• Home
  • Posts RSS
  • Comments RSS
  • Edit
Blue Orange Green Pink Purple

Wikileaks reveal that governments use malware for surveillance

By Ryan Paul



The latest round of documents published by Wikileaks offers a rare glimpse into the world of surveillance products. The collection—which Wikileaks calls the Spy Files—includes confidential brochures and slide presentations that companies use to market intrusive surveillance tools to governments and law enforcement agencies.
A report that Wikileaks published alongside the documents raises concern about the growing use use of mass surveillance tools that indiscriminately monitor and analyze entire populations. The group also points out that some of products described in the documents are sold to authoritarian regimes, which use them to hunt and track political dissidents.



The details revealed by Wikileaks echo a recent report by The Wall Street Journal (WSJ) that discussed the surveillance industry. The publication analyzed approximately 200 documents from 36 separate companies as part of a special investigative project called The Surveillance Catalog. The material released by Wikileaks corroborates much of what the WSJ reported, but includes a broader range of material.
The documents published by Wikileaks include 287 files that describe products from 160 companies. The group says that these files are only the first set of a larger collection and that more will be published in the future. The project is being carried out in collaboration with activist groups such as Privacy International and press organizations such as the Bureau of Investigative Journalism and the Washington Post.
"[The surveillance industry] is, in practice, unregulated. Intelligence agencies, military forces, and police authorities are able to silently, and on mass, and [sic] secretly intercept calls and take over computers without the help or knowledge of the telecommunication providers," wrote Wikileaks in its report. "In the last ten years systems for indiscriminate, mass surveillance have become the norm."
Surveillance products revealed in the Spy Files cover a wide range of different communication technologies. Many are designed to circumvent standard privacy and security safeguards in mainstream consumer technology products so that they can collect as much data as possible. Some are even deliberately programmed to operate like malware.
One example of commercial malware designed to aid criminal investigations is DigiTask's remote forensic software, which is described in a confidential slide presentation that Wikileaks included in its document collection. DigiTask is a German company that characterizes itself as a market leader in building special telecommunications systems for law enforcement agencies. The company promises that its software—which is designed to work on Windows, Linux, Mac OS X, and some smartphones—can circumvent SSL encryption by intercepting the keys on the local system.
The software will capture the content of encrypted communications—including instant messaging conversations, e-mails, and the user's Web activity—and will relay the data to the party conducting surveillance. The software also includes key logging, remote file access, and has the ability to capture screenshots. The company cites "zero day exploits" and "social engineering" in a bulleted list of ways that its remote forensic software can be installed on the computer of a surveillance target.
Source : http://arstechnica.com/business/news/2011/12/wikileaks-docs-reveal-that-governments-use-malware-for-surveillance.ars


Read More | Posted by summy | edit post
Newer Post Older Post Home

Erie Blog


Tweet
Get floating
share buttons

Awesome Blog

all about Awesome Thing and cool stuff..

Powered by Blogger.

Subscribe To

Posts
Atom
Posts
Comments
Atom
Comments

Labels

  • IT/Computer (26)
  • Website 網頁/Internet (22)
  • Headline News (21)
  • google (13)
  • Tips and Trick (12)
  • Movie (8)
  • Gadget stuff (7)
  • android (4)

Blog Archive

  • ▼ 2011 (28)
    • ▼ December (18)
      • Best jQuery Plugins of 2011
      • Finding Your Passion in Web Design
      • How to Get Money from Founders Fund
      • Solution to Contacts Appearing Offline on Windows ...
      • How to Install Ubuntu as a dual-boot with Windows ...
      • How i met your mother season 7 episode 12 - Sympho...
      • Siri Alternative Apps For Android
      • Advised Hack Brings Siri to Jailbroken iPhone 4
      • 5 Cloud Names That Could Be Part of M&A Wave
      • 'Counter-Strike: Global Offensive' Heading to Cons...
      • BlackBerry Playbook costing RIM $485 million
      • Wikileaks reveal that governments use malware for...
      • Google: The New Online Shipping King
      • Worldwide Browser Market Share
      • Apple Blames Glitch for Siri’s Anti-Abortion Bias
      • Introducing the new Google bar
      • Web Designers Forum that you Shouldn’t Missed
      • Researchers find big leaks in pre-installed Androi...
    • ► November (10)
  • ► 2010 (5)
    • ► March (2)
    • ► January (3)
  • ► 2009 (8)
    • ► December (8)
free counters

My Bloglist

  • Saynotes
    If Superheroes Had Part-Time Jobs
  • Big Bare Foot
    Diddy - Dirty Money - Coming Home ft. Skylar Grey
  • Laugh is not crime
    Daily jokes December 6
Get this




  • Home
  • Posts RSS
  • Comments RSS
  • Edit

© Copyright Awesome Blog. All rights reserved.
Blogger Templates | Free Wordpress Templates. presents HD TV Watch Futurama Online.

Back to Top