Blue cabinet
Contents
- 1 Internetz Undersea and Terrestrial Cables Info
- 2 List of "Think Tanks" Promoting Surveillance Tech & Private Intel Contractors
- 3 List of Surveillance vendor Alliances/Networks/Organizations
- 3.1 Alliance for Telecommunications Industry Solutions
- 3.2 ENISA’s Security Awareness Working Group
- 3.3 Ensemble Alliance
- 3.4 European Telecommunications Standards Institute
- 3.5 Global Standards Collaboration
- 3.6 High Technology Crime Investigation Association (Worldwide)
- 3.7 Network Intelligence Alliance
- 3.8 SCOPE ALLIANCE
- 3.9 Telecommunications Industry Association
- 3.10 3rd Generation Partnership Project
- 4 List of "Green Badger" Surveillance Tech Companies
- 5 List of companies
- 5.1 ABILITY (Israel)*
- 5.2 ABRAXAS CORPORATION (USA)
- 5.3 ACCESS DATA (USA)*
- 5.4 ACCURIS NETWORKS (Ireland) *
- 5.5 ACME Packet (USA) *
- 5.6 ACULAB (UK)
- 5.7 ADAE (Greece)*
- 5.8 AdaptiveMobile (Ireland) *
- 5.9 ADAX (US/UK/CHINA)*
- 5.10 ADVANCED SOFTWARE SYSTEMS, Inc. (USA)
- 5.11 Advantech (USA)*
- 5.12 AGNITIO (Spain) *
- 5.13 AITIA (Hungary) *
- 5.14 AKAMAI Technologies (USA)*
- 5.15 AKORN TELECOM (UAE/Dubai/Libya/Syria)*
- 5.16 Alcatel-Lucent (France/USA)
- 5.17 ALLOT (Israel)
- 5.18 ALTRON (UA)
- 5.19 AMESYS/Bull (France)
- 5.20 ANONYMIZER (USA)
- 5.21 ANRITSU CORPORATION (Japan)
- 5.22 ANTAMEDIA (Serbia/Russia)
- 5.23 APPIN TECHNOLOGIES (India)
- 5.24 AQSACOM (France)
- 5.25 ARBOR NETWORKS (USA)
- 5.26 AREA S.p.A. (Italy)
- 5.27 ARICENT (US/Global)
- 5.28 ARYAKA (USA/India)
- 5.29 AS SOLUTIONS (Denmark)
- 5.30 ASTELIT (Ukraine/Turkey)
- 5.31 ATIS SYSTEMS (Germany)
- 5.32 A-T SOLUTIONS (USA)
- 5.33 AT&T (USA)
- 5.34 ATTENSITY (USA)
- 5.35 AudioCodes (Israel)
- 5.36 AUDIOTEL INTERNATIONAL (UK)
- 5.37 AVISTAR (USA)
- 5.38 AWASI (Canada)
- 5.39 AXON / HCL AXON (Ukraine/Global)
- 5.40 AXXONSOFT / Axxon (Russia/Global)
- 5.41 A10 NETWORKS (USA)
- 5.42 BAIDU INC (China) *
- 5.43 BARBEDWIRE TECHNOLOGIES (US)
- 5.44 BARRACUDA NETWORKS (USA)
- 5.45 BASIS TECHNOLOGY (USA)
- 5.46 BDL GULF FZCO(Dubai/UAE)
- 5.47 BEA Systems/Oracle (US)
- 5.48 BELKASOFT (Russia)
- 5.49 BERICO TECHNOLOGIES (US)
- 5.50 BLUE COAT SYSTEMS (USA)
- 5.51 BOEING/DRT Inc. (USA)
- 5.52 BREAKINGPOINT (USA)
- 5.53 BROCADE (USA)
- 5.54 BT (UK)
- 5.55 BULL GROUP (France/Global)
- 5.56 CACI International (USA)
- 5.57 CAMBRIDGE CONSULTANTS (UK)
- 5.58 CARRIER IQ (USA)
- 5.59 CCT / Cecratech (Sweden)
- 5.60 CELLEBRITE MOBILE SYNCHRONIZATION Ltd./SUN (Israel)
- 5.61 CEM4Mobile (Finland)
- 5.62 The Centre for Secure Information Technologies (UK/N. Ireland)
- 5.63 CHECK POINT SOFTWARE LTD. (USA/Israel)
- 5.64 CHERTOFF GROUP (USA)
- 5.65 CISCO (US)
- 5.66 CLEARSWIFT (UK)
- 5.67 ClearTrail (India)
- 5.68 Click&DECiDE (France)
- 5.69 CLOUDSHIELD (USA)
- 5.70 COBHAM (UK)
- 5.71 CommProve (Ireland)
- 5.72 CommuniGate Systems (USA)
- 5.73 Computer Sciences Corporation (USA)
- 5.74 COMVERSE TECHNOLOGY (CTI,Verint,Syborg)(US/Israel/Germany)
- 5.75 CONCURRENT TECHNOLOGIES CORPORATION (USA)
- 5.76 CORERO NETWORK SECURITY (USA/UK)
- 5.77 CORNFIELD ELECTRONICS (USA)
- 5.78 COUNTERTACK (USA)
- 5.79 C-TECH (Turkey)
- 5.80 CREATIVITY SOFTWARE (UK)
- 5.81 CRFS (United Kingdom)
- 5.82 CROSSINGTECH (Switzerland)
- 5.83 CRYPTON-M (Ukraine)
- 5.84 CSIdentity (CSID) / CyberAgent (InvestCorp) (USA)
- 5.85 CSIT (UK)
- 5.86 CUBIC CORPORATION (USA)
- 5.87 CYBEROAM / Elitecore Technologies Pvt. Ltd.(USA/India)
- 5.88 CYBER POINT INTERNATIONAL LLC (USA)*
- 5.89 CYBERSIFT (UK/USA)
- 5.90 CYBERTRUST (USA)
- 5.91 CYMPHONIX (USA)
- 5.92 DAGIR Co (USA)*
- 5.93 DATAKOM (Germany)
- 5.94 DATAMINR Inc. (USA)
- 5.95 DATATEC Limited (South Africa)
- 5.96 DATONG (UK)
- 5.97 DATYS (Cuba)
- 5.98 DECISION GROUP (Taiwan)
- 5.99 DELL SONICWALL (USA)
- 5.100 DELMA MSS (UK)
- 5.101 DELTA SpE (Ukraine)
- 5.102 DETICA (UK)
- 5.103 DIALOGIC (USA)
- 5.104 DigiTask (Germany)
- 5.105 DigiVox B.V. (Netherlands)
- 5.106 Dreamlab Technologies AG (CH)
- 5.107 EBS-Electronic GmbH (Germany)
- 5.108 EDGE INTELLIGENCE LLC (ABRAXAS) (USA)
- 5.109 ELAMAN GAMMA (Germany)
