organization:citizen lab

  • WhatsApp voice calls used to inject Israeli spyware on phones | Financial Times
    https://www.ft.com/content/4da1117e-756c-11e9-be7d-6d846537acab
    https://www.ft.com/__origami/service/image/v2/images/raw/http%3A%2F%2Fprod-upp-image-read.ft.com%2Fa5e1805e-75a7-11e9-be7d-6d846537acab?s

    A vulnerability in the messaging app WhatsApp has allowed attackers to inject commercial Israeli spyware on to phones, the company and a spyware technology dealer said.

    WhatsApp, which is used by 1.5bn people worldwide, discovered in early May that attackers were able to install surveillance software on to both iPhones and Android phones by ringing up targets using the app’s phone call function.

    The malicious code, developed by the secretive Israeli company NSO Group, could be transmitted even if users did not answer their phones, and the calls often disappeared from call logs, said the spyware dealer, who was recently briefed on the WhatsApp hack.

    WhatsApp is too early into its own investigations of the vulnerability to estimate how many phones were targeted using this method, a person familiar with the issue said.

    #israël #piraterie

    • repris par Le Monde sans #paywall

      Une faille de sécurité de WhatsApp utilisée pour installer un logiciel espion israélien
      https://www.lemonde.fr/pixels/article/2019/05/14/une-faille-de-securite-de-whatsapp-utilisee-pour-installer-un-logiciel-espio

      WhatsApp a annoncé avoir corrigé la faille, et plusieurs ONG veulent porter plainte contre l’éditeur du logiciel, NSO group.

      Une importante faille de sécurité touchant la fonction « appel téléphonique » de WhatsApp a été corrigée lundi 13 mai, a annoncé l’entreprise, propriété de Facebook. La faille pouvait permettre d’installer, à l’insu de l’utilisateur, un logiciel espion sur son téléphone, si l’utilisateur ne décrochait pas lorsqu’il recevait l’appel « infecté ».

      Difficile à détecter, la faille de sécurité en question ne pouvait être trouvée que par des équipes de haut niveau.

      Selon le Financial Times, cette faille a été exploitée pour installer les logiciels espions Pegasus de l’entreprise israélienne NSO Group, qui fournit ses logiciels aux forces de sécurité de nombreux pays dans le monde, y compris à des régimes peu ou pas démocratiques. Selon l’ONG antisurveillance Citizen Lab, un avocat militant pour la défense des droits de l’homme a été visé dimanche 12 mai par Pegasus. Le programme permet notamment de collecter la géolocalisation de sa cible, de lire ses messages et e-mails, et de déclencher à son insu le micro et la caméra de son téléphone.

      « Le groupe NSO vend ses produits à des gouvernements connus pour leurs violations répétées des droits de l’homme, et leur fournit les outils pour espionner leurs opposants et critiques », écrit l’ONG Amnesty International dans un communiqué publié ce 13 mai. « En août 2018, un employé d’Amnesty International a été ciblé par Pegasus, comme l’ont été des militants et des journalistes en Arabie saoudite, au Mexique et aux Emirats arabes unis. »

      L’ONG a annoncé qu’elle allait déposer une plainte contre le ministère de la défense israélien, autorité de tutelle de NSO Group, « qui a ignoré les monceaux de preuves liant NSO Group à des attaques contre des défenseurs des droits de l’homme. […] Tant que des produits comme Pegasus sont vendus sans contrôle effectif, les droits et la sécurité des salariés d’Amnesty International, des journalistes et des dissidents dans le monde entier sont en danger ». Plusieurs associations israéliennes ont déposé des plaintes similaires.

      Sans citer le nom de NSO Group, WhatsApp a confirmé que la faille avait été exploitée par « une entreprise privée dont il est connu qu’elle travaille avec ces gouvernements pour installer des logiciels espions sur des téléphones mobiles ». « Nous avons briefé un certain nombre d’organisations de défense des droits de l’homme à ce sujet », a déclaré WhatsApp.

      Les utilisateurs de WhatsApp – 1,5 milliard de personnes dans le monde, selon l’entreprise – sont incités à mettre à jour leur application si elle ne s’est pas faite automatiquement.

    • Israeli Firm Tied to Tool That Uses WhatsApp Flaw to Spy on Activists
      https://www.nytimes.com/2019/05/13/technology/nso-group-whatsapp-spying.html

      SAN FRANCISCO — An Israeli firm accused of supplying tools for spying on human-rights activists and journalists now faces claims that its technology can use a security hole in WhatsApp, the messaging app used by 1.5 billion people, to break into the digital communications of iPhone and Android phone users.

