Quantcast
Channel: lisa's leaks » Gamma International
Viewing all articles
Browse latest Browse all 2

Intrusive Surveillance

$
0
0
Countries With FinFisher

Here are the 36 countries that have been found to host FinFisher Command & Control Servers, to which the malware connects to harvest reams of data (click to enlarge)

Gamma Group - FinFisher: Mass interception of entire populations is not only a reality, it is a secret industry spanning countries round the world.

FinSpy surveillance software, for example, marketed worldwide to law enforcement agencies as a way to monitor “criminals,” is widely used by repressive governments, including the U.S., to spy on human rights groups and dissidents.

It sounds like something out of Hollywood, but as of today, mass interception systems, built by Western intelligence contractors, including for ’political opponents’ are a reality. WikiLeaks began releasing a database of hundreds of documents from as many as 160 intelligence contractors in the mass surveillance industry. Working with Buggedplanet and Privacy International, as well as media organizations form six countries – ARD in Germany, The Bureau of Investigative Journalism, The Hindu in India, L’Espresso in Italy, OWNI in France and the Washington Post in the U.S. Wikileaks is shining a light on this secret industry that has boomed since September 11, 2001 and is worth billions of dollars per year.

wikileaks-spyfilesThese documents reveal how, as the intelligence world has privatised, US, EU and developing world intelligence agencies have rushed into spending millions on next-generation mass surveillance technology to target communities, groups and whole populations.

International surveillance companies are based in the more technologically sophisticated countries, and they sell their technology on to every country of the world. This industry is, in practice, unregulated. Intelligence agencies, military forces and police authorities are able to silently, and on mass, and secretly intercept calls and take over computers without the help or knowledge of the telecommunication providers. Users’ physical location can be tracked if they are carrying a mobile phone, even if it is only on stand by.

But the WikiLeaks Spy files are more than just about ’good Western countries’ exporting to ’bad developing world countries’. Western companies are also selling a vast range of mass surveillance equipment to Western intelligence agencies. In traditional spy stories, intelligence agencies like MI5 bug the phone of one or two people of interest. In the last 14 years systems for indiscriminate, mass surveillance have become the norm. Intelligence companies such as Vastech secretly sell equipment to permanently record the phone calls of entire nations. Others record the location of every mobile phone in a city, down to 50 meters. Systems to infect every Facebook user, or smart-phone owner of an entire population group are on the intelligence market.

Hacking Team Remote Control System

Selling Surveillance to Dictators

When citizens overthrew the dictatorships in Egypt and Libya this year, they uncovered listening rooms where devices from Gamma corporation of the UK, Amesys of France, VASTech of South Africa and ZTE Corp. of China monitored their every move online and on the phone.

Surveillance companies like SS8 in the U.S., Hacking Team in Italy and VUPEN in France manufacture viruses (Trojans) that hijack individual computers and phones (including iPhones, Blackberries and Androids), take over the device, record its every use, movement, and even the sights and sounds of the room it is in. Other companies like Phonexia in the Czech Republic collaborate with the military to create speech analysis tools. They identify individuals by gender, age and stress levels and track them based on ‘voiceprints’. Blue Coat in the U.S. and Ipoque in Germany sell tools to governments in countries like China and Iran to prevent dissidents from organizing online.

Trovicor, previously a subsidiary of Nokia Siemens Networks, supplied the Bahraini government with interception technologies that tracked human rights activist Abdul Ghani Al Khanjar. He was shown details of personal mobile phone conversations from before he was interrogated and beaten in the winter of 2010-2011.

How Mass Surveillance Contractors Share Your Data with the State

In January 2011, the National Security Agency broke ground on a $1.5 billion facility in the Utah desert that is designed to store terabytes of domestic and foreign intelligence data forever and process it for years to come.

National Geospatial-Intelligence AgencyTelecommunication companies are forthcoming when it comes to disclosing client information to the authorities – no matter the country. Headlines during years unrest in the UK exposed how Research in Motion (RIM), makers of the Blackberry, offered to help the government identify their clients. RIM has been in similar negotiations to share BlackBerry Messenger data with the governments of India, Lebanon, Saudi Arabia, and the United Arab Emirates.

Weaponizing Data Kills Innocent People

There are commercial firms that now sell special software that analyze this data and turn it into powerful tools that can be used by military and intelligence agencies.

For example, in military bases across the U.S., Air Force pilots use a video link and joystick to fly Predator drones to conduct surveillance over the Middle East and Central Asia. This data is available to Central Intelligence Agency officials who use it to fire Hellfire missiles on targets.

The CIA officials have bought software that allows them to match phone signals and voice prints instantly and pinpoint the “specific identity and location” of individuals. Intelligent Integration Systems, Inc., based in Massachusetts – sells a “location-based analytics” software called Geospatial Toolkit for this purpose. Another Massachusetts company named Netezza, which bought a copy of the software, allegedly reverse engineered the code and sold a hacked version to the Central Intelligence Agency for use in remotely piloted drone aircraft.

Global ObserverIISI, which says that the software could be wrong by a distance of up to 40 feet, sued Netezza to prevent the use of this software. Company founder Rich Zimmerman stated in court that his “reaction was one of stun, amazement that they (CIA) want to kill people with my software that doesn’t work.”

Orwell’s World

Across the world, mass surveillance contractors are helping intelligence agencies spy on individuals and ‘communities of interest’ on an industrial scale.

The Wikileaks Spy Files reveal the details of which companies are making billions selling sophisticated tracking tools to government buyers, flouting export rules, and turning a blind eye to dictatorial regimes that abuse human rights.

How to use the Spy Files

To search inside those files, click one of the link on the left pane of this page, to get the list of documents by type, company date or tag.

To search all these companies on a world map use the following tool from Owni

WikileaksSpyFilesMap

Spy Files Documents:

Surveillance Industry Documents   WikiLeaks Counter Intelligence Unit (WLCIU) Location Tracking

