{"id":16673,"date":"2016-06-24T04:00:29","date_gmt":"2016-06-24T09:00:29","guid":{"rendered":"http:\/\/hcstx.org\/?p=16673"},"modified":"2016-06-24T04:00:29","modified_gmt":"2016-06-24T09:00:29","slug":"espionage-files-surveillance-for-hire-in-africa","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2016\/06\/24\/espionage-files-surveillance-for-hire-in-africa\/","title":{"rendered":"Espionage Files: Surveillance For Hire In Africa"},"content":{"rendered":"<p class=\"graf--p graf-after--p\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-large wp-image-16674\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2016\/06\/africa.jpeg?w=620\" alt=\"AFRICA\" width=\"620\" height=\"428\" \/><\/p>\n<p id=\"8c2a\" class=\"graf--p graf-after--p\">In July 2012, one year after the Arab Spring shook Arab regimes around the world, an email appeared in the inbox of Mamfakinch, a Moroccan online publication critical of the government.<\/p>\n<p id=\"45fc\" class=\"graf--p graf-after--p\">Under the subject line \u201c<em class=\"markup--em markup--p-em\">d\u00e9nonciation\u201d\u200a\u2014\u200a<\/em>French for \u201cdenunciation\u201d\u200a\u2014\u200awas a single sentence. \u201cPlease don\u2019t use my name or anything else, I don\u2019t want any trouble.\u201d And under that, a link to what appeared to be a Word document with the name \u201cscandale(2).doc.\u201d<\/p>\n<p id=\"bda0\" class=\"graf--p graf-after--p\">But instead of insider information about corrupt government officials, the file turned out to be malware, as the Canadian NGO Citizen Lab <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/citizenlab.org\/2012\/10\/backdoors-are-forever-hacking-team-and-the-targeting-of-dissent\/\">later determined<\/a>after Mamfakinch\u2019s staff got suspicious and and contacted experts.<\/p>\n<div class=\"section-inner layoutSingleColumn\">\n<p id=\"1b80\" class=\"graf--p graf-after--figure\">Reverse-engineering the malware, Citizen Lab concluded that Mamfakinch had fallen victim to a sophisticated cyber attack, likely at the hands of Morocco\u2019s intelligence service.<\/p>\n<p id=\"a3ec\" class=\"graf--p graf-after--p\">A year later in December 2013, a similar attack <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/www.hrw.org\/news\/2015\/08\/13\/ethiopia-hacking-team-lax-evidence-abuse\">targeted<\/a> the Ethiopian Satellite Television Service, an opposition media network based in the United States. Two journalists were contacted via Skype from the account of a former collaborator. The sender tried to get the reporters to download malware disguised as a Word file.<\/p>\n<p id=\"e6fc\" class=\"graf--p graf-after--p\">The software would have allowed the attacker to completely take over any compromised computer.<\/p>\n<p id=\"680b\" class=\"graf--p graf-after--p\">Even <a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/www.privacyinternational.org\/sites\/default\/files\/Uganda_Report_1.pdf\">more aggressive<\/a> was the strategy of the Ugandan police and secret service during the run-up to and aftermath of the presidential elections 2011. Privacy International, a human rights organization, detailed in a report how the agencies created fake wireless networks in parliament and hotels frequented by the opposition and used blackmail and bribery to install malware on smartphone and computers.<\/p>\n<\/div>\n<div class=\"section-inner sectionLayout--outsetRow\">\u00a0Read the Remainder at <strong><a href=\"https:\/\/warisboring.com\/private-companies-are-helping-african-governments-spy-on-their-own-people-6545d30b1107?mc_cid=39db86371b&amp;mc_eid=1149a36069#.jw39wguch\">War is Boring<\/a><\/strong><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In July 2012, one year after the Arab Spring shook Arab regimes around the world, an email appeared in the inbox of Mamfakinch, a Moroccan online publication critical of the government. Under the subject line \u201cd\u00e9nonciation\u201d\u200a\u2014\u200aFrench for \u201cdenunciation\u201d\u200a\u2014\u200awas a single sentence. \u201cPlease don\u2019t use my name or anything else, I don\u2019t want any trouble.\u201d And&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[2711,5406,3140,74,4445,1317,4912,4126,2908,1725,6051,6265,10384,4880,3712],"tags":[12455,12456,12457,12458,1839,3913],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/16673"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=16673"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/16673\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=16673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=16673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=16673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}