spy files great wall of wikileaks occupy london

Upload: mary-eng

Post on 06-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 Spy Files Great Wall of Wikileaks Occupy London

    1/48

    The Spyfiles

    The Spy Files,files released so far...287

    The Spy Files

    Index pages

    Main ListArticles

    Document Type

    BrochureCatalogueContractManual

    NewsletterPaper

    PresentationPricelistVideo

    Company Name

    ABILITYADAE - Authority for the Assurance of Communication Security and

    Privacy (Greece)ALCATEL-LUCENT

    ALTRON

    http://wikileaks.org/http://wikileaks.org/spyfiles/list/company-name/altron.htmlhttp://wikileaks.org/spyfiles/list/company-name/alcatel-lucent.htmlhttp://wikileaks.org/spyfiles/list/company-name/adae-authority-for-the-assurance-of-communication-security.htmlhttp://wikileaks.org/spyfiles/list/company-name/adae-authority-for-the-assurance-of-communication-security.htmlhttp://wikileaks.org/spyfiles/list/company-name/ability.htmlhttp://wikileaks.org/spyfiles/list/document-type/video.htmlhttp://wikileaks.org/spyfiles/list/document-type/pricelist.htmlhttp://wikileaks.org/spyfiles/list/document-type/presentation.htmlhttp://wikileaks.org/spyfiles/list/document-type/paper.htmlhttp://wikileaks.org/spyfiles/list/document-type/newsletter.htmlhttp://wikileaks.org/spyfiles/list/document-type/manual.htmlhttp://wikileaks.org/spyfiles/list/document-type/contract.htmlhttp://wikileaks.org/spyfiles/list/document-type/catalogue.htmlhttp://wikileaks.org/spyfiles/list/document-type/brochure.htmlhttp://wikileaks.org/spyfiles/list/releasedate/2011-12-01.htmlhttp://wikileaks.org/the-spyfiles.htmlhttp://wikileaks.org/http://wikileaks.org/
  • 8/3/2019 Spy Files Great Wall of Wikileaks Occupy London

    2/48

    AQSACOMATIS

    ATIS Systems GmbHAcmePacket

    AgnitioAmesysAtis Uher

    BEABLUECOAT

    CCT CecratechCELLEBRITECLEARTRAIL

    COBHAMCRFSCRYPTON-M

    Cambridge ConsultantsDATAKOMDATONGDETICA

    DREAMLABDelta SPA

    DialogicDigiTask

    EBS ElectronicELAMAN

    ELTAETIGROUP

    ETSIETSI TC LI

    ETSI TC-LIEVIDIANEndace

    Expert SystemFOXIT

    GRIFFCOMMGROUP2000

    http://wikileaks.org/spyfiles/list/company-name/acmepacket.htmlhttp://wikileaks.org/spyfiles/list/company-name/atis-systems-gmbh.htmlhttp://wikileaks.org/spyfiles/list/company-name/atis.htmlhttp://wikileaks.org/spyfiles/list/company-name/aqsacom.htmlhttp://wikileaks.org/spyfiles/list/company-name/group2000.htmlhttp://wikileaks.org/spyfiles/list/company-name/griffcomm.htmlhttp://wikileaks.org/spyfiles/list/company-name/foxit.htmlhttp://wikileaks.org/spyfiles/list/company-name/expert-system.htmlhttp://wikileaks.org/spyfiles/list/company-name/endace.htmlhttp://wikileaks.org/spyfiles/list/company-name/evidian.htmlhttp://wikileaks.org/spyfiles/list/company-name/etsi-tc-li.htmlhttp://wikileaks.org/spyfiles/list/company-name/etsi-tc-li.htmlhttp://wikileaks.org/spyfiles/list/company-name/etsi.htmlhttp://wikileaks.org/spyfiles/list/company-name/etigroup.htmlhttp://wikileaks.org/spyfiles/list/company-name/elta.htmlhttp://wikileaks.org/spyfiles/list/company-name/elaman.htmlhttp://wikileaks.org/spyfiles/list/company-name/ebs-electronic.htmlhttp://wikileaks.org/spyfiles/list/company-name/digitask.htmlhttp://wikileaks.org/spyfiles/list/company-name/dialogic.htmlhttp://wikileaks.org/spyfiles/list/company-name/delta-spa.htmlhttp://wikileaks.org/spyfiles/list/company-name/dreamlab.htmlhttp://wikileaks.org/spyfiles/list/company-name/detica.htmlhttp://wikileaks.org/spyfiles/list/company-name/datong.htmlhttp://wikileaks.org/spyfiles/list/company-name/datakom.htmlhttp://wikileaks.org/spyfiles/list/company-name/cambridge-consultants.htmlhttp://wikileaks.org/spyfiles/list/company-name/crypton-m.htmlhttp://wikileaks.org/spyfiles/list/company-name/crfs.htmlhttp://wikileaks.org/spyfiles/list/company-name/cobham.htmlhttp://wikileaks.org/spyfiles/list/company-name/cleartrail.htmlhttp://wikileaks.org/spyfiles/list/company-name/cellebrite.htmlhttp://wikileaks.org/spyfiles/list/company-name/cct-cecratech.htmlhttp://wikileaks.org/spyfiles/list/company-name/bluecoat.htmlhttp://wikileaks.org/spyfiles/list/company-name/bea.htmlhttp://wikileaks.org/spyfiles/list/company-name/atis-uher.htmlhttp://wikileaks.org/spyfiles/list/company-name/amesys.htmlhttp://wikileaks.org/spyfiles/list/company-name/agnitio.htmlhttp://wikileaks.org/spyfiles/list/company-name/acmepacket.htmlhttp://wikileaks.org/spyfiles/list/company-name/atis-systems-gmbh.htmlhttp://wikileaks.org/spyfiles/list/company-name/atis.htmlhttp://wikileaks.org/spyfiles/list/company-name/aqsacom.html
  • 8/3/2019 Spy Files Great Wall of Wikileaks Occupy London

    3/48

    GTENGUIDANCE

    GlimmerglassHP

    HackingTeamINNOVA SPAINVEATECH

    IPOQUEIPS

    Kapow SoftwareLOQUENDO

    Mantaro

    MedavNETINEWPORT NETWORKS

    NICENICE Systems

    NetOpticsNetOptics Inc.

    NetQuestNetronome

    Nokia Siemens NetworksNtrepid

    OXYGENOnPath

    PACKETFORENSICSPAD

    PALADIONPANOPTECH

    PLATHPhonexiaPine Digital Security

    ProteiQOSMOSRETENTIASEARTECH

    http://wikileaks.org/spyfiles/list/company-name/seartech.htmlhttp://wikileaks.org/spyfiles/list/company-name/retentia.htmlhttp://wikileaks.org/spyfiles/list/company-name/qosmos.htmlhttp://wikileaks.org/spyfiles/list/company-name/protei.htmlhttp://wikileaks.org/spyfiles/list/company-name/pine-digital-security.htmlhttp://wikileaks.org/spyfiles/list/company-name/phonexia.htmlhttp://wikileaks.org/spyfiles/list/company-name/plath.htmlhttp://wikileaks.org/spyfiles/list/company-name/panoptech.htmlhttp://wikileaks.org/spyfiles/list/company-name/paladion.htmlhttp://wikileaks.org/spyfiles/list/company-name/pad.htmlhttp://wikileaks.org/spyfiles/list/company-name/packetforensics.htmlhttp://wikileaks.org/spyfiles/list/company-name/onpath.htmlhttp://wikileaks.org/spyfiles/list/company-name/oxygen.htmlhttp://wikileaks.org/spyfiles/list/company-name/ntrepid.htmlhttp://wikileaks.org/spyfiles/list/company-name/nokia-siemens-networks.htmlhttp://wikileaks.org/spyfiles/list/company-name/netronome.htmlhttp://wikileaks.org/spyfiles/list/company-name/netquest.htmlhttp://wikileaks.org/spyfiles/list/company-name/netoptics-inc-.htmlhttp://wikileaks.org/spyfiles/list/company-name/netoptics.htmlhttp://wikileaks.org/spyfiles/list/company-name/nice-systems.htmlhttp://wikileaks.org/spyfiles/list/company-name/nice.htmlhttp://wikileaks.org/spyfiles/list/company-name/newport-networks.htmlhttp://wikileaks.org/spyfiles/list/company-name/neti.htmlhttp://wikileaks.org/spyfiles/list/company-name/medav.htmlhttp://wikileaks.org/spyfiles/list/company-name/mantaro.htmlhttp://wikileaks.org/spyfiles/list/company-name/loquendo.htmlhttp://wikileaks.org/spyfiles/list/company-name/kapow-software.htmlhttp://wikileaks.org/spyfiles/list/company-name/ips.htmlhttp://wikileaks.org/spyfiles/list/company-name/ipoque.htmlhttp://wikileaks.org/spyfiles/list/company-name/inveatech.htmlhttp://wikileaks.org/spyfiles/list/company-name/innova-spa.htmlhttp://wikileaks.org/spyfiles/list/company-name/hackingteam.htmlhttp://wikileaks.org/spyfiles/list/company-name/hp.htmlhttp://wikileaks.org/spyfiles/list/company-name/glimmerglass.htmlhttp://wikileaks.org/spyfiles/list/company-name/guidance.htmlhttp://wikileaks.org/spyfiles/list/company-name/gten.html
  • 8/3/2019 Spy Files Great Wall of Wikileaks Occupy London

    4/48

    SHOGISIEMENS

    SPEISS8

    STRATIGNScan & Target

    SeptierSeptier Communication Ltd.

    SimenaSpeech Technology Center

    TRACESPANThales

    UtimacoUtimaco Safeware AGVUPEN Security

    VasTechtelesoft

    Service Product

    ADSL InterceptionAnalysis Software

    Audio / Video digital recorderAudio Receiver

    Audio SurveillanceAudio Transmitter

    Capture and Recording of All TrafficCellphone Forensic

    Counter SurveillanceDR

    Data Retention

    DetectionEncryption

    ExploitsFibre Interception

    GPS TrackerGPS Tracking Software

    http://wikileaks.org/spyfiles/list/service-product/gps-tracking-software.htmlhttp://wikileaks.org/spyfiles/list/service-product/gps-tracker.htmlhttp://wikileaks.org/spyfiles/list/service-product/fibre-interception.htmlhttp://wikileaks.org/spyfiles/list/service-product/exploits.htmlhttp://wikileaks.org/spyfiles/list/service-product/encryption.htmlhttp://wikileaks.org/spyfiles/list/service-product/detection.htmlhttp://wikileaks.org/spyfiles/list/service-product/data-retention.htmlhttp://wikileaks.org/spyfiles/list/service-product/dr.htmlhttp://wikileaks.org/spyfiles/list/service-product/counter-surveillance.htmlhttp://wikileaks.org/spyfiles/list/service-product/cellphone-forensic.htmlhttp://wikileaks.org/spyfiles/list/service-product/capture-and-recording-of-all-traffic.htmlhttp://wikileaks.org/spyfiles/list/service-product/audio-transmitter.htmlhttp://wikileaks.org/spyfiles/list/service-product/audio-surveillance.htmlhttp://wikileaks.org/spyfiles/list/service-product/audio-receiver.htmlhttp://wikileaks.org/spyfiles/list/service-product/audio-video-digital-recorder.htmlhttp://wikileaks.org/spyfiles/list/service-product/analysis-software.htmlhttp://wikileaks.org/spyfiles/list/service-product/adsl-interception.htmlhttp://wikileaks.org/spyfiles/list/company-name/telesoft.htmlhttp://wikileaks.org/spyfiles/list/company-name/vastech.htmlhttp://wikileaks.org/spyfiles/list/company-name/vupen-security.htmlhttp://wikileaks.org/spyfiles/list/company-name/utimaco-safeware-ag.htmlhttp://wikileaks.org/spyfiles/list/company-name/utimaco.htmlhttp://wikileaks.org/spyfiles/list/company-name/thales.htmlhttp://wikileaks.org/spyfiles/list/company-nacespan.htmlhttp://wikileaks.org/spyfiles/list/company-name/speech-technology-center.htmlhttp://wikileaks.org/spyfiles/list/company-name/simena.htmlhttp://wikileaks.org/spyfiles/list/company-name/septier-communication-ltd-.htmlhttp://wikileaks.org/spyfiles/list/company-name/septier.htmlhttp://wikileaks.org/spyfiles/list/company-name/scan-and-target.htmlhttp://wikileaks.org/spyfiles/list/company-name/stratign.htmlhttp://wikileaks.org/spyfiles/list/company-name/ss8.htmlhttp://wikileaks.org/spyfiles/list/company-name/spei.htmlhttp://wikileaks.org/spyfiles/list/company-name/siemens.htmlhttp://wikileaks.org/spyfiles/list/company-name/shogi.html
  • 8/3/2019 Spy Files Great Wall of Wikileaks Occupy London

    5/48

    GSM Tactical InterceptionGSM Transceiver

    IP DRIP LI

    IT security & forensicIncident Response

    Intelligence Analysis SoftwareJammer Systems

    LILI DR

    LI DR DPI ISSLawful Interception

    MonitoringMonitoring CenterMonitoring Systems

    PDA Tracking SoftwarePassive Surveillance

    RCS TrojanReceiverRecordingRecoring

    Satellite InterceptionSession Border Control

    Social Network Analysis SoftwareSpeech Recognition

    StorageStrategic / Tactical Interception MonitoringStrategic Internet Monitoring & Recording

    Strategic Surveillance / Recording

    TCSMTROJANTSU training equipment schedule

    TacticalTactical Audio Microphone

    Tactical Audio Receiver TransmitterTactical Audio Recorder

    http://wikileaks.org/spyfiles/list/service-product/tactical-audio-recorder.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-audio-receiver-transmitter.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-audio-microphone.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical.htmlhttp://wikileaks.org/spyfiles/list/service-product/tsu-training-equipment-schedule.htmlhttp://wikileaks.org/spyfiles/list/service-product/trojan.htmlhttp://wikileaks.org/spyfiles/list/service-product/tcsm.htmlhttp://wikileaks.org/spyfiles/list/service-product/strategic-surveillance-recording.htmlhttp://wikileaks.org/spyfiles/list/service-product/strategic-internet-monitoring-and-recording.htmlhttp://wikileaks.org/spyfiles/list/service-product/strategic-tactical-interception-monitoring.htmlhttp://wikileaks.org/spyfiles/list/service-product/storage.htmlhttp://wikileaks.org/spyfiles/list/service-product/speech-recognition.htmlhttp://wikileaks.org/spyfiles/list/service-product/social-network-analysis-software.htmlhttp://wikileaks.org/spyfiles/list/service-product/session-border-control.htmlhttp://wikileaks.org/spyfiles/list/service-product/satellite-interception.htmlhttp://wikileaks.org/spyfiles/list/service-product/recoring.htmlhttp://wikileaks.org/spyfiles/list/service-product/recording.htmlhttp://wikileaks.org/spyfiles/list/service-product/receiver.htmlhttp://wikileaks.org/spyfiles/list/service-product/rcs-trojan.htmlhttp://wikileaks.org/spyfiles/list/service-product/passive-surveillance.htmlhttp://wikileaks.org/spyfiles/list/service-product/pda-tracking-software.htmlhttp://wikileaks.org/spyfiles/list/service-product/monitoring-systems.htmlhttp://wikileaks.org/spyfiles/list/service-product/monitoring-center.htmlhttp://wikileaks.org/spyfiles/list/service-product/monitoring.htmlhttp://wikileaks.org/spyfiles/list/service-product/lawful-interception.htmlhttp://wikileaks.org/spyfiles/list/service-product/li-dr-dpi-iss.htmlhttp://wikileaks.org/spyfiles/list/service-product/li-dr.htmlhttp://wikileaks.org/spyfiles/list/service-product/li.htmlhttp://wikileaks.org/spyfiles/list/service-product/jammer-systems.htmlhttp://wikileaks.org/spyfiles/list/service-product/intelligence-analysis-software.htmlhttp://wikileaks.org/spyfiles/list/service-product/incident-response.htmlhttp://wikileaks.org/spyfiles/list/service-product/it-security-and-forensic.htmlhttp://wikileaks.org/spyfiles/list/service-product/ip-li.htmlhttp://wikileaks.org/spyfiles/list/service-product/ip-dr.htmlhttp://wikileaks.org/spyfiles/list/service-product/gsm-transceiver.htmlhttp://wikileaks.org/spyfiles/list/service-product/gsm-tactical-interception.html
  • 8/3/2019 Spy Files Great Wall of Wikileaks Occupy London

    6/48

    Tactical Audio TransmitterTactical Audio Video recorder

    Tactical CamcorderTactical Covert Audio Transmitter over GSM

    Tactical Covert Digitl Audio RecorderTactical Covert GPS TrackerTactical Covert Microphone

    Tactical Digital Audio and Video RecorderTactical GPS Audio Transmitter

    Tactical GPS TrackingTactical GSM / 3G Interception

    Tactical GSM UMTS Satellite Wifi Interception

    Tactical MicrophoneTactical TrackingTactical Video recorder

    Tactitcal TrackingTactitcal Transceiver for audio video

    TrojansVDSL Interceptor

    VIP protectionVideo Surveillance

    WIFI Interceptrecorders

    surveillance vehiclestracking

    Tags

    ABILITY 3G GSMACME Packet

    ADAE LI

    AGNITIO Speech RecognitionALTRON

    ALTRON AKOR-3 TCSMALTRON AMUR Recording Interception

    ALTRON MONITORINGALTRON TRACKING

    http://wikileaks.org/spyfiles/list/tags/altron-tracking.htmlhttp://wikileaks.org/spyfiles/list/tags/altron-monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/altron-amur-recording-interception.htmlhttp://wikileaks.org/spyfiles/list/tags/altron-akor-3-tcsm.htmlhttp://wikileaks.org/spyfiles/list/tags/altron.htmlhttp://wikileaks.org/spyfiles/list/tags/agnitio-speech-recognition.htmlhttp://wikileaks.org/spyfiles/list/tags/adae-li.htmlhttp://wikileaks.org/spyfiles/list/tags/acme-packet.htmlhttp://wikileaks.org/spyfiles/list/tags/ability-3g-gsm.htmlhttp://wikileaks.org/spyfiles/list/service-product/tracking.htmlhttp://wikileaks.org/spyfiles/list/service-product/surveillance-vehicles.htmlhttp://wikileaks.org/spyfiles/list/service-product/recorders.htmlhttp://wikileaks.org/spyfiles/list/service-product/wifi-intercept.htmlhttp://wikileaks.org/spyfiles/list/service-product/video-surveillance.htmlhttp://wikileaks.org/spyfiles/list/service-product/vip-protection.htmlhttp://wikileaks.org/spyfiles/list/service-product/vdsl-interceptor.htmlhttp://wikileaks.org/spyfiles/list/service-product/trojans.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactitcal-transceiver-for-audio-video.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactitcal-tracking.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-video-recorder.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-tracking.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-microphone.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-gsm-umts-satellite-wifi-interception.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-gsm-3g-interception.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-gps-tracking.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-gps-audio-transmitter.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-digital-audio-and-video-recorder.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-covert-microphone.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-covert-gps-tracker.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-covert-digital-audio-recorder.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-covert-audio-transmitter-over-gsm.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-camcorder.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-audio-video-recorder.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-audio-transmitter.html
  • 8/3/2019 Spy Files Great Wall of Wikileaks Occupy London

    7/48

    ALTRON WIFIAMESYS

    AMESYS ADSL TacticalAMESYS COMINT

    AMESYS STRAGEGIC MASSIVEAMESYS Strategic Interception

    AMESYS TargetlistAMESYS WIFI

    AQSACOMAQSACOM LI

    ATISATIS LI

    Audio SurveillanceBEABEA TacticalBLUECOAT

    CAMBRIDGECON COMINTCCT

    CELLEBRITE Mobile ForensicCLEARTRAIL

    COBHAM

    COBHAM RepeaterCOBHAM Tactical LI

    COMINTCRFS RFEYE

    CRYPTON-M Strategic Internet Traffic Monitoring RecordingCloud Computing

    Counter SurveillanceDATAKOM LI

    DATONGDELTA SPA Satellite InterceptionDETICA

    DIGITASKDIGITASK LI IP

    DIGITASK TrojansDIGITASK WIFI

    http://wikileaks.org/spyfiles/list/tags/digitask-wifi.htmlhttp://wikileaks.org/spyfiles/list/tags/digitask-trojans.htmlhttp://wikileaks.org/spyfiles/list/tags/digitask-li-ip.htmlhttp://wikileaks.org/spyfiles/list/tags/digitask.htmlhttp://wikileaks.org/spyfiles/list/tags/detica.htmlhttp://wikileaks.org/spyfiles/list/tags/delta-spa-satellite-interception.htmlhttp://wikileaks.org/spyfiles/list/tags/datong.htmlhttp://wikileaks.org/spyfiles/list/tags/datakom-li.htmlhttp://wikileaks.org/spyfiles/list/tags/counter-surveillance.htmlhttp://wikileaks.org/spyfiles/list/tags/cloud-computing.htmlhttp://wikileaks.org/spyfiles/list/tags/crypton-m-strategic-internet-traffic-monitoring-recording.htmlhttp://wikileaks.org/spyfiles/list/tags/crfs-rfeye.htmlhttp://wikileaks.org/spyfiles/list/tags/comint.htmlhttp://wikileaks.org/spyfiles/list/tags/cobham-tactical-li.htmlhttp://wikileaks.org/spyfiles/list/tags/cobham-repeater.htmlhttp://wikileaks.org/spyfiles/list/tags/cobham.htmlhttp://wikileaks.org/spyfiles/list/tags/cleartrail.htmlhttp://wikileaks.org/spyfiles/list/tags/cellebrite-mobile-forensic.htmlhttp://wikileaks.org/spyfiles/list/tags/cct.htmlhttp://wikileaks.org/spyfiles/list/tags/cambridgecon-comint.htmlhttp://wikileaks.org/spyfiles/list/tags/bluecoat.htmlhttp://wikileaks.org/spyfiles/list/tags/bea-tactical.htmlhttp://wikileaks.org/spyfiles/list/tags/bea.htmlhttp://wikileaks.org/spyfiles/list/tags/audio-surveillance.htmlhttp://wikileaks.org/spyfiles/list/tags/atis-li.htmlhttp://wikileaks.org/spyfiles/list/tags/atis.htmlhttp://wikileaks.org/spyfiles/list/tags/aqsacom-li.htmlhttp://wikileaks.org/spyfiles/list/tags/aqsacom.htmlhttp://wikileaks.org/spyfiles/list/tags/amesys-wifi.htmlhttp://wikileaks.org/spyfiles/list/tags/amesys-targetlist.htmlhttp://wikileaks.org/spyfiles/list/tags/amesys-strategic-interception.htmlhttp://wikileaks.org/spyfiles/list/tags/amesys-stragegic-massive.htmlhttp://wikileaks.org/spyfiles/list/tags/amesys-comint.htmlhttp://wikileaks.org/spyfiles/list/tags/amesys-adsl-tactical.htmlhttp://wikileaks.org/spyfiles/list/tags/amesys.htmlhttp://wikileaks.org/spyfiles/list/tags/altron-wifi.html
  • 8/3/2019 Spy Files Great Wall of Wikileaks Occupy London

    8/48

    DPIDR

    DREAMLAB LIDetection

    EBS Electronic GPRS TrackingELAMAN COMINT

    ELTA IAI Tactical GSM UMTS Satellite Wifi InterceptionENDACE COMPLIANCE

    ETIGROUP LIETSI

    EVIDIAN BULLEXPERT SYSTEM Analytics

    EXPERT SYSTEM Semantic AnalyticsEncryptionFOXIT FoXReplay Analytics Software

    FOXIT FoxReplay Covert Analytics SoftwareFOXIT FoxReplay Personal Workstation Analysis SoftwareFOXIT FoxReplay Workstation Protection Analysis Software

    ForensicsGLIMMERGLASS

    GLIMMERGLASS SIGINT

    GLIMMERGLASS Strategic / Tactical Interception MonitoringGRIFFCOMM GPS Tracker Tactical

    GRIFFCOMM RecordingGRIFFCOMM Tactical Audio

    GRIFFCOMM Tactical Audio MicrophoneGRIFFCOMM Tactical Audio Transmitter

    GRIFFCOMM Tactical Audio Transmitter ReceiverGRIFFCOMM Tactical Audio Video

    GRIFFCOMM Tactical Audio Video RecorderGRIFFCOMM Tactical Audio Video TransceiverGRIFFCOMM Tactical Camcorder

    GRIFFCOMM Tactical Covert MicrophoneGRIFFCOMM Tactical GPS Tracking

    GRIFFCOMM Tactical MicrophoneGRIFFCOMM Tactical Tracking GPS

    http://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-tracking-gps.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-microphone.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-gps-tracking.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-covert-microphone.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-camcorder.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-audio-video-transceiver.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-audio-video-recorder.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-audio-video.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-audio-transmitter-receiver.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-audio-transmitter.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-audio-microphone.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-audio.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-recording.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-gps-tracker-tactical.htmlhttp://wikileaks.org/spyfiles/list/tags/glimmerglass-strategic-tactical-interception-monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/glimmerglass-sigint.htmlhttp://wikileaks.org/spyfiles/list/tags/glimmerglass.htmlhttp://wikileaks.org/spyfiles/list/tags/forensics.htmlhttp://wikileaks.org/spyfiles/list/tags/foxit-foxreplay-workstation-protection-analysis-software.htmlhttp://wikileaks.org/spyfiles/list/tags/foxit-foxreplay-personal-workstation-analysis-software.htmlhttp://wikileaks.org/spyfiles/list/tags/foxit-foxreplay-covert-analytics-software.htmlhttp://wikileaks.org/spyfiles/list/tags/foxit-foxreplay-analytics-software.htmlhttp://wikileaks.org/spyfiles/list/tags/encryption.htmlhttp://wikileaks.org/spyfiles/list/tags/expert-system-semantic-analytics.htmlhttp://wikileaks.org/spyfiles/list/tags/expert-system-analytics.htmlhttp://wikileaks.org/spyfiles/list/tags/evidian-bull.htmlhttp://wikileaks.org/spyfiles/list/tags/etsi.htmlhttp://wikileaks.org/spyfiles/list/tags/etigroup-li.htmlhttp://wikileaks.org/spyfiles/list/tags/endace-compliance.htmlhttp://wikileaks.org/spyfiles/list/tags/elta-iai-tactical-gsm-umts-satellite-wifi-interception.htmlhttp://wikileaks.org/spyfiles/list/tags/elaman-comint.htmlhttp://wikileaks.org/spyfiles/list/tags/ebs-electronic-gprs-tracking.htmlhttp://wikileaks.org/spyfiles/list/tags/detection.htmlhttp://wikileaks.org/spyfiles/list/tags/dreamlab-li.htmlhttp://wikileaks.org/spyfiles/list/tags/dr.htmlhttp://wikileaks.org/spyfiles/list/tags/dpi.html
  • 8/3/2019 Spy Files Great Wall of Wikileaks Occupy London

