The Spy Files, files released so far... 287 The Spy Files Index pages Main List Articles Document Type Brochure Catalogue Contract Manual Newsletter Paper Presentation Pricelist Video Company Name ABILITY ADAE - Authority for the Assurance of Communication Security and Privacy (Greece) ALCATEL-LUCENT ALTRON
AQSACOM ATIS ATIS Systems GmbH AcmePacket Agnitio Amesys Atis Uher BEA BLUECOAT CCT Cecratech CELLEBRITE CLEARTRAIL COBHAM CRFS CRYPTON-M Cambridge Consultants DATAKOM DATONG DETICA DREAMLAB Delta SPA Dialogic DigiTask EBS Electronic ELAMAN ELTA ETIGROUP ETSI ETSI TC LI ETSI TC-LI EVIDIAN Endace Expert System FOXIT GRIFFCOMM GROUP2000
GTEN GUIDANCE Glimmerglass HP HackingTeam INNOVA SPA INVEATECH IPOQUE IPS Kapow Software LOQUENDO Mantaro Medav NETI NEWPORT NETWORKS NICE NICE Systems NetOptics NetOptics Inc. NetQuest Netronome Nokia Siemens Networks Ntrepid OXYGEN OnPath PACKETFORENSICS PAD PALADION PANOPTECH PLATH Phonexia Pine Digital Security Protei QOSMOS RETENTIA SEARTECH
SHOGI SIEMENS SPEI SS8 STRATIGN Scan & Target Septier Septier Communication Ltd. Simena Speech Technology Center TRACESPAN Thales Utimaco Utimaco Safeware AG VUPEN Security VasTech telesoft Service Product ADSL Interception Analysis Software Audio / Video digital recorder Audio Receiver Audio Surveillance Audio Transmitter Capture and Recording of All Traffic Cellphone Forensic Counter Surveillance DR Data Retention Detection Encryption Exploits Fibre Interception GPS Tracker GPS Tracking Software
GSM Tactical Interception GSM Transceiver IP DR IP LI IT security & forensic Incident Response Intelligence Analysis Software Jammer Systems LI LI DR LI DR DPI ISS Lawful Interception Monitoring Monitoring Center Monitoring Systems PDA Tracking Software Passive Surveillance RCS Trojan Receiver Recording Recoring Satellite Interception Session Border Control Social Network Analysis Software Speech Recognition Storage Strategic / Tactical Interception Monitoring Strategic Internet Monitoring & Recording Strategic Surveillance / Recording TCSM TROJAN TSU training equipment schedule Tactical Tactical Audio Microphone Tactical Audio Receiver Transmitter Tactical Audio Recorder
Tactical Audio Transmitter Tactical Audio Video recorder Tactical Camcorder Tactical Covert Audio Transmitter over GSM Tactical Covert Digitl Audio Recorder Tactical Covert GPS Tracker Tactical Covert Microphone Tactical Digital Audio and Video Recorder Tactical GPS Audio Transmitter Tactical GPS Tracking Tactical GSM / 3G Interception Tactical GSM UMTS Satellite Wifi Interception Tactical Microphone Tactical Tracking Tactical Video recorder Tactitcal Tracking Tactitcal Transceiver for audio video Trojans VDSL Interceptor VIP protection Video Surveillance WIFI Intercept recorders surveillance vehicles tracking Tags ABILITY 3G GSM ACME Packet ADAE LI AGNITIO Speech Recognition ALTRON ALTRON AKOR-3 TCSM ALTRON AMUR Recording Interception ALTRON MONITORING ALTRON TRACKING
ALTRON WIFI AMESYS AMESYS ADSL Tactical AMESYS COMINT AMESYS STRAGEGIC MASSIVE AMESYS Strategic Interception AMESYS Targetlist AMESYS WIFI AQSACOM AQSACOM LI ATIS ATIS LI Audio Surveillance BEA BEA Tactical BLUECOAT CAMBRIDGECON COMINT CCT CELLEBRITE Mobile Forensic CLEARTRAIL COBHAM COBHAM Repeater COBHAM Tactical LI COMINT CRFS RFEYE CRYPTON-M Strategic Internet Traffic Monitoring Recording Cloud Computing Counter Surveillance DATAKOM LI DATONG DELTA SPA Satellite Interception DETICA DIGITASK DIGITASK LI IP DIGITASK Trojans DIGITASK WIFI
