Saturday, May 31, 2014

#1983: Marine links Canadian spy to Hotel Serco GLONASS track, Captain Zaharie SkyWave Hack

Plum City – ( United States Marine Field McConnell has linked Canadian spy Jeffrey Paul Delisle to Serco’s operation of Red Switch hotel communications systems to track blackmail targets with GLONASS devices and Serco's alleged use of a SkyWave hack of Captain Zaharie’s Boeing Uninterruptible Autopilot on MH Flight 370 for the hijacking of March 8.

McConnell claims that by July 2007, Serco’s GLONASS trackers had trapped Delisle in a child-porn blackmail sting in a Starwood Group hotel in Halifax and forced him to hand over keys to the Stone Ghost intelligence network used for information sharing by the U.S., the U.K., Canada and Australia.

McConnell also claims that Serco used the Stone Ghost keys and SkyWave's GLONASS devices to bypass or stand down Blue Force GPS assets deployed in the Cope Tiger exercise in Thailand; hack Captain Zaharie’s MH370 autopilot, and, misdirect search teams to look where the plane is not .

Prequel 1:
#1981: Marine Links Serco 370 Red Switch Hijack to SkyWave GPS Takeoff, Inmarsat GLONASS Cat IIIc

STONEGHOST or "Stone Ghost", is a codename for a network operated by the United States' Defense Intelligence Agency (DIA) for information sharing and exchange between the United States, the United Kingdom, Canada and Australia.[1] Other sources say that New Zealand is also participating, and that STONEGHOST therefore connects, and is maintained by the defense intelligence agencies of all Five Eyes countries.[2]

STONEGHOST does not carry Intelink-Top Secret information and was previously known as Intelink-C and may also be referred to as "Q-Lat" or "Quad link".[1] It's a highly secured network with strict physical and digital security requirements. The network not only hosts information about military topics, but also about SIGINT, foreign intelligence and national security.[2]

2012 Canadian Spy Case[edit]

Royal Canadian Navy intelligence officer Sub-Lt. Jeffrey Delisle pleaded guilty on 10 October 2012 to charges including having downloaded and sold information from the STONEGHOST system to the Russian spy agency GRU.[3][4] He was sentenced to 20 years in penitentiary, minus time served on February 6, 2013 for contravening the Security of Information Act.[5][6]

Jeffrey Paul Delisle (born March 30, 1971) is a former Sub-Lieutenant in the Royal Canadian Navy who passed sensitive information from the top-secret Stone Ghost intelligence sharing network to the Russian spy agency GRU. Delisle's actions have been described as “exceptionally grave” by Canada's Department of National Defence (DND) and “severe and irreparable” by the Canadian Security Intelligence Service.[1]

At court in October 2012 Delisle pleaded guilty to breach of trust and two counts of passing secret information to a foreign entity, contrary to the Security of Information Act. He was sentenced to 20 years in penitentiary, minus time served, by the Chief Judge of theProvincial Court of Nova Scotia on February 8, 2013.[2] He is expected to be dismissed from the Canadian Forces after all judicial proceeding is concluded.[3]

Military career[edit]

Delisle served as a naval threat assessment analyst[1] for the Royal Canadian Navy. He initially joined as a reservist in January 1996, enrolling as a regular member in March 2001. In October 2001, Delisle completed a leadership course and becomes a Corporal.[4] In November 2006, Delisle is promoted to Sergeant.[4] In 2008, he enrolled in the faculty of arts at Royal Military College.[4] He received his commission as a Sub-Lieutenant in July 2008.[4][5] In September 2010, Delisle graduated from Royal Military College with a Bachelor of Arts.[4] He was posted to the HMCS Trinity multinational naval intelligence and communications centre in Halifax in August 2011.


In July 2007 Delisle walked into the Russian Embassy in Ottawa and offered to sell secret information to the Russian military intelligence service (known as the GRU).[4]

Delisle's activities are particularly damaging due to his access to the STONEGHOST database of intelligence shared between Canada, the United States, the United Kingdom, Australia and New Zealand. Referring to the information he passed on, he said: “It was never really Canadian stuff.... There was American stuff, there was some British stuff, Australian stuff – it was everybody’s stuff.”[1]

Delisle has blamed his espionage activities on his marital problems, rather than financial need. He entered the Russian embassy the day he discovered his wife was having an affair.[6]

Investigation and conviction[edit]

The investigation into Delisle was triggered by a tip from the U.S. Federal Bureau of Investigation on December 2, 2011. His home was searched that month and he was arrested the following January.

Delisle had previously been stopped by Canadian border services agents at Halifax airport in September 2011 after returning from a trip to Brazil to meet his GRU handler, carrying a large amount of cash and prepaid credit cards. There is no sign this led to an investigation.[7] In May 2013, The Canadian Press reported that Canadian Security Intelligence Service had been aware of Delisle's spying well before the FBI tip, but failed to contact the Royal Canadian Mounted Police.[8]

On February 8, 2013 Delisle was sentenced to 20 years in prison. On February 13, 2013 it was announced by DND that Delisle had been stripped of his commission and service decorations and been dishonourably discharged. DND was also moving immediately to recover the salary paid to Delisle since his arrest in January 2012.[9]
Personal life[edit]

On May 3, 1997, Delisle married Jennifer Lee Janes in Lower SackvilleNova Scotia.[4] On February 17, 1998, he filed for bankruptcy and declared liabilities of $18,587 and assets of $1,000.[4] In June 2008, Delisle and his wife separated.[4] On May 3, 2010, Delisle and his wife filed for divorce, due to an affair.[4]

Chinese ship in latest glitch in MH370 search mission
Press Trust of India | Sydney | May 31, 2014 2:53 pm
The search for MH370 has been continually frustrated and last week Australia ruled out an area considered a possible resting place of the plane after a mini-sub dived repeatedly to the seabed and found nothing. (Source: AP)

JACC said an Australian contracted survey vessel will also be involved in conducting the bathymetric survey, and will arrive in the search area in June.
A Chinese ship mapping the ocean floor ahead of an intensive underwater search for missing Flight MH370 was returning to port on Saturday due to a technical problem, officials said.

The massive Indian Ocean search for the Malaysia Airlines plane, which disappeared on March 8 carrying 239 people including five Indians, has so far failed to find any sign of the Boeing 777.

The Chinese survey ship, Zhu Kezhen, was conducting a bathymetric survey – or mapping of the ocean floor – to help experts determine how to carry out the next stage of the search on the previously unmapped ocean seabed.

“Zhu Kezhen suffered a defect to its multi beam echosounder and is coming into port to conduct the necessary repairs,” Australia’s Joint Agency Coordination Centre said in a statement.

The search for MH370 has been continually frustrated and last week Australia ruled out an area considered a possible resting place of the plane after a mini-sub dived repeatedly to the seabed and found nothing.

Officials believe the plane diverted from its Kuala Lumpur to Beijing route and ended up in the vast Indian Ocean, but have little to go on besides satellite signaling messages sent between aircraft, satellite and ground station.

Experts are now reanalyzing this satellite data to confirm a search area as well as mapping the sea floor in preparation for the commercially contracted deep sea search, which is expected to begin in August and take up to 12 months.

JACC said an Australian contracted survey vessel will also be involved in conducting the bathymetric survey, and will arrive in the search area in June.
Australia is leading the hunt for MH370 which disappeared in its search and rescue area, in consultation with Malaysia and China, whose citizens accounted for nearly two-thirds of those onboard the Beijing-bound flight.

Malaysia insists it is doing all it can in what is an unprecedented situation but the relatives of those on the plane have expressed anger and frustration at the lack of progress, nearly three months after the plane vanished.

Malaysian Prime Minister Najib Razak, speaking in Beijing on Saturday during a state visit to China, said the disappearance of flight MH370 had “tested” the friendship between the two countries and pledged to find the missing plane.
“Facing a mystery without precedent, we were grateful for the support of the Chinese government, which has spared no expense in the search effort,” Najib said in a speech commemorating the 40th anniversary of the establishment of diplomatic ties between the two countries.”

New military hotline directly links top brass to U.S.
Canada is installing a hotline that will allow military brass and politicians to talk with their American counterparts during a time of war or in any other crisis.

Canada is installing a hotline that will allow military brass and politicians to talk with their American counterparts during a time of war or in any other crisis.
About $20 million is being spent on what is called the Defence Red Switch Network. The communications system is already running in some locations, including the defence minister's office and other undisclosed sites for the military's senior leadership. The system will provide a link for the Canadian government to various U.S. military headquarters as well as the North American Aerospace Defence Command, the joint U.S.-Canada alliance that monitors air and space approaches to the continent.

After the Sept. 11, 2001, terrorist attacks, there was criticism that senior Canadian officials, including then-prime minister Jean Chretien, were out of the communications loop during the initial stages of the terrorist strike.

The Citizen obtained documents on the red switch network under the access to information law, but Defence Department officials censored almost all details. They claimed releasing the material would be "injurious" to the defense of Canada, its international relations, as well as the detection of subversive or hostile activities.

The newspaper, however, found the details of the supposedly secret network, including its cost to taxpayers, on the department's own public webpage. Details of a similar system that would allow U.S. President George W. Bush to communicate with his top level commanders was also on a Pentagon webpage.

Canadian military officials were not available to explain why information about the network is considered secret when such details have already been put out in the public domain by both the U.S. and Canada.

The red switch network is considered secure, meaning that it has technology to prevent its transmissions from being monitored or intercepted. Presumably the Canadian system can link up with the president's network.

Martin Shadwick, a strategic studies professor with York University, said such a system makes sense in that Canada and the U.S. share a common goal in protecting North America. He noted that similar communications systems existed during the Cold War.

But analyst Steve Staples said the hotline is another example of the growing integration of the U.S. and Canadian militaries and the increased involvement of the Canadian Forces in American-led operations. "This system just allows the Canadian military and government leaders to get their orders from Washington more quickly," said Mr. Staples, an analyst with the Ottawa-based Polaris Institute.

The Citizen requested information on the red switch network almost four weeks ago, but military officials have not been available to comment.

But according to the Defence webpage, the network "allows access to the U.S. system (Forces wide) and will enhance north/south and internal connectivity -- particularly during times of crisis."

According to a Pentagon site, the network provides the president, secretary of defence, joint chiefs of staff, combatant commanders and selected agencies with secure voice communications up to the top secret level. The system is for use during war and other emergencies. Other U.S. defense and federal government agencies can access the network if they have approval from the chairman of the joint chiefs of staff, according to the site.

The website also includes a phone number that U.S. government officials can call to request entry to the network.

Mr. Staples said the level of secrecy in Canada surrounding the network is disturbing. "I think the Defence Department is worried that Canadians are going to realize the extent our military is being integrated into the U.S. system," he added.

Critics have warned about a new wave of secrecy at the Defence Department. Officials there are censoring information in official documents released to the public even though the same material is already available on government Internet sites. Some critics say this blanket of secrecy raises questions about government accountability and openness.

Last week, the Citizen reported the Defence Department is withholding information about the Pentagon's missile shield that is already on the U.S. government's websites, while at the same time claiming the security of Canada could be harmed if the names of senior American officers treated to a taxpayer-financed reception more than a year ago are released.

In addition, the newspaper obtained two missile shield briefing notes sent to Defence Minister Bill Graham. The department had originally told both the newspaper and an investigator with the Office of the Information Commissioner that those records, one of which discusses U.S. efforts to develop space weapons, never existed.

© (c) CanWest MediaWorks Publications Inc.”

“SkyWave Mobile Communications (“SkyWave”) is a global provider of satellite and satellite-cellular devices in the Machine-to-Machine (M2M) market. SkyWave's products allow customers to track, monitor and control industrial vehicles, vessels and industrial equipment. Applications include tracking the location of vehicle fleets, monitoring data from oil & gas flow meters and turning on and off pumps. More examples of applications can be found in the Market section.

