text
stringlengths
4
429
Hacking Team products against the types of targets we profile
in this paper. In the case of Turkey, there are hints that the tool
may be employed against dissidents [80]. References
[1]
Dark Secrets
Hacking Team commercial,
ac-
cessed: 12-November-2013. [Online]. Available:
6 Summary
http://bit.ly/1bCh57v
Targeted surveillance of individuals conducted by nation-states [2] J. Scott-Railton,
Revolutionary Risks: Cyber Technol-
poses an exceptionally challenging security problem, given the ogy and Threats in the 2011 Libyan Revolution,
great imbalance of resources and expertise between the victims Naval War College, Tech. Rep., 2013.
and the attackers. We have sketched the nature of this problem [3] S. H. AlJalahma,
Response to The Guardian
space as reported to us by targeted individuals in three Middle companys software used against Bahrain activist,
May
Eastern countries. The attacks include spyware for ongoing 2013, accessed: 12-November-2013. [Online]. Available:
monitoring and the use of
IP spy
links to deanonymize those http://bit.ly/19iVUUP
who voice dissent. [4] V. Silver,
Gamma Says No Spyware Sold to
The attacks, while sometimes incorporating effective so- Bahrain; May Be Stolen Copy,
Jul. 2012, ac-
cial engineering, in general lack novel technical elements. In- cessed: 12-November-2013. [Online]. Available:
stead, they employ prepackaged tools developed by vendors http://bloom.bg/17SOXQs
or acquired from the cybercrime underground. This technol-
[5] A. Jeffries,
Meet Hacking Team, the company that helps
ogy sometimes suffers from what strike us as amateurish mis-
the police hack you,
Sep. 2013, accessed: 12-November-
takes (multiple serious errors implementing cryptography, bro-
2013. [Online]. Available: http://bit.ly/1bCajyl
ken protocol messages), as does the attackers
employment of
it (identifying-information embedded in binaries, C&C servers [6] T. Brewster,
From Bahrain To Belarus: Attack Of The
discoverable via scanning or
Google hacking
, clusters of at- Fake Activists,
Jul. 2013, accessed: 12-November-2013.
tack accounts tied by common activity). Some of these errors [Online]. Available: http://bit.ly/1gIgwhW
assisted our efforts to assemble strong circumstantial evidence [7] V. Silver,
MJM as Personified Evil Says Spyware Saves
of governmental origins. In addition, we mapped out the global Lives Not Kills Them,
2011, accessed: 12-November-
use of two
governmental
hacking suites, including identify- 2013. [Online]. Available: http://bloom.bg/170E8sQ
12
23rd USENIX Security Symposium
USENIX Association
[8] D. Gilbert,
Hacking Team and the Murky World of [27]
FinFisher - Excellence in IT Investigation,
ac-
State-Sponsored Spying,
2013, accessed: 12-November- cessed: 27-February-2014. [Online]. Available:
2013. [Online]. Available: http://bit.ly/17tBBtm http://www.finfisher.com/
[9] R. Clayton, S. J. Murdoch, and R. N. Watson,
Ignoring [28] R. Rolles,
Unpacking virtualization obfuscators,
the Great Firewall of China,
in PETS. Springer, 2006, USENIX WOOT, 2009.
pp. 20
35. [29]
TEMU: The BitBlaze Dynamic Analysis Compo-
[10] J. R. Crandall et al.,
ConceptDoppler: A Weather nent,
accessed: 7-August-2013. [Online]. Available:
Tracker for Internet Censorship,
in ACM CCS, 2007. http://bit.ly/1clcxSZ
[11] X. Xu, Z. M. Mao, and J. A. Halderman,
Internet Cen- [30]
Reinstate sacked official
call,
2013, ac-
sorship in China: Where Does the Filtering Occur?
in cessed: 11-November-2013. [Online]. Available:
Proc. PAM, 2011. http://bit.ly/1aRUZ4b
[12] M. Sherr, G. Shah, E. Cronin, S. Clark, and M. Blaze, [31]
Unionist Questioned,
2013, accessed: 23-April-2013.
Can They Hear Me Now? A Security Analysis of Law [Online]. Available: http://bit.ly/1gHnBiS
Enforcement Wiretaps,
in ACM CCS, 2009, pp. 512
[32] N. Villeneuve,
Fake Skype Encryption Service Cloaks
523. DarkComet Trojan,
Apr. 2012, accessed: 4-August-
[13] J. R. Crandall, M. Crete-Nishihata, and J. Knockel,
Chat 2013. [Online]. Available: http://bit.ly/17SpA1c
program censorship and surveillance in China: Tracking [33] E. Galperin and M. Marquis-Boire,
Fake YouTube
TOM-Skype and Sina UC,
First Monday, vol. 18, no. 7, Site Targets Syrian Activists With Malware,