Spy Files 3
Today, Wednesday 4 September 2013 at 1600 UTC, WikiLeaks released 'Spy Files #3' – 249 documents from 92 global intelligence contractors. These documents reveal how, as the intelligence world has privatised, US, EU and developing world intelligence agencies have rushed into spending millions on next-generation mass surveillance technology to target communities, groups and whole populations.
Spy Files 3 Documents:
Surveillance Industry Documents
Document Title / Company / Year / Document Type / Tags / Target System / Country Codes /10 GigaBit Fiber Taps / NETOPTICS / - / Brochure / NETOPTICS / - / US
10/100 Port Aggregator Tap / NETOPTICS / - / Brochure / NETOPTICS / - / US
10/100/1000 Tap Network Link / NETOPTICS / - / Brochure / NETOPTICS / - / US, FR
10/100BaseT Tap / NETOPTICS / - / Brochure / NETOPTICS / - / US
1U Modular Rackmount Surveillance Simplified / Packet Forensics / 2011 / Brochure / PACKET FORENSICS, Internet Monitoring, Lawful Interception, Data Retention, VOIP COMINT, HARDWARE / - / US
2 Mercure / OCKHAM / 2011 / Brochure / OCKHAM, Mass Monitoring, Analysis Software, Traffic Data Processing, SOFTWARE / - / FR
4x1 GigaBit Copper In-Line Regeneration Tap / NETOPTICS / - / Brochure / NETOPTICS / - / US
5-Series Small Devices, Big Opportunities / Packet Forensics / 2011 / Brochure / PACKET FORENSICS, SIGINT, Tactical Internet Monitoring / - / US
A30 Excellence in Telephone Interception Systems / AMECS / 2011 / Brochure / AMECS, Analysis Software, Deep Packet Inspection, Mass Monitoring, Monitoring Centre, PRODUCT, SOFTWARE, HARDWARE / Phone Network / FR
Aappro Security and defence: Company Brochure / AAPPRO / 2011 / Brochure / AAPPRO, Covert Surveillance Devices, Tactical GSM Interception, Tactical Interception Devices / GSM / GB
About BrightPlanet / BrightPlanet / 2011 / Catalogue / BRIGHTPLANET, Analysis Software, SOFTWARE / - / US
Advanced Cyber Infrastructure Protection / Cassidian (EADS) / 2011 / Brochure / CASSIDIAN (EADS), Deep Packet Inspection, Internet Monitoring / - / DE
Advertisement System InPoint SMS / NeoSoft / - / Data Sheet / NEOSOFT, Tactical GSM Interception / - / CH
An Introduction to Morpho Face Investigate Pilot / Safran / 2011 / Brochure / SAFRAN, Facial Recognition, CCTV, SOFTWARE / - / FR
An overview of FTS products & services / Forensic Telecommunications Services / 2011 / Brochure / FORENSIC TELECOMMUNICATIONS SERVICES, Forensics, Cell Phone Forensics, COMINT, SMS Monitoring, SIM Card Forensics, Thuraya Monitoring, Iridium Monitoring, Tactical GSM Interception, PRODUCT, SERVICE / - / GB
Analyst´s Notebook - Esri Edition Foundation Module / i2 Group / 2011 / Brochure / I2 GROUP, Social Network Analysis, Semantic Analysis, Analysis Software, SOFTWARE / - / US
Analyst´s Notebook 8 / i2 Group / 2010 / Brochure / I2 GROUP, Analysis Software, SOFTWARE / - / US
ARES Systeme d´interception de Bandes C/L Thuraya / RHEINMETALL DEFENCE / - / Brochure / RHEINMETALL DEFENCE, Tactical Satellite Interception / - / DE
Argos Thuraya Interception L-Band System / RHEINMETALL DEFENCE / - / Brochure / RHEINMETALL DEFENCE / - / DE
Artemis - Systeme d´Interception de bandes L/L Thuraya / RHEINMETALL DEFENCE / - / Brochure / RHEINMETALL DEFENCE, Tactical Satellite Interception / - / DE
ATIS Presentation / ATIS Uher / - / Presentation / ATIS UHER, Monitoring Centre / - / DE, TN