      Security researchers said they had found so-called spyware — designed to take advantage of the WhatsApp flaw — that bears the characteristics of technology from the company, the NSO Group.

  • How a Canadian permanent resident and Saudi Arabian dissident was targeted with powerful spyware on Canadian soil
    https://citizenlab.ca/2018/10/how-a-canadian-permanent-resident-and-saudi-arabian-dissident-was-targete

    Following a Citizen Lab report that identified the presence of NSO’s Pegasus spyware technology in Quebec, researchers contacted Omar Abdulaziz, a Saudi Arabian dissident and Canadian permanent resident who has long been critical of the regime in Riyadh. After an extensive investigation, they discovered that his phone had been targeted with this powerful spyware and the operators of the technology were linked to Saudi Arabia’s government and security (...)

    #NSO #smartphone #Pegasus #spyware #activisme #surveillance #écoutes

  • Bots at the Gate A Human Rights Analysis of Automated Decision. Making in Canada’s Immigration and Refugee System

    A new report from the Citizen Lab and the International Human Rights Program at the University of Toronto’s Faculty of Law investigates the use of artificial intelligence and automated decision-making in Canada’s immigration and refugee systems. The report finds that use of automated decision-making technologies to augment or replace human judgment threatens to violate domestic and international human rights law, with alarming implications for the fundamental human rights of those subjected to these technologies.

    The ramifications of using automated decision-making in the sphere of immigration and refugee law and policy are far-reaching. Marginalized and under-resourced communities such as residents without citizenship status often have access to less robust human rights protections and less legal expertise with which to defend those rights. The report notes that adopting these autonomous decision-making systems without first ensuring responsible best practices and building in human rights principles at the outset may only exacerbate pre-existing disparities and can lead to rights violations including unjust deportation.

    Since at least 2014, Canada has been introducing automated decision-making experiments in its immigration mechanisms, most notably to automate certain activities currently conducted by immigration officials and to support the evaluation of some immigrant and visitor applications. Recent announcements signal an expansion of the uses of these technologies in a variety of immigration decisions that are normally made by a human immigration official. These can include decisions on a spectrum of complexity, including whether an application is complete, whether a marriage is “genuine”, or whether someone should be designated as a “risk.”

    The report provides a critical interdisciplinary analysis of public statements, records, policies, and drafts by relevant departments within the Government of Canada, including Immigration, Refugees and Citizenship Canada, and the Treasury Board of Canada Secretariat. The report additionally provides a comparative analysis to similar initiatives occurring in similar jurisdictions such as Australia and the United Kingdom. In February, the IHRP and the Citizen Lab submitted 27 separate Access to Information Requests and continue to await responses from Canada’s government.

    The report concludes with a series of specific recommendations for the federal government, the complete and detailed list of which are available at the end of this publication. In summary, they include recommendations that the federal government:

    1. Publish a complete and detailed report, to be maintained on an ongoing basis, of all automated decision systems currently in use within Canada’s immigration and refugee system, including detailed and specific information about each system.

    2. Freeze all efforts to procure, develop, or adopt any new automated decision system technology until existing systems fully comply with a government-wide Standard or Directive governing the responsible use of these technologies.

    3. Adopt a binding, government-wide Standard or Directive for the use of automated decision systems, which should apply to all new automated decision systems as well as those currently in use by the federal government.

    4. Establish an independent, arms-length body with the power to engage in all aspects of oversight and review of all use of automated decision systems by the federal government.

    5. Create a rational, transparent, and public methodology for determining the types of administrative processes and systems which are appropriate for the experimental use of automated decision system technologies, and which are not.

    6. Commit to making complete source code for all federal government automated decision systems—regardless of whether they are developed internally or by the private sector—public and open source by default, subject only to limited exceptions for reasons of privacy and national security.

    7. Launch a federal Task Force that brings key government stakeholders alongside academia and civil society to better understand the current and prospective impacts of automated decision system technologies on human rights and the public interest more broadly.


    https://citizenlab.ca/2018/09/bots-at-the-gate-human-rights-analysis-automated-decision-making-in-canad
    #frontières #surveillance #migrations #catégorisation #tri #Droits_Humains #rapport #Canada #réfugiés #protection_des_données #smart_borders #frontières_intelligentes #algorithme #automatisme
    signalé par @etraces sur seenthis

  • Bots at the Gate
    https://citizenlab.ca/2018/09/bots-at-the-gate-human-rights-analysis-automated-decision-making-in-canad

    A Human Rights Analysis of Automated Decision Making in Canada’s Immigration and Refugee System A new report from the Citizen Lab and the International Human Rights Program at the University of Toronto’s Faculty of Law investigates the use of artificial intelligence and automated decision-making in Canada’s immigration and refugee systems. The report finds that use of automated decision-making technologies to augment or replace human judgment threatens to violate domestic and international (...)

