Tags

, , , , , , , , , ,

Countries With FinFisher

Here are the 36 countries that have been found to host FinFisher Command & Control Servers, to which the malware connects to harvest reams of data (click to enlarge)

Gamma Group FinFisher: Mass interception of entire populations is not only a reality, it is a secret industry spanning countries round the world.

FinSpy surveillance software, for example, marketed worldwide to law enforcement agencies as a way to monitor “criminals,” is widely used by repressive governments, including the U.S., to spy on human rights groups and dissidents.

It sounds like something out of Hollywood, but as of today, mass interception systems, built by Western intelligence contractors, including for ’political opponents’ are a reality. WikiLeaks began releasing a database of hundreds of documents from as many as 160 intelligence contractors in the mass surveillance industry. Working with Buggedplanet and Privacy International, as well as media organizations form six countries – ARD in Germany, The Bureau of Investigative Journalism, The Hindu in India, L’Espresso in Italy, OWNI in France and the Washington Post in the U.S. Wikileaks is shining a light on this secret industry that has boomed since September 11, 2001 and is worth billions of dollars per year.

wikileaks-spyfilesThese documents reveal how, as the intelligence world has privatised, US, EU and developing world intelligence agencies have rushed into spending millions on next-generation mass surveillance technology to target communities, groups and whole populations.

International surveillance companies are based in the more technologically sophisticated countries, and they sell their technology on to every country of the world. This industry is, in practice, unregulated. Intelligence agencies, military forces and police authorities are able to silently, and on mass, and secretly intercept calls and take over computers without the help or knowledge of the telecommunication providers. Users’ physical location can be tracked if they are carrying a mobile phone, even if it is only on stand by.

But the WikiLeaks Spy files are more than just about ’good Western countries’ exporting to ’bad developing world countries’. Western companies are also selling a vast range of mass surveillance equipment to Western intelligence agencies. In traditional spy stories, intelligence agencies like MI5 bug the phone of one or two people of interest. In the last 14 years systems for indiscriminate, mass surveillance have become the norm. Intelligence companies such as Vastech secretly sell equipment to permanently record the phone calls of entire nations. Others record the location of every mobile phone in a city, down to 50 meters. Systems to infect every Facebook user, or smart-phone owner of an entire population group are on the intelligence market.

Hacking Team Remote Control System

Selling Surveillance to Dictators

When citizens overthrew the dictatorships in Egypt and Libya this year, they uncovered listening rooms where devices from Gamma corporation of the UK, Amesys of France, VASTech of South Africa and ZTE Corp. of China monitored their every move online and on the phone.

Surveillance companies like SS8 in the U.S., Hacking Team in Italy and VUPEN in France manufacture viruses (Trojans) that hijack individual computers and phones (including iPhones, Blackberries and Androids), take over the device, record its every use, movement, and even the sights and sounds of the room it is in. Other companies like Phonexia in the Czech Republic collaborate with the military to create speech analysis tools. They identify individuals by gender, age and stress levels and track them based on ‘voiceprints’. Blue Coat in the U.S. and Ipoque in Germany sell tools to governments in countries like China and Iran to prevent dissidents from organizing online.

Trovicor, previously a subsidiary of Nokia Siemens Networks, supplied the Bahraini government with interception technologies that tracked human rights activist Abdul Ghani Al Khanjar. He was shown details of personal mobile phone conversations from before he was interrogated and beaten in the winter of 2010-2011.

How Mass Surveillance Contractors Share Your Data with the State

In January 2011, the National Security Agency broke ground on a $1.5 billion facility in the Utah desert that is designed to store terabytes of domestic and foreign intelligence data forever and process it for years to come.

National Geospatial-Intelligence AgencyTelecommunication companies are forthcoming when it comes to disclosing client information to the authorities – no matter the country. Headlines during years unrest in the UK exposed how Research in Motion (RIM), makers of the Blackberry, offered to help the government identify their clients. RIM has been in similar negotiations to share BlackBerry Messenger data with the governments of India, Lebanon, Saudi Arabia, and the United Arab Emirates.

Weaponizing Data Kills Innocent People

There are commercial firms that now sell special software that analyze this data and turn it into powerful tools that can be used by military and intelligence agencies.

For example, in military bases across the U.S., Air Force pilots use a video link and joystick to fly Predator drones to conduct surveillance over the Middle East and Central Asia. This data is available to Central Intelligence Agency officials who use it to fire Hellfire missiles on targets.

The CIA officials have bought software that allows them to match phone signals and voice prints instantly and pinpoint the “specific identity and location” of individuals. Intelligent Integration Systems, Inc., based in Massachusetts – sells a “location-based analytics” software called Geospatial Toolkit for this purpose. Another Massachusetts company named Netezza, which bought a copy of the software, allegedly reverse engineered the code and sold a hacked version to the Central Intelligence Agency for use in remotely piloted drone aircraft.

Global ObserverIISI, which says that the software could be wrong by a distance of up to 40 feet, sued Netezza to prevent the use of this software. Company founder Rich Zimmerman stated in court that his “reaction was one of stun, amazement that they (CIA) want to kill people with my software that doesn’t work.”

Orwell’s World

Across the world, mass surveillance contractors are helping intelligence agencies spy on individuals and ‘communities of interest’ on an industrial scale.

The Wikileaks Spy Files reveal the details of which companies are making billions selling sophisticated tracking tools to government buyers, flouting export rules, and turning a blind eye to dictatorial regimes that abuse human rights.

How to use the Spy Files

To search inside those files, click one of the link on the left pane of this page, to get the list of documents by type, company date or tag.

To search all these companies on a world map use the following tool from Owni

WikileaksSpyFilesMap

Spy Files Documents:

Surveillance Industry Documents   WikiLeaks Counter Intelligence Unit (WLCIU) Location Tracking

Document Title Company Year Document Type Tags Target System Country Codes
10 GigaBit Fiber Taps NETOPTICS Brochure NETOPTICS US
10/100 Port Aggregator Tap NETOPTICS Brochure NETOPTICS US
10/100/1000 Tap Network Link NETOPTICS Brochure NETOPTICS US, FR
10/100BaseT Tap NETOPTICS Brochure NETOPTICS US
1U Modular Rackmount Surveillance Simplified Packet Forensics 2011 Brochure PACKET FORENSICS, Internet Monitoring, Lawful Interception, Data Retention, VOIP COMINT, HARDWARE US
2 Mercure OCKHAM 2011 Brochure OCKHAM, Mass Monitoring, Analysis Software, Traffic Data Processing, SOFTWARE FR
4×1 GigaBit Copper In-Line Regeneration Tap NETOPTICS Brochure NETOPTICS US
5-Series Small Devices, Big Opportunities Packet Forensics 2011 Brochure PACKET FORENSICS, SIGINT, Tactical Internet Monitoring US
A30 Excellence in Telephone Interception Systems AMECS 2011 Brochure AMECS, Analysis Software, Deep Packet Inspection, Mass Monitoring, Monitoring Centre, PRODUCT, SOFTWARE, HARDWARE Phone Network FR
Aappro Security and defence: Company Brochure AAPPRO 2011 Brochure AAPPRO, Covert Surveillance Devices, Tactical GSM Interception, Tactical Interception Devices GSM GB
About BrightPlanet BrightPlanet 2011 Catalogue BRIGHTPLANET, Analysis Software, SOFTWARE US
Advanced Cyber Infrastructure Protection Cassidian (EADS) 2011 Brochure CASSIDIAN (EADS), Deep Packet Inspection, Internet Monitoring DE
Advertisement System InPoint SMS NeoSoft Data Sheet NEOSOFT, Tactical GSM Interception CH
An Introduction to Morpho Face Investigate Pilot Safran 2011 Brochure SAFRAN, Facial Recognition, CCTV, SOFTWARE FR
An overview of FTS products & services Forensic Telecommunications Services 2011 Brochure FORENSIC TELECOMMUNICATIONS SERVICES, Forensics, Cell Phone Forensics, COMINT, SMS Monitoring, SIM Card Forensics, Thuraya Monitoring, Iridium Monitoring, Tactical GSM Interception, PRODUCT, SERVICE GB
Analyst´s Notebook – Esri Edition Foundation Module i2 Group 2011 Brochure I2 GROUP, Social Network Analysis, Semantic Analysis, Analysis Software, SOFTWARE US
Analyst´s Notebook 8 i2 Group 2010 Brochure I2 GROUP, Analysis Software, SOFTWARE US
ARES Systeme d´interception de Bandes C/L Thuraya RHEINMETALL DEFENCE Brochure RHEINMETALL DEFENCE, Tactical Satellite Interception DE
Argos Thuraya Interception L-Band System RHEINMETALL DEFENCE Brochure RHEINMETALL DEFENCE DE
Artemis – Systeme d´Interception de bandes L/L Thuraya RHEINMETALL DEFENCE Brochure RHEINMETALL DEFENCE, Tactical Satellite Interception DE
ATIS Presentation ATIS Uher Presentation ATIS UHER, Monitoring Centre DE, TN
Audioscope – Audio Capturing and Recording System Cobham 2011 Brochure COBHAM, Recognition, Covert Surveillance Devices, Audio Forensics, Tactical Interception Devices DK
Automated Data Retention for Telcommunication Service Providers UTIMACO 2010 Brochure UTIMACO, Data Retention Phone Network, Mobile Phone Network DE, GB
Automatic Speaker Identification System (ASIS) Agnitio 2011 Brochure AGNITIO, Audio Forensics, Biometrics, Speaker Identification, Strategic Interception Phone Network GB
Batvox export 1:1 voice biometric tool Agnitio 2011 Brochure AGNITIO, Speaker Identification, Audio Forensics Phone Network ES
Beowulf II Board Audio Recorder Cobham 2011 Data Sheet COBHAM, COBHAM BEOWULF II BOARD Covert Surveillance Devices DK
Beowulf II Bubble Gum Covert ìdrop and walk audio recorder Cobham 2011 Data Sheet COBHAM, Covert Surveillance Devices, Tactical Interception Devices DK
Beowulf II Solid state stand alone recorder Cobham 2011 Data Sheet COBHAM, Covert Surveillance Devices, Tactical Interception Devices, HARDWARE DK
Bifrost Wireless HIgh Speed USB Modem for Freja Video records Cobham 2011 Data Sheet COBHAM, Covert Surveillance Devices, CCTV, Tactical Interception Devices, Covert Surveillance Devices DK
Biometric Speaker Spotting System (BS3) Agnitio 2011 Brochure AGNITIO, COMINT, Audio Forensics, Speech Recognition, Speaker Identification, Strategic Interception Phone Network ES
Biometrics Ernst & Young 2011 Brochure ERNST & YOUNG, Biometrics, SERVICE GB
BONGO monitoring system NETI 2011 Brochure NETI, Lawful Interception, Strategic Interception, VOIP COMINT, Network Recording, Traffic Data Processing, Monitoring Centre, HARDWARE HU
Brochure Security & Policing Exhibition – UK Innovation for Global Security ADS UKTI Defence & Secuity Organisation 2012 Brochure ADS UKTI DEFENCE & SECUITY ORGANISATION GB
BS3 Strategic – Biometric Speaker Spotting System: Strategic Edition Agnitio 2011 Brochure AGNITIO, Mass Monitoring, Audio Forensics, VOIP COMINT, Speaker Identification, Speech Recognition, Strategic Interception Phone Network ES
Building your OSINT Capabililty Kapow Software 2011 Brochure KAPOW SOFTWARE, Social Network Analysis, Mass Monitoring, Analysis Software Twitter, Facebook GB, US
CAPsure 256 Element Square Microphone Array Cobham 2011 Data Sheet COBHAM, COBHAM CAPSURE Covert Surveillance Devices, Audio Forensics DK
Case History EXPERTSYSTEM Brochure EXPERTSYSTEM, Semantic Analysis US, IT
Case history eni EXPERTSYSTEM Brochure EXPERTSYSTEM, Semantic Analysis US, IT
Case Study: COsmOs EXPERTSYSTEM Brochure EXPERTSYSTEM, Audio Forensics, Speaker Identification, Speech Recognition, Semantic Analysis US, IT
Case study: Network Intelligence for Lawful Interception QOSMOS 2011 Brochure QOSMOS, Lawful Interception, Mass Monitoring, gbps, p2p, Network Recording, Deep Packet Inspection, VOIP COMINT E-Mail, Instant Messaging FR, US, SG
Catalogue of Tactical Communications and Surveillance Product Short Form Cobham 2011 Catalogue COBHAM, Covert Surveillance Devices, Audio Forensics, Tactical Interception Devices, Location Tracking DK
Catalogue Security & Policing Exhibition ADS UKTI Defence & Security Organisation 2012 Catalogue ADS UKTI DEFENCE & SECURITY ORGANISATION GB
Cell phone detection systems Berkeley Varitronics Systems 2011 Brochure BERKELEY VARITRONICS SYSTEMS, SIGINT, Cell Phone Detection US
CellNet Drop 2 Interception System ERICSSON 2000 Training Material ERICSSON, Monitoring Centre SE
Cellphone detector Wolfhound Berkeley Varitronics Systems 2011 Brochure BERKELEY VARITRONICS SYSTEMS, SIGINT, Cell Phone Detection US
Centuare Elektron Brochure ELEKTRON, Lawful Interception, Location Tracking FR
CIGOTO SEE From search to knowing EXPERTSYSTEM Video EXPERTSYSTEM, Semantic Analysis US, IT
Cogito Answers EXPERTSYSTEM Brochure EXPERTSYSTEM, Audio Forensics, Speaker Identification, Speech Recognition, Semantic Analysis US, IT
Cogito Categorizer Cogito Discover EXPERTSYSTEM Brochure EXPERTSYSTEM, Audio Forensics, Speaker Identification, Speech Recognition, Semantic Analysis US, IT
COGITO Intelligence Platform EXPERTSYSTEM Brochure EXPERTSYSTEM, Semantic Analysis, Text mining US, IT
Cogito Mapping Concepts EXPERTSYSTEM Video EXPERTSYSTEM, Analysis Software, Location Tracking, Semantic Analysis US, IT
Cogito Monitor EXPERTSYSTEM Brochure EXPERTSYSTEM, Audio Forensics, Speaker Identification, Speech Recognition, Text mining, Semantic Analysis US, IT
Cogito Monitor Voice of the Customer EXPERTSYSTEM Video EXPERTSYSTEM, Semantic Analysis US, IT
Cogito Search Explore Engine EXPERTSYSTEM Brochure EXPERTSYSTEM, Audio Forensics, Speaker Identification, Speech Recognition, Semantic Analysis US, IT
COGITO SEE Finding out who did what EXPERTSYSTEM Video EXPERTSYSTEM, Semantic Analysis US, IT
COGITO Semantic Technology EXPERTSYSTEM Video EXPERTSYSTEM, Semantic Analysis US, IT
COGITO Twitter Semantic Search EXPERTSYSTEM Video EXPERTSYSTEM, Semantic Analysis Twitter US, IT
COGITO Understanding Words EXPERTSYSTEM Video EXPERTSYSTEM, Semantic Analysis US, IT
Cogito: Solutions for Semantic Publishing EXPERTSYSTEM Brochure EXPERTSYSTEM, Semantic Analysis US, IT
Combatting the Taliban in Central Helmand, Afghanistan i2 Group 2010 Brochure I2 GROUP, Analysis Software US
COMINT Technology Innov Telek IZT 2011 Presentation INNOV TELEK IZT, COMINT DE
CommsAudit Corporate Overview CommsAudit 2011 Brochure COMMSAUDIT, SIGINT GB
Completing the Investigative Solution Surveillance Simplified Packet Forensics 2011 Brochure PACKET FORENSICS, Internet Monitoring, Lawful Interception, Mass Monitoring, Deep Packet Inspection, hundreds of probes, Network Recording, Traffic Data Processing, VOIP COMINT, Tactical Internet Monitoring, Data Retention Instant Messaging, GMail, Hotmail US
Construiere une plateform d´access pour la surveillance NETOPTICS Presentation NETOPTICS US, FR
Corporate Brochure EXPERTSYSTEM Brochure EXPERTSYSTEM, Semantic Analysis, Audio Forensics, Analysis Software, Speech Recognition, Speaker Identification US, IT
Corporate Overview Advanced Surveillance Digital Barriers 2011 Brochure DIGITAL BARRIERS, Covert Surveillance Devices, Tactical Interception Devices GB, FR, US, AE, SG
Countering Thread Surveillance, Interception, Detection, Forensics, CyberSecurity Roke Manor Research 2011 Brochure ROKE MANOR RESEARCH, Lawful Interception, COMINT, Image Recognition, Internet Monitoring, Tactical Interception Devices GB
CYBELS CYBer Expertise for Leading Security THALES 2010 Brochure THALES, Analysis Software FR
Cyber i2 Group 2010 Brochure I2 GROUP, Analysis Software US
Cybersecurity overview THALES 2011 THALES, Monitoring Centre Internet Usage FR
Cyveillance Corporate Security Cyveillance 2011 Brochure CYVEILLANCE, Internet Monitoring, Mass Monitoring, OSINT US
Data acquisition from devices Spektor Forensic Intelligence 2011 Brochure SPEKTOR FORENSIC INTELLIGENCE, Analysis Software, Cell Phone Forensics GB
Data Monitoring Switch NETOPTICS Brochure NETOPTICS, HARDWARE US
Director Data Monitoring Switch Datasheet NETOPTICS Brochure NETOPTICS US, FR
DPX Network Probe IPOQUE Data Sheet IPOQUE, Deep Packet Inspection
DRS Data Retention Suite UTIMACO 2010 Brochure UTIMACO, Data Retention Phone Network, Mobile Phone Network DE, GB
DRS Paquete de retencion de datos UTIMACO 2011 Brochure UTIMACO, Data Retention Phone Network, Mobile Phone Network DE, GB
Electronic Blitz Glimmerglass Networks 2011 Brochure GLIMMERGLASS NETWORKS, Network Recording, Deep Packet Inspection, Mass Monitoring, Internet Monitoring, Fiber-optic Interception, Strategic Interception US
Electronic Surveillance, Counter-Surveillance & RF Jamming Eskan 2011 Brochure ESKAN, Audio Forensics, Cell Phone Detection, Location Tracking, Tactical Interception Devices, Covert Surveillance Devices GB
Electronic Warfare: COMINT + COMMS/ESM Intelligence Generation & Fusion Systems MEDAV 2009 Presentation MEDAV, COMINT
