P. 1
New WikiLeaks ’spy files’ shows that the global surveillance industry exists

New WikiLeaks ’spy files’ shows that the global surveillance industry exists

|Views: 68|Likes:
Published by t2p22
New WikiLeaks ’spy files’ shows that the global surveillance industry exists
"The whistle-blowing website Wikileaks has begun releasing sensational information on the multi billion dollar global spying industry. The database contains hundreds of documents shining a light on the methods being used by secret services all over the world. Here’s the video of Wikileaks founder Julian Assange speaking to journalists and students at a press conference at City University London in central London on December 1, 2011. Along with a number of other guest speakers, Mr Assange spoke of the Wikileaks ongoing investigation of surveillance software companies and their alleged use by governments around the world."
New WikiLeaks ’spy files’ shows that the global surveillance industry exists
"The whistle-blowing website Wikileaks has begun releasing sensational information on the multi billion dollar global spying industry. The database contains hundreds of documents shining a light on the methods being used by secret services all over the world. Here’s the video of Wikileaks founder Julian Assange speaking to journalists and students at a press conference at City University London in central London on December 1, 2011. Along with a number of other guest speakers, Mr Assange spoke of the Wikileaks ongoing investigation of surveillance software companies and their alleged use by governments around the world."

More info:

Published by: t2p22 on Dec 04, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/13/2014

pdf

text

original

Wikileaks - The Spy files

http://wikileaks.org/the-spyfiles.html

The Spyfiles
WikiLeaks: The Spy Files Mass interception of entire populations is not only a reality, it is a secret new industry spanning 25 countries It sounds like something out of Hollywood, but as of today, mass interception Translations systems, built by Western intelligence contractors, including for ’political [fr] Wikileaks : Un monde sous opponents’ are a reality. Today WikiLeaks began releasing a database of surveillance hundreds of documents from as many as 160 intelligence contractors in the mass surveillance industry. Working with Bugged Planet and Privacy More articles ... International, as well as media organizations form six countries – ARD in - The Spyfiles - The Map Germany, The Bureau of Investigative Journalism in the UK, The Hindu in India, L’Espresso in Italy, OWNI in France and the Washington Post in the U.S. Wikileaks is shining a light on this secret industry that has boomed since September 11, 2001 and is worth billions of dollars per year. WikiLeaks has released 287 documents today, but the Spy Files project is ongoing and further information will be released this week and into next year. International surveillance companies are based in the more technologically sophisticated countries, and they sell their technology on to every country of the world. This industry is, in practice, unregulated. Intelligence agencies, military forces and police authorities are able to silently, and on mass, and secretly intercept calls and take over computers without the help or knowledge of the telecommunication providers. Users’ physical location can be tracked if they are carrying a mobile phone, even if it is only on stand by. But the WikiLeaks Spy Files are more than just about ’good Western countries’ exporting to ’bad developing world countries’. Western companies are also selling a vast range of mass surveillance equipment to Western intelligence agencies. In traditional spy stories, intelligence agencies like MI5 bug the phone of one or two people of interest. In the last ten years systems for indiscriminate, mass surveillance have become the norm. Intelligence companies such as VASTech secretly sell equipment to permanently record the phone calls of entire nations. Others record the location of every mobile phone in a city, down to 50 meters. Systems to infect every Facebook user, or smart-phone owner of an entire population group are on the intelligence market. Selling Surveillance to Dictators When citizens overthrew the dictatorships in Egypt and Libya this year, they uncovered listening rooms where devices from Gamma corporation of the UK, Amesys of France, VASTech of South Africa and ZTE Corp of China monitored their every move online and on the phone. Surveillance companies like SS8 in the U.S., Hacking Team in Italy and Vupen in France manufacture viruses (Trojans) that hijack individual computers and phones (including iPhones, Blackberries and Androids), take over the device, record its every use, movement, and even the sights and sounds of the room it is in. Other companies like Phoenexia in the Czech Republic collaborate with the military to create speech analysis tools. They identify individuals by gender, age and stress levels and track them based on ‘voiceprints’. Blue Coat in the U.S. and Ipoque in Germany sell tools to governments in countries like China and Iran to prevent dissidents from organizing online. Trovicor, previously a subsidiary of Nokia Siemens Networks, supplied the Bahraini government with interception technologies that tracked human rights activist Abdul Ghani Al Khanjar. He was shown details of personal mobile phone conversations from before he was interrogated and beaten in the winter of 2010-2011. How Mass Surveillance Contractors Share Your Data with the State In January 2011, the National Security Agency broke ground on a $1.5 billion facility in the Utah desert that is designed to store terabytes of domestic and foreign intelligence data forever and process it for years to come. Telecommunication companies are forthcoming when it comes to disclosing client information to the authorities - no matter the country. Headlines during August’s unrest in the UK exposed how Research in Motion (RIM), makers of the Blackberry, offered to help the government identify their clients. RIM has been in similar negotiations to share BlackBerry Messenger data with the governments of India, Lebanon, Saudi Arabia, and the United Arab Emirates. Weaponizing Data Kills Innocent People There are commercial firms that now sell special software that analyze this data and turn it into powerful tools that can be used by military and intelligence agencies. For example, in military bases across the U.S., Air Force pilots use a video link and joystick to fly Predator drones to conduct surveillance over the Middle East and Central Asia. This data is available to Central Intelligence Agency officials who use it to fire Hellfire missiles on targets. The CIA officials have bought software that allows them to match phone signals and voice prints instantly and pinpoint the specific identity and location of individuals. Intelligence Integration Systems, Inc., based in Massachusetts - sells a “location-based analytics” software called Geospatial Toolkit for this purpose. Another Massachusetts company named Netezza, which bought a copy of the software, allegedly reverse engineered the code and sold a hacked version to the Central Intelligence Agency for use in remotely piloted drone aircraft. IISI, which says that the software could be wrong by a distance of up to 40 feet, sued Netezza to prevent the use of this software. Company founder Rich Zimmerman stated in court that his “reaction was one of stun, amazement that they (CIA) want to kill people with my software that doesn’t work."

