Very interesting stuff. Guess we all need to remember that there is no
privacy any more!


http://qz.com/80153/36-countries-now-use-finfishers-governmental-it-intrusion-and-remote-monitoring-solutions/

36 governments (including Canada’s) are now using sophisticated software to
spy on their citizens
 By Leo Mirani <http://qz.com/author/lmiraniqz/>
@lmirani<http://twitter.com/lmirani> May
1, 2013
 FinFisher's satisfied customers. Citizen Lab


A new report <https://citizenlab.org/2013/04/for-their-eyes-only-2/> from
Citizen Lab, a Canadian research center, shows surveillance software sold
by FinFisher, a “governmental IT intrusion”
company<http://www.finfisher.com/FinFisher/en/index.php>owned by the
UK-registered Gamma International, is now active in 36
countries. That’s up from the 25 countries reported two months
ago<https://citizenlab.org/2013/03/you-only-click-twice-finfishers-global-proliferation-2/>
.

Gamma’s product, which it sells exclusively to governments, infects
computers and mobile
phones<http://www.bloomberg.com/news/2012-08-29/spyware-matching-finfisher-can-take-over-iphone-and-blackberry.html>through
devious means. These include posing
as Mozilla 
Firefox<https://blog.mozilla.org/blog/2013/04/30/protecting-our-brand-from-a-global-spyware-provider/>and
the (frankly quite elegant) ruse of using a “right-to-left
override<https://krebsonsecurity.com/2011/09/right-to-left-override-aids-email-attacks/>,”
which is typically used to render writing in Arabic but can work in any
language. This helps it foil users trained to look out for suspicious file
extensions by hiding, say, an “.exe,” and making the file appear to be an
image with a .jpg extension instead.

Once the file has been installed on a machine, the “command-and-control
server,” which does exactly what it sounds like it would, can be used to
monitor the infected computer.

In the past, intelligence agencies have used the program
to infiltrate “internet cafes in critical areas in order to monitor them
for suspicious activity, especially Skype communication” and to target
members of organized crime groups, according to a FinFisher
brochure<http://wikileaks.org/spyfiles/files/0/299_GAMMA-201110-FinFisher_Product_Portfolio-en.pdf>released
by
Wikileaks<http://wikileaks.org/spyfiles/list/tags/gamma-finfisher-trojan.html>
.

The product may also have been used in the past by repressive nations
hoping to monitor dissidents. In his new book, Eric Schmidt mentions “a
raid on the Egyptian state security building after the country’s 2011
revolution [which] produced explosive copies of contracts with private
outlets, including an obscure British firm that sold online spyware to the
Mubarak regime.” Gamma denied that it had supplied the regime with its
program <http://www.bbc.co.uk/news/technology-14981672>, which its agents
were hawking for a piddling $560,000.

Gamma is far from the only such company. Governmental surveillance is a
thriving market—worth about $5 billion
annually<http://online.wsj.com/article/SB10001424052970203611404577044192607407780.html>,
according to the Wall Street Journal. Firms such as the German
Trovicor<http://surveillance.rsf.org/en/trovicor/>and
Vupen <https://twitter.com/cBekrar>, from France, also deal in “government
grade exploits.”

The business is necessarily discreet, but it’s still legitimate. The use of
such software is legal in many countries. None of which makes a
presentation called “Governmental IT Intrusion: Applied Hacking Techniques
Used by Governments <http://www.issworldtraining.com/ISS_WASH/index.htm>”
any less creepy.
_______________________________________________
Futurework mailing list
[email protected]
https://lists.uwaterloo.ca/mailman/listinfo/futurework

Reply via email to