Audioscope - Audio Capturing and Recording System / Cobham / 2011 / Brochure / COBHAM, Recognition, Covert Surveillance Devices, Audio Forensics, Tactical Interception Devices / - / DK
Automated Data Retention for Telcommunication Service Providers / UTIMACO / 2010 / Brochure / UTIMACO, Data Retention / Phone Network, Mobile Phone Network / DE, GB
Automatic Speaker Identification System (ASIS) / Agnitio / 2011 / Brochure / AGNITIO, Audio Forensics, Biometrics, Speaker Identification, Strategic Interception / Phone Network / GB
Batvox export 1:1 voice biometric tool / Agnitio / 2011 / Brochure / AGNITIO, Speaker Identification, Audio Forensics / Phone Network / ES
Beowulf II Board Audio Recorder / Cobham / 2011 / Data Sheet / COBHAM, COBHAM BEOWULF II BOARD Covert Surveillance Devices / - / DK
Beowulf II Bubble Gum Covert ìdrop and walk audio recorder / Cobham / 2011 / Data Sheet / COBHAM, Covert Surveillance Devices, Tactical Interception Devices / - / DK
Beowulf II Solid state stand alone recorder / Cobham / 2011 / Data Sheet / COBHAM, Covert Surveillance Devices, Tactical Interception Devices, HARDWARE / - / DK
Bifrost Wireless HIgh Speed USB Modem for Freja Video records / Cobham / 2011 / Data Sheet / COBHAM, Covert Surveillance Devices, CCTV, Tactical Interception Devices, Covert Surveillance Devices / - / DK
Biometric Speaker Spotting System (BS3) / Agnitio / 2011 / Brochure / AGNITIO, COMINT, Audio Forensics, Speech Recognition, Speaker Identification, Strategic Interception / Phone Network / ES
Biometrics / Ernst & Young / 2011 / Brochure / ERNST & YOUNG, Biometrics, SERVICE / - / GB
BONGO monitoring system / NETI / 2011 / Brochure / NETI, Lawful Interception, Strategic Interception, VOIP COMINT, Network Recording, Traffic Data Processing, Monitoring Centre, HARDWARE / - / HU
Brochure Security & Policing Exhibition - UK Innovation for Global Security / ADS UKTI Defence & Secuity Organisation / 2012 / Brochure / ADS UKTI DEFENCE & SECUITY ORGANISATION / - / GB
BS3 Strategic - Biometric Speaker Spotting System: Strategic Edition / Agnitio / 2011 / Brochure / AGNITIO, Mass Monitoring, Audio Forensics, VOIP COMINT, Speaker Identification, Speech Recognition, Strategic Interception / Phone Network / ES
Building your OSINT Capabililty / Kapow Software / 2011 / Brochure / KAPOW SOFTWARE, Social Network Analysis, Mass Monitoring, Analysis Software / Twitter, Facebook / GB, US
CAPsure 256 Element Square Microphone Array / Cobham / 2011 / Data Sheet / COBHAM, COBHAM CAPSURE Covert Surveillance Devices, Audio Forensics / - / DK
Case History / EXPERTSYSTEM / - / Brochure / EXPERTSYSTEM, Semantic Analysis / - / US, IT
Case history eni / EXPERTSYSTEM / - / Brochure / EXPERTSYSTEM, Semantic Analysis / - / US, IT
Case Study: COsmOs / EXPERTSYSTEM / - / Brochure / EXPERTSYSTEM, Audio Forensics, Speaker Identification, Speech Recognition, Semantic Analysis / - / US, IT
Case study: Network Intelligence for Lawful Interception / QOSMOS / 2011 / Brochure / QOSMOS, Lawful Interception, Mass Monitoring, gbps, p2p, Network Recording, Deep Packet Inspection, VOIP COMINT / E-Mail, Instant Messaging / FR, US, SG
Catalogue of Tactical Communications and Surveillance Product Short Form / Cobham / 2011 / Catalogue / COBHAM, Covert Surveillance Devices, Audio Forensics, Tactical Interception Devices, Location Tracking / - / DK
