{"id":947,"date":"2014-11-01T08:23:14","date_gmt":"2014-11-01T12:23:14","guid":{"rendered":"http:\/\/olduvai.ca\/?p=947"},"modified":"2014-11-01T08:23:14","modified_gmt":"2014-11-01T12:23:14","slug":"secret-manuals-show-the-spyware-sold-to-despots-and-cops-worldwide-the-intercept","status":"publish","type":"post","link":"https:\/\/olduvai.ca\/?p=947","title":{"rendered":"Secret Manuals Show the Spyware Sold to Despots and Cops Worldwide &#8211; The Intercept"},"content":{"rendered":"<p><a href=\"https:\/\/firstlook.org\/theintercept\/2014\/10\/30\/hacking-team\/\">Secret Manuals Show the Spyware Sold to Despots and Cops Worldwide &#8211; The Intercept<\/a>.<\/p>\n<p style=\"box-sizing: border-box; margin: 0px 0px 28px 0px;\">When Apple and Google unveiled new encryption schemes last month, law enforcement officials\u00a0<a style=\"box-sizing: border-box; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: transparent; color: #df3f3d; text-decoration: none; background-position: initial initial; background-repeat: initial initial;\" href=\"https:\/\/firstlook.org\/theintercept\/2014\/10\/09\/police-act-furious-encrypted-phones-still-love-heres\/\">complained<\/a>\u00a0that they wouldn\u2019t be able to unlock evidence on criminals\u2019 digital devices. What they didn\u2019t say is that there are already methods to bypass encryption, thanks to off-the-shelf digital implants readily available to the smallest national agencies and the largest city police forces \u2014 easy-to-use software that takes over and monitors digital devices in real time, according to documents obtained by\u00a0<em style=\"box-sizing: border-box; font-style: italic;\">The Intercept<\/em>.<\/p>\n<p style=\"box-sizing: border-box; margin: 0px 0px 28px 0px;\">We\u2019re\u00a0<a style=\"box-sizing: border-box; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: transparent; color: #df3f3d; text-decoration: none; background-position: initial initial; background-repeat: initial initial;\" href=\"https:\/\/firstlook.org\/theintercept\/2014\/10\/30\/hacking-team\/#manuals\">publishing<\/a>\u00a0in full, for the first time, manuals explaining the prominent commercial implant software \u201cRemote Control System,\u201d manufactured by the Italian company Hacking Team. Despite FBI director James Comey\u2019s\u00a0<a style=\"box-sizing: border-box; background-image: initial; background-attachment: initial; background-origin: initial; background-clip: initial; background-color: transparent; color: #df3f3d; text-decoration: none; background-position: initial initial; background-repeat: initial initial;\" href=\"http:\/\/www.theguardian.com\/us-news\/2014\/oct\/16\/fbi-director-attacks-tech-companies-encryption\">dire warnings<\/a>\u00a0about the impact of widespread data scrambling \u2014 \u201ccriminals and terrorists would like nothing more,\u201d he declared \u2014 Hacking Team explicitly promises on its website that its software can \u201cdefeat encryption.\u201d<\/p>\n<p style=\"box-sizing: border-box; margin: 0px 0px 28px 0px;\">The manuals describe Hacking Team\u2019s software for government technicians and analysts, showing how it can activate cameras, exfiltrate emails, record Skype calls, log typing, and collect passwords on targeted devices. They also catalog a range of pre-bottled techniques for infecting those devices using wifi networks, USB sticks, streaming video, and email attachments to deliver viral installers. With a few clicks of a mouse, even a lightly trained technician can build a software agent that can infect and monitor a device, then upload captured data at unobtrusive times using a stealthy network of proxy servers, all without leaving a trace. That, at least, is what Hacking Team\u2019s manuals claim as the company tries to distinguish its offerings in the global marketplace for government hacking software.<\/p>\n<p style=\"box-sizing: border-box; margin: 0px 0px 28px 0px;\">&#8230;click on \u00a0the above link to read the rest of the article&#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Secret Manuals Show the Spyware Sold to Despots and Cops Worldwide &#8211; The Intercept. When Apple and Google unveiled new encryption schemes last month, law enforcement officials\u00a0complained\u00a0that they wouldn\u2019t be able to unlock evidence on criminals\u2019 digital devices. What they didn\u2019t say is that there are already methods to bypass encryption, thanks to off-the-shelf digital [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[6],"tags":[29,261,378,747,765],"class_list":["post-947","post","type-post","status-publish","format-standard","hentry","category-liberty","tag-apple","tag-encryption","tag-google","tag-spyware","tag-surveillance"],"_links":{"self":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts\/947","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=947"}],"version-history":[{"count":0,"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts\/947\/revisions"}],"wp:attachment":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=947"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=947"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=947"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}