P. 1
For Their Eyes Only: The Commercialization of Digital Spying

For Their Eyes Only: The Commercialization of Digital Spying

Ratings: (0)|Views: 70 |Likes:
This report written by Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri & John Scott-Railtonm, of Citizen Lab (http://citizenlab.org), features new findings, as well as consolidating a year of research on the commercial market for offensive computer network intrusion capabilities developed by Western companies.

The research found that in 36 countries governments use hacking tools on the net.
This report written by Morgan Marquis-Boire, Bill Marczak, Claudio Guarnieri & John Scott-Railtonm, of Citizen Lab (http://citizenlab.org), features new findings, as well as consolidating a year of research on the commercial market for offensive computer network intrusion capabilities developed by Western companies.

The research found that in 36 countries governments use hacking tools on the net.

More info:

Categories:Types, Research
Published by: Sergio Octavio Contreras on May 03, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

01/18/2014

pdf

text

original

 
Table of Contents
IntroductIon 1
Acknowledgements 3Authors 4Authorship Credits 5
From BahraIn WIth Love 6
Introduction 7Delivery 8Installation 10Obfuscation and Evasion 14Data Harvesting and Encryption 16Command and Control 21
Conclusion about Malware Identication 23
Recommendations 26Acknowledgments 26
the Smart Phone Who Loved me 27
Introduction 28Mobile Trojans 29Command and Control Server Scanning Results 57Detail of Observed Servers 58Conclusions and Recommendations 59Acknowledgments 60Appendix A 61
BackdoorS are Forever 62
Introduction 63Recent Background: Da Vinci and Mamafakinch.com 64UAE Human Rights Activist Compromised 68Analysis of “veryimportant.doc” 70Command and Control 77
Identication 78
Recommendations 81Acknowledgments 82
 You onLY cLIck tWIce 83
Summary of Key Findings 84Background and Introduction 85Finisher: March 2013 Global Scan 88Ethiopia and Vietnam: In-depth Discussion of New Samples 92Brief Discussion of Findings 97Acknowledgments 99
For theIr eYeS onLY 100
New Findings in Brief 101A Note on Reactions to Our March 13, 2013 Report 102Findings 104Concluding Remarks 112
taBLeS
Table 1: New Servers 58
Table 2: Conrmed Rapid 7 Servers 58
maPS
Map 1: Map of global Finsher Proliferation 88Map 2: Newly Discovered and Previously Identied Command and Control Servers 105
 
1
FOR THEIR EYES ONLY: The Commercialization of Digital Spying
INTRODUCTIONooo
Electric eye, in the skyFeel my stare, always there
 
– J
udas
P
riest
, e
lectric
e
ye
(1982)
I’m not following you, I’m looking for you. There’s a big difference.
 
– M
artin
s
tett
, t
he
c
onversation
(1974)
In the late 1990s in a central Auckland warehouse
, I an New Zealand’s st
1
cypepunanonymous emaile togete wit some iends. Anonymous emailes made it possibleto send encypted, anonymous e-mails; te idea was tat tis would guad ee speecom te cilling eects o suveillance. In ou moe optimistic moments, we elt tat teIntenet would opeate as a “Libeation Tecnology,” acilitating ee and open discouse ina manne tat could natually... only be positive. O couse, tis type o tecnology wouldneed to be nutued, and people would need secue communications in ode to empowete type o discussion wic was essential to eedom and tanspaency in te InomationAge. At te time tis tecnology was not widely used, oweve, te views o te nascentcypepun scene wee in some ways igly pescient.Social media, pivacy enancing tecnologies, and te global digital commons gaduallycame to play an integal pat in global politics. Yet te suveillance capabilities tat luedwitin Intenet wouldn’t be publicly undestood o yeas. As te wold’s communicationsmoved om telepone and a to email, cat and VOIP, we witnessed te ise o “MassiveIntecept” tecnology and its ubiquitous integation into moden netwo acitectue.Wile tis acilitated wide-scale monitoing o communications tat tavesed te Intenet,epanded lawul intecept statutes allowed o inceased govenment powes to accesspovide-eld use data.Te notion tat people ave a igt to secue communications as also fouised andbecome mainsteam. Te majoity o lage online sevices povides now use tanspotencyption to secue te email and cat convesations o tei uses and seveal onlinecompanies povide encypted voice communication as a ee sevice. In addition to tis, tegeneal populaity o tid paty secuity tools as tived. Neveteless, canges in tecaacte o digital suveillance ave quietly paalleled tese advances in Intenet secuity.
1 Probably.

Activity (2)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->