Blue cabinet

From Bluecabinet
Revision as of 03:40, 27 March 2014 by Simhi (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search


Contents

Internetz Undersea and Terrestrial Cables Info

JADI Link Project (Digital Silk Road)

JADI

Cable connections to Syria

Syria cables

Cuba Mystery Cable

Renesys

SEA-ME-WE 4 main lines in the Mediterranean

Three arrested for trying to cut undersea Internet cable

List of "Think Tanks" Promoting Surveillance Tech & Private Intel Contractors

CENTER FOR A NEW AMERICA SECURITY (CNAS)(US)

CNAS

List of Surveillance vendor Alliances/Networks/Organizations

While the majority of IT and Telecom companies have "Product Partners," Tech or Business partners, they also belong to Alliances, Networks or Organizations that are cross branding and sharing even their contact companies that help with reselling and distribution.

Although some countries, including the United States and European Union have placed sanctions and bans of technology to Syria, Iran and other government dictatorships, the reality of enforcement becomes more difficult when the Tech companies/Surveillance vendors can cross brand and distribute, for example, from an alliance member company in China or Russia.

Therefore, the Blue cabinet is listing such global "Alliances" in addition to the List of Companies.

Alliance for Telecommunications Industry Solutions

ATIS

ENISA’s Security Awareness Working Group

Security Awareness Working Group

Ensemble Alliance

Ensemble Alliance

European Telecommunications Standards Institute

ETSI

Global Standards Collaboration

GSC

High Technology Crime Investigation Association (Worldwide)

HTCIA

Network Intelligence Alliance

Network Intelligence Alliance

SCOPE ALLIANCE

SCOPE

Telecommunications Industry Association

TIA

3rd Generation Partnership Project

3GPP

List of "Green Badger" Surveillance Tech Companies

What is a "Green Badger"?

GreenBadger

List of companies

ABILITY (Israel)*

[ABILITY]

ABRAXAS CORPORATION (USA)

ABRAXAS

ABRAXAS Special page

ACCESS DATA (USA)*

Accessdata

ACCURIS NETWORKS (Ireland) *

ACCURIS NETWORKS

ACME Packet (USA) *

ACME

ACULAB (UK)

AcuLab

ADAE (Greece)*

ADAE

AdaptiveMobile (Ireland) *

AdaptiveMobile

ADAX (US/UK/CHINA)*

ADAX

ADVANCED SOFTWARE SYSTEMS, Inc. (USA)

ADVANCED SOFTWARE SYSTEMS

Advantech (USA)*

Advantech

AGNITIO (Spain) *

AGNITIO

AITIA (Hungary) *

AITIA

AKAMAI Technologies (USA)*

Akamai Technologies

AKORN TELECOM (UAE/Dubai/Libya/Syria)*

Akorn Telecom

Alcatel-Lucent (France/USA)

Alcatel-Lucent

ALLOT (Israel)

Allot

ALTRON (UA)

Altron

AMESYS/Bull (France)

Amesys Bull

ANONYMIZER (USA)

ANONYMIZER

ANRITSU CORPORATION (Japan)

Anritsu Corporation

ANTAMEDIA (Serbia/Russia)

Antamedia

APPIN TECHNOLOGIES (India)

APPIN TECHNOLOGIES

AQSACOM (France)

Aqsacom

ARBOR NETWORKS (USA)

ARBOR NETWORKS

AREA S.p.A. (Italy)

AREA S.p.A.

ARICENT (US/Global)

ARICENT

ARYAKA (USA/India)

ARYAKA

AS SOLUTIONS (Denmark)

AS Solutions

ASTELIT (Ukraine/Turkey)

ASTELIT

ATIS SYSTEMS (Germany)

Atis Systems

A-T SOLUTIONS (USA)

A-T Solutions

AT&T (USA)

AT&T

ATTENSITY (USA)

Attensity

AudioCodes (Israel)

AudioCodes

AUDIOTEL INTERNATIONAL (UK)

Audiotel

AVISTAR (USA)

AVISTAR

AWASI (Canada)

AWASI

AXON / HCL AXON (Ukraine/Global)

AXON

AXXONSOFT / Axxon (Russia/Global)

Axxonsoft

A10 NETWORKS (USA)

A10 Networks

BAIDU INC (China) *

BAIDU

BARBEDWIRE TECHNOLOGIES (US)

Barbedwire

BARRACUDA NETWORKS (USA)

Barracuda Networks

BASIS TECHNOLOGY (USA)

BasisTech

BDL GULF FZCO(Dubai/UAE)

BDL Gulf

BEA Systems/Oracle (US)

BEA

BELKASOFT (Russia)

BELKASOFT

BERICO TECHNOLOGIES (US)

BERICO

BLUE COAT SYSTEMS (USA)

Blue Coat

BOEING/DRT Inc. (USA)

Boeing-DRT

BREAKINGPOINT (USA)

BREAKINGPOINT

BROCADE (USA)

Brocade

BT (UK)

BT

BULL GROUP (France/Global)

BULL

CACI International (USA)

CACI

CAMBRIDGE CONSULTANTS (UK)

Cambridge Consultants

CARRIER IQ (USA)

CARRIER IQ

CCT / Cecratech (Sweden)

CCT Cecratech

CELLEBRITE MOBILE SYNCHRONIZATION Ltd./SUN (Israel)

Cellebrite Mobile

CEM4Mobile (Finland)

CEM4Mobile

The Centre for Secure Information Technologies (UK/N. Ireland)

The Centre for Secure Information Technologies

CHECK POINT SOFTWARE LTD. (USA/Israel)

CHECK POINT SOFTWARE

CHERTOFF GROUP (USA)

Chertoff Group

CISCO (US)

Cisco

CLEARSWIFT (UK)

CLEARSWIFT

ClearTrail (India)

ClearTrail

Click&DECiDE (France)

Click&DECiDE

CLOUDSHIELD (USA)

Cloudshield

COBHAM (UK)

Cobham

CommProve (Ireland)

CommProve

CommuniGate Systems (USA)

CommuniGate

Computer Sciences Corporation (USA)

Computer Sciences Corporation

COMVERSE TECHNOLOGY (CTI,Verint,Syborg)(US/Israel/Germany)

Comverse

CONCURRENT TECHNOLOGIES CORPORATION (USA)

Concurrent Technologies Corporation

CORERO NETWORK SECURITY (USA/UK)

CORERO

CORNFIELD ELECTRONICS (USA)

TVbegone

COUNTERTACK (USA)

CounterTack

C-TECH (Turkey)

C-Tech

CREATIVITY SOFTWARE (UK)

Creativity Software

CRFS (United Kingdom)

CRFS

CROSSINGTECH (Switzerland)

CROSSINGTECH

CRYPTON-M (Ukraine)

CRYPTON-M

CSIdentity (CSID) / CyberAgent (InvestCorp) (USA)

CSID

CSIT (UK)

CSIT

CUBIC CORPORATION (USA)

CUBIC

Cubic Special

CYBEROAM / Elitecore Technologies Pvt. Ltd.(USA/India)

Cyberoam

CYBER POINT INTERNATIONAL LLC (USA)*

CYBERPOINT

CYBERSIFT (UK/USA)

CYBERSIFT

CYBERTRUST (USA)

CYBERTRUST

CYMPHONIX (USA)

CYMPHONIX

DAGIR Co (USA)*

DAGIR

DATAKOM (Germany)

Datakom

DATAMINR Inc. (USA)

Dataminr Inc.

DATATEC Limited (South Africa)

DATATEC

DATONG (UK)

Datong


DATYS (Cuba)

Datys

DECISION GROUP (Taiwan)

Decision Group

DELL SONICWALL (USA)

SonicWall

DELMA MSS (UK)

Delma

DELTA SpE (Ukraine)

Delta

DETICA (UK)

Detica

DIALOGIC (USA)

Dialogic

DigiTask (Germany)

DigiTask

DigiVox B.V. (Netherlands)

Digivox

Dreamlab Technologies AG (CH)

Dreamlab Technologies

EBS-Electronic GmbH (Germany)

EBS

EDGE INTELLIGENCE LLC (ABRAXAS) (USA)

EDGE

ELAMAN GAMMA (Germany)

Elaman

ELCOMSOFT (Russia)

ELCOMSOFT

ELISRA Group (Israel)

Elisra

ELTA SYSTEMS Ltd. (Israel)

Elta

EMIRCOM (UAE/KSA)

Emircom

ENDACE (New Zealand)

Endace

ENDGAME SYSTEMS INC (USA)

Endgame Systems

ERA IT Solutions AG (CH)

ERA

ERICSSON (Sweden/Global)

Ericsson

ERICSSON-SAUDI (Saudi Arabia/KSA)

Saudi-Ericsson

ETI (Denmark)

ETI

ETSI (France)