DPI DR DREAMLAB LI Detection EBS Electronic GPRS Tracking ELAMAN COMINT ELTA IAI Tactical GSM UMTS Satellite Wifi Interception ENDACE COMPLIANCE ETIGROUP LI ETSI EVIDIAN BULL EXPERT SYSTEM Analytics EXPERT SYSTEM Semantic Analytics Encryption FOXIT FoXReplay Analytics Software FOXIT FoxReplay Covert Analytics Software FOXIT FoxReplay Personal Workstation Analysis Software FOXIT FoxReplay Workstation Protection Analysis Software Forensics GLIMMERGLASS GLIMMERGLASS SIGINT GLIMMERGLASS Strategic / Tactical Interception Monitoring GRIFFCOMM GPS Tracker Tactical GRIFFCOMM Recording GRIFFCOMM Tactical Audio GRIFFCOMM Tactical Audio Microphone GRIFFCOMM Tactical Audio Transmitter GRIFFCOMM Tactical Audio Transmitter Receiver GRIFFCOMM Tactical Audio Video GRIFFCOMM Tactical Audio Video Recorder GRIFFCOMM Tactical Audio Video Transceiver GRIFFCOMM Tactical Camcorder GRIFFCOMM Tactical Covert Microphone GRIFFCOMM Tactical GPS Tracking GRIFFCOMM Tactical Microphone GRIFFCOMM Tactical Tracking GPS
GRIFFCOMM Tactical Video recorder GUIDANCE Incident Response HACKINGTEAM RCS TROJAN HACKINGTEAM TROJAN HP Hewlett Packard LI Monitoring DR DPI ISS INNOVA SPA TACTICAL INTREPID Analytics INTREPID OSI INVEATECH LI IP IP Interception IPOQUE DPI IPS IPS Monitoring IT security & forensic Intelligence Interception Jammer Systems KAPOW OSINT LI LI ALCATEL-LUCENT LI DR LI ETSI LI IP LI Monitoring LOQUENDO Speech Recognition MANTARO COMINT MEDAV MONITORING Mobile Mobile Forensic Monitoring Monitoring Systems NETOPTICS COMINT NETOPTICS LI NETQUEST LI NETRONOME Monitoring
NEWPORT NETWORKS LI NEWPORT NETWORKS VOIP NICE NICE Monitoring ONPATH LI PACKETFORENSICS PAD PAD Tactical GPS Audio Transmitter PAD Tactical GPS Tracking Audio Transmitter PALADION PANOPTECH PHONEXIA Speech Recognition PLATH Profiling QOSMOS COMINT QOSMOS DPI QOSMOS Identification QOSMOS Monitoring RAYTHEON SCAN&TARGET Analytics SEARTECH TACTICAL AUDIO TRANSMITTER SEARTECH TACTICAL RECEIVER SEPTIER LI SHOGI GSM Interception SIEMENS Monitoring Center SIGINT SIMENA LI SMS SPEI GPS Tracking Software SPEI Tactical Audio Transmitter SPEI Tactical Receiver SPEI Tactical Tracking GPS SPEI Tactical Transceiver SPEI Tracking Software SS8 IP Interception SS8 Intelligence Analysis Software SS8 Social Network Analysis Software
STC Speech Recognition STRATIGN Strategic Interception TELESOFT DR TELESOFT IP INTERCEPT THALES Strategic Monitoring TRACESPAN TRACESPAN FIBRE INTERCEPTION TRACESPAN Monitoring TROJANS TSU training equipment schedule Targeting UTIMACO DR UTIMACO LI UTIMACO LI DPI UTIMACO LI Monitoring VASTECH Strategic Interception / Recording / Monitoring VASTECH ZEBRA VIP protection VOIP VUPEN EXPLOITS TROJANS Video Surveillance recorders surveillance vehicles tracking by Date of Document unspecified 2006 2007 2008 2009 2010 2011 by Date of Release 2011-12-01
Our Partners OWNI Bureau of Investigative Journalism Privacy International L'Expresso La Repubblica ARD The Hindu
Translations
WikiLeaks: The Spy Files Mass interception of entire populations is not only a reality, it is a secret new industry spanning 25 countries It sounds like something out of Hollywood, but as of today, mass interception systems, built by Western intelligence contractors, including for political opponents are a reality. Today WikiLeaks began releasing a database of hundreds of documents from as many as 160 intelligence contractors in the mass surveillance industry. Working with Bugged Planet and Privacy International, as well as media organizations form six countries ARD in Germany, The Bureau of Investigative Journalism in the UK, The Hindu in India, LEspresso in Italy, OWNI in France and the Washington Post in the U.S. Wikileaks is shining a light on this secret industry that has boomed since September 11, 2001 and is worth billions of dollars per year. WikiLeaks has released 287 documents today, but the Spy Files project is ongoing and further information will be released this week and into next year. International surveillance companies are based in the more
