US-made monitoring devices detected on Iran and Sudan networks

 

Ellen Nakashima
Tuesday 09 July 2013 19:23
Comments
American-made devices used for internet monitoring have been detected on government and commercial computer networks in Iran
American-made devices used for internet monitoring have been detected on government and commercial computer networks in Iran

American-made devices used for internet monitoring have been detected on government and commercial computer networks in Iran and Sudan, in apparent violation of US sanctions that ban the sale of goods, services or technology to the autocratic states.

Several of the devices, manufactured by California-based Blue Coat Systems, were also discovered in Syria. Although Blue Coat tools have been identified in Syria in the past, the new research indicates that the government of President Bashar al-Assad has more of the devices than previously known.

Experts say that in Syria, Blue Coat’s tools have been used to censor websites and monitor the communications of dissidents, activists and journalists. In Iran and Sudan, it remains unclear exactly how the technologies are being used, but experts say the tools could empower repressive governments to spy on opponents.

“These devices are turning up in places they’re not supposed to be,” said Morgan Marquis-Boire, a project leader at the University of Toronto’s Citizen Lab, which detailed the findings in a new report provided to The Washington Post. “The human rights implications of finding these surveillance technologies in these countries are extremely worrying.”

Blue Coat promotes itself as a leading provider of web security and management. Its products, including high-end computer systems, are used for myriad purposes, including filtering for computer viruses and child pornography.

Some technology experts, however, have argued that because Blue Coat’s tools have various uses, they fall into regulatory gaps and are thus not subject to certain export restrictions.

“The only thing stopping the export of human-rights-abusing equipment to a country like Sudan is the blanket restriction on exports under the sanctions programme,” said Collin Anderson, an independent consultant on the Blue Coat report.

David Murphy, Blue Coat’s chief operating officer and president, said the company takes reports about its products in countries under US trade embargoes very seriously. The firm, he noted, is cooperating with a US investigation into how a reseller managed to get devices into Syria on occasions in 2010 and 2011.

The report marks the third time Blue Coat’s technology has been found in countries with governments linked to human rights abuses. In its investigation, the Citizen Lab focused on two Blue Coat devices: ProxySG and PacketShaper. The tools can be used for web filtering and traffic analysis and can help users view certain types of encrypted traffic, capabilities that are useful both to network security technicians and spy agencies.

Researchers uncovered the tools by analysing a massive database of 1.3 billion internet protocol addresses compiled anonymously by someone who apparently used a network of hacked computers to generate the data – in itself a controversial technique. The Citizen Lab, which said it was satisfied that using the internet database for research was not illegal or unethical, said it verified the results independently.

The Citizen Lab, based at the Munk School of Global Affairs, found six devices in Iran, three in Sudan and four in Syria, including on networks operated by the state-owned Syrian Telecommunications Establishment. Each device, Marquis-Boire said, probably can monitor the traffic of thousands of individual users.

Iran, which uses sophisticated tools to censor the Internet and crack down on dissidents, is also facing tough economic sanctions imposed by Western countries seeking to curb its nuclear advances. The Citizen Lab said it detected the presence of Blue Coat’s devices on several networks, including one belonging to the Information Technology Co, which is partially owned by Iran’s Revolutionary Guard Corps. The elite unit is believed to be heavily involved in Iran’s censorship of the Internet.

Register for free to continue reading

Registration is a free and easy way to support our truly independent journalism

By registering, you will also enjoy limited access to Premium articles, exclusive newsletters, commenting, and virtual events with our leading journalists

Please enter a valid email
Please enter a valid email
Must be at least 6 characters, include an upper and lower case character and a number
Must be at least 6 characters, include an upper and lower case character and a number
Must be at least 6 characters, include an upper and lower case character and a number
Please enter your first name
Special characters aren’t allowed
Please enter a name between 1 and 40 characters
Please enter your last name
Special characters aren’t allowed
Please enter a name between 1 and 40 characters
You must be over 18 years old to register
You must be over 18 years old to register
Opt-out-policy
You can opt-out at any time by signing in to your account to manage your preferences. Each email has a link to unsubscribe.

Already have an account? sign in

By clicking ‘Register’ you confirm that your data has been entered correctly and you have read and agree to our Terms of use, Cookie policy and Privacy notice.

This site is protected by reCAPTCHA and the Google Privacy policy and Terms of service apply.

Join our new commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged in