Search Results for: ethiopia

PI legal action informed by Citizen Lab’s FinFisher research

Privacy International has filed a criminal complaint with the UK’s National Cyber Crime Unit requesting police investigation into allegations that the computer and telecommunications data of Bahraini democracy activists were subject to unlawful surveillance, which cites reports authored by Citizen Lab on the presence of FinFisher in Bahrain, as well the global proliferation of the software.

Schrodinger’s Cat Video and the Death of Clear-Text

This report provides a detailed analysis of two products sold for facilitating targeted surveillance known as network injection appliances. These products allow for the easy deployment of targeted surveillance implants and are being sold by commercial vendors to countries around the world. Compromising a target becomes as simple as waiting for the user to view unencrypted content on the Internet.

Police Story: Hacking Team’s Government Surveillance Malware

We analyze a newly discovered Android implant that we attribute to Hacking Team and highlight the political subtext of the bait content and attack context. In addition, we expose the functionality and architecture of Hacking Team’s Remote Control system and operator tradecraft in never-before published detail.

Canadian Cyberbullying Legislation Threatens to Further Legitimize Malware Sales

By getting into the malware business the federal and potentially provincial governments of Canada would be confronted with an ongoing reality: is the role of government to maximally protect its citizens, including from criminals leveraging vulnerabilities to spy on Canadians, or is it to partially protect citizens so long as such protections do not weaken the state’s ability to secure itself from persons suspected of violating any Act of Parliament?

CIPESA releases report on Internet Freedoms in East Africa

Cyber Stewards Network (CSN) partner Collaboration on International ICT Policy in East and Southern Africa (CIPESA) released a report outlining the policies and practices surrounding Internet freedom in East Africa. Titled “The State of Internet Freedoms in East Africa,” the release of the report has drawn key individuals from the continent’s ICT industry to Kampala, Uganda for a forum.

US-based Servers Part of Hacking Team’s Surveillance Infrastructure

Our analysis traces Hacking Team’s Remote Control System’s (RCS) proxy chains, and finds that dedicated US-based servers are part of the RCS infrastructure implemented by the governments of Azerbaijan, Colombia, Ethiopia, Korea, Mexico, Morocco, Poland, Thailand, Uzbekistan, and the United Arab Emirates in their espionage and/or law enforcement operations.

Hacking Team’s US Nexus

This report outlines an extensive US nexus for a network of servers forming part of the collection infrastructure of Hacking Team’s Remote Control System. The network, which includes data centers across the US, is used to obscure government clients of Hacking Team. It is used by at least 10 countries ranging from Azerbaijan and Uzbekistan to Korea, Poland and Ethiopia. In addition we highlight an intriguing US-only Hacking Team circuit.