- 5.110 ELCOMSOFT (Russia)
- 5.111 ELISRA Group (Israel)
- 5.112 ELTA SYSTEMS Ltd. (Israel)
- 5.113 EMIRCOM (UAE/KSA)
- 5.114 ENDACE (New Zealand)
- 5.115 ENDGAME SYSTEMS INC (USA)
- 5.116 ERA IT Solutions AG (CH)
- 5.117 ERICSSON (Sweden/Global)
- 5.118 ERICSSON-SAUDI (Saudi Arabia/KSA)
- 5.119 ETI (Denmark)
- 5.120 ETSI (France)
- 5.121 EVIDIAN (Bull Group)(France)
- 5.122 EXFO (Canada)
- 5.123 EXINDA (USA)
- 5.124 EXPERT SYSTEM S.p.A. (Italy)
- 5.125 FACEBOOK (US/Global)
- 5.126 FireDigit (BE)
- 5.127 FORTINET (USA/Global)
- 5.128 Fox-IT (Netherlands)
- 5.129 FLUKE (USA)
- 5.130 GAMMA GROUP (FINFISHER) (UK/Germany)
- 5.131 GENERAL DYNAMICS (USA)
- 5.132 GENERAL ELECTRIC (aka GE) (USA)
- 5.133 GENETEC (Canada)
- 5.134 GfK (Germany)
- 5.135 GIGAMON GIGABIT (USA)
- 5.136 GITA TECHNOLOGIES Ltd. (Israel)
- 5.137 GLIMMERGLASS (USA)
- 5.138 GoS NETWORKS (Ireland)
- 5.139 GRIFF COMM Ltd (UK)
- 5.140 GROUP2000 (Netherlands)
- 5.141 GTEN DATAKOM (Germany)
- 5.142 GUIDANCE SOFTWARE ENCASE (USA)
- 5.143 HBGary (USA)*
- 5.144 HACKING TEAM (Italy)
- 5.145 HARRIS CORPORATION / STINGRAY (USA)
- 5.146 HEWLETT-PACKARD (HP) (USA)
- 5.147 HIDDEN TECHNOLOGY SYSTEMS INTERNATIONAL Ltd (UK)
- 5.148 HISILICON TECHNOLOGIES CO., Ltd. (China)
- 5.149 HTC CORPORATION (US/UK/GLOBAL)
- 5.150 HUAWEI TECHNOLOGIES (China)
- 5.151 HUTCHINSON-WHAMPOA LTD (CHINA/Global) *
- 5.152 IBH Impex (Germany)
- 5.153 IBM / ISS (US/Global)
- 5.154 IDEAL TECHNOLOGY CORPORATION (USA)
- 5.155 ImageWare Systems ( )
- 5.156 IMMUNITY / Aitel (USA)
- 5.157 INCOGNITO (Canada/Ireland)
- 5.158 INEOQUEST TECHNOLOGIES Incorporated (USA)
- 5.159 INFRAWORKS (USA) *
- 5.160 INNOVA S.p.A. (Italy)
- 5.161 INTELLIGENTIAS Inc. (USA)
- 5.162 INTELLIGENT SERVICES SOLUTIONS (ISS) (Egypt)
- 5.163 INTERANET (Russia)
- 5.164 INTERCOM APP (USA)
- 5.165 INTERGRAPH CORP / INTERGRAPH GOVERNMENT SOLUTIONS (HEXAGON AB) (USA/SWEDEN)*
- 5.166 INTERNET RIMON (Israel)
- 5.167 INTRACOM (Greece/Syria/US/Russia)
- 5.168 INVEA-TECH (CZ)
- 5.169 INVESTCORP (Bahrain/UK/USA)
- 5.170 INVESTOR AB (Sweden/Global)
- 5.171 Intelligence & Public Security (IPS) S.p.A. (Italy)
- 5.172 INVICTA NETWORKS (USA)
- 5.173 IP FABRICS (US)
- 5.174 IPOQUE GmbH (Germany)
- 5.175 IQT (In-Q-Tel) (USA)
- 5.176 IST (Dubai,UAE)
- 5.177 IT Ukraine (Ukraine)
- 5.178 JDS Uniphase Corporation (USA)
- 5.179 jetNEXUS (UK, US, Malaysia)
- 5.180 JUNIPER NETWORK (USA)
- 5.181 JumpGen Systems (USA)
- 5.182 KAPOW SOFTWARE (USA)
- 5.183 KBI Optronics GmbH (Germany)
- 5.184 KERIO (US/Global)
- 5.185 KEYW (USA)
- 5.186 KINGFISHER SYSTEMS (USA)
- 5.187 Kommlabs Dezign Pvt. Ltd. (India)
- 5.188 L3 Communications (USA) *
- 5.189 Law Enforcement Associates Corp. (AKA LEA-AID) (USA)*
- 5.190 LEVEL (3)(Global)
- 5.191 LIFE (Ukraine)
- 5.192 LIGHTSPEED SYSTEMS (USA)
- 5.193 LM TECHNOLOGIES LTD (UK)*
- 5.194 LOOKINGGLASS CYBER SOLUTIONS LLC (USA)
- 5.195 LOQUENDO (Italy)
- 5.196 M86 Security/8e6 Technology (aka TRUSTWAVE) (UK/USA)
- 5.197 MACRO SYSTEM (Poland)
- 5.198 MANTARO (USA)
- 5.199 MANTECH INTERNATIONAL CORPORATION INC (USA)*
- 5.200 MARCONI ( )
- 5.201 MARKMONITOR Dtecnet (USA/Denmark)
- 5.202 MEDAV GmbH (Germany)
- 5.203 MegaFon (aka Metrocom Inc.) (Russia)
- 5.204 MERA / ALOE SYSTEMS, Inc. (USA)
- 5.205 METASWITCH (UK)
- 5.206 MICROSOFT (US/Global)
- 5.207 MICRO SYSTEMATION AB (Sweden)
- 5.208 MISSING LINK SECURITY / PHYLEO (USA)
- 5.209 MOBILE ARTS (Sweden)
- 5.210 MOBILE TELECOMMUNICATION CO of IRAN (MTC Iran)
- 5.211 MOBITEL ( )*
- 5.212 MORPHO companies (see list below) - SAFRAN GROUP (France)
- 5.213 MOTOROLA - NETOPIA (USA)
- 5.214 MTN Group (S. Africa)
- 5.215 MTN Irancell (Iran)
- 5.216 MTN Syria (Syria)
- 5.217 MTN Ukraine (Ukraine)
- 5.218 MTS Ukraine (Ukraine)
- 5.219 NAPATECH (USA)
- 5.220 NARUS (USA)
- 5.221 NETAGENT (JAPAN)
- 5.222 NETAPP (USA)
- 5.223 NETI (Hungary)
- 5.224 NETLOGIC (USA)
- 5.225 NET OPTIC (USA)
- 5.226 NETQUEST CORPORATION (USA)
- 5.227 NETRONOME NETWORKS (USA)
- 5.228 NETSCOUT (USA) *
- 5.229 NETSWEEPER (Canada)
- 5.230 NETVEDA (USA)
- 5.231 NETWITNESS (USA)
