Document Trove Exposes Surveillance Methods [telecom]

CENSORSHIP INC.

Document Trove Exposes Surveillance Methods

By JENNIFER VALENTINO-DEVRIES, JULIA ANGWIN and STEVE STECKLOW NOVEMBER 19, 2011

Documents obtained by The Wall Street Journal open a rare window into a new global market for the off-the-shelf surveillance technology that has arisen in the decade since the terrorist attacks of Sept.

11, 2001.

The techniques described in the trove of 200-plus marketing documents, spanning 36 companies, include hacking tools that enable governments to break into people's computers and cellphones, and "massive intercept" gear that can gather all Internet communications in a country. The papers were obtained from attendees of a secretive surveillance conference held near Washington, D.C., last month.

Intelligence agencies in the U.S. and abroad have long conducted their own surveillance. But in recent years, a retail market for surveillance tools has sprung up from "nearly zero" in 2001 to about $5 billion a year, said Jerry Lucas, president of TeleStrategies Inc., the show's operator.

Critics say the market represents a new sort of arms trade supplying Western governments and repressive nations alike. "The Arab Spring countries all had more sophisticated surveillance capabilities than I would have guessed," said Andrew McLaughlin, who recently left his post as deputy chief technology officer in the White House, referring to the Middle Eastern and African nations racked by violent crackdowns on dissent.

The Journal this year uncovered an Internet surveillance center installed by a French firm in Libya and reported that software made by Britain's Gamma International UK Ltd., had been used in Egypt to intercept dissidents' Skype conversations. In October, a U.S. company that makes Internet-filtering gear acknowledged to the Journal that its devices were being used in Syria.

Companies making and selling this gear say it is intended to catch criminals and is available only to governments and law enforcement. They say they obey export laws and aren't responsible for how the tools are used.

..

formatting link

***** Moderator's Note *****

Here's another testimonial for end-to-end encryption.

Bill "Once three people know it, it's not a secret" Horne

Bill Horne Moderator

Reply to
Monty Solomon
Loading thread data ...

.........

That sounds awfully familiar to the justification arms manufacturers use when (continually) supplying despotic regimes with their products which are invariably used to keep the bastards in power.

I suppose once we all get access to these intrusion technologies then the "playing field" will be evened out a bit(?)

Reply to
David Clayton

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.