    9/48

    GRIFFCOMM Tactical Video recorderGUIDANCE Incident ResponseHACKINGTEAM RCS TROJAN

    HACKINGTEAM TROJAN

    HP Hewlett Packard LI Monitoring DR DPI ISSINNOVA SPA TACTICAL

    INTREPID AnalyticsINTREPID OSIINVEATECH LI

    IPIP InterceptionIPOQUE DPI

    IPSIPS MonitoringIT security & forensic

    IntelligenceInterception

    Jammer SystemsKAPOW OSINT

    LILI ALCATEL-LUCENT

    LI DRLI ETSI

    LI IPLI Monitoring

    LOQUENDO Speech RecognitionMANTARO COMINT

    MEDAV MONITORINGMobile

    Mobile ForensicMonitoringMonitoring Systems

    NETOPTICS COMINTNETOPTICS LINETQUEST LI

    NETRONOME Monitoring

    http://wikileaks.org/spyfiles/list/tags/netronome-monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/netquest-li.htmlhttp://wikileaks.org/spyfiles/list/tags/netoptics-li.htmlhttp://wikileaks.org/spyfiles/list/tags/netoptics-comint.htmlhttp://wikileaks.org/spyfiles/list/tags/monitoring-systems.htmlhttp://wikileaks.org/spyfiles/list/tags/monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/mobile-forensic.htmlhttp://wikileaks.org/spyfiles/list/tags/mobile.htmlhttp://wikileaks.org/spyfiles/list/tags/medav-monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/mantaro-comint.htmlhttp://wikileaks.org/spyfiles/list/tags/loquendo-speech-recognition.htmlhttp://wikileaks.org/spyfiles/list/tags/li-monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/li-ip.htmlhttp://wikileaks.org/spyfiles/list/tags/li-etsi.htmlhttp://wikileaks.org/spyfiles/list/tags/li-dr.htmlhttp://wikileaks.org/spyfiles/list/tags/li-alcatel-lucent.htmlhttp://wikileaks.org/spyfiles/list/tags/li.htmlhttp://wikileaks.org/spyfiles/list/tags/kapow-osint.htmlhttp://wikileaks.org/spyfiles/list/tags/jammer-systems.htmlhttp://wikileaks.org/spyfiles/list/tags/interception.htmlhttp://wikileaks.org/spyfiles/list/tags/intelligence.htmlhttp://wikileaks.org/spyfiles/list/tags/it-security-and-forensic.htmlhttp://wikileaks.org/spyfiles/list/tags/ips-monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/ips.htmlhttp://wikileaks.org/spyfiles/list/tags/ipoque-dpi.htmlhttp://wikileaks.org/spyfiles/list/tags/ip-interception.htmlhttp://wikileaks.org/spyfiles/list/tags/ip.htmlhttp://wikileaks.org/spyfiles/list/tags/inveatech-li.htmlhttp://wikileaks.org/spyfiles/list/tags/intrepid-osi.htmlhttp://wikileaks.org/spyfiles/list/tags/intrepid-analytics.htmlhttp://wikileaks.org/spyfiles/list/tags/innova-spa-tactical.htmlhttp://wikileaks.org/spyfiles/list/tags/hp-hewlett-packard-li-monitoring-dr-dpi-iss.htmlhttp://wikileaks.org/spyfiles/list/tags/hackingteam-trojan.htmlhttp://wikileaks.org/spyfiles/list/tags/hackingteam-rcs-trojan.htmlhttp://wikileaks.org/spyfiles/list/tags/guidance-incident-response.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-video-recorder.html
  • 8/3/2019 Spy Files Great Wall of Wikileaks Occupy London

    10/48

    NEWPORT NETWORKS LINEWPORT NETWORKS VOIP

    NICENICE Monitoring

    ONPATH LIPACKETFORENSICS

    PADPAD Tactical GPS Audio Transmitter

    PAD Tactical GPS Tracking Audio TransmitterPALADION

    PANOPTECHPHONEXIA Speech Recognition

    PLATH ProfilingQOSMOS COMINTQOSMOS DPI

    QOSMOS IdentificationQOSMOS Monitoring

    RAYTHEONSCAN&TARGET Analytics

    SEARTECH TACTICAL AUDIO TRANSMITTERSEARTECH TACTICAL RECEIVER

    SEPTIER LISHOGI GSM Interception

    SIEMENS Monitoring CenterSIGINT

    SIMENA LISMS

    SPEI GPS Tracking SoftwareSPEI Tactical Audio Transmitter

    SPEI Tactical ReceiverSPEI Tactical Tracking GPSSPEI Tactical TransceiverSPEI Tracking Software

