This letter is in response to a statement issued by Hacking Team that has recently come to our attention, concerning Citizen Lab’s report titled “Police Story: Hacking Team’s Government Surveillance Malware” (June 24, 2014).
Posts tagged “Surveillance”
The May 2014 coup d’etat in Thailand was the 19th coup attempt in the country’s history. It stands out from previous coups due to the military junta’s focus on information controls. In this report we document the results of network measurements to determine how the Internet is currently being filtered in Thailand and discuss other forms of information control implemented in the coup’s aftermath.
Post-doctoral Fellow Christopher Parsons spoke with a variety of media organizations over the past month about his research and pressing events that have taken place in the Canadian telecommunications landscape. He generally discussed lawful access to telecommunications data, the release of transparency reports by Canadian Internet service providers, and the unveiling of an access to personal information tool.
By getting into the malware business the federal and potentially provincial governments of Canada would be confronted with an ongoing reality: is the role of government to maximally protect its citizens, including from criminals leveraging vulnerabilities to spy on Canadians, or is it to partially protect citizens so long as such protections do not weaken the state’s ability to secure itself from persons suspected of violating any Act of Parliament?
In this post we analyze the partial disclosures concerning Canada’s federal agencies’ domestic telecommunications surveillance practices. We argue that key federal agencies remain unaccountable to Parliamentarians and the Canadian public alike, and that accountability measures are urgently needed for Canadians to understand the extent of their federal government’s surveillance activities.
On January 20, 2014 the Citizen Lab along with leading Canadian academics and civil liberties groups asked Canadian telecommunications companies to reveal the extent to which they disclose information to state authorities. This post summarizes and analyzes the responses from the companies, and argues that the companies have done little to ultimately clarify their disclosure policies. We conclude by indicating the subsequent steps in this research project.
Our analysis traces Hacking Team’s Remote Control System’s (RCS) proxy chains, and finds that dedicated US-based servers are part of the RCS infrastructure implemented by the governments of Azerbaijan, Colombia, Ethiopia, Korea, Mexico, Morocco, Poland, Thailand, Uzbekistan, and the United Arab Emirates in their espionage and/or law enforcement operations.