- 5.232 NETWORK CRITICAL (UK/USA)
- 5.233 Network Intelligence Alliance (France/Global)
- 5.234 Neuralitic Systems (Canada)
- 5.235 NEUSTAR (USA)*
- 5.236 NEWPORT NETWORKS (UK)
- 5.237 NEXT GENERATION IDENTIFICATION (NGI)(Global)
- 5.238 NICE SYSTEMS (Israel)
- 5.239 Nokia Siemens (Finland/Germany)
- 5.240 NORTHROP GRUMMAN (USA)
- 5.241 NSO Group (Israel)
- 5.242 NTREPID (USA)
- 5.243 OGO Ukraine (Ukraine)
- 5.244 OMNI Wildpackets (USA)
- 5.245 OMRON CORPORATION
- 5.246 @ONE IT GmbH (Germany)
- 5.247 ONPATH Technologies (USA)
- 5.248 OPENET (Ireland)
- 5.249 OPNET (USA)
- 5.250 OPTENET (Spain/USA)
- 5.251 OXYGEN SOFTWARE COMPANY (Russia)
- 5.252 PACKET FORENSICS (USA)
- 5.253 PAD Datentechnik GmbH (Germany)
- 5.254 PAESSLER (Germany)
- 5.255 PALADION NETWORKS (India)
- 5.256 PALANTIR TECHNOLOGIES (USA)
- 5.257 PALO ALTO NETWORK (USA)
- 5.258 PANASONIC Corporation (Japan)
- 5.259 PANOPTECH (United Kingdom)
- 5.260 PEARLSOFT (USA)
- 5.261 PEN LINK (USA)
- 5.262 PHOENIX (USA)
- 5.263 PHONEXIA S.R.O. (CZ)
- 5.264 PINE DIGITAL SECURITY (Netherlands)
- 5.265 PINION SOFTWARE Inc. / (USA)*
- 5.266 PK-Electronic (Germany)
- 5.267 PLATH GmbH (Germany)
- 5.268 POLARIS WIRELESS (USA)
- 5.269 PRAESCIENT ANALYTICS (USA)
- 5.270 PREDPOL INC PREDICTIVE POLICING (USA)
- 5.271 PROCERA NETWORKS (USA)
- 5.272 PROLEXIC (USA)*
- 5.273 PROOFPOINT (USA)
- 5.274 PROTEI (Russia/Jordan)
- 5.275 QinetiQ Mission Solutions Group (USA)
- 5.276 QOSMOS (France)
- 5.277 Q1Labs / IBM (USA)
- 5.278 RADISYS (USA)
- 5.279 RADWARE (Israel)
- 5.280 RAINSTOR (USA/UK)
- 5.281 RANTEK (Denmark)
- 5.282 RAYTHEON BBN TECHNOLOGIES (USA)
- 5.283 Raytheon Intelligence and Information Systems (ISS)(USA)
- 5.284 RAYTHEON TRUSTED COMPUTER SOLUTIONS, INC. (USA)
- 5.285 RCS (Italy)
- 5.286 RECORDED FUTURE (USA)
- 5.287 RESI GROUP (Italy)
- 5.288 RETENTIA (USA)
- 5.289 REUTER (Germany)
- 5.290 RIMON INTERNET (Israel)
- 5.291 RIVERBED (USA)
- 5.292 ROHDE & SCHWARZ (Germany)
- 5.293 RSA / EMC2 (USA)
- 5.294 Rsignia Inc. ( )
- 5.295 RTI Systems (Russia)
- 5.296 SafeNet Inc.(USA)
- 5.297 SAGEM (France)
- 5.298 SALIENT FEDERAL SOLUTIONS (USA)
- 5.299 SANDVINE (Canada)
- 5.300 SAP (Germany/USA)
- 5.301 SASKEN (Finland/India/China/USA)
- 5.302 SAS INSTITUTE ( )
- 5.303 SCAN & TARGET (France)
- 5.304 SCIENCE APPLICATIONS INTERNATIONAL CORP. (SAIC)(USA)
- 5.305 SEANET TECHNOLOGIES (USA)
- 5.306 SEARTECH (South Africa)
- 5.307 SECURITAS / PINKERTONS (Sweden)
- 5.308 SECURITY SOFTWARE INTERNATIONAL (SSI) ( )
- 5.309 SELECTRONIC (Germany)
- 5.310 SELEX (Italy)
- 5.311 SEPTIER COMMUNICATION LTD (ISRAEL/INDIA)
- 5.312 SERCO (USA/UK)
- 5.313 SERPIKOM (FRANCE)
- 5.314 SevOne (USA)
- 5.315 SHOGI COMMUNICATIONS (India)
- 5.316 SIEMENS / NOKIA (Germany)
- 5.317 SILVERTAIL SYSTEMS (USA)
- 5.318 SIMURGH (Iran)
- 5.319 SINGTEL (Singapore)*
- 5.320 SINICINFO ( )
- 5.321 SITRONICS / SISTEMA (Russia)
- 5.322 SKYCOM TECH CO Ltd / Huawei (Iran)
- 5.323 SMOOTHWALL (UK)
- 5.324 SOLERA NETWORKS (USA/JAPAN)
- 5.325 SOPHOS (United Kingdom)
- 5.326 SPECTORSOFT (USA)
- 5.327 SPECTRONIC SYSTEMS A/S (Denmark)
- 5.328 SPEECH TECHNOLOGY CENTER LTD. (Russia)
- 5.329 SPEKTRA SRL (Italy)
- 5.330 SPIRENT COMMUNICATIONS (UK/USA}
- 5.331 SPYTECH SOFTWARE and DESIGN,INC. (USA)
- 5.332 SR7 (Australia)
- 5.333 SS8 (USA)
- 5.334 SST ShotSpotter (USA)*
- 5.335 STRATIGN (UAE)
- 5.336 SUBSENTIO (USA)
- 5.337 SUNTECH INTELLIGENCE (Brazil)
- 5.338 SURIZON TECHNOLOGIES (UK)
- 5.339 SYBORG (Germany)
- 5.340 SYMANTEC (USA)
- 5.341 SYMBIAN LTD / NOKIA (UK)
- 5.342 SYRIATEL (Syria)
- 5.343 SYSTEMS RESEARCH AND DEVELOPMENT (USA)
- 5.344 TADIRAN ELECTRONIC SYSTEMS Ltd.(Israel)
- 5.345 TAMARA ELECTRONIC Ltd (Turkey)
- 5.346 TAMO (France)
- 5.347 TAMOSOFT (New Zealand)
- 5.348 TEEL TECHNOLOGIES (USA)
- 5.349 TEKTRONIX INCORPORATED (USA)
- 5.350 TELECOMMUNICATION COMPANY of IRAN (TCI)(IRAN)
- 5.351 TELEKOM AUSTRIA / MOBITEL
- 5.352 TELESOFT TECHNOLOGIES (United Kingdom)
- 5.353 TELETEL ADVANCED TECHNOLOGY (UAE/USA)
- 5.354 TELETEL (Greece)
- 5.355 TELIASONERA (Sweden)
- 5.356 THALES (France)
- 5.357 The SI ORGANIZATION INC (USA)
