seeking to target communications made between smartphones, they've also been able to, obviously, have targets that they're been surveilling but it also seemed that they wanted to be able to look at traffic which was exiting Europe to other places like the United States as well, so being able to have access to data communication, the telecommunication provider is really important because all the information goes through these routers, these were cisco routers, and that's where the infection was targeted, at these particular routers, so that they can snoop onto traffic and that's, of course, invaluable to a spy agency really.
Kevin Curran: GCHQ who are behind this, in fact it's their network intelligence team, they have a history of not responding to any allegations put against them really, and, of course, in this particular matter it's incredibly sensitive because what you have really is, first, because we have secret documents from GCHQ which tell us literally down to what happened and the malware that was involved, because what we have here really is an exceptional case of one EU nation-state spying on another EU nation-state.
Sputnik: What tension could it create between Brussels and London? And what could be the potential repercussion of this incident?
Kevin Curran: Several members of the Belgian government made remarks, now the Belgian Prime Minister Charles Michel has not commented yet but really even the offices of Belgacom, telecommunications company, are right beside the European Parliament, so what you have here is a possible snooping on government ministers in EU new countries, you know, it's incredibly sensitive.
There was a fantastic review of that was done a while ago by the Intercept and the whole way this spyware was connected to these routers and the extraction of the information and what would've remained hidden for years if there wasn't a bug in the actual email software which led them to investigate to see what happened, it might still be there, of course, as malware is not found, as we say, but what we have here is that because the actual Belgian government are shareholders in this company, the telecommunications company, it's a really large one, and there are millions trying to show exactly what happened, security afterwards again.
Billions of these cookies are being controlled and kept by spy agencies and that allows them later to reverse the scope of someone's IP address and they targeted engineers in Belgacom and they were able to do a lookup on the IP addresses of these particular engineers computers and look at their log-in into Yahoo and they've been able to target the social media accounts with malware which then enabled them to go deeper into the actual company itself.
Sputnik: This development comes amid unceasing accusations against Russia of interfering in other nations affairs, what position do the recent revelations put London into?
Kevin Curran: We know all the major powers have cyber teams, they're all looking really at forms of encryption, being able to overcome that, being able to take command and control of other countries grids and electricity and being able to bring down satellites, and they're putting resources into cyber offensive teams and, of course, it's incredibly difficult to estimate what the budget is or how many people are involved because we can't just fly a plane over a country and count how many tanks and planes are on the ground, when it comes to cyber warfare it is much more difficult, but we know that the major states have put a substantial amount of resources into this.
We know now that the world is moving online, there's so much of infrastructure online, and you can do so much damage to a nation and you can have a threat even of what you can even do to a nation if they threaten to attack you, so we're finding a lot of tools, and again, this was one of the most sophisticated malware tools/software that we've seen today, this particular software that was used for this particular attack on the network. So we've seen that this one of the most sophisticated softwares that we've seen today has come from a nation-state offensive cyber warfare team.
The views and opinions expressed by the speaker do not necessarily reflect those of Sputnik.