The Spy Files, files released so far... 287 The Spy Files Index pages Main List Articles Document Type Brochure Catalogue Contract Manual Newsletter Paper Presentation Pricelist Video Company Name ABILITY ADAE - Authority for the Assurance of Communication Security and Privacy (Greece) ALCATEL-LUCENT ALTRON AQSACOM ATIS ATIS Systems GmbH AcmePacket Agnitio Amesys Atis Uher BEA BLUECOAT CCT Cecratech CELLEBRITE CLEARTRAIL COBHAM CRFS CRYPTON-M Cambridge Consultants DATAKOM DATONG DETICA DREAMLAB Delta SPA Dialogic DigiTask EBS Electronic ELAMAN ELTA ETIGROUP ETSI ETSI TC LI ETSI TC-LI EVIDIAN Endace Expert System FOXIT GRIFFCOMM

1 av 6

2011-12-04 19:04

Wikileaks - The Spy files

http://wikileaks.org/the-spyfiles.html

GROUP2000 GTEN GUIDANCE Glimmerglass HP HackingTeam INNOVA SPA INVEATECH IPOQUE IPS Kapow Software LOQUENDO Mantaro Medav NETI NEWPORT NETWORKS NICE NICE Systems NetOptics NetOptics Inc. NetQuest Netronome Nokia Siemens Networks Ntrepid OXYGEN OnPath PACKETFORENSICS PAD PALADION PANOPTECH PLATH Phonexia Pine Digital Security Protei QOSMOS RETENTIA SEARTECH SHOGI SIEMENS SPEI SS8 STRATIGN Scan & Target Septier Septier Communication Ltd. Simena Speech Technology Center TRACESPAN Thales Utimaco Utimaco Safeware AG VUPEN Security VasTech telesoft Service Product ADSL Interception Analysis Software Audio / Video digital recorder Audio Receiver Audio Surveillance Audio Transmitter Capture and Recording of All Traffic Cellphone Forensic Counter Surveillance DR Data Retention Detection Encryption Exploits Fibre Interception GPS Tracker GPS Tracking Software GSM Tactical Interception GSM Transceiver IP DR IP LI IT security & forensic Incident Response Intelligence Analysis Software

