You are on page 1of 48

The Spyfiles

The Spy Files, files released so far... 287 The Spy Files Index pages Main List Articles Document Type Brochure Catalogue Contract Manual Newsletter Paper Presentation Pricelist Video Company Name ABILITY ADAE - Authority for the Assurance of Communication Security and Privacy (Greece) ALCATEL-LUCENT ALTRON

AQSACOM ATIS ATIS Systems GmbH AcmePacket Agnitio Amesys Atis Uher BEA BLUECOAT CCT Cecratech CELLEBRITE CLEARTRAIL COBHAM CRFS CRYPTON-M Cambridge Consultants DATAKOM DATONG DETICA DREAMLAB Delta SPA Dialogic DigiTask EBS Electronic ELAMAN ELTA ETIGROUP ETSI ETSI TC LI ETSI TC-LI EVIDIAN Endace Expert System FOXIT GRIFFCOMM GROUP2000

GTEN GUIDANCE Glimmerglass HP HackingTeam INNOVA SPA INVEATECH IPOQUE IPS Kapow Software LOQUENDO Mantaro Medav NETI NEWPORT NETWORKS NICE NICE Systems NetOptics NetOptics Inc. NetQuest Netronome Nokia Siemens Networks Ntrepid OXYGEN OnPath PACKETFORENSICS PAD PALADION PANOPTECH PLATH Phonexia Pine Digital Security Protei QOSMOS RETENTIA SEARTECH

SHOGI SIEMENS SPEI SS8 STRATIGN Scan & Target Septier Septier Communication Ltd. Simena Speech Technology Center TRACESPAN Thales Utimaco Utimaco Safeware AG VUPEN Security VasTech telesoft Service Product ADSL Interception Analysis Software Audio / Video digital recorder Audio Receiver Audio Surveillance Audio Transmitter Capture and Recording of All Traffic Cellphone Forensic Counter Surveillance DR Data Retention Detection Encryption Exploits Fibre Interception GPS Tracker GPS Tracking Software

GSM Tactical Interception GSM Transceiver IP DR IP LI IT security & forensic Incident Response Intelligence Analysis Software Jammer Systems LI LI DR LI DR DPI ISS Lawful Interception Monitoring Monitoring Center Monitoring Systems PDA Tracking Software Passive Surveillance RCS Trojan Receiver Recording Recoring Satellite Interception Session Border Control Social Network Analysis Software Speech Recognition Storage Strategic / Tactical Interception Monitoring Strategic Internet Monitoring & Recording Strategic Surveillance / Recording TCSM TROJAN TSU training equipment schedule Tactical Tactical Audio Microphone Tactical Audio Receiver Transmitter Tactical Audio Recorder

Tactical Audio Transmitter Tactical Audio Video recorder Tactical Camcorder Tactical Covert Audio Transmitter over GSM Tactical Covert Digitl Audio Recorder Tactical Covert GPS Tracker Tactical Covert Microphone Tactical Digital Audio and Video Recorder Tactical GPS Audio Transmitter Tactical GPS Tracking Tactical GSM / 3G Interception Tactical GSM UMTS Satellite Wifi Interception Tactical Microphone Tactical Tracking Tactical Video recorder Tactitcal Tracking Tactitcal Transceiver for audio video Trojans VDSL Interceptor VIP protection Video Surveillance WIFI Intercept recorders surveillance vehicles tracking Tags ABILITY 3G GSM ACME Packet ADAE LI AGNITIO Speech Recognition ALTRON ALTRON AKOR-3 TCSM ALTRON AMUR Recording Interception ALTRON MONITORING ALTRON TRACKING

ALTRON WIFI AMESYS AMESYS ADSL Tactical AMESYS COMINT AMESYS STRAGEGIC MASSIVE AMESYS Strategic Interception AMESYS Targetlist AMESYS WIFI AQSACOM AQSACOM LI ATIS ATIS LI Audio Surveillance BEA BEA Tactical BLUECOAT CAMBRIDGECON COMINT CCT CELLEBRITE Mobile Forensic CLEARTRAIL COBHAM COBHAM Repeater COBHAM Tactical LI COMINT CRFS RFEYE CRYPTON-M Strategic Internet Traffic Monitoring Recording Cloud Computing Counter Surveillance DATAKOM LI DATONG DELTA SPA Satellite Interception DETICA DIGITASK DIGITASK LI IP DIGITASK Trojans DIGITASK WIFI

DPI DR DREAMLAB LI Detection EBS Electronic GPRS Tracking ELAMAN COMINT ELTA IAI Tactical GSM UMTS Satellite Wifi Interception ENDACE COMPLIANCE ETIGROUP LI ETSI EVIDIAN BULL EXPERT SYSTEM Analytics EXPERT SYSTEM Semantic Analytics Encryption FOXIT FoXReplay Analytics Software FOXIT FoxReplay Covert Analytics Software FOXIT FoxReplay Personal Workstation Analysis Software FOXIT FoxReplay Workstation Protection Analysis Software Forensics GLIMMERGLASS GLIMMERGLASS SIGINT GLIMMERGLASS Strategic / Tactical Interception Monitoring GRIFFCOMM GPS Tracker Tactical GRIFFCOMM Recording GRIFFCOMM Tactical Audio GRIFFCOMM Tactical Audio Microphone GRIFFCOMM Tactical Audio Transmitter GRIFFCOMM Tactical Audio Transmitter Receiver GRIFFCOMM Tactical Audio Video GRIFFCOMM Tactical Audio Video Recorder GRIFFCOMM Tactical Audio Video Transceiver GRIFFCOMM Tactical Camcorder GRIFFCOMM Tactical Covert Microphone GRIFFCOMM Tactical GPS Tracking GRIFFCOMM Tactical Microphone GRIFFCOMM Tactical Tracking GPS

GRIFFCOMM Tactical Video recorder GUIDANCE Incident Response HACKINGTEAM RCS TROJAN HACKINGTEAM TROJAN HP Hewlett Packard LI Monitoring DR DPI ISS INNOVA SPA TACTICAL INTREPID Analytics INTREPID OSI INVEATECH LI IP IP Interception IPOQUE DPI IPS IPS Monitoring IT security & forensic Intelligence Interception Jammer Systems KAPOW OSINT LI LI ALCATEL-LUCENT LI DR LI ETSI LI IP LI Monitoring LOQUENDO Speech Recognition MANTARO COMINT MEDAV MONITORING Mobile Mobile Forensic Monitoring Monitoring Systems NETOPTICS COMINT NETOPTICS LI NETQUEST LI NETRONOME Monitoring

NEWPORT NETWORKS LI NEWPORT NETWORKS VOIP NICE NICE Monitoring ONPATH LI PACKETFORENSICS PAD PAD Tactical GPS Audio Transmitter PAD Tactical GPS Tracking Audio Transmitter PALADION PANOPTECH PHONEXIA Speech Recognition PLATH Profiling QOSMOS COMINT QOSMOS DPI QOSMOS Identification QOSMOS Monitoring RAYTHEON SCAN&TARGET Analytics SEARTECH TACTICAL AUDIO TRANSMITTER SEARTECH TACTICAL RECEIVER SEPTIER LI SHOGI GSM Interception SIEMENS Monitoring Center SIGINT SIMENA LI SMS SPEI GPS Tracking Software SPEI Tactical Audio Transmitter SPEI Tactical Receiver SPEI Tactical Tracking GPS SPEI Tactical Transceiver SPEI Tracking Software SS8 IP Interception SS8 Intelligence Analysis Software SS8 Social Network Analysis Software

STC Speech Recognition STRATIGN Strategic Interception TELESOFT DR TELESOFT IP INTERCEPT THALES Strategic Monitoring TRACESPAN TRACESPAN FIBRE INTERCEPTION TRACESPAN Monitoring TROJANS TSU training equipment schedule Targeting UTIMACO DR UTIMACO LI UTIMACO LI DPI UTIMACO LI Monitoring VASTECH Strategic Interception / Recording / Monitoring VASTECH ZEBRA VIP protection VOIP VUPEN EXPLOITS TROJANS Video Surveillance recorders surveillance vehicles tracking by Date of Document unspecified 2006 2007 2008 2009 2010 2011 by Date of Release 2011-12-01

Our Partners OWNI Bureau of Investigative Journalism Privacy International L'Expresso La Repubblica ARD The Hindu

Translations

[fr] Wikileaks : Un monde sous surveillance


More articles ...

- The Spyfiles - The Map

WikiLeaks: The Spy Files Mass interception of entire populations is not only a reality, it is a secret new industry spanning 25 countries It sounds like something out of Hollywood, but as of today, mass interception systems, built by Western intelligence contractors, including for political opponents are a reality. Today WikiLeaks began releasing a database of hundreds of documents from as many as 160 intelligence contractors in the mass surveillance industry. Working with Bugged Planet and Privacy International, as well as media organizations form six countries ARD in Germany, The Bureau of Investigative Journalism in the UK, The Hindu in India, LEspresso in Italy, OWNI in France and the Washington Post in the U.S. Wikileaks is shining a light on this secret industry that has boomed since September 11, 2001 and is worth billions of dollars per year. WikiLeaks has released 287 documents today, but the Spy Files project is ongoing and further information will be released this week and into next year. International surveillance companies are based in the more

technologically sophisticated countries, and they sell their technology on to every country of the world. This industry is, in practice, unregulated. Intelligence agencies, military forces and police authorities are able to silently, and on mass, and secretly intercept calls and take over computers without the help or knowledge of the telecommunication providers. Users physical location can be tracked if they are carrying a mobile phone, even if it is only on stand by. But the WikiLeaks Spy Files are more than just about good Western countries exporting to bad developing world countries. Western companies are also selling a vast range of mass surveillance equipment to Western intelligence agencies. In traditional spy stories, intelligence agencies like MI5 bug the phone of one or two people of interest. In the last ten years systems for indiscriminate, mass surveillance have become the norm. Intelligence companies such as VASTech secretly sell equipment to permanently record the phone calls of entire nations. Others record the location of every mobile phone in a city, down to 50 meters. Systems to infect every Facebook user, or smart-phone owner of an entire population group are on the intelligence market. Selling Surveillance to Dictators When citizens overthrew the dictatorships in Egypt and Libya this year, they uncovered listening rooms where devices from Gamma corporation of the UK, Amesys of France, VASTech of South Africa and ZTE Corp of China monitored their every move online and on the phone. Surveillance companies like SS8 in the U.S., Hacking Team in Italy and Vupen in France manufacture viruses (Trojans) that hijack individual computers and phones (including iPhones, Blackberries and Androids), take over the device, record its every use, movement, and even the sights and sounds of the room it is in. Other companies like Phoenexia in the Czech Republic collaborate with the military to create speech analysis tools. They identify individuals by gender, age and stress levels and track them based on voiceprints. Blue Coat in

the U.S. and Ipoque in Germany sell tools to governments in countries like China and Iran to prevent dissidents from organizing online. Trovicor, previously a subsidiary of Nokia Siemens Networks, supplied the Bahraini government with interception technologies that tracked human rights activist Abdul Ghani Al Khanjar. He was shown details of personal mobile phone conversations from before he was interrogated and beaten in the winter of 2010-2011. How Mass Surveillance Contractors Share Your Data with the State In January 2011, the National Security Agency broke ground on a $1.5 billion facility in the Utah desert that is designed to store terabytes of domestic and foreign intelligence data forever and process it for years to come. Telecommunication companies are forthcoming when it comes to disclosing client information to the authorities - no matter the country. Headlines during Augusts unrest in the UK exposed how Research in Motion (RIM), makers of the Blackberry, offered to help the government identify their clients. RIM has been in similar negotiations to share BlackBerry Messenger data with the governments of India, Lebanon, Saudi Arabia, and the United Arab Emirates. Weaponizing Data Kills Innocent People There are commercial firms that now sell special software that analyze this data and turn it into powerful tools that can be used by military and intelligence agencies. For example, in military bases across the U.S., Air Force pilots use a video link and joystick to fly Predator drones to conduct surveillance over the Middle East and Central Asia. This data is available to Central Intelligence Agency officials who use it to fire Hellfire missiles on targets.

The CIA officials have bought software that allows them to match phone signals and voice prints instantly and pinpoint the specific identity and location of individuals. Intelligence Integration Systems, Inc., based in Massachusetts - sells a location-based analytics software called Geospatial Toolkit for this purpose. Another Massachusetts company named Netezza, which bought a copy of the software, allegedly reverse engineered the code and sold a hacked version to the Central Intelligence Agency for use in remotely piloted drone aircraft. IISI, which says that the software could be wrong by a distance of up to 40 feet, sued Netezza to prevent the use of this software. Company founder Rich Zimmerman stated in court that his reaction was one of stun, amazement that they (CIA) want to kill people with my software that doesnt work." Orwells World Across the world, mass surveillance contractors are helping intelligence agencies spy on individuals and communities of interest on an industrial scale. The Wikileaks Spy Files reveal the details of which companies are making billions selling sophisticated tracking tools to government buyers, flouting export rules, and turning a blind eye to dictatorial regimes that abuse human rights. How to use the Spy Files To search inside those files, click one of the link on the left pane of this page, to get the list of documents by type, company date or tag. To search all these companies on a world map use the following tool from Owni

from the hindu NEWSINTERNATIONAL

LONDON,December 2, 2011

Big Brother is everywhere now


HASAN SUROOR
SHARECOMMENT(11)PRINTT+

AP

WikiLeaks founder Julian Assange during a news conference in central London, on

Thursday.

How many of you here have an iPhone, a Blackberry or any other mobile device?'' WikiLeaks founder Julian Assange asked surveying a hall full of people at the City University here on Thursday. As hand after hand went up, he told them that everyone of them, irrespective of what kind of mobile device they carried, was a potential target of spying.

This was how stark the threat from a booming multi-billion dollar global mass surveillance industry was, Mr. Assange said as he released a cache of 287 files providing a rare glimpse into how the industry was operating without any checks.

The Spy Files, spanning 25 countries, are first of a series of sensitive data that WikiLeaks plans to publish in coming months.

Working with Bugged Planet and Privacy International, as well as media organisations from six countries ARD in Germany, The Bureau of Investigative Journalism in the UK, The Hindu in India, L'Espresso in Italy, OWNI in France and the Washington Post in the U.S. Wikileaks is shining a light on this secret industry that has boomed since September 11, 2001 and is worth billions of dollars per year. WikiLeaks has released 287 documents today [Thursday], but the Spy Files project is ongoing and further information will be released this week and into next year,'' Mr. Assange said at a crowded press conference.

N. Ram, Editor-in-Chief of The Hindu, speaking through a video-link, expressed concern over a fast growing and completely unregulated surveillance industry in India. At least two Indian companies were selling surveillance technology without any regulation.

We are very concerned about our privacy violations,'' he said.

Mr. Ram said that working with WikiLeaks had been a very valuable experience. The issue highlighted by WikiLeaks was of great international significance'' and of significance to India.

Mr. Assange said that it might sound like something out of Hollywood but mass interception systems built by Western intelligence contractors'' were a reality. Over the past decade, the surveillance industry had grown from a covert operation which primarily supplied equipment to government intelligence agencies such as the NSA in America and Britain's GCHQ, into a huge transnational business.

Dramatically illustrating the threat, Mr. Assange said that potentially everyone who carried any mobile device was a sitting duck for anyone wanting to spy on them. The threat to investigative journalism from these new and covert surveillance techniques was particularly dire.

The only way we are going to win this war is by developing counter-

surveillance systems,'' he said.

WikiLeaks, which itself has been a victim of surveillance by intelligence agencies and their proxies and has had its site hacked, is in the process of developing a more secure system to submit information to the site.

Mr. Assange said that international surveillance companies were based in the more technologically sophisticated countries, and sold their technology to every country of the world. Intelligence agencies, military forces and police authorities were able to silently and secretly intercept calls and take over computers without the help or knowledge of the telecommunication providers.

Experts who worked on the files called for new laws to regulate export of surveillance technology.

Western governments cannot stand idly by while this technology is still being sold, said Eric King of the Privacy International campaign group.

Jacob Appelbaum, a computer expert at the University of Washington, said the systems revealed in the files were as deadly as murder weapons.

These systems have been sold by Western companies to places for example like Syria, and Libya and Tunisia and Egypt. These systems are used to hunt people down and to murder, he said, while Pratap Chatterjee of the Bureau of Investigative Journalism said a French firm offered to sell such systems to the erstwhile Qadhafi regime to spy on dissidents living in Britain.

Mr. Assange warned that with entire populations being subjected to surveillance nobody anywhere in the world was safe anymore.

In traditional spy stories, intelligence agencies like MI5 bug the phone of one or two people of interest. In the last 10 years systems for indiscriminate, mass surveillance have become the norm. Intelligence companies such as VASTech secretly sell equipment to permanently record the phone calls of entire nations. Others record the location of every mobile phone in a city, down to 50 metres. Systems to infect every Facebook user, or smart-phone owner of an entire population group are on the intelligence market,'' said a statement on official WikiLeaks Spy Files site.

Keywords: The Hindu, WikiLeaks, SpyFiles, espionage technologies, spying on citizens, CCISat, Indian spy satellite

List of documents > Document Type > Brochure


page 1/3 - Previous - 1 - 2 - 3 - Next

Document Title

Comp any

Doc ume nt Typ e Broc hure

Date

7 8

Lawful Interc eption is O ur Business

AQSA COM

unsp ecifie d unsp ecifie d unsp ecifie d

7 9

Standards -Bas ed Lawful Interception from AQSACOM

AQSA COM

Broc hure

8 0

3G Interc eption / GSM Inbetween Interception System

ABILIT Y ALC A TELLU C E NT ALTR ON

Broc hure

8 1

A lc atel- Luc ent 1357 U LIS Unified Lawful Interception Suite

Broc hure

2008 -01

8 2

A K O R - 3 A ut omat ed r adi o emis s ion s our c e and bug detection system EAGLE EYE-IP TAP Passive Network Application / Platform for Lawful Interception and Network Monitoring EAGLE EYE-MC Next Generation Produc t for Homeland Security and Law Enforcement Agencies EAGLE EYE- Wi-Fi System for

Broc hure

2011 -01

8 4

ALTR ON

Broc hure

2011 -01

8 5

ALTR ON

Broc hure

2011 -01

ALTR

Broc

2011

8 4

EAGLE EYE-IP TAP Passive Network Application / Platform for Lawful Interception and Network Monitoring EAGLE EYE-MC Next Generation Produc t for Homeland Security and Law Enforcement Agencies EAGLE EYE- Wi-Fi System for Wireless Tactical Packet Sniffing and Forensics Analysis GSM/UMTS Grabber: Deploying local mobile networks and secret grabbing of identific ation information in GSM and UMTS bands Altrons N a v i t r o n G P S Mo n i t o r i n g System RADIUS A5/1 Fully Passive Offthe-Air G SM Interc epting System Wounding Detection System

ALTR ON

Broc hure

2011 -01

8 5

ALTR ON

Broc hure

2011 -01

8 6

ALTR ON

Broc hure

2011 -01

8 7

ALTR ON

Broc hure

2011 -01

8 8 8 9 9 0 9 1 9 4

ALTR ON ALTR ON ALTR ON ALTR ON Ames ys

Broc hure Broc hure Broc hure Broc hure Broc hure

2011 -01 2011 -01 2011 -01 2011 -01 unsp ecifie d unsp ecifie d unsp ecifie

C ASPER -T Wi-Fi N etw ork Interception

9 5

Critical System Architect

Ames ys

Broc hure

Cryptowall Mail Protect L

Ames

Broc

9 4

C ASPER -T Wi-Fi N etw ork Interception

Ames ys

Broc hure

unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie

9 5

Critical System Architect

Ames ys

Broc hure

9 6

Cryptowall Mail Protect L

Ames ys

Broc hure

9 7

Cryptowall PC-Protect Profes s ional ED . (MultiVolumes): L

Ames ys

Broc hure

9 8 1 0 1 1 0 2 1 0 3 1 0 4 1 0 6 1 0

DUMB-0 E-Mail Interceptor

Ames ys

Broc hure

SMINT - Tactical Interception Based on Eagle Core Technology GLINT - Strategic Nationwide Interception Based on Eagle Core Technology NETTAP ADSL Passive nonintrusive ADSL Tapping Probe on a analog line NETTAP ADSL Sonde Passive D

Ames ys

Broc hure

Ames ys

Broc hure

Ames ys

Broc hure

Ames ys

Broc hure

Wide band HF VME reception unit

Ames ys

Broc hure

RHF VME-TA 1,5-30 Mhz HF

Ames

Broc

1 0 4 1 0 6 1 0 7 1 1 0 1 1 1 1 1 2 1 1 3 1 1 4 1 1 5 1 1 6 1

NETTAP ADSL Sonde Passive D

Ames ys

Broc hure

unsp ecifie d unsp ecifie d unsp ecifie d 2011 -01 unsp ecifie d 2011 -10

Wide band HF VME reception unit

Ames ys

Broc hure

RHF VME-TA 1,5-30 Mhz HF receiver

Ames ys CELL EBRIT E C LEA RTRAI L COBH AM

Broc hure

UFED Logical: Comprehensive Mobile Forensic Solution

Broc hure

Tactical Interception

Broc hure

Cobham Tactical Communications and Surveillance

Broc hure

DTC Video Microwave Digital TX

COBH AM

Broc hure

2011 -10

NETLink Storm Robust Store and Forward Solution

COBH AM

Broc hure

2011 -10

Tactical C4I Systems - Close Combat Radio (CCR) Delivering intelligence solutions to military, federal, security and law enforc ement agenc ies worldwide

COBH AM

Broc hure

2011 -10

DATO NG

Broc hure

2011 -10

E B S

1 1 5 1 1 6 1 1 9 1 2 0 1 2 1 1 2 3 1 2 5 1 2 6 1 2 7 1 2 8 1

Tactical C4I Systems - Close Combat Radio (CCR) Delivering intelligence solutions to military, federal, security and law enforc ement agenc ies worldwide GPRSpack V2 Kurzbeschreibung mit Preisliste

COBH AM

Broc hure

2011 -10

DATO NG

Broc hure

2011 -10

E B S Elec tr onic E B S Elec tr onic E B S Elec tr onic EVID I AN GRIFF COM M GRIFF COM M GRIFF COM M GRIFF COM M GRIFF

Broc hure

2006 -12

GPRSpack V2 Kurzbeschreibung mit Preisliste

Broc hure

2007 -12

GPRSpack V2 Kurzbeschreibung mit Preisliste

Broc hure

2008 -06

Ev idian Identity & Ac c es s Manager

Broc hure

2011 -10

BAM: Body worn Array Microphone

Broc hure

2008 -06

Eage 8B/8C/8D/8E Digital Audio Recorder

Broc hure

2008 -06

FLEX8F Smallest Audio Digital Recorders Available

Broc hure

2008 -06

Falcon4: Smallest Audio and Video digital recorder GPS-212G / GPS-232G Real

Broc hure

2008 -06

1 2 7 1 2 8 1 2 9 1 3 0 1 3 1 1 3 2 1 3 3 1 3 4 1 3 5 1 3 6 1 3

FLEX8F Smallest Audio Digital Recorders Available

GRIFF COM M GRIFF COM M GRIFF COM M GRIFF COM M GRIFF COM M GRIFF COM M GRIFF COM M GRIFF COM M GRIFF COM M GRIFF COM M GRIFF COM

Broc hure

2008 -06

Falcon4: Smallest Audio and Video digital recorder GPS-212G / GPS-232G Real Time High Sensitivity GPS Trackers GPS 210-GA real-time tracking system

Broc hure

2008 -06

Broc hure

2008 -06

Broc hure

2008 -06

Hawk8A Audio and Video digital recorder

Broc hure

2008 -06

MAT Microphone Array Tile

Broc hure

2008 -06

Nanoc am: Small digital camcorder

Broc hure

2008 -06

Nautilus Octagonal Microphone Array

Broc hure

2008 -06

N J ALA Audio Surv eillanc e Transmitter

Broc hure

2008 -06

Puma: Bac k up for ADS embedded Flash to DVD or CD

Broc hure

2008 -06

R711 Audio Transmitter over

Broc

2008

1 3 5 1 3 6 1 3 7 1 3 8 1 3 9

N J ALA Audio Surv eillanc e Transmitter

GRIFF COM M GRIFF COM M GRIFF COM M GRIFF COM M GRIFF COM M

Broc hure

2008 -06

Puma: Bac k up for ADS embedded Flash to DVD or CD

Broc hure

2008 -06

R711 Audio Transmitter over GSM

Broc hure

2008 -06

Taven: Solid State Audio/Video reocrder from ADS

Broc hure

2008 -06

Scorpion: Digital Stereo Audio System

Broc hure

2008 -06

The Spy Files


On Thursday, December 1st, 2011 WikiLeaks began publishing The Spy Files, thousands of pages and other materials exposing the global mass surveillance industry

List of documents > Document Type > Manual


page 1/2 - Previous - 1 - 2 - Next

Document Title

Com pany

Doc ume nt Typ e Man ual

Date

9 9

Eagle GLINT Operator Manual Version 1.0

Ames ys

unsp ecifie d

Document Title

Com pany

ume nt Typ e Man ual

Date

9 9 1 0 0 1 0 9 1 1 8 1 5 2 1 5 4 1 5 5 2 1 0 2 1 1 2 1

Eagle GLINT Operator Manual Version 1.0 Extracts from the EAGLE GLINT Operator Manual with more details UKSP protocol configuration on BE16UK

Ames ys

unsp ecifie d unsp ecifie d 2006 -07

Ames ys

Man ual

BEA

Man ual

GPRSpack Bedienungsanleitung

EBS Electr onic

Man ual

2006 -06

Programming Manual Mobiloc 4

PAD

Man ual

2011 -01

SMS Befehle an diverse PAD Ger SMS Nachrichten zur Steuerung der Mikrofoneinstellungen im GSM96MMS2b Blue Coat Sy s tems SG 200 Series Installation Guide

PAD

Man ual

2011 -01

PAD

Man ual

2011 -01 unsp ecifie d unsp ecifie d unsp ecifie

BLU ECO AT BLU ECO AT BLU ECO

Man ual

Blue Coat Sy s tems SG 510 Series Installation Guide

Man ual

Blue Coat Sy s tems SG 810

Man

2 1 0 2 1 1 2 1 2 2 1 3 2 1 4 2 1 5 2 1 6 2 1 7 2 1 8 2 1 9 2 2

Blue Coat Sy s tems SG 200 Series Installation Guide

BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO

Man ual

unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie

Blue Coat Sy s tems SG 510 Series Installation Guide

Man ual

Blue Coat Sy s tems SG 810 Series Installation Guide

Man ual

Blue Coat Systems 8100 Series Installation Guide

Man ual

Blue Coat SG8100 Quick Start Guide

Man ual

Blue Coat SG510 Quick Start Guide Blue Coat Systems ProxySG Appliance SGOS 5.3.x Upgrade Guide Blue Coat Systems Reporter Configuraton and Managament Guide Blue Coat SG200 Quick Start Guide

Man ual

Man ual

Man ual

Man ual

Blue Coat Systems Reference Guide SSL Proxy

Man ual

Blue Coat Systems Reference

Man

2 1 8 2 1 9 2 2 0 2 2 1 2 2 2 2 2 3 2 2 4 2 2 5 2 2 6 2 2 7 2 2

Blue Coat SG200 Quick Start Guide

BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO

Man ual

unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie

Blue Coat Systems Reference Guide SSL Proxy

Man ual

Blue Coat Systems Reference Guide WCCP Reference Guide Blue Coat Systems ProxySG C ommand Line Interfac e Reference 3.2.7 Blue Coat Systems ProxySG C ommand Line Interfac e Reference 4.1.3 Blue Coat Systems ProxySG C ommand Line Interfac e Reference 4.2.3 Blue Coat Systems ProxySG Configuration and Management Guide 3.2.7 Blue Coat Systems ProxySG Configuration and Management Guide 4.1.1 Blue Coat Systems ProxySG Configuration and Management Guide 4.1.4 Blue Coat Systems ProxySG Configuration and Management Guide 4.2.3 Blue Coat Systems ProxySG Configuration and Management

Man ual

Man ual

Man ual

Man ual

Man ual

Man ual

Man ual

Man ual

Man

2 2 6 2 2 7 2 2 8 2 2 9 2 3 0 2 3 1 2 3 2 2 3 3 2 3 4 2 3 5 2 3

Blue Coat Systems ProxySG Configuration and Management Guide 4.1.4 Blue Coat Systems ProxySG Configuration and Management Guide 4.2.3 Blue Coat Systems ProxySG Configuration and Management Guide 4.2.4.1 Blue Coat Systems ProxySG Configuration and Management Guide 4.2.5 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.1 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.10 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.11 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.12 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.2 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.3 Blue Coat Systems ProxySG Configuration and Management

BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO

Man ual

unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie

Man ual

Man ual

Man ual

Man ual

Man ual

Man ual

Man ual

Man ual

Man ual

Man

2 3 4 2 3 5 2 3 6 2 3 7 2 3 8 2 3 9 2 4 0 2 4 1 2 4 2 2 4 3 2 4

Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.2 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.3 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.4 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.5 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.6 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.7 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.8 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.9 Blue Coat Systems ProxySG Content Policy Language Guide 3.2.7 Blue Coat Systems ProxySG Content Policy Language Guide 4.1.4 Blue Coat Systems ProxySG Content Policy Language Guide

BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO

Man ual

unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie

Man ual

Man ual

Man ual

Man ual

Man ual

Man ual

Man ual

Man ual

Man ual

Man

2 4 2 2 4 3 2 4 4 2 4 5 2 4 6 2 4 7 2 4 8 2 4 9 2 5 0 2 5 1 25

Blue Coat Systems ProxySG Content Policy Language Guide 3.2.7 Blue Coat Systems ProxySG Content Policy Language Guide 4.1.4 Blue Coat Systems ProxySG Content Policy Language Guide 4.2.1 Blue Coat Systems ProxySG Content Policy Language Guide 4.2.3 Blue Coat Systems Deployment Guide Deploying the SSL Proxy for SGOS 5.1.4 Blue Coat Systems Proxy SG SGOS 4.x Upgrade Guide

BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT

Man ual

unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d

Man ual

Man ual

Man ual

Man ual

Man ual

Blue Coat Systems Proxy SG SGOS 4.x Upgrade Guide Blue Coat Systems Proxy SG Appliance Blue Coat SGOS 5.2.x. Upgrade Guide Blue Coat Systems Proxy SG Appliance SGOS 5.x Upgrade Guide Blue Coat Systems Proxy SG Appliance Configuration and Management Guide: Volume 10: Content Policy Language Guide

Man ual

Man ual

Man ual

Man ual

Blue Coat Systems SG Appliance Volume 11: Command

2 5 0 2 5 1 25 2

Blue Coat Systems Proxy SG Appliance SGOS 5.x Upgrade Guide Blue Coat Systems Proxy SG Appliance Configuration and Management Guide: Volume 10: Content Policy Language Guide

BLU ECO AT BLU ECO AT

Man ual

unsp ecifie d unsp ecifie d

Man ual

Blue Coat Systems SG Appliance Volume 11: Command Line Interface Reference

The Spy Files


On Thursday, December 1st, 2011 WikiLeaks began publishing The Spy Files, thousands of pages and other materials exposing the global mass surveillance industry

List of documents > Document Type > Contract


Co mpa ny Doc ume nt Typ e

Document Title

Date

1 0 5

Homeland Security Program Technical Specification - Public Safety Systems and Passport Network of The Great Libyan Arab Jamahiriya

Ame sys

Cont ract

unsp ecifie d

Document Title

Co mpa ny

ume nt Typ e

Date

1 0 5

Homeland Security Program Technical Specification - Public Safety Systems and Passport Network of The Great Libyan Arab Jamahiriya

Ame sys

Cont ract

unsp ecifie d

The Spy Files


On Thursday, December 1st, 2011 WikiLeaks began publishing The Spy Files, thousands of pages and other materials exposing the global mass surveillance industry

List of documents > Document Type > Newsletter


Doc ume nt Typ e N ew s lett er N ew s lett er

Document Title

Company

Date

2 7 4 2 7 6

Electronic Blitz: Intelligence ops are poised to gather, move and analyze more information than ever before

Glimmergla ss

2010 -04

You

PAC KETF O R EN SIC S

unsp ecifie d

2 7 4 2 7 6

Electronic Blitz: Intelligence ops are poised to gather, move and analyze more information than ever before

Glimmergla ss

N ew s lett er N ew s lett er

2010 -04

You

PAC KETF O R EN SIC S

unsp ecifie d

The Spy Files


On Thursday, December 1st, 2011 WikiLeaks began publishing The Spy Files, thousands of pages and other materials exposing the global mass surveillance industry

List of documents > Document Type > Catalogue


# Document Title Comp any Docu ment Type D at e 20 11 -0 1 20 08 -0 6 20 08 -0 6 20 08 -0 5

8 3

AMUR Rec ording of all communication from voice and data networks

A LT R ON

Catalo gue

1 0 8

BEA Tac tic al Interc eption Catalogue

BEA

Catalo gue

1 2 2

Neuvorstellungen zur GPEC 2008

E B S Electr onic

Catalo gue

1 2 4

Elaman Catalogue

ELAM AN

Catalo gue

1 2 2

Neuvorstellungen zur GPEC 2008

E B S Electr onic

Catalo gue

20 08 -0 6 20 08 -0 5 20 11 -0 1 20 11 -0 1 20 11 -0 1

1 2 4

Elaman Catalogue

ELAM AN

Catalo gue

1 4 6

IPS Visionary Intelligence

IPS

Catalo gue

2 7 5

Transparent Signal Access and Monitoring

Glimm erglas s

Catalo gue

2 7 8

Strategic Defence Technologies

STRA TIGN

Catalo gue

The Spy Files, files released so far... 287 The Spy Files Index pages Main List Document Type

Brochure Catalogue Contract Manual Newsletter Paper Presentation Pricelist Video

The Spy Files, les released so far... 287 The Spy Files

Index pages Main List Document Type Brochure Catalogue Contract Manual Newsletter Paper Presentation Pricelist Video Company Name ABILITY ADAE - Authority for the Assurance of Communication Security and

Privacy (Greece) ALCATEL-LUCENT ALTRON AQSACOM ATIS ATIS Systems GmbH AcmePacket Agnitio Amesys Atis Uher BEA BLUECOAT CCT Cecratech CELLEBRITE CLEARTRAIL COBHAM CRFS CRYPTON-M Cambridge Consultants DATAKOM DATONG DETICA DREAMLAB Delta SPA Dialogic DigiTask EBS Electronic ELAMAN ELTA ETIGROUP ETSI ETSI TC LI ETSI TC-LI EVIDIAN Endace Expert System

FOXIT GRIFFCOMM GROUP2000 GTEN GUIDANCE Glimmerglass HP HackingTeam INNOVA SPA INVEATECH IPOQUE IPS Kapow Software LOQUENDO Mantaro Medav NETI NEWPORT NETWORKS NICE NICE Systems NetOptics NetOptics Inc. NetQuest Netronome Nokia Siemens Networks Ntrepid OXYGEN OnPath PACKETFORENSICS PAD PALADION PANOPTECH PLATH Phonexia Pine Digital Security Protei

QOSMOS RETENTIA SEARTECH SHOGI SIEMENS SPEI SS8 STRATIGN Scan & Target Septier Septier Communication Ltd. Simena Speech Technology Center TRACESPAN Thales Utimaco Utimaco Safeware AG VUPEN Security VasTech telesoft Service Product ADSL Interception Analysis Software Audio / Video digital recorder Audio Receiver Audio Surveillance Audio Transmitter Capture and Recording of All Traffic Cellphone Forensic Counter Surveillance DR Data Retention Detection Encryption Exploits

Fibre Interception GPS Tracker GPS Tracking Software GSM Tactical Interception GSM Transceiver IP DR IP LI IT security & forensic Incident Response Intelligence Analysis Software Jammer Systems LI LI DR LI DR DPI ISS Lawful Interception Monitoring Monitoring Center Monitoring Systems PDA Tracking Software Passive Surveillance RCS Trojan Receiver Recording Recoring Satellite Interception Session Border Control Social Network Analysis Software Speech Recognition Storage Strategic / Tactical Interception Monitoring Strategic Internet Monitoring & Recording Strategic Surveillance / Recording TCSM TROJAN TSU training equipment schedule Tactical

Tactical Audio Microphone Tactical Audio Receiver Transmitter Tactical Audio Recorder Tactical Audio Transmitter Tactical Audio Video recorder Tactical Camcorder Tactical Covert Audio Transmitter over GSM Tactical Covert Digital Audio Recorder Tactical Covert GPS Tracker Tactical Covert Microphone Tactical Digital Audio and Video Recorder Tactical GPS Audio Transmitter Tactical GPS Tracking Tactical GSM / 3G Interception Tactical GSM UMTS Satellite Wifi Interception Tactical Microphone Tactical Tracking Tactical Video recorder Tactitcal Tracking Tactitcal Transceiver for audio video Trojans VDSL Interceptor VIP protection Video Surveillance WIFI Intercept recorders surveillance vehicles tracking Tags ABILITY 3G GSM ACME Packet ADAE LI AGNITIO Speech Recognition ALTRON ALTRON AKOR-3 TCSM

ALTRON AMUR Recording Interception ALTRON MONITORING ALTRON TRACKING ALTRON WIFI AMESYS AMESYS ADSL Tactical AMESYS COMINT AMESYS STRAGEGIC MASSIVE AMESYS Strategic Interception AMESYS Targetlist AMESYS WIFI AQSACOM AQSACOM LI ATIS ATIS LI Audio Surveillance BEA BEA Tactical BLUECOAT CAMBRIDGECON COMINT CCT CELLEBRITE Mobile Forensic CLEARTRAIL COBHAM COBHAM Repeater COBHAM Tactical LI COMINT CRFS RFEYE CRYPTON-M Strategic Internet Traffic Monitoring Recording Cloud Computing Counter Surveillance DATAKOM LI DATONG DELTA SPA Satellite Interception DETICA DIGITASK

DIGITASK LI IP DIGITASK Trojans DIGITASK WIFI DPI DR DREAMLAB LI Detection EBS Electronic GPRS Tracking ELAMAN COMINT ELTA IAI Tactical GSM UMTS Satellite Wifi Interception ENDACE COMPLIANCE ETIGROUP LI ETSI EVIDIAN BULL EXPERT SYSTEM Analytics EXPERT SYSTEM Semantic Analytics Encryption FOXIT FoXReplay Analytics Software FOXIT FoxReplay Covert Analytics Software FOXIT FoxReplay Personal Workstation Analysis Software FOXIT FoxReplay Workstation Protection Analysis Software Forensics GLIMMERGLASS GLIMMERGLASS SIGINT GLIMMERGLASS Strategic / Tactical Interception Monitoring GRIFFCOMM GPS Tracker Tactical GRIFFCOMM Recording GRIFFCOMM Tactical Audio GRIFFCOMM Tactical Audio Microphone GRIFFCOMM Tactical Audio Transmitter GRIFFCOMM Tactical Audio Transmitter Receiver GRIFFCOMM Tactical Audio Video GRIFFCOMM Tactical Audio Video Recorder GRIFFCOMM Tactical Audio Video Transceiver GRIFFCOMM Tactical Camcorder GRIFFCOMM Tactical Covert Microphone

GRIFFCOMM Tactical GPS Tracking GRIFFCOMM Tactical Microphone GRIFFCOMM Tactical Tracking GPS GRIFFCOMM Tactical Video recorder GUIDANCE Incident Response HACKINGTEAM RCS TROJAN HACKINGTEAM TROJAN HP Hewlett Packard LI Monitoring DR DPI ISS INNOVA SPA TACTICAL INTREPID Analytics INTREPID OSI INVEATECH LI IP IP Interception IPOQUE DPI IPS IPS Monitoring IT security & forensic Intelligence Interception Jammer Systems KAPOW OSINT LI LI ALCATEL-LUCENT LI DR LI ETSI LI IP LI Monitoring LOQUENDO Speech Recognition MANTARO COMINT MEDAV MONITORING Mobile Mobile Forensic Monitoring Monitoring Systems NETOPTICS COMINT

NETOPTICS LI NETQUEST LI NETRONOME Monitoring NEWPORT NETWORKS LI NEWPORT NETWORKS VOIP NICE NICE Monitoring ONPATH LI PACKETFORENSICS PAD PAD Tactical GPS Audio Transmitter PAD Tactical GPS Tracking Audio Transmitter PALADION PANOPTECH PHONEXIA Speech Recognition PLATH Profiling QOSMOS COMINT QOSMOS DPI QOSMOS Identification QOSMOS Monitoring RAYTHEON SCAN&TARGET Analytics SEARTECH TACTICAL AUDIO TRANSMITTER SEARTECH TACTICAL RECEIVER SEPTIER LI SHOGI GSM Interception SIEMENS Monitoring Center SIGINT SIMENA LI SMS SPEI GPS Tracking Software SPEI Tactical Audio Transmitter SPEI Tactical Receiver SPEI Tactical Tracking GPS SPEI Tactical Transceiver SPEI Tracking Software

SS8 IP Interception SS8 Intelligence Analysis Software SS8 Social Network Analysis Software STC Speech Recognition STRATIGN Strategic Interception TELESOFT DR TELESOFT IP INTERCEPT THALES Strategic Monitoring TRACESPAN TRACESPAN FIBRE INTERCEPTION TRACESPAN Monitoring TROJANS TSU training equipment schedule Targeting UTIMACO DR UTIMACO LI UTIMACO LI DPI UTIMACO LI Monitoring VASTECH Strategic Interception / Recording / Monitoring VASTECH ZEBRA VIP protection VOIP VUPEN EXPLOITS TROJANS Video Surveillance recorders surveillance vehicles tracking

You might also like