    SS8 IP InterceptionSS8 Intelligence Analysis Software

    SS8 Social Network Analysis Software

    http://wikileaks.org/spyfiles/list/tags/ss8-social-network-analysis-software.htmlhttp://wikileaks.org/spyfiles/list/tags/ss8-intelligence-analysis-software.htmlhttp://wikileaks.org/spyfiles/list/tags/ss8-ip-interception.htmlhttp://wikileaks.org/spyfiles/list/tags/spei-tracking-software.htmlhttp://wikileaks.org/spyfiles/list/tags/spei-tactical-transceiver.htmlhttp://wikileaks.org/spyfiles/list/tags/spei-tactical-tracking-gps.htmlhttp://wikileaks.org/spyfiles/list/tags/spei-tactical-receiver.htmlhttp://wikileaks.org/spyfiles/list/tags/spei-tactical-audio-transmitter.htmlhttp://wikileaks.org/spyfiles/list/tags/spei-gps-tracking-software.htmlhttp://wikileaks.org/spyfiles/list/tags/sms.htmlhttp://wikileaks.org/spyfiles/list/tags/simena-li.htmlhttp://wikileaks.org/spyfiles/list/tags/sigint.htmlhttp://wikileaks.org/spyfiles/list/tags/siemens-monitoring-center.htmlhttp://wikileaks.org/spyfiles/list/tags/shogi-gsm-interception.htmlhttp://wikileaks.org/spyfiles/list/tags/septier-li.htmlhttp://wikileaks.org/spyfiles/list/tags/seartech-tactical-receiver.htmlhttp://wikileaks.org/spyfiles/list/tags/seartech-tactical-audio-transmitter.htmlhttp://wikileaks.org/spyfiles/list/tags/scan-and-target-analytics.htmlhttp://wikileaks.org/spyfiles/list/tags/raytheon.htmlhttp://wikileaks.org/spyfiles/list/tags/qosmos-monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/qosmos-identification.htmlhttp://wikileaks.org/spyfiles/list/tags/qosmos-dpi.htmlhttp://wikileaks.org/spyfiles/list/tags/qosmos-comint.htmlhttp://wikileaks.org/spyfiles/list/tags/plath-profiling.htmlhttp://wikileaks.org/spyfiles/list/tags/phonexia-speech-recognition.htmlhttp://wikileaks.org/spyfiles/list/tags/panoptech.htmlhttp://wikileaks.org/spyfiles/list/tags/paladion.htmlhttp://wikileaks.org/spyfiles/list/tags/pad-tactical-gps-tracking-audio-transmitter.htmlhttp://wikileaks.org/spyfiles/list/tags/pad-tactical-gps-audio-transmitter.htmlhttp://wikileaks.org/spyfiles/list/tags/pad.htmlhttp://wikileaks.org/spyfiles/list/tags/packetforensics.htmlhttp://wikileaks.org/spyfiles/list/tags/onpath-li.htmlhttp://wikileaks.org/spyfiles/list/tags/nice-monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/nice.htmlhttp://wikileaks.org/spyfiles/list/tags/newport-networks-voip.htmlhttp://wikileaks.org/spyfiles/list/tags/newport-networks-li.html
  • 8/3/2019 Spy Files Great Wall of Wikileaks Occupy London

    11/48

    STC Speech RecognitionSTRATIGN

    Strategic InterceptionTELESOFT DR

    TELESOFT IP INTERCEPTTHALES Strategic Monitoring

    TRACESPANTRACESPAN FIBRE INTERCEPTION

    TRACESPAN MonitoringTROJANS

    TSU training equipment scheduleTargeting

    UTIMACO DRUTIMACO LIUTIMACO LI DPI

    UTIMACO LI MonitoringVASTECH Strategic Interception / Recording / Monitoring

    VASTECH ZEBRAVIP protection

    VOIPVUPEN EXPLOITS TROJANS

    Video Surveillancerecorders

    surveillance vehiclestracking

    by Date of Document

    unspecified20062007

    2008200920102011

    by Date of Release

    2011-12-01

    http://wikileaks.org/spyfiles/list/releasedate/2011-12-01.htmlhttp://wikileaks.org/spyfiles/list/date/2011.htmlhttp://wikileaks.org/spyfiles/list/date/2010.htmlhttp://wikileaks.org/spyfiles/list/date/2009.htmlhttp://wikileaks.org/spyfiles/list/date/2008.htmlhttp://wikileaks.org/spyfiles/list/date/2007.htmlhttp://wikileaks.org/spyfiles/list/date/2006.htmlhttp://wikileaks.org/spyfiles/list/date/unspecified.htmlhttp://wikileaks.org/spyfiles/list/tags/tracking.htmlhttp://wikileaks.org/spyfiles/list/tags/surveillance-vehicles.htmlhttp://wikileaks.org/spyfiles/list/tags/recorders.htmlhttp://wikileaks.org/spyfiles/list/tags/video-surveillance.htmlhttp://wikileaks.org/spyfiles/list/tags/vupen-exploits-trojans.htmlhttp://wikileaks.org/spyfiles/list/tags/voip.htmlhttp://wikileaks.org/spyfiles/list/tags/vip-protection.htmlhttp://wikileaks.org/spyfiles/list/tags/vastech-zebra.htmlhttp://wikileaks.org/spyfiles/list/tags/vastech-strategic-interception-recording-monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/utimaco-li-monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/utimaco-li-dpi.htmlhttp://wikileaks.org/spyfiles/list/tags/utimaco-li.htmlhttp://wikileaks.org/spyfiles/list/tags/utimaco-dr.htmlhttp://wikileaks.org/spyfiles/list/tags/targeting.htmlhttp://wikileaks.org/spyfiles/list/tags/tsu-training-equipment-schedule.htmlhttp://wikileaks.org/spyfiles/list/tags/trojans.htmlhttp://wikileaks.org/spyfiles/list/tags/tracespan-monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/tracespan-fibre-interception.htmlhttp://wikileaks.org/spyfiles/list/tags/tracespan.htmlhttp://wikileaks.org/spyfiles/list/tags/thales-strategic-monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/telesoft-ip-intercept.htmlhttp://wikileaks.org/spyfiles/list/tags/telesoft-dr.htmlhttp://wikileaks.org/spyfiles/list/tags/strategic-interception.htmlhttp://wikileaks.org/spyfiles/list/tags/stratign.htmlhttp://wikileaks.org/spyfiles/list/tags/stc-speech-recognition.html
  • 8/3/2019 Spy Files Great Wall of Wikileaks Occupy London

    12/48

    Our Partners

    OWNIBureau of Investigative Journalism

    Privacy InternationalL'Expresso

    La RepubblicaARD

    The Hindu

    Translations

    [fr] Wikileaks : Un monde sous surveillanceMore articles ...

    - The Spyfiles - The Map

    WikiLeaks: The Spy Files

    Mass interception of entire populations is not only a reality, it is asecret new industry spanning 25 countries

    It sounds like something out of Hollywood, but as of today, mass

    interception systems, built by Western intelligence contractors,including for political opponents are a reality. Today WikiLeaksbegan releasing a database of hundreds of documents from as manyas 160 intelligence contractors in the mass surveillance industry.Working with Bugged Planet and Privacy International, as well asmedia organizations form six countries ARD in Germany, TheBureau of Investigative Journalism in the UK, The Hindu in India,LEspresso in Italy, OWNI in France and the Washington Post in theU.S. Wikileaks is shining a light on this secret industry that hasboomed since September 11, 2001 and is worth billions of dollars peryear. WikiLeaks has released 287 documents today, but the SpyFiles project is ongoing and further information will be released thisweek and into next year.

    International surveillance companies are based in the more

    http://wikileaks.org/The-Spyfiles-The-Map.htmlhttp://wikileaks.org/Wikileaks-Un-monde-sous.htmlhttp://www.thehindu.com/http://www.ard.de/http://www.repubblica.it/http://espresso.repubblica.it/https://www.privacyinternational.org/http://www.thebureauinvestigates.com/http://owni.fr/
  • 8/3/2019 Spy Files Great Wall of Wikileaks Occupy London

    13/48

    technologically sophisticated countries, and they sell their technologyon to every country of the world. This industry is, in practice,unregulated. Intelligence agencies, military forces and policeauthorities are able to silently, and on mass, and secretly intercept

    calls and take over computers without the help or knowledge of thetelecommunication providers. Users physical location can be trackedif they are carrying a mobile phone, even if it is only on stand by.

    But the WikiLeaks Spy Files are more than just about goodWestern countries exporting to bad developing world countries.Western companies are also selling a vast range of masssurveillance equipment to Western intelligence agencies. In traditionalspy stories, intelligence agencies like MI5 bug the phone of one ortwo people of interest. In the last ten years systems forindiscriminate, mass surveillance have become the norm. Intelligencecompanies such as VASTech secretly sell equipment to permanentlyrecord the phone calls of entire nations. Others record the location ofevery mobile phone in a city, down to 50 meters. Systems to infectevery Facebook user, or smart-phone owner of an entire populationgroup are on the intelligence market.

    Selling Surveillance to DictatorsWhen citizens overthrew the dictatorships in Egypt and Libya this

    year, they uncovered listening rooms where devices from Gammacorporation of the UK, Amesys of France, VASTech of South Africaand ZTE Corp of China monitored their every move online and on thephone.

    Surveillance companies like SS8 in the U.S., Hacking Team in Italyand Vupen in France manufacture viruses (Trojans) that hijackindividual computers and phones (including iPhones, Blackberriesand Androids), take over the device, record its every use, movement,and even the sights and sounds of the room it is in. Other companieslike Phoenexia in the Czech Republic collaborate with the military tocreate speech analysis tools. They identify individuals by gender, ageand stress levels and track them based on voiceprints. Blue Coat in

  • 8/3/2019 Spy Files Great Wall of Wikileaks Occupy London

    14/48

    the U.S. and Ipoque in Germany sell tools to governments incountries like China and Iran to prevent dissidents from organizingonline.

    Trovicor, previously a subsidiary of Nokia Siemens Networks,supplied the Bahraini government with interception technologies thattracked human rights activist Abdul Ghani Al Khanjar. He was showndetails of personal mobile phone conversations from before he wasinterrogated and beaten in the winter of 2010-2011.

    How Mass Surveillance Contractors Share Your Data with the

    State

    In January 2011, the National Security Agency broke ground on a$1.5 billion facility in the Utah desert that is designed to storeterabytes of domestic and foreign intelligence data forever andprocess it for years to come.

    Telecommunication companies are forthcoming when it comes todisclosing client information to the authorities - no matter the country.Headlines during Augusts unrest in the UK exposed how Researchin Motion (RIM), makers of the Blackberry, offered to help the

    government identify their clients. RIM has been in similar negotiationsto share BlackBerry Messenger data with the governments of India,Lebanon, Saudi Arabia, and the United Arab Emirates.

    Weaponizing Data Kills Innocent People

    There are commercial firms that now sell special software thatanalyze this data and turn it into powerful tools that can be used bymilitary and intelligence agencies.

    For example, in military bases across the U.S., Air Force pilots usea video link and joystick to fly Predator drones to conductsurveillance over the Middle East and Central Asia. This data isavailable to Central Intelligence Agency officials who use it to fireHellfire missiles on targets.

  • 8/3/2019 Spy Files Great Wall of Wikileaks Occupy London

    15/48

    The CIA officials have bought software that allows them to matchphone signals and voice prints instantly and pinpoint the specificidentity and location of individuals. Intelligence Integration Systems,Inc., based in Massachusetts - sells a location-based analytics

    software called Geospatial Toolkit for this purpose. AnotherMassachusetts company named Netezza, which bought a copy ofthe software, allegedly reverse engineered the code and sold ahacked version to the Central Intelligence Agency for use in remotelypiloted drone aircraft.

    IISI, which says that the software could be wrong by a distance ofup to 40 feet, sued Netezza to prevent the use of this software.Company founder Rich Zimmerman stated in court that his reactionwas one of stun, amazement that they (CIA) want to kill people withmy software that doesnt work."

    Orwells World

    Across the world, mass surveillance contractors are helpingintelligence agencies spy on individuals and communities of intereston an industrial scale.

    The Wikileaks Spy Files reveal the details of which companies aremaking billions selling sophisticated tracking tools to governmentbuyers, flouting export rules, and turning a blind eye to dictatorialregimes that abuse human rights.

    How to use the Spy Files

    To search inside those files, click one of the link on the left pane ofthis page, to get the list of documents by type, company date or tag.

    To search all these companies on a world map use the followingtool from Owni

    http://wikileaks.org/The-Spyfiles-The-Map.htmlhttp://wikileaks.org/The-Spyfiles-The-Map.htmlhttp://wikileaks.org/The-Spyfiles-The-Map.htmlhttp://wikileaks.org/The-Spyfiles-The-Map.html
  • 8/3/2019 Spy Files Great Wall of Wikileaks Occupy London

    16/48

    from the hindu

    NEWSINTERNATIONALLONDON,December 2, 2011Big Brother is everywhere now

    HASAN SUROORSHARE COMMENT(11) PRINT T+

    AP

    WikiLeaks founder Julian Assange during a news conference in central London, on

    http://www.thehindu.com/news/international/article2678603.ece#http://www.thehindu.com/news/international/article2678603.ece?css=printhttp://www.thehindu.com/news/international/article2678603.ece#commentshttp://www.addthis.com/bookmark.php?v=20http://www.thehindu.com/news/international/http://www.thehindu.com/news/
  • 8/3/2019 Spy Files Great Wall of Wikileaks Occupy London

    17/48

    Thursday.

    How many of you here have an iPhone, a Blackberry or any other

    mobile device?'' WikiLeaks founder Julian Assange asked surveying a hallfull of people at the City University here on Thursday. As hand after

    hand went up, he told them that everyone of them, irrespective of what

    kind of mobile device they carried, was a potential target of spying.

    This was how stark the threat from a booming multi-billion dollar global

    mass surveillance industry was, Mr. Assange said as he released a cache

    of 287 files providing a rare glimpse into how the industry was operating

    without any checks.

    The Spy Files, spanning 25 countries, are first of a series of sensitive data

    that WikiLeaks plans to publish in coming months.

    Working with Bugged Planet and Privacy International, as well as media

    organisations from six countries ARD in Germany, The Bureau of

    Investigative Journalism in the UK, The Hindu in India, L'Espresso in

    Italy, OWNI in France and the Washington Post in the U.S. Wikileaks is

    shining a light on this secret industry that has boomed since September

    11, 2001 and is worth billions of dollars per year. WikiLeaks has released

    287 documents today [Thursday], but the Spy Files project is ongoingand further information will be released this week and into next year,''

    Mr. Assange said at a crowded press conference.