    #algorithme #frontières #migration #discrimination #solutionnisme #CitizenLab

  • THE RISE OF THE CYBER-MERCENARIES
    What happens when private firms have cyberweapons as powerful as those owned by governments?
    https://foreignpolicy.com/2018/08/31/the-rise-of-the-cyber-mercenaries-israel-nso
    https://foreignpolicymag.files.wordpress.com/2018/08/1_cyber_weapon_final1.jpg?w=1024&h=1536&crop=0,0,0

    he first text message showed up on Ahmed Mansoor’s phone at 9:38 on a sweltering August morning in 2016. “New secrets about torture of Emiratis in state prisons,” it read, somewhat cryptically, in Arabic. A hyperlink followed the words. Something about the number and the message, and a similar one he received the next day, seemed off to Mansoor, a well-known human rights activist in the United Arab Emirates. He resisted the impulse to click on the links.

    Instead, Mansoor sent the notes to Citizen Lab, a research institute based at the University of Toronto specializing in human rights and internet security. Working backward, researchers there identified the hyperlinks as part of a sophisticated spyware program built specifically to target Mansoor. Had he clicked on the links, the program would have turned his phone into a “digital spy in his pocket,” Citizen Lab later wrote in a report—tracking his movements, monitoring his messages, and taking control of his camera and microphone.

    But the big revelation in the report wasn’t so much the technology itself; intelligence agencies in advanced countries have developed and deployed spyware around the world. What stood out was that Citizen Lab had traced the program to a private firm: the mysterious Israeli NSO Group. (The name is formed from the first initials of the company’s three founders.) Somehow, this relatively small company had managed to find a vulnerability in iPhones, considered to be among the world’s most secure cellular devices, and had developed a program to exploit it—a hugely expensive and time-consuming process. “We are not aware of any previous instance of an iPhone remote jailbreak used in the wild as part of a targeted attack campaign,” the Citizen Lab researchers wrote in their report.

  • How WeChat Filters Images for One Billion Users
    https://citizenlab.ca/2018/08/how-wechat-filters-images-for-one-billion-users

    With over 1 billion monthly users, WeChat boasts the title of most popular chat application in China and the fourth largest in the world. However, a new report by Citizen Lab researchers reveals exactly how the platform is able to censor images sent by these billion users. Building on previous research which shows that WeChat censors sensitive images, this new report demonstrates the technical underpinnings of how this censorship operates. Specifically, findings show that WeChat uses two (...)

    #WeChat #algorithme #censure #reconnaissance #surveillance #web #CitizenLab

  • Amnesty International alleges Israeli spyware linked to Saudi Arabia - Middle East - Jerusalem Post
    https://www.jpost.com/Middle-East/Amnesty-International-alleges-Israeli-spyware-linked-to-Saudi-Arabia-563963

    The report released Wednesday coincided with a second report from Citizen Lab, an interdisciplinary lab that deals with information technology and human rights, which examined the suspicious messages and corroborated Amnesty’s findings. “The SMS messages contain domain names pointing to websites that appear to be part of NSO Group’s Pegasus infrastructure.”

    NSO Group “develops mobile device surveillance software. The software called Pegasus developed by the company can be used to record conversations and gain access to photos, text messages and websites viewed from a smartphone,” according to Bloomberg.

    The company was founded in 2010 and is based in Herzliya, Israel. Calcalist reported that NSO’s co-founder has asserted the company only sells to “government bodies that are defined as legitimate.”

    The malicious messages arrived in June and appeared to target human rights activists. The messages ostensibly provided information about a protest or court case that lured the potential victim to click on a link. One message even mimicked an Amnesty report title about Saudi Arabia’s lifting the ban on women driving.

