spy files great wall of wikileaks occupy london
TRANSCRIPT
-
8/3/2019 Spy Files Great Wall of Wikileaks Occupy London
1/48
The Spyfiles
The Spy Files,files released so far...287
The Spy Files
Index pages
Main ListArticles
Document Type
BrochureCatalogueContractManual
NewsletterPaper
PresentationPricelistVideo
Company Name
ABILITYADAE - Authority for the Assurance of Communication Security and
Privacy (Greece)ALCATEL-LUCENT
ALTRON
http://wikileaks.org/http://wikileaks.org/spyfiles/list/company-name/altron.htmlhttp://wikileaks.org/spyfiles/list/company-name/alcatel-lucent.htmlhttp://wikileaks.org/spyfiles/list/company-name/adae-authority-for-the-assurance-of-communication-security.htmlhttp://wikileaks.org/spyfiles/list/company-name/adae-authority-for-the-assurance-of-communication-security.htmlhttp://wikileaks.org/spyfiles/list/company-name/ability.htmlhttp://wikileaks.org/spyfiles/list/document-type/video.htmlhttp://wikileaks.org/spyfiles/list/document-type/pricelist.htmlhttp://wikileaks.org/spyfiles/list/document-type/presentation.htmlhttp://wikileaks.org/spyfiles/list/document-type/paper.htmlhttp://wikileaks.org/spyfiles/list/document-type/newsletter.htmlhttp://wikileaks.org/spyfiles/list/document-type/manual.htmlhttp://wikileaks.org/spyfiles/list/document-type/contract.htmlhttp://wikileaks.org/spyfiles/list/document-type/catalogue.htmlhttp://wikileaks.org/spyfiles/list/document-type/brochure.htmlhttp://wikileaks.org/spyfiles/list/releasedate/2011-12-01.htmlhttp://wikileaks.org/the-spyfiles.htmlhttp://wikileaks.org/http://wikileaks.org/ -
8/3/2019 Spy Files Great Wall of Wikileaks Occupy London
2/48
AQSACOMATIS
ATIS Systems GmbHAcmePacket
AgnitioAmesysAtis Uher
BEABLUECOAT
CCT CecratechCELLEBRITECLEARTRAIL
COBHAMCRFSCRYPTON-M
Cambridge ConsultantsDATAKOMDATONGDETICA
DREAMLABDelta SPA
DialogicDigiTask
EBS ElectronicELAMAN
ELTAETIGROUP
ETSIETSI TC LI
ETSI TC-LIEVIDIANEndace
Expert SystemFOXIT
GRIFFCOMMGROUP2000
http://wikileaks.org/spyfiles/list/company-name/acmepacket.htmlhttp://wikileaks.org/spyfiles/list/company-name/atis-systems-gmbh.htmlhttp://wikileaks.org/spyfiles/list/company-name/atis.htmlhttp://wikileaks.org/spyfiles/list/company-name/aqsacom.htmlhttp://wikileaks.org/spyfiles/list/company-name/group2000.htmlhttp://wikileaks.org/spyfiles/list/company-name/griffcomm.htmlhttp://wikileaks.org/spyfiles/list/company-name/foxit.htmlhttp://wikileaks.org/spyfiles/list/company-name/expert-system.htmlhttp://wikileaks.org/spyfiles/list/company-name/endace.htmlhttp://wikileaks.org/spyfiles/list/company-name/evidian.htmlhttp://wikileaks.org/spyfiles/list/company-name/etsi-tc-li.htmlhttp://wikileaks.org/spyfiles/list/company-name/etsi-tc-li.htmlhttp://wikileaks.org/spyfiles/list/company-name/etsi.htmlhttp://wikileaks.org/spyfiles/list/company-name/etigroup.htmlhttp://wikileaks.org/spyfiles/list/company-name/elta.htmlhttp://wikileaks.org/spyfiles/list/company-name/elaman.htmlhttp://wikileaks.org/spyfiles/list/company-name/ebs-electronic.htmlhttp://wikileaks.org/spyfiles/list/company-name/digitask.htmlhttp://wikileaks.org/spyfiles/list/company-name/dialogic.htmlhttp://wikileaks.org/spyfiles/list/company-name/delta-spa.htmlhttp://wikileaks.org/spyfiles/list/company-name/dreamlab.htmlhttp://wikileaks.org/spyfiles/list/company-name/detica.htmlhttp://wikileaks.org/spyfiles/list/company-name/datong.htmlhttp://wikileaks.org/spyfiles/list/company-name/datakom.htmlhttp://wikileaks.org/spyfiles/list/company-name/cambridge-consultants.htmlhttp://wikileaks.org/spyfiles/list/company-name/crypton-m.htmlhttp://wikileaks.org/spyfiles/list/company-name/crfs.htmlhttp://wikileaks.org/spyfiles/list/company-name/cobham.htmlhttp://wikileaks.org/spyfiles/list/company-name/cleartrail.htmlhttp://wikileaks.org/spyfiles/list/company-name/cellebrite.htmlhttp://wikileaks.org/spyfiles/list/company-name/cct-cecratech.htmlhttp://wikileaks.org/spyfiles/list/company-name/bluecoat.htmlhttp://wikileaks.org/spyfiles/list/company-name/bea.htmlhttp://wikileaks.org/spyfiles/list/company-name/atis-uher.htmlhttp://wikileaks.org/spyfiles/list/company-name/amesys.htmlhttp://wikileaks.org/spyfiles/list/company-name/agnitio.htmlhttp://wikileaks.org/spyfiles/list/company-name/acmepacket.htmlhttp://wikileaks.org/spyfiles/list/company-name/atis-systems-gmbh.htmlhttp://wikileaks.org/spyfiles/list/company-name/atis.htmlhttp://wikileaks.org/spyfiles/list/company-name/aqsacom.html -
8/3/2019 Spy Files Great Wall of Wikileaks Occupy London
3/48
GTENGUIDANCE
GlimmerglassHP
HackingTeamINNOVA SPAINVEATECH
IPOQUEIPS
Kapow SoftwareLOQUENDO
Mantaro
MedavNETINEWPORT NETWORKS
NICENICE Systems
NetOpticsNetOptics Inc.
NetQuestNetronome
Nokia Siemens NetworksNtrepid
OXYGENOnPath
PACKETFORENSICSPAD
PALADIONPANOPTECH
PLATHPhonexiaPine Digital Security
ProteiQOSMOSRETENTIASEARTECH
http://wikileaks.org/spyfiles/list/company-name/seartech.htmlhttp://wikileaks.org/spyfiles/list/company-name/retentia.htmlhttp://wikileaks.org/spyfiles/list/company-name/qosmos.htmlhttp://wikileaks.org/spyfiles/list/company-name/protei.htmlhttp://wikileaks.org/spyfiles/list/company-name/pine-digital-security.htmlhttp://wikileaks.org/spyfiles/list/company-name/phonexia.htmlhttp://wikileaks.org/spyfiles/list/company-name/plath.htmlhttp://wikileaks.org/spyfiles/list/company-name/panoptech.htmlhttp://wikileaks.org/spyfiles/list/company-name/paladion.htmlhttp://wikileaks.org/spyfiles/list/company-name/pad.htmlhttp://wikileaks.org/spyfiles/list/company-name/packetforensics.htmlhttp://wikileaks.org/spyfiles/list/company-name/onpath.htmlhttp://wikileaks.org/spyfiles/list/company-name/oxygen.htmlhttp://wikileaks.org/spyfiles/list/company-name/ntrepid.htmlhttp://wikileaks.org/spyfiles/list/company-name/nokia-siemens-networks.htmlhttp://wikileaks.org/spyfiles/list/company-name/netronome.htmlhttp://wikileaks.org/spyfiles/list/company-name/netquest.htmlhttp://wikileaks.org/spyfiles/list/company-name/netoptics-inc-.htmlhttp://wikileaks.org/spyfiles/list/company-name/netoptics.htmlhttp://wikileaks.org/spyfiles/list/company-name/nice-systems.htmlhttp://wikileaks.org/spyfiles/list/company-name/nice.htmlhttp://wikileaks.org/spyfiles/list/company-name/newport-networks.htmlhttp://wikileaks.org/spyfiles/list/company-name/neti.htmlhttp://wikileaks.org/spyfiles/list/company-name/medav.htmlhttp://wikileaks.org/spyfiles/list/company-name/mantaro.htmlhttp://wikileaks.org/spyfiles/list/company-name/loquendo.htmlhttp://wikileaks.org/spyfiles/list/company-name/kapow-software.htmlhttp://wikileaks.org/spyfiles/list/company-name/ips.htmlhttp://wikileaks.org/spyfiles/list/company-name/ipoque.htmlhttp://wikileaks.org/spyfiles/list/company-name/inveatech.htmlhttp://wikileaks.org/spyfiles/list/company-name/innova-spa.htmlhttp://wikileaks.org/spyfiles/list/company-name/hackingteam.htmlhttp://wikileaks.org/spyfiles/list/company-name/hp.htmlhttp://wikileaks.org/spyfiles/list/company-name/glimmerglass.htmlhttp://wikileaks.org/spyfiles/list/company-name/guidance.htmlhttp://wikileaks.org/spyfiles/list/company-name/gten.html -
8/3/2019 Spy Files Great Wall of Wikileaks Occupy London
4/48
SHOGISIEMENS
SPEISS8
STRATIGNScan & Target
SeptierSeptier Communication Ltd.
SimenaSpeech Technology Center
TRACESPANThales
UtimacoUtimaco Safeware AGVUPEN Security
VasTechtelesoft
Service Product
ADSL InterceptionAnalysis Software
Audio / Video digital recorderAudio Receiver
Audio SurveillanceAudio Transmitter
Capture and Recording of All TrafficCellphone Forensic
Counter SurveillanceDR
Data Retention
DetectionEncryption
ExploitsFibre Interception
GPS TrackerGPS Tracking Software
http://wikileaks.org/spyfiles/list/service-product/gps-tracking-software.htmlhttp://wikileaks.org/spyfiles/list/service-product/gps-tracker.htmlhttp://wikileaks.org/spyfiles/list/service-product/fibre-interception.htmlhttp://wikileaks.org/spyfiles/list/service-product/exploits.htmlhttp://wikileaks.org/spyfiles/list/service-product/encryption.htmlhttp://wikileaks.org/spyfiles/list/service-product/detection.htmlhttp://wikileaks.org/spyfiles/list/service-product/data-retention.htmlhttp://wikileaks.org/spyfiles/list/service-product/dr.htmlhttp://wikileaks.org/spyfiles/list/service-product/counter-surveillance.htmlhttp://wikileaks.org/spyfiles/list/service-product/cellphone-forensic.htmlhttp://wikileaks.org/spyfiles/list/service-product/capture-and-recording-of-all-traffic.htmlhttp://wikileaks.org/spyfiles/list/service-product/audio-transmitter.htmlhttp://wikileaks.org/spyfiles/list/service-product/audio-surveillance.htmlhttp://wikileaks.org/spyfiles/list/service-product/audio-receiver.htmlhttp://wikileaks.org/spyfiles/list/service-product/audio-video-digital-recorder.htmlhttp://wikileaks.org/spyfiles/list/service-product/analysis-software.htmlhttp://wikileaks.org/spyfiles/list/service-product/adsl-interception.htmlhttp://wikileaks.org/spyfiles/list/company-name/telesoft.htmlhttp://wikileaks.org/spyfiles/list/company-name/vastech.htmlhttp://wikileaks.org/spyfiles/list/company-name/vupen-security.htmlhttp://wikileaks.org/spyfiles/list/company-name/utimaco-safeware-ag.htmlhttp://wikileaks.org/spyfiles/list/company-name/utimaco.htmlhttp://wikileaks.org/spyfiles/list/company-name/thales.htmlhttp://wikileaks.org/spyfiles/list/company-nacespan.htmlhttp://wikileaks.org/spyfiles/list/company-name/speech-technology-center.htmlhttp://wikileaks.org/spyfiles/list/company-name/simena.htmlhttp://wikileaks.org/spyfiles/list/company-name/septier-communication-ltd-.htmlhttp://wikileaks.org/spyfiles/list/company-name/septier.htmlhttp://wikileaks.org/spyfiles/list/company-name/scan-and-target.htmlhttp://wikileaks.org/spyfiles/list/company-name/stratign.htmlhttp://wikileaks.org/spyfiles/list/company-name/ss8.htmlhttp://wikileaks.org/spyfiles/list/company-name/spei.htmlhttp://wikileaks.org/spyfiles/list/company-name/siemens.htmlhttp://wikileaks.org/spyfiles/list/company-name/shogi.html -
8/3/2019 Spy Files Great Wall of Wikileaks Occupy London
5/48
GSM Tactical InterceptionGSM Transceiver
IP DRIP LI
IT security & forensicIncident Response
Intelligence Analysis SoftwareJammer Systems
LILI DR
LI DR DPI ISSLawful Interception
MonitoringMonitoring CenterMonitoring Systems
PDA Tracking SoftwarePassive Surveillance
RCS TrojanReceiverRecordingRecoring
Satellite InterceptionSession Border Control
Social Network Analysis SoftwareSpeech Recognition
StorageStrategic / Tactical Interception MonitoringStrategic Internet Monitoring & Recording
Strategic Surveillance / Recording
TCSMTROJANTSU training equipment schedule
TacticalTactical Audio Microphone
Tactical Audio Receiver TransmitterTactical Audio Recorder
http://wikileaks.org/spyfiles/list/service-product/tactical-audio-recorder.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-audio-receiver-transmitter.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-audio-microphone.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical.htmlhttp://wikileaks.org/spyfiles/list/service-product/tsu-training-equipment-schedule.htmlhttp://wikileaks.org/spyfiles/list/service-product/trojan.htmlhttp://wikileaks.org/spyfiles/list/service-product/tcsm.htmlhttp://wikileaks.org/spyfiles/list/service-product/strategic-surveillance-recording.htmlhttp://wikileaks.org/spyfiles/list/service-product/strategic-internet-monitoring-and-recording.htmlhttp://wikileaks.org/spyfiles/list/service-product/strategic-tactical-interception-monitoring.htmlhttp://wikileaks.org/spyfiles/list/service-product/storage.htmlhttp://wikileaks.org/spyfiles/list/service-product/speech-recognition.htmlhttp://wikileaks.org/spyfiles/list/service-product/social-network-analysis-software.htmlhttp://wikileaks.org/spyfiles/list/service-product/session-border-control.htmlhttp://wikileaks.org/spyfiles/list/service-product/satellite-interception.htmlhttp://wikileaks.org/spyfiles/list/service-product/recoring.htmlhttp://wikileaks.org/spyfiles/list/service-product/recording.htmlhttp://wikileaks.org/spyfiles/list/service-product/receiver.htmlhttp://wikileaks.org/spyfiles/list/service-product/rcs-trojan.htmlhttp://wikileaks.org/spyfiles/list/service-product/passive-surveillance.htmlhttp://wikileaks.org/spyfiles/list/service-product/pda-tracking-software.htmlhttp://wikileaks.org/spyfiles/list/service-product/monitoring-systems.htmlhttp://wikileaks.org/spyfiles/list/service-product/monitoring-center.htmlhttp://wikileaks.org/spyfiles/list/service-product/monitoring.htmlhttp://wikileaks.org/spyfiles/list/service-product/lawful-interception.htmlhttp://wikileaks.org/spyfiles/list/service-product/li-dr-dpi-iss.htmlhttp://wikileaks.org/spyfiles/list/service-product/li-dr.htmlhttp://wikileaks.org/spyfiles/list/service-product/li.htmlhttp://wikileaks.org/spyfiles/list/service-product/jammer-systems.htmlhttp://wikileaks.org/spyfiles/list/service-product/intelligence-analysis-software.htmlhttp://wikileaks.org/spyfiles/list/service-product/incident-response.htmlhttp://wikileaks.org/spyfiles/list/service-product/it-security-and-forensic.htmlhttp://wikileaks.org/spyfiles/list/service-product/ip-li.htmlhttp://wikileaks.org/spyfiles/list/service-product/ip-dr.htmlhttp://wikileaks.org/spyfiles/list/service-product/gsm-transceiver.htmlhttp://wikileaks.org/spyfiles/list/service-product/gsm-tactical-interception.html -
8/3/2019 Spy Files Great Wall of Wikileaks Occupy London
6/48
Tactical Audio TransmitterTactical Audio Video recorder
Tactical CamcorderTactical Covert Audio Transmitter over GSM
Tactical Covert Digitl Audio RecorderTactical Covert GPS TrackerTactical Covert Microphone
Tactical Digital Audio and Video RecorderTactical GPS Audio Transmitter
Tactical GPS TrackingTactical GSM / 3G Interception
Tactical GSM UMTS Satellite Wifi Interception
Tactical MicrophoneTactical TrackingTactical Video recorder
Tactitcal TrackingTactitcal Transceiver for audio video
TrojansVDSL Interceptor
VIP protectionVideo Surveillance
WIFI Interceptrecorders
surveillance vehiclestracking
Tags
ABILITY 3G GSMACME Packet
ADAE LI
AGNITIO Speech RecognitionALTRON
ALTRON AKOR-3 TCSMALTRON AMUR Recording Interception
ALTRON MONITORINGALTRON TRACKING
http://wikileaks.org/spyfiles/list/tags/altron-tracking.htmlhttp://wikileaks.org/spyfiles/list/tags/altron-monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/altron-amur-recording-interception.htmlhttp://wikileaks.org/spyfiles/list/tags/altron-akor-3-tcsm.htmlhttp://wikileaks.org/spyfiles/list/tags/altron.htmlhttp://wikileaks.org/spyfiles/list/tags/agnitio-speech-recognition.htmlhttp://wikileaks.org/spyfiles/list/tags/adae-li.htmlhttp://wikileaks.org/spyfiles/list/tags/acme-packet.htmlhttp://wikileaks.org/spyfiles/list/tags/ability-3g-gsm.htmlhttp://wikileaks.org/spyfiles/list/service-product/tracking.htmlhttp://wikileaks.org/spyfiles/list/service-product/surveillance-vehicles.htmlhttp://wikileaks.org/spyfiles/list/service-product/recorders.htmlhttp://wikileaks.org/spyfiles/list/service-product/wifi-intercept.htmlhttp://wikileaks.org/spyfiles/list/service-product/video-surveillance.htmlhttp://wikileaks.org/spyfiles/list/service-product/vip-protection.htmlhttp://wikileaks.org/spyfiles/list/service-product/vdsl-interceptor.htmlhttp://wikileaks.org/spyfiles/list/service-product/trojans.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactitcal-transceiver-for-audio-video.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactitcal-tracking.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-video-recorder.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-tracking.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-microphone.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-gsm-umts-satellite-wifi-interception.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-gsm-3g-interception.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-gps-tracking.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-gps-audio-transmitter.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-digital-audio-and-video-recorder.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-covert-microphone.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-covert-gps-tracker.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-covert-digital-audio-recorder.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-covert-audio-transmitter-over-gsm.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-camcorder.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-audio-video-recorder.htmlhttp://wikileaks.org/spyfiles/list/service-product/tactical-audio-transmitter.html -
8/3/2019 Spy Files Great Wall of Wikileaks Occupy London
7/48
ALTRON WIFIAMESYS
AMESYS ADSL TacticalAMESYS COMINT
AMESYS STRAGEGIC MASSIVEAMESYS Strategic Interception
AMESYS TargetlistAMESYS WIFI
AQSACOMAQSACOM LI
ATISATIS LI
Audio SurveillanceBEABEA TacticalBLUECOAT
CAMBRIDGECON COMINTCCT
CELLEBRITE Mobile ForensicCLEARTRAIL
COBHAM
COBHAM RepeaterCOBHAM Tactical LI
COMINTCRFS RFEYE
CRYPTON-M Strategic Internet Traffic Monitoring RecordingCloud Computing
Counter SurveillanceDATAKOM LI
DATONGDELTA SPA Satellite InterceptionDETICA
DIGITASKDIGITASK LI IP
DIGITASK TrojansDIGITASK WIFI
http://wikileaks.org/spyfiles/list/tags/digitask-wifi.htmlhttp://wikileaks.org/spyfiles/list/tags/digitask-trojans.htmlhttp://wikileaks.org/spyfiles/list/tags/digitask-li-ip.htmlhttp://wikileaks.org/spyfiles/list/tags/digitask.htmlhttp://wikileaks.org/spyfiles/list/tags/detica.htmlhttp://wikileaks.org/spyfiles/list/tags/delta-spa-satellite-interception.htmlhttp://wikileaks.org/spyfiles/list/tags/datong.htmlhttp://wikileaks.org/spyfiles/list/tags/datakom-li.htmlhttp://wikileaks.org/spyfiles/list/tags/counter-surveillance.htmlhttp://wikileaks.org/spyfiles/list/tags/cloud-computing.htmlhttp://wikileaks.org/spyfiles/list/tags/crypton-m-strategic-internet-traffic-monitoring-recording.htmlhttp://wikileaks.org/spyfiles/list/tags/crfs-rfeye.htmlhttp://wikileaks.org/spyfiles/list/tags/comint.htmlhttp://wikileaks.org/spyfiles/list/tags/cobham-tactical-li.htmlhttp://wikileaks.org/spyfiles/list/tags/cobham-repeater.htmlhttp://wikileaks.org/spyfiles/list/tags/cobham.htmlhttp://wikileaks.org/spyfiles/list/tags/cleartrail.htmlhttp://wikileaks.org/spyfiles/list/tags/cellebrite-mobile-forensic.htmlhttp://wikileaks.org/spyfiles/list/tags/cct.htmlhttp://wikileaks.org/spyfiles/list/tags/cambridgecon-comint.htmlhttp://wikileaks.org/spyfiles/list/tags/bluecoat.htmlhttp://wikileaks.org/spyfiles/list/tags/bea-tactical.htmlhttp://wikileaks.org/spyfiles/list/tags/bea.htmlhttp://wikileaks.org/spyfiles/list/tags/audio-surveillance.htmlhttp://wikileaks.org/spyfiles/list/tags/atis-li.htmlhttp://wikileaks.org/spyfiles/list/tags/atis.htmlhttp://wikileaks.org/spyfiles/list/tags/aqsacom-li.htmlhttp://wikileaks.org/spyfiles/list/tags/aqsacom.htmlhttp://wikileaks.org/spyfiles/list/tags/amesys-wifi.htmlhttp://wikileaks.org/spyfiles/list/tags/amesys-targetlist.htmlhttp://wikileaks.org/spyfiles/list/tags/amesys-strategic-interception.htmlhttp://wikileaks.org/spyfiles/list/tags/amesys-stragegic-massive.htmlhttp://wikileaks.org/spyfiles/list/tags/amesys-comint.htmlhttp://wikileaks.org/spyfiles/list/tags/amesys-adsl-tactical.htmlhttp://wikileaks.org/spyfiles/list/tags/amesys.htmlhttp://wikileaks.org/spyfiles/list/tags/altron-wifi.html -
8/3/2019 Spy Files Great Wall of Wikileaks Occupy London
8/48
DPIDR
DREAMLAB LIDetection
EBS Electronic GPRS TrackingELAMAN COMINT
ELTA IAI Tactical GSM UMTS Satellite Wifi InterceptionENDACE COMPLIANCE
ETIGROUP LIETSI
EVIDIAN BULLEXPERT SYSTEM Analytics
EXPERT SYSTEM Semantic AnalyticsEncryptionFOXIT FoXReplay Analytics Software
FOXIT FoxReplay Covert Analytics SoftwareFOXIT FoxReplay Personal Workstation Analysis SoftwareFOXIT FoxReplay Workstation Protection Analysis Software
ForensicsGLIMMERGLASS
GLIMMERGLASS SIGINT
GLIMMERGLASS Strategic / Tactical Interception MonitoringGRIFFCOMM GPS Tracker Tactical
GRIFFCOMM RecordingGRIFFCOMM Tactical Audio
GRIFFCOMM Tactical Audio MicrophoneGRIFFCOMM Tactical Audio Transmitter
GRIFFCOMM Tactical Audio Transmitter ReceiverGRIFFCOMM Tactical Audio Video
GRIFFCOMM Tactical Audio Video RecorderGRIFFCOMM Tactical Audio Video TransceiverGRIFFCOMM Tactical Camcorder
GRIFFCOMM Tactical Covert MicrophoneGRIFFCOMM Tactical GPS Tracking
GRIFFCOMM Tactical MicrophoneGRIFFCOMM Tactical Tracking GPS
http://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-tracking-gps.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-microphone.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-gps-tracking.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-covert-microphone.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-camcorder.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-audio-video-transceiver.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-audio-video-recorder.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-audio-video.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-audio-transmitter-receiver.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-audio-transmitter.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-audio-microphone.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-audio.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-recording.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-gps-tracker-tactical.htmlhttp://wikileaks.org/spyfiles/list/tags/glimmerglass-strategic-tactical-interception-monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/glimmerglass-sigint.htmlhttp://wikileaks.org/spyfiles/list/tags/glimmerglass.htmlhttp://wikileaks.org/spyfiles/list/tags/forensics.htmlhttp://wikileaks.org/spyfiles/list/tags/foxit-foxreplay-workstation-protection-analysis-software.htmlhttp://wikileaks.org/spyfiles/list/tags/foxit-foxreplay-personal-workstation-analysis-software.htmlhttp://wikileaks.org/spyfiles/list/tags/foxit-foxreplay-covert-analytics-software.htmlhttp://wikileaks.org/spyfiles/list/tags/foxit-foxreplay-analytics-software.htmlhttp://wikileaks.org/spyfiles/list/tags/encryption.htmlhttp://wikileaks.org/spyfiles/list/tags/expert-system-semantic-analytics.htmlhttp://wikileaks.org/spyfiles/list/tags/expert-system-analytics.htmlhttp://wikileaks.org/spyfiles/list/tags/evidian-bull.htmlhttp://wikileaks.org/spyfiles/list/tags/etsi.htmlhttp://wikileaks.org/spyfiles/list/tags/etigroup-li.htmlhttp://wikileaks.org/spyfiles/list/tags/endace-compliance.htmlhttp://wikileaks.org/spyfiles/list/tags/elta-iai-tactical-gsm-umts-satellite-wifi-interception.htmlhttp://wikileaks.org/spyfiles/list/tags/elaman-comint.htmlhttp://wikileaks.org/spyfiles/list/tags/ebs-electronic-gprs-tracking.htmlhttp://wikileaks.org/spyfiles/list/tags/detection.htmlhttp://wikileaks.org/spyfiles/list/tags/dreamlab-li.htmlhttp://wikileaks.org/spyfiles/list/tags/dr.htmlhttp://wikileaks.org/spyfiles/list/tags/dpi.html -
8/3/2019 Spy Files Great Wall of Wikileaks Occupy London
9/48
GRIFFCOMM Tactical Video recorderGUIDANCE Incident ResponseHACKINGTEAM RCS TROJAN
HACKINGTEAM TROJAN
HP Hewlett Packard LI Monitoring DR DPI ISSINNOVA SPA TACTICAL
INTREPID AnalyticsINTREPID OSIINVEATECH LI
IPIP InterceptionIPOQUE DPI
IPSIPS MonitoringIT security & forensic
IntelligenceInterception
Jammer SystemsKAPOW OSINT
LILI ALCATEL-LUCENT
LI DRLI ETSI
LI IPLI Monitoring
LOQUENDO Speech RecognitionMANTARO COMINT
MEDAV MONITORINGMobile
Mobile ForensicMonitoringMonitoring Systems
NETOPTICS COMINTNETOPTICS LINETQUEST LI
NETRONOME Monitoring
http://wikileaks.org/spyfiles/list/tags/netronome-monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/netquest-li.htmlhttp://wikileaks.org/spyfiles/list/tags/netoptics-li.htmlhttp://wikileaks.org/spyfiles/list/tags/netoptics-comint.htmlhttp://wikileaks.org/spyfiles/list/tags/monitoring-systems.htmlhttp://wikileaks.org/spyfiles/list/tags/monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/mobile-forensic.htmlhttp://wikileaks.org/spyfiles/list/tags/mobile.htmlhttp://wikileaks.org/spyfiles/list/tags/medav-monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/mantaro-comint.htmlhttp://wikileaks.org/spyfiles/list/tags/loquendo-speech-recognition.htmlhttp://wikileaks.org/spyfiles/list/tags/li-monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/li-ip.htmlhttp://wikileaks.org/spyfiles/list/tags/li-etsi.htmlhttp://wikileaks.org/spyfiles/list/tags/li-dr.htmlhttp://wikileaks.org/spyfiles/list/tags/li-alcatel-lucent.htmlhttp://wikileaks.org/spyfiles/list/tags/li.htmlhttp://wikileaks.org/spyfiles/list/tags/kapow-osint.htmlhttp://wikileaks.org/spyfiles/list/tags/jammer-systems.htmlhttp://wikileaks.org/spyfiles/list/tags/interception.htmlhttp://wikileaks.org/spyfiles/list/tags/intelligence.htmlhttp://wikileaks.org/spyfiles/list/tags/it-security-and-forensic.htmlhttp://wikileaks.org/spyfiles/list/tags/ips-monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/ips.htmlhttp://wikileaks.org/spyfiles/list/tags/ipoque-dpi.htmlhttp://wikileaks.org/spyfiles/list/tags/ip-interception.htmlhttp://wikileaks.org/spyfiles/list/tags/ip.htmlhttp://wikileaks.org/spyfiles/list/tags/inveatech-li.htmlhttp://wikileaks.org/spyfiles/list/tags/intrepid-osi.htmlhttp://wikileaks.org/spyfiles/list/tags/intrepid-analytics.htmlhttp://wikileaks.org/spyfiles/list/tags/innova-spa-tactical.htmlhttp://wikileaks.org/spyfiles/list/tags/hp-hewlett-packard-li-monitoring-dr-dpi-iss.htmlhttp://wikileaks.org/spyfiles/list/tags/hackingteam-trojan.htmlhttp://wikileaks.org/spyfiles/list/tags/hackingteam-rcs-trojan.htmlhttp://wikileaks.org/spyfiles/list/tags/guidance-incident-response.htmlhttp://wikileaks.org/spyfiles/list/tags/griffcomm-tactical-video-recorder.html -
8/3/2019 Spy Files Great Wall of Wikileaks Occupy London
10/48
NEWPORT NETWORKS LINEWPORT NETWORKS VOIP
NICENICE Monitoring
ONPATH LIPACKETFORENSICS
PADPAD Tactical GPS Audio Transmitter
PAD Tactical GPS Tracking Audio TransmitterPALADION
PANOPTECHPHONEXIA Speech Recognition
PLATH ProfilingQOSMOS COMINTQOSMOS DPI
QOSMOS IdentificationQOSMOS Monitoring
RAYTHEONSCAN&TARGET Analytics
SEARTECH TACTICAL AUDIO TRANSMITTERSEARTECH TACTICAL RECEIVER
SEPTIER LISHOGI GSM Interception
SIEMENS Monitoring CenterSIGINT
SIMENA LISMS
SPEI GPS Tracking SoftwareSPEI Tactical Audio Transmitter
SPEI Tactical ReceiverSPEI Tactical Tracking GPSSPEI Tactical TransceiverSPEI Tracking Software
SS8 IP InterceptionSS8 Intelligence Analysis Software
SS8 Social Network Analysis Software
http://wikileaks.org/spyfiles/list/tags/ss8-social-network-analysis-software.htmlhttp://wikileaks.org/spyfiles/list/tags/ss8-intelligence-analysis-software.htmlhttp://wikileaks.org/spyfiles/list/tags/ss8-ip-interception.htmlhttp://wikileaks.org/spyfiles/list/tags/spei-tracking-software.htmlhttp://wikileaks.org/spyfiles/list/tags/spei-tactical-transceiver.htmlhttp://wikileaks.org/spyfiles/list/tags/spei-tactical-tracking-gps.htmlhttp://wikileaks.org/spyfiles/list/tags/spei-tactical-receiver.htmlhttp://wikileaks.org/spyfiles/list/tags/spei-tactical-audio-transmitter.htmlhttp://wikileaks.org/spyfiles/list/tags/spei-gps-tracking-software.htmlhttp://wikileaks.org/spyfiles/list/tags/sms.htmlhttp://wikileaks.org/spyfiles/list/tags/simena-li.htmlhttp://wikileaks.org/spyfiles/list/tags/sigint.htmlhttp://wikileaks.org/spyfiles/list/tags/siemens-monitoring-center.htmlhttp://wikileaks.org/spyfiles/list/tags/shogi-gsm-interception.htmlhttp://wikileaks.org/spyfiles/list/tags/septier-li.htmlhttp://wikileaks.org/spyfiles/list/tags/seartech-tactical-receiver.htmlhttp://wikileaks.org/spyfiles/list/tags/seartech-tactical-audio-transmitter.htmlhttp://wikileaks.org/spyfiles/list/tags/scan-and-target-analytics.htmlhttp://wikileaks.org/spyfiles/list/tags/raytheon.htmlhttp://wikileaks.org/spyfiles/list/tags/qosmos-monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/qosmos-identification.htmlhttp://wikileaks.org/spyfiles/list/tags/qosmos-dpi.htmlhttp://wikileaks.org/spyfiles/list/tags/qosmos-comint.htmlhttp://wikileaks.org/spyfiles/list/tags/plath-profiling.htmlhttp://wikileaks.org/spyfiles/list/tags/phonexia-speech-recognition.htmlhttp://wikileaks.org/spyfiles/list/tags/panoptech.htmlhttp://wikileaks.org/spyfiles/list/tags/paladion.htmlhttp://wikileaks.org/spyfiles/list/tags/pad-tactical-gps-tracking-audio-transmitter.htmlhttp://wikileaks.org/spyfiles/list/tags/pad-tactical-gps-audio-transmitter.htmlhttp://wikileaks.org/spyfiles/list/tags/pad.htmlhttp://wikileaks.org/spyfiles/list/tags/packetforensics.htmlhttp://wikileaks.org/spyfiles/list/tags/onpath-li.htmlhttp://wikileaks.org/spyfiles/list/tags/nice-monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/nice.htmlhttp://wikileaks.org/spyfiles/list/tags/newport-networks-voip.htmlhttp://wikileaks.org/spyfiles/list/tags/newport-networks-li.html -
8/3/2019 Spy Files Great Wall of Wikileaks Occupy London
11/48
STC Speech RecognitionSTRATIGN
Strategic InterceptionTELESOFT DR
TELESOFT IP INTERCEPTTHALES Strategic Monitoring
TRACESPANTRACESPAN FIBRE INTERCEPTION
TRACESPAN MonitoringTROJANS
TSU training equipment scheduleTargeting
UTIMACO DRUTIMACO LIUTIMACO LI DPI
UTIMACO LI MonitoringVASTECH Strategic Interception / Recording / Monitoring
VASTECH ZEBRAVIP protection
VOIPVUPEN EXPLOITS TROJANS
Video Surveillancerecorders
surveillance vehiclestracking
by Date of Document
unspecified20062007
2008200920102011
by Date of Release
2011-12-01
http://wikileaks.org/spyfiles/list/releasedate/2011-12-01.htmlhttp://wikileaks.org/spyfiles/list/date/2011.htmlhttp://wikileaks.org/spyfiles/list/date/2010.htmlhttp://wikileaks.org/spyfiles/list/date/2009.htmlhttp://wikileaks.org/spyfiles/list/date/2008.htmlhttp://wikileaks.org/spyfiles/list/date/2007.htmlhttp://wikileaks.org/spyfiles/list/date/2006.htmlhttp://wikileaks.org/spyfiles/list/date/unspecified.htmlhttp://wikileaks.org/spyfiles/list/tags/tracking.htmlhttp://wikileaks.org/spyfiles/list/tags/surveillance-vehicles.htmlhttp://wikileaks.org/spyfiles/list/tags/recorders.htmlhttp://wikileaks.org/spyfiles/list/tags/video-surveillance.htmlhttp://wikileaks.org/spyfiles/list/tags/vupen-exploits-trojans.htmlhttp://wikileaks.org/spyfiles/list/tags/voip.htmlhttp://wikileaks.org/spyfiles/list/tags/vip-protection.htmlhttp://wikileaks.org/spyfiles/list/tags/vastech-zebra.htmlhttp://wikileaks.org/spyfiles/list/tags/vastech-strategic-interception-recording-monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/utimaco-li-monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/utimaco-li-dpi.htmlhttp://wikileaks.org/spyfiles/list/tags/utimaco-li.htmlhttp://wikileaks.org/spyfiles/list/tags/utimaco-dr.htmlhttp://wikileaks.org/spyfiles/list/tags/targeting.htmlhttp://wikileaks.org/spyfiles/list/tags/tsu-training-equipment-schedule.htmlhttp://wikileaks.org/spyfiles/list/tags/trojans.htmlhttp://wikileaks.org/spyfiles/list/tags/tracespan-monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/tracespan-fibre-interception.htmlhttp://wikileaks.org/spyfiles/list/tags/tracespan.htmlhttp://wikileaks.org/spyfiles/list/tags/thales-strategic-monitoring.htmlhttp://wikileaks.org/spyfiles/list/tags/telesoft-ip-intercept.htmlhttp://wikileaks.org/spyfiles/list/tags/telesoft-dr.htmlhttp://wikileaks.org/spyfiles/list/tags/strategic-interception.htmlhttp://wikileaks.org/spyfiles/list/tags/stratign.htmlhttp://wikileaks.org/spyfiles/list/tags/stc-speech-recognition.html -
8/3/2019 Spy Files Great Wall of Wikileaks Occupy London
12/48
Our Partners
OWNIBureau of Investigative Journalism
Privacy InternationalL'Expresso
La RepubblicaARD
The Hindu
Translations
[fr] Wikileaks : Un monde sous surveillanceMore articles ...
- The Spyfiles - The Map
WikiLeaks: The Spy Files
Mass interception of entire populations is not only a reality, it is asecret new industry spanning 25 countries
It sounds like something out of Hollywood, but as of today, mass
interception systems, built by Western intelligence contractors,including for political opponents are a reality. Today WikiLeaksbegan releasing a database of hundreds of documents from as manyas 160 intelligence contractors in the mass surveillance industry.Working with Bugged Planet and Privacy International, as well asmedia organizations form six countries ARD in Germany, TheBureau of Investigative Journalism in the UK, The Hindu in India,LEspresso in Italy, OWNI in France and the Washington Post in theU.S. Wikileaks is shining a light on this secret industry that hasboomed since September 11, 2001 and is worth billions of dollars peryear. WikiLeaks has released 287 documents today, but the SpyFiles project is ongoing and further information will be released thisweek and into next year.
International surveillance companies are based in the more
http://wikileaks.org/The-Spyfiles-The-Map.htmlhttp://wikileaks.org/Wikileaks-Un-monde-sous.htmlhttp://www.thehindu.com/http://www.ard.de/http://www.repubblica.it/http://espresso.repubblica.it/https://www.privacyinternational.org/http://www.thebureauinvestigates.com/http://owni.fr/ -
8/3/2019 Spy Files Great Wall of Wikileaks Occupy London
13/48
technologically sophisticated countries, and they sell their technologyon to every country of the world. This industry is, in practice,unregulated. Intelligence agencies, military forces and policeauthorities are able to silently, and on mass, and secretly intercept
calls and take over computers without the help or knowledge of thetelecommunication providers. Users physical location can be trackedif they are carrying a mobile phone, even if it is only on stand by.
