Skip to content
  • Home
  • About
    • Special Series
  • Blog
  • Contact
  • Services
    • Risks Mitigation
    • Banners & Ads

Shhh-cretly

Columnist, Writer, Sleuth – Vanson Soo

Posted on July 9, 2015

Shhh… FBI, DEA & US Army Bought Italian Spyware

Find out more from The Intercept article below:

Leaked Documents Show FBI, DEA and U.S. Army Buying Italian Spyware

By Cora Currier and Morgan Marquis-Boire @coracurrier@headhntr

The FBI, Drug Enforcement Administration and U.S. Army have all bought controversial software that allows users to take remote control of suspects’ computers, recording their calls, emails, keystrokes and even activating their cameras, according to internal documents hacked from the software’s Italian manufacturer.

The company, Hacking Team, has also been aggressively marketing the software to other U.S. law enforcement and intelligence agencies, demonstrating their products to district attorneys in New York, San Bernardino, California, and Maricopa, Arizona; and multi-agency task forces like the Metropolitan Bureau of Investigation in Florida and California’s Regional Enforcement Allied Computer Team. The company was also in conversation with various other agencies, including the CIA, the Pentagon’s Criminal Investigative Service, the New York Police Department, and Immigrations and Customs Enforcement.

The revelations come from hundreds of gigabytes of company information, including emails and financial records, which were released online Sunday night and analyzed by The Intercept. Milan-based Hacking Team is one of a handful of companies that sell off-the-shelf spyware for hundreds of thousands of euros — a price point accessible to smaller countries and large police forces. Hacking Team has drawn fire from human rights and privacy activists who contend that the company’s aggressive malware, known as Remote Control System, or RCS, is being sold to countries that deploy it against activists, political opponents and journalists.

Even in the U.S., where the software would presumably be used only with a judge’s approval, the tactic is still controversial. Just last month, Sen. Chuck Grassley, R-Iowa, wrote to the director of the FBI asking for “more specific information about the FBI’s current use of spyware,” in order for the Senate Judiciary Committee to evaluate “serious privacy concerns.”

The leaked emails show that the FBI has been using Hacking Team’s software since 2011, apparently for the secretive Remote Operations Unit. It’s long been reported that the FBI has deployed malware in investigations, but details on the agency’s efforts are thin, with the tactic only surfacing rarely in court cases — such as one instance last year when the FBI spoofed an Associated Press article to get a target to click on a link. The FBI reportedly develops its own malware and also buys pre-packaged products, but the relationship with Hacking Team has not been previously confirmed.

Hacking Team’s spokesperson, Eric Rabe, said in a statement that “we do not disclose the names or locations of our clients” and “we cannot comment on the validity of documents purportedly from our company.”

The director of the Metropolitan Bureau of Investigation in Florida told The Intercept that it “does not have plans to purchase any product from Hacking Team.” The Manhattan District Attorney’s office said, “It would be an overstatement to say that our office is planning to purchase this type of software. This company is one of several in the industry whom we’ve requested meetings with in order to keep pace with rapid technological advancements in the private sector.”

The CIA declined to comment, and ICE said it “does not discuss law enforcement tools and techniques.” (The Intercept will update this story if other agencies named in the documents respond to requests for comment.)

The leaked emails show that U.S. agencies worried about the legality and perception of Hacking Team’s tools.

Hacking Team refers to its U.S. clients by code names. The FBI unit is “Phoebe” (initially “f-client,” but one employee complained “it sounds like an antivirus),” the DEA is “Katie,” and the CIA, which appears to have sampled, but not bought Remote Control System, is “Marianne.”

In 2011, a representative of the DEA’s Office of Investigative Technology told Hacking Team that its budget request for Remote Control System had been denied because it was considered “too controversial,” according to an email. “We are working on the foreign angle,” the DEA said, according to Hacking Team’s U.S. account manager.

“I imagine Katie [DEA] is referring to the fact that they as the DEA could buy RCS for other countries (Colombia) where it’s less problematic to use it,” an employee replied in Italian.

