And yes, it was a Frenchman who hacked the Canadians (and the Iranians) in 2009 Bernard Barbier, a former head of the French signals intelligence service, shared a few stories with students of CentraleSupélec, the elite engineering school from which he graduated in 1976, at a symposium this summer.There was that time he caught the U.S. National Security Agency delving into computers at the Elysée Palace, residence of the French president, for example. And flew to Washington to tell them they’d been found out. Or when the Canadians said they — and the Iranians, the Spaniards, the Algerians and a few others — had all been hacked by a Frenchman, and they were totally right, although the French government denied it.These little confessions to the members of a student association at his old school, though, have reached a somewhat larger audience than he may have planned on.The discussion on June 2 was recorded — from the front row, so he must surely have been aware — and found its way onto YouTube later that month. There it lay, largely unremarked, until last weekend when a reporter for French newspaper Le Monde found it and published transcripts of large parts of it. Almost immediately, the original video was taken down. Another has appeared, although the sound has been doctored, purportedly to improve the audio quality. Barbier’s revelations can’t really be called a scoop, as the Canadian and Elysée hacks had been widely reported. They have, however, never been officially confirmed.Until he left to join IT consulting firm Sogeti in 2013, Barbier was head of the signals intelligence division of the French Directorate-General of External Security (DGSE), a post he had occupied since 2006. During that time, he was responsible for transforming the DGSE’s spying activities into a tool for mass surveillance. Before that, he had alternated between roles at the French Commission for Atomic Energy and Alternative Energies (CEA) and other posts at the DGSE. The students quizzed him about two events in particular.The first concerned the run-up to the 2012 French presidential election, when the DGSE found malware on computers at the presidential residence, the Elysée Palace.Two years previously, that same malware had been used in an attack on the European Commission, he told them.By 2012, the DGSE had the means at its disposal to identify the origin of the new attack, Barbier said. He concluded that it could only have been the U.S., and using a technique that, thanks to Edward Snowden, we now know as Quantum Insert.The following year, he said, the new president sent him to Washington to complain to the director of the NSA, Keith Alexander.“We were sure it was them. Alexander wasn’t happy. In the end, he said, ‘Bernard, well done. … You French are good,’ meaning he thought we’d never catch them,” Barbier told the students. Later that year, he heard that Le Monde had obtained an NSA briefing document about him that had been prepared for that meeting and was planning to publish it.Barbier asked an NSA contact in Paris to give him a copy of the briefing document. “He said ‘I can’t, it’s top secret, only President Obama can declassify it.’ I said ‘Don’t mess around, six million Frenchmen are going to see it soon, and I can’t?’ I finally saw it one day before Le Monde published it,” he told the students.Another 2013 story in Le Monde concerned a cyber-attack on Iran’s nuclear installations, which also targeted computers in Canada, Spain, Greece, Norway, Algeria and Ivory Coast. In a note leaked by Snowden, Canadian officials said they were fairly certain that the attack had been mounted by a French intelligence agency. The French government denied any involvement.But at his old school, Barbier said that when the Canadians reverse-engineered the malware, they found that its programmer had nicknamed it “Babar” and signed it “Titi,” two clues that led them to believe he was French. “And he was,” said Barbier, without acknowledging which agency, if any, the programmer worked for.Security researchers later were able to link Babar to other families of malware, known as Bunny, Casper, Dino, NBot and Tafacalou.With so many of these affairs hinted at or revealed by Snowden’s leaks, it was inevitable that one of the students would ask him what he thought of the former NSA contractor turned whistleblower.“Snowden totally betrayed his country,” Barbier said, but with his revelations about allies spying on one another and the hacking by the U.S. of networking equipment from the likes of Cisco Systems, “Snowden helped us, on the whole.” Related content news Multibillion-dollar cybersecurity training market fails to fix the supply-demand imbalance Despite money pouring into programs around the world, training organizations have not managed to ensure employment for professionals, while entry-level professionals are finding it hard to land a job By Samira Sarraf Oct 02, 2023 6 mins CSO and CISO CSO and CISO CSO and CISO news Royal family’s website suffers Russia-linked cyberattack Pro-Russian hacker group KillNet took responsibility for the attack days after King Charles condemned the invasion of Ukraine. By Michael Hill Oct 02, 2023 2 mins DDoS Cyberattacks feature 10 things you should know about navigating the dark web A lot can be found in the shadows of the internet from sensitive stolen data to attack tools for sale, the dark web is a trove of risks for enterprises. Here are a few things to know and navigate safely. By Rosalyn Page Oct 02, 2023 13 mins Cybercrime Security news ShadowSyndicate Cybercrime gang has used 7 ransomware families over the past year Researchers from Group-IB believe it's likely the group is an independent affiliate working for multiple ransomware-as-a-service operations By Lucian Constantin Oct 02, 2023 4 mins Hacker Groups Ransomware Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe