text
stringlengths 4
429
|
---|
Hacking Team products against the types of targets we profile |
in this paper. In the case of Turkey, there are hints that the tool |
may be employed against dissidents [80]. References |
[1] |
Dark Secrets |
Hacking Team commercial, |
ac- |
cessed: 12-November-2013. [Online]. Available: |
6 Summary |
http://bit.ly/1bCh57v |
Targeted surveillance of individuals conducted by nation-states [2] J. Scott-Railton, |
Revolutionary Risks: Cyber Technol- |
poses an exceptionally challenging security problem, given the ogy and Threats in the 2011 Libyan Revolution, |
great imbalance of resources and expertise between the victims Naval War College, Tech. Rep., 2013. |
and the attackers. We have sketched the nature of this problem [3] S. H. AlJalahma, |
Response to The Guardian |
space as reported to us by targeted individuals in three Middle companys software used against Bahrain activist, |
May |
Eastern countries. The attacks include spyware for ongoing 2013, accessed: 12-November-2013. [Online]. Available: |
monitoring and the use of |
IP spy |
links to deanonymize those http://bit.ly/19iVUUP |
who voice dissent. [4] V. Silver, |
Gamma Says No Spyware Sold to |
The attacks, while sometimes incorporating effective so- Bahrain; May Be Stolen Copy, |
Jul. 2012, ac- |
cial engineering, in general lack novel technical elements. In- cessed: 12-November-2013. [Online]. Available: |
stead, they employ prepackaged tools developed by vendors http://bloom.bg/17SOXQs |
or acquired from the cybercrime underground. This technol- |
[5] A. Jeffries, |
Meet Hacking Team, the company that helps |
ogy sometimes suffers from what strike us as amateurish mis- |
the police hack you, |
Sep. 2013, accessed: 12-November- |
takes (multiple serious errors implementing cryptography, bro- |
2013. [Online]. Available: http://bit.ly/1bCajyl |
ken protocol messages), as does the attackers |
employment of |
it (identifying-information embedded in binaries, C&C servers [6] T. Brewster, |
From Bahrain To Belarus: Attack Of The |
discoverable via scanning or |
Google hacking |
, clusters of at- Fake Activists, |
Jul. 2013, accessed: 12-November-2013. |
tack accounts tied by common activity). Some of these errors [Online]. Available: http://bit.ly/1gIgwhW |
assisted our efforts to assemble strong circumstantial evidence [7] V. Silver, |
MJM as Personified Evil Says Spyware Saves |
of governmental origins. In addition, we mapped out the global Lives Not Kills Them, |
2011, accessed: 12-November- |
use of two |
governmental |
hacking suites, including identify- 2013. [Online]. Available: http://bloom.bg/170E8sQ |
12 |
23rd USENIX Security Symposium |
USENIX Association |
[8] D. Gilbert, |
Hacking Team and the Murky World of [27] |
FinFisher - Excellence in IT Investigation, |
ac- |
State-Sponsored Spying, |
2013, accessed: 12-November- cessed: 27-February-2014. [Online]. Available: |
2013. [Online]. Available: http://bit.ly/17tBBtm http://www.finfisher.com/ |
[9] R. Clayton, S. J. Murdoch, and R. N. Watson, |
Ignoring [28] R. Rolles, |
Unpacking virtualization obfuscators, |
the Great Firewall of China, |
in PETS. Springer, 2006, USENIX WOOT, 2009. |
pp. 20 |
35. [29] |
TEMU: The BitBlaze Dynamic Analysis Compo- |
[10] J. R. Crandall et al., |
ConceptDoppler: A Weather nent, |
accessed: 7-August-2013. [Online]. Available: |
Tracker for Internet Censorship, |
in ACM CCS, 2007. http://bit.ly/1clcxSZ |
[11] X. Xu, Z. M. Mao, and J. A. Halderman, |
Internet Cen- [30] |
Reinstate sacked official |
call, |
2013, ac- |
sorship in China: Where Does the Filtering Occur? |
in cessed: 11-November-2013. [Online]. Available: |
Proc. PAM, 2011. http://bit.ly/1aRUZ4b |
[12] M. Sherr, G. Shah, E. Cronin, S. Clark, and M. Blaze, [31] |
Unionist Questioned, |
2013, accessed: 23-April-2013. |
Can They Hear Me Now? A Security Analysis of Law [Online]. Available: http://bit.ly/1gHnBiS |
Enforcement Wiretaps, |
in ACM CCS, 2009, pp. 512 |
[32] N. Villeneuve, |
Fake Skype Encryption Service Cloaks |
523. DarkComet Trojan, |
Apr. 2012, accessed: 4-August- |
[13] J. R. Crandall, M. Crete-Nishihata, and J. Knockel, |
Chat 2013. [Online]. Available: http://bit.ly/17SpA1c |
program censorship and surveillance in China: Tracking [33] E. Galperin and M. Marquis-Boire, |
Fake YouTube |
TOM-Skype and Sina UC, |
First Monday, vol. 18, no. 7, Site Targets Syrian Activists With Malware, |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.