technologically sophisticated countries, and they sell their technology on to every country of the world. This industry is, in practice, unregulated. Intelligence agencies, military forces and police authorities are able to silently, and on mass, and secretly intercept calls and take over computers without the help or knowledge of the telecommunication providers. Users physical location can be tracked if they are carrying a mobile phone, even if it is only on stand by. But the WikiLeaks Spy Files are more than just about good Western countries exporting to bad developing world countries. Western companies are also selling a vast range of mass surveillance equipment to Western intelligence agencies. In traditional spy stories, intelligence agencies like MI5 bug the phone of one or two people of interest. In the last ten years systems for indiscriminate, mass surveillance have become the norm. Intelligence companies such as VASTech secretly sell equipment to permanently record the phone calls of entire nations. Others record the location of every mobile phone in a city, down to 50 meters. Systems to infect every Facebook user, or smart-phone owner of an entire population group are on the intelligence market. Selling Surveillance to Dictators When citizens overthrew the dictatorships in Egypt and Libya this year, they uncovered listening rooms where devices from Gamma corporation of the UK, Amesys of France, VASTech of South Africa and ZTE Corp of China monitored their every move online and on the phone. Surveillance companies like SS8 in the U.S., Hacking Team in Italy and Vupen in France manufacture viruses (Trojans) that hijack individual computers and phones (including iPhones, Blackberries and Androids), take over the device, record its every use, movement, and even the sights and sounds of the room it is in. Other companies like Phoenexia in the Czech Republic collaborate with the military to create speech analysis tools. They identify individuals by gender, age and stress levels and track them based on voiceprints. Blue Coat in
the U.S. and Ipoque in Germany sell tools to governments in countries like China and Iran to prevent dissidents from organizing online. Trovicor, previously a subsidiary of Nokia Siemens Networks, supplied the Bahraini government with interception technologies that tracked human rights activist Abdul Ghani Al Khanjar. He was shown details of personal mobile phone conversations from before he was interrogated and beaten in the winter of 2010-2011. How Mass Surveillance Contractors Share Your Data with the State In January 2011, the National Security Agency broke ground on a $1.5 billion facility in the Utah desert that is designed to store terabytes of domestic and foreign intelligence data forever and process it for years to come. Telecommunication companies are forthcoming when it comes to disclosing client information to the authorities - no matter the country. Headlines during Augusts unrest in the UK exposed how Research in Motion (RIM), makers of the Blackberry, offered to help the government identify their clients. RIM has been in similar negotiations to share BlackBerry Messenger data with the governments of India, Lebanon, Saudi Arabia, and the United Arab Emirates. Weaponizing Data Kills Innocent People There are commercial firms that now sell special software that analyze this data and turn it into powerful tools that can be used by military and intelligence agencies. For example, in military bases across the U.S., Air Force pilots use a video link and joystick to fly Predator drones to conduct surveillance over the Middle East and Central Asia. This data is available to Central Intelligence Agency officials who use it to fire Hellfire missiles on targets.
The CIA officials have bought software that allows them to match phone signals and voice prints instantly and pinpoint the specific identity and location of individuals. Intelligence Integration Systems, Inc., based in Massachusetts - sells a location-based analytics software called Geospatial Toolkit for this purpose. Another Massachusetts company named Netezza, which bought a copy of the software, allegedly reverse engineered the code and sold a hacked version to the Central Intelligence Agency for use in remotely piloted drone aircraft. IISI, which says that the software could be wrong by a distance of up to 40 feet, sued Netezza to prevent the use of this software. Company founder Rich Zimmerman stated in court that his reaction was one of stun, amazement that they (CIA) want to kill people with my software that doesnt work." Orwells World Across the world, mass surveillance contractors are helping intelligence agencies spy on individuals and communities of interest on an industrial scale. The Wikileaks Spy Files reveal the details of which companies are making billions selling sophisticated tracking tools to government buyers, flouting export rules, and turning a blind eye to dictatorial regimes that abuse human rights. How to use the Spy Files To search inside those files, click one of the link on the left pane of this page, to get the list of documents by type, company date or tag. To search all these companies on a world map use the following tool from Owni
LONDON,December 2, 2011
AP
Thursday.
How many of you here have an iPhone, a Blackberry or any other mobile device?'' WikiLeaks founder Julian Assange asked surveying a hall full of people at the City University here on Thursday. As hand after hand went up, he told them that everyone of them, irrespective of what kind of mobile device they carried, was a potential target of spying.
This was how stark the threat from a booming multi-billion dollar global mass surveillance industry was, Mr. Assange said as he released a cache of 287 files providing a rare glimpse into how the industry was operating without any checks.
The Spy Files, spanning 25 countries, are first of a series of sensitive data that WikiLeaks plans to publish in coming months.
Working with Bugged Planet and Privacy International, as well as media organisations from six countries ARD in Germany, The Bureau of Investigative Journalism in the UK, The Hindu in India, L'Espresso in Italy, OWNI in France and the Washington Post in the U.S. Wikileaks is shining a light on this secret industry that has boomed since September 11, 2001 and is worth billions of dollars per year. WikiLeaks has released 287 documents today [Thursday], but the Spy Files project is ongoing and further information will be released this week and into next year,'' Mr. Assange said at a crowded press conference.
N. Ram, Editor-in-Chief of The Hindu, speaking through a video-link, expressed concern over a fast growing and completely unregulated surveillance industry in India. At least two Indian companies were selling surveillance technology without any regulation.
Mr. Ram said that working with WikiLeaks had been a very valuable experience. The issue highlighted by WikiLeaks was of great international significance'' and of significance to India.
Mr. Assange said that it might sound like something out of Hollywood but mass interception systems built by Western intelligence contractors'' were a reality. Over the past decade, the surveillance industry had grown from a covert operation which primarily supplied equipment to government intelligence agencies such as the NSA in America and Britain's GCHQ, into a huge transnational business.
Dramatically illustrating the threat, Mr. Assange said that potentially everyone who carried any mobile device was a sitting duck for anyone wanting to spy on them. The threat to investigative journalism from these new and covert surveillance techniques was particularly dire.
The only way we are going to win this war is by developing counter-
WikiLeaks, which itself has been a victim of surveillance by intelligence agencies and their proxies and has had its site hacked, is in the process of developing a more secure system to submit information to the site.