  • 8/3/2019 Spy Files Great Wall of Wikileaks Occupy London

    18/48

    N. Ram, Editor-in-Chief ofThe Hindu, speaking through a video-link,

    expressed concern over a fast growing and completely unregulated

    surveillance industry in India. At least two Indian companies were selling

    surveillance technology without any regulation.

    We are very concerned about our privacy violations,'' he said.

    Mr. Ram said that working with WikiLeaks had been a very valuable

    experience. The issue highlighted by WikiLeaks was of greatinternational significance'' and of significance to India.

    Mr. Assange said that it might sound like something out of Hollywood

    but mass interception systems built by Western intelligence

    contractors'' were a reality. Over the past decade, the surveillance

    industry had grown from a covert operation which primarily suppliedequipment to government intelligence agencies such as the NSA in

    America and Britain's GCHQ, into a huge transnational business.

    Dramatically illustrating the threat, Mr. Assange said that potentially

    everyone who carried any mobile device was a sitting duck for anyone

    wanting to spy on them. The threat to investigative journalism from

    these new and covert surveillance techniques was particularly dire.

    The only way we are going to win this war is by developing counter-

  • 8/3/2019 Spy Files Great Wall of Wikileaks Occupy London

    19/48

    surveillance systems,'' he said.

    WikiLeaks, which itself has been a victim of surveillance by intelligence

    agencies and their proxies and has had its site hacked, is in the process of

    developing a more secure system to submit information to the site.

    Mr. Assange said that international surveillance companies were based in

    the more technologically sophisticated countries, and sold their

    technology to every country of the world. Intelligence agencies, militaryforces and police authorities were able to silently and secretly intercept

    calls and take over computers without the help or knowledge of the

    telecommunication providers.

    Experts who worked on the files called for new laws to regulate export of

    surveillance technology.

    Western governments cannot stand idly by while this technology is still

    being sold, said Eric King of the Privacy International campaign group.

    Jacob Appelbaum, a computer expert at the University of Washington,

    said the systems revealed in the files were as deadly as murder weapons.

  • 8/3/2019 Spy Files Great Wall of Wikileaks Occupy London

    20/48

    These systems have been sold by Western companies to places for

    example like Syria, and Libya and Tunisia and Egypt. These systems are

    used to hunt people down and to murder, he said, while Pratap

    Chatterjee of the Bureau of Investigative Journalism said a French firm

    offered to sell such systems to the erstwhile Qadhafi regime to spy ondissidents living in Britain.

    Mr. Assange warned that with entire populations being subjected to

    surveillance nobody anywhere in the world was safe anymore.

    In traditional spy stories, intelligence agencies like MI5 bug the phone of

    one or two people of interest. In the last 10 years systems for

    indiscriminate, mass surveillance have become the norm. Intelligence

    companies such as VASTech secretly sell equipment to permanently

    record the phone calls of entire nations. Others record the location of

    every mobile phone in a city, down to 50 metres. Systems to infect every

    Facebook user, or smart-phone owner of an entire population group are

    on the intelligence market,'' said a statement on official WikiLeaks Spy

    Files site.

    Keywords: The Hindu,WikiLeaks, SpyFiles, espionage

    technologies, spying on citizens, CCISat, Indian spy satellite

    List of documents > Document Type >Brochure

    page 1/3 - Previous - 1 - 2 - 3 - Next

    http://wikileaks.org/spyfiles/list/document-type/brochure-2.htmlhttp://wikileaks.org/spyfiles/list/document-type/brochure-3.htmlhttp://wikileaks.org/spyfiles/list/document-type/brochure-2.htmlhttp://www.thehindu.com/news/international/article2678603.ece#http://www.thehindu.com/news/international/article2678603.ece#http://www.thehindu.com/news/international/article2678603.ece#http://www.thehindu.com/news/international/article2678603.ece#http://www.thehindu.com/news/international/article2678603.ece#http://www.thehindu.com/news/international/article2678603.ece#http://www.thehindu.com/news/international/article2678603.ece#http://www.thehindu.com/news/international/article2678603.ece#
  • 8/3/2019 Spy Files Great Wall of Wikileaks Occupy London

    21/48

    # Document TitleComp

    any

    Doc

    ume

    nt

    Typ

    e

    Date

    78

    Lawful Interception is OurBusiness

    AQSACOM

    Brochure

    unspecified

    79

    S ta n d a rd s -Ba se d L a w fu lInterception from AQSACOM

    AQSACOM

    Brochure

    unspecifie

    d

    80

    3 G I n t e r c e p t i o n / G S MInbetween Interception System

    ABILITY

    Brochure

    unspecified

    8

    1

    Alcatel-Lucent 1357 ULIS

    Unified Lawful Interception Suite

    ALCAT E L -

    LUCENT

    Broc

    hure

    2008

    -01

    82

    AKOR-3 Automated radioemission source and bugdetection system

    AL TRON

    Brochure

    2011-01

    84

    EAGLE EYE-IP TAP PassiveNetwork Application / Platformfor Lawful Interception andNetwork Monitoring

    AL TRON

    Brochure

    2011-01

    http://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.html
  • 8/3/2019 Spy Files Great Wall of Wikileaks Occupy London

    22/48

    85

    E A G L E E Y E - M C N e x tG e n e r a t i o n P r o d u c t f o r Homeland Security and Law

    Enforcement Agencies

    AL TRON

    Brochure

    2011-01

    86

    EAGLE EYE- Wi-Fi System forWireless Tactical Packet Sniffingand Forensics Analysis

    AL TRON

    Brochure

    2011-01

    8

    7

    GSM/UMTS Grabber: Deployinglocal mobile networks and secretgrabbing of ident i f icat ioninformation in GSM and UMTSbands

    AL TR

    ON

    Broc

    hure

    2011

    -01

    88

    AltronsAL TRON

    Brochure

    2011-01

    89

    Navi t ron GPS Moni tor ingSystem

    AL TRON

    Brochure

    2011-01

    90

    RADIUS A5/1 Fully Passive Off-the-Air GSM Intercept ingSystem

    AL TRON

    Brochure

    2011-01

    91

    Wounding Detection SystemAL TRON

    Brochure

    2011-01

    94

    CASPER-T Wi-Fi NetworkInterception

    Ame sys

    Brochure

    unspecified

    http://wikileaks.org/spyfiles/docs/amesys/96_cryptowall-mail-protect-l.htmlhttp://wikileaks.org/spyfiles/docs/amesys/95_critical-system-architect.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/altron/91_wounding-detection-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/88_altrons.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-f