Search Results for: journalists

Police Story: Hacking Team’s Government Surveillance Malware

We analyze a newly discovered Android implant that we attribute to Hacking Team and highlight the political subtext of the bait content and attack context. In addition, we expose the functionality and architecture of Hacking Team’s Remote Control system and operator tradecraft in never-before published detail.

Updates on Bytes for All and the “YouTube Case”

Bytes for All (B4A) is continuing its battle at the Lahore High Court against Internet censorship in Pakistan. The court case has highlighted the ongoing censorship of YouTube in Pakistan, a result of the video sharing site’s refusal to block the controversial “Innocence of Muslims” video.

US-based Servers Part of Hacking Team’s Surveillance Infrastructure

Our analysis traces Hacking Team’s Remote Control System’s (RCS) proxy chains, and finds that dedicated US-based servers are part of the RCS infrastructure implemented by the governments of Azerbaijan, Colombia, Ethiopia, Korea, Mexico, Morocco, Poland, Thailand, Uzbekistan, and the United Arab Emirates in their espionage and/or law enforcement operations.

Hacking Team’s US Nexus

This report outlines an extensive US nexus for a network of servers forming part of the collection infrastructure of Hacking Team’s Remote Control System. The network, which includes data centers across the US, is used to obscure government clients of Hacking Team. It is used by at least 10 countries ranging from Azerbaijan and Uzbekistan to Korea, Poland and Ethiopia. In addition we highlight an intriguing US-only Hacking Team circuit.

Jason Q. Ng in The Wall Street Journal

Citizen Lab Research Fellow Jason Q. Ng wrote a piece in The Wall Street Journal about the alleged China-related censorship on the international version of Bing.com, the search engine operated by Microsoft.