[LINK] Most comms are an open-book
stephen at melbpc.org.au
stephen at melbpc.org.au
Thu Dec 22 21:25:38 AEDT 2011
<https://www.eff.org/deeplinks/2011/12/next-step-identifying-customers-
surveillance-technology-companies-and-turning-heat>
"In the past month, thanks to reporting from the Wall Street Journal
<http://projects.wsj.com/surveillance-catalog/#/> and Bloomberg, as well
as WikiLeaks and its media partners, a little sunlight has finally
exposed a large but shadowy industry: Western technology companies
selling mass spying software to governments.
The amazing and dangerous capabilities of these tools are described in
hundreds of marketing documents that were recently leaked to the media
organizations. The Wall Street Journal laid out many of the tools in
detail, explaining how they can be used to spy on millions of citizens"
</quote)
According to <http://wikileaks.org/The-Spyfiles-The-Map.html> these
two companies are active in this region: Security Software International,
and Endace Accelerated .. here's what they are doing ..
http://www.ssipacific.com/?page_id=160
"Lawful Interception Management System is a certified and industry proven
solution for telecommunications service providers to assist law
enforcement agencies in executing electronic surveillance court orders.
The system is based on a central management platform for monitoring all
kinds of telecommunication services. It integrates seamlessly with more
than 200 different network nodes (switches, routers, gateways,
application servers) by all leading infrastructure vendors.
LIMS enables realtime monitoring of telephony, fax, SMS, MMS, e-mail,
VoIP, Push-to-Talk and other IP-based communication services.
The modular architecture of LIMS facilitates cost-efficient LI solutions
for small operators and is scalable for surveillance networks with
several thousand concurrent intercepts."
And: <http://wikileaks.org/spyfiles/files/0/10_200702-ISS-DXB-ENDACE3.pdf>
How do you collect the data?
* Endace network monitoring probes are connected to the network by
passive taps. They are invisible to the network, and have no MAC or IP
address.
* Lossless high-precision recording to disk is guaranteed by Endace's
DAG technology. All packet time-stamps are accurate to <100 nanoseconds.
* Deployed at the "edge" between the core network and access networks,
individual lines can be targeted, and all traffic in/out is silently
mirrored and recorded to disk. This includes all network signalling
information, all "session" setups/teardowns and the full content of all
communications.
* Supported network types: Ethernet, ATM, PoS, PDH/TDM. The monitoring
infrastructure can tap at any point in the carrier network.
* All communications are completely captured and accurately recorded,
so there can be no doubt of the activities/communications of the
target.
* We have the data stored in a reusable format, so it can be analysed
and reassembled using many different tools.
* It is now only a question of the legal environment in which we operate.
--
Cheers
Stephen
More information about the Link
mailing list