Voice of America covers Citizen Lab research
An article on commercial spyware in Voice of America cited Citizen Lab research into ‘lawful intercept’ spyware such as FinSpy.
An article on commercial spyware in Voice of America cited Citizen Lab research into ‘lawful intercept’ spyware such as FinSpy.
Citizen Lab’s Bill Marczak helped Privacy International scan Ethiopian refugee Tadesse Biru Kersmo’s computer, and they found traces that showed FinSpy had been operating in June 2012 over two days while he was in the UK.
A new Citizen Lab report has found that Canada-based Netsweeper filtering products have been identified on three ISPs in Somalia.
This report maps out covert surveillance networks of “proxy servers” used to launder data that RCS exfiltrates from infected computers, through third countries, to an “endpoint,” which we believe represents the spyware’s government operator.
This post is the second in a series of posts that focus on the global proliferation and use of Hacking Team’s RCS spyware, which is sold exclusively to governments.
What to do about the growing “Digital Arms” market? The spread of technologies like mobile phones and social networks have enabled corporations and governments to eavesdrop on a mass scale. Fulfilling the demand for surveillance tools, a range of companies now sell surveillance backdoors and vulnerabilities, described as “lawful intercept” software.
This post will summarize Citizen Lab’s prior research on surveillance in Indonesia, including documented evidence of FinFisher command and control servers and Blue Coat Systems devices on IPs owned by Indonesian ISPs. It will then identify recent trends in Indonesian surveillance practices, laws, and regulations that provide potential avenues for further research.
Citizen Lab is pleased to announce the release of “For Their Eyes Only: The Commercialization of Digital Spying.” The report features new findings, as well as consolidating a year of our research on the commercial market for offensive computer network intrusion capabilities developed by Western companies.
This post describes the results of a comprehensive global Internet scan for the command and control servers of FinFisher’s surveillance software. It also details the discovery of a campaign using FinFisher in Ethiopia that may have been used to target individuals linked to an opposition group. Additionally, it provides examination of a FinSpy Mobile sample found in the wild, which appears to have been used in Vietnam.
This report, written and coordinated by Citizen Lab Technical Advisor Morgan Marquis-Boire, analyzes several samples we believe to be mobile variants of the FinFisher Spy Kit targeting iPhone, Android, Blackberry, Windows Mobile and Symbian platforms. It is a follow-on to a previous research brief, From Bahrain with Love: FinFisher's Spy Kit Exposed?, that analyzed several pieces of malware targeting Bahraini dissidents.