Document Title Company Year Document Type Tags Target System Country Codes
10 GigaBit Fiber Taps NETOPTICS - Brochure NETOPTICS - US
10/100 Port Aggregator Tap NETOPTICS - Brochure NETOPTICS - US
10/100/1000 Tap Network Link NETOPTICS - Brochure NETOPTICS - US, FR
10/100BaseT Tap NETOPTICS - Brochure NETOPTICS - US
1U Modular Rackmount Surveillance Simplified Packet Forensics 2011 Brochure PACKET FORENSICS, Internet Monitoring, Lawful Interception, Data Retention, VOIP COMINT, HARDWARE - US
2 Mercure OCKHAM 2011 Brochure OCKHAM, Mass Monitoring, Analysis Software, Traffic Data Processing, SOFTWARE - FR
4×1 GigaBit Copper In-Line Regeneration Tap NETOPTICS - Brochure NETOPTICS - US
5-Series Small Devices, Big Opportunities Packet Forensics 2011 Brochure PACKET FORENSICS, SIGINT, Tactical Internet Monitoring - US
A30 Excellence in Telephone Interception Systems AMECS 2011 Brochure AMECS, Analysis Software, Deep Packet Inspection, Mass Monitoring, Monitoring Centre, PRODUCT, SOFTWARE, HARDWARE Phone Network FR
Aappro Security and defence: Company Brochure AAPPRO 2011 Brochure AAPPRO, Covert Surveillance Devices, Tactical GSM Interception, Tactical Interception Devices GSM GB
About BrightPlanet BrightPlanet 2011 Catalogue BRIGHTPLANET, Analysis Software, SOFTWARE - US
Advanced Cyber Infrastructure Protection Cassidian (EADS) 2011 Brochure CASSIDIAN (EADS), Deep Packet Inspection, Internet Monitoring - DE
Advertisement System InPoint SMS NeoSoft - Data Sheet NEOSOFT, Tactical GSM Interception - CH
An Introduction to Morpho Face Investigate Pilot Safran 2011 Brochure SAFRAN, Facial Recognition, CCTV, SOFTWARE - FR
An overview of FTS products & services Forensic Telecommunications Services 2011 Brochure FORENSIC TELECOMMUNICATIONS SERVICES, Forensics, Cell Phone Forensics, COMINT, SMS Monitoring, SIM Card Forensics, Thuraya Monitoring, Iridium Monitoring, Tactical GSM Interception, PRODUCT, SERVICE - GB
Analyst´s Notebook – Esri Edition Foundation Module i2 Group 2011 Brochure I2 GROUP, Social Network Analysis, Semantic Analysis, Analysis Software, SOFTWARE - US
Analyst´s Notebook 8 i2 Group 2010 Brochure I2 GROUP, Analysis Software, SOFTWARE - US
ARES Systeme d´interception de Bandes C/L Thuraya RHEINMETALL DEFENCE - Brochure RHEINMETALL DEFENCE, Tactical Satellite Interception - DE
Argos Thuraya Interception L-Band System RHEINMETALL DEFENCE - Brochure RHEINMETALL DEFENCE - DE
Artemis – Systeme d´Interception de bandes L/L Thuraya RHEINMETALL DEFENCE - Brochure RHEINMETALL DEFENCE, Tactical Satellite Interception - DE
ATIS Presentation ATIS Uher - Presentation ATIS UHER, Monitoring Centre - DE, TN
Audioscope – Audio Capturing and Recording System Cobham 2011 Brochure COBHAM, Recognition, Covert Surveillance Devices, Audio Forensics, Tactical Interception Devices - DK
Automated Data Retention for Telcommunication Service Providers UTIMACO 2010 Brochure UTIMACO, Data Retention Phone Network, Mobile Phone Network DE, GB
Automatic Speaker Identification System (ASIS) Agnitio 2011 Brochure AGNITIO, Audio Forensics, Biometrics, Speaker Identification, Strategic Interception Phone Network GB
Batvox export 1:1 voice biometric tool Agnitio 2011 Brochure AGNITIO, Speaker Identification, Audio Forensics Phone Network ES
Beowulf II Board Audio Recorder Cobham 2011 Data Sheet COBHAM, COBHAM BEOWULF II BOARD Covert Surveillance Devices - DK
Beowulf II Bubble Gum Covert ìdrop and walk audio recorder Cobham 2011 Data Sheet COBHAM, Covert Surveillance Devices, Tactical Interception Devices - DK
Beowulf II Solid state stand alone recorder Cobham 2011 Data Sheet COBHAM, Covert Surveillance Devices, Tactical Interception Devices, HARDWARE - DK
Bifrost Wireless HIgh Speed USB Modem for Freja Video records Cobham 2011 Data Sheet COBHAM, Covert Surveillance Devices, CCTV, Tactical Interception Devices, Covert Surveillance Devices - DK
Biometric Speaker Spotting System (BS3) Agnitio 2011 Brochure AGNITIO, COMINT, Audio Forensics, Speech Recognition, Speaker Identification, Strategic Interception Phone Network ES
Biometrics Ernst & Young 2011 Brochure ERNST & YOUNG, Biometrics, SERVICE - GB
BONGO monitoring system NETI 2011 Brochure NETI, Lawful Interception, Strategic Interception, VOIP COMINT, Network Recording, Traffic Data Processing, Monitoring Centre, HARDWARE - HU
Brochure Security & Policing Exhibition – UK Innovation for Global Security ADS UKTI Defence & Secuity Organisation 2012 Brochure ADS UKTI DEFENCE & SECUITY ORGANISATION - GB
BS3 Strategic – Biometric Speaker Spotting System: Strategic Edition Agnitio 2011 Brochure AGNITIO, Mass Monitoring, Audio Forensics, VOIP COMINT, Speaker Identification, Speech Recognition, Strategic Interception Phone Network ES
Building your OSINT Capabililty Kapow Software 2011 Brochure KAPOW SOFTWARE, Social Network Analysis, Mass Monitoring, Analysis Software Twitter, Facebook GB, US
CAPsure 256 Element Square Microphone Array Cobham 2011 Data Sheet COBHAM, COBHAM CAPSURE Covert Surveillance Devices, Audio Forensics - DK
Case History EXPERTSYSTEM - Brochure EXPERTSYSTEM, Semantic Analysis - US, IT
Case history eni EXPERTSYSTEM - Brochure EXPERTSYSTEM, Semantic Analysis - US, IT
Case Study: COsmOs EXPERTSYSTEM - Brochure EXPERTSYSTEM, Audio Forensics, Speaker Identification, Speech Recognition, Semantic Analysis - US, IT
Case study: Network Intelligence for Lawful Interception QOSMOS 2011 Brochure QOSMOS, Lawful Interception, Mass Monitoring, gbps, p2p, Network Recording, Deep Packet Inspection, VOIP COMINT E-Mail, Instant Messaging FR, US, SG
Catalogue of Tactical Communications and Surveillance Product Short Form Cobham 2011 Catalogue COBHAM, Covert Surveillance Devices, Audio Forensics, Tactical Interception Devices, Location Tracking - DK
Catalogue Security & Policing Exhibition ADS UKTI Defence & Security Organisation 2012 Catalogue ADS UKTI DEFENCE & SECURITY ORGANISATION - GB
Cell phone detection systems Berkeley Varitronics Systems 2011 Brochure BERKELEY VARITRONICS SYSTEMS, SIGINT, Cell Phone Detection - US
CellNet Drop 2 Interception System ERICSSON 2000 Training Material ERICSSON, Monitoring Centre - SE
Cellphone detector Wolfhound Berkeley Varitronics Systems 2011 Brochure BERKELEY VARITRONICS SYSTEMS, SIGINT, Cell Phone Detection - US
Centuare Elektron - Brochure ELEKTRON, Lawful Interception, Location Tracking - FR
CIGOTO SEE From search to knowing EXPERTSYSTEM - Video EXPERTSYSTEM, Semantic Analysis - US, IT
Cogito Answers EXPERTSYSTEM - Brochure EXPERTSYSTEM, Audio Forensics, Speaker Identification, Speech Recognition, Semantic Analysis - US, IT
Cogito Categorizer Cogito Discover EXPERTSYSTEM - Brochure EXPERTSYSTEM, Audio Forensics, Speaker Identification, Speech Recognition, Semantic Analysis - US, IT
COGITO Intelligence Platform EXPERTSYSTEM - Brochure EXPERTSYSTEM, Semantic Analysis, Text mining - US, IT
Cogito Mapping Concepts EXPERTSYSTEM - Video EXPERTSYSTEM, Analysis Software, Location Tracking, Semantic Analysis - US, IT
Cogito Monitor EXPERTSYSTEM - Brochure EXPERTSYSTEM, Audio Forensics, Speaker Identification, Speech Recognition, Text mining, Semantic Analysis - US, IT
Cogito Monitor Voice of the Customer EXPERTSYSTEM - Video EXPERTSYSTEM, Semantic Analysis - US, IT
Cogito Search Explore Engine EXPERTSYSTEM - Brochure EXPERTSYSTEM, Audio Forensics, Speaker Identification, Speech Recognition, Semantic Analysis - US, IT
COGITO SEE Finding out who did what EXPERTSYSTEM - Video EXPERTSYSTEM, Semantic Analysis - US, IT
COGITO Semantic Technology EXPERTSYSTEM - Video EXPERTSYSTEM, Semantic Analysis - US, IT
COGITO Twitter Semantic Search EXPERTSYSTEM - Video EXPERTSYSTEM, Semantic Analysis Twitter US, IT
COGITO Understanding Words EXPERTSYSTEM - Video EXPERTSYSTEM, Semantic Analysis - US, IT
Cogito: Solutions for Semantic Publishing EXPERTSYSTEM - Brochure EXPERTSYSTEM, Semantic Analysis - US, IT
Combatting the Taliban in Central Helmand, Afghanistan i2 Group 2010 Brochure I2 GROUP, Analysis Software - US
COMINT Technology Innov Telek IZT 2011 Presentation INNOV TELEK IZT, COMINT - DE
CommsAudit Corporate Overview CommsAudit 2011 Brochure COMMSAUDIT, SIGINT - GB
Completing the Investigative Solution Surveillance Simplified Packet Forensics 2011 Brochure PACKET FORENSICS, Internet Monitoring, Lawful Interception, Mass Monitoring, Deep Packet Inspection, hundreds of probes, Network Recording, Traffic Data Processing, VOIP COMINT, Tactical Internet Monitoring, Data Retention Instant Messaging, GMail, Hotmail US
Construiere une plateform d´access pour la surveillance NETOPTICS - Presentation NETOPTICS - US, FR
Corporate Brochure EXPERTSYSTEM - Brochure EXPERTSYSTEM, Semantic Analysis, Audio Forensics, Analysis Software, Speech Recognition, Speaker Identification - US, IT
Corporate Overview Advanced Surveillance Digital Barriers 2011 Brochure DIGITAL BARRIERS, Covert Surveillance Devices, Tactical Interception Devices - GB, FR, US, AE, SG
Countering Thread Surveillance, Interception, Detection, Forensics, CyberSecurity Roke Manor Research 2011 Brochure ROKE MANOR RESEARCH, Lawful Interception, COMINT, Image Recognition, Internet Monitoring, Tactical Interception Devices - GB
CYBELS CYBer Expertise for Leading Security THALES 2010 Brochure THALES, Analysis Software - FR
Cyber i2 Group 2010 Brochure I2 GROUP, Analysis Software - US
Cybersecurity overview THALES 2011 - THALES, Monitoring Centre Internet Usage FR
Cyveillance Corporate Security Cyveillance 2011 Brochure CYVEILLANCE, Internet Monitoring, Mass Monitoring, OSINT - US
Data acquisition from devices Spektor Forensic Intelligence 2011 Brochure SPEKTOR FORENSIC INTELLIGENCE, Analysis Software, Cell Phone Forensics - GB
Data Monitoring Switch NETOPTICS - Brochure NETOPTICS, HARDWARE - US
Director Data Monitoring Switch Datasheet NETOPTICS - Brochure NETOPTICS - US, FR
DPX Network Probe IPOQUE - Data Sheet IPOQUE, Deep Packet Inspection - -
DRS Data Retention Suite UTIMACO 2010 Brochure UTIMACO, Data Retention Phone Network, Mobile Phone Network DE, GB
DRS Paquete de retencion de datos UTIMACO 2011 Brochure UTIMACO, Data Retention Phone Network, Mobile Phone Network DE, GB
Electronic Blitz Glimmerglass Networks 2011 Brochure GLIMMERGLASS NETWORKS, Network Recording, Deep Packet Inspection, Mass Monitoring, Internet Monitoring, Fiber-optic Interception, Strategic Interception - US
Electronic Surveillance, Counter-Surveillance & RF Jamming Eskan 2011 Brochure ESKAN, Audio Forensics, Cell Phone Detection, Location Tracking, Tactical Interception Devices, Covert Surveillance Devices - GB
Electronic Warfare: COMINT + COMMS/ESM Intelligence Generation & Fusion Systems MEDAV 2009 Presentation MEDAV, COMINT - -