Enabling Seucire Internet OperationsION Internet Operations Network NTREPID 2011 Brochure NTREPID, OSINT, Social Network Analysis US
Evident ETIgroup 2011 Catalogue ETIGROUP, Analysis Software, COMINT, Data Retention, Data Mining, Deep Packet Inspection, Internet Monitoring, Lawful Interception, SOFTWARE DK, GB, US
Examining SSL-Encrypted Communiations Metronome 2011 Brochure METRONOME, COMINT, Deep Packet Inspection, Mass Monitoring, SSL, PRODUCT, HARDWARE US, GB, MY, ZA, CN
Exploits for Law Enforcement VuPen 2011 Brochure VUPEN, Exploits FR
Facebook Relations Analysis Target Profiling Genesi Platform IPS Intelligence Brochure IPS INTELLIGENCE, Analysis Software, Social Network Analysis Facebook IT
Famille de produits Observer ELEXO Brochure ELEXO FR
FCO Services: Secure Mobile Solutions FCO Services 2011 Brochure FCO SERVICES, FCO SERVICES SECURE MOBILE SOLUTIONS GB
Finfisher FINFly ISP 2.0 Infrastructure Product Training Gamma 2010 Training Material GAMMA, Trojans, Strategic Infection Internet Usage DE, GB
FinFisher Pricing Dreamlab 2011 Pricelist DREAMLAB, Trojans, Strategic Infection Internet Usage CH, DE, GB
Freja Video Recorders Cobham 2011 Data Sheet COBHAM, Covert Surveillance Devices, CCTV, HARDWARE DK
FSNtracks Freightwatch Security Net 2011 Brochure FREIGHTWATCH SECURITY NET, Location Tracking, SOFTWARE IE, US
FX to TX Tap NETOPTICS Brochure NETOPTICS, HARDWARE US
GAJT GPS Anti-Jam protection Qinetiq 2011 Brochure QINETIQ, Location Tracking, HARDWARE GB, CA
Geo F5 GPS tracker Freightwatch Security Net 2011 Brochure FREIGHTWATCH SECURITY NET, Location Tracking IE, US
GeoTime 5 OCULUS 2011 Brochure OCULUS, Visualisation, Social Network Analysis US
Geotime 5 – Instantly Reveal Movement Patterns Over Time OCULUS 2010 Brochure OCULUS, Location Tracking US
Giga Stor ELEXO Brochure ELEXO FR
Gigabit and 10 GbE Network Analysis ELEXO Brochure ELEXO FR
GigaBit Copper Tap NETOPTICS Brochure NETOPTICS US, FR
GigaBit Fiber Taps NETOPTICS Brochure NETOPTICS, HARDWARE US
Gigabit Observer NETWORK Instruments Brochure NETWORK INSTRUMENTS US
Gnomes Professional audio recorders Speech Technology Centre 2011 Brochure SPEECH TECHNOLOGY CENTRE, SPEECH TECHNOLOGY CENTRE GNOME RANGE OF RECORDERS Covert Surveillance Devices RU, DE
GSM/UMTS detection and location system QCC Interscan 2011 Brochure QCC INTERSCAN, Cell Phone Detection, Location Tracking GB
Hinton 5000 Interceptor Passive probe Telesoft Technologies 2011 Brochure TELESOFT TECHNOLOGIES, Mass Monitoring, Lawful Interception, SMS Monitoring, SIGINT, COMINT, Data Retention GSM, IMSI, SMS, IMEI, CDMA GB, US, IN
Hinton Abis Probe Telesoft Technologies 2011 Brochure TELESOFT TECHNOLOGIES, Location Tracking, Mass Monitoring, GSM, UMTS, CDMA GB, US, IN
Hinton Mobile Data Probe Telesoft Technologies 2011 Brochure TELESOFT TECHNOLOGIES, Lawful Interception, Mass Monitoring, GSM, UMTS, CDMA GB, US, IN
iBase 8 i2 Group 2011 Brochure I2 GROUP, Analysis Software, SOFTWARE US
IFS-8000 Intelligence Fusion System MEDAV 2011 Brochure MEDAV, Analysis Software, Monitoring Centre, Visualisation, SOFTWARE DE
iLink Agg NETOPTICS Brochure NETOPTICS US
INCA Repeater – Four Channel Remote Controlled Repeater Cobham 2011 Data Sheet COBHAM, COBHAM INCA REPEATER Covert Surveillance Devices DK
Infrastructure protection services Cassidian 2011 Brochure CASSIDIAN, CCTV, COMINT, Analysis Software DE
Intelligent systems THALES 2010 Brochure THALES, Location Tracking FR
InterCom (Thor) Cobham 2011 Data Sheet COBHAM, COBHAM INTERCOM (THOR) Covert Surveillance Devices DK
Internet monitoring suite ClearTrail 2011 Brochure CLEARTRAIL, Mass Monitoring, Deep Packet Inspection, COMINT, SIGINT, Tactical Internet Monitoring, Network Recording, Lawful Interception IN
Intervention & Mobile Laboratory TRACIP 2011 Brochure TRACIP, Forensics FR
ION – Research & Targeting NTREPID 2011 Brochure NTREPID, Analysis Software US
ION Internet Operations Network NTREPID 2011 Brochure NTREPID, OSINT, HUMINT US
ION Large-Scale OSINT Collection NTREPID 2011 Brochure NTREPID, Analysis Software, SOFTWARE US
ION Secure Virtual Desktop NTREPID 2011 Brochure NTREPID, Deep Packet Inspection US
ISIS-4G/IRIS-4G/IRMA-4G Satellite Monitoring Systems Arpege 2010 Brochure ARPEGE, Satellite Interception, Strategic Interception FR
Israel at Milipol Paris 2011 Enterprise Europe Network 2011 Brochure ENTERPRISE EUROPE NETWORK IL
iX Engine DPI & Metadata Extraction SDK QOSMOS 2011 Brochure QOSMOS, Deep Packet Inspection, Mass Monitoring, Internet Monitoring FR, US, SG
iXAM Zero-footprint Forensic Acquisition Forensic Telecommunications Services 2011 Brochure FORENSIC TELECOMMUNICATIONS SERVICES, Cell Phone Forensics iPhone GB, US
ixMachine QOSMOS 2011 Brochure QOSMOS, Deep Packet Inspection, Internet Monitoring, Traffic Data Processing, Network Recording, SOFTWARE H323, Citrix, Oracle, SAP, Exchange, eMule, BitTorrent, Skype, MSN, GTalk, GMail, Hotmail, Yahoo!Mail, RTP, VOIP, google query, youtube, rtp, rtsp, wmp, SIP FR, US, SG
ixMachine LI Edition QOSMOS 2011 Brochure QOSMOS, Lawful Interception, Data Retention, VOIP COMINT, Internet Monitoring Internet Usage, E-Mail FR, US, SG
J-Alert mobile phone jamming detection Seqtor 2011 Brochure SEQTOR, Jamming Detection, HARDWARE DK
Kapow Katalyst for OSINT Kapow Software 2011 Brochure KAPOW SOFTWARE, Analysis Software Blogs, GMail, Hotmail, Internet Usage, Instant Messaging, Twitter, Facebook GB, US
LA IF4CU3 4SFP NETOPTICS Brochure NETOPTICS, HARDWARE US
LA-IL4CU 4SFP NETOPTICS Brochure NETOPTICS US
Lawful Interception: A Mounting Challenge for Service Providers and Governments FROST & SULLIVAN UTIMACO Brochure FROST & SULLIVAN UTIMACO, Lawful Interception GB, DE, FR, IT, PL, US
LI-5 Surveillance Simplified Packet Forensics 2011 Brochure PACKET FORENSICS, Internet Monitoring, VOIP COMINT E-Mail US
LIMS Access Points UTIMACO 2011 Brochure UTIMACO, Lawful Interception Phone Network, Mobile Phone Network DE, GB
LIMS DRS Surveillance integration products UTIMACO 2011 Catalogue UTIMACO, Lawful Interception, Mass Monitoring, Data Retention, Network Recording, Traffic Data Processing, VOIP COMINT, Phone Network, Mobile Phone Network DE, GB
LIMS DRS Video UTIMACO Video UTIMACO, Lawful Interception, Data Retention Phone Network, Mobile Phone Network DE, GB
LIMS Lawful Interception of Telecommunication Services UTIMACO Data Sheet UTIMACO, Lawful Interception Phone Network, Mobile Phone Network DE, GB
LIMS Techpaper Lawful Interception with Umbrella Systems UTIMACO 2010 Brochure UTIMACO, Lawful Interception Phone Network, Mobile Phone Network DE, GB
LIMS Techpaper LI with Umbrella Systems UTIMACO 2010 Brochure UTIMACO, Lawful Interception, COMINT Phone Network, Mobile Phone Network DE, GB
Location Tracking systems HiddenTechnology Systems International Ltd. 2011 Brochure HIDDENTECHNOLOGY SYSTEMS INTERNATIONAL LTD., Location Tracking GB
Loke III Bubble Gum Covert Drop and Walk transmitter Cobham 2011 Data Sheet COBHAM, Covert Surveillance Devices, Tactical Interception Devices DK
Loke III TX Miniature Audio Stereo Transmitter Cobham 2011 Data Sheet COBHAM, Covert Surveillance Devices, Tactical Interception Devices, HARDWARE DK
Loke Nano Transmitter Cobham 2011 Data Sheet COBHAM, Covert Surveillance Devices, Tactical Interception Devices, HARDWARE DK
Management solutions for investigations OCKHAM 2011 Brochure OCKHAM, Traffic Data Processing, Mass Monitoring, Visualisation FR
Meeting the Challenges of Data Retention: Now and in the future FROST & SULLIVAN UTIMACO 2010 Brochure FROST & SULLIVAN UTIMACO, Data Retention GB, DE, FR, IT, PL, US
Mirador Specialist Cameras Digital Barriers 2011 Brochure DIGITAL BARRIERS, Covert Surveillance Devices, CCTV, Tactical Interception Devices GB, FR, US, AE, SG
Mobile Biometric Platform Human Recognition Systems 2011 Brochure HUMAN RECOGNITION SYSTEMS, Facial Recognition, Image Recognition, Iris Recognition, Biometrics GB
Monitoring and Managing Voice over Internet Protocol (VoIP) ELEXO Brochure ELEXO FR
morphoface investigate Safran 2011 Brochure SAFRAN, Facial recognition, CCTV FR
Mtrust Human Recognition System 2011 Brochure HUMAN RECOGNITION SYSTEM, Biometrics, Facial Recognition, Iris Recognition GB
NETI IT Consulting profile NETI 2011 Brochure NETI, Lawful Interception, Mass Monitoring, bongo, iOS HU
Network Content Control System Bivio 2011 Brochure BIVIO, Deep Packet Inspection, Data Retention Skype US
Network Forensics ELEXO Presentation ELEXO FR
Network Intelligence for Lawful Interception QOSMOS Brochure QOSMOS, Lawful Interception Internet Usage FR
Newsletter Q1 GAMMA 2011 Brochure GAMMA, Trojans, Tactical Interception Devices, Tactical Internet Monitoring Internet Usage, Instant Messaging DE, GB
NiceTrack Horizon Insight NICE 2011 Brochure NICE, Mass Monitoring, Location Tracking, Strategic Interception, Monitoring Centre IL, US, GB, HK
NiceTrack Intelligence Services NICE 2011 Brochure NICE, Lawful Interception, Mass Monitoring, OSINT Humans IL, US, GB, HK
NiceTrack Location Tracking Solutions NICE 2011 Brochure NICE, Passive Surveillance, Mass Monitoring, Location Tracking GSM, UMTS, CDMA, SIGINT IL, US, GB, HK
Non-Disclosure Agreement Silicom Dreamlab 2010 Contract Material SILICOM DREAMLAB, Strategic Infection CH, IL
nTAP Product Family ELEXO Brochure ELEXO FR
Number Plate Recognition ELSAG 2011 Catalogue ELSAG, License Plate Recognition, CCTV US
Observer ELEXO Brochure ELEXO FR
Observer 12 Fonctions de securite ELEXO Presentation ELEXO FR, US
Observer Infrastructure / Link Analyst ELEXO Presentation ELEXO FR
Observer integre les technologies NetFlow & sFlow ELEXO Brochure ELEXO
Observer Un outil adapte a la VoIP ELEXO Brochure ELEXO
Ocellus S100 GPS Surveillance and tracking Qinetiq 2011 Brochure QINETIQ, Location Tracking, Covert Tracking Devices GB, CA
Ocellus T100 High performance GPS Logistics Tracking for Trailers, Containers, Vehicles and Remote Assets Qinetiq 2011 Brochure QINETIQ, Location Tracking, Covert Tracking Devices GB, CA
OM Purchase Order Dreamlab 2010 Contract Material DREAMLAB, Trojans, Strategic Infection Internet Usage CH, OM
OM Quotation Monitoring for iproxy-project Dreamlab 2010 Contract Material DREAMLAB, Trojans, Strategic Infection Internet Usage CH, OM
OM System Manual Dreamlab 2010 Deployment Docu DREAMLAB, Trojans, Strategic Infection Internet Usage CH, OM
Omega Recording Transmitter Cobham 2011 Data Sheet COBHAM, Covert Surveillance Devices, Tactical Interception Devices DK