Mr. Assange said that international surveillance companies were based in the more technologically sophisticated countries, and sold their technology to every country of the world. Intelligence agencies, military forces and police authorities were able to silently and secretly intercept calls and take over computers without the help or knowledge of the telecommunication providers.
Experts who worked on the files called for new laws to regulate export of surveillance technology.
Western governments cannot stand idly by while this technology is still being sold, said Eric King of the Privacy International campaign group.
Jacob Appelbaum, a computer expert at the University of Washington, said the systems revealed in the files were as deadly as murder weapons.
These systems have been sold by Western companies to places for example like Syria, and Libya and Tunisia and Egypt. These systems are used to hunt people down and to murder, he said, while Pratap Chatterjee of the Bureau of Investigative Journalism said a French firm offered to sell such systems to the erstwhile Qadhafi regime to spy on dissidents living in Britain.
Mr. Assange warned that with entire populations being subjected to surveillance nobody anywhere in the world was safe anymore.
In traditional spy stories, intelligence agencies like MI5 bug the phone of one or two people of interest. In the last 10 years systems for indiscriminate, mass surveillance have become the norm. Intelligence companies such as VASTech secretly sell equipment to permanently record the phone calls of entire nations. Others record the location of every mobile phone in a city, down to 50 metres. Systems to infect every Facebook user, or smart-phone owner of an entire population group are on the intelligence market,'' said a statement on official WikiLeaks Spy Files site.
Keywords: The Hindu, WikiLeaks, SpyFiles, espionage technologies, spying on citizens, CCISat, Indian spy satellite
Document Title
Comp any
Date
7 8
AQSA COM
7 9
AQSA COM
Broc hure
8 0
Broc hure
8 1
Broc hure
2008 -01
8 2
A K O R - 3 A ut omat ed r adi o emis s ion s our c e and bug detection system EAGLE EYE-IP TAP Passive Network Application / Platform for Lawful Interception and Network Monitoring EAGLE EYE-MC Next Generation Produc t for Homeland Security and Law Enforcement Agencies EAGLE EYE- Wi-Fi System for
Broc hure
2011 -01
8 4
ALTR ON
Broc hure
2011 -01
8 5
ALTR ON
Broc hure
2011 -01
ALTR
Broc
2011
8 4
EAGLE EYE-IP TAP Passive Network Application / Platform for Lawful Interception and Network Monitoring EAGLE EYE-MC Next Generation Produc t for Homeland Security and Law Enforcement Agencies EAGLE EYE- Wi-Fi System for Wireless Tactical Packet Sniffing and Forensics Analysis GSM/UMTS Grabber: Deploying local mobile networks and secret grabbing of identific ation information in GSM and UMTS bands Altrons N a v i t r o n G P S Mo n i t o r i n g System RADIUS A5/1 Fully Passive Offthe-Air G SM Interc epting System Wounding Detection System
ALTR ON
Broc hure
2011 -01
8 5
ALTR ON
Broc hure
2011 -01
8 6
ALTR ON
Broc hure
2011 -01
8 7
ALTR ON
Broc hure
2011 -01
8 8 8 9 9 0 9 1 9 4
Broc hure Broc hure Broc hure Broc hure Broc hure
2011 -01 2011 -01 2011 -01 2011 -01 unsp ecifie d unsp ecifie d unsp ecifie
9 5
Ames ys
Broc hure
Ames
Broc
9 4
Ames ys
Broc hure
unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie
9 5
Ames ys
Broc hure
9 6
Ames ys
Broc hure
9 7
Ames ys
Broc hure
9 8 1 0 1 1 0 2 1 0 3 1 0 4 1 0 6 1 0
Ames ys
Broc hure
SMINT - Tactical Interception Based on Eagle Core Technology GLINT - Strategic Nationwide Interception Based on Eagle Core Technology NETTAP ADSL Passive nonintrusive ADSL Tapping Probe on a analog line NETTAP ADSL Sonde Passive D
Ames ys
Broc hure
Ames ys
Broc hure
Ames ys
Broc hure
Ames ys
Broc hure
Ames ys
Broc hure
Ames
Broc
1 0 4 1 0 6 1 0 7 1 1 0 1 1 1 1 1 2 1 1 3 1 1 4 1 1 5 1 1 6 1
Ames ys
Broc hure
unsp ecifie d unsp ecifie d unsp ecifie d 2011 -01 unsp ecifie d 2011 -10
Ames ys
Broc hure
Broc hure
Broc hure
Tactical Interception
Broc hure
Broc hure
COBH AM
Broc hure
2011 -10
COBH AM
Broc hure
2011 -10
Tactical C4I Systems - Close Combat Radio (CCR) Delivering intelligence solutions to military, federal, security and law enforc ement agenc ies worldwide
COBH AM
Broc hure
2011 -10
DATO NG
Broc hure
2011 -10
E B S
1 1 5 1 1 6 1 1 9 1 2 0 1 2 1 1 2 3 1 2 5 1 2 6 1 2 7 1 2 8 1
Tactical C4I Systems - Close Combat Radio (CCR) Delivering intelligence solutions to military, federal, security and law enforc ement agenc ies worldwide GPRSpack V2 Kurzbeschreibung mit Preisliste
COBH AM
Broc hure
2011 -10
DATO NG
Broc hure
2011 -10
E B S Elec tr onic E B S Elec tr onic E B S Elec tr onic EVID I AN GRIFF COM M GRIFF COM M GRIFF COM M GRIFF COM M GRIFF
Broc hure
2006 -12
Broc hure
2007 -12
Broc hure
2008 -06
Broc hure
2011 -10
Broc hure
2008 -06
Broc hure
2008 -06
Broc hure
2008 -06
Falcon4: Smallest Audio and Video digital recorder GPS-212G / GPS-232G Real
Broc hure
2008 -06
1 2 7 1 2 8 1 2 9 1 3 0 1 3 1 1 3 2 1 3 3 1 3 4 1 3 5 1 3 6 1 3
GRIFF COM M GRIFF COM M GRIFF COM M GRIFF COM M GRIFF COM M GRIFF COM M GRIFF COM M GRIFF COM M GRIFF COM M GRIFF COM M GRIFF COM
Broc hure
2008 -06
Falcon4: Smallest Audio and Video digital recorder GPS-212G / GPS-232G Real Time High Sensitivity GPS Trackers GPS 210-GA real-time tracking system
Broc hure
2008 -06
Broc hure
2008 -06
Broc hure
2008 -06
Broc hure
2008 -06
Broc hure
2008 -06
Broc hure
2008 -06
Broc hure
2008 -06
Broc hure
2008 -06
Broc hure
2008 -06
Broc
2008
1 3 5 1 3 6 1 3 7 1 3 8 1 3 9
GRIFF COM M GRIFF COM M GRIFF COM M GRIFF COM M GRIFF COM M
Broc hure
2008 -06
Broc hure
2008 -06
Broc hure
2008 -06
Broc hure
2008 -06
Broc hure
2008 -06
Document Title
Com pany
Date
9 9
Ames ys
unsp ecifie d
Document Title
Com pany
Date
9 9 1 0 0 1 0 9 1 1 8 1 5 2 1 5 4 1 5 5 2 1 0 2 1 1 2 1
Eagle GLINT Operator Manual Version 1.0 Extracts from the EAGLE GLINT Operator Manual with more details UKSP protocol configuration on BE16UK
Ames ys
Ames ys
Man ual
BEA
Man ual
GPRSpack Bedienungsanleitung
Man ual
2006 -06
PAD
Man ual
2011 -01
SMS Befehle an diverse PAD Ger SMS Nachrichten zur Steuerung der Mikrofoneinstellungen im GSM96MMS2b Blue Coat Sy s tems SG 200 Series Installation Guide
PAD
Man ual
2011 -01
PAD
Man ual
Man ual
Man ual
Man
2 1 0 2 1 1 2 1 2 2 1 3 2 1 4 2 1 5 2 1 6 2 1 7 2 1 8 2 1 9 2 2
BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO
Man ual
unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie
Man ual
Man ual
Man ual
Man ual
Blue Coat SG510 Quick Start Guide Blue Coat Systems ProxySG Appliance SGOS 5.3.x Upgrade Guide Blue Coat Systems Reporter Configuraton and Managament Guide Blue Coat SG200 Quick Start Guide
Man ual
Man ual
Man ual
Man ual
Man ual
Man
2 1 8 2 1 9 2 2 0 2 2 1 2 2 2 2 2 3 2 2 4 2 2 5 2 2 6 2 2 7 2 2
BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO
Man ual
unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie
Man ual
Blue Coat Systems Reference Guide WCCP Reference Guide Blue Coat Systems ProxySG C ommand Line Interfac e Reference 3.2.7 Blue Coat Systems ProxySG C ommand Line Interfac e Reference 4.1.3 Blue Coat Systems ProxySG C ommand Line Interfac e Reference 4.2.3 Blue Coat Systems ProxySG Configuration and Management Guide 3.2.7 Blue Coat Systems ProxySG Configuration and Management Guide 4.1.1 Blue Coat Systems ProxySG Configuration and Management Guide 4.1.4 Blue Coat Systems ProxySG Configuration and Management Guide 4.2.3 Blue Coat Systems ProxySG Configuration and Management
Man ual
Man ual
Man ual
Man ual
Man ual
Man ual
Man ual
Man ual
Man
2 2 6 2 2 7 2 2 8 2 2 9 2 3 0 2 3 1 2 3 2 2 3 3 2 3 4 2 3 5 2 3
Blue Coat Systems ProxySG Configuration and Management Guide 4.1.4 Blue Coat Systems ProxySG Configuration and Management Guide 4.2.3 Blue Coat Systems ProxySG Configuration and Management Guide 4.2.4.1 Blue Coat Systems ProxySG Configuration and Management Guide 4.2.5 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.1 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.10 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.11 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.12 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.2 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.3 Blue Coat Systems ProxySG Configuration and Management
BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO
Man ual
unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie
Man ual
Man ual
Man ual
Man ual
Man ual
Man ual
Man ual
Man ual
Man ual
Man
2 3 4 2 3 5 2 3 6 2 3 7 2 3 8 2 3 9 2 4 0 2 4 1 2 4 2 2 4 3 2 4
Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.2 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.3 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.4 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.5 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.6 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.7 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.8 Blue Coat Systems ProxySG Configuration and Management Guide 5.1.4.9 Blue Coat Systems ProxySG Content Policy Language Guide 3.2.7 Blue Coat Systems ProxySG Content Policy Language Guide 4.1.4 Blue Coat Systems ProxySG Content Policy Language Guide
BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO
Man ual
unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie
Man ual
Man ual
Man ual
Man ual
Man ual
Man ual
Man ual
Man ual
Man ual
Man
2 4 2 2 4 3 2 4 4 2 4 5 2 4 6 2 4 7 2 4 8 2 4 9 2 5 0 2 5 1 25
Blue Coat Systems ProxySG Content Policy Language Guide 3.2.7 Blue Coat Systems ProxySG Content Policy Language Guide 4.1.4 Blue Coat Systems ProxySG Content Policy Language Guide 4.2.1 Blue Coat Systems ProxySG Content Policy Language Guide 4.2.3 Blue Coat Systems Deployment Guide Deploying the SSL Proxy for SGOS 5.1.4 Blue Coat Systems Proxy SG SGOS 4.x Upgrade Guide
BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT BLU ECO AT
Man ual
unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d unsp ecifie d
Man ual
Man ual
Man ual
Man ual
Man ual
Blue Coat Systems Proxy SG SGOS 4.x Upgrade Guide Blue Coat Systems Proxy SG Appliance Blue Coat SGOS 5.2.x. Upgