Skip to main content

Sonic “Attacks” on US Diplomats in Cuba: Don’t Rush to Conclusions

 

Reports of "health attacks" in Cuba which left several American and Canadian diplomats with health problems and hearing loss has led to wide and dramatic speculation.  Several stories have hyped possible "acoustic attacks" that may be related to weapons used by police for riot control, or even weapons developed by the U.S. Navy.  The Associated Press reported that "after months of investigation, U.S. officials concluded that the diplomats had been attacked with an advanced sonic weapon that operated outside the range of audible sound and had been deployed either inside or outside their residences…"  Florida Senator Marco Rubio issued a statement condemning what he concluded was a blatant and intentional attack.  According to Rubio, the Cuban government has been harassing U.S. personnel for decades and, "this has not stopped with President Obama's appeasement.  Personal harm to U.S. officials shows the extent the Castro regime will go and clearly violates international norms."  Scary indeed.

There has been no shortage of theories as to the reasons for the attacks, some speculating that it was payback against specific individuals, a possible operation by third parties (the Russians?) to drive a wedge between the U.S. and Cuba, or a means by Cuba to send some sort of message to Washington.

If so, the message is mighty garbled.  No report has provided anything definitive as to what happened, and how.  To date, the State Department has remained relatively mum, only commenting that the administration has an "active investigation" to determine the source of the health problems, many of which resemble concussions.  The affected U.S. diplomats have returned home from Havana. In May, the State Department asked two Cuban diplomats to leave Washington though did not publicly announce this expulsion at the time and has since specifically declined to call it an act of reciprocity.

While I have not served in Cuba, my experience in a number of similar hostile, high counterintelligence threat countries suggests that this is more likely a surveillance effort gone wrong, than the use of an offensive sonic weapon.  We have very little experience anywhere in the world with directed attacks designed to physically harm to our diplomats.  However, the use of intrusive technical collection and surveillance which sometimes causes harm in its own right, is consistent with past practice in Cuba and elsewhere.

Why don't I believe this was an attack intended to harm diplomats?

First, I don't think the timing or diplomatic atmosphere accords with such hostile action by the Cuban government.  U.S. and Canadian diplomats reported their symptoms in the fall of 2016.  At that time, the Obama Administration had relaxed diplomatic relations with Cuba, and Obama was the first U.S. President to visit the island only months before.  During the early to mid-fall, most observers assumed that Hillary Clinton would win the Presidential election and continue the warming of relations with Cuba.  If the operations began shortly after the US presidential elections, it would have been irrational for Cuba to start out relations with the incoming administration in this manner.  Further, I suspect if the Trump Administration believed Cuba sought to purposely harm U.S. diplomats, they would have reacted in a more aggressive and public manner.  Indeed, the Cubans who were asked to leave the U.S. were not kicked out "persona non grata" as is usually the case when countries have on-the-ground diplomatic or espionage disagreements.  Conspicuously, the two Cuban diplomats were not prohibited from ever returning to the U.S., and the door was left for them to return depending on the outcome of the FBI/State investigation.

Finally, and more significantly, we have seen too many similar technical "attacks" around the world which caused unintended harm. These efforts, while designed to further surveillance and eavesdropping and not to cause malicious damage, nevertheless risked or resulted in residual physical harm to U.S. diplomats.

During my time overseas, I have had personal experience with several of these "attacks."  In the 1980s and 1990s, the Soviet and then Russian intelligence services deployed doses of nitrophenyl pentaden (NPPD) against American diplomats whom they suspected of managing espionage operations against Russian interests.  This so-called "spy dust" was an invisible electromagnetic powder with a customized chemical identifier.  It was smeared onto door handles, furniture and cars of suspected American spy handlers.  It was a tagging agent used by Russian security elements to covertly monitor their own community by revealing unreported (and potentially espionage related) contacts between Russian and American officials.  It was somewhat ingenious. After deploying the invisible material on a suspected U.S. intelligence officer, Russian counter-intelligence would snoop after-hours through the offices of Russian government employees looking for traces of the material.  Discovery of the powder in the office of someone who had not reported contact with the American provided significant proof of suspicious activity.

What was not ingenious, however, were the threats to human health. There were concerns at the time that the material was carcinogenic and could be harmful to American diplomats.  Following studies, the United States determined there was no specific evidence of a threat to the U.S. diplomatic community since it was only used against a handful of people.  As someone who was "dusted," that explanation didn't really make me feel much better.  However, the substance was at least a step up from earlier Russian tracking devices like radioactive nails hammered into the tires of U.S. diplomatic vehicles, allowing Russian surveillance vehicles to hang back unseen and follow along by using special equipment to track targets' tire residue.

The Russian security services were also known to flood the U.S. embassy in Moscow with electromagnetic radiation.  They would beam concentrated microwaves and electronic pulses at the Embassy in an attempt to eavesdrop on U.S. typewriters and conversations.  In the 1970s, a U.S. Ambassador contracted and died of a blood disease that many assumed to be a result of the attacks.  The State Department detected high levels of radiation in the embassy staff, and provided hazard pay to personnel who worked in Moscow.  A variety of electronic attacks continued over the years to include mobile Russian vans that acted as a giant x-ray that could be directed at diplomats all over town.  In a similar fashion, high frequency devices can be used to pulse other devices, perhaps turning on or off collection devices in homes or offices.

Similarly, the Russian security services undertook a massive effort to bug the new embassy building in Moscow with all sorts of technical gear, some of which could potentially affect the health of Americans.  Indeed, the new embassy construction was even abandoned in 1985 due to the sheer volume and sophistication of electronic eavesdropping equipment that was found throughout the walls, concrete floors and underground.  A second attempt to improve the security of the building also faltered when the United States found an equally aggressive and sophisticated attack, which included building listening devices directly into the steel beams holding the building upright.  Even the sidewalks and streets throughout the neighborhood were embedded with electronic collection gear which was designed to turn the embassy building into a giant antenna.  The United States lost hundreds of millions of dollars trying to fix the problems, and eventually tore off the top several floors of the Embassy and rebuilt it with specially imported materials put together by American-only labor – an effort the U.S. called the "Top Hat" solution.  The decades-long process displayed the remarkable expertise of the Russians in the use of technical sensors and surveillance gear.  Russian technology was consistently underestimated by the U.S.  and often our best scientists had difficulty understanding what the Russians were up to.

On the U.S. side, the FBI has also deployed sophisticated tracking efforts to monitor foreign spies.  During the waning days of the Cold War, the FBI deployed sophisticated monitoring gear on bridges and highways around Washington to track Russian spies.

The arrest of FBI Special Agent Robert Hanssen also uncovered an elaborate effort by the FBI and NSA to tunnel under the Russian embassy in Washington and place surveillance gear, bugs, and receivers in an effort to attack the embassy's telecommunication gear.  The U.S. team employed cutting edge technology including directing laser beams through the steel support columns to pick up electronic emanations, and aiming energy beams at the embassy windows to "read" the vibrations in the glass and pick up conversation.  A less high-tech component of the attack reportedly included using a dwarf to scale inside the embassy wall and emplace listening devices.

Given this historical practice, I suspect what happened in Havana was unfortunate but probably a collection/counterintelligence attack gone wrong rather than a directed attack intended to hurt diplomats. As Senator Rubio correctly pointed out, the Cuban government has long harassed U.S. representatives, and engaged in intrusive tracking of our representatives in Havana. However, we have never seen them try to do serious harm to our diplomats perhaps for fear that we could do the same).  Deployment of a weapon across these different times and locations by a third party is possible but highly unlikely without the direct assistance of the Cuban government.  If Cuba or another country was hoping to use a dangerous and sophisticated attack to achieve some goal or send a message, it doesn't sound like the message was received either. Usually the simplest explanation is the most likely.  Either way, the Cuban government has an obligation under existing treaties to protect foreign diplomats, and harmful effects, whether they result from surveillance or not, should be condemned.