The purchase did go through in 2012, and it appears to have been used mainly in conjunction with Colombian law enforcement. As one email explained, “Katie will be administrator of the system, while the locals will be collecting the data. They are saying if this works out, they will bring it to other countries around the world. Already they are speaking of El Salvador and Chile.”

Robotec, a company that manages Hacking Team’s sales to several Latin American countries, also mentions clients in Colombia using DEA funding.

Local police in the U.S. also had their worries. Florida law enforcement told Hacking Team this year that the software could create legal problems without the ability to have “‘minimization’ of the calls and messages — (ie. deleting portions which are not relevant to the search.)”

In 2013, San Bernardino’s district attorney wanted to go to a judge to obtain a warrant targeting a “known bad guy” even for a trial run of the software. “If the systems [sic] proves itself in this live trial, and the judge is convinced of both its value and proper protection of privacy, they would then move into the purchase phase,” one of Hacking Team’s U.S. business partners, from the security giant SS8, explained.

“One of the concerns of this segment is that the HT product is ‘too powerful,’” Fred D’Alessio, who sits on the board of SS8 and is identified on LinkedIn as a senior advisor to Hacking Team, wrote about local agencies. “They have also said, their biggest challenge is ‘getting the lawyers and the District Attorneys to agree on what they can do legally.”

Hacking Team’s FBI contacts worried that the spread of Hacking Team software around the country could cause word to get out (as has happened with technology like Stingrays, the devices that police use to track cell phone location.) “If San Bernardino gets exposed, they might also expose Phoebe,” Hacking Team’s U.S. point man, Alex Velasco, wrote in September 2013.

The FBI’s use of Hacking Team’s software also informs the public debate about the growing use of encryption to protect Internet communications. FBI and other top U.S. law enforcement officials have been calling for a law that would provide for a “backdoor” into commercial encryption technologies — something privacy advocates and many cybersecurity researchers see as a undermining Internet security.

Hacking Team claims that its software offers a way around encryption, obviating the need for a backdoor. Vincenzetti regularly sends out articles about the encryption debate to his email list with a plug for Remote Control System. Last February, he wrote that law enforcement and security agencies could use “technologies to ACCESS THE DATA they need IN CLEARTEXT, BEFORE it gets encrypted by the device and sent to the network and AFTER it is received from the network and decrypted by the device itself. Actually THIS IS precisely WHAT WE DO.”

The Buyers

The push into the local district attorney market, for which the company considered San Bernardino a pilot, appears to have been facilitated by SS8, a massive California-based security company that markets to law enforcement agencies in the United States and abroad. (Rabe denied that SS8 is working with Hacking Team, despite emails between the companies.) The local market could be lucrative: a budget for the district attorney in New York that Hacking Team proposed in April totaled $760,000 in upfront license fees, and another $382,000 in services and maintenance.

“As with so many other surveillance technologies that were originally created for the military and intelligence community, they eventually trickle down to local law enforcement who start using them without seeking the approval of legislators — and, in many cases, keeping the courts in the dark too,” said Christopher Soghoian, principal technologist of the American Civil Liberties Union.

The DEA, FBI and Army bought Hacking Team’s software through a company called Cicom, which for several years served as a middleman for Hacking Team’s U.S. business. The DEA and Army contracts to buy Remote Control System through Cicom were first revealed by the advocacy group Privacy International this spring. Reporters noted that Cicom shared the same corporate address in the United States as Hacking Team, but when asked about the connection by Ars Technica, Hacking Team’s U.S. spokesperson Eric Rabe said, “I cannot confirm any relationship between the company Cicom and Hacking Team.”

Alex Velasco, Cicom’s general manager, has in fact been a consultant under contract to represent Hacking Team to clients in North America since 2012, company emails show. The relationship ended in March, after Hacking Team accused Velasco of scheming to market competing products, according to an internal investigation commissioned by Hacking Team. Velasco declined to comment to The Intercept on the allegations, because he is in legal proceedings with Hacking Team.

Hacking Team was also in talks in 2014 with the FBI’s National Domestic Communications Assistance Center, a secretive unit formed in 2012 and focused on interception technologies. Velasco claims in an email that the group came to them after Citizen Lab, a research group at the University of Toronto focused on Internet technology and human rights, published a highly critical report on Hacking Team’s global sales. “If anything good came out of the Citizen lab articles is that it brought them to contact us to see if it was true,” he wrote. “Thank you Citizen Lab!!”

It’s not clear from Hacking Team emails what Army component bought an RCS system in 2011, but it was based at Fort Meade and apparently sat unused for years. According to a 2013 email from Velasco, “they purchased a system right before they got their budget cut…They were never given permission to pull an internet line to their office to install the system. (ridiculous but true!)”

Hacking Team was in the midst of negotiations for a new FBI contract from Cicom after Velasco’s firing, but the agency decided to go with another vendor due to budget timing issues, according to an email from Phillipe Vinci, Hacking Team’s vice president for business development. Besides, the product was “seen as a ‘nice to have’ by FBI,” but “they confessed they were using it for low level types of investigations. For critical operations, they were using another platform,” wrote Vinci. He said the FBI wanted more ability to go after users of Tor, the anonymizing web browser; those users accounted for 60 percent of its targets.

But Hacking Team appeared determined to continue its conquest of the U.S. market.

“There will be a process to have ‘HT Usa Inc.’ accredited,” wrote operations manager Daniele Milan. He pledged to stay in touch with the FBI, marketing new features, and identifying problems “to resolve for them (in exchange for $$$).”

While Hacking Team’s emails reveal the company to be stringent about selling only to governments, the company officials appear to worry less about how its technology is used once it gets to those customers. Responding to concerns raised by the district attorney of New York in 2013, Hacking Team’s chief operating officer Giancarlo Russo wrote that “all the consideration regarding the ‘legal framework’ cannot be addressed by us.”

Instead, he was more concerned about local customers’ ability to use the product effectively. “If you buy a Ferrari… they can teach you how to drive. They cannot grant you will be the winner of the race,” he wrote to his colleagues in English. “If Beretta sell you a gun, the most peculiar and sophisticated one, they can teach how to use it. They can not grant you are going to shoot your target properly on the field.”

–– Sheelagh McNeill contributed research to this report.

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on X (Opens in new window) X
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to email a link to a friend (Opens in new window) Email
  • Click to print (Opens in new window) Print
  • More
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Pocket (Opens in new window) Pocket
Like Loading...

Related

Categories Business risks, Computer and security, Corporate espionage, Cyber Espionage, Eavesdropping, Espionage, Gadgets, Intelligence, National Security, Privacy, Regulatory matters, Risk management, Security, Security - computer and devices, Spies, Surveillance, UncategorizedTagsAmerican Civil Liberties Union, Bulk collection, CIA, Criminal Investigative Service, DEA, Drug Enforcement Administration, Eavesdropping, FBI, Hack, Hacked, Hackers, Hacking Team, Immigrations and Customs Enforcement, Italy, Meta data, metadata, Metropolitan Bureau of Investigation, Milan, New York Police Department, Off-the-shelf spyware, Office of Investigative Technology, Online privacy, online surveillance, Pentagon, Phoebe, Phone recording, phone records, Privacy, RCS, Regional Enforcement Allied Computer Team, Remote Control System, Remote Operations Unit, Robotec, SS8, Stingrays, US Army, Wiretapping

Post navigation

Previous Previous post: Shhh… Hacking Team: When Hackers Get Hacked
Next Next post: Shhh… US Government Hacks at OPM Exposed More Than 21Million People

Menu

  • Home
  • About
    • Special Series
  • Blog
  • Contact
  • Services
    • Risks Mitigation
    • Banners & Ads
IMG-20130618-WA0003

My Column (“Shhh…” Are Short Musings & Commentaries)

  • Shhh… Germany Says Its Officer’s ‘Operational Mistake’ During Singapore Airshow Visit Led to Army Leak
  • Up the Ante: Insurance Policies for Money Laundering Out of China
  • Shhh… Big Brother Watching Aye?
  • Shhh… Lessons Learnt From Investigating the Due Diligence of FTX
  • Shhh… My Question to Anwar Ibrahim In Our First Meeting
  • Shhh… (FTX) High Returns With No Risk?
  • Shhh… FTX Crypto Crash and the Perils of Key Man Risk
  • Shhh… The US Midterm Election – Self Deniers, Fake News and The Sock Puppets
  • Shhhcretly Exclusive: NFT Auction of Unpublished & Signed Edward Snowden Photos
  • The World of Corporate Sleuths
  • Whistleblowing and Internal Monitoring/Investigations
  • Shhhcretly Exclusive: Edward Snowden’s Warning Cry
  • Shhh… A Corona?!
  • Shhh…. Ghosn Debunks Reports on Escape Route
  • Shhh… A Cyber-Geopolitical Threats 2019 Roundup
  • Shhh… Updates on Edward Snowden & the Snowden Refugees
  • Shhh… The Matrix, With Mozilla
  • Shhh… Fancy Having A Live Flight Tracker?
  • Shhh… 10 Famous Spies
  • Shhh… One Lucky Chinese: Former Military Officer Bags Suspended Death Sentence in Graft Case
  • Shhh… Crafty Hackers Into Insider Trading
  • Shhh… UK's Spies, Lords & Predators
  • Shhh… British MPs to Court: Stop the Police & GCHQ Spying on Them
  • Shhh… WikiLeaks: NSA Spying on Japan
  • Shhh… Duncan Campbell – Global Spying Program ECHELON & the Decades-long Cosy NSA-GCHQ Relationship
  • Shhh… The Chinese Version of All the President's Men
  • Shhh… The Cost of Watching Julian Assange
  • Shhh… Google: No to Global ‘Right to Be Forgotten’ Order
  • Shhh… The Intercept: A Summer Reading List
  • Shhh… 10 Secret Facts about the CIA
  • Shhh… Spies Vs Silicon Valley
  • Shhh… Microsoft's Wi-Fi Sense Can Make You the 'Hotspot'
  • Shhh… The Snowden Official Teaser Trailer
  • Shhh… The 5 Most Powerful Families That Secretly Control The World
  • Shhh… US-Canada Border – Secret Deal Between Canada’s Spies and Border Guards
  • Shhh… Impact Team: Cheating Spouses Panic As Adultery Site Ashley Madison Hacked
  • Shhh… Hacked By Your Cyber-security Firm?
  • Shhh… Email Spams Dip First Time in Twelve Years
  • Shhh… The 5 Most Dangerous Hackers Of All Time
  • Shhh… Minds.com: A Social Media Network to Stop NSA Surveillance?
  • Shhh… WikiLeaks: TISA Corporate Takeover Plot
  • Shhh… SPIEGEL: US Attack on Press Freedom
  • Shhh… WikiLeaks: NSA Has Spied on German Chancellors for Decades
  • Shhh… US Government Hacks at OPM Exposed More Than 21Million People
  • Shhh… FBI, DEA & US Army Bought Italian Spyware
  • Shhh… Hacking Team: When Hackers Get Hacked
  • Shhh… Russian Parliament Paved Way for "Right to be Forgotten"
  • Shhh… WikiLeaks: NSA’s Been Bugging Top Brazilian Political and Financial Targets
  • Shhh… XKEYSCORE – The NSA Insight Into Everything We Do Online
  • Shhh… China Passes New National Security Law
  • Shhh… What Message is the US Sending to France with Bulk Data Collection to Resume Following WikiLeaks' Espionnage Élysée Expose?
  • Shhh… WikiLeaks: US Also Had a Decade-long Policy of Economic Espionage Against French Companies
  • Shhh… US Data Hack May Be 4 Times Larger Than the Government Has Admitted
  • Shhh… French Asylum Offer to Snowden & Assange as Ultimate US Contempt
  • Shhh… French Former Foreign Minister Roland Dumas: Shocked But Not Surprised With NSA Eavesdrops on French Presidents
  • Shhh… WikiLeaks' "Espionnage Élysée" – François Hollande on Emergency Meeting Following Claims US Spied on 3 French Presidents