But the WikiLeaks Spy Files are more than just about goodWestern countries exporting to bad developing world countries.Western companies are also selling a vast range of masssurveillance equipment to Western intelligence agencies. In traditionalspy stories, intelligence agencies like MI5 bug the phone of one ortwo people of interest. In the last ten years systems forindiscriminate, mass surveillance have become the norm. Intelligencecompanies such as VASTech secretly sell equipment to permanentlyrecord the phone calls of entire nations. Others record the location ofevery mobile phone in a city, down to 50 meters. Systems to infectevery Facebook user, or smart-phone owner of an entire populationgroup are on the intelligence market.
Selling Surveillance to DictatorsWhen citizens overthrew the dictatorships in Egypt and Libya this
year, they uncovered listening rooms where devices from Gammacorporation of the UK, Amesys of France, VASTech of South Africaand ZTE Corp of China monitored their every move online and on thephone.
Surveillance companies like SS8 in the U.S., Hacking Team in Italyand Vupen in France manufacture viruses (Trojans) that hijackindividual computers and phones (including iPhones, Blackberriesand Androids), take over the device, record its every use, movement,and even the sights and sounds of the room it is in. Other companieslike Phoenexia in the Czech Republic collaborate with the military tocreate speech analysis tools. They identify individuals by gender, ageand stress levels and track them based on voiceprints. Blue Coat in
-
8/3/2019 Spy Files Great Wall of Wikileaks Occupy London
14/48
the U.S. and Ipoque in Germany sell tools to governments incountries like China and Iran to prevent dissidents from organizingonline.
Trovicor, previously a subsidiary of Nokia Siemens Networks,supplied the Bahraini government with interception technologies thattracked human rights activist Abdul Ghani Al Khanjar. He was showndetails of personal mobile phone conversations from before he wasinterrogated and beaten in the winter of 2010-2011.
How Mass Surveillance Contractors Share Your Data with the
State
In January 2011, the National Security Agency broke ground on a$1.5 billion facility in the Utah desert that is designed to storeterabytes of domestic and foreign intelligence data forever andprocess it for years to come.
Telecommunication companies are forthcoming when it comes todisclosing client information to the authorities - no matter the country.Headlines during Augusts unrest in the UK exposed how Researchin Motion (RIM), makers of the Blackberry, offered to help the
government identify their clients. RIM has been in similar negotiationsto share BlackBerry Messenger data with the governments of India,Lebanon, Saudi Arabia, and the United Arab Emirates.
Weaponizing Data Kills Innocent People
There are commercial firms that now sell special software thatanalyze this data and turn it into powerful tools that can be used bymilitary and intelligence agencies.
For example, in military bases across the U.S., Air Force pilots usea video link and joystick to fly Predator drones to conductsurveillance over the Middle East and Central Asia. This data isavailable to Central Intelligence Agency officials who use it to fireHellfire missiles on targets.
-
8/3/2019 Spy Files Great Wall of Wikileaks Occupy London
15/48
The CIA officials have bought software that allows them to matchphone signals and voice prints instantly and pinpoint the specificidentity and location of individuals. Intelligence Integration Systems,Inc., based in Massachusetts - sells a location-based analytics
software called Geospatial Toolkit for this purpose. AnotherMassachusetts company named Netezza, which bought a copy ofthe software, allegedly reverse engineered the code and sold ahacked version to the Central Intelligence Agency for use in remotelypiloted drone aircraft.
IISI, which says that the software could be wrong by a distance ofup to 40 feet, sued Netezza to prevent the use of this software.Company founder Rich Zimmerman stated in court that his reactionwas one of stun, amazement that they (CIA) want to kill people withmy software that doesnt work."
Orwells World
Across the world, mass surveillance contractors are helpingintelligence agencies spy on individuals and communities of intereston an industrial scale.
The Wikileaks Spy Files reveal the details of which companies aremaking billions selling sophisticated tracking tools to governmentbuyers, flouting export rules, and turning a blind eye to dictatorialregimes that abuse human rights.
How to use the Spy Files
To search inside those files, click one of the link on the left pane ofthis page, to get the list of documents by type, company date or tag.
To search all these companies on a world map use the followingtool from Owni
http://wikileaks.org/The-Spyfiles-The-Map.htmlhttp://wikileaks.org/The-Spyfiles-The-Map.htmlhttp://wikileaks.org/The-Spyfiles-The-Map.htmlhttp://wikileaks.org/The-Spyfiles-The-Map.html -
8/3/2019 Spy Files Great Wall of Wikileaks Occupy London
16/48
from the hindu
NEWSINTERNATIONALLONDON,December 2, 2011Big Brother is everywhere now
HASAN SUROORSHARE COMMENT(11) PRINT T+
AP
WikiLeaks founder Julian Assange during a news conference in central London, on
http://www.thehindu.com/news/international/article2678603.ece#http://www.thehindu.com/news/international/article2678603.ece?css=printhttp://www.thehindu.com/news/international/article2678603.ece#commentshttp://www.addthis.com/bookmark.php?v=20http://www.thehindu.com/news/international/http://www.thehindu.com/news/ -
8/3/2019 Spy Files Great Wall of Wikileaks Occupy London
17/48
Thursday.
How many of you here have an iPhone, a Blackberry or any other
mobile device?'' WikiLeaks founder Julian Assange asked surveying a hallfull of people at the City University here on Thursday. As hand after
hand went up, he told them that everyone of them, irrespective of what
kind of mobile device they carried, was a potential target of spying.
This was how stark the threat from a booming multi-billion dollar global
mass surveillance industry was, Mr. Assange said as he released a cache
of 287 files providing a rare glimpse into how the industry was operating
without any checks.
The Spy Files, spanning 25 countries, are first of a series of sensitive data
that WikiLeaks plans to publish in coming months.
Working with Bugged Planet and Privacy International, as well as media
organisations from six countries ARD in Germany, The Bureau of
Investigative Journalism in the UK, The Hindu in India, L'Espresso in
Italy, OWNI in France and the Washington Post in the U.S. Wikileaks is
shining a light on this secret industry that has boomed since September
11, 2001 and is worth billions of dollars per year. WikiLeaks has released
287 documents today [Thursday], but the Spy Files project is ongoingand further information will be released this week and into next year,''
Mr. Assange said at a crowded press conference.
-
8/3/2019 Spy Files Great Wall of Wikileaks Occupy London
18/48
N. Ram, Editor-in-Chief ofThe Hindu, speaking through a video-link,
expressed concern over a fast growing and completely unregulated
surveillance industry in India. At least two Indian companies were selling
surveillance technology without any regulation.
We are very concerned about our privacy violations,'' he said.
Mr. Ram said that working with WikiLeaks had been a very valuable
experience. The issue highlighted by WikiLeaks was of greatinternational significance'' and of significance to India.