Orwell’s World Across the world, mass surveillance contractors are helping intelligence agencies spy on individuals and ‘communities of interest’ on an industrial scale. The Wikileaks Spy Files reveal the details of which companies are making billions selling sophisticated tracking tools to government buyers, flouting export rules, and turning a blind eye to dictatorial regimes that abuse human rights. How to use the Spy Files To search inside those files, click one of the link on the left pane of this page, to get the list of documents by type, company date or tag. To search all these companies on a world map use the following tool from Owni

2 av 6

2011-12-04 19:04

Wikileaks - The Spy files

http://wikileaks.org/the-spyfiles.html

Jammer Systems LI LI DR LI DR DPI ISS Lawful Interception Monitoring Monitoring Center Monitoring Systems PDA Tracking Software Passive Surveillance RCS Trojan Receiver Recording Recoring Satellite Interception Session Border Control Social Network Analysis Software Speech Recognition Storage Strategic / Tactical Interception Monitoring Strategic Internet Monitoring & Recording Strategic Surveillance / Recording TCSM TROJAN TSU training equipment schedule Tactical Tactical Audio Microphone Tactical Audio Receiver Transmitter Tactical Audio Recorder Tactical Audio Transmitter Tactical Audio Video recorder Tactical Camcorder Tactical Covert Audio Transmitter over GSM Tactical Covert Digitl Audio Recorder Tactical Covert GPS Tracker Tactical Covert Microphone Tactical Digital Audio and Video Recorder Tactical GPS Audio Transmitter Tactical GPS Tracking Tactical GSM / 3G Interception Tactical GSM UMTS Satellite Wifi Interception Tactical Microphone Tactical Tracking Tactical Video recorder Tactitcal Tracking Tactitcal Transceiver for audio video Trojans VDSL Interceptor VIP protection Video Surveillance WIFI Intercept recorders surveillance vehicles tracking Tags ABILITY 3G GSM ACME Packet ADAE LI AGNITIO Speech Recognition ALTRON ALTRON AKOR-3 TCSM ALTRON AMUR Recording Interception ALTRON MONITORING ALTRON TRACKING ALTRON WIFI AMESYS AMESYS ADSL Tactical

3 av 6

2011-12-04 19:04

Wikileaks - The Spy files

http://wikileaks.org/the-spyfiles.html

AMESYS COMINT AMESYS STRAGEGIC MASSIVE AMESYS Strategic Interception AMESYS Targetlist AMESYS WIFI AQSACOM AQSACOM LI ATIS ATIS LI Audio Surveillance BEA BEA Tactical BLUECOAT CAMBRIDGECON COMINT CCT CELLEBRITE Mobile Forensic CLEARTRAIL COBHAM COBHAM Repeater COBHAM Tactical LI COMINT CRFS RFEYE CRYPTON-M Strategic Internet Traffic Monitoring Recording Cloud Computing Counter Surveillance DATAKOM LI DATONG DELTA SPA Satellite Interception DETICA DIGITASK DIGITASK LI IP DIGITASK Trojans DIGITASK WIFI DPI DR DREAMLAB LI Detection EBS Electronic GPRS Tracking ELAMAN COMINT ELTA IAI Tactical GSM UMTS Satellite Wifi Interception ENDACE COMPLIANCE ETIGROUP LI ETSI EVIDIAN BULL EXPERT SYSTEM Analytics EXPERT SYSTEM Semantic Analytics Encryption FOXIT FoXReplay Analytics Software FOXIT FoxReplay Covert Analytics Software FOXIT FoxReplay Personal Workstation Analysis Software FOXIT FoxReplay Workstation Protection Analysis Software Forensics GLIMMERGLASS GLIMMERGLASS SIGINT GLIMMERGLASS Strategic / Tactical Interception Monitoring GRIFFCOMM GPS Tracker Tactical GRIFFCOMM Recording GRIFFCOMM Tactical Audio GRIFFCOMM Tactical Audio Microphone GRIFFCOMM Tactical Audio Transmitter GRIFFCOMM Tactical Audio Transmitter Receiver GRIFFCOMM Tactical Audio Video GRIFFCOMM Tactical Audio Video Recorder