  • Shhh… Google Chrome Secretly Downloading Audio Listeners & Eavesdropping on Users Without Consent
  • Shhh… China Changing Course on Foreign Policy?
  • Shhh… Italian Prosecutors Seek to Indict 297 People in Bank of China (Milan) Fraud
  • Shhh… Top 10 Sites Hidden by Google Earth
  • Shhh… Snowden Supports Apple’s Public Stance On Privacy
  • Shhh… French Ultimatum Clicking on Google Over "Right to be Forgotten" Ruling
  • Shhh… 2 Years Post-Snowden Review
  • Shhh… Conspiracy Theories on Latest Snowden Claims?
  • Shhh… From NSA to Police Surveillance
  • Shhh… Hackers Target Database of Chinese with Ties to US Government
  • Shhh… William Binney: Everyone Under Surveillance
  • Shhh… 10 Ways the NSA Spies On US
  • Shhh… Latest Cyberattacks on US Government a Hoax – To Restore NSA Surveillance?
  • Shhh… Snowden Documents: NSA Secretly Expands Cybersurveillance
  • Shhh… FBI Operate Surveillance Planes – With Fictitious Names and Video & Cellphone Technologies
  • Shhh… Live Q&A with Snowden
  • Shhh… US Senate Approves Bill to Reshape NSA Surveillance
  • Shhh… What About Snowden Now with NSA Surveillance on Hold?
  • Shhh… NSA Surveillance on Hold as Senate Blocks Temporary Extensions
  • Shhh… Everything Google – Key Announcements at the Google 2015 I/O Developer Conference
  • Shhh… Fancy Revenge by Stalking Your Identity Thief?
  • Shhh… William Binney on NSA's "Dark Secrets"
  • Shhh… The Internet of Things – Google's New Patent for a Creepy Wi-fi Connected Toy
  • Shhh… USA Freedom Act Fails Again – Senators Reject Bill to Scrap NSA Bulk Collection
  • Shhh… Rand Paul's 10-Hour Filibuster to Derail the Winding Down of NSA Surveillance
  • Shhh… Fraudulent Practices at Fake Cancer Charities
  • Shhh… US Charges 6 Chinese Nationals for Industrial Espionage
  • Shhh… Bruce Schneier on How We Sold Our Souls & Privacy to Internet Giants
  • Shhh… Brett King on FinTech & the Death of the Retail Banking Branches
  • Shhh… US Congress on Track to End NSA's Bulk Phone Collection Program?
  • Shhh… Jack Barsky – The Spy Among US
  • Shhh… Former CIA Officer Sentenced for Leaks to NYT Reporter
  • Shhh… Spy Game: The Thais, the Israelis & the Wiretapping Devices
  • Shhh… NSA Rats Exposed – The "Facebook-NSA Queen" & Mysterious Death of Dave Goldberg
  • Shhh… Court Rules NSA's Phone Data Collection Illegal
  • Shhh… NSA Have More Data Than They Can Handle
  • Shhh… North Korea Exposes Two South Korean Spies
  • Shhh… Profile: Michael G. Vickers, the Retiring Under Secretary of Defense for Intelligence
  • Shhh… AirBus Plans Legal Actions Against NSA/BND Spying Claims – NSA Involved in Industrial Espionage
  • Shhh… NSA Too Late With "Snowden-Proof" Cloud Storage
  • Shhh… Julian Assange: Snowden Better Off in Russia Than Iceland
  • Shhh… Obama Now Understands (Loss of) Privacy Pains?
  • Shhh… Mangfall Kaserne in Bad Aibling – Surveillance-Proof Site for German Intelligence BND to Cooperate with the NSA
  • Shhh… Anonymous: CyberSecurity Bill's a Scam
  • Shhh… The Protecting Cyber Networks Act Gets Greenlight from Congress
  • Shhh… The Perils of Popular News Sites
  • Shhh… New Google Security Chief – In Search of Balance with Privacy
  • Shhh… New Zealand & US Plotted to Spy on China
  • Shhh… WikiLeaks' Latest Stunt: The Sony Archives
  • Shhh… FaceBook Blames "Bug"
  • Shhh… Google's EU Antitrust Troubles Explained
  • Shhh… Spy On Spies – A New Breed of Spies
  • Shhh… China's Powerful "Great Cannon" to Censor the Internet
  • Shhh… Shutting Down Network of 12,000 Computers Used by Cyber-criminals
  • Shhh… Data Breach – What Happens to those Data?
  • Shhh… Turning the White House into a Russian House?
  • Shhh… Edward Snowden on John Oliver's ‘Last Week Tonight’
  • Shhh… Emails Reveal Cozy Google-NSA Relationship on Previously Denied High-Level Policy Discussions
  • Shhh… Google Did the Right Thing to Cut Off China's Certificate Authority CNNIC to Protect the Internet
  • Shhh… Did Obama Know What He's Doing When He Signed the new Executive Order on Cybercrimes?
  • Shhh… Facebook Violates EU Law as it Tracks Everyone Including Logged Out Users and Visitors
  • Shhh… Richard Stallman: Why Facebook is Mass Surveillance
  • Shhh… Why You Should Forget Facebook for Good?
  • Shhh… The "Secret" App – Parents Should Beware How Kids Are Keeping & Sharing Secrets Through Anonymous Posts that Aren't Really Anonymous
  • Shhh… The Why's, How's and What's of Hacks into Health Insurance Companies Like Anthem and Premera
  • Shhh… The USB-C Makes those new MacBooks More Vulnerable
  • Shhh… Apple Still Wants to Find You Even When Location Services are Switched Off
  • Shhh… Anatomy of a Hack – What Should You Do After You're Hacked?
  • Shhh… Windows 10 – "Windows Hello" Biometric Authentication Technology has Potential Serious Security Loopholes
  • Shhh… Department of the Internet: How the Government Has Taken Over Our Lives
  • Shhh… Snowden's Privacy Apps and Programs
  • Shhh… Live Recording: Microsoft Phone Support Scam at Work
  • Shhh… Hidden Spy Cameras at Denver Post Offices
  • Shhh… Bruce Schneier on His New Book "Data and Goliath"
  • Shhh… What Can You Do If Airport Checkpoints Demand for Your Smartphone Password?
  • Shhh… Fujitsu Can Detect Faces in Blurred Security Videos
  • Shhh… ProtonMail: Email Privacy and Encryption
  • Shhh… How Come Obama Suddenly Understood & Explained to China Why Backdoors into Encryption is Really Bad?
  • Shhh… How to Make Yourself Invisible to Facial Recognition with the New "Privacy Glasses"?
  • Shhh… US Pressures Forced PayPal to Punish Mega (& MegaChat) for Encrypted Communications & Keeping Our Privacy
  • Shhh… NSA Demands on Crypto Backdoors Led to US-China Spat on Backdoors & Encryption
  • How to Cope With File-Encrypting Ransomware Risks (After US Offer $3mn Award for GameOver Zeus creator Evgeniy Bogachev)?
  • Shhh… NSA Want Framework to Access Encrypted Communications
  • Shhh… Security Experts Not Convinced By Gemalto's Swift "Thorough" Investigations into NSA-GCHQ SIM Card Hacks
  • Shhh… Out of Africa: Spies & Leaked Intelligence from the New "El Dorado of Espionage"
  • Shhh… Snowden's Girlfriend at the Oscars for CitizenFour
  • Shhh… Doll Hack? New Wi-fi Connected "Hello Barbie" Risks Inviting Pedophiles Into the Barbie World
  • Shhh… Solutions to NSA & GCHQ Hacks into SIM Cards to Eavesdrop on Mobile Phones Worldwide?
  • Shhh… Pre-installed Superfish Malware Leaves Lenovo Computers Vulnerable to Man-in-the-Middle Attacks
  • Shhh… Simple Solutions to NSA's Embedded Spyware in Hard Drives
  • Shhh… Snowden at the ALCU Hawaii’s Davis Levin First Amendment Conference
  • Obama's Still On the Wrong Frequency On Cybersecurity Issues
  • Shhh… New Search Engine Memex to Reach the Other 95% of the Web (And Dark Web) that Google Missed
  • Shhh… China to Boost Cyber-Security with the World's First Quantum Communications Network – QC Satellite to Follow Next Year

Archives

  • March 2024
  • December 2023
  • March 2023
  • December 2022
  • November 2022
  • October 2021
  • February 2021
  • June 2020
  • February 2020
  • January 2020
  • December 2019
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • March 2012
  • February 2012
  • January 2012
  • December 2011
  • October 2011
  • September 2011
  • August 2011
  • January 2011
  • July 2010
  • February 2005
  • November 2004

Media Coverage

http://www.bloombergview.com/articles/2014-03-04/pesek-on-asia-singapore-trumps-tokyo

http://www.vietnamplus.vn/hoat-dong-cua-nsa-khien-my-kho-xu-voi-trung-quoc/252201.vnp

http://citinews.net/the-gioi/hoat-dong-cua-nsa-khien-my--kho-xu--voi-trung-quoc-TW7DIGY/

http://www.sr-indonesia.com/web-exclusives/view/post-snowden-the-us-reaps-a-security-whirlwind

http://asiancorrespondent.com/117792/what-edward-snowden-has-shown-the-world/

http://stratrisks.com/geostrat/6617

http://www.wikileaks-forum.com/whistleblowing/486/for-whom-the-whistle-blows/21320/

http://article.wn.com/view/2012/03/11/Getting_all_Smiley_about_corporate_espionage/

http://yourviet.blogspot.hk/2012/03/world-complicated-world-of-corporate.html

http://jamescks.wordpress.com/2013/02/05/asia-sentinel/

http://therapeofhongkong.com/2014/06/03/regulators-legislators-must-not-repeat-history-again-after-ignoring-it-again/

http://www.techwireasia.com/1075/the-threat-to-freedom-of-information/

Enter your email address to follow this blog and receive notifications of new posts by email.

Recommended Links

  • PeterToren.com

Meta

  • Create account
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com

Categories

  • 1MDB
  • Agents
  • Anwar Ibrahim
  • audit
  • Bitcoin
  • Brokers
  • business leaders
  • Business risks
  • CEO
  • CEPA
  • China
  • Computer and security
  • Corporate espionage
  • Corporate governance
  • Covid
  • Crypto
  • Cryptocurrency exchange
  • Cyber Espionage
  • Donald Trump
  • Due diligence
  • Eavesdropping
  • Enron
  • Espionage
  • Fake news
  • Frauds
  • FTX
  • Gadgets
  • Geopolitics
  • Hedge funds
  • Human intelligence
  • HUMINT
  • IASIU
  • IFAs
  • Independent Financial Advisors
  • Insurance
  • Intelligence
  • Intelligence Online
  • Investigations
  • John Ray III
  • Key man risk
  • Mahathir Mohamad
  • Malaysia
  • money-laundering
  • Najib Razak
  • National Security
  • Open source intelligence
  • OSINT
  • Others
  • Pakatan Harapan
  • Pandemic
  • Pension funds
  • Politics
  • Privacy
  • Public records
  • Putin
  • QAnon
  • Regulatory matters
  • Risk management
  • Risks mitigation
  • Russia
  • Sam Bankman-Fried
  • SARs
  • Security
  • Security – computer and devices
  • Self deniers
  • Singapore
  • Social media
  • Sock puppets
  • Sovereign funds
  • Spies
  • Surveillance
  • Temasek
  • UMNO
  • Uncategorized
  • United Malays National Organisation
  • Whistleblowing
  • Yevgeny Prigozhin
Blog at WordPress.com.
  • Reblog
  • Subscribe Subscribed
    • Shhh-cretly
    • Join 55 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Shhh-cretly
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Copy shortlink
    • Report this content
    • View post in Reader
    • Manage subscriptions
    • Collapse this bar
%d