Mr. Assange said that it might sound like something out of Hollywood
but mass interception systems built by Western intelligence
contractors'' were a reality. Over the past decade, the surveillance
industry had grown from a covert operation which primarily suppliedequipment to government intelligence agencies such as the NSA in
America and Britain's GCHQ, into a huge transnational business.
Dramatically illustrating the threat, Mr. Assange said that potentially
everyone who carried any mobile device was a sitting duck for anyone
wanting to spy on them. The threat to investigative journalism from
these new and covert surveillance techniques was particularly dire.
The only way we are going to win this war is by developing counter-
-
8/3/2019 Spy Files Great Wall of Wikileaks Occupy London
19/48
surveillance systems,'' he said.
WikiLeaks, which itself has been a victim of surveillance by intelligence
agencies and their proxies and has had its site hacked, is in the process of
developing a more secure system to submit information to the site.
Mr. Assange said that international surveillance companies were based in
the more technologically sophisticated countries, and sold their
technology to every country of the world. Intelligence agencies, militaryforces and police authorities were able to silently and secretly intercept
calls and take over computers without the help or knowledge of the
telecommunication providers.
Experts who worked on the files called for new laws to regulate export of
surveillance technology.
Western governments cannot stand idly by while this technology is still
being sold, said Eric King of the Privacy International campaign group.
Jacob Appelbaum, a computer expert at the University of Washington,
said the systems revealed in the files were as deadly as murder weapons.
-
8/3/2019 Spy Files Great Wall of Wikileaks Occupy London
20/48
These systems have been sold by Western companies to places for
example like Syria, and Libya and Tunisia and Egypt. These systems are
used to hunt people down and to murder, he said, while Pratap
Chatterjee of the Bureau of Investigative Journalism said a French firm
offered to sell such systems to the erstwhile Qadhafi regime to spy ondissidents living in Britain.
Mr. Assange warned that with entire populations being subjected to
surveillance nobody anywhere in the world was safe anymore.
In traditional spy stories, intelligence agencies like MI5 bug the phone of
one or two people of interest. In the last 10 years systems for
indiscriminate, mass surveillance have become the norm. Intelligence
companies such as VASTech secretly sell equipment to permanently
record the phone calls of entire nations. Others record the location of
every mobile phone in a city, down to 50 metres. Systems to infect every
Facebook user, or smart-phone owner of an entire population group are
on the intelligence market,'' said a statement on official WikiLeaks Spy
Files site.
Keywords: The Hindu,WikiLeaks, SpyFiles, espionage
technologies, spying on citizens, CCISat, Indian spy satellite
List of documents > Document Type >Brochure
page 1/3 - Previous - 1 - 2 - 3 - Next
http://wikileaks.org/spyfiles/list/document-type/brochure-2.htmlhttp://wikileaks.org/spyfiles/list/document-type/brochure-3.htmlhttp://wikileaks.org/spyfiles/list/document-type/brochure-2.htmlhttp://www.thehindu.com/news/international/article2678603.ece#http://www.thehindu.com/news/international/article2678603.ece#http://www.thehindu.com/news/international/article2678603.ece#http://www.thehindu.com/news/international/article2678603.ece#http://www.thehindu.com/news/international/article2678603.ece#http://www.thehindu.com/news/international/article2678603.ece#http://www.thehindu.com/news/international/article2678603.ece#http://www.thehindu.com/news/international/article2678603.ece# -
8/3/2019 Spy Files Great Wall of Wikileaks Occupy London
21/48
# Document TitleComp
any
Doc
ume
nt
Typ
e
Date
78
Lawful Interception is OurBusiness
AQSACOM
Brochure
unspecified
79
S ta n d a rd s -Ba se d L a w fu lInterception from AQSACOM
AQSACOM
Brochure
unspecifie
d
80
3 G I n t e r c e p t i o n / G S MInbetween Interception System
ABILITY
Brochure
unspecified
8
1
Alcatel-Lucent 1357 ULIS
Unified Lawful Interception Suite
ALCAT E L -
LUCENT
Broc
hure
2008
-01
82
AKOR-3 Automated radioemission source and bugdetection system
AL TRON
Brochure
2011-01
84
EAGLE EYE-IP TAP PassiveNetwork Application / Platformfor Lawful Interception andNetwork Monitoring
AL TRON
Brochure
2011-01
http://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/84_eagle-eye-ip-tap-passive-network-application-platform-for.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/altron/82_akor-3-automated-radio-emission-source-and-bug-detection.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/alcatel-lucent/81_alcatel-lucent-1357-ulis-unified-lawful-interception-suite.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/ability/80_3g-interception-gsm-inbetween-interception-system.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/79_standards-based-lawful-interception-from-aqsacom.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.htmlhttp://wikileaks.org/spyfiles/docs/aqsacom/78_lawful-interception-is-our-business.html -
8/3/2019 Spy Files Great Wall of Wikileaks Occupy London
22/48
85
E A G L E E Y E - M C N e x tG e n e r a t i o n P r o d u c t f o r Homeland Security and Law
Enforcement Agencies
AL TRON
Brochure
2011-01
86
EAGLE EYE- Wi-Fi System forWireless Tactical Packet Sniffingand Forensics Analysis
AL TRON
Brochure
2011-01
8
7
GSM/UMTS Grabber: Deployinglocal mobile networks and secretgrabbing of ident i f icat ioninformation in GSM and UMTSbands
AL TR
ON
Broc
hure
2011
-01
88
AltronsAL TRON
Brochure
2011-01
89
Navi t ron GPS Moni tor ingSystem
AL TRON
Brochure
2011-01
90
RADIUS A5/1 Fully Passive Off-the-Air GSM Intercept ingSystem
AL TRON
Brochure
2011-01
91
Wounding Detection SystemAL TRON
Brochure
2011-01
94
CASPER-T Wi-Fi NetworkInterception
Ame sys
Brochure
unspecified
http://wikileaks.org/spyfiles/docs/amesys/96_cryptowall-mail-protect-l.htmlhttp://wikileaks.org/spyfiles/docs/amesys/95_critical-system-architect.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/amesys/94_casper-t-wi-fi-network-interception.htmlhttp://wikileaks.org/spyfiles/docs/altron/91_wounding-detection-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/90_radius-a5-1-fully-passive-off-the-air-gsm-intercepting.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/89_navitron-gps-monitoring-system.htmlhttp://wikileaks.org/spyfiles/docs/altron/88_altrons.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/87_gsm-umts-grabber-deploying-local-mobile-networks-and-secret.htmlhttp://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/86_eagle-eye-wi-fi-system-for-wireless-tactical-packet-sniffing.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-for-homeland-security.htmlhttp://wikileaks.org/spyfiles/docs/altron/85_eagle-eye-mc-next-generation-product-f