4 av 6

2011-12-04 19:04

Wikileaks - The Spy files

http://wikileaks.org/the-spyfiles.html

GRIFFCOMM Tactical Audio Video Transceiver GRIFFCOMM Tactical Camcorder GRIFFCOMM Tactical Covert Microphone GRIFFCOMM Tactical GPS Tracking GRIFFCOMM Tactical Microphone GRIFFCOMM Tactical Tracking GPS GRIFFCOMM Tactical Video recorder GUIDANCE Incident Response HACKINGTEAM RCS TROJAN HACKINGTEAM TROJAN HP Hewlett Packard LI Monitoring DR DPI ISS INNOVA SPA TACTICAL INTREPID Analytics INTREPID OSI INVEATECH LI IP IP Interception IPOQUE DPI IPS IPS Monitoring IT security & forensic Intelligence Interception Jammer Systems KAPOW OSINT LI LI ALCATEL-LUCENT LI DR LI ETSI LI IP LI Monitoring LOQUENDO Speech Recognition MANTARO COMINT MEDAV MONITORING Mobile Mobile Forensic Monitoring Monitoring Systems NETOPTICS COMINT NETOPTICS LI NETQUEST LI NETRONOME Monitoring NEWPORT NETWORKS LI NEWPORT NETWORKS VOIP NICE NICE Monitoring ONPATH LI PACKETFORENSICS PAD PAD Tactical GPS Audio Transmitter PAD Tactical GPS Tracking Audio Transmitter PALADION PANOPTECH PHONEXIA Speech Recognition PLATH Profiling QOSMOS COMINT QOSMOS DPI QOSMOS Identification QOSMOS Monitoring RAYTHEON SCAN&TARGET Analytics SEARTECH TACTICAL AUDIO TRANSMITTER SEARTECH TACTICAL RECEIVER SEPTIER LI SHOGI GSM Interception

5 av 6

2011-12-04 19:04

Wikileaks - The Spy files

http://wikileaks.org/the-spyfiles.html

SIEMENS Monitoring Center SIGINT SIMENA LI SMS SPEI GPS Tracking Software SPEI Tactical Audio Transmitter SPEI Tactical Receiver SPEI Tactical Tracking GPS SPEI Tactical Transceiver SPEI Tracking Software SS8 IP Interception SS8 Intelligence Analysis Software SS8 Social Network Analysis Software STC Speech Recognition STRATIGN Strategic Interception TELESOFT DR TELESOFT IP INTERCEPT THALES Strategic Monitoring TRACESPAN TRACESPAN FIBRE INTERCEPTION TRACESPAN Monitoring TROJANS TSU training equipment schedule Targeting UTIMACO DR UTIMACO LI UTIMACO LI DPI UTIMACO LI Monitoring VASTECH Strategic Interception / Recording / Monitoring VASTECH ZEBRA VIP protection VOIP VUPEN EXPLOITS TROJANS Video Surveillance recorders surveillance vehicles tracking by Date of Document unspecified 2006 2007 2008 2009 2010 2011 by Date of Release 2011-12-01 Our Partners OWNI Bureau of Investigative Journalism Privacy International L'Expresso La Repubblica ARD The Hindu The Washington Post Community resources Supporters Support Wikileaks Follow us on Twitter Twitter this Follow us on Facebook
courage is contagious

6 av 6

2011-12-04 19:04

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->