{"id":611,"date":"2011-12-02T11:13:38","date_gmt":"2011-12-02T09:13:38","guid":{"rendered":"http:\/\/wordpress.khm.de\/sag\/?p=611"},"modified":"2011-12-02T11:13:38","modified_gmt":"2011-12-02T09:13:38","slug":"wikileaks-targeting-surveillance-companies","status":"publish","type":"post","link":"https:\/\/sag.khm.de\/?p=611","title":{"rendered":"Wikileaks targeting surveillance companies"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft\" title=\"wikileakslogo\" src=\"https:\/\/sag.khm.de\/wp-content\/uploads\/sites\/15\/2011\/12\/wikileakslogo-1.png\" alt=\"\" width=\"168\" height=\"387\" \/><\/p>\n<p>There&#8217;s a new round of Wikileaks disclosures. Hurray! This time they are revealing internal documents from surveillance companies from around the world. If you want to know what&#8217;s possible, and where to get it from (if you have some spare change), check out <a href=\"http:\/\/wikileaks.org\/the-spyfiles.html\">http:\/\/wikileaks.org\/the-spyfiles.html<\/a><\/p>\n<p>As a starting point, you might want to have a look at what a local company, DigiTask, the makers of the much maligned and ridiculed Staatstrojaner (see <a title=\"0zapftis!\" href=\"http:\/\/wordpress.khm.de\/sag\/?p=499\">our post<\/a> from October 11) have on offer. I like the look of the WiFi interceptor! <a href=\"http:\/\/wikileaks.org\/spyfiles\/list\/company-name\/digitask.html\">http:\/\/wikileaks.org\/spyfiles\/list\/company-name\/digitask.html<\/a><\/p>\n<p>P.S. wow, this is a <em>lot<\/em> of information. Haven&#8217;t heard that term before: &#8220;Offensive Security&#8221;. <a href=\"http:\/\/wikileaks.org\/spyfiles\/files\/0\/31_200810-ISS-PRG-HACKINGTEAM.pdf\" target=\"_blank\">Used<\/a> as a euphemism for actively intruding into a system in order to insert a trojan\/spyware.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There&#8217;s a new round of Wikileaks disclosures. Hurray! This time they are revealing internal documents from surveillance companies from around the world. If you want to know what&#8217;s possible, and where to get it from (if you have some spare change), check out http:\/\/wikileaks.org\/the-spyfiles.html As a starting point, you might want to have a look [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_vp_format_video_url":"","_vp_image_focal_point":[],"footnotes":""},"categories":[76,59,88,67,74,61],"tags":[],"class_list":["post-611","post","type-post","status-publish","format-standard","hentry","category-activism","category-current","category-it","category-security","category-surveillantearchitectures","category-technology"],"_links":{"self":[{"href":"https:\/\/sag.khm.de\/index.php?rest_route=\/wp\/v2\/posts\/611","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sag.khm.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sag.khm.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sag.khm.de\/index.php?rest_route=\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/sag.khm.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=611"}],"version-history":[{"count":0,"href":"https:\/\/sag.khm.de\/index.php?rest_route=\/wp\/v2\/posts\/611\/revisions"}],"wp:attachment":[{"href":"https:\/\/sag.khm.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=611"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sag.khm.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=611"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sag.khm.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=611"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}