- 5.358 TIBCO SOFTWARE (USA/EU/JP/Worldwide)
- 5.359 TILERA
- 5.360 TRACESPAN COMMUNICATIONS (USA/Israel)
- 5.361 TRANSTEK (Syria)
- 5.362 TRAPWIRE (USA)
- 5.363 TREND MICRO
- 5.364 TRESYS TECHNOLOGY (US, UK, Australia)
- 5.365 TROVICOR GmbH (Germany)
- 5.366 TURKCELL (Turkey)
- 5.367 UDILIGENCE (USA)
- 5.368 Ukrtelecom JSC (Ukraine)
- 5.369 ULTRAREACH (USA)
- 5.370 UNISPEED A/S (Denmark)
- 5.371 UNTANGLE (USA)
- 5.372 UNVEILLANCE (USA)*
- 5.373 UTIMACO (US/Germany)*
- 5.374 VEDICIS (France)*
- 5.375 VASTECH (South Africa)*
- 5.376 VERINT - subsidiary of COMVERSE (Israel/USA)*
- 5.377 VERIZON (USA/Belgium)
- 5.378 VERVIS COMINT SERVICES GmbH (Germany)*
- 5.379 VIGITRUST (Ireland)*
- 5.380 VINEYARD NETWORKS (BC Canada)*
- 5.381 VISIBLE TECHNOLOGIES (USA/UK)
- 5.382 VISLINK GROUP (UK)*
- 5.383 VIXTEL (CHINA)
- 5.384 VOCAL TECHNOLOGIES Inc. (USA)*
- 5.385 VOLIA Software (US/Ukraine)
- 5.386 VSS MONITORING (USA)*
- 5.387 VUPEN SECURITY (France)*
- 5.388 WASEELA (KSA/Jordon/Dubai) *
- 5.389 WATCHPOINT / WildPackets (USA)*
- 5.390 WEBSENSE (USA)*
- 5.391 WEDGE NETWORKS (Canada/US/China) *
- 5.392 WORLD SURVEILLANCE GROUP INC (USA)
- 5.393 WORLD TECH COMPANY (Syria)
- 5.394 XALTED Inc. (USA/India)*
- 5.395 XROADS NETWORKS (USA)
- 5.396 YOKOGAWA ELECTRIC CORPORATION (Japan)*
- 5.397 ZTE (China)
- 5.398 007 Spygear (Brasil)
- 5.399 3iMIND (Swiss) *
- 5.400 3M (Germany)
- 5.401 3VR (USA)*
- 5.402 6WIND (France)
- 6 Conferences & Meetings
- 7 Frequently Asked Questions? (FAQ?)
- 7.1 What is "Surveillance" and why should I care, since I'm not doing anything criminal?
- 7.2 What is "Persona Management" Software?
- 7.3 What about cell phones?
- 7.4 What is Commercialized Spying?
- 7.5 What is NFC?
- 7.6 How can you fight online Government Spying?
- 7.7 What is Network Intelligence?
- 7.8 What is Lawful Interception (LI)?
- 7.9 Are printers used for surveillance?
- 7.10 What can I do to help ban or limit the expansion of surveillance technologies?
- 7.11 What is a Point of Presence?
- 7.12 How is surveillance equipment installed?
- 7.13 How to protect yourself?
- 7.14 Are there vulnerabilities in Lawful Intercept Solutions?
- 7.15 What is Deep Packet Inspection (DPI)?
- 7.16 What is Data Carving?
- 7.17 Where can I get additional information about Spy technologies?
- 7.18 What can I do to help ban or limit the expansion of surveillance technologies?
- 7.19 What about government sanctions on technology?
Internetz Undersea and Terrestrial Cables Info
JADI Link Project (Digital Silk Road)
Cable connections to Syria
Cuba Mystery Cable
SEA-ME-WE 4 main lines in the Mediterranean
Three arrested for trying to cut undersea Internet cable
List of "Think Tanks" Promoting Surveillance Tech & Private Intel Contractors
CENTER FOR A NEW AMERICA SECURITY (CNAS)(US)
List of Surveillance vendor Alliances/Networks/Organizations
While the majority of IT and Telecom companies have "Product Partners," Tech or Business partners, they also belong to Alliances, Networks or Organizations that are cross branding and sharing even their contact companies that help with reselling and distribution.
Although some countries, including the United States and European Union have placed sanctions and bans of technology to Syria, Iran and other government dictatorships, the reality of enforcement becomes more difficult when the Tech companies/Surveillance vendors can cross brand and distribute, for example, from an alliance member company in China or Russia.
Therefore, the Blue cabinet is listing such global "Alliances" in addition to the List of Companies.
Alliance for Telecommunications Industry Solutions
ENISA’s Security Awareness Working Group
Security Awareness Working Group
Ensemble Alliance
European Telecommunications Standards Institute
Global Standards Collaboration
High Technology Crime Investigation Association (Worldwide)
Network Intelligence Alliance
SCOPE ALLIANCE
Telecommunications Industry Association
3rd Generation Partnership Project
List of "Green Badger" Surveillance Tech Companies
What is a "Green Badger"?