OptiCop Interceptor Monitoring Access solutions Netquest 2011 Brochure NETQUEST, Lawful Interception, Mass Monitoring US
Orion SkyWeb Premium Cobham 2011 Data Sheet COBHAM, Location Tracking DK
Our Mission to make the world a safer place for all of us Trovicor 2011 Brochure TROVICOR, Monitoring Centre, PRODUCT, SERVICE DE
PACE Protocol & Application Classification Engine IPOQUE Data Sheet IPOQUE, Deep Packet Inspection
Packet Monitoring Solutions Telesoft Technologies 2011 Brochure TELESOFT TECHNOLOGIES, COMINT, Deep Packet Inspection, Lawful Interception, Internet Monitoring, Mass Monitoring, Network Recording, Passive Surveillance, Traffic Data Processing, SIGINT 100GE, 10GE, 40GE, 100GE, 1GE, VOIP COMINT, SIP, IP, IPv6, TCP, UDP, PCIe, email, PPP GB, US, IN
Paris Expo Trovicor 2012 Brochure TROVICOR, Lawful Interception, Monitoring Centre Phone Network, Mobile Phone Network DE
Persistent Wide Area Surveillance PV labs 2011 Brochure PV LABS, CCTV, Image Recognition US
Presentation du Director NETOPTICS Presentation NETOPTICS US
Presentation Societe Siltec Presentation SILTEC PL
Principe de fonctioneement d´un TAP cuivre NETOPTICS Presentation NETOPTICS US
Private Voip Exchanges & the IAX Dilemma Packet Forensics 2011 Brochure PACKET FORENSICS, VOIP COMINT, H323, SIP, MGCP, IAX US
proceo OCKHAM 2011 Brochure OCKHAM, Analysis Software, Visualisation FR
Public Security 54 ADS 2011 Brochure ADS GSM GB
Q20 High Dynamics GPS Receiver Module Qinetiq 2011 Brochure QINETIQ, Location Tracking GB, CA
Recording and Transcription Systems Speech Technology Center Brochure SPEECH TECHNOLOGY CENTER, Audio Forensics, Speaker Identification, Speech Recognition RU, DE
Redirector Programmer Guide Version 4.0 Silicom 2010 Manual SILICOM, Strategic Infection Internet Usage IL
RF detection Berkeley Varitronics Systems 2011 Brochure BERKELEY VARITRONICS SYSTEMS, BERKELEY VARITRONICS SYSTEMS DECT 6.0 PROBLEMS UMTS, SIGINT US
RGN-CU-IL4 4×1 10/100BaseT In-Line Regeneration Tap NETOPTICS Brochure NETOPTICS, HARDWARE US
Safe Cities Surveillance Infrastructure Cobham 2011 Brochure COBHAM, Internet Monitoring, Tactical GSM Interception, SIGINT, COMINT, Covert Surveillance Devices, localisation, visualisation DK
Safe City Solutions NICE 2011 Brochure NICE, Mass Monitoring, CCTV, Covert Surveillance Devices, Location Tracking IL, US, GB, HK
Scan Surveillance for Governments ScanTarget 2011 Brochure SCANTARGET, Deep Packet Inspection, COMINT, Network Recording, SMS Monitoring, Lawful Interception, Traffic Data Processing, Semantic Analysis, Social Network Analysis, SOFTWARE, HARDWARE, PRODUCT Twitter, E-Mail, Instant Messaging, Facebook, Internet Usage, Blogs, Forums FR
Schedule 2013 ISS 2013 Catalogue ISS GLOBAL LISTING
Security and Surveillance – Video Analytics Autonomy 2011 Brochure AUTONOMY, CCTV, Analysis Software US
Septier Monitoring Centre Septier 2011 Brochure SEPTIER, Speaker identification, Text mining, VOIP COMINT, Monitoring Centre, Speech Recognition E-Mail, SMS, Instant Messaging FR
SessionVista CX-10 Collector Datasheet Mantaro 2011 Brochure MANTARO, Visualisation, VOIP COMINT, Lawful Interception, Deep Packet Inspection Instant Messaging, E-Mail US
Showcases Law Enforcement Citywide Surveillance Digital Barriers 2011 Brochure DIGITAL BARRIERS, Mass Monitoring, CCTV GB, FR, US, AE, SG
Signal Technology in Service of Homeland Security MEDAV 2011 Brochure MEDAV, Internet Monitoring, Mass Monitoring, COMINT, SIGINT, OSINT, HUMINT, MASINT, Visualisation, Lawful Interception, Network Recording, Passive Surveillance, Data Retention, Deep Packet Inspection, VOIP COMINT, Audio Forensics, Social Network Analysis iphone, iOS, apple, GIS DE
Signals intelligence solutions L3 ASA 2011 Catalogue L3 ASA, SIGINT, Lawful Interception, Location Tracking GB, US
SIMiFOR Forensic Telecommunications Services 2011 Brochure FORENSIC TELECOMMUNICATIONS SERVICES, Cell Phone Forensics, SIM Card Forensics GB, US
SIS II Specialized Audio Editor Speech Technology Center 2010 Brochure SPEECH TECHNOLOGY CENTER, Audio Forensics, Speech Recognition, Speaker Identification, SERVICE Phone Network RU, DE
Small Cellular Basestations for security applications Cambridge Consultants 2011 Brochure CAMBRIDGE CONSULTANTS, IMSI catcher, Lawful Interception, Tactical GSM Interception GB, US
Solutions d‘Analyse Reseau ELEXO Presentation ELEXO
Sondes pour le monitoring a distance du reseau NETWORK INSTRUMENTS Brochure NETWORK INSTRUMENTS US, FR
Speaker Identification Field Toolkit Agnitio 2011 Brochure AGNITIO, Audio Forensics, Speaker Identification, Speech Recognition Phone Network ES
Spectrum Intelligence Systems CRFS 2011 Catalogue CRFS, Cell Phone Detection, SIGINT GB
Speed Size Simplicity AAPPRO 2011 Brochure AAPPRO, Tactical Interception Devices, Tactical GSM Interception GSM GB
SPEKTOR Forensic Intelligence Evidence Talks Ltd. 2012 Brochure EVIDENCE TALKS LTD., Cell Phone Forensics, SIM Card Forensics, HARDWARE, PRODUCT, SOFTWARE GB
SSL Inspector Netronome 2011 Brochure NETRONOME, Deep Packet Inspection, SSL, HARDWARE US
Stopping Cyber Criminials in Their Tracks i2 Group 2010 Brochure I2 GROUP, Analysis Software, SOFTWARE US
Strategic Satellite Monitoring VAStech 2011 Brochure VASTECH, COMINT, Satellite Interception, Strategic Interception ZA