There is also another lesson here. Our diplomats overseas often work in difficult places, sometimes facing harassment, surveillance and other challenges.  That is why President Donald Trump's thoughtless comments about our diplomats (and by extension their families) in Moscow go over so poorly with our public servants around the world.  Despite the obvious hardships of being away from the United States in difficult environments, there are often hidden or untold challenges which potentially include being monitored day and night and serious health risks from invisible corners.

The story emerging out of Cuba is simply not as bizarre as it might seem at first blush. It is unfortunately all too familiar to those who serve our country in hostile and risky environments.

Comments

Popular posts from this blog

How to Hack a Website in Four Easy Steps

Every wondered how Anonymous and other hacktivists manage to steal the data or crash the servers of websites belonging to some of the world biggest organisations? Thanks to freely available online tools, hacking is no long the  preserve of geeks , so we've decided to show you how easy it is to do, in just four easy steps. Step 1: Identify your target While  Anonymous  and other online hacktivists may choose their targets in order to protest against perceived wrong-doing, for a beginner wanting to get the taste of success with their first hack, the best thing to do is to identify a any website which has a vulnerability. Recently a hacker posted a list of 5,000 websites online which were vulnerable to attack. How did he/she identify these websites? Well, the key to creating a list of websites which are likely to be more open to attack, is to carry out a search for what is called a Google Dork. Google Dorking , also known as Google Hacking, enables yo...

How to Hack Facebook Password in 5 Ways

Check out the following post from  fonelovetz blog  on facebook account hacking. This is one of the most popular questions which I'm asked via my email.And today I'm going to solve this problem one it for all.Even though i have already written a few ways of hacking a facebook password.Looks like i got to tidy up the the stuff here.The first thing i want to tell is.You can not hack or crack a facebook password by a click of a button.That's totally impossible and if you find such tools on the internet then please don't waste your time by looking at them! They are all fake.Ok now let me tell you how to hack a facebook account. I'll be telling you 5 of the basic ways in which a beginner hacker would hack.They are: 1.Social Engineering 2.Keylogging 3.Reverting Password / Password Recovery Through Primary Email 4.Facebook Phishing Page/ Softwares 5.Stealers/RATS/Trojans I'll explain each of these one by one in brief.If you want to know more about them just ...

How to Hack Someone's Cell Phone to Steal Their Pictures

Do you ever wonder how all these celebrities continue to have their private photos spread all over the internet? While celebrities' phones and computers are forever vulnerable to attacks, the common folk must also be wary. No matter how careful you think you were went you sent those "candid" photos to your ex, with a little effort and access to public information, your pictures can be snagged, too. Here's how. Cloud Storage Apple's iCloud service provides a hassle free way to store and transfer photos and other media across multiple devices. While the commercial exemplifies the G-rated community of iPhone users, there are a bunch of non-soccer moms that use their iPhones in a more..."free spirited" mindset. With Photo Stream enabled (requires OS X Lion or later, iOS 5 or later), pictures taken on your iPhone go to directly to your computer and/or tablet, all while being stored in the cloud. If you think the cloud is safe, just ask Gizmodo ...

How to Hack Samsung Phone Screen Lock

I have discovered  another  security flaw in Samsung Android phones. It is possible to completely disable the lock screen and get access to any app - even when the phone is "securely" locked with a pattern, PIN, password, or face detection. Unlike another recently released flaw, this doesn't rely quite so heavily on ultra-precise timing. Video . Of course, if you are unable to download a screen unlocker, this security vulnerability still allows you to  dial any phone number and run any app ! HOWTO From the lock screen, hit the emergency call button. Dial a non-existent emergency services number - e.g. 0. Press the green dial icon. Dismiss the error message. Press the phone's back button. The app's screen will be briefly displayed. This is just about long enough to interact with the app. Using this, you can run and interact with any app / widget / settings menu. You can also use this to launch the dialler. From there, you can dial any phone...