{"id":57005,"date":"2015-04-27T12:00:26","date_gmt":"2015-04-27T11:00:26","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=57005"},"modified":"2015-05-05T21:25:49","modified_gmt":"2015-05-05T20:25:49","slug":"the-lesson-of-hacking-teams-malware-mass-surveillance-is-driven-by-the-private-sector","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2015\/04\/the-lesson-of-hacking-teams-malware-mass-surveillance-is-driven-by-the-private-sector\/","title":{"rendered":"Mass Surveillance is Driven by the Private Sector"},"content":{"rendered":"<p style=\"text-align: left;\"><em>The Lesson of Hacking Team\u2019s Malware <\/em><\/p>\n<p style=\"text-align: left;\"><em>23 Apr 2015 &#8211; <\/em>Yet another report has surfaced describing how tools created by the malware-industrial complex are being deployed by U.S. security services. While the coverage surrounding this story focuses primarily on federal agencies it\u2019s important to step back for a moment and view the big picture. In particular, looking at who builds, operates, and profits from mass surveillance technology offers insight into the nature of the global panopticon.<\/p>\n<p style=\"text-align: left;\">A <a target=\"_blank\" href=\"https:\/\/s3.amazonaws.com\/s3.documentcloud.org\/documents\/1875699\/briefing-for-the-italian-government-on-hacking.pdf\" >report<\/a> published by <em>Privacy International<\/em> as well as an <a target=\"_blank\" href=\"http:\/\/motherboard.vice.com\/read\/the-dea-has-been-secretly-buying-hacking-tools-from-an-italian-company\" >article<\/a> posted by <em>Vice Motherboard<\/em> clearly show that both the DEA and the United States Army have long-standing relationships with Hacking Team, an Italian company that\u2019s notorious for selling malware to any number of <a target=\"_blank\" href=\"https:\/\/citizenlab.org\/wp-content\/uploads\/2014\/11\/Mapping-Hacking-Team%E2%80%99s-_Untraceable_-Spyware33.pdf\" >unsavory characters<\/a>.<\/p>\n<p style=\"text-align: left;\">Federal records indicate that the DEA and Army purchased Hacking Team\u2019s <em>Remote Control System<\/em> (RCS) package. RCS is a rootkit, a software backdoor with lots of bells and whistles. It\u2019s a product that facilitates a covert foothold on infected machines so intruders can quietly make off with sensitive data. The aforementioned sensitive data includes encryption keys. In fact, Hacking Team has an RCS <a target=\"_blank\" href=\"http:\/\/www.hackingteam.it\/images\/stories\/galileo.pdf\" >brochure<\/a> that tells potential customers:<\/p>\n<p style=\"text-align: left;\"><em>\u201cWhat you need is a way to bypass encryption, collect relevant data out of any device, and keep monitoring your targets wherever they are, even outside your monitoring domain\u201d<\/em><\/p>\n<p style=\"text-align: left;\">[<strong>Note<\/strong>: Readers interested in nitty-gritty details about RCS can check out the <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/2014\/10\/30\/hacking-team\/\" >Manuals<\/a> online.]<\/p>\n<p style=\"text-align: left;\">It\u2019s public knowledge that other federal agencies like <a target=\"_blank\" href=\"http:\/\/www.belowgotham.com\/fbi-breaks-crypto.pdf\" >the FBI<\/a> and <a target=\"_blank\" href=\"https:\/\/firstlook.org\/theintercept\/2015\/03\/10\/ispy-cia-campaign-steal-apples-secrets\/\" >the CIA<\/a> have become adept at foiling encryption. Yet this kind of subversion doesn\u2019t necessarily bother high tech luminaries like Bruce Schneier, who believe that spying is \u201c<a target=\"_blank\" href=\"https:\/\/www.schneier.com\/blog\/archives\/2015\/03\/new_zealands_xk.html\" >perfectly reasonable<\/a>\u201d as long as it\u2019s <a target=\"_blank\" href=\"https:\/\/www.schneier.com\/blog\/archives\/2015\/02\/the_equation_gr.html\" >targeted<\/a>. Ditto that for <a target=\"_blank\" href=\"http:\/\/www.belowgotham.com\/CIA-Global-Subversion.pdf\" >Ed Snowden<\/a>. Schneier and Snowden maintain that covert ops, shrouded by layers of official secrecy, are somehow compatible with democracy just so long as they\u2019re narrow in scope.<\/p>\n<p style=\"text-align: left;\">But here\u2019s the catch: RCS is designed and marketed as a means for mass collection. It violates the targeted surveillance condition. Specifically, a Hacking Team RCS <a target=\"_blank\" href=\"https:\/\/www.documentcloud.org\/documents\/409278-147-hackingteam-rcs.html#document\/p3\/a68017\" >brochure<\/a> proudly states:<\/p>\n<p style=\"text-align: left;\"><em>\u201c\u2019Remote Control System\u2019 can monitor from a few and up to hundreds of thousands of targets. The whole system can be managed by a single easy to use interface that simplifies day by day investigation activities.\u201d<\/em><\/p>\n<p style=\"text-align: left;\">Does this sound like a product built for targeted collection?<\/p>\n<p style=\"text-align: left;\">So there you have it. Subverting encryption en masse compliments of Hacking Team. The fact that there\u2019s an <a target=\"_blank\" href=\"http:\/\/www.issworldtraining.com\/ISS_WASH\/sponsors2.html\" >entire industry<\/a> of companies just like this should give one pause as there are unsettling ramifications regarding the specter of totalitarian control.<\/p>\n<p style=\"text-align: left;\"><strong>Corporate America is Mass Surveillance <\/strong><\/p>\n<p style=\"text-align: left;\">Throughout the Snowden affair there\u2019s a theme that recurs. It appeared recently in a <a target=\"_blank\" href=\"http:\/\/cryptome.org\/2015\/04\/greenwald-shadow-gov.htm\" >foreword<\/a> written by Glenn Greenwald for Tom Engelhardt\u2019s book <a target=\"_blank\" href=\"http:\/\/www.amazon.com\/exec\/obidos\/ASIN\/1608463656\/counterpunchmaga\" ><em>Shadow Government<\/em><\/a>:<\/p>\n<p style=\"text-align: left;\"><em>\u201cI really don\u2019t think there\u2019s any more important battle today than combating the surveillance <strong>state<\/strong> [my emphasis]. Ultimately, the thing that matters most is that the rights that we know we have as human beings are rights that we exercise.\u201d<\/em><\/p>\n<p style=\"text-align: left;\">There\u2019s a tendency to frame mass surveillance in terms of the state. As purely a result of government agencies like the CIA and NSA. The narrative preferred by the far right is one which focuses entirely on the government (the so-called \u201csurveillance state\u201d) as the sole culprit, completely ignoring the corporate factions that fundamentally shape political decision making.<\/p>\n<p style=\"text-align: left;\">American philosopher John Dewey once observed that \u201cpower today resides in control of the means of production, exchange, publicity, transportation and communication. Whoever owns them rules the life of the country,\u201d even under the pretense of democratic structures<a target=\"_blank\" href=\"http:\/\/www.counterpunch.org\/2015\/04\/23\/mass-surveillance-is-driven-by-the-private-sector\/#_edn1\" name=\"_ednref1\"><\/a><a >[1]<\/a>.<\/p>\n<p style=\"text-align: left;\">There are some <a target=\"_blank\" href=\"http:\/\/www.forbes.com\/sites\/abrambrown\/2014\/03\/03\/forbes-billionaires-full-list-of-the-richest-americans\/\" >1300 billionaires<\/a> in the United States who can testify to this <a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/blogs\/monkey-cage\/wp\/2014\/04\/08\/rich-people-rule\/\" >fact<\/a>. As can anyone following the developments around the secretive <a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2015\/04\/17\/business\/obama-trade-legislation-fast-track-authority-trans-pacific-partnership.html\" >Trans-Pacific Partnership<\/a>.<\/p>\n<p style=\"text-align: left;\">Dewey\u2019s observation provides a conceptual basis for understanding how business interests drive the global surveillance apparatus. Mass surveillance is a corporate endeavor because the people who inevitably drive decisions are the same ones who control the resources. For example, the backbone of the internet itself consists of infrastructure run by Tier 1 providers like Verizon and Level 3 Communications. These companies are in a perfect position to <a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2015\/01\/26\/technology\/verizons-mobile-supercookies-seen-as-threat-to-privacy.html\" >track users<\/a> and that\u2019s exactly what <a target=\"_blank\" href=\"http:\/\/bits.blogs.nytimes.com\/2015\/02\/17\/ibm-g-e-and-others-create-big-data-alliance\/\" >they do<\/a>.<\/p>\n<p style=\"text-align: left;\">Furthermore when spying is conducted it\u2019s usually executed, in one form or another, by business interests. Approximately <a target=\"_blank\" href=\"http:\/\/www.salon.com\/2013\/06\/10\/digital_blackwater_meet_the_contractors_who_analyze_your_personal_data\/\" >70 percent<\/a> of the national intelligence budget end up being channeled to defense contractors. Never mind that the private sector\u2019s surveillance machinery dwarfs the NSA\u2019s as spying on users is an integral part of high tech\u2019s business model. Internet companies like Google operate their services by selling user information to the data brokers. The data broker industry, for example, generates <a target=\"_blank\" href=\"http:\/\/www.commerce.senate.gov\/public\/index.cfm?p=Hearings&amp;ContentRecord_id=a5c3a62c-68a6-4735-9d18-916bdbbadf01&amp;Statement_id=a47c081a-d653-4272-8d12-d6edc1e04dc6&amp;ContentType_id=14f995b9-dfa5-407a-9d35-56cc7152a7ed&amp;Group_id=b06c39af-e033-4cba-9221-de668ca1978a&amp;MonthDisplay=12&amp;YearDisplay=2013\" >almost $200 billion<\/a> a year in revenue. That\u2019s well over twice the entire 2014 U.S. <a target=\"_blank\" href=\"http:\/\/fas.org\/irp\/budget\/\" >intelligence budget<\/a>.<\/p>\n<p style=\"text-align: left;\">From a historical vantage point it\u2019s imperative to realize that high tech companies are essentially the offspring of the defense industry. This holds true even today as companies like Google are <a target=\"_blank\" href=\"https:\/\/medium.com\/@NafeezAhmed\/how-the-cia-made-google-e836451a959e\" >heavily<\/a> <a target=\"_blank\" href=\"https:\/\/wikileaks.org\/google-is-not-what-it-seems\/\" >linked<\/a> with the Pentagon. For decades (going back to the days of <a target=\"_blank\" href=\"http:\/\/cryptome.org\/jya\/nsa-sun.htm\" >Crypto AG<\/a>) the private sector has collaborated heavily with the NSA\u2019s in its campaign of mass subversion: the drive to <a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/world\/2013\/sep\/05\/nsa-gchq-encryption-codes-security\" >insert hidden back doors<\/a> and <a target=\"_blank\" href=\"http:\/\/www.reuters.com\/article\/2014\/03\/31\/us-usa-security-nsa-rsa-idUSBREA2U0TY20140331\" >weaken encryption<\/a> protocols across the board. Companies have instituted \u201cdesign changes\u201d that <a target=\"_blank\" href=\"http:\/\/www.theguardian.com\/world\/interactive\/2013\/sep\/05\/sigint-nsa-collaborates-technology-companies\" >make<\/a> computers and network devices \u201cexploitable.\u201d It\u2019s also been revealed that companies like Microsoft have <a target=\"_blank\" href=\"http:\/\/www.bloomberg.com\/news\/print\/2013-06-14\/u-s-agencies-said-to-swap-data-with-thousands-of-firms.html\" >secret agreements<\/a> with U.S. security services to provide information on unpublished vulnerabilities in exchange for special benefits like access to classified intelligence.<\/p>\n<p style=\"text-align: left;\">In a nutshell: contrary to talking points that depict hi-tech companies as our saviors, they\u2019re more often accomplices if not outright perpetrators of mass surveillance. And you can bet that CEOs will devote significant resources towards public relations campaigns aimed at obscuring this truth.<\/p>\n<p style=\"text-align: left;\"><strong>Denouement<\/strong><\/p>\n<p style=\"text-align: left;\">A parting observation: the current emphasis on Constitutional freedom neglects the other pillar of the Constitution: <em>equality<\/em>. Concentrating intently on liberty while eschewing the complementary notion of equality leads to the sort of ugly practices that preceded the Civil War. In fact there are those who would argue that society is currently progressing towards <a target=\"_blank\" href=\"http:\/\/www.ianwelsh.net\/serfdom-is-better-than-what-the-west-is-heading-for\/\" >something worse<\/a>, a <a target=\"_blank\" href=\"http:\/\/cryptome.org\/0005\/rich-pander.pdf\" >reality<\/a> by the way that the financial elite are well aware of. When the public\u2019s collective misery reaches a tipping point, and people begin to mobilize, the digital panopticon of the ruling class will be leveraged to preserve social control. They\u2019ll do what they\u2019ve always done, tirelessly work to maintain power and impose hierarchy.<\/p>\n<p style=\"text-align: left;\"><strong>NOTE:<\/strong><\/p>\n<p style=\"text-align: left;\"><a target=\"_blank\" href=\"http:\/\/www.counterpunch.org\/2015\/04\/23\/mass-surveillance-is-driven-by-the-private-sector\/#_ednref1\" name=\"_edn1\"><\/a><a >[1]<\/a> <em>The Later Works of John Dewey, 1925-1953, Volume 9: 1933-1934, Essays, Reviews, Miscellany, and A Common Faith<\/em>, Southern Illinois University Press, 2008, page 76.<\/p>\n<p style=\"text-align: left;\">_______________________<\/p>\n<p style=\"text-align: left;\"><em>Bill Blunden <\/em><em>is a journalist whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including <\/em><a target=\"_blank\" href=\"http:\/\/www.amazon.com\/exec\/obidos\/ASIN\/144962636X\/counterpunchmaga\" >The Rootkit Arsenal<\/a><em> and <\/em><a target=\"_blank\" href=\"http:\/\/www.amazon.com\/exec\/obidos\/ASIN\/1937584801\/counterpunchmaga\" >Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex<\/a><em>. Bill is the lead investigator at Below Gotham Labs.<\/em><\/p>\n<p style=\"text-align: left;\"><a target=\"_blank\" href=\"http:\/\/www.counterpunch.org\/2015\/04\/23\/mass-surveillance-is-driven-by-the-private-sector\/\" >Go to Original \u2013 counterpunch.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Lesson of Hacking Team\u2019s Malware &#8211; In a nutshell: contrary to talking points that depict hi-tech companies as our saviors, they\u2019re accomplices if not perpetrators of mass surveillance. And you can bet that CEOs will devote resources towards public relations aimed at obscuring this truth.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-57005","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/57005","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=57005"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/57005\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=57005"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=57005"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=57005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}