ETSI

EVIDIAN (Bull Group)(France)

EVIDIAN

EXFO (Canada)

EXFO

EXINDA (USA)

EXINDA

EXPERT SYSTEM S.p.A. (Italy)

Expert System

FACEBOOK (US/Global)

Facebook

FireDigit (BE)

FireDigit

FORTINET (USA/Global)

Fortinet

Fox-IT (Netherlands)

Fox-IT

FLUKE (USA)

Fluke

GAMMA GROUP (FINFISHER) (UK/Germany)

Gamma Group (FinFisher)

GENERAL DYNAMICS (USA)

GENERAL DYNAMICS

GENERAL ELECTRIC (aka GE) (USA)

General Electric (GE)

GENETEC (Canada)

Genetec

GfK (Germany)

GfK

GIGAMON GIGABIT (USA)

Gigamon

GITA TECHNOLOGIES Ltd. (Israel)

Gita Technologies

GLIMMERGLASS (USA)

Glimmerglass

GoS NETWORKS (Ireland)

GoS Networks

GRIFF COMM Ltd (UK)

Griff Comm

GROUP2000 (Netherlands)

Group2000

GTEN DATAKOM (Germany)

Gten Datakom

GUIDANCE SOFTWARE ENCASE (USA)

Guidance Software

HBGary (USA)*

MANTECH

HACKING TEAM (Italy)

Hacking Team

HARRIS CORPORATION / STINGRAY (USA)

HARRIS

HEWLETT-PACKARD (HP) (USA)

Hewlett Packard

HIDDEN TECHNOLOGY SYSTEMS INTERNATIONAL Ltd (UK)

Hidden Technology

HISILICON TECHNOLOGIES CO., Ltd. (China)

Hisilicon Technologies Co., Ltd.

HTC CORPORATION (US/UK/GLOBAL)

HTC CORPORATION

HUAWEI TECHNOLOGIES (China)

Huawei

HUTCHINSON-WHAMPOA LTD (CHINA/Global) *

Hutchinson Whampoa Limited ("3")

IBH Impex (Germany)

IBH

IBM / ISS (US/Global)

IBM ISS

IDEAL TECHNOLOGY CORPORATION (USA)

IDEAL

ImageWare Systems ( )

ImageWare

IMMUNITY / Aitel (USA)

IMMUNITY

INCOGNITO (Canada/Ireland)

Incognito

INEOQUEST TECHNOLOGIES Incorporated (USA)

Ineoquest Technologies Incorporated

INFRAWORKS (USA) *

INFRAWORKS

INNOVA S.p.A. (Italy)

Innova

INTELLIGENTIAS Inc. (USA)

Intelligentias

INTELLIGENT SERVICES SOLUTIONS (ISS) (Egypt)

Intelligent Services Solutions

INTERANET (Russia)

Interanet

INTERCOM APP (USA)

INTERCOM APP

INTERGRAPH CORP / INTERGRAPH GOVERNMENT SOLUTIONS (HEXAGON AB) (USA/SWEDEN)*

INTERGRAPH

INTERNET RIMON (Israel)

Blue cabinet /INTERNET RIMON

INTRACOM (Greece/Syria/US/Russia)

INTRACOM

INTRACOM TELECOM

INTRAKAT

CONKLIN INTRACOM

INVEA-TECH (CZ)

Invea-Tech

INVESTCORP (Bahrain/UK/USA)

INVESTCORP

INVESTOR AB (Sweden/Global)

INVESTOR AB

Intelligence & Public Security (IPS) S.p.A. (Italy)

IPS

INVICTA NETWORKS (USA)

INVICTA

IP FABRICS (US)

IP FABRICS

IPOQUE GmbH (Germany)

Ipogue

IQT (In-Q-Tel) (USA)

IQT

IST (Dubai,UAE)

IST

IT Ukraine (Ukraine)

IT Ukraine

JDS Uniphase Corporation (USA)

JDS Uniphase Corporation

jetNEXUS (UK, US, Malaysia)

jetNEXUS

JUNIPER NETWORK (USA)

Juniper Network

JumpGen Systems (USA)

JumpGen Systems

KAPOW SOFTWARE (USA)

KAPOW SOFTWARE

KBI Optronics GmbH (Germany)

KBI Optronics

KERIO (US/Global)

KERIO

KEYW (USA)

KEYW

KINGFISHER SYSTEMS (USA)

Bluecabinet/Kingfisher

Kommlabs Dezign Pvt. Ltd. (India)

Kommlabs Dezign

L3 Communications (USA) *

L3 Communications

Law Enforcement Associates Corp. (AKA LEA-AID) (USA)*

LEA Corp

LEVEL (3)(Global)

LEVEL 3

LIFE (Ukraine)

LIFE

LIGHTSPEED SYSTEMS (USA)

Lightspeed Systems

LM TECHNOLOGIES LTD (UK)*

LM Tech

LOOKINGGLASS CYBER SOLUTIONS LLC (USA)

LookingGlass

LOQUENDO (Italy)

Loquendo

M86 Security/8e6 Technology (aka TRUSTWAVE) (UK/USA)

M86 Security

MACRO SYSTEM (Poland)

Macro System

MANTARO (USA)

MANTARO

MANTECH INTERNATIONAL CORPORATION INC (USA)*

MANTECH

MARCONI ( )

MARCONI

MARKMONITOR Dtecnet (USA/Denmark)

MARKMONITOR Dtecnet

MEDAV GmbH (Germany)

Medav

MegaFon (aka Metrocom Inc.) (Russia)

MegaFon

MERA / ALOE SYSTEMS, Inc. (USA)

Mera Systems

METASWITCH (UK)

Metaswitch

MICROSOFT (US/Global)

MICROSOFT

MICRO SYSTEMATION AB (Sweden)

Micro Systemation

MISSING LINK SECURITY / PHYLEO (USA)

MISSING LINK

MOBILE ARTS (Sweden)

Mobile Arts

MOBILE TELECOMMUNICATION CO of IRAN (MTC Iran)

MTC Iran

MOBITEL ( )*

MobiTel

MORPHO companies (see list below) - SAFRAN GROUP (France)

Morpho

MorphoTrust

MorphoSys

MorphoTrak

Morpho Detection, Inc.

MOTOROLA - NETOPIA (USA)

Motorola-Netopia

MTN Group (S. Africa)

MTN Group

MTN Irancell (Iran)

MTN Irancell

MTN Syria (Syria)

MTN Syria

MTN Ukraine (Ukraine)

MTN Ukraine

MTS Ukraine (Ukraine)

MTS Ukraine

NAPATECH (USA)

NAPATECH

NARUS (USA)

Narus

NETAGENT (JAPAN)

NetAgent

NETAPP (USA)

NetApp

NETI (Hungary)

Neti

NETLOGIC (USA)

NETLOGIC

NET OPTIC (USA)

Net Optic

NETQUEST CORPORATION (USA)

Netquest

NETRONOME NETWORKS (USA)

NETRONOME NETWORKS

NETSCOUT (USA) *

NetScout Systems Incorporated

NETSWEEPER (Canada)

Netsweeper

NETVEDA (USA)

NetVeda

NETWITNESS (USA)

NetWitness

NETWORK CRITICAL (UK/USA)

Network Critical

Network Intelligence Alliance (France/Global)

Network Intelligence Alliance

Neuralitic Systems (Canada)

Neuralitic Systems

NEUSTAR (USA)*

NUESTAR

NEWPORT NETWORKS (UK)

Newport Networks

NEXT GENERATION IDENTIFICATION (NGI)(Global)

NGI

NICE SYSTEMS (Israel)

Nice Systems

Nokia Siemens (Finland/Germany)

Nokia Siemens

NORTHROP GRUMMAN (USA)

NORTHROP GRUMMAN

NSO Group (Israel)

NSO Group

NTREPID (USA)

Ntrepid

Ntrepid Incorporations

OGO Ukraine (Ukraine)

OGO

OMNI Wildpackets (USA)

OMNI Wildpackets

OMRON CORPORATION

Omron Corporation

@ONE IT GmbH (Germany)

@one IT GmbH

ONPATH Technologies (USA)

ONPATH Technologies

OPENET (Ireland)

OPENET

OPNET (USA)

OPNET

OPTENET (Spain/USA)

OPTENET

OXYGEN SOFTWARE COMPANY (Russia)

OXYGEN

PACKET FORENSICS (USA)

PACKET FORENSICS

PAD Datentechnik GmbH (Germany)

PAD Datentechnik

PAESSLER (Germany)

Paessler

PALADION NETWORKS (India)

PALADION

PALANTIR TECHNOLOGIES (USA)

Palantir

PALO ALTO NETWORK (USA)

Palo Alto

PANASONIC Corporation (Japan)

Panasonic Corporation

PANOPTECH (United Kingdom)

Panoptech

PEARLSOFT (USA)

PEARLSOFT

PEN LINK (USA)

PEN LINK

PHOENIX (USA)

PHOENIX

PHONEXIA S.R.O. (CZ)

Phonexia SRO

PINE DIGITAL SECURITY (Netherlands)

PINE DIGITAL SECURITY

PINION SOFTWARE Inc. / (USA)*

PINION

PK-Electronic (Germany)

PK-Electronic

PLATH GmbH (Germany)

PLATH

POLARIS WIRELESS (USA)

Polaris Wireless

PRAESCIENT ANALYTICS (USA)

PRAESCIENT

PREDPOL INC PREDICTIVE POLICING (USA)

PREDICTIVE

PROCERA NETWORKS (USA)

PROCERA

PROLEXIC (USA)*

PROLEXIC

PROOFPOINT (USA)

PROOFPOINT

PROTEI (Russia/Jordan)

PROTEI

QinetiQ Mission Solutions Group (USA)

QinetiQ (Cyveillance)

QOSMOS (France)

Qosmos

Q1Labs / IBM (USA)

Q1Labs

RADISYS (USA)

RADISYS

RADWARE (Israel)

RADWARE

RAINSTOR (USA/UK)

RAINSTOR

RANTEK (Denmark)

RanTek

RAYTHEON BBN TECHNOLOGIES (USA)

Raytheon BBN Tech

Raytheon Intelligence and Information Systems (ISS)(USA)

Raytheon IIS

RAYTHEON TRUSTED COMPUTER SOLUTIONS, INC. (USA)

Raytheon Trusted Computer Solutions

RCS (Italy)

RCS

RECORDED FUTURE (USA)

Recorded Future

RESI GROUP (Italy)

RESI

RETENTIA (USA)

Retentia

REUTER (Germany)

REUTER

RIMON INTERNET (Israel)

Internet Rimon

RIVERBED (USA)

Riverbed

ROHDE & SCHWARZ (Germany)

ROHDE & SCHWARZ

RSA / EMC2 (USA)

RSA

Rsignia Inc. ( )

Rsignia

RTI Systems (Russia)

RTI Systems

SafeNet Inc.(USA)

SafeNet

SAGEM (France)

SAGEM

SALIENT FEDERAL SOLUTIONS (USA)

SALIENT

SANDVINE (Canada)

SANDVINE

SAP (Germany/USA)

SAP

SASKEN (Finland/India/China/USA)

SASKEN

SAS INSTITUTE ( )

SAS Institute

SCAN & TARGET (France)

SCAN & TARGET

SCIENCE APPLICATIONS INTERNATIONAL CORP. (SAIC)(USA)

SAIC

SEANET TECHNOLOGIES (USA)

SEANET

SEARTECH (South Africa)

SEARTECH

SECURITAS / PINKERTONS (Sweden)

Securitas

SECURITY SOFTWARE INTERNATIONAL (SSI) ( )

SSI

SELECTRONIC (Germany)

SELECTRONIC

SELEX (Italy)

SELEX

SEPTIER COMMUNICATION LTD (ISRAEL/INDIA)

SEPTIER COMMUNICATION

SERCO (USA/UK)

SERCO SERVICES

SERPIKOM (FRANCE)

SERPIKOM

SevOne (USA)

SevOne

SHOGI COMMUNICATIONS (India)

SHOGI COMMUNICATION

SIEMENS / NOKIA (Germany)

SIEMENS

SILVERTAIL SYSTEMS (USA)

SILVERTAIL

SIMURGH (Iran)

SIMURGH

SINGTEL (Singapore)*

SINGTEL

SINICINFO ( )

SinicInfo

SITRONICS / SISTEMA (Russia)

Sitronics

Subsidiary Companies

INTRACOM TELECOM

STROM TELECOM

SKYCOM TECH CO Ltd / Huawei (Iran)

SKYCOM TECH

SMOOTHWALL (UK)

Smoothwall

SOLERA NETWORKS (USA/JAPAN)

SOLERA NETWORKS

SOPHOS (United Kingdom)

SOPHOS

SPECTORSOFT (USA)

SPECTORSOFT

SPECTRONIC SYSTEMS A/S (Denmark)

Spectronic Systems A/S

SPEECH TECHNOLOGY CENTER LTD. (Russia)

Speech Technology Center

SPEKTRA SRL (Italy)

SPEI SPEKTRA

SPIRENT COMMUNICATIONS (UK/USA}

Spirent Communications plc

SPYTECH SOFTWARE and DESIGN,INC. (USA)

SpyTech

SR7 (Australia)

SR7

SS8 (USA)

SS8

SST ShotSpotter (USA)*

SST ShotSpotter

STRATIGN (UAE)

STRATIGN

SUBSENTIO (USA)

SUBSENTIO

SUNTECH INTELLIGENCE (Brazil)

SUNTECH INTELLIGENCE

SURIZON TECHNOLOGIES (UK)

SURIZON

SYBORG (Germany)

SYBORG

SYMANTEC (USA)

SYMANTEC

SYMBIAN LTD / NOKIA (UK)

Symbian

SYRIATEL (Syria)

SYRIATEL

SYSTEMS RESEARCH AND DEVELOPMENT (USA)

SRD

TADIRAN ELECTRONIC SYSTEMS Ltd.(Israel)

Tadiran

TAMARA ELECTRONIC Ltd (Turkey)

Tamara Electronic Ltd

TAMO (France)

TAMO

TAMOSOFT (New Zealand)

Tamosoft

TEEL TECHNOLOGIES (USA)

TEEL

TEKTRONIX INCORPORATED (USA)

Tektronix Incorporated

TELECOMMUNICATION COMPANY of IRAN (TCI)(IRAN)

TCI

TELEKOM AUSTRIA / MOBITEL

MOBITEL

TELESOFT TECHNOLOGIES (United Kingdom)

TELESOFT TECHNOLOGIES

TELETEL ADVANCED TECHNOLOGY (UAE/USA)

Teletel Advanced Technology

TELETEL (Greece)

TELETEL

TELIASONERA (Sweden)

TELIASONERA

THALES (France)

THALES

The SI ORGANIZATION INC (USA)

The SI Org

TIBCO SOFTWARE (USA/EU/JP/Worldwide)

TIBCO

TILERA

TILERA

TRACESPAN COMMUNICATIONS (USA/Israel)

TraceSpan Communications

TRANSTEK (Syria)

TRANSTEK

TRAPWIRE (USA)

TRAPWIRE

TRAPWIRE additional data

TREND MICRO

TRENDMICRO

TRESYS TECHNOLOGY (US, UK, Australia)

Tresys Technology

TROVICOR GmbH (Germany)

Trovicor

TURKCELL (Turkey)

TURKCELL

UDILIGENCE (USA)

UDILIGENCE

Ukrtelecom JSC (Ukraine)

UKRTELCOM

ULTRAREACH (USA)

ULTRAREACH

UNISPEED A/S (Denmark)

UNISPEED

UNTANGLE (USA)

UNTANGLE

UNVEILLANCE (USA)*

UNVEILLANCE

UTIMACO (US/Germany)*

Utimaco

VEDICIS (France)*

VEDICIS

VASTECH (South Africa)*

VASTECH

VERINT - subsidiary of COMVERSE (Israel/USA)*

VERINT

VERIZON (USA/Belgium)

Verizon

VERVIS COMINT SERVICES GmbH (Germany)*

VERVIS COMINT SERVICES

VIGITRUST (Ireland)*

VIGITRUST

VINEYARD NETWORKS (BC Canada)*

VINEYARD NETWORKS

VISIBLE TECHNOLOGIES (USA/UK)

VISIBLE TECHNOLOGIES

VISLINK GROUP (UK)*

VISLINK GROUP

VIXTEL (CHINA)

VIXTEL

VOCAL TECHNOLOGIES Inc. (USA)*

VOCAL TECHNOLOGIES

VOLIA Software (US/Ukraine)

VOLIA SOFTWARE

VSS MONITORING (USA)*

VSS MONITORING

VUPEN SECURITY (France)*

VUPEN SECURITY

WASEELA (KSA/Jordon/Dubai) *

WASEELA

WATCHPOINT / WildPackets (USA)*

WatchPoint

WEBSENSE (USA)*

Websense

WEDGE NETWORKS (Canada/US/China) *

WEDGE NETWORKS

WORLD SURVEILLANCE GROUP INC (USA)

WORLD SURVEILLANCE GROUP

WORLD TECH COMPANY (Syria)

World Tech Co

XALTED Inc. (USA/India)*

Xalted

XROADS NETWORKS (USA)

XRoads Networks

YOKOGAWA ELECTRIC CORPORATION (Japan)*

Yokogawa Electric Corporation

ZTE (China)

ZTE

007 Spygear (Brasil)

007 Spygear

3iMIND (Swiss) *

3iMIND

3M (Germany)

3M

3VR (USA)*

3VR

6WIND (France)

6WIND

Conferences & Meetings

ISS World Training

ISS World Training are a set of global conferences for the lawful intercept industry, a.k.a. government surveillance. ISS is produced by Telestrategies. Individual sponsor pages are a who's who of the Pinkerton rat bastards and mother f*ckers in this industry. The next one is in the Middle East

Guardian Article in which Jerry Lucas of ISS says outrageous things. Good background.

@ioerror was thrown out of the Washington DC conference this year. Security research & cool dude Chris Soghoian was fired from a job at US FTC for using his government ID to attend covertly.

Frequently Asked Questions? (FAQ?)

What is "Surveillance" and why should I care, since I'm not doing anything criminal?

  • Why should I care?

Most people, living in democratic countries, have the Constitutional Right to Privacy. This Right is being taken from you and sold for corporate profit. To the Corporation you and your data are a commodity. To the government you are a "terrorist suspect" until they have gathered enough data about you and analyzed the existing data to find that you are no longer "suspect." The data they analyze includes who you associate with online i.e. "Friend" on Social Networks.

"In computing, a blacklist is an access control system which denies entry to a specific list (or a defined range) of users, programs, or network addresses."

What is "Persona Management" Software?

In short it is a software technology employed by the military, governments, politicans and blue chip corporations to create fake identities aka "sock puppets" for surveillance of opponents and the dissenting public, most often on social media.

Project PM and Operation Metal Gear began researching and exposing such online surveillance activities in 2011, as explained further in this video prior to the creation of The Telecomix Blue cabinet. One example of a company that has contracted with the US Military to provide Persona Management Software is Ntrepid

Example Patent application Persona management system for communications

What about cell phones?

Cell phones are easily tracked by Law Enforcement Agencies (LEA), that can find your location through the internal GPS battery like cell inside the phone. Even if you remove the GPS tracker, your cell phone can expose your location through sound waves and so-called "Lawful Intercept" surveillance products available to LEAs. It is even possible for LEAs to turn on the remote mic in your cell and home phones. If you are trying to have a private discussion in person, make sure that phones have the batteries removed. There are numerous online publications and videos on this subject. If you find a good one, please add it here. <3

What is Commercialized Spying?

Here is a great video "The World of Commercialized Spying" explained by Julian Assange, publisher with the nonprofit organisation, WikiLeaks Disclose.tv and "Marriage From Hell" by Dr. Evgeny Morosov Key Note Speaker at 28c3 conference

What is NFC?

Near Field Communication is explained by arstechica

How can you fight online Government Spying?

2009 Electronic Frontier Foundation (EFF) launched its Surveillance Self-Defense project-- an online how-to guide for protecting your private data against government spying. You can find the project at http://ssd.eff.org.

What is Network Intelligence?

Network Intelligence technology is an emerging category of technology to reveal the critical details of the data locked inside network traffic and transactions. See Wikipedia

What is Lawful Interception (LI)?

Packet capture can be used to fulfill a warrant from a law enforcement agency (LEA) to produce all network traffic generated by an individual. Internet service providers and VoIP providers in the United States of America must comply with CALEA (Communications Assistance for Law Enforcement Act) regulations. Deep Packet Capture provides a record of all network activities.[3] Using packet capture and storage, telecommunications carriers can provide the legally required secure and separate access to targeted network traffic and are able to use the same device for internal security purposes. DPC probes can provide lossless capture of target traffic without compromising network performance.[9] However DPC appliances may be unable to provide chain of evidence audit logs, or satisfactory security for use in this application. Collection of data from a carrier system without a warrant is illegal due to laws about interception. [1]

Are printers used for surveillance?

Yes they are. Several printer companies are listed in this Response Letter from U.S. Department of Homeland Security and Secret Service]

What can I do to help ban or limit the expansion of surveillance technologies?

Although there are pros and cons of these technologies, the cons are certainly outweighed when being used against the rights of humans and privacy. One simple way to fight back is to expose the vendors and people financially profitting from the technologies. You can do this by adding more info and content to this Blue Cabinet wiki and coming to the irc #bluecabinet. Also, listen to this 2011 keynote presentation video by Evgeny Morozov for additional info and ways to take action.

What is a Point of Presence?