Strategic Telecommunication Network Monitoring VAStech 2011 Brochure VASTECH, Mass Monitoring, Network Recording, Speech Recognition, Traffic Data Processing, SMS Monitoring, Internet Monitoring, Deep Packet Inspection, Strategic Interception, HARDWARE, SOFTWARE ZA
Strategy for an overall intelligence Concept Gamma 2011 Brochure GAMMA, Trojans, Strategic Infection Internet Usage DE, GB, CH
Superior Pattern Discovery Solutions Visual Analytics Inc 2011 Catalogue VISUAL ANALYTICS INC, Analysis Software, Visualisation, Data Mining, SOFTWARE, SERVICE US
Surveillance Simplified Packet Forensics 2011 Brochure PACKET FORENSICS, Internet Monitoring, Lawful Interception, Deep Packet Inspection US
Tactical Communications and Surveillance Cobham 2011 Data Sheet COBHAM, Location Tracking, Covert Tracking Devices, Tactical GSM Interception, CCTV, Covert Surveillance Devices, Image Recognition DK
Tactical Content Management System PV labs 2011 Brochure PV LABS, Image Recognition US
Tactical Observation Solutions SESP 2010 Brochure SESP, Tactical Interception Devices, HARDWARE, PRODUCT GB
Tap into your Network Product Brochure NETOPTICS Brochure NETOPTICS US
Tartan Software overview NTREPID 2011 Brochure NTREPID, Analysis Software, Visualisation, Strategic Interception, SOFTWARE US
Techncial Surveillance equipments BEA 2011 Brochure BEA, COMINT, Covert Surveillance Devices, Covert Tracking Devices, SIGINT, Audio Forensics IT
Tempest Product Overview Siltec Brochure SILTEC, Tempest PL
TextChart AutoMark 8 i2 Group 2010 Brochure I2 GROUP, Analysis Software, Text mining US
Thor Digitial Surveillance System Cobham 2011 Data Sheet COBHAM, Tactical Interception Devices, Covert Surveillance Devices DK
Thor Mini Receiver Cobham 2011 Brochure COBHAM, Covert Surveillance Devices, Tactical Interception Devices, HARDWARE DK
Timebox Event Visualisation IX Capability HP Defence and Security 2011 Brochure HP DEFENCE AND SECURITY, Visualisation, Analysis Software US
TM Finfisher FinFly ISP Project Turkmenistan Gamma 2011 Deployment Docu GAMMA, Trojans, Strategic Infection Internet Usage DE, GB, TM
TM Quotation InfectionProxy Dreamlab´ 2010 Contract Material DREAMLAB´, Trojans, Strategic Infection Internet Usage CH, TM
TMR 16E1 PCIe Tamara Data Sheet TAMARA TR
TVI S400 Wireless Surveillance Digital Barriers 2011 Brochure DIGITAL BARRIERS, Covert Surveillance Devices, CCTV GB, FR, US, AE, SG
UK Pavilion at Milipol ADS 2011 Brochure ADS GB
Unmanned Surveillance System Harris 2011 Brochure HARRIS, Covert Surveillance Devices, CCTV, Image Recognition US
Urban Management Solutions AGT International 2011 Brochure AGT INTERNATIONAL, Analysis Software Phone Network CH, NL, GB, DE, BR, SG, IN
Urban Security – Mexico city THALES 2011 Brochure THALES, THALES URBAN SECURITY – MEXICO CITY Passive Surveillance FR
Utimaco LIMS Interceptacion legal de servicios de telecomunicaciones UTIMACO Brochure UTIMACO, Lawful Interception Phone Network, Mobile Phone Network DE, GB
Utimacop LIMS Lawful Interception of Telecommuication Services UTIMACO 2010 Brochure UTIMACO, Lawful Interception Phone Network, Mobile Phone Network DE, GB
VEGA Elektron Brochure ELEKTRON, COMINT, Location Tracking, Monitoring Centre FR
Vereinbarung einer strategischen Partnerschaft Dreamlab Gamma 2011 Contract Material DREAMLAB GAMMA, Trojans, Strategic Infection Internet Usage DE, GB, CH
Virtualisation ELEXO Brochure ELEXO
Virtus Translation for Structured Data Virtus 2011 Brochure VIRTUS, Analysis Software, SOFTWARE US
Vision Analytics AI Solve 2011 Brochure AI SOLVE, Facial Recognition, Vehicle Tracking, CCTV GB
VoiceGrid Voice Biometric Solutions Speech Technology Centre 2011 Brochure SPEECH TECHNOLOGY CENTRE, Mass Monitoring, Biometrics, Analysis Software, Audio Forensics, Speaker Identification, Speech Recognition RU, DE
VoiceGrid X Speech Technology Centre 2011 Brochure SPEECH TECHNOLOGY CENTRE, Audio Forensics, Biometrics, Speaker Identification, Analysis Software, Speech Recognition RU, DE
VoiceGrid X Voice Biometrics Soilutions Speech Technology Centre 2011 Brochure SPEECH TECHNOLOGY CENTRE, Analysis Software, Speech Recognition, Speaker Identification, SOFTWARE RU, DE
WatchHound cellphone monitor Berkeley Varitronics Systems 2011 Brochure BERKELEY VARITRONICS SYSTEMS, SIGINT, Cell Phone Forensics US
Wireless Homeland Security Cambridge Consultants 2011 Brochure CAMBRIDGE CONSULTANTS, Cell Phone Forensics, Location Tracking, Tactical GSM Interception, Tactical Internet Monitoring, Network Recording, Covert Surveillance Devices, Covert Tracking Devices GB, US
Wolfhound Cell phone detection systems Berkeley Varitronics Systems 2011 Brochure BERKELEY VARITRONICS SYSTEMS, SIGINT, Lawful Interception, Cell Phone Detection US
Wolfhound Lite Cellphone Detector Berkeley Varitronics Systems 2011 Brochure BERKELEY VARITRONICS SYSTEMS, SIGINT, Lawful Interception, Cell Phone Detection, HARDWARE US
Wolfhound Pro Berkeley Varitronics Systems 2011 Brochure BERKELEY VARITRONICS SYSTEMS, Lawful Interception, SIGINT US
Zimiti C-IDS Unattended Ground Sensors Covert Intrusion Detection System Digital Barriers 2011 Brochure DIGITAL BARRIERS, Covert Surveillance Devices, Tactical Interception Devices, Seismic Vibration Sensors GB, FR, US, AE, SG

