{"id":5048,"date":"2013-12-01T02:36:51","date_gmt":"2013-12-01T02:36:51","guid":{"rendered":"http:\/\/theoreti.ca\/?p=5048"},"modified":"2013-12-01T02:36:51","modified_gmt":"2013-12-01T02:36:51","slug":"wikileaks-the-spy-files","status":"publish","type":"post","link":"https:\/\/theoreti.ca\/?p=5048","title":{"rendered":"Wikileaks &#8211; The Spy files"},"content":{"rendered":"<p>On December 1st, 2011 Wikileaks began releasing <a href=\"http:\/\/wikileaks.org\/the-spyfiles.html\">The Spy files<\/a>, a collection of documents from the intelligence contractors. These documents include presentations, brochures, catalogs, manuals and so on. There are hundreds of companies selling tools to anyone (country\/telecom) who wants to spy on email, messaging and phones. I find fascinating what they should about the types of tools available to monitor communications, especially the interfaces they have designed for operatives. Here are some slides from a presentation by <a href=\"http:\/\/wikileaks.org\/spyfiles\/docs\/glimmerglass\/55_glimmerglass-cybersweep.html\">Glimmerglass Networks (click to download entire PDF)<\/a>.<\/p>\n<p><!--more--><\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/theoreti.ca\/wp-content\/uploads\/2013\/12\/Screen-Shot-2013-11-30-at-7.23.31-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-5051\" title=\"Screen Shot 2013-11-30 at 7.23.31 PM\" src=\"http:\/\/theoreti.ca\/wp-content\/uploads\/2013\/12\/Screen-Shot-2013-11-30-at-7.23.31-PM-300x200.png\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/theoreti.ca\/wp-content\/uploads\/2013\/12\/Screen-Shot-2013-11-30-at-7.23.31-PM-300x200.png 300w, https:\/\/theoreti.ca\/wp-content\/uploads\/2013\/12\/Screen-Shot-2013-11-30-at-7.23.31-PM-1024x683.png 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Here you can see the overview of what they provide &#8211; Tools that allow you to Select optical signals (from fibre?), Extract the content, and then Monitor &#8220;actionable intelligence.&#8221;<\/p>\n<p><a href=\"http:\/\/theoreti.ca\/wp-content\/uploads\/2013\/12\/Screen-Shot-2013-11-30-at-7.22.51-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-5052\" title=\"Screen Shot 2013-11-30 at 7.22.51 PM\" src=\"http:\/\/theoreti.ca\/wp-content\/uploads\/2013\/12\/Screen-Shot-2013-11-30-at-7.22.51-PM-300x209.png\" alt=\"\" width=\"300\" height=\"209\" srcset=\"https:\/\/theoreti.ca\/wp-content\/uploads\/2013\/12\/Screen-Shot-2013-11-30-at-7.22.51-PM-300x209.png 300w, https:\/\/theoreti.ca\/wp-content\/uploads\/2013\/12\/Screen-Shot-2013-11-30-at-7.22.51-PM-1024x713.png 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>This excerpt of a slide shows the different monitoring tools.<\/p>\n<p><a href=\"http:\/\/theoreti.ca\/wp-content\/uploads\/2013\/12\/Screen-Shot-2013-11-30-at-7.22.06-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-5054\" title=\"Screen Shot 2013-11-30 at 7.22.06 PM\" src=\"http:\/\/theoreti.ca\/wp-content\/uploads\/2013\/12\/Screen-Shot-2013-11-30-at-7.22.06-PM-300x207.png\" alt=\"\" width=\"300\" height=\"207\" srcset=\"https:\/\/theoreti.ca\/wp-content\/uploads\/2013\/12\/Screen-Shot-2013-11-30-at-7.22.06-PM-300x207.png 300w, https:\/\/theoreti.ca\/wp-content\/uploads\/2013\/12\/Screen-Shot-2013-11-30-at-7.22.06-PM-1024x709.png 1024w, https:\/\/theoreti.ca\/wp-content\/uploads\/2013\/12\/Screen-Shot-2013-11-30-at-7.22.06-PM.png 1502w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>This shows an annotated screenshot of the tool for monitoring Facebook.<\/p>\n<p><a href=\"http:\/\/theoreti.ca\/wp-content\/uploads\/2013\/12\/Screen-Shot-2013-11-30-at-7.22.23-PM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-5053\" title=\"Screen Shot 2013-11-30 at 7.22.23 PM\" src=\"http:\/\/theoreti.ca\/wp-content\/uploads\/2013\/12\/Screen-Shot-2013-11-30-at-7.22.23-PM-300x259.png\" alt=\"\" width=\"300\" height=\"259\" srcset=\"https:\/\/theoreti.ca\/wp-content\/uploads\/2013\/12\/Screen-Shot-2013-11-30-at-7.22.23-PM-300x259.png 300w, https:\/\/theoreti.ca\/wp-content\/uploads\/2013\/12\/Screen-Shot-2013-11-30-at-7.22.23-PM-1024x884.png 1024w, https:\/\/theoreti.ca\/wp-content\/uploads\/2013\/12\/Screen-Shot-2013-11-30-at-7.22.23-PM.png 1336w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>And this shows a &#8220;Facebook Chart&#8221; showing who is connected.<\/p>\n<p>For an article about this trove see <a href=\"http:\/\/www.corpwatch.org\/article.php?id=15665\">CorpWatch : State of Surveillance<\/a>. They quote Julian Assange as saying:<\/p>\n<blockquote><p>Previously we had all thought, why would the government be interested in me, my brother? My business is not interesting, I am not a criminal,\u201d Assange told the Bureau earlier this week. \u201cNow these companies sell to state intelligence agencies the ability to spy on the entire population at once and keep that information permanently. In five or six years\u2019 time, if your brother or someone becomes of interest to that company or the government, they can go back in time and look to see what you said or what you emailed.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>On December 1st, 2011 Wikileaks began releasing The Spy files, a collection of documents from the intelligence contractors. These documents include presentations, brochures, catalogs, manuals and so on. There are hundreds of companies selling tools to anyone (country\/telecom) who wants to spy on email, messaging and phones. I find fascinating what they should about the &hellip; <a href=\"https:\/\/theoreti.ca\/?p=5048\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Wikileaks &#8211; The Spy files<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[31,22,16,12],"tags":[],"class_list":["post-5048","post","type-post","status-publish","format-standard","hentry","category-social-networking","category-streaming-media","category-text-analysis","category-visualization"],"_links":{"self":[{"href":"https:\/\/theoreti.ca\/index.php?rest_route=\/wp\/v2\/posts\/5048","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/theoreti.ca\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/theoreti.ca\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/theoreti.ca\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/theoreti.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5048"}],"version-history":[{"count":3,"href":"https:\/\/theoreti.ca\/index.php?rest_route=\/wp\/v2\/posts\/5048\/revisions"}],"predecessor-version":[{"id":5056,"href":"https:\/\/theoreti.ca\/index.php?rest_route=\/wp\/v2\/posts\/5048\/revisions\/5056"}],"wp:attachment":[{"href":"https:\/\/theoreti.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5048"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/theoreti.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5048"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/theoreti.ca\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5048"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}