Remove traces of your submission If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.
If you face legal action If a legal action is brought against you as a result of your submission, there are organisations that may help you. Submit documents to WikiLeaks. Shop Donate Submit. Leaks News About Partners. Spyfiles Releases. Aappro Security and defence: Company Brochure. Batvox export voice biometric tool. Speaker Identification Field Toolkit. Urban Management Solutions.
A30 Excellence in Telephone Interception Systems. Security and Surveillance - Video Analytics. Cell phone detection systems. Cellphone detector Wolfhound. WatchHound cellphone monitor. Wolfhound Cell phone detection systems. Wolfhound Lite Cellphone Detector.
Small Cellular Basestations for security applications. Wireless Homeland Security. Infrastructure protection services. Advanced Cyber Infrastructure Protection. Audioscope - Audio Capturing and Recording System. Beowulf II Solid state stand alone recorder. Safe Cities Surveillance Infrastructure.
Tactical Communications and Surveillance. Cyveillance Corporate Security. Corporate Overview Advanced Surveillance. Mirador Specialist Cameras. Showcases Law Enforcement Citywide Surveillance. Israel at Milipol Paris Cogito Categorizer Cogito Discover. Cogito Monitor Voice of the Customer. Cogito: Solutions for Semantic Publishing.
Meeting the Challenges of Data Retention: Now and in the future. You can only access this submissions system through Tor. See our Tor tab for more information. We also advise you to read our tips for sources before submitting.
If you cannot use Tor, or your submission is very large, or you have specific requirements, WikiLeaks provides several alternative methods. Contact us to discuss how to proceed. Mass interception of entire populations is not only a reality, it is a secret new industry spanning 25 countries. Today WikiLeaks began releasing a database of hundreds of documents from as many as intelligence contractors in the mass surveillance industry. Wikileaks is shining a light on this secret industry that has boomed since September 11, and is worth billions of dollars per year.
WikiLeaks has released documents today, but the Spy Files project is ongoing and further information will be released this week and into next year. International surveillance companies are based in the more technologically sophisticated countries, and they sell their technology on to every country of the world.
This industry is, in practice, unregulated. Intelligence agencies, military forces and police authorities are able to silently, and on mass, and secretly intercept calls and take over computers without the help or knowledge of the telecommunication providers. Western companies are also selling a vast range of mass surveillance equipment to Western intelligence agencies. In traditional spy stories, intelligence agencies like MI5 bug the phone of one or two people of interest. In the last ten years systems for indiscriminate, mass surveillance have become the norm.
Intelligence companies such as VASTech secretly sell equipment to permanently record the phone calls of entire nations. Others record the location of every mobile phone in a city, down to 50 meters. Systems to infect every Facebook user, or smart-phone owner of an entire population group are on the intelligence market.
Surveillance companies like SS8 in the U. Other companies like Phoenexia in the Czech Republic collaborate with the military to create speech analysis tools.
Blue Coat in the U. Trovicor, previously a subsidiary of Nokia Siemens Networks, supplied the Bahraini government with interception technologies that tracked human rights activist Abdul Ghani Al Khanjar.
He was shown details of personal mobile phone conversations from before he was interrogated and beaten in the winter of If you cannot use Tor, or your submission is very large, or you have specific requirements, WikiLeaks provides several alternative methods.
Contact us to discuss how to proceed. Today, 15 September , WikiLeaks releases previously unseen copies of weaponised German surveillance malware used by intelligence agencies around the world to spy on journalists, political dissidents and others.
FinFisher formerly part of the UK based Gamma Group International until late is a German company that produces and sells computer intrusion systems, software exploits and remote monitoring systems that are capable of intercepting communications and data from OS X, Windows and Linux computers as well as Android, iOS, BlackBerry, Symbian and Windows Mobile devices. FinFisher first came to public attention in December when WikiLeaks published documents detailing their products and business in the first SpyFiles release.
Since the first SpyFiles release, researchers published reports that identified the presence of FinFisher products in countries around the world and documented its use against journalists, activists and political dissidents. Julian Assange, WikiLeaks Editor in Chief said: "FinFisher continues to operate brazenly from Germany selling weaponised surveillance malware to some of the most abusive regimes in the world.
The Merkel government pretends to be concerned about privacy, but its actions speak otherwise. Why does the Merkel government continue to protect FinFisher? This full data release will help the technical community build tools to protect people from FinFisher including by tracking down its command and control centers.
FinFisher Relay and FinSpy Proxy are the components of the FinFisher suite responsible for collecting the data acquired from the infected victims and delivering it to their controllers. It is commonly deployed by FinFisher's customers in strategic points around the world to route the collected data through an anonymizing chain, in order to disguise the identity of its operators and the real location of the final storage, which is instead operated by the FinSpy Master.
This software is designed to be covertly installed on a Windows computer and silently intercept files and communications, such as Skype calls, emails, video and audio through the webcam and microphone you can find more details on FinSpy in the first SpyFiles release.
In order to prevent any accidental execution and infection, the following files have been renamed and compressed in password protected archives the password is "infected". They are weaponised malware, so handle carefully. In order to challenge the secrecy and the lack of accountability of the surveillance industry, analyzing the internals of this software could allow security and privacy researchers to develop new fingerprints and detection techniques, identify more countries currently using the FinFisher spyware and uncover human rights abuses.
In addition, in this fourth iteration of the SpyFiles collection, WikiLeaks publishes the newly indexed material the same as the recent FinFisher breach for which you can find the torrent file here , including new brochures and a database of the customer support website, that provide updated details on their productline and a unique insight into the company's customer-base.
In order to make the data more easily accessible and consumable, all the new brochures, videos and manuals are now available organized under the related FinFisher product name.
The database is represented in full, from which WikiLeaks compiled a list of customers, their eventual attribution, all the associated support tickets and acquired licenses, along with the estimated costs calculated from FinFisher's price list. Within the full list of customers , it's worth noticing that among the largest is Mongolia, which has been recently selected as new Chair of the Freedom Online Coalition.
Together with the previous releases, the SpyFiles collection represents a unique and central resource where to find extensive and exclusive documentation about the global surveillance industry, also indexed and searchable through the WikiLeaks Search. These documents reveal how, as the intelligence world has privatised, US, EU and developing world intelligence agencies have rushed into spending millions on next-generation mass surveillance technology to target communities, groups and whole populations.
WikiLeaks' publisher Julian Assange stated: "WikiLeaks' Spy Files 3 is part of our ongoing commitment to shining a light on the secretive mass surveillance industry. This publication doubles the WikiLeaks Spy Files database. The WikiLeaks Spy Files form a valuable resource for journalists and citizens alike, detailing and explaining how secretive state intelligence agencies are merging with the corporate world in their bid to harvest all human electronic communication.
WikiLeaks' Counter Intelligence Unit has been tracking the trackers. The WLCIU has collected data on the movements of key players in the surveillance contractor industry, including senior employees of Gamma, Hacking Team and others as they travel through Azerbaijan, Bahrain, Brazil, Spain, Mexico and other countries.
0コメント