Gamma Group - FinFisher: Mass interception of entire populations is not only a reality, it is a secret industry spanning countries round the world.
FinSpy surveillance software, for example, marketed worldwide to law enforcement agencies as a way to monitor “criminals,” is widely used by repressive governments, including the U.S., to spy on human rights groups and dissidents.
It sounds like something out of Hollywood, but as of today, mass interception systems, built by Western intelligence contractors, including for ’political opponents’ are a reality. WikiLeaks began releasing a database of hundreds of documents from as many as 160 intelligence contractors in the mass surveillance industry. Working with Buggedplanet and Privacy International, as well as media organizations form six countries – ARD in Germany, The Bureau of Investigative Journalism, The Hindu in India, L’Espresso in Italy, OWNI in France and the Washington Post in the U.S. Wikileaks is shining a light on this secret industry that has boomed since September 11, 2001 and is worth billions of dollars per year.
These documents reveal how, as the intelligence world has privatised, US, EU and developing world intelligence agencies have rushed into spending millions on next-generation mass surveillance technology to target communities, groups and whole populations.
International surveillance companies are based in the more technologically sophisticated countries, and they sell their technology on to every country of the world. This industry is, in practice, unregulated. Intelligence agencies, military forces and police authorities are able to silently, and on mass, and secretly intercept calls and take over computers without the help or knowledge of the telecommunication providers. Users’ physical location can be tracked if they are carrying a mobile phone, even if it is only on stand by.
But the WikiLeaks Spy files are more than just about ’good Western countries’ exporting to ’bad developing world countries’. Western companies are also selling a vast range of mass surveillance equipment to Western intelligence agencies. In traditional spy stories, intelligence agencies like MI5 bug the phone of one or two people of interest. In the last 14 years systems for indiscriminate, mass surveillance have become the norm. Intelligence companies such as Vastech secretly sell equipment to permanently record the phone calls of entire nations. Others record the location of every mobile phone in a city, down to 50 meters. Systems to infect every Facebook user, or smart-phone owner of an entire population group are on the intelligence market.
Selling Surveillance to Dictators
When citizens overthrew the dictatorships in Egypt and Libya this year, they uncovered listening rooms where devices from Gamma corporation of the UK, Amesys of France, VASTech of South Africa and ZTE Corp. of China monitored their every move online and on the phone.
Surveillance companies like SS8 in the U.S., Hacking Team in Italy and VUPEN in France manufacture viruses (Trojans) that hijack individual computers and phones (including iPhones, Blackberries and Androids), take over the device, record its every use, movement, and even the sights and sounds of the room it is in. Other companies like Phonexia in the Czech Republic collaborate with the military to create speech analysis tools. They identify individuals by gender, age and stress levels and track them based on ‘voiceprints’. Blue Coat in the U.S. and Ipoque in Germany sell tools to governments in countries like China and Iran to prevent dissidents from organizing online.
Trovicor, previously a subsidiary of Nokia Siemens Networks, supplied the Bahraini government with interception technologies that tracked human rights activist Abdul Ghani Al Khanjar. He was shown details of personal mobile phone conversations from before he was interrogated and beaten in the winter of 2010-2011.
How Mass Surveillance Contractors Share Your Data with the State
In January 2011, the National Security Agency broke ground on a $1.5 billion facility in the Utah desert that is designed to store terabytes of domestic and foreign intelligence data forever and process it for years to come.
Telecommunication companies are forthcoming when it comes to disclosing client information to the authorities – no matter the country. Headlines during years unrest in the UK exposed how Research in Motion (RIM), makers of the Blackberry, offered to help the government identify their clients. RIM has been in similar negotiations to share BlackBerry Messenger data with the governments of India, Lebanon, Saudi Arabia, and the United Arab Emirates.
Weaponizing Data Kills Innocent People
There are commercial firms that now sell special software that analyze this data and turn it into powerful tools that can be used by military and intelligence agencies.
For example, in military bases across the U.S., Air Force pilots use a video link and joystick to fly Predator drones to conduct surveillance over the Middle East and Central Asia. This data is available to Central Intelligence Agency officials who use it to fire Hellfire missiles on targets.
The CIA officials have bought software that allows them to match phone signals and voice prints instantly and pinpoint the “specific identity and location” of individuals. Intelligent Integration Systems, Inc., based in Massachusetts – sells a “location-based analytics” software called Geospatial Toolkit for this purpose. Another Massachusetts company named Netezza, which bought a copy of the software, allegedly reverse engineered the code and sold a hacked version to the Central Intelligence Agency for use in remotely piloted drone aircraft.
IISI, which says that the software could be wrong by a distance of up to 40 feet, sued Netezza to prevent the use of this software. Company founder Rich Zimmerman stated in court that his “reaction was one of stun, amazement that they (CIA) want to kill people with my software that doesn’t work.”
Orwell’s World
Across the world, mass surveillance contractors are helping intelligence agencies spy on individuals and ‘communities of interest’ on an industrial scale.
The Wikileaks Spy Files reveal the details of which companies are making billions selling sophisticated tracking tools to government buyers, flouting export rules, and turning a blind eye to dictatorial regimes that abuse human rights.
How to use the Spy Files
To search inside those files, click one of the link on the left pane of this page, to get the list of documents by type, company date or tag.
