App Tracks Where Governments Hack Activists and Reporters

 

IN AN AGE when spies carefully hide their tracks through layers of obfuscation and proxy servers, locating the perpetrators of online surveillance is often nearly impossible. But the victims of these spying campaigns can sometimes be easier to place. And one open-source initiative has set out to map cases where state-sponsored malware campaigns target members of civil society, in an effort to show how governments use digital intrusions to control and disrupt their enemies around the globe.

Screen-Shot-2016-05-25-at-1.33.55-PM-1.png
The Digital Freedom Alliance’s map showing the country of the target—not the origin—of malware attacks against different civil society groups. DIGITAL FREEDOM ALLIANCE

An informal group of security researchers calling themselves the Digital Freedom Alliance this week launched a collaborative software project to aggregate and map out/a> government hackers’ attacks against journalists, activists, lawyers and NGOs around the world. The project, whose code is hosted on Github, collects data about state-sponsored malware infections from public sources like the University of Toronto’s Citizen Lab, TargetedThreats.net, and security firms’ research. It then organizes that data into a map that breaks down the attacks by date, target type, the family of malware used, as well as the location of the command and control server used to coordinate each malware campaign.

Screen-Shot-2016-05-25-at-2.54.35-PM-2.png

DIGITAL FREEDOM ALLIANCE

The mapping project was conceived last year, when Citizen Lab malware researcher Claudio Guarnieri gave a talk at the Chaos Communications Camp conference in Zehdenick, Germany about how security researchers need to collaborate more when fighting governments’ digital oppression of activists and journalists. “We always lacked a starting point for people to get an understanding of what is going on…how countries are employing technologies to repress dissent,” he says. “Ideally, this would develop into a place where [we can] reconstruct narratives on what is happening in different regions of the world.”

The country with the most targeted attacks on the map, for instance, is India, with 145 documented attacks. That’s because of the sheer volume of attacks carried out by the Chinese government, Guarnieri explains, against the Tibetan exiles and separatist activists in the Indian city of Dharamsala. The next most targeted country on the map is Syria, where the brutal dictatorship of Bashar Al-Assad has been using malware to target opposition groups since the country devolved into a bloody civil war.

In addition to tracking victims, the Digital Freedom Alliance’s map also shows the location of companies selling surveillance technology, as well as the resellers of those tools, in an effort to map out the shady supply chain of targeted spying. That data, Guarnieri says, is sourced from surveillance tracking projects like BuggedPlanet.info andWikiLeaks’ Spy Files. The country with the most listed surveillance vendors, unsurprisingly, is the United States, though Guarnieri admits the list’s definition of “surveillance vendor” is rather loose: It includes not only the creators of the malware documented in the group’s map, but also other potentially nasty technologies like passive data collection tools and internet filtering software.

For now, the map’s data is no doubt incomplete. But Guarnieri hopes more researchers will contribute to it, and that it could someday soon serve as a resource for tracking and fighting back against government spying.

Andy Greenberg

26th May 2016

Full article:

Source: This Map Tracks Where Governments Hack Activists and Reporters | WIRED

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s