Enabling Seucire Internet OperationsION Internet Operations Network NTREPID 2011 Brochure NTREPID, OSINT, Social Network Analysis - US
Evident ETIgroup 2011 Catalogue ETIGROUP, Analysis Software, COMINT, Data Retention, Data Mining, Deep Packet Inspection, Internet Monitoring, Lawful Interception, SOFTWARE - DK, GB, US
Examining SSL-Encrypted Communiations Metronome 2011 Brochure METRONOME, COMINT, Deep Packet Inspection, Mass Monitoring, SSL, PRODUCT, HARDWARE - US, GB, MY, ZA, CN
Exploits for Law Enforcement VuPen 2011 Brochure VUPEN, Exploits - FR
Facebook Relations Analysis Target Profiling Genesi Platform IPS Intelligence - Brochure IPS INTELLIGENCE, Analysis Software, Social Network Analysis Facebook IT
Famille de produits Observer ELEXO - Brochure ELEXO - FR
FCO Services: Secure Mobile Solutions FCO Services 2011 Brochure FCO SERVICES, FCO SERVICES SECURE MOBILE SOLUTIONS - GB
Finfisher FINFly ISP 2.0 Infrastructure Product Training Gamma 2010 Training Material GAMMA, Trojans, Strategic Infection Internet Usage DE, GB
FinFisher Pricing Dreamlab 2011 Pricelist DREAMLAB, Trojans, Strategic Infection Internet Usage CH, DE, GB
Freja Video Recorders Cobham 2011 Data Sheet COBHAM, Covert Surveillance Devices, CCTV, HARDWARE - DK
FSNtracks Freightwatch Security Net 2011 Brochure FREIGHTWATCH SECURITY NET, Location Tracking, SOFTWARE - IE, US
FX to TX Tap NETOPTICS - Brochure NETOPTICS, HARDWARE - US
GAJT GPS Anti-Jam protection Qinetiq 2011 Brochure QINETIQ, Location Tracking, HARDWARE - GB, CA
Geo F5 GPS tracker Freightwatch Security Net 2011 Brochure FREIGHTWATCH SECURITY NET, Location Tracking - IE, US
GeoTime 5 OCULUS 2011 Brochure OCULUS, Visualisation, Social Network Analysis - US
Geotime 5 – Instantly Reveal Movement Patterns Over Time OCULUS 2010 Brochure OCULUS, Location Tracking - US
Giga Stor ELEXO - Brochure ELEXO - FR
Gigabit and 10 GbE Network Analysis ELEXO - Brochure ELEXO - FR
GigaBit Copper Tap NETOPTICS - Brochure NETOPTICS - US, FR
GigaBit Fiber Taps NETOPTICS - Brochure NETOPTICS, HARDWARE - US
Gigabit Observer NETWORK Instruments - Brochure NETWORK INSTRUMENTS - US
Gnomes Professional audio recorders Speech Technology Centre 2011 Brochure SPEECH TECHNOLOGY CENTRE, SPEECH TECHNOLOGY CENTRE GNOME RANGE OF RECORDERS Covert Surveillance Devices - RU, DE
GSM/UMTS detection and location system QCC Interscan 2011 Brochure QCC INTERSCAN, Cell Phone Detection, Location Tracking - GB
Hinton 5000 Interceptor Passive probe Telesoft Technologies 2011 Brochure TELESOFT TECHNOLOGIES, Mass Monitoring, Lawful Interception, SMS Monitoring, SIGINT, COMINT, Data Retention GSM, IMSI, SMS, IMEI, CDMA GB, US, IN
Hinton Abis Probe Telesoft Technologies 2011 Brochure TELESOFT TECHNOLOGIES, Location Tracking, Mass Monitoring, GSM, UMTS, CDMA - GB, US, IN
Hinton Mobile Data Probe Telesoft Technologies 2011 Brochure TELESOFT TECHNOLOGIES, Lawful Interception, Mass Monitoring, GSM, UMTS, CDMA - GB, US, IN
iBase 8 i2 Group 2011 Brochure I2 GROUP, Analysis Software, SOFTWARE - US
IFS-8000 Intelligence Fusion System MEDAV 2011 Brochure MEDAV, Analysis Software, Monitoring Centre, Visualisation, SOFTWARE - DE
iLink Agg NETOPTICS - Brochure NETOPTICS - US
INCA Repeater – Four Channel Remote Controlled Repeater Cobham 2011 Data Sheet COBHAM, COBHAM INCA REPEATER Covert Surveillance Devices - DK
Infrastructure protection services Cassidian 2011 Brochure CASSIDIAN, CCTV, COMINT, Analysis Software - DE
Intelligent systems THALES 2010 Brochure THALES, Location Tracking - FR
InterCom (Thor) Cobham 2011 Data Sheet COBHAM, COBHAM INTERCOM (THOR) Covert Surveillance Devices - DK
Internet monitoring suite ClearTrail 2011 Brochure CLEARTRAIL, Mass Monitoring, Deep Packet Inspection, COMINT, SIGINT, Tactical Internet Monitoring, Network Recording, Lawful Interception - IN
Intervention & Mobile Laboratory TRACIP 2011 Brochure TRACIP, Forensics - FR
ION – Research & Targeting NTREPID 2011 Brochure NTREPID, Analysis Software - US
ION Internet Operations Network NTREPID 2011 Brochure NTREPID, OSINT, HUMINT - US
ION Large-Scale OSINT Collection NTREPID 2011 Brochure NTREPID, Analysis Software, SOFTWARE - US
ION Secure Virtual Desktop NTREPID 2011 Brochure NTREPID, Deep Packet Inspection - US
ISIS-4G/IRIS-4G/IRMA-4G Satellite Monitoring Systems Arpege 2010 Brochure ARPEGE, Satellite Interception, Strategic Interception - FR
Israel at Milipol Paris 2011 Enterprise Europe Network 2011 Brochure ENTERPRISE EUROPE NETWORK - IL
iX Engine DPI & Metadata Extraction SDK QOSMOS 2011 Brochure QOSMOS, Deep Packet Inspection, Mass Monitoring, Internet Monitoring - FR, US, SG
iXAM Zero-footprint Forensic Acquisition Forensic Telecommunications Services 2011 Brochure FORENSIC TELECOMMUNICATIONS SERVICES, Cell Phone Forensics iPhone GB, US
ixMachine QOSMOS 2011 Brochure QOSMOS, Deep Packet Inspection, Internet Monitoring, Traffic Data Processing, Network Recording, SOFTWARE H323, Citrix, Oracle, SAP, Exchange, eMule, BitTorrent, Skype, MSN, GTalk, GMail, Hotmail, Yahoo!Mail, RTP, VOIP, google query, youtube, rtp, rtsp, wmp, SIP FR, US, SG
ixMachine LI Edition QOSMOS 2011 Brochure QOSMOS, Lawful Interception, Data Retention, VOIP COMINT, Internet Monitoring Internet Usage, E-Mail FR, US, SG
J-Alert mobile phone jamming detection Seqtor 2011 Brochure SEQTOR, Jamming Detection, HARDWARE - DK