    #israël la seule démocratie post-moderne au Moyen-Orient

  • Egypt
    Study: Blocked access to websites, ad redirects and cryptocurrency mining in Egypt traced to Sandvine’s PacketLogic devices | MadaMasr
    https://www.madamasr.com/en/2018/03/12/feature/politics/study-blocked-access-to-websites-ad-redirects-and-cryptocurrency-mining-in

    The technology used to block access to Mada Masr and hundreds of websites, blogs, proxy and virtual private networks (VPNs) on Egypt’s service providers is also being used to redirect traffic to revenue-generating content, such as advertising pages and cryptocurrency mining scripts, according to a report published by The University of Toronto’s Citizen Lab.

    The Egyptian advertisement and cryptocurrency redirect scheme, which Citizen Lab researchers have dubbed “AdHose,” is an attempt to “covertly raise money,” the Friday report, titled Bad Traffic, asserted.

    Beyond identifying the specifics of the revenue-generation scheme, the researchers also developed a digital fingerprint for the deep packet inspection (DPI) observed in Egypt and Turkey and matched it to a second-hand PacketLogic device produced by Sandvine/Procera Networks, one of several facts that they argue points to the US company’s implication in malicious activity.

  • Une technologie canadienne utilisée pour espionner en Turquie
    http://www.lapresse.ca/international/europe/201803/09/01-5156678-une-technologie-canadienne-utilisee-pour-espionner-en-turquie.ph

    Le matériel informatique d’une compagnie canadienne est utilisé pour espionner les internautes le long de la frontière entre la Turquie et la Syrie, révèle un rapport rendu public vendredi. Le document ajoute que des forces kurdes alliées aux États-Unis ont possiblement été ciblées. Le groupe de défense des droits en ligne Citizen Lab affirme que la surveillance électronique est effectuée grâce aux appareils PacketLogic de la firme Procera - une entreprise de Fremont, en Californie, qui a récemment été (...)

    #écoutes #surveillance #web #CitizenLab #Procera_ #Sandvine_ #TurkTelecom #PacketLogic

  • Etudiants disparus au Mexique : les experts internationaux ciblés par un logiciel espion
    http://www.lemonde.fr/ameriques/article/2017/07/10/etudiants-disparus-au-mexique-les-experts-internationaux-cibles-par-un-logic

    Ils ont notamment enquêté sur la disparition de 43 étudiants en 2014, et accusé le gouvernement d’avoir fait obstruction à leur travail. Les autorités mexicaines ont-elles outrepassé leurs pouvoirs pour contrecarrer une enquête ? Lundi 10 juillet, les chercheurs canadiens du Citizen Lab, un laboratoire de l’université de Toronto spécialisé dans la surveillance numérique, ont révélé des tentatives d’espionnage visant des experts indépendants enquêtant notamment sur le gouvernement. Après la disparition de (...)

    #NSO #Pegasus #spyware #exportation #sécuritaire #activisme #surveillance #écoutes (...)

    ##CitizenLab

  • Reckless Exploit : Mexican Journalists, Lawyers, and a Child Targeted with NSO Spyware
    https://citizenlab.org/2017/06/reckless-exploit-mexico-nso

    In the past five years it has become increasingly clear that civil society is under threat from the misuse of powerful spyware tools exclusively sold to governments. Research has repeatedly shown how governments around the world use digital spying tools designed for criminal investigations and counterintelligence to target journalists, human rights defenders, and others. In August 2016, Citizen Lab released a report uncovering how United Arab Emirates (UAE) activist Ahmed Mansoor was (...)

    #NSO #spyware #journalisme #surveillance #CitizenLab

  • Surveillance des citoyens : « Nous sommes dans le noir »
    http://www.lapresse.ca/actualites/national/201611/04/01-5037712-surveillance-des-citoyens-nous-sommes-dans-le-noir.php

    Outre les journalistes, combien de personnes sont ciblées au Canada par des mandats permettant aux policiers de traquer leurs métadonnées ? Impossible de le savoir. Alors que Bell refuse de le dévoiler, Rogers et Telus ne spécifient pas la nature des quelque 80 000 mandats ou ordonnances de la cour auxquels ils obtempèrent chaque année. « Nous sommes dans le noir, et c’est un problème très sérieux », dénonce Christopher Parsons, chercheur au Citizen Lab de la Munk School of Global Affairs de Toronto. « (...)