To search all these companies on a world map use the following tool from Owni
Spy Files Documents:
Surveillance Industry Documents WikiLeaks Counter Intelligence Unit (WLCIU) Location Tracking
Document Title | Company | Year | Document Type | Tags | Target System | Country Codes |
---|---|---|---|---|---|---|
10 GigaBit Fiber Taps | NETOPTICS | - | Brochure | NETOPTICS | - | US |
10/100 Port Aggregator Tap | NETOPTICS | - | Brochure | NETOPTICS | - | US |
10/100/1000 Tap Network Link | NETOPTICS | - | Brochure | NETOPTICS | - | US, FR |
10/100BaseT Tap | NETOPTICS | - | Brochure | NETOPTICS | - | US |
1U Modular Rackmount Surveillance Simplified | Packet Forensics | 2011 | Brochure | PACKET FORENSICS, Internet Monitoring, Lawful Interception, Data Retention, VOIP COMINT, HARDWARE | - | US |
2 Mercure | OCKHAM | 2011 | Brochure | OCKHAM, Mass Monitoring, Analysis Software, Traffic Data Processing, SOFTWARE | - | FR |
4×1 GigaBit Copper In-Line Regeneration Tap | NETOPTICS | - | Brochure | NETOPTICS | - | US |
5-Series Small Devices, Big Opportunities | Packet Forensics | 2011 | Brochure | PACKET FORENSICS, SIGINT, Tactical Internet Monitoring | - | US |
A30 Excellence in Telephone Interception Systems | AMECS | 2011 | Brochure | AMECS, Analysis Software, Deep Packet Inspection, Mass Monitoring, Monitoring Centre, PRODUCT, SOFTWARE, HARDWARE | Phone Network | FR |
Aappro Security and defence: Company Brochure | AAPPRO | 2011 | Brochure | AAPPRO, Covert Surveillance Devices, Tactical GSM Interception, Tactical Interception Devices | GSM | GB |
About BrightPlanet | BrightPlanet | 2011 | Catalogue | BRIGHTPLANET, Analysis Software, SOFTWARE | - | US |
Advanced Cyber Infrastructure Protection | Cassidian (EADS) | 2011 | Brochure | CASSIDIAN (EADS), Deep Packet Inspection, Internet Monitoring | - | DE |
Advertisement System InPoint SMS | NeoSoft | - | Data Sheet | NEOSOFT, Tactical GSM Interception | - | CH |
An Introduction to Morpho Face Investigate Pilot | Safran | 2011 | Brochure | SAFRAN, Facial Recognition, CCTV, SOFTWARE | - | FR |
An overview of FTS products & services | Forensic Telecommunications Services | 2011 | Brochure | FORENSIC TELECOMMUNICATIONS SERVICES, Forensics, Cell Phone Forensics, COMINT, SMS Monitoring, SIM Card Forensics, Thuraya Monitoring, Iridium Monitoring, Tactical GSM Interception, PRODUCT, SERVICE | - | GB |
Analyst´s Notebook – Esri Edition Foundation Module | i2 Group | 2011 | Brochure | I2 GROUP, Social Network Analysis, Semantic Analysis, Analysis Software, SOFTWARE | - | US |
Analyst´s Notebook 8 | i2 Group | 2010 | Brochure | I2 GROUP, Analysis Software, SOFTWARE | - | US |
ARES Systeme d´interception de Bandes C/L Thuraya | RHEINMETALL DEFENCE | - | Brochure | RHEINMETALL DEFENCE, Tactical Satellite Interception | - | DE |
Argos Thuraya Interception L-Band System | RHEINMETALL DEFENCE | - | Brochure | RHEINMETALL DEFENCE | - | DE |
Artemis – Systeme d´Interception de bandes L/L Thuraya | RHEINMETALL DEFENCE | - | Brochure | RHEINMETALL DEFENCE, Tactical Satellite Interception | - | DE |
ATIS Presentation | ATIS Uher | - | Presentation | ATIS UHER, Monitoring Centre | - | DE, TN |
Audioscope – Audio Capturing and Recording System | Cobham | 2011 | Brochure | COBHAM, Recognition, Covert Surveillance Devices, Audio Forensics, Tactical Interception Devices | - | DK |
Automated Data Retention for Telcommunication Service Providers | UTIMACO | 2010 | Brochure | UTIMACO, Data Retention | Phone Network, Mobile Phone Network | DE, GB |
Automatic Speaker Identification System (ASIS) | Agnitio | 2011 | Brochure | AGNITIO, Audio Forensics, Biometrics, Speaker Identification, Strategic Interception | Phone Network | GB |
Batvox export 1:1 voice biometric tool | Agnitio | 2011 | Brochure | AGNITIO, Speaker Identification, Audio Forensics | Phone Network | ES |
Beowulf II Board Audio Recorder | Cobham | 2011 | Data Sheet | COBHAM, COBHAM BEOWULF II BOARD Covert Surveillance Devices | - | DK |
Beowulf II Bubble Gum Covert ìdrop and walk audio recorder | Cobham | 2011 | Data Sheet | COBHAM, Covert Surveillance Devices, Tactical Interception Devices | - | DK |
Beowulf II Solid state stand alone recorder | Cobham | 2011 | Data Sheet | COBHAM, Covert Surveillance Devices, Tactical Interception Devices, HARDWARE | - | DK |
Bifrost Wireless HIgh Speed USB Modem for Freja Video records | Cobham | 2011 | Data Sheet | COBHAM, Covert Surveillance Devices, CCTV, Tactical Interception Devices, Covert Surveillance Devices | - | DK |
Biometric Speaker Spotting System (BS3) | Agnitio | 2011 | Brochure | AGNITIO, COMINT, Audio Forensics, Speech Recognition, Speaker Identification, Strategic Interception | Phone Network | ES |
Biometrics | Ernst & Young | 2011 | Brochure | ERNST & YOUNG, Biometrics, SERVICE | - | GB |
BONGO monitoring system | NETI | 2011 | Brochure | NETI, Lawful Interception, Strategic Interception, VOIP COMINT, Network Recording, Traffic Data Processing, Monitoring Centre, HARDWARE | - | HU |
Brochure Security & Policing Exhibition – UK Innovation for Global Security | ADS UKTI Defence & Secuity Organisation | 2012 | Brochure | ADS UKTI DEFENCE & SECUITY ORGANISATION | - | GB |
BS3 Strategic – Biometric Speaker Spotting System: Strategic Edition | Agnitio | 2011 | Brochure | AGNITIO, Mass Monitoring, Audio Forensics, VOIP COMINT, Speaker Identification, Speech Recognition, Strategic Interception | Phone Network | ES |
Building your OSINT Capabililty | Kapow Software | 2011 | Brochure | KAPOW SOFTWARE, Social Network Analysis, Mass Monitoring, Analysis Software | Twitter, Facebook | GB, US |
CAPsure 256 Element Square Microphone Array | Cobham | 2011 | Data Sheet | COBHAM, COBHAM CAPSURE Covert Surveillance Devices, Audio Forensics | - | DK |
Case History | EXPERTSYSTEM | - | Brochure | EXPERTSYSTEM, Semantic Analysis | - | US, IT |
Case history eni | EXPERTSYSTEM | - | Brochure | EXPERTSYSTEM, Semantic Analysis | - | US, IT |
Case Study: COsmOs | EXPERTSYSTEM | - | Brochure | EXPERTSYSTEM, Audio Forensics, Speaker Identification, Speech Recognition, Semantic Analysis | - | US, IT |
Case study: Network Intelligence for Lawful Interception | QOSMOS | 2011 | Brochure | QOSMOS, Lawful Interception, Mass Monitoring, gbps, p2p, Network Recording, Deep Packet Inspection, VOIP COMINT | E-Mail, Instant Messaging | FR, US, SG |
Catalogue of Tactical Communications and Surveillance Product Short Form | Cobham | 2011 | Catalogue | COBHAM, Covert Surveillance Devices, Audio Forensics, Tactical Interception Devices, Location Tracking | - | DK |
Catalogue Security & Policing Exhibition | ADS UKTI Defence & Security Organisation | 2012 | Catalogue | ADS UKTI DEFENCE & SECURITY ORGANISATION | - | GB |
Cell phone detection systems | Berkeley Varitronics Systems | 2011 | Brochure | BERKELEY VARITRONICS SYSTEMS, SIGINT, Cell Phone Detection | - | US |
CellNet Drop 2 Interception System | ERICSSON | 2000 | Training Material | ERICSSON, Monitoring Centre | - | SE |
Cellphone detector Wolfhound | Berkeley Varitronics Systems | 2011 | Brochure | BERKELEY VARITRONICS SYSTEMS, SIGINT, Cell Phone Detection | - | US |
Centuare | Elektron | - | Brochure | ELEKTRON, Lawful Interception, Location Tracking | - | FR |
CIGOTO SEE From search to knowing | EXPERTSYSTEM | - | Video | EXPERTSYSTEM, Semantic Analysis | - | US, IT |
Cogito Answers | EXPERTSYSTEM | - | Brochure | EXPERTSYSTEM, Audio Forensics, Speaker Identification, Speech Recognition, Semantic Analysis | - | US, IT |
Cogito Categorizer Cogito Discover | EXPERTSYSTEM | - | Brochure | EXPERTSYSTEM, Audio Forensics, Speaker Identification, Speech Recognition, Semantic Analysis | - | US, IT |
COGITO Intelligence Platform | EXPERTSYSTEM | - | Brochure | EXPERTSYSTEM, Semantic Analysis, Text mining | - | US, IT |
Cogito Mapping Concepts | EXPERTSYSTEM | - | Video | EXPERTSYSTEM, Analysis Software, Location Tracking, Semantic Analysis | - | US, IT |
Cogito Monitor | EXPERTSYSTEM | - | Brochure | EXPERTSYSTEM, Audio Forensics, Speaker Identification, Speech Recognition, Text mining, Semantic Analysis | - | US, IT |
Cogito Monitor Voice of the Customer | EXPERTSYSTEM | - | Video | EXPERTSYSTEM, Semantic Analysis | - | US, IT |
Cogito Search Explore Engine | EXPERTSYSTEM | - | Brochure | EXPERTSYSTEM, Audio Forensics, Speaker Identification, Speech Recognition, Semantic Analysis | - | US, IT |
COGITO SEE Finding out who did what | EXPERTSYSTEM | - | Video | EXPERTSYSTEM, Semantic Analysis | - | US, IT |
COGITO Semantic Technology | EXPERTSYSTEM | - | Video | EXPERTSYSTEM, Semantic Analysis | - | US, IT |
COGITO Twitter Semantic Search | EXPERTSYSTEM | - | Video | EXPERTSYSTEM, Semantic Analysis | US, IT | |
COGITO Understanding Words | EXPERTSYSTEM | - | Video | EXPERTSYSTEM, Semantic Analysis | - | US, IT |
Cogito: Solutions for Semantic Publishing | EXPERTSYSTEM | - | Brochure | EXPERTSYSTEM, Semantic Analysis | - | US, IT |
Combatting the Taliban in Central Helmand, Afghanistan | i2 Group | 2010 | Brochure | I2 GROUP, Analysis Software | - | US |
COMINT Technology | Innov Telek IZT | 2011 | Presentation | INNOV TELEK IZT, COMINT | - | DE |
CommsAudit Corporate Overview | CommsAudit | 2011 | Brochure | COMMSAUDIT, SIGINT | - | GB |
Completing the Investigative Solution Surveillance Simplified | Packet Forensics | 2011 | Brochure | PACKET FORENSICS, Internet Monitoring, Lawful Interception, Mass Monitoring, Deep Packet Inspection, hundreds of probes, Network Recording, Traffic Data Processing, VOIP COMINT, Tactical Internet Monitoring, Data Retention | Instant Messaging, GMail, Hotmail | US |
Construiere une plateform d´access pour la surveillance | NETOPTICS | - | Presentation | NETOPTICS | - | US, FR |
Corporate Brochure | EXPERTSYSTEM | - | Brochure | EXPERTSYSTEM, Semantic Analysis, Audio Forensics, Analysis Software, Speech Recognition, Speaker Identification | - | US, IT |
Corporate Overview Advanced Surveillance | Digital Barriers | 2011 | Brochure | DIGITAL BARRIERS, Covert Surveillance Devices, Tactical Interception Devices | - | GB, FR, US, AE, SG |
Countering Thread Surveillance, Interception, Detection, Forensics, CyberSecurity | Roke Manor Research | 2011 | Brochure | ROKE MANOR RESEARCH, Lawful Interception, COMINT, Image Recognition, Internet Monitoring, Tactical Interception Devices | - | GB |
CYBELS CYBer Expertise for Leading Security | THALES | 2010 | Brochure | THALES, Analysis Software | - | FR |
Cyber | i2 Group | 2010 | Brochure | I2 GROUP, Analysis Software | - | US |
Cybersecurity overview | THALES | 2011 | - | THALES, Monitoring Centre | Internet Usage | FR |
Cyveillance Corporate Security | Cyveillance | 2011 | Brochure | CYVEILLANCE, Internet Monitoring, Mass Monitoring, OSINT | - | US |
Data acquisition from devices | Spektor Forensic Intelligence | 2011 | Brochure | SPEKTOR FORENSIC INTELLIGENCE, Analysis Software, Cell Phone Forensics | - | GB |
Data Monitoring Switch | NETOPTICS | - | Brochure | NETOPTICS, HARDWARE | - | US |
Director Data Monitoring Switch Datasheet | NETOPTICS | - | Brochure | NETOPTICS | - | US, FR |
DPX Network Probe | IPOQUE | - | Data Sheet | IPOQUE, Deep Packet Inspection | - | - |
DRS Data Retention Suite | UTIMACO | 2010 | Brochure | UTIMACO, Data Retention | Phone Network, Mobile Phone Network | DE, GB |
DRS Paquete de retencion de datos | UTIMACO | 2011 | Brochure | UTIMACO, Data Retention | Phone Network, Mobile Phone Network | DE, GB |
Electronic Blitz | Glimmerglass Networks | 2011 | Brochure | GLIMMERGLASS NETWORKS, Network Recording, Deep Packet Inspection, Mass Monitoring, Internet Monitoring, Fiber-optic Interception, Strategic Interception | - | US |
Electronic Surveillance, Counter-Surveillance & RF Jamming | Eskan | 2011 | Brochure | ESKAN, Audio Forensics, Cell Phone Detection, Location Tracking, Tactical Interception Devices, Covert Surveillance Devices | - | GB |
Electronic Warfare: COMINT + COMMS/ESM Intelligence Generation & Fusion Systems | MEDAV | 2009 | Presentation | MEDAV, COMINT | - | - |
Enabling Seucire Internet OperationsION Internet Operations Network | NTREPID | 2011 | Brochure | NTREPID, OSINT, Social Network Analysis | - | US |
Evident | ETIgroup | 2011 | Catalogue | ETIGROUP, Analysis Software, COMINT, Data Retention, Data Mining, Deep Packet Inspection, Internet Monitoring, Lawful Interception, SOFTWARE | - | DK, GB, US |
Examining SSL-Encrypted Communiations | Metronome | 2011 | Brochure | METRONOME, COMINT, Deep Packet Inspection, Mass Monitoring, SSL, PRODUCT, HARDWARE | - | US, GB, MY, ZA, CN |
Exploits for Law Enforcement | VuPen | 2011 | Brochure | VUPEN, Exploits | - | FR |
Facebook Relations Analysis Target Profiling Genesi Platform | IPS Intelligence | - | Brochure | IPS INTELLIGENCE, Analysis Software, Social Network Analysis | IT | |
Famille de produits Observer | ELEXO | - | Brochure | ELEXO | - | FR |
FCO Services: Secure Mobile Solutions | FCO Services | 2011 | Brochure | FCO SERVICES, FCO SERVICES SECURE MOBILE SOLUTIONS | - | GB |
Finfisher FINFly ISP 2.0 Infrastructure Product Training | Gamma | 2010 | Training Material | GAMMA, Trojans, Strategic Infection | Internet Usage | DE, GB |
FinFisher Pricing | Dreamlab | 2011 | Pricelist | DREAMLAB, Trojans, Strategic Infection | Internet Usage | CH, DE, GB |
Freja Video Recorders | Cobham | 2011 | Data Sheet | COBHAM, Covert Surveillance Devices, CCTV, HARDWARE | - | DK |
FSNtracks | Freightwatch Security Net | 2011 | Brochure | FREIGHTWATCH SECURITY NET, Location Tracking, SOFTWARE | - | IE, US |
FX to TX Tap | NETOPTICS | - | Brochure | NETOPTICS, HARDWARE | - | US |
GAJT GPS Anti-Jam protection | Qinetiq | 2011 | Brochure | QINETIQ, Location Tracking, HARDWARE | - | GB, CA |
Geo F5 GPS tracker | Freightwatch Security Net | 2011 | Brochure | FREIGHTWATCH SECURITY NET, Location Tracking | - | IE, US |
GeoTime 5 | OCULUS | 2011 | Brochure | OCULUS, Visualisation, Social Network Analysis | - | US |
Geotime 5 – Instantly Reveal Movement Patterns Over Time | OCULUS | 2010 | Brochure | OCULUS, Location Tracking | - | US |
Giga Stor | ELEXO | - | Brochure | ELEXO | - | FR |
Gigabit and 10 GbE Network Analysis | ELEXO | - | Brochure | ELEXO | - | FR |
GigaBit Copper Tap | NETOPTICS | - | Brochure | NETOPTICS | - | US, FR |
GigaBit Fiber Taps | NETOPTICS | - | Brochure | NETOPTICS, HARDWARE | - | US |
Gigabit Observer | NETWORK Instruments | - | Brochure | NETWORK INSTRUMENTS | - | US |
Gnomes Professional audio recorders | Speech Technology Centre | 2011 | Brochure | SPEECH TECHNOLOGY CENTRE, SPEECH TECHNOLOGY CENTRE GNOME RANGE OF RECORDERS Covert Surveillance Devices | - | RU, DE |
GSM/UMTS detection and location system | QCC Interscan | 2011 | Brochure | QCC INTERSCAN, Cell Phone Detection, Location Tracking | - | GB |
Hinton 5000 Interceptor Passive probe | Telesoft Technologies | 2011 | Brochure | TELESOFT TECHNOLOGIES, Mass Monitoring, Lawful Interception, SMS Monitoring, SIGINT, COMINT, Data Retention | GSM, IMSI, SMS, IMEI, CDMA | GB, US, IN |
Hinton Abis Probe | Telesoft Technologies | 2011 | Brochure | TELESOFT TECHNOLOGIES, Location Tracking, Mass Monitoring, GSM, UMTS, CDMA | - | GB, US, IN |
Hinton Mobile Data Probe | Telesoft Technologies | 2011 | Brochure | TELESOFT TECHNOLOGIES, Lawful Interception, Mass Monitoring, GSM, UMTS, CDMA | - | GB, US, IN |
iBase 8 | i2 Group | 2011 | Brochure | I2 GROUP, Analysis Software, SOFTWARE | - | US |
IFS-8000 Intelligence Fusion System | MEDAV | 2011 | Brochure | MEDAV, Analysis Software, Monitoring Centre, Visualisation, SOFTWARE | - | DE |
iLink Agg | NETOPTICS | - | Brochure | NETOPTICS | - | US |
INCA Repeater – Four Channel Remote Controlled Repeater | Cobham | 2011 | Data Sheet | COBHAM, COBHAM INCA REPEATER Covert Surveillance Devices | - | DK |
Infrastructure protection services | Cassidian | 2011 | Brochure | CASSIDIAN, CCTV, COMINT, Analysis Software | - | DE |
Intelligent systems | THALES | 2010 | Brochure | THALES, Location Tracking | - | FR |
InterCom (Thor) | Cobham | 2011 | Data Sheet | COBHAM, COBHAM INTERCOM (THOR) Covert Surveillance Devices | - | DK |
Internet monitoring suite | ClearTrail | 2011 | Brochure | CLEARTRAIL, Mass Monitoring, Deep Packet Inspection, COMINT, SIGINT, Tactical Internet Monitoring, Network Recording, Lawful Interception | - | IN |
Intervention & Mobile Laboratory | TRACIP | 2011 | Brochure | TRACIP, Forensics | - | FR |
ION – Research & Targeting | NTREPID | 2011 | Brochure | NTREPID, Analysis Software | - | US |
ION Internet Operations Network | NTREPID | 2011 | Brochure | NTREPID, OSINT, HUMINT | - | US |
ION Large-Scale OSINT Collection | NTREPID | 2011 | Brochure | NTREPID, Analysis Software, SOFTWARE | - | US |
ION Secure Virtual Desktop | NTREPID | 2011 | Brochure | NTREPID, Deep Packet Inspection | - | US |
ISIS-4G/IRIS-4G/IRMA-4G Satellite Monitoring Systems | Arpege | 2010 | Brochure | ARPEGE, Satellite Interception, Strategic Interception | - | FR |
Israel at Milipol Paris 2011 | Enterprise Europe Network | 2011 | Brochure | ENTERPRISE EUROPE NETWORK | - | IL |
iX Engine DPI & Metadata Extraction SDK | QOSMOS | 2011 | Brochure | QOSMOS, Deep Packet Inspection, Mass Monitoring, Internet Monitoring | - | FR, US, SG |
iXAM Zero-footprint Forensic Acquisition | Forensic Telecommunications Services | 2011 | Brochure | FORENSIC TELECOMMUNICATIONS SERVICES, Cell Phone Forensics | iPhone | GB, US |
ixMachine | QOSMOS | 2011 | Brochure | QOSMOS, Deep Packet Inspection, Internet Monitoring, Traffic Data Processing, Network Recording, SOFTWARE | H323, Citrix, Oracle, SAP, Exchange, eMule, BitTorrent, Skype, MSN, GTalk, GMail, Hotmail, Yahoo!Mail, RTP, VOIP, google query, youtube, rtp, rtsp, wmp, SIP | FR, US, SG |
ixMachine LI Edition | QOSMOS | 2011 | Brochure | QOSMOS, Lawful Interception, Data Retention, VOIP COMINT, Internet Monitoring | Internet Usage, E-Mail | FR, US, SG |
J-Alert mobile phone jamming detection | Seqtor | 2011 | Brochure | SEQTOR, Jamming Detection, HARDWARE | - | DK |
Kapow Katalyst for OSINT | Kapow Software | 2011 | Brochure | KAPOW SOFTWARE, Analysis Software | Blogs, GMail, Hotmail, Internet Usage, Instant Messaging, Twitter, Facebook | GB, US |
LA IF4CU3 4SFP | NETOPTICS | - | Brochure | NETOPTICS, HARDWARE | - | US |
LA-IL4CU 4SFP | NETOPTICS | - | Brochure | NETOPTICS | - | US |
Lawful Interception: A Mounting Challenge for Service Providers and Governments | FROST & SULLIVAN UTIMACO | - | Brochure | FROST & SULLIVAN UTIMACO, Lawful Interception | - | GB, DE, FR, IT, PL, US |
LI-5 Surveillance Simplified | Packet Forensics | 2011 | Brochure | PACKET FORENSICS, Internet Monitoring, VOIP COMINT | US | |
LIMS Access Points | UTIMACO | 2011 | Brochure | UTIMACO, Lawful Interception | Phone Network, Mobile Phone Network | DE, GB |
LIMS DRS Surveillance integration products | UTIMACO | 2011 | Catalogue | UTIMACO, Lawful Interception, Mass Monitoring, Data Retention, Network Recording, Traffic Data Processing, VOIP COMINT, | Phone Network, Mobile Phone Network | DE, GB |
LIMS DRS Video | UTIMACO | - | Video | UTIMACO, Lawful Interception, Data Retention | Phone Network, Mobile Phone Network | DE, GB |
LIMS Lawful Interception of Telecommunication Services | UTIMACO | - | Data Sheet | UTIMACO, Lawful Interception | Phone Network, Mobile Phone Network | DE, GB |
LIMS Techpaper Lawful Interception with Umbrella Systems | UTIMACO | 2010 | Brochure | UTIMACO, Lawful Interception | Phone Network, Mobile Phone Network | DE, GB |
LIMS Techpaper LI with Umbrella Systems | UTIMACO | 2010 | Brochure | UTIMACO, Lawful Interception, COMINT | Phone Network, Mobile Phone Network | DE, GB |
Location Tracking systems | HiddenTechnology Systems International Ltd. | 2011 | Brochure | HIDDENTECHNOLOGY SYSTEMS INTERNATIONAL LTD., Location Tracking | - | GB |
Loke III Bubble Gum Covert Drop and Walk transmitter | Cobham | 2011 | Data Sheet | COBHAM, Covert Surveillance Devices, Tactical Interception Devices | - | DK |
Loke III TX Miniature Audio Stereo Transmitter | Cobham | 2011 | Data Sheet | COBHAM, Covert Surveillance Devices, Tactical Interception Devices, HARDWARE | - | DK |
Loke Nano Transmitter | Cobham | 2011 | Data Sheet | COBHAM, Covert Surveillance Devices, Tactical Interception Devices, HARDWARE | - | DK |
Management solutions for investigations | OCKHAM | 2011 | Brochure | OCKHAM, Traffic Data Processing, Mass Monitoring, Visualisation | - | FR |
Meeting the Challenges of Data Retention: Now and in the future | FROST & SULLIVAN UTIMACO | 2010 | Brochure | FROST & SULLIVAN UTIMACO, Data Retention | - | GB, DE, FR, IT, PL, US |
Mirador Specialist Cameras | Digital Barriers | 2011 | Brochure | DIGITAL BARRIERS, Covert Surveillance Devices, CCTV, Tactical Interception Devices | - | GB, FR, US, AE, SG |
Mobile Biometric Platform | Human Recognition Systems | 2011 | Brochure | HUMAN RECOGNITION SYSTEMS, Facial Recognition, Image Recognition, Iris Recognition, Biometrics | - | GB |
Monitoring and Managing Voice over Internet Protocol (VoIP) | ELEXO | - | Brochure | ELEXO | - | FR |
morphoface investigate | Safran | 2011 | Brochure | SAFRAN, Facial recognition, CCTV | - | FR |
Mtrust | Human Recognition System | 2011 | Brochure | HUMAN RECOGNITION SYSTEM, Biometrics, Facial Recognition, Iris Recognition | - | GB |
NETI IT Consulting profile | NETI | 2011 | Brochure | NETI, Lawful Interception, Mass Monitoring, bongo, iOS | - | HU |
Network Content Control System | Bivio | 2011 | Brochure | BIVIO, Deep Packet Inspection, Data Retention | Skype | US |
Network Forensics | ELEXO | - | Presentation | ELEXO | - | FR |
Network Intelligence for Lawful Interception | QOSMOS | - | Brochure | QOSMOS, Lawful Interception | Internet Usage | FR |
Newsletter Q1 | GAMMA | 2011 | Brochure | GAMMA, Trojans, Tactical Interception Devices, Tactical Internet Monitoring | Internet Usage, Instant Messaging | DE, GB |
NiceTrack Horizon Insight | NICE | 2011 | Brochure | NICE, Mass Monitoring, Location Tracking, Strategic Interception, Monitoring Centre | - | IL, US, GB, HK |
NiceTrack Intelligence Services | NICE | 2011 | Brochure | NICE, Lawful Interception, Mass Monitoring, OSINT | Humans | IL, US, GB, HK |
NiceTrack Location Tracking Solutions | NICE | 2011 | Brochure | NICE, Passive Surveillance, Mass Monitoring, Location Tracking | GSM, UMTS, CDMA, SIGINT | IL, US, GB, HK |
Non-Disclosure Agreement | Silicom Dreamlab | 2010 | Contract Material | SILICOM DREAMLAB, Strategic Infection | - | CH, IL |
nTAP Product Family | ELEXO | - | Brochure | ELEXO | - | FR |
Number Plate Recognition | ELSAG | 2011 | Catalogue | ELSAG, License Plate Recognition, CCTV | - | US |
Observer | ELEXO | - | Brochure | ELEXO | - | FR |
Observer 12 Fonctions de securite | ELEXO | - | Presentation | ELEXO | - | FR, US |
Observer Infrastructure / Link Analyst | ELEXO | - | Presentation | ELEXO | - | FR |
Observer integre les technologies NetFlow & sFlow | ELEXO | - | Brochure | ELEXO | - | - |
Observer Un outil adapte a la VoIP | ELEXO | - | Brochure | ELEXO | - | - |
Ocellus S100 GPS Surveillance and tracking | Qinetiq | 2011 | Brochure | QINETIQ, Location Tracking, Covert Tracking Devices | - | GB, CA |
Ocellus T100 High performance GPS Logistics Tracking for Trailers, Containers, Vehicles and Remote Assets | Qinetiq | 2011 | Brochure | QINETIQ, Location Tracking, Covert Tracking Devices | - | GB, CA |
OM Purchase Order | Dreamlab | 2010 | Contract Material | DREAMLAB, Trojans, Strategic Infection | Internet Usage | CH, OM |
OM Quotation Monitoring for iproxy-project | Dreamlab | 2010 | Contract Material | DREAMLAB, Trojans, Strategic Infection | Internet Usage | CH, OM |
OM System Manual | Dreamlab | 2010 | Deployment Docu | DREAMLAB, Trojans, Strategic Infection | Internet Usage | CH, OM |
Omega Recording Transmitter | Cobham | 2011 | Data Sheet | COBHAM, Covert Surveillance Devices, Tactical Interception Devices | - | DK |
OptiCop Interceptor Monitoring Access solutions | Netquest | 2011 | Brochure | NETQUEST, Lawful Interception, Mass Monitoring | - | US |
Orion SkyWeb Premium | Cobham | 2011 | Data Sheet | COBHAM, Location Tracking | - | DK |
Our Mission to make the world a safer place for all of us | Trovicor | 2011 | Brochure | TROVICOR, Monitoring Centre, PRODUCT, SERVICE | - | DE |
PACE Protocol & Application Classification Engine | IPOQUE | - | Data Sheet | IPOQUE, Deep Packet Inspection | - | - |
Packet Monitoring Solutions | Telesoft Technologies | 2011 | Brochure | TELESOFT TECHNOLOGIES, COMINT, Deep Packet Inspection, Lawful Interception, Internet Monitoring, Mass Monitoring, Network Recording, Passive Surveillance, Traffic Data Processing, SIGINT | 100GE, 10GE, 40GE, 100GE, 1GE, VOIP COMINT, SIP, IP, IPv6, TCP, UDP, PCIe, email, PPP | GB, US, IN |
Paris Expo | Trovicor | 2012 | Brochure | TROVICOR, Lawful Interception, Monitoring Centre | Phone Network, Mobile Phone Network | DE |
Persistent Wide Area Surveillance | PV labs | 2011 | Brochure | PV LABS, CCTV, Image Recognition | - | US |
Presentation du Director | NETOPTICS | - | Presentation | NETOPTICS | - | US |
Presentation Societe | Siltec | - | Presentation | SILTEC | - | PL |
Principe de fonctioneement d´un TAP cuivre | NETOPTICS | - | Presentation | NETOPTICS | - | US |
Private Voip Exchanges & the IAX Dilemma | Packet Forensics | 2011 | Brochure | PACKET FORENSICS, VOIP COMINT, H323, SIP, MGCP, IAX | - | US |
proceo | OCKHAM | 2011 | Brochure | OCKHAM, Analysis Software, Visualisation | - | FR |
Public Security 54 | ADS | 2011 | Brochure | ADS | GSM | GB |
Q20 High Dynamics GPS Receiver Module | Qinetiq | 2011 | Brochure | QINETIQ, Location Tracking | - | GB, CA |
Recording and Transcription Systems | Speech Technology Center | - | Brochure | SPEECH TECHNOLOGY CENTER, Audio Forensics, Speaker Identification, Speech Recognition | - | RU, DE |
Redirector Programmer Guide Version 4.0 | Silicom | 2010 | Manual | SILICOM, Strategic Infection | Internet Usage | IL |
RF detection | Berkeley Varitronics Systems | 2011 | Brochure | BERKELEY VARITRONICS SYSTEMS, BERKELEY VARITRONICS SYSTEMS DECT 6.0 PROBLEMS UMTS, SIGINT | - | US |
RGN-CU-IL4 4×1 10/100BaseT In-Line Regeneration Tap | NETOPTICS | - | Brochure | NETOPTICS, HARDWARE | - | US |
Safe Cities Surveillance Infrastructure | Cobham | 2011 | Brochure | COBHAM, Internet Monitoring, Tactical GSM Interception, SIGINT, COMINT, Covert Surveillance Devices, localisation, visualisation | - | DK |
Safe City Solutions | NICE | 2011 | Brochure | NICE, Mass Monitoring, CCTV, Covert Surveillance Devices, Location Tracking | - | IL, US, GB, HK |
Scan Surveillance for Governments | ScanTarget | 2011 | Brochure | SCANTARGET, Deep Packet Inspection, COMINT, Network Recording, SMS Monitoring, Lawful Interception, Traffic Data Processing, Semantic Analysis, Social Network Analysis, SOFTWARE, HARDWARE, PRODUCT | Twitter, E-Mail, Instant Messaging, Facebook, Internet Usage, Blogs, Forums | FR |
Schedule 2013 | ISS | 2013 | Catalogue | ISS | - | GLOBAL LISTING |
Security and Surveillance – Video Analytics | Autonomy | 2011 | Brochure | AUTONOMY, CCTV, Analysis Software | - | US |
Septier Monitoring Centre | Septier | 2011 | Brochure | SEPTIER, Speaker identification, Text mining, VOIP COMINT, Monitoring Centre, Speech Recognition | E-Mail, SMS, Instant Messaging | FR |
SessionVista CX-10 Collector Datasheet | Mantaro | 2011 | Brochure | MANTARO, Visualisation, VOIP COMINT, Lawful Interception, Deep Packet Inspection | Instant Messaging, E-Mail | US |
Showcases Law Enforcement Citywide Surveillance | Digital Barriers | 2011 | Brochure | DIGITAL BARRIERS, Mass Monitoring, CCTV | - | GB, FR, US, AE, SG |
Signal Technology in Service of Homeland Security | MEDAV | 2011 | Brochure | MEDAV, Internet Monitoring, Mass Monitoring, COMINT, SIGINT, OSINT, HUMINT, MASINT, Visualisation, Lawful Interception, Network Recording, Passive Surveillance, Data Retention, Deep Packet Inspection, VOIP COMINT, Audio Forensics, Social Network Analysis | iphone, iOS, apple, GIS | DE |
Signals intelligence solutions | L3 ASA | 2011 | Catalogue | L3 ASA, SIGINT, Lawful Interception, Location Tracking | - | GB, US |
SIMiFOR | Forensic Telecommunications Services | 2011 | Brochure | FORENSIC TELECOMMUNICATIONS SERVICES, Cell Phone Forensics, SIM Card Forensics | - | GB, US |
SIS II Specialized Audio Editor | Speech Technology Center | 2010 | Brochure | SPEECH TECHNOLOGY CENTER, Audio Forensics, Speech Recognition, Speaker Identification, SERVICE | Phone Network | RU, DE |
Small Cellular Basestations for security applications | Cambridge Consultants | 2011 | Brochure | CAMBRIDGE CONSULTANTS, IMSI catcher, Lawful Interception, Tactical GSM Interception | - | GB, US |
Solutions dAnalyse Reseau | ELEXO | - | Presentation | ELEXO | - | - |
Sondes pour le monitoring a distance du reseau | NETWORK INSTRUMENTS | - | Brochure | NETWORK INSTRUMENTS | - | US, FR |
Speaker Identification Field Toolkit | Agnitio | 2011 | Brochure | AGNITIO, Audio Forensics, Speaker Identification, Speech Recognition | Phone Network | ES |
Spectrum Intelligence Systems | CRFS | 2011 | Catalogue | CRFS, Cell Phone Detection, SIGINT | - | GB |
Speed Size Simplicity | AAPPRO | 2011 | Brochure | AAPPRO, Tactical Interception Devices, Tactical GSM Interception | GSM | GB |
SPEKTOR Forensic Intelligence | Evidence Talks Ltd. | 2012 | Brochure | EVIDENCE TALKS LTD., Cell Phone Forensics, SIM Card Forensics, HARDWARE, PRODUCT, SOFTWARE | - | GB |
SSL Inspector | Netronome | 2011 | Brochure | NETRONOME, Deep Packet Inspection, SSL, HARDWARE | - | US |
Stopping Cyber Criminials in Their Tracks | i2 Group | 2010 | Brochure | I2 GROUP, Analysis Software, SOFTWARE | - | US |
Strategic Satellite Monitoring | VAStech | 2011 | Brochure | VASTECH, COMINT, Satellite Interception, Strategic Interception | - | ZA |
Strategic Telecommunication Network Monitoring | VAStech | 2011 | Brochure | VASTECH, Mass Monitoring, Network Recording, Speech Recognition, Traffic Data Processing, SMS Monitoring, Internet Monitoring, Deep Packet Inspection, Strategic Interception, HARDWARE, SOFTWARE | - | ZA |
Strategy for an overall intelligence Concept | Gamma | 2011 | Brochure | GAMMA, Trojans, Strategic Infection | Internet Usage | DE, GB, CH |
Superior Pattern Discovery Solutions | Visual Analytics Inc | 2011 | Catalogue | VISUAL ANALYTICS INC, Analysis Software, Visualisation, Data Mining, SOFTWARE, SERVICE | - | US |
Surveillance Simplified | Packet Forensics | 2011 | Brochure | PACKET FORENSICS, Internet Monitoring, Lawful Interception, Deep Packet Inspection | - | US |
Tactical Communications and Surveillance | Cobham | 2011 | Data Sheet | COBHAM, Location Tracking, Covert Tracking Devices, Tactical GSM Interception, CCTV, Covert Surveillance Devices, Image Recognition | - | DK |
Tactical Content Management System | PV labs | 2011 | Brochure | PV LABS, Image Recognition | - | US |
Tactical Observation Solutions | SESP | 2010 | Brochure | SESP, Tactical Interception Devices, HARDWARE, PRODUCT | - | GB |
Tap into your Network Product Brochure | NETOPTICS | - | Brochure | NETOPTICS | - | US |
Tartan Software overview | NTREPID | 2011 | Brochure | NTREPID, Analysis Software, Visualisation, Strategic Interception, SOFTWARE | - | US |
Techncial Surveillance equipments | BEA | 2011 | Brochure | BEA, COMINT, Covert Surveillance Devices, Covert Tracking Devices, SIGINT, Audio Forensics | - | IT |
Tempest Product Overview | Siltec | - | Brochure | SILTEC, Tempest | - | PL |
TextChart AutoMark 8 | i2 Group | 2010 | Brochure | I2 GROUP, Analysis Software, Text mining | - | US |
Thor Digitial Surveillance System | Cobham | 2011 | Data Sheet | COBHAM, Tactical Interception Devices, Covert Surveillance Devices | - | DK |
Thor Mini Receiver | Cobham | 2011 | Brochure | COBHAM, Covert Surveillance Devices, Tactical Interception Devices, HARDWARE | - | DK |
Timebox Event Visualisation IX Capability | HP Defence and Security | 2011 | Brochure | HP DEFENCE AND SECURITY, Visualisation, Analysis Software | - | US |
TM Finfisher FinFly ISP Project Turkmenistan | Gamma | 2011 | Deployment Docu | GAMMA, Trojans, Strategic Infection | Internet Usage | DE, GB, TM |
TM Quotation InfectionProxy | Dreamlab´ | 2010 | Contract Material | DREAMLAB´, Trojans, Strategic Infection | Internet Usage | CH, TM |
TMR 16E1 PCIe | Tamara | - | Data Sheet | TAMARA | - | TR |
TVI S400 Wireless Surveillance | Digital Barriers | 2011 | Brochure | DIGITAL BARRIERS, Covert Surveillance Devices, CCTV | - | GB, FR, US, AE, SG |
UK Pavilion at Milipol | ADS | 2011 | Brochure | ADS | - | GB |
Unmanned Surveillance System | Harris | 2011 | Brochure | HARRIS, Covert Surveillance Devices, CCTV, Image Recognition | - | US |
Urban Management Solutions | AGT International | 2011 | Brochure | AGT INTERNATIONAL, Analysis Software | Phone Network | CH, NL, GB, DE, BR, SG, IN |
Urban Security – Mexico city | THALES | 2011 | Brochure | THALES, THALES URBAN SECURITY – MEXICO CITY Passive Surveillance | - | FR |
Utimaco LIMS Interceptacion legal de servicios de telecomunicaciones | UTIMACO | - | Brochure | UTIMACO, Lawful Interception | Phone Network, Mobile Phone Network | DE, GB |
Utimacop LIMS Lawful Interception of Telecommuication Services | UTIMACO | 2010 | Brochure | UTIMACO, Lawful Interception | Phone Network, Mobile Phone Network | DE, GB |
VEGA | Elektron | - | Brochure | ELEKTRON, COMINT, Location Tracking, Monitoring Centre | - | FR |
Vereinbarung einer strategischen Partnerschaft | Dreamlab Gamma | 2011 | Contract Material | DREAMLAB GAMMA, Trojans, Strategic Infection | Internet Usage | DE, GB, CH |
Virtualisation | ELEXO | - | Brochure | ELEXO | - | - |
Virtus Translation for Structured Data | Virtus | 2011 | Brochure | VIRTUS, Analysis Software, SOFTWARE | - | US |
Vision Analytics | AI Solve | 2011 | Brochure | AI SOLVE, Facial Recognition, Vehicle Tracking, CCTV | - | GB |
VoiceGrid Voice Biometric Solutions | Speech Technology Centre | 2011 | Brochure | SPEECH TECHNOLOGY CENTRE, Mass Monitoring, Biometrics, Analysis Software, Audio Forensics, Speaker Identification, Speech Recognition | - | RU, DE |
VoiceGrid X | Speech Technology Centre | 2011 | Brochure | SPEECH TECHNOLOGY CENTRE, Audio Forensics, Biometrics, Speaker Identification, Analysis Software, Speech Recognition | - | RU, DE |
VoiceGrid X Voice Biometrics Soilutions | Speech Technology Centre | 2011 | Brochure | SPEECH TECHNOLOGY CENTRE, Analysis Software, Speech Recognition, Speaker Identification, SOFTWARE | - | RU, DE |
WatchHound cellphone monitor | Berkeley Varitronics Systems | 2011 | Brochure | BERKELEY VARITRONICS SYSTEMS, SIGINT, Cell Phone Forensics | - | US |
Wireless Homeland Security | Cambridge Consultants | 2011 | Brochure | CAMBRIDGE CONSULTANTS, Cell Phone Forensics, Location Tracking, Tactical GSM Interception, Tactical Internet Monitoring, Network Recording, Covert Surveillance Devices, Covert Tracking Devices | - | GB, US |
Wolfhound Cell phone detection systems | Berkeley Varitronics Systems | 2011 | Brochure | BERKELEY VARITRONICS SYSTEMS, SIGINT, Lawful Interception, Cell Phone Detection | - | US |
Wolfhound Lite Cellphone Detector | Berkeley Varitronics Systems | 2011 | Brochure | BERKELEY VARITRONICS SYSTEMS, SIGINT, Lawful Interception, Cell Phone Detection, HARDWARE | - | US |
Wolfhound Pro | Berkeley Varitronics Systems | 2011 | Brochure | BERKELEY VARITRONICS SYSTEMS, Lawful Interception, SIGINT | - | US |
Zimiti C-IDS Unattended Ground Sensors Covert Intrusion Detection System | Digital Barriers | 2011 | Brochure | DIGITAL BARRIERS, Covert Surveillance Devices, Tactical Interception Devices, Seismic Vibration Sensors | - | GB, FR, US, AE, SG |
WikiLeaks Counter Intelligence Unit (WLCIU) Location Tracking Map
Name | Company | Year | Tags | Country Codes |
---|---|---|---|---|
2013 ALL Targets | - | 2011 | WLCIU | - |
Avner Turniansky | Verint | 2012 | VERINT, Lawful Interception, Strategic Interception, WLCIU | IL, IT, US, ES, NG, CH, GR, TR |
Brydon Nelson | Gamma | 2012 | GAMMA, Trojans, WLCIU | GB, DE, QA, AE, BH, NL, OM, BN, MY, CY, FR |
Carlos Gandini | Gamma | 2012 | GAMMA, Trojans, WLCIU | DE, AT, ES, CZ, FR, MX, AE, OM, MA, GQ, CM, PT, BR |
Chris Nyland | Hidden Technology | 2012 | HIDDEN TECHNOLOGY, Tactical Interception Devices, WLCIU | GB, ES, MT, FR, NL, IN |
David Ast | Cobham | 2012 | COBHAM, Tactical GSM Interception, WLCIU | DE, CZ, DK, CH, FR, AT, IT |
Holger Rumscheidt | Elaman | 2011 | ELAMAN, Trojans, WLCIU | LB, DE, FR, CH, AE, AT, OM, ZA, ET, US, AZ, TM, ZA, JO |
Johnny Debs | Gamma | 2012 | GAMMA, Trojans, WLCIU | LB, RS, GB, CZ, TR, ET, GA |
Louthean Nelson | Gamma | 2011 | GAMMA, Trojans, Strategic Infection, WLCIU | LB, DE, AE, LV, CH, ID, IT, MY, SG, GB, AT, RS, TR, CI, BJ, ZA |
Marco Bettini | Hackingteam | 2012 | HACKINGTEAM, Trojans, Strategic Infection, WLCIU | IT, FR, MA, AE, SG, DE, RS, ES, MX, CZ, PT, BR |
Martin Muench | Gamma | 2013 | GAMMA, Trojans, Strategic Infection, WLCIU | MX, US, DE, CZ, KZ, GB, NL, FR, RS |
Mostapaha Maana | Hackingteam | 2011 | HACKINGTEAM, Trojans, WLCIU | IT, CH, US, MA, MY, SG, LB, NL, FR, EG, AE, TR, DE, SA, QA, SD, CZ, OM |
Neil Tomlinson | Cobham | 2012 | COBHAM, Tactical GSM Interception, WLCIU | GB, AE, LB, QT, KW |
Peter Warnke | Cellebrite | 2012 | CELLEBRITE, WLCIU | DE, IL, TR, NL, AE, US, GB, PL, CH |
Ray Hutton | Telesoft | 2012 | TELESOFT, Lawful Interception, Tactical Internet Monitoring, WLCIU | GB, ES, AE, IT |
Rudolf Gnadl | Rohde Schwarz | 2012 | ROHDE SCHWARZ, SIGINT, WLCIU | DE, AT, CZ, PT, FR, ES, US |
Rudolf Windschuh | UTIMACO | 2012 | UTIMACO, Lawful Interception, Strategic Interception, Data Retention, WLCIU | DE, NL, FR, ES, AE, AU, CZ, FI, GB |
Stephan Oelkers | Gamma | 2012 | GAMMA, Trojans, Strategic Infection, WLCIU | SG, ID, UG, AE, DE, ET, NG, DE, LB, QA, NG |
Thomas Oblinger | Elaman | 2012 | ELAMAN, Trojans, WLCIU | DE, CH, AE, OM |
Tomas Miskovsky | Trovicor | 2012 | TROVICOR, Lawful Interception, Monitoring Centre, WLCIU | CZ, AE, DE, BG, RS |
WLCIU ES | SPAIN | 2013 | SPAIN, WLCIU | ES |
WLCIU ET | ETHIOPIA | 2012 | ETHIOPIA, WLCIU | ET |
WLCIU AZ | AZERBAIJAN | 2012 | AZERBAIJAN, WLCIU | AZ |
WLCIU BH | BAHRAIN | 2013 | BAHRAIN, WLCIU | BH |
WLCIU BR | BRAZIL | 2013 | BRAZIL, WLCIU | BR |
WLCIU GQ | EQUATORIAL GUINEA | 2013 | EQUATORIAL GUINEA, WLCIU | GQ |
WLCIU ID | INDONESIA | 2012 | INDONESIA, WLCIU | ID |
WLCIU KZ | KAZAKHSTAN | 2013 | KAZAKHSTAN, WLCIU | KZ |
WLCIU MX | MEXICO | 2013 | MEXICO, WLCIU | MX |
WLCIU MY | MALAYSIA | 2011 | MALAYSIA, WLCIU | MY |
WLCIU NG | NIGERIA | 2013 | NIGERIA, WLCIU | NG |
WLCIU NL | NETHERLANDS | 2012 | NETHERLANDS, WLCIU | NL |
WLCIU RS | SERBIA | 2012 | SERBIA, WLCIU | RS |
WLCIU TM | TURKMENISTAN | 2013 | TURKMENISTAN, WLCIU | TM |
WLCIU UG | UGANDA | 2013 | UGANDA, WLCIU | UG |
finspy : Inside the shadow world of commercialized spook spyware
Gamma Group FinFisher Governmental IT Intrusion and Surveillance Presentations
The following presentations from the Gamma Group describe the company’s FinFisher and GSM / 3G tactical interception and target location surveillance products. The presentations were anonymously posted online from a discussions between Gamma and the German State Criminal Police Offices (Landeskriminalamt). The presentations were first reported by Netzpolitik.org and were subsequently analyzed by F-Secure CRO Mikko Hypponen.
FinFisher Governmental IT Intrusion and Remote Monitoring Solutions | 37 pages | Download (9.72 MB) |
3G-GSM Tactical Interception & Target Location | 51 pages | Download (19.8 MB) |
Traditional Lawful Interception solutions face new challenges that can only be solved using active systems like FinSpy:
· Data not transmitted over any network
· Encrypted Communications
· Targets in foreign countries
FinSpy has been proven successful in operations around the world for many years, and valuable intelligence has been gathered about Target Individuals and Organizations.
When FinSpy is installed on a computer system it can be remotely controlled and accessed as soon as it is connected to the internet/network, no matter where in the
world the Target System is based.
Feature Overview
Target Computer – Example Features:
· Bypassing of 40 regularly tested Antivirus Systems
· Covert Communication with Headquarters
· Full Skype Monitoring (Calls, Chats, File Transfers,
Video, Contact List)
· Recording of common communication like Email, Chats and Voice-over-IP
· Live Surveillance through Webcam and Microphone
· Country Tracing of Target
· Silent extracting of Files from Hard-Disk
· Process-based Key-logger for faster analysis
· Live Remote Forensics on Target System
· Advanced Filters to record only important information
· Supports most common Operating Systems (Windows,
Mac OSX and Linux)
Headquarters – Example Features:
· Evidence Protection (Valid Evidence according to European Standards)
· User-Management according to Security Clearances
· Security Data Encryption and Communication using RSA-2048 and AES-256
· Hidden from Public through Anonymizing Proxy
· Can be fully integrated with Law Enforcement Monitoring Functionality (LEMF)
For a full feature list please refer to the Product Specifications.
Access Target Computer Systems around the World
Spy Files released so far: 574
Resources:
Full text of “FinSpy promotional materials” – Internet Archive
finspy – Amazon S3
FINFISHER
Remote Monitoring 8: Infection Solutions – DocumentClo
Remote Monitoring & Infection Solutions: FINSPY – video
Infosecurity – FinFisher Spyware Presentation Details Leaked
FinFisher IT Intrusion Products
Meet the ‘Corporate Enemies of the Internet‘
FinSpy Software Used To Surveil Activists
Gamma Group FinFisher Governmental IT Intrusion
National Security Agency – NSA | lisaleaks
San Diego Poised To Be Cyber Security Leader | lisaleaks
Technology Vision 2014: Key IT Trends
39 – www.portierramaryaire.com • View topic – Aviones sin
Inside the shadow world of commercialised spook spyware …
Black Code: Inside the Battle for Cyberspace – Google Book
Dragnet Nation: A Quest for Privacy, Security, and Freedom
Filed under: FinFisher, FinFisher Spyware, Gamma International, Internet surveillance, Mass Surveillance, Surveillance Tagged: CIA, Domestic Surveillance, FinFisher, FinFisher Spyware, Global Surveillance, Malware, Mass Surveillance, National Security Agency - NSA, Spy Files, Surveillance, Wikileaks