Catalogue Security & Policing Exhibition / ADS UKTI Defence & Security Organisation / 2012 / Catalogue / ADS UKTI DEFENCE & SECURITY ORGANISATION / - / GB
Cell phone detection systems / Berkeley Varitronics Systems / 2011 / Brochure / BERKELEY VARITRONICS SYSTEMS, SIGINT, Cell Phone Detection / - / US
CellNet Drop 2 Interception System / ERICSSON / 2000 / Training Material / ERICSSON, Monitoring Centre / - / SE
Cellphone detector Wolfhound / Berkeley Varitronics Systems / 2011 / Brochure / BERKELEY VARITRONICS SYSTEMS, SIGINT, Cell Phone Detection / - / US
Centuare / Elektron / - / Brochure / ELEKTRON, Lawful Interception, Location Tracking / - / FR
CIGOTO SEE From search to knowing / EXPERTSYSTEM / - / Video / EXPERTSYSTEM, Semantic Analysis / - / US, IT
Cogito Answers / EXPERTSYSTEM / - / Brochure / EXPERTSYSTEM, Audio Forensics, Speaker Identification, Speech Recognition, Semantic Analysis / - / US, IT
Cogito Categorizer Cogito Discover / EXPERTSYSTEM / - / Brochure / EXPERTSYSTEM, Audio Forensics, Speaker Identification, Speech Recognition, Semantic Analysis / - / US, IT
COGITO Intelligence Platform / EXPERTSYSTEM / - / Brochure / EXPERTSYSTEM, Semantic Analysis, Text mining / - / US, IT
Cogito Mapping Concepts / EXPERTSYSTEM / - / Video / EXPERTSYSTEM, Analysis Software, Location Tracking, Semantic Analysis / - / US, IT
Cogito Monitor / EXPERTSYSTEM / - / Brochure / EXPERTSYSTEM, Audio Forensics, Speaker Identification, Speech Recognition, Text mining, Semantic Analysis / - / US, IT
Cogito Monitor Voice of the Customer / EXPERTSYSTEM / - / Video / EXPERTSYSTEM, Semantic Analysis / - / US, IT
Cogito Search Explore Engine / EXPERTSYSTEM / - / Brochure / EXPERTSYSTEM, Audio Forensics, Speaker Identification, Speech Recognition, Semantic Analysis / - / US, IT
COGITO SEE Finding out who did what / EXPERTSYSTEM / - / Video / EXPERTSYSTEM, Semantic Analysis / - / US, IT
COGITO Semantic Technology / EXPERTSYSTEM / - / Video / EXPERTSYSTEM, Semantic Analysis / - / US, IT
COGITO Twitter Semantic Search / EXPERTSYSTEM / - / Video / EXPERTSYSTEM, Semantic Analysis / Twitter / US, IT
COGITO Understanding Words / EXPERTSYSTEM / - / Video / EXPERTSYSTEM, Semantic Analysis / - / US, IT
Cogito: Solutions for Semantic Publishing / EXPERTSYSTEM / - / Brochure / EXPERTSYSTEM, Semantic Analysis / - / US, IT
Combatting the Taliban in Central Helmand, Afghanistan / i2 Group / 2010 / Brochure / I2 GROUP, Analysis Software / - / US
COMINT Technology / Innov Telek IZT / 2011 / Presentation / INNOV TELEK IZT, COMINT / - / DE
CommsAudit Corporate Overview / CommsAudit / 2011 / Brochure / COMMSAUDIT, SIGINT / - / GB
Completing the Investigative Solution Surveillance Simplified / Packet Forensics / 2011 / Brochure / PACKET FORENSICS, Internet Monitoring, Lawful Interception, Mass Monitoring, Deep Packet Inspection, hundreds of probes, Network Recording, Traffic Data Processing, VOIP COMINT, Tactical Internet Monitoring, Data Retention / Instant Messaging, GMail, Hotmail / US
Construiere une plateform d´access pour la surveillance / NETOPTICS / - / Presentation / NETOPTICS / - / US, FR
Corporate Brochure / EXPERTSYSTEM / - / Brochure / EXPERTSYSTEM, Semantic Analysis, Audio Forensics, Analysis Software, Speech Recognition, Speaker Identification / - / US, IT
Corporate Overview Advanced Surveillance / Digital Barriers / 2011 / Brochure / DIGITAL BARRIERS, Covert Surveillance Devices, Tactical Interception Devices / - / GB, FR, US, AE, SG
Countering Thread Surveillance, Interception, Detection, Forensics, CyberSecurity / Roke Manor Research / 2011 / Brochure / ROKE MANOR RESEARCH, Lawful Interception, COMINT, Image Recognition, Internet Monitoring, Tactical Interception Devices / - / GB
CYBELS CYBer Expertise for Leading Security / THALES / 2010 / Brochure / THALES, Analysis Software / - / FR
Cyber / i2 Group / 2010 / Brochure / I2 GROUP, Analysis Software / - / US
Cybersecurity overview / THALES / 2011 / - / THALES, Monitoring Centre / Internet Usage / FR
Cyveillance Corporate Security / Cyveillance / 2011 / Brochure / CYVEILLANCE, Internet Monitoring, Mass Monitoring, OSINT / - / US
Data acquisition from devices / Spektor Forensic Intelligence / 2011 / Brochure / SPEKTOR FORENSIC INTELLIGENCE, Analysis Software, Cell Phone Forensics / - / GB
Data Monitoring Switch / NETOPTICS / - / Brochure / NETOPTICS, HARDWARE / - / US
Director Data Monitoring Switch Datasheet / NETOPTICS / - / Brochure / NETOPTICS / - / US, FR
DPX Network Probe / IPOQUE / - / Data Sheet / IPOQUE, Deep Packet Inspection / - / -
DRS Data Retention Suite / UTIMACO / 2010 / Brochure / UTIMACO, Data Retention / Phone Network, Mobile Phone Network / DE, GB
DRS Paquete de retencion de datos / UTIMACO / 2011 / Brochure / UTIMACO, Data Retention / Phone Network, Mobile Phone Network / DE, GB
Electronic Blitz / Glimmerglass Networks / 2011 / Brochure / GLIMMERGLASS NETWORKS, Network Recording, Deep Packet Inspection, Mass Monitoring, Internet Monitoring, Fiber-optic Interception, Strategic Interception / - / US
Electronic Surveillance, Counter-Surveillance & RF Jamming / Eskan / 2011 / Brochure / ESKAN, Audio Forensics, Cell Phone Detection, Location Tracking, Tactical Interception Devices, Covert Surveillance Devices / - / GB
Electronic Warfare: COMINT + COMMS/ESM Intelligence Generation & Fusion Systems / MEDAV / 2009 / Presentation / MEDAV, COMINT / - / -
Enabling Seucire Internet OperationsION Internet Operations Network / NTREPID / 2011 / Brochure / NTREPID, OSINT, Social Network Analysis / - / US
Evident / ETIgroup / 2011 / Catalogue / ETIGROUP, Analysis Software, COMINT, Data Retention, Data Mining, Deep Packet Inspection, Internet Monitoring, Lawful Interception, SOFTWARE / - / DK, GB, US
Examining SSL-Encrypted Communiations / Metronome / 2011 / Brochure / METRONOME, COMINT, Deep Packet Inspection, Mass Monitoring, SSL, PRODUCT, HARDWARE / - / US, GB, MY, ZA, CN
Exploits for Law Enforcement / VuPen / 2011 / Brochure / VUPEN, Exploits / - / FR
Facebook Relations Analysis Target Profiling Genesi Platform / IPS Intelligence / - / Brochure / IPS INTELLIGENCE, Analysis Software, Social Network Analysis / Facebook / IT
Famille de produits Observer / ELEXO / - / Brochure / ELEXO / - / FR
FCO Services: Secure Mobile Solutions / FCO Services / 2011 / Brochure / FCO SERVICES, FCO SERVICES SECURE MOBILE SOLUTIONS / - / GB
Finfisher FINFly ISP 2.0 Infrastructure Product Training / Gamma / 2010 / Training Material / GAMMA, Trojans, Strategic Infection / Internet Usage / DE, GB
FinFisher Pricing / Dreamlab / 2011 / Pricelist / DREAMLAB, Trojans, Strategic Infection / Internet Usage / CH, DE, GB