    #Bell #Rogers #Telus #écoutes #surveillance #métadonnées

  • Apple corrige de graves failles de sécurité sur iOS grâce à un militant des droits de l’homme
    http://www.lemonde.fr/pixels/article/2016/08/26/apple-corrige-de-graves-failles-de-securite-sur-ios-grace-a-un-militant-des-

    Collaboration #Israël #EAU : voilà qui intéressera @gonzo

    Ahmed Mansoor, un activiste émirati défenseur des droits de l’homme, [...] militant de 46 ans a reçu le 10 août sur son iPhone plusieurs messages contenant des liens, promettant des informations sur des abus commis par le régime émirati. Intrigué, il décide de ne pas cliquer et de les transférer au Citizen Lab, une entité de l’université de Toronto (Ontario, Canada) spécialisée en cybersécurité.

    Le Citizen Lab a remonté la trace du programme espion jusqu’à NSO Group, une firme israélienne spécialisée dans les solutions d’écoute pour téléphone mobile à destination des Etats et fondée par un ancien membre des hackeurs d’élite de l’armée israélienne. Réaliser ce type de piratage de haut vol a un coût, et il est très élevé. Une faille « zero day » pour iOS s’est récemment monnayée pour 1 million de dollars (900 000 euros).

    L’identité et l’activité de la cible, le prix qu’il a fallu dépenser et le fournisseur du logiciel espion ne laissent guère place au doute, selon Citizen Labs : le commanditaire est très certainement le gouvernement émirati.

  • The UAE Spends Big on Israeli Spyware to Listen In on a Dissident | Foreign Policy
    https://foreignpolicy.com/2016/08/25/the-uae-spends-big-on-israeli-spyware-to-listen-in-on-a-dissident

    In attacking the iPhone of human rights defender Ahmed Mansour, the Emirati government reportedly bought a rare, zero-day, Israeli exploit of Apple’s iOS.

    When a government seeks to rein in a political opponent by listening in on his calls, reading his text messages, and spying on his meetings, how do they go about doing so? In the case of the United Arab Emirates and pro-democracy activist Ahmed Mansoor, they sent him a short text message.

    New secrets about torture of Emiratis in state prisons,” the Aug. 10 and 11 SMS messages to Mansoor read. The texts included a link, and had Mansoor clicked it, his phone would have turned into a powerful surveillance tool for an entity that researchers believe is the Emirati government. #Pegasus, the software used against Mansoor, allows its operator to record phone calls and intercept text messages, including those made or sent on nominally encrypted apps such as Viber and WhatsApp. It can mine contact books and read emails. The software can also track its subject’s movements and even remotely turn on the phone’s camera and microphone.
    […]
    It is unclear how much money the UAE purportedly paid to the shadowy Israeli firm that created Pegasus, the #NSO_Group, but Marczak said it was likely that the firm’s contract with the Gulf nation was in the range of $10 million to $15 million. The size of that contract, he added, would depend on how many targets the UAE would have hired NSO to surveil.

    NSO reportedly sells its surveillance tools to governments around the world, and the UAE appears to be one of its biggest clients, judging by the company’s use of Emirati domains. Citizen Lab also documented the use of Pegasus in countries like Mexico, where it was used to target a Mexican journalist.

    The Pegasus software utilized a chain of three zero days in Apple’s mobile operating system to turn iPhones into highly capable, multifunction surveillance tools.

  • Apple corrige de graves failles de sécurité sur #iOS grâce à un militant des #droits_de_l’homme
    http://www.lemonde.fr/pixels/article/2016/08/26/apple-corrige-de-graves-failles-de-securite-sur-ios-grace-a-un-militant-des-

    A partir de jeudi 25 août, les détenteurs d’appareils Apple pourront installer une mise à jour de iOS, le logiciel qui équipe iPhone et autres iPad, corrigeant trois importantes failles de sécurité. Elles ont été découvertes par Ahmed Mansoor, un activiste émirati défenseur des droits de l’homme.

    Comme le racontent le site spécialisé Motherboard et le New York Times, ce militant de 46 ans a reçu le 10 août sur son iPhone plusieurs messages contenant des liens, promettant des informations sur des abus commis par le régime émirati. Intrigué, il décide de ne pas cliquer et de les transférer au Citizen Lab, une entité de l’université de #Toronto spécialisée en cybersécurité.

    #Émirats_arabes_unis #sécurité_informatique #Israël #espionnage #roem

  • #Psiphon | Uncensored Internet access for Windows and Mobile
    https://psiphon3.com

    Psiphon is a circumvention tool from Psiphon Inc. that utilizes VPN, SSH and HTTP Proxy technology to provide you with uncensored access to Internet content. Your Psiphon client will automatically learn about new access points to maximize your chances of bypassing censorship.

    Psiphon is designed to provide you with open access to online content. Psiphon does not increase your online privacy, and should not be considered or used as an online security tool.

    Je relis de vieux textes (10 ans) et les références comme les outils sont encore là ! #2006
    http://www.lemonde.fr/technologies/article/2006/02/17/des-fissures-dans-la-web-muraille-de-chine_742651_651865.html

    PSIPHON SQUATTE LES FLUX FINANCIERS

    Mais comment fonctionne ce système ? L’internaute chinois n’a pas besoin d’installer quoi que ce soit. Simplement ce système de contournement en ligne permet à l’internaute d’interroger de façon transparente et cryptée par SSL (Secure Sockets Layers) et le port 443 (port sécurisé destiné au transit des données financières) les serveurs « amis » d’un pays censuré. Ces serveurs amis analyseront la demande, et renverront les réponses non censurées mais toujours de façon cryptée et sans traces sur l’ordinateur de l’internaute. Et comme le précise le professeur Ronald Deibert, directeur du Citizen Lab de Toronto, le pays qui souhaite interdire l’accès à ces informations ne pourra le faire que s’il se passe aussi des flux de transactions financières.

    Le lancement de Psiphon est imminent, et profitera non seulement aux internautes chinois, mais également à tous ceux qui subissent une censure sur le Web comme par exemple les internautes de Corée du Nord, d’Iran ou encore d’Arabie saoudite.

    groumpf, j’avais cru que c’était en license libre, ma non.

    #surveillance

  • 36 governments (including Canada’s) are now using sophisticated software to spy on their citizens - Quartz
    http://qz.com/80153/36-countries-now-use-finfishers-governmental-it-intrusion-and-remote-monitoring-

    http://qzprod.files.wordpress.com/2013/05/theireyesmap-web.jpg?w=880

    A new report from Citizen Lab, a Canadian research center, shows surveillance software sold by FinFisher, a “governmental IT intrusion” company owned by the UK-registered Gamma International, is now active in 36 countries. That’s up from the 25 countries reported two months ago.

    Gamma’s product, which it sells exclusively to governments, infects computers and mobile phones through devious means. These include posing as Mozilla Firefox and the (frankly quite elegant) ruse of using a “right-to-left override,” which is typically used to render writing in Arabic but can work in any language. This helps it foil users trained to look out for suspicious file extensions by hiding, say, an “.exe,” and making the file appear to be an image with a .jpg extension instead.

    Once the file has been installed on a machine, the “command-and-control server,” which does exactly what it sounds like it would, can be used to monitor the infected computer.
    ...

    Gamma is far from the only such company. Governmental surveillance is a thriving market—worth about $5 billion annually, according to the Wall Street Journal. Firms such as the German Trovicor and Vupen, from France, also deal in “government grade exploits.”

    The business is necessarily discreet, but it’s still legitimate. The use of such software is legal in many countries. None of which makes a presentation called “Governmental IT Intrusion: Applied Hacking Techniques Used by Governments” any less creepy.

  • Spyware used by governments poses as Firefox, and Mozilla is angry | Ars Technica
    http://arstechnica.com/information-technology/2013/05/spyware-used-by-governments-poses-as-firefox-and-mozilla-is-angry

    The Citizen Lab research team has provided us with samples from the following three instances that demonstrate how this misuse of our brand, trademarks and public trust is a designed feature of Gamma’s spyware products and not unique to a single customer’s deployment:

    A spyware attack in Bahrain aimed at pro-democracy activists;
    The recent discovery of Gamma’s spyware apparently in use amidst Malaysia’s upcoming General Elections; and
    A promotional demo produced by Gamma.

    Un commentaire :

    Good news about the Gamma/FinFisher GNU violation: The FSF will take a look at enforcing the license ;)
    https://twitter.com/Voulnet/status/329729311210872832

  • Behind Blue Coat: Investigations of commercial filtering in Syria and Burma – The Citizen Lab
    http://citizenlab.org/2011/11/behind-blue-coat

    Since August 2011, Citizen Lab researchers have been conducting technical research into the presence of Blue Coat devices in Syria and in other countries under the rule of authoritarian regimes. While Blue Coat’s most recent admissions confirm a number of our findings, our research has also raised additional questions relevant to the use of Blue Coat technology for purposes that compromise internationally-recognized human rights. Our findings include the presence of additional Blue Coat devices active in Syria, as well as the presence of a number of Blue Coat devices in Burma.

    #surveillance #espionnage #syrie #birmanie