Canada is among 25 countries linked to a spyware network that is being used by repressive governments to stifle dissent, according to researchers at the University of Toronto.
A new study from the Citizen Lab at the Munk School of Global Affairs has identified Canada as one of the countries where servers are hosted for FinFisher, a trojan horse program that can evade software security measures and log keystrokes on a computer, turn on cameras and microphones, grab screen images and even listen in on Skype chats.
Also known as FinSpy, the software first came to researchers’ attention in the spring of 2011, when protesters in Egypt raided a government office and found a proposal from FinSpy’s makers to sell the program to the government of then-Egyptian President Hosni Mubarak.
The software’s makers, U.K.-based Gamma International, say the software is meant to be used “against pedophiles, terrorists, organized crime, kidnapping and human trafficking,” according to the New York Times.
But the Citizen Lab researchers say the software is "regularly obtained by countries where dissenting political activity and speech is criminalized."
“A FinSpy campaign in Ethiopia uses pictures of Ginbot 7, an Ethiopian opposition group, as bait to infect users. This continues the theme of FinSpy deployments with strong indications of politically-motivated targeting,” the Citizen Lab report states.
“There is strong evidence of a Vietnamese FinSpy Mobile Campaign. We found an Android FinSpy Mobile sample in the wild with a command & control server in Vietnam that also exfiltrates text messages to a local phone number.”
The researchers identified a server operated by Softcom Inc., a web hosting service located in Canada, as hosting FinSpy. But because this is a hosting service, it’s difficult to say who is operating FinSpy from that location, or for what purposes.
"They (Gamma) claim that they only sell to government, law enforcement and intelligence communities," said Morgan Marquis-Boire, a San Francisco-based engineer for Google who is one of the authors of the Citizen Lab report, in an interview with The Canadian Press.
"Given that hosting in (the web hosting company's) ranges is acquirable with the use of money, it's difficult to provide strong attribution."
Among the other countries where FinFisher servers are located are Mexico, Bangladesh, Malaysia, Serbia, Vietnam and the United States.
No government has ever admitted to using FinSpy, the New York Times reports.
“This is dual-use equipment,” Eva Galperin of the internet civil liberties activist group Electronic Frontier Foundation told the Times. “If you sell it to a country that obeys the rule of law, they may use it for law enforcement. If you sell it to a country where the rule of law is not so strong, it will be used to monitor journalists and dissidents.”
But “if you look at the list of countries that Gamma is selling to, many do not have a robust rule of law,” Marquis-Boire told the New York Times. “Rather than catching kidnappers and drug dealers, it looks more likely that it is being used for politically motivated surveillance.”
The Japanese government counter-terrorism practice of fingerprinting foreigners who enter the country may have inspired Doctor Tsutomu Matsumoto to invent "fingerprinting gels", a way of faking fingerprints for scanners. Learn how to make your own here.
Worried someone around you is secretly recording everything you do? No fear! There's a relatively low-tech way to defeat such snoops, via white-noise-producing audio jammers. These tiny devices use good ol' white noise to blur the sound picked up by hidden microphones and other surreptitious recording devices.
MIT's Technology Review calls it the newest, hottest Thanksgiving accessory -- but you can use phone-size "Faraday cages" like this (sold by uncommongoods) to block your cellphone's call signal, WiFi and GPS. Handy now that federal courts are ruling that cops can track suspects via cellphone sans warrant, and Apple can remotely disable your phone camera with a click. As security researcher Jacob Appelbaum said in an interview with N+1 back in April, "Cell phones are tracking devices that make phone calls." So shouldn't you be prepared for when you don't want to be tracked?
Hidden cameras got you down? Blind them all with a simple baseball cap lined with infrared LEDs. Amie, a hacker on WonderHowTo, shows the world how to make one, while this German art exhibition lays out how these ingenious devices work.
These receivers reveal the telltale electronic crackle of hidden mics and cameras. Strangely enough, they were around long before "surveillance culture" became a common phrase. Today they're sold in all sorts of shops for surveillance paranoids.
Sometimes hiding your face isn't enough; sometimes you don't want to be seen at all. For those days, there's camera maps. The NYC Surveillance Camera Project is currently working to document the location of and working status of every security camera in New York City. This project has been replicated by others in Boston, Chicago and Bloomington, Indiana. Notbored.org has even published a guide to making your own surveillance camera maps (here).
Credit to artist Adam Harvey for this one. Inspired by the "dazzle camouflage" used on submarines and warships during World War I, he designed a series of face paint principles meant to fool the facial recognition schemas of security cameras. Check out The Perilous Glamour of Life Under Surveillance for some tips on designing your own camera-fooling face paint.
Walmart may be the premier symbol of corporate America, but its disposable cellphone selection can help you start a thoroughly maverick lifestyle. $10 TracFones work on most major networks, including AT&T, T-Mobile, Sprint and Verizon, and come with minutes prepaid so you can dispose of the devices when you're done.
Radio-Frequency Identification (RFID) chips are now regularly implanted in passports, ID cards, credit cards and travel papers. These tiny chips make machine-reading your documents easier -- but could also let anyone with the right type of scanner scrape your information and track your whereabouts. Luckily, gadget geeks have come to the rescue again, this time with RFID-blocking wallets. Working on the same principle as the "phonekerchief", these wallets create a Faraday cage around your items, keeping their data secure until you take them out to be scanned where they're supposed to be scanned. Destroying the chip is simpler: just nuke it in the microwave for five seconds. Of course, whatever you're microwaving might burst into flames first...