Confidential security industry documents released by Wikileaks this week reveal details of the kinds of surveillance systems that will be used in New Zealand under the controversial GCSB Act. The documents include operating manuals, promotional materials and invoices from companies specialising in Internet and telecommunications spying equipment. This includes equipment for “mass monitoring”, “tactical Internet monitoring”, “deep packet inspection” and “data warehousing”. British, German and Swiss companies promised to “fulfill the customer’s needs” for “massive data interception and retention”. Special off-the-shelf systems also provide governments with speech identification, facial recognition and number plate recognition technology. The documents are now publicly accessible on the Wikileaks website. The US government tried to close down Wikileaks after it massive leak of US embassy cables and military reports in 2010. However the whistle-blowing website continues to operate and this is the fourth major leak since then. The latest leaks reinforce the Edward Snowden revelations about US mass surveillance systems. Wikileaks has been supporting and cooperating with Snowden. The Sunday Star-Times is one of a small number of media organisations around the world that was given advance access to the documents by Wikileaks. Julian Assange said in a press release that the leak is part of Wikileaks “ongoing commitment to shining a light on the secretive mass surveillance industry.” He said the sensitive sales brochures and presentations were being “used to woo state intelligence agencies into buying mass surveillance services and technologies”. The focus of the documents is Internet spying technologies, but the documents also detail bulk interception methods for voice, SMS, MMS, email, fax and satellite phone communications, “the ability to analyse web and mobile interceptions in real-time”. One of the specialty services revealed in the documents is called “intrusion solutions”. These are computer systems that allow a government to hack into private computers. For instance, aA company called Dreamlab Technologies produces a system called “FinFly iProxy”, which is like a computer virus or “trojan” used to enter people’s computers when they are downloading information off the Internet. One system, which was designed to cover two Internet exchanges in the Gulf state of Oman, was “used to infect binaries [non-text files] downloaded from the Internet by the configured target”. The system also had an “update infection mode”, entering people’s computers when their computers searched for updates to iTunes and other software. Once the computer is hacked, it will automatically send back the users’ information to the government agencies. FinFish was found by human rights activists during a search of an Egyptian intelligence agency after the 2011 overthrow of Mubarak. It was also discovered in Bahrain where it was apparently being used to target political opponents. The Internet monitoring equipment falls into three main types. First, there are “probes” that tap into and and automatically search the major trunk lines of the Internet, many of which pass over US and British territory. Second is what the documents call “LI” operations (Lawful Interception), which are systems like Prism for tapping into private Internet companies. Third is the state-organised computer hacking. New Zealand’s electronic spy agency, GCSB, has legal powers to conduct all three of these types of operations.
Latest Wikileaks revelations (Sunday Star-Times)
Confidential security industry documents released by Wikileaks this week reveal details of the kinds of surveillance systems that will be used in New Zealand under the controversial GCSB Act.