Kapow Katalyst for OSINT Kapow Software 2011 Brochure KAPOW SOFTWARE, Analysis Software Blogs, GMail, Hotmail, Internet Usage, Instant Messaging, Twitter, Facebook GB, US
LA IF4CU3 4SFP NETOPTICS - Brochure NETOPTICS, HARDWARE - US
LA-IL4CU 4SFP NETOPTICS - Brochure NETOPTICS - US
Lawful Interception: A Mounting Challenge for Service Providers and Governments FROST & SULLIVAN UTIMACO - Brochure FROST & SULLIVAN UTIMACO, Lawful Interception - GB, DE, FR, IT, PL, US
LI-5 Surveillance Simplified Packet Forensics 2011 Brochure PACKET FORENSICS, Internet Monitoring, VOIP COMINT E-Mail US
LIMS Access Points UTIMACO 2011 Brochure UTIMACO, Lawful Interception Phone Network, Mobile Phone Network DE, GB
LIMS DRS Surveillance integration products UTIMACO 2011 Catalogue UTIMACO, Lawful Interception, Mass Monitoring, Data Retention, Network Recording, Traffic Data Processing, VOIP COMINT, Phone Network, Mobile Phone Network DE, GB
LIMS DRS Video UTIMACO - Video UTIMACO, Lawful Interception, Data Retention Phone Network, Mobile Phone Network DE, GB
LIMS Lawful Interception of Telecommunication Services UTIMACO - Data Sheet UTIMACO, Lawful Interception Phone Network, Mobile Phone Network DE, GB
LIMS Techpaper Lawful Interception with Umbrella Systems UTIMACO 2010 Brochure UTIMACO, Lawful Interception Phone Network, Mobile Phone Network DE, GB
LIMS Techpaper LI with Umbrella Systems UTIMACO 2010 Brochure UTIMACO, Lawful Interception, COMINT Phone Network, Mobile Phone Network DE, GB
Location Tracking systems HiddenTechnology Systems International Ltd. 2011 Brochure HIDDENTECHNOLOGY SYSTEMS INTERNATIONAL LTD., Location Tracking - GB
Loke III Bubble Gum Covert Drop and Walk transmitter Cobham 2011 Data Sheet COBHAM, Covert Surveillance Devices, Tactical Interception Devices - DK
Loke III TX Miniature Audio Stereo Transmitter Cobham 2011 Data Sheet COBHAM, Covert Surveillance Devices, Tactical Interception Devices, HARDWARE - DK
Loke Nano Transmitter Cobham 2011 Data Sheet COBHAM, Covert Surveillance Devices, Tactical Interception Devices, HARDWARE - DK
Management solutions for investigations OCKHAM 2011 Brochure OCKHAM, Traffic Data Processing, Mass Monitoring, Visualisation - FR
Meeting the Challenges of Data Retention: Now and in the future FROST & SULLIVAN UTIMACO 2010 Brochure FROST & SULLIVAN UTIMACO, Data Retention - GB, DE, FR, IT, PL, US
Mirador Specialist Cameras Digital Barriers 2011 Brochure DIGITAL BARRIERS, Covert Surveillance Devices, CCTV, Tactical Interception Devices - GB, FR, US, AE, SG
Mobile Biometric Platform Human Recognition Systems 2011 Brochure HUMAN RECOGNITION SYSTEMS, Facial Recognition, Image Recognition, Iris Recognition, Biometrics - GB
Monitoring and Managing Voice over Internet Protocol (VoIP) ELEXO - Brochure ELEXO - FR
morphoface investigate Safran 2011 Brochure SAFRAN, Facial recognition, CCTV - FR
Mtrust Human Recognition System 2011 Brochure HUMAN RECOGNITION SYSTEM, Biometrics, Facial Recognition, Iris Recognition - GB
NETI IT Consulting profile NETI 2011 Brochure NETI, Lawful Interception, Mass Monitoring, bongo, iOS - HU
Network Content Control System Bivio 2011 Brochure BIVIO, Deep Packet Inspection, Data Retention Skype US
Network Forensics ELEXO - Presentation ELEXO - FR
Network Intelligence for Lawful Interception QOSMOS - Brochure QOSMOS, Lawful Interception Internet Usage FR
Newsletter Q1 GAMMA 2011 Brochure GAMMA, Trojans, Tactical Interception Devices, Tactical Internet Monitoring Internet Usage, Instant Messaging DE, GB
NiceTrack Horizon Insight NICE 2011 Brochure NICE, Mass Monitoring, Location Tracking, Strategic Interception, Monitoring Centre - IL, US, GB, HK
NiceTrack Intelligence Services NICE 2011 Brochure NICE, Lawful Interception, Mass Monitoring, OSINT Humans IL, US, GB, HK
NiceTrack Location Tracking Solutions NICE 2011 Brochure NICE, Passive Surveillance, Mass Monitoring, Location Tracking GSM, UMTS, CDMA, SIGINT IL, US, GB, HK
Non-Disclosure Agreement Silicom Dreamlab 2010 Contract Material SILICOM DREAMLAB, Strategic Infection - CH, IL
nTAP Product Family ELEXO - Brochure ELEXO - FR
Number Plate Recognition ELSAG 2011 Catalogue ELSAG, License Plate Recognition, CCTV - US
Observer ELEXO - Brochure ELEXO - FR
Observer 12 Fonctions de securite ELEXO - Presentation ELEXO - FR, US
Observer Infrastructure / Link Analyst ELEXO - Presentation ELEXO - FR
Observer integre les technologies NetFlow & sFlow ELEXO - Brochure ELEXO - -
Observer Un outil adapte a la VoIP ELEXO - Brochure ELEXO - -
Ocellus S100 GPS Surveillance and tracking Qinetiq 2011 Brochure QINETIQ, Location Tracking, Covert Tracking Devices - GB, CA
Ocellus T100 High performance GPS Logistics Tracking for Trailers, Containers, Vehicles and Remote Assets Qinetiq 2011 Brochure QINETIQ, Location Tracking, Covert Tracking Devices - GB, CA
OM Purchase Order Dreamlab 2010 Contract Material DREAMLAB, Trojans, Strategic Infection Internet Usage CH, OM
OM Quotation Monitoring for iproxy-project Dreamlab 2010 Contract Material DREAMLAB, Trojans, Strategic Infection Internet Usage CH, OM
OM System Manual Dreamlab 2010 Deployment Docu DREAMLAB, Trojans, Strategic Infection Internet Usage CH, OM
Omega Recording Transmitter Cobham 2011 Data Sheet COBHAM, Covert Surveillance Devices, Tactical Interception Devices - DK
OptiCop Interceptor Monitoring Access solutions Netquest 2011 Brochure NETQUEST, Lawful Interception, Mass Monitoring - US
Orion SkyWeb Premium Cobham 2011 Data Sheet COBHAM, Location Tracking - DK
Our Mission to make the world a safer place for all of us Trovicor 2011 Brochure TROVICOR, Monitoring Centre, PRODUCT, SERVICE - DE
PACE Protocol & Application Classification Engine IPOQUE - Data Sheet IPOQUE, Deep Packet Inspection - -
Packet Monitoring Solutions Telesoft Technologies 2011 Brochure TELESOFT TECHNOLOGIES, COMINT, Deep Packet Inspection, Lawful Interception, Internet Monitoring, Mass Monitoring, Network Recording, Passive Surveillance, Traffic Data Processing, SIGINT 100GE, 10GE, 40GE, 100GE, 1GE, VOIP COMINT, SIP, IP, IPv6, TCP, UDP, PCIe, email, PPP GB, US, IN
Paris Expo Trovicor 2012 Brochure TROVICOR, Lawful Interception, Monitoring Centre Phone Network, Mobile Phone Network DE
Persistent Wide Area Surveillance PV labs 2011 Brochure PV LABS, CCTV, Image Recognition - US
Presentation du Director NETOPTICS - Presentation NETOPTICS - US
Presentation Societe Siltec - Presentation SILTEC - PL
Principe de fonctioneement d´un TAP cuivre NETOPTICS - Presentation NETOPTICS - US
Private Voip Exchanges & the IAX Dilemma Packet Forensics 2011 Brochure PACKET FORENSICS, VOIP COMINT, H323, SIP, MGCP, IAX - US
proceo OCKHAM 2011 Brochure OCKHAM, Analysis Software, Visualisation - FR
Public Security 54 ADS 2011 Brochure ADS GSM GB
Q20 High Dynamics GPS Receiver Module Qinetiq 2011 Brochure QINETIQ, Location Tracking - GB, CA
Recording and Transcription Systems Speech Technology Center - Brochure SPEECH TECHNOLOGY CENTER, Audio Forensics, Speaker Identification, Speech Recognition - RU, DE
Redirector Programmer Guide Version 4.0 Silicom 2010 Manual SILICOM, Strategic Infection Internet Usage IL
RF detection Berkeley Varitronics Systems 2011 Brochure BERKELEY VARITRONICS SYSTEMS, BERKELEY VARITRONICS SYSTEMS DECT 6.0 PROBLEMS UMTS, SIGINT - US
RGN-CU-IL4 4×1 10/100BaseT In-Line Regeneration Tap NETOPTICS - Brochure NETOPTICS, HARDWARE - US
Safe Cities Surveillance Infrastructure Cobham 2011 Brochure COBHAM, Internet Monitoring, Tactical GSM Interception, SIGINT, COMINT, Covert Surveillance Devices, localisation, visualisation - DK
Safe City Solutions NICE 2011 Brochure NICE, Mass Monitoring, CCTV, Covert Surveillance Devices, Location Tracking - IL, US, GB, HK
Scan Surveillance for Governments ScanTarget 2011 Brochure SCANTARGET, Deep Packet Inspection, COMINT, Network Recording, SMS Monitoring, Lawful Interception, Traffic Data Processing, Semantic Analysis, Social Network Analysis, SOFTWARE, HARDWARE, PRODUCT Twitter, E-Mail, Instant Messaging, Facebook, Internet Usage, Blogs, Forums FR
Schedule 2013 ISS 2013 Catalogue ISS - GLOBAL LISTING
Security and Surveillance – Video Analytics Autonomy 2011 Brochure AUTONOMY, CCTV, Analysis Software - US
Septier Monitoring Centre Septier 2011 Brochure SEPTIER, Speaker identification, Text mining, VOIP COMINT, Monitoring Centre, Speech Recognition E-Mail, SMS, Instant Messaging FR
SessionVista CX-10 Collector Datasheet Mantaro 2011 Brochure MANTARO, Visualisation, VOIP COMINT, Lawful Interception, Deep Packet Inspection Instant Messaging, E-Mail US
Showcases Law Enforcement Citywide Surveillance Digital Barriers 2011 Brochure DIGITAL BARRIERS, Mass Monitoring, CCTV - GB, FR, US, AE, SG
Signal Technology in Service of Homeland Security MEDAV 2011 Brochure MEDAV, Internet Monitoring, Mass Monitoring, COMINT, SIGINT, OSINT, HUMINT, MASINT, Visualisation, Lawful Interception, Network Recording, Passive Surveillance, Data Retention, Deep Packet Inspection, VOIP COMINT, Audio Forensics, Social Network Analysis iphone, iOS, apple, GIS DE
Signals intelligence solutions L3 ASA 2011 Catalogue L3 ASA, SIGINT, Lawful Interception, Location Tracking - GB, US
SIMiFOR Forensic Telecommunications Services 2011 Brochure FORENSIC TELECOMMUNICATIONS SERVICES, Cell Phone Forensics, SIM Card Forensics - GB, US
SIS II Specialized Audio Editor Speech Technology Center 2010 Brochure SPEECH TECHNOLOGY CENTER, Audio Forensics, Speech Recognition, Speaker Identification, SERVICE Phone Network RU, DE
Small Cellular Basestations for security applications Cambridge Consultants 2011 Brochure CAMBRIDGE CONSULTANTS, IMSI catcher, Lawful Interception, Tactical GSM Interception - GB, US
Solutions d‘Analyse Reseau ELEXO - Presentation ELEXO - -
Sondes pour le monitoring a distance du reseau NETWORK INSTRUMENTS - Brochure NETWORK INSTRUMENTS - US, FR
Speaker Identification Field Toolkit Agnitio 2011 Brochure AGNITIO, Audio Forensics, Speaker Identification, Speech Recognition Phone Network ES
Spectrum Intelligence Systems CRFS 2011 Catalogue CRFS, Cell Phone Detection, SIGINT - GB
Speed Size Simplicity AAPPRO 2011 Brochure AAPPRO, Tactical Interception Devices, Tactical GSM Interception GSM GB
SPEKTOR Forensic Intelligence Evidence Talks Ltd. 2012 Brochure EVIDENCE TALKS LTD., Cell Phone Forensics, SIM Card Forensics, HARDWARE, PRODUCT, SOFTWARE - GB
SSL Inspector Netronome 2011 Brochure NETRONOME, Deep Packet Inspection, SSL, HARDWARE - US
Stopping Cyber Criminials in Their Tracks i2 Group 2010 Brochure I2 GROUP, Analysis Software, SOFTWARE - US
Strategic Satellite Monitoring VAStech 2011 Brochure VASTECH, COMINT, Satellite Interception, Strategic Interception - ZA
Strategic Telecommunication Network Monitoring VAStech 2011 Brochure VASTECH, Mass Monitoring, Network Recording, Speech Recognition, Traffic Data Processing, SMS Monitoring, Internet Monitoring, Deep Packet Inspection, Strategic Interception, HARDWARE, SOFTWARE - ZA
Strategy for an overall intelligence Concept Gamma 2011 Brochure GAMMA, Trojans, Strategic Infection Internet Usage DE, GB, CH
Superior Pattern Discovery Solutions Visual Analytics Inc 2011 Catalogue VISUAL ANALYTICS INC, Analysis Software, Visualisation, Data Mining, SOFTWARE, SERVICE - US
Surveillance Simplified Packet Forensics 2011 Brochure PACKET FORENSICS, Internet Monitoring, Lawful Interception, Deep Packet Inspection - US
Tactical Communications and Surveillance Cobham 2011 Data Sheet COBHAM, Location Tracking, Covert Tracking Devices, Tactical GSM Interception, CCTV, Covert Surveillance Devices, Image Recognition - DK
Tactical Content Management System PV labs 2011 Brochure PV LABS, Image Recognition - US
Tactical Observation Solutions SESP 2010 Brochure SESP, Tactical Interception Devices, HARDWARE, PRODUCT - GB
Tap into your Network Product Brochure NETOPTICS - Brochure NETOPTICS - US
Tartan Software overview NTREPID 2011 Brochure NTREPID, Analysis Software, Visualisation, Strategic Interception, SOFTWARE - US
Techncial Surveillance equipments BEA 2011 Brochure BEA, COMINT, Covert Surveillance Devices, Covert Tracking Devices, SIGINT, Audio Forensics - IT
Tempest Product Overview Siltec - Brochure SILTEC, Tempest - PL
TextChart AutoMark 8 i2 Group 2010 Brochure I2 GROUP, Analysis Software, Text mining - US
Thor Digitial Surveillance System Cobham 2011 Data Sheet COBHAM, Tactical Interception Devices, Covert Surveillance Devices - DK
Thor Mini Receiver Cobham 2011 Brochure COBHAM, Covert Surveillance Devices, Tactical Interception Devices, HARDWARE - DK
Timebox Event Visualisation IX Capability HP Defence and Security 2011 Brochure HP DEFENCE AND SECURITY, Visualisation, Analysis Software - US
TM Finfisher FinFly ISP Project Turkmenistan Gamma 2011 Deployment Docu GAMMA, Trojans, Strategic Infection Internet Usage DE, GB, TM
TM Quotation InfectionProxy Dreamlab´ 2010 Contract Material DREAMLAB´, Trojans, Strategic Infection Internet Usage CH, TM
TMR 16E1 PCIe Tamara - Data Sheet TAMARA - TR
TVI S400 Wireless Surveillance Digital Barriers 2011 Brochure DIGITAL BARRIERS, Covert Surveillance Devices, CCTV - GB, FR, US, AE, SG
UK Pavilion at Milipol ADS 2011 Brochure ADS - GB
Unmanned Surveillance System Harris 2011 Brochure HARRIS, Covert Surveillance Devices, CCTV, Image Recognition - US
Urban Management Solutions AGT International 2011 Brochure AGT INTERNATIONAL, Analysis Software Phone Network CH, NL, GB, DE, BR, SG, IN
Urban Security – Mexico city THALES 2011 Brochure THALES, THALES URBAN SECURITY – MEXICO CITY Passive Surveillance - FR
Utimaco LIMS Interceptacion legal de servicios de telecomunicaciones UTIMACO - Brochure UTIMACO, Lawful Interception Phone Network, Mobile Phone Network DE, GB
Utimacop LIMS Lawful Interception of Telecommuication Services UTIMACO 2010 Brochure UTIMACO, Lawful Interception Phone Network, Mobile Phone Network DE, GB
VEGA Elektron - Brochure ELEKTRON, COMINT, Location Tracking, Monitoring Centre - FR
Vereinbarung einer strategischen Partnerschaft Dreamlab Gamma 2011 Contract Material DREAMLAB GAMMA, Trojans, Strategic Infection Internet Usage DE, GB, CH
Virtualisation ELEXO - Brochure ELEXO - -
Virtus Translation for Structured Data Virtus 2011 Brochure VIRTUS, Analysis Software, SOFTWARE - US
Vision Analytics AI Solve 2011 Brochure AI SOLVE, Facial Recognition, Vehicle Tracking, CCTV - GB
VoiceGrid Voice Biometric Solutions Speech Technology Centre 2011 Brochure SPEECH TECHNOLOGY CENTRE, Mass Monitoring, Biometrics, Analysis Software, Audio Forensics, Speaker Identification, Speech Recognition - RU, DE
VoiceGrid X Speech Technology Centre 2011 Brochure SPEECH TECHNOLOGY CENTRE, Audio Forensics, Biometrics, Speaker Identification, Analysis Software, Speech Recognition - RU, DE
VoiceGrid X Voice Biometrics Soilutions Speech Technology Centre 2011 Brochure SPEECH TECHNOLOGY CENTRE, Analysis Software, Speech Recognition, Speaker Identification, SOFTWARE - RU, DE
WatchHound cellphone monitor Berkeley Varitronics Systems 2011 Brochure BERKELEY VARITRONICS SYSTEMS, SIGINT, Cell Phone Forensics - US
Wireless Homeland Security Cambridge Consultants 2011 Brochure CAMBRIDGE CONSULTANTS, Cell Phone Forensics, Location Tracking, Tactical GSM Interception, Tactical Internet Monitoring, Network Recording, Covert Surveillance Devices, Covert Tracking Devices - GB, US
Wolfhound Cell phone detection systems Berkeley Varitronics Systems 2011 Brochure BERKELEY VARITRONICS SYSTEMS, SIGINT, Lawful Interception, Cell Phone Detection - US
Wolfhound Lite Cellphone Detector Berkeley Varitronics Systems 2011 Brochure BERKELEY VARITRONICS SYSTEMS, SIGINT, Lawful Interception, Cell Phone Detection, HARDWARE - US
Wolfhound Pro Berkeley Varitronics Systems 2011 Brochure BERKELEY VARITRONICS SYSTEMS, Lawful Interception, SIGINT - US
Zimiti C-IDS Unattended Ground Sensors Covert Intrusion Detection System Digital Barriers 2011 Brochure DIGITAL BARRIERS, Covert Surveillance Devices, Tactical Interception Devices, Seismic Vibration Sensors - GB, FR, US, AE, SG

WikiLeaks Counter Intelligence Unit (WLCIU) Location Tracking Map

Name Company Year Tags Country Codes
2013 ALL Targets - 2011 WLCIU -
Avner Turniansky Verint 2012 VERINT, Lawful Interception, Strategic Interception, WLCIU IL, IT, US, ES, NG, CH, GR, TR
Brydon Nelson Gamma 2012 GAMMA, Trojans, WLCIU GB, DE, QA, AE, BH, NL, OM, BN, MY, CY, FR
Carlos Gandini Gamma 2012 GAMMA, Trojans, WLCIU DE, AT, ES, CZ, FR, MX, AE, OM, MA, GQ, CM, PT, BR
Chris Nyland Hidden Technology 2012 HIDDEN TECHNOLOGY, Tactical Interception Devices, WLCIU GB, ES, MT, FR, NL, IN
David Ast Cobham 2012 COBHAM, Tactical GSM Interception, WLCIU DE, CZ, DK, CH, FR, AT, IT
Holger Rumscheidt Elaman 2011 ELAMAN, Trojans, WLCIU LB, DE, FR, CH, AE, AT, OM, ZA, ET, US, AZ, TM, ZA, JO
Johnny Debs Gamma 2012 GAMMA, Trojans, WLCIU LB, RS, GB, CZ, TR, ET, GA
Louthean Nelson Gamma 2011 GAMMA, Trojans, Strategic Infection, WLCIU LB, DE, AE, LV, CH, ID, IT, MY, SG, GB, AT, RS, TR, CI, BJ, ZA
Marco Bettini Hackingteam 2012 HACKINGTEAM, Trojans, Strategic Infection, WLCIU IT, FR, MA, AE, SG, DE, RS, ES, MX, CZ, PT, BR
Martin Muench Gamma 2013 GAMMA, Trojans, Strategic Infection, WLCIU MX, US, DE, CZ, KZ, GB, NL, FR, RS
Mostapaha Maana Hackingteam 2011 HACKINGTEAM, Trojans, WLCIU IT, CH, US, MA, MY, SG, LB, NL, FR, EG, AE, TR, DE, SA, QA, SD, CZ, OM
Neil Tomlinson Cobham 2012 COBHAM, Tactical GSM Interception, WLCIU GB, AE, LB, QT, KW
Peter Warnke Cellebrite 2012 CELLEBRITE, WLCIU DE, IL, TR, NL, AE, US, GB, PL, CH
Ray Hutton Telesoft 2012 TELESOFT, Lawful Interception, Tactical Internet Monitoring, WLCIU GB, ES, AE, IT
Rudolf Gnadl Rohde Schwarz 2012 ROHDE SCHWARZ, SIGINT, WLCIU DE, AT, CZ, PT, FR, ES, US
Rudolf Windschuh UTIMACO 2012 UTIMACO, Lawful Interception, Strategic Interception, Data Retention, WLCIU DE, NL, FR, ES, AE, AU, CZ, FI, GB
Stephan Oelkers Gamma 2012 GAMMA, Trojans, Strategic Infection, WLCIU SG, ID, UG, AE, DE, ET, NG, DE, LB, QA, NG
Thomas Oblinger Elaman 2012 ELAMAN, Trojans, WLCIU DE, CH, AE, OM
Tomas Miskovsky Trovicor 2012 TROVICOR, Lawful Interception, Monitoring Centre, WLCIU CZ, AE, DE, BG, RS
WLCIU ES SPAIN 2013 SPAIN, WLCIU ES
WLCIU ET ETHIOPIA 2012 ETHIOPIA, WLCIU ET
WLCIU AZ AZERBAIJAN 2012 AZERBAIJAN, WLCIU AZ
WLCIU BH BAHRAIN 2013 BAHRAIN, WLCIU BH
WLCIU BR BRAZIL 2013 BRAZIL, WLCIU BR
WLCIU GQ EQUATORIAL GUINEA 2013 EQUATORIAL GUINEA, WLCIU GQ
WLCIU ID INDONESIA 2012 INDONESIA, WLCIU ID
WLCIU KZ KAZAKHSTAN 2013 KAZAKHSTAN, WLCIU KZ
WLCIU MX MEXICO 2013 MEXICO, WLCIU MX
WLCIU MY MALAYSIA 2011 MALAYSIA, WLCIU MY
WLCIU NG NIGERIA 2013 NIGERIA, WLCIU NG
WLCIU NL NETHERLANDS 2012 NETHERLANDS, WLCIU NL
WLCIU RS SERBIA 2012 SERBIA, WLCIU RS
WLCIU TM TURKMENISTAN 2013 TURKMENISTAN, WLCIU TM
WLCIU UG UGANDA 2013 UGANDA, WLCIU UG

FinSpy1

finspy : Inside the shadow world of commercialized spook spyware

Gamma Group FinFisher Governmental IT Intrusion and Surveillance Presentations

The following presentations from the Gamma Group describe the company’s FinFisher and GSM / 3G tactical interception and target location surveillance products.  The presentations were anonymously posted online from a discussions between Gamma and the German State Criminal Police Offices (Landeskriminalamt).  The presentations were first reported by Netzpolitik.org and were subsequently analyzed by F-Secure CRO Mikko Hypponen.

FinFisher Governmental IT Intrusion and Remote Monitoring Solutions 37 pages Download
(9.72 MB)
3G-GSM Tactical Interception & Target Location 51 pages Download
(19.8 MB)

Traditional Lawful Interception solutions face new challenges that can only be solved using active systems like FinSpy:
· Data not transmitted over any network
· Encrypted Communications
· Targets in foreign countries
FinSpy has been proven successful in operations around the world for many years, and valuable intelligence has been gathered about Target Individuals and Organizations.
When FinSpy is installed on a computer system it can be remotely controlled and accessed as soon as it is connected to the internet/network, no matter where in the
world the Target System is based.

Feature Overview
Target Computer – Example Features:
· Bypassing of 40 regularly tested Antivirus Systems
· Covert Communication with Headquarters
· Full Skype Monitoring (Calls, Chats, File Transfers,
Video, Contact List)
· Recording of common communication like Email, Chats and Voice-over-IP
· Live Surveillance through Webcam and Microphone
· Country Tracing of Target
· Silent extracting of Files from Hard-Disk
· Process-based Key-logger for faster analysis
· Live Remote Forensics on Target System
· Advanced Filters to record only important information
· Supports most common Operating Systems (Windows,
Mac OSX and Linux)

http://www.networkworld.com/community/files/user13712/Gamma_FinSpy_.gifHeadquarters – Example Features:
· Evidence Protection (Valid Evidence according to European Standards)
· User-Management according to Security Clearances
· Security Data Encryption and Communication using RSA-2048 and AES-256

· Hidden from Public through Anonymizing Proxy

· Can be fully integrated with Law Enforcement Monitoring Functionality (LEMF)
For a full feature list please refer to the Product Specifications.

 

 

Access Target Computer Systems around the World

2GAMMA-FinSpy

Spy Files released so far: 574

 

Resources:

Full text of “FinSpy promotional materials” – Internet Archive

finspy – Amazon S3

FINFISHER

Remote Monitoring 8: Infection Solutions – DocumentClo

Remote Monitoring & Infection Solutions: FINSPY – video

Infosecurity – FinFisher Spyware Presentation Details Leaked

FinFisher IT Intrusion Products

Meet the ‘Corporate Enemies of the Internet

FinSpy Software Used To Surveil Activists

Gamma Group FinFisher Governmental IT Intrusion

National Security AgencyNSA | lisaleaks

San Diego Poised To Be Cyber Security Leader | lisaleaks

Technology Vision 2014: Key IT Trends

39 – www.portierramaryaire.com • View topic – Aviones sin

Inside the shadow world of commercialised spook spyware

Black Code: Inside the Battle for Cyberspace – Google Book

Dragnet Nation: A Quest for Privacy, Security, and Freedom


Filed under: FinFisher, FinFisher Spyware, Gamma International, Internet surveillance, Mass Surveillance, Surveillance Tagged: CIA, Domestic Surveillance, FinFisher, FinFisher Spyware, Global Surveillance, Malware, Mass Surveillance, National Security Agency - NSA, Spy Files, Surveillance, Wikileaks

Viewing all articles
Browse latest Browse all 2

Latest Images

Trending Articles





Latest Images