WikiLeaks Counter Intelligence Unit (WLCIU) Location Tracking Map

Name Company Year Tags Country Codes
2013 ALL Targets 2011 WLCIU
Avner Turniansky Verint 2012 VERINT, Lawful Interception, Strategic Interception, WLCIU IL, IT, US, ES, NG, CH, GR, TR
Brydon Nelson Gamma 2012 GAMMA, Trojans, WLCIU GB, DE, QA, AE, BH, NL, OM, BN, MY, CY, FR
Carlos Gandini Gamma 2012 GAMMA, Trojans, WLCIU DE, AT, ES, CZ, FR, MX, AE, OM, MA, GQ, CM, PT, BR
Chris Nyland Hidden Technology 2012 HIDDEN TECHNOLOGY, Tactical Interception Devices, WLCIU GB, ES, MT, FR, NL, IN
David Ast Cobham 2012 COBHAM, Tactical GSM Interception, WLCIU DE, CZ, DK, CH, FR, AT, IT
Holger Rumscheidt Elaman 2011 ELAMAN, Trojans, WLCIU LB, DE, FR, CH, AE, AT, OM, ZA, ET, US, AZ, TM, ZA, JO
Johnny Debs Gamma 2012 GAMMA, Trojans, WLCIU LB, RS, GB, CZ, TR, ET, GA
Louthean Nelson Gamma 2011 GAMMA, Trojans, Strategic Infection, WLCIU LB, DE, AE, LV, CH, ID, IT, MY, SG, GB, AT, RS, TR, CI, BJ, ZA
Marco Bettini Hackingteam 2012 HACKINGTEAM, Trojans, Strategic Infection, WLCIU IT, FR, MA, AE, SG, DE, RS, ES, MX, CZ, PT, BR
Martin Muench Gamma 2013 GAMMA, Trojans, Strategic Infection, WLCIU MX, US, DE, CZ, KZ, GB, NL, FR, RS
Mostapaha Maana Hackingteam 2011 HACKINGTEAM, Trojans, WLCIU IT, CH, US, MA, MY, SG, LB, NL, FR, EG, AE, TR, DE, SA, QA, SD, CZ, OM
Neil Tomlinson Cobham 2012 COBHAM, Tactical GSM Interception, WLCIU GB, AE, LB, QT, KW
Peter Warnke Cellebrite 2012 CELLEBRITE, WLCIU DE, IL, TR, NL, AE, US, GB, PL, CH
Ray Hutton Telesoft 2012 TELESOFT, Lawful Interception, Tactical Internet Monitoring, WLCIU GB, ES, AE, IT
Rudolf Gnadl Rohde Schwarz 2012 ROHDE SCHWARZ, SIGINT, WLCIU DE, AT, CZ, PT, FR, ES, US
Rudolf Windschuh UTIMACO 2012 UTIMACO, Lawful Interception, Strategic Interception, Data Retention, WLCIU DE, NL, FR, ES, AE, AU, CZ, FI, GB
Stephan Oelkers Gamma 2012 GAMMA, Trojans, Strategic Infection, WLCIU SG, ID, UG, AE, DE, ET, NG, DE, LB, QA, NG
Thomas Oblinger Elaman 2012 ELAMAN, Trojans, WLCIU DE, CH, AE, OM
Tomas Miskovsky Trovicor 2012 TROVICOR, Lawful Interception, Monitoring Centre, WLCIU CZ, AE, DE, BG, RS
WLCIU ES SPAIN 2013 SPAIN, WLCIU ES
WLCIU ET ETHIOPIA 2012 ETHIOPIA, WLCIU ET
WLCIU AZ AZERBAIJAN 2012 AZERBAIJAN, WLCIU AZ
WLCIU BH BAHRAIN 2013 BAHRAIN, WLCIU BH
WLCIU BR BRAZIL 2013 BRAZIL, WLCIU BR
WLCIU GQ EQUATORIAL GUINEA 2013 EQUATORIAL GUINEA, WLCIU GQ
WLCIU ID INDONESIA 2012 INDONESIA, WLCIU ID
WLCIU KZ KAZAKHSTAN 2013 KAZAKHSTAN, WLCIU KZ
WLCIU MX MEXICO 2013 MEXICO, WLCIU MX
WLCIU MY MALAYSIA 2011 MALAYSIA, WLCIU MY
WLCIU NG NIGERIA 2013 NIGERIA, WLCIU NG
WLCIU NL NETHERLANDS 2012 NETHERLANDS, WLCIU NL
WLCIU RS SERBIA 2012 SERBIA, WLCIU RS
WLCIU TM TURKMENISTAN 2013 TURKMENISTAN, WLCIU TM
WLCIU UG UGANDA 2013 UGANDA, WLCIU UG

FinSpy1

finspy : Inside the shadow world of commercialized spook spyware

Gamma Group FinFisher Governmental IT Intrusion and Surveillance Presentations

The following presentations from the Gamma Group describe the company’s FinFisher and GSM / 3G tactical interception and target location surveillance products.  The presentations were anonymously posted online from a discussions between Gamma and the German State Criminal Police Offices (Landeskriminalamt).  The presentations were first reported by Netzpolitik.org and were subsequently analyzed by F-Secure CRO Mikko Hypponen.

FinFisher Governmental IT Intrusion and Remote Monitoring Solutions 37 pages Download
(9.72 MB)
3G-GSM Tactical Interception & Target Location 51 pages Download
(19.8 MB)

Traditional Lawful Interception solutions face new challenges that can only be solved using active systems like FinSpy:
· Data not transmitted over any network
· Encrypted Communications
· Targets in foreign countries
FinSpy has been proven successful in operations around the world for many years, and valuable intelligence has been gathered about Target Individuals and Organizations.
When FinSpy is installed on a computer system it can be remotely controlled and accessed as soon as it is connected to the internet/network, no matter where in the
world the Target System is based.

Feature Overview
Target Computer – Example Features:
· Bypassing of 40 regularly tested Antivirus Systems
· Covert Communication with Headquarters
· Full Skype Monitoring (Calls, Chats, File Transfers,
Video, Contact List)
· Recording of common communication like Email, Chats and Voice-over-IP
· Live Surveillance through Webcam and Microphone
· Country Tracing of Target
· Silent extracting of Files from Hard-Disk
· Process-based Key-logger for faster analysis
· Live Remote Forensics on Target System
· Advanced Filters to record only important information
· Supports most common Operating Systems (Windows,
Mac OSX and Linux)

https://i2.wp.com/www.networkworld.com/community/files/user13712/Gamma_FinSpy_.gifHeadquarters – Example Features:
· Evidence Protection (Valid Evidence according to European Standards)
· User-Management according to Security Clearances
· Security Data Encryption and Communication using RSA2048 and AES256

· Hidden from Public through Anonymizing Proxy

· Can be fully integrated with Law Enforcement Monitoring Functionality (LEMF)
For a full feature list please refer to the Product Specifications.

 

 

Access Target Computer Systems around the World

2GAMMA-FinSpy

Spy Files released so far: 574

 

Resources:

Full text of “FinSpy promotional materials” – Internet Archive

finspy – Amazon S3

FINFISHER

Remote Monitoring 8: Infection Solutions – DocumentClo

Remote Monitoring & Infection Solutions: FINSPY – video

Infosecurity – FinFisher Spyware Presentation Details Leaked

FinFisher IT Intrusion Products

Meet the ‘Corporate Enemies of the Internet

FinSpy Software Used To Surveil Activists

Gamma Group FinFisher Governmental IT Intrusion

National Security AgencyNSA | lisaleaks

San Diego Poised To Be Cyber Security Leader | lisaleaks

Technology Vision 2014: Key IT Trends

39 – www.portierramaryaire.com • View topic – Aviones sin

Inside the shadow world of commercialised spook spyware

Black Code: Inside the Battle for Cyberspace – Google Book

Dragnet Nation: A Quest for Privacy, Security, and Freedom

Advertisements