When Time scribbles the history of 2011’s Arab Spring it will be a shocker: how fanatics traded stability for bloody chaos, unleashed the demons of Islamic fascism (arguably to the point of making those they “liberated” sentimental for dictatorial rule) -- and gave respected lawful intercept companies such as Utimaco an undeserved black eye or doing the honest job of protecting … [Read more...]
The Little Black Book of Electronic Surveillance: 2015
In early February Insider will release The Little Black Book of Electronic Surveillance: 2015, the new and revised 2nd edition of the book that shook the marketplace. LBBES is the industry's most comprehensive guide to the biggest and most influential players in the industry, and has been expanded to include 200 companies. The book is available to members only. Who you'll … [Read more...]
India’s Aglaya: Cracking Apple iOS Without a Jailbreak?
Good news (or bad if you own one) for those who think Apple systems are impervious to malware -- India’s Aglaya says it can crack any iOS device without a jailbreak. That’s an eyeopener for law enforcement and intel agencies following last year’s revelation that FinFisher and Hacking Team are just airware when it comes to penetrating and taking over an iPhone or iPad. If the … [Read more...]
Whatever Happened to Bull Amesys? Ask PLATH, Sarkozy — and Dubai
Months before Edward Snowden made his debut on the world scene, Bull Amesys -- a one-time giant of France's IT industry -- found itself embroiled in a public imbroglio over the sale of surveillance technologies to Libya's Muammar Qaddafi, a controversy that linked all the way up to the office of then President Nicolas Sarkozy. In the time since, the companies involved have … [Read more...]
Cisco, Huawei and Semptian: A Look Behind the Great Firewall of China
As the surveillance and censorship network monitoring 1.2 billion people, the Great Firewall of China is at once the most complex and little understood in-country electronic surveillance system on the planet -- even though much of its core technology is American made, and Chinese developers themselves often get an assist from U.S. tech leaders. The principle application used … [Read more...]