List of companies
ABILITY (Israel)*
[ABILITY]
ABRAXAS CORPORATION (USA)
ACCESS DATA (USA)*
ACCURIS NETWORKS (Ireland) *
ACME Packet (USA) *
ACULAB (UK)
ADAE (Greece)*
AdaptiveMobile (Ireland) *
ADAX (US/UK/CHINA)*
ADVANCED SOFTWARE SYSTEMS, Inc. (USA)
Advantech (USA)*
AGNITIO (Spain) *
AITIA (Hungary) *
AKAMAI Technologies (USA)*
AKORN TELECOM (UAE/Dubai/Libya/Syria)*
Alcatel-Lucent (France/USA)
ALLOT (Israel)
ALTRON (UA)
AMESYS/Bull (France)
ANONYMIZER (USA)
ANRITSU CORPORATION (Japan)
ANTAMEDIA (Serbia/Russia)
APPIN TECHNOLOGIES (India)
AQSACOM (France)
ARBOR NETWORKS (USA)
AREA S.p.A. (Italy)
ARICENT (US/Global)
ARYAKA (USA/India)
AS SOLUTIONS (Denmark)
ASTELIT (Ukraine/Turkey)
ATIS SYSTEMS (Germany)
A-T SOLUTIONS (USA)
AT&T (USA)
ATTENSITY (USA)
AudioCodes (Israel)
AUDIOTEL INTERNATIONAL (UK)
AVISTAR (USA)
AWASI (Canada)
AXON / HCL AXON (Ukraine/Global)
AXXONSOFT / Axxon (Russia/Global)
A10 NETWORKS (USA)
BAIDU INC (China) *
BARBEDWIRE TECHNOLOGIES (US)
BARRACUDA NETWORKS (USA)
BASIS TECHNOLOGY (USA)
BDL GULF FZCO(Dubai/UAE)
BEA Systems/Oracle (US)
BELKASOFT (Russia)
BERICO TECHNOLOGIES (US)
BLUE COAT SYSTEMS (USA)
BOEING/DRT Inc. (USA)
BREAKINGPOINT (USA)
BROCADE (USA)
BT (UK)
BULL GROUP (France/Global)
CACI International (USA)
CAMBRIDGE CONSULTANTS (UK)
CARRIER IQ (USA)
CCT / Cecratech (Sweden)
CELLEBRITE MOBILE SYNCHRONIZATION Ltd./SUN (Israel)
CEM4Mobile (Finland)
The Centre for Secure Information Technologies (UK/N. Ireland)
The Centre for Secure Information Technologies
CHECK POINT SOFTWARE LTD. (USA/Israel)
CHERTOFF GROUP (USA)
CISCO (US)
CLEARSWIFT (UK)
ClearTrail (India)
Click&DECiDE (France)
CLOUDSHIELD (USA)
COBHAM (UK)
CommProve (Ireland)
CommuniGate Systems (USA)
Computer Sciences Corporation (USA)
COMVERSE TECHNOLOGY (CTI,Verint,Syborg)(US/Israel/Germany)
CONCURRENT TECHNOLOGIES CORPORATION (USA)
Concurrent Technologies Corporation
CORERO NETWORK SECURITY (USA/UK)
CORNFIELD ELECTRONICS (USA)
COUNTERTACK (USA)
C-TECH (Turkey)
CREATIVITY SOFTWARE (UK)
CRFS (United Kingdom)
CROSSINGTECH (Switzerland)
CRYPTON-M (Ukraine)
CSIdentity (CSID) / CyberAgent (InvestCorp) (USA)
CSIT (UK)
CUBIC CORPORATION (USA)
CYBEROAM / Elitecore Technologies Pvt. Ltd.(USA/India)
CYBER POINT INTERNATIONAL LLC (USA)*
CYBERSIFT (UK/USA)
CYBERTRUST (USA)
CYMPHONIX (USA)
DAGIR Co (USA)*
DATAKOM (Germany)
DATAMINR Inc. (USA)
DATATEC Limited (South Africa)
DATONG (UK)
DATYS (Cuba)
DECISION GROUP (Taiwan)
DELL SONICWALL (USA)
DELMA MSS (UK)
DELTA SpE (Ukraine)
DETICA (UK)
DIALOGIC (USA)
DigiTask (Germany)
DigiVox B.V. (Netherlands)
Dreamlab Technologies AG (CH)
EBS-Electronic GmbH (Germany)
EDGE INTELLIGENCE LLC (ABRAXAS) (USA)
ELAMAN GAMMA (Germany)
ELCOMSOFT (Russia)
ELISRA Group (Israel)
ELTA SYSTEMS Ltd. (Israel)
EMIRCOM (UAE/KSA)
ENDACE (New Zealand)
ENDGAME SYSTEMS INC (USA)
ERA IT Solutions AG (CH)
ERICSSON (Sweden/Global)
ERICSSON-SAUDI (Saudi Arabia/KSA)
ETI (Denmark)
ETSI (France)
EVIDIAN (Bull Group)(France)
EXFO (Canada)
EXINDA (USA)
EXPERT SYSTEM S.p.A. (Italy)
FACEBOOK (US/Global)
FireDigit (BE)
FORTINET (USA/Global)
Fox-IT (Netherlands)
FLUKE (USA)
GAMMA GROUP (FINFISHER) (UK/Germany)
GENERAL DYNAMICS (USA)
GENERAL ELECTRIC (aka GE) (USA)
GENETEC (Canada)
GfK (Germany)
GIGAMON GIGABIT (USA)
GITA TECHNOLOGIES Ltd. (Israel)
GLIMMERGLASS (USA)
GoS NETWORKS (Ireland)
GRIFF COMM Ltd (UK)
GROUP2000 (Netherlands)
GTEN DATAKOM (Germany)
GUIDANCE SOFTWARE ENCASE (USA)
HBGary (USA)*
HACKING TEAM (Italy)
HARRIS CORPORATION / STINGRAY (USA)
HEWLETT-PACKARD (HP) (USA)
HIDDEN TECHNOLOGY SYSTEMS INTERNATIONAL Ltd (UK)
HISILICON TECHNOLOGIES CO., Ltd. (China)
Hisilicon Technologies Co., Ltd.
HTC CORPORATION (US/UK/GLOBAL)
HUAWEI TECHNOLOGIES (China)
HUTCHINSON-WHAMPOA LTD (CHINA/Global) *
Hutchinson Whampoa Limited ("3")
IBH Impex (Germany)
IBM / ISS (US/Global)
IDEAL TECHNOLOGY CORPORATION (USA)
ImageWare Systems ( )
IMMUNITY / Aitel (USA)
INCOGNITO (Canada/Ireland)
INEOQUEST TECHNOLOGIES Incorporated (USA)
Ineoquest Technologies Incorporated
INFRAWORKS (USA) *
INNOVA S.p.A. (Italy)
INTELLIGENTIAS Inc. (USA)
INTELLIGENT SERVICES SOLUTIONS (ISS) (Egypt)
Intelligent Services Solutions
INTERANET (Russia)
INTERCOM APP (USA)
INTERGRAPH CORP / INTERGRAPH GOVERNMENT SOLUTIONS (HEXAGON AB) (USA/SWEDEN)*
INTERNET RIMON (Israel)
INTRACOM (Greece/Syria/US/Russia)
INVEA-TECH (CZ)
INVESTCORP (Bahrain/UK/USA)
INVESTOR AB (Sweden/Global)
Intelligence & Public Security (IPS) S.p.A. (Italy)
INVICTA NETWORKS (USA)
IP FABRICS (US)
IPOQUE GmbH (Germany)
IQT (In-Q-Tel) (USA)
IST (Dubai,UAE)
IT Ukraine (Ukraine)
JDS Uniphase Corporation (USA)
jetNEXUS (UK, US, Malaysia)
JUNIPER NETWORK (USA)
JumpGen Systems (USA)
KAPOW SOFTWARE (USA)
KBI Optronics GmbH (Germany)
KERIO (US/Global)
KEYW (USA)
KINGFISHER SYSTEMS (USA)
Kommlabs Dezign Pvt. Ltd. (India)
L3 Communications (USA) *
Law Enforcement Associates Corp. (AKA LEA-AID) (USA)*
LEVEL (3)(Global)
LIFE (Ukraine)
LIGHTSPEED SYSTEMS (USA)
LM TECHNOLOGIES LTD (UK)*
LOOKINGGLASS CYBER SOLUTIONS LLC (USA)
LOQUENDO (Italy)
M86 Security/8e6 Technology (aka TRUSTWAVE) (UK/USA)
MACRO SYSTEM (Poland)
MANTARO (USA)
MANTECH INTERNATIONAL CORPORATION INC (USA)*
MARCONI ( )
MARKMONITOR Dtecnet (USA/Denmark)
MEDAV GmbH (Germany)
MegaFon (aka Metrocom Inc.) (Russia)
MERA / ALOE SYSTEMS, Inc. (USA)
METASWITCH (UK)
MICROSOFT (US/Global)
MICRO SYSTEMATION AB (Sweden)
MISSING LINK SECURITY / PHYLEO (USA)
MOBILE ARTS (Sweden)
MOBILE TELECOMMUNICATION CO of IRAN (MTC Iran)
MOBITEL ( )*
MORPHO companies (see list below) - SAFRAN GROUP (France)
MOTOROLA - NETOPIA (USA)
MTN Group (S. Africa)
MTN Irancell (Iran)
MTN Syria (Syria)
MTN Ukraine (Ukraine)
MTS Ukraine (Ukraine)
NAPATECH (USA)
NARUS (USA)
NETAGENT (JAPAN)
NETAPP (USA)
NETI (Hungary)
NETLOGIC (USA)
NET OPTIC (USA)
NETQUEST CORPORATION (USA)
NETRONOME NETWORKS (USA)
NETSCOUT (USA) *
NETSWEEPER (Canada)
NETVEDA (USA)
NETWITNESS (USA)
NETWORK CRITICAL (UK/USA)
Network Intelligence Alliance (France/Global)
Neuralitic Systems (Canada)
NEUSTAR (USA)*
NEWPORT NETWORKS (UK)
NEXT GENERATION IDENTIFICATION (NGI)(Global)
NICE SYSTEMS (Israel)
Nokia Siemens (Finland/Germany)
NORTHROP GRUMMAN (USA)
NSO Group (Israel)
NTREPID (USA)
OGO Ukraine (Ukraine)
OMNI Wildpackets (USA)
OMRON CORPORATION
@ONE IT GmbH (Germany)
ONPATH Technologies (USA)
OPENET (Ireland)
OPNET (USA)
OPTENET (Spain/USA)
OXYGEN SOFTWARE COMPANY (Russia)
PACKET FORENSICS (USA)
PAD Datentechnik GmbH (Germany)
PAESSLER (Germany)
PALADION NETWORKS (India)
PALANTIR TECHNOLOGIES (USA)
PALO ALTO NETWORK (USA)
PANASONIC Corporation (Japan)
PANOPTECH (United Kingdom)
PEARLSOFT (USA)
PEN LINK (USA)
PHOENIX (USA)
PHONEXIA S.R.O. (CZ)
PINE DIGITAL SECURITY (Netherlands)
PINION SOFTWARE Inc. / (USA)*
PK-Electronic (Germany)
PLATH GmbH (Germany)
POLARIS WIRELESS (USA)
PRAESCIENT ANALYTICS (USA)
PREDPOL INC PREDICTIVE POLICING (USA)
PROCERA NETWORKS (USA)
PROLEXIC (USA)*
PROOFPOINT (USA)
PROTEI (Russia/Jordan)
QinetiQ Mission Solutions Group (USA)
QOSMOS (France)
Q1Labs / IBM (USA)
RADISYS (USA)
RADWARE (Israel)
RAINSTOR (USA/UK)
RANTEK (Denmark)
RAYTHEON BBN TECHNOLOGIES (USA)
Raytheon Intelligence and Information Systems (ISS)(USA)
RAYTHEON TRUSTED COMPUTER SOLUTIONS, INC. (USA)
Raytheon Trusted Computer Solutions
RCS (Italy)
RECORDED FUTURE (USA)
RESI GROUP (Italy)
RETENTIA (USA)
REUTER (Germany)
RIMON INTERNET (Israel)
RIVERBED (USA)
ROHDE & SCHWARZ (Germany)
RSA / EMC2 (USA)
Rsignia Inc. ( )
RTI Systems (Russia)
SafeNet Inc.(USA)
SAGEM (France)
SALIENT FEDERAL SOLUTIONS (USA)
SANDVINE (Canada)
SAP (Germany/USA)
SASKEN (Finland/India/China/USA)
SAS INSTITUTE ( )
SCAN & TARGET (France)
SCIENCE APPLICATIONS INTERNATIONAL CORP. (SAIC)(USA)
SEANET TECHNOLOGIES (USA)
SEARTECH (South Africa)
SECURITAS / PINKERTONS (Sweden)
SECURITY SOFTWARE INTERNATIONAL (SSI) ( )
SELECTRONIC (Germany)
SELEX (Italy)
SEPTIER COMMUNICATION LTD (ISRAEL/INDIA)
SERCO (USA/UK)
SERPIKOM (FRANCE)
SevOne (USA)
SHOGI COMMUNICATIONS (India)
SIEMENS / NOKIA (Germany)
SILVERTAIL SYSTEMS (USA)
SIMURGH (Iran)
SINGTEL (Singapore)*
SINICINFO ( )
SITRONICS / SISTEMA (Russia)
Subsidiary Companies
SKYCOM TECH CO Ltd / Huawei (Iran)
SMOOTHWALL (UK)
SOLERA NETWORKS (USA/JAPAN)
SOPHOS (United Kingdom)
SPECTORSOFT (USA)
SPECTRONIC SYSTEMS A/S (Denmark)
SPEECH TECHNOLOGY CENTER LTD. (Russia)
SPEKTRA SRL (Italy)
SPIRENT COMMUNICATIONS (UK/USA}
SPYTECH SOFTWARE and DESIGN,INC. (USA)
SR7 (Australia)
SS8 (USA)
SST ShotSpotter (USA)*
STRATIGN (UAE)
SUBSENTIO (USA)
SUNTECH INTELLIGENCE (Brazil)
SURIZON TECHNOLOGIES (UK)
SYBORG (Germany)
SYMANTEC (USA)
SYMBIAN LTD / NOKIA (UK)
SYRIATEL (Syria)
SYSTEMS RESEARCH AND DEVELOPMENT (USA)
TADIRAN ELECTRONIC SYSTEMS Ltd.(Israel)
TAMARA ELECTRONIC Ltd (Turkey)
TAMO (France)
TAMOSOFT (New Zealand)
TEEL TECHNOLOGIES (USA)
TEKTRONIX INCORPORATED (USA)
TELECOMMUNICATION COMPANY of IRAN (TCI)(IRAN)
TELEKOM AUSTRIA / MOBITEL
TELESOFT TECHNOLOGIES (United Kingdom)
TELETEL ADVANCED TECHNOLOGY (UAE/USA)
TELETEL (Greece)
TELIASONERA (Sweden)
THALES (France)
The SI ORGANIZATION INC (USA)
TIBCO SOFTWARE (USA/EU/JP/Worldwide)
TILERA
TRACESPAN COMMUNICATIONS (USA/Israel)
TRANSTEK (Syria)
TRAPWIRE (USA)
TREND MICRO
TRESYS TECHNOLOGY (US, UK, Australia)
TROVICOR GmbH (Germany)
TURKCELL (Turkey)
UDILIGENCE (USA)
Ukrtelecom JSC (Ukraine)
ULTRAREACH (USA)
UNISPEED A/S (Denmark)
UNTANGLE (USA)
UNVEILLANCE (USA)*
UTIMACO (US/Germany)*
VEDICIS (France)*
VASTECH (South Africa)*
VERINT - subsidiary of COMVERSE (Israel/USA)*
VERIZON (USA/Belgium)
VERVIS COMINT SERVICES GmbH (Germany)*
VIGITRUST (Ireland)*
VINEYARD NETWORKS (BC Canada)*
VISIBLE TECHNOLOGIES (USA/UK)
VISLINK GROUP (UK)*
VIXTEL (CHINA)
VOCAL TECHNOLOGIES Inc. (USA)*
VOLIA Software (US/Ukraine)
VSS MONITORING (USA)*
VUPEN SECURITY (France)*
WASEELA (KSA/Jordon/Dubai) *
WATCHPOINT / WildPackets (USA)*
WEBSENSE (USA)*
WEDGE NETWORKS (Canada/US/China) *
WORLD SURVEILLANCE GROUP INC (USA)
WORLD TECH COMPANY (Syria)
XALTED Inc. (USA/India)*
XROADS NETWORKS (USA)
YOKOGAWA ELECTRIC CORPORATION (Japan)*
ZTE (China)
007 Spygear (Brasil)
3iMIND (Swiss) *
3M (Germany)
3VR (USA)*
6WIND (France)
Conferences & Meetings
ISS World Training
ISS World Training are a set of global conferences for the lawful intercept industry, a.k.a. government surveillance. ISS is produced by Telestrategies. Individual sponsor pages are a who's who of the Pinkerton rat bastards and mother f*ckers in this industry. The next one is in the Middle East
Guardian Article in which Jerry Lucas of ISS says outrageous things. Good background.
@ioerror was thrown out of the Washington DC conference this year. Security research & cool dude Chris Soghoian was fired from a job at US FTC for using his government ID to attend covertly.
Frequently Asked Questions? (FAQ?)
What is "Surveillance" and why should I care, since I'm not doing anything criminal?
- What is "Surveillance? Wikipedia
- Why should I care?
Most people, living in democratic countries, have the Constitutional Right to Privacy. This Right is being taken from you and sold for corporate profit. To the Corporation you and your data are a commodity. To the government you are a "terrorist suspect" until they have gathered enough data about you and analyzed the existing data to find that you are no longer "suspect." The data they analyze includes who you associate with online i.e. "Friend" on Social Networks.
- See also "McCarthyism" and Hollywood Blacklist and "Blacklisting" that in computing terms may also be considered a form of "Censorship."
"In computing, a blacklist is an access control system which denies entry to a specific list (or a defined range) of users, programs, or network addresses."
What is "Persona Management" Software?
In short it is a software technology employed by the military, governments, politicans and blue chip corporations to create fake identities aka "sock puppets" for surveillance of opponents and the dissenting public, most often on social media.
Project PM and Operation Metal Gear began researching and exposing such online surveillance activities in 2011, as explained further in this video prior to the creation of The Telecomix Blue cabinet. One example of a company that has contracted with the US Military to provide Persona Management Software is Ntrepid
Example Patent application Persona management system for communications
What about cell phones?
Cell phones are easily tracked by Law Enforcement Agencies (LEA), that can find your location through the internal GPS battery like cell inside the phone. Even if you remove the GPS tracker, your cell phone can expose your location through sound waves and so-called "Lawful Intercept" surveillance products available to LEAs. It is even possible for LEAs to turn on the remote mic in your cell and home phones. If you are trying to have a private discussion in person, make sure that phones have the batteries removed. There are numerous online publications and videos on this subject. If you find a good one, please add it here. <3
- UnLockMe Blacklisted, Barred and Blocked Handsets.
- Commercial Software available to the public.
- The American Dream blog Some cell phones record your location hundreds of times a day.
What is Commercialized Spying?
Here is a great video "The World of Commercialized Spying" explained by Julian Assange, publisher with the nonprofit organisation, WikiLeaks Disclose.tv and "Marriage From Hell" by Dr. Evgeny Morosov Key Note Speaker at 28c3 conference
What is NFC?
Near Field Communication is explained by arstechica
How can you fight online Government Spying?