SkyWave’s satellite products communicate via Inmarsat's global satellite service. [1] .[2] The main industries their products are used in are the transportation, maritime, mining, oil & gas, heavy equipment, emergency management, water monitoring, and utilities sectors. 


SkyWave Mobile Communications was founded in Ottawa, Canada in 1997. In its initial stages, SkyWave relied on the research and technical expertise provided by the Communications Research Centre Canada (CRC) and local government funding services to develop the first product.[3]

Some examples of SkyWave products in use include government vehicles in USA,[4] tuna buoys in the Pacific, truck tracking in the jungles of Brazil, the oil & gas industry in North America, and drinking water control in the UK.[5] In addition, SkyWave’s satellite terminals have been used to track races such as Rhino Charge 2011,[6] the Dubai-Muscat Offshore Sailing Race in 2008[7] and the China Sea Race from Hong Kong to Subic Bay in 2006.[8]

On April 1, 2009, Inmarsat acquired a 19% stake in SkyWave Mobile Communications to expand presence in the SLDR (Satellite Low Data Rate) market. SkyWave used the funds to acquire GlobalWave and double its size.[9][10] The SLDR market is estimated at $600m and is expected to grow.[11]

In December 2009, SkyWave launched a GLONASS-compatible product for the Russian market. The DMR-800L with GLONASS/GPS can use either or both of the navigation systems to determine location.[12].. SkyWave sells terminals to Solution Providers who put satellite communications products and services into industry-specific applications for their customers. The following are some of the main uses for this technology: 

Transportation Applications:[1]
Vehicle tracking and monitoring, fleet management
Security and anti-theft monitoring
Heavy equipment security and management[15]
Trailer and container tracking, rail car tracking
Cold Chain Management
Mining Applications:
Heavy equipment and machine tracking[16]
Remote installation sensor monitoring[17]
Water management
Maritime applications:[1]
Long Range Identification and Tracking (LRIT)[18][19]
Ship Security Alerting System (SSAS)
Vessel monitoring system (VMS)[20]
Vessel equipment, environment, security monitoring
Commercial fishing boat and leisure marine tracking[21]
Merchant marine monitoring
Buoy sensor monitoring and tracking
Oil & Gas Applications:[22]
Oil & gas pipeline and critical parameters monitoring and control [23] [24]
Cathodic protection
SCADA equipment monitoring and management
Fluids monitoring
Electric power valves monitoring and contra
Environmental monitoring 
Defence and Security Applications:[22]
Personnel tracking
Perimeter control
Homeland and border security
Blue Force Tracking, protection, monitoring, and security
Utilities Applications:
Water quality and quantity monitoring
Water regulation and control
Real-time analysis and monitoring
Emergency response alerts
Emergency Management
Fleet tracking Siren warning system[26]”

“A coded modulation design for the INMARSAT geostationary GLONASS augmentation

A coded modulation scheme is proposed to carry out the Global Navigation Satellite System (GLONASS) geostationary augmentation which includes both integrity and navigation functions over the next generation International Maritime Satellite Organization (INMARSAT) satellites. A baseline coded modulation scheme for the GLONASS augmentation broadcast proposes a forward error correction code over a differential phase shift keying (DPSK) modulation. The use of a concatenated code over the same signaling is considered. The proposed coded modulation design is more powerful and robust, yet not overly more complex in system implementation than the baseline scheme. Performance results of concatenated codes over a DPSK signaling used in the design are presented. The sensitivity analysis methodology in selecting the coded modulation scheme is also discussed

Published in:

Military Communications Conference, 1991. MILCOM '91, Conference Record, Military Communications in a Changing World., IEEE

McConnell believes the sleeping giant is waking up.

Yours sincerely,

Field McConnell, United States Naval Academy, 1971; Forensic Economist; 30 year airline and 22 year military pilot; 23,000 hours of safety; Tel: 715 307 8222

David Hawkins Tel: 604 542-0891 Forensic Economist; former leader of oil-well blowA-out teams; now sponsors Grand Juries in CSI Crime and Safety Investigation

No comments:

Post a Comment

Who's visiting Abel Danger
view a larger version of the map below at