An Internet point of presence is an access point to the Internet. It is a physical location that houses servers, routers, ATM switches and digital/analog call aggregators. It may be either part of the facilities of a telecommunications provider that the Internet service provider (ISP) rents or a location separate from the telecommunications provider. ISPs typically have multiple PoPs, sometimes numbering in the thousands. PoPs are also located at Internet exchange points and colocation centres. [2].

How is surveillance equipment installed?

Surveillance equipment is usually installed at a POP and the traffic is further encapsulated by protocols such as MPLS (Multiprotocol Label Switching) in the backbone. This makes it possible to route the traffic from Proxy servers, which may decrypt the traffic, making it possible to monitor in realtime or reconstruct its stored sessions.

How to protect yourself?

Encryption does protect against surveillance when it is based on public/private key encryption, such as when using SSL/TLS. Surveillance methods can use man-in-the-middle attacks, such as using a proxy to present a fake SSL certificate which the user must thrust. One recommended proxy is TOR

Are there vulnerabilities in Lawful Intercept Solutions?

What is Deep Packet Inspection (DPI)?

  • zdnet Deep Packet Inspection - What you should know.

"Invented by Check Point Software Technologies in the mid-to-late 1990s stateful inspection quickly became an industry standard. Stateful inspection provides for the analysis of packets at the network layer as well other layers (typically the transport layer in the OSI model but the firewall may look at layers above that as well) in order to assess the overall packet. By combining information from various layers (transport, session, and network) the firewall is better able to understand the protocol it is inspecting. This also provides for the ability to create virtual sessions in order to track connectionless protocols such as UDP-based applications as well as RPC-based applications..."

Full/deep packet capture of entire populations is now possible. The only limitation is storage space. This means that all traffic from a user/subscriber is captured and stored in realtime to a data centre. It can lates be played back or reconstructed. One product which does this is RSA NetWitness. Normally a full capture is only performed by technicians for troubleshooting network connectivity problems.

"Deep Content Inspection is considered the evolution of Deep Packet Inspection with the ability to look at what the actual content contains" wikipedia

"Deep Content Inspection v. Deep Packet Inspection" http://www.wedgenetworks.com/resources/technology/deep-content-inspection-with-wedgeos.html

What is Data Carving?

Data carving (Antonio Merola, Data Carving Concepts, SANS Institute 2008) is the process of extracting a collection of data from a larger data set. Data carving techniques frequently occur during a digital investigation when the unallocated file system space is analyzed to extract files. The files are "carved" from the unallocated space using file type-specific header and footer values. File system structures are not used during the process.

Data carving is done on a disk when the unallocated file system space is analysed to extract files because data cannot be identified due to missing of allocation info, or on network captures where files are "carved" from the dumped traffic using the same techniques. One drawback of this process on disks or images is that file-carving tools typically contain many false positives, hence tests must be done on each of the extracted files in order to check its consistency. This is not the case with network-dumped files where files are within the dump (if the dump is complete) and is just matter of doing extraction. There are many powerful automated forensic analysis tools available for use. There are no standard techniques for the tools to perform common investigative tasks, such as recovering a deleted file.

Where can I get additional information about Spy technologies?

Bugged Planet, ProjectPM and some news publications have special sections on IT and mobile phone surveillance (see Bloomberg, WSJ and Forbes. In addition, Wikileaks have released The Spy Files which contains a large collection of documents related to Spy technologies. The collection can be obtained from The Pirate Bay [3].

What can I do to help ban or limit the expansion of surveillance technologies?

Although there are pros and cons of these technologies, the cons are certainly outweighed when being used against the rights of humans and privacy. One simple way to fight back is to expose the vendors and people financially profitting from the technologies. You can do this by adding more info and content to this Blue Cabinet wiki and coming to the irc #bluecabinet. Also, listen to this 2011 keynote presentation video by Evgeny Morozov for additional info and ways to take action.

What about government sanctions on technology?

  • United States of America

CBSNews reports Obama levies new tech sanctions on Syria, Iran

President Barack Obama's Executive Order 13606 13606 pdf version blocking the property and suspending entry into the United States of certain persons with respect to grave human rights abuse by the governments of Iran and Syria via information technology. The lead departments are the US Department of Treasury in consultation with the US State Department.


Although some EU countries and the USA have agreed to sanctions the enforcement is lacking. Especially when other countries do not have sanctions where distributors/resellers are providing the surveillance tech to government dictatorships. How to hold the manufacturers, sellers and shippers accountable has not been simple. Most likely there is a black market.

  • European Union


  • Other Sanctioned Countries

More data on Sanctions see Sactions wiki