2009 Electronic Frontier Foundation (EFF) launched its Surveillance Self-Defense project-- an online how-to guide for protecting your private data against government spying. You can find the project at http://ssd.eff.org.
What is Network Intelligence?
Network Intelligence technology is an emerging category of technology to reveal the critical details of the data locked inside network traffic and transactions. See Wikipedia
What is Lawful Interception (LI)?
Packet capture can be used to fulfill a warrant from a law enforcement agency (LEA) to produce all network traffic generated by an individual. Internet service providers and VoIP providers in the United States of America must comply with CALEA (Communications Assistance for Law Enforcement Act) regulations. Deep Packet Capture provides a record of all network activities.[3] Using packet capture and storage, telecommunications carriers can provide the legally required secure and separate access to targeted network traffic and are able to use the same device for internal security purposes. DPC probes can provide lossless capture of target traffic without compromising network performance.[9] However DPC appliances may be unable to provide chain of evidence audit logs, or satisfactory security for use in this application. Collection of data from a carrier system without a warrant is illegal due to laws about interception. [1]
Are printers used for surveillance?
Yes they are. Several printer companies are listed in this Response Letter from U.S. Department of Homeland Security and Secret Service]
What can I do to help ban or limit the expansion of surveillance technologies?
Although there are pros and cons of these technologies, the cons are certainly outweighed when being used against the rights of humans and privacy. One simple way to fight back is to expose the vendors and people financially profitting from the technologies. You can do this by adding more info and content to this Blue Cabinet wiki and coming to the irc #bluecabinet. Also, listen to this 2011 keynote presentation video by Evgeny Morozov for additional info and ways to take action.
What is a Point of Presence?
An Internet point of presence is an access point to the Internet. It is a physical location that houses servers, routers, ATM switches and digital/analog call aggregators. It may be either part of the facilities of a telecommunications provider that the Internet service provider (ISP) rents or a location separate from the telecommunications provider. ISPs typically have multiple PoPs, sometimes numbering in the thousands. PoPs are also located at Internet exchange points and colocation centres. [2].
How is surveillance equipment installed?
Surveillance equipment is usually installed at a POP and the traffic is further encapsulated by protocols such as MPLS (Multiprotocol Label Switching) in the backbone. This makes it possible to route the traffic from Proxy servers, which may decrypt the traffic, making it possible to monitor in realtime or reconstruct its stored sessions.
How to protect yourself?
Encryption does protect against surveillance when it is based on public/private key encryption, such as when using SSL/TLS. Surveillance methods can use man-in-the-middle attacks, such as using a proxy to present a fake SSL certificate which the user must thrust. One recommended proxy is TOR
Are there vulnerabilities in Lawful Intercept Solutions?
- DefCon presentation video
- BlackHat presentation video
What is Deep Packet Inspection (DPI)?
- zdnet Deep Packet Inspection - What you should know.
- Firewall Expansion - Deep Packet Inspection by Ido Dubrawsky
"Invented by Check Point Software Technologies in the mid-to-late 1990s stateful inspection quickly became an industry standard. Stateful inspection provides for the analysis of packets at the network layer as well other layers (typically the transport layer in the OSI model but the firewall may look at layers above that as well) in order to assess the overall packet. By combining information from various layers (transport, session, and network) the firewall is better able to understand the protocol it is inspecting. This also provides for the ability to create virtual sessions in order to track connectionless protocols such as UDP-based applications as well as RPC-based applications..."
Full/deep packet capture of entire populations is now possible. The only limitation is storage space. This means that all traffic from a user/subscriber is captured and stored in realtime to a data centre. It can lates be played back or reconstructed. One product which does this is RSA NetWitness. Normally a full capture is only performed by technicians for troubleshooting network connectivity problems.
"Deep Content Inspection is considered the evolution of Deep Packet Inspection with the ability to look at what the actual content contains" wikipedia
"Deep Content Inspection v. Deep Packet Inspection" http://www.wedgenetworks.com/resources/technology/deep-content-inspection-with-wedgeos.html
What is Data Carving?
Data carving (Antonio Merola, Data Carving Concepts, SANS Institute 2008) is the process of extracting a collection of data from a larger data set. Data carving techniques frequently occur during a digital investigation when the unallocated file system space is analyzed to extract files. The files are "carved" from the unallocated space using file type-specific header and footer values. File system structures are not used during the process.
Data carving is done on a disk when the unallocated file system space is analysed to extract files because data cannot be identified due to missing of allocation info, or on network captures where files are "carved" from the dumped traffic using the same techniques. One drawback of this process on disks or images is that file-carving tools typically contain many false positives, hence tests must be done on each of the extracted files in order to check its consistency. This is not the case with network-dumped files where files are within the dump (if the dump is complete) and is just matter of doing extraction. There are many powerful automated forensic analysis tools available for use. There are no standard techniques for the tools to perform common investigative tasks, such as recovering a deleted file.
Where can I get additional information about Spy technologies?
Bugged Planet, ProjectPM and some news publications have special sections on IT and mobile phone surveillance (see Bloomberg, WSJ and Forbes. In addition, Wikileaks have released The Spy Files which contains a large collection of documents related to Spy technologies. The collection can be obtained from The Pirate Bay [3].
What can I do to help ban or limit the expansion of surveillance technologies?
Although there are pros and cons of these technologies, the cons are certainly outweighed when being used against the rights of humans and privacy. One simple way to fight back is to expose the vendors and people financially profitting from the technologies. You can do this by adding more info and content to this Blue Cabinet wiki and coming to the irc #bluecabinet. Also, listen to this 2011 keynote presentation video by Evgeny Morozov for additional info and ways to take action.
What about government sanctions on technology?
- United States of America
CBSNews reports Obama levies new tech sanctions on Syria, Iran
President Barack Obama's Executive Order 13606 13606 pdf version blocking the property and suspending entry into the United States of certain persons with respect to grave human rights abuse by the governments of Iran and Syria via information technology. The lead departments are the US Department of Treasury in consultation with the US State Department.
Although some EU countries and the USA have agreed to sanctions the enforcement is lacking. Especially when other countries do not have sanctions where distributors/resellers are providing the surveillance tech to government dictatorships. How to hold the manufacturers, sellers and shippers accountable has not been simple. Most likely there is a black market.
- European Union
- EU proposals raise the ante for non-compliant companiesForbes 12.12.11
- Sweden stopped EU sanctions against Syria - Ericsson factor Stockholm News 12.2.11
- Other Sanctioned Countries
- US keeps sanctions on Myramar/Burma,while EU eases theirs
More data on Sanctions see Sactions wiki