abusesaffiliationarrow-downarrow-leftarrow-rightarrow-upattack-typeburgerchevron-downchevron-leftchevron-rightchevron-upClock iconclosedeletedevelopment-povertydiscriminationdollardownloademailenvironmentexternal-linkfacebookfiltergenderglobegroupshealthC4067174-3DD9-4B9E-AD64-284FDAAE6338@1xinformation-outlineinformationinstagraminvestment-trade-globalisationissueslabourlanguagesShapeCombined Shapeline, chart, up, arrow, graphLinkedInlocationmap-pinminusnewsorganisationotheroverviewpluspreviewArtboard 185profilerefreshIconnewssearchsecurityPathStock downStock steadyStock uptagticktooltiptwitteruniversalityweb
Article

19 Nov 2011

Author:
Jennifer Valentino-Devries, Julia Angwin, Steve Stecklow, Wall Street Journal

Document Trove Exposes Surveillance Methods

Documents obtained by The Wall Street Journal open a rare window into a new global market for the off-the-shelf surveillance technology...The techniques described in the…marketing documents, spanning 36 companies, include hacking tools that enable governments to break into people's computers and cellphones, and "massive intercept" gear that can gather all Internet communications in a country...Critics say the market represents a new sort of arms trade supplying Western governments and repressive nations alike...Companies making and selling this gear say it is intended to catch criminals and is available only to governments and law enforcement. They say they obey export laws and aren't responsible for how the tools are used...Privacy advocates say manufacturers should be more transparent about their activities. Eric King of...Privacy International said "the complex network of supply chains and subsidiaries involved in this trade allows one after the other to continually pass the buck and abdicate responsibility." ...In interviews [at a] Dubai [surveillance trade conference], executives at several companies said they were aware their products could be abused by authoritarian regimes but they can't control their use after a sale. [refers to Telesoft, Net Optics, Gamma International (part of Gamma Group), Vupen Security, HackingTeam SRL, RCS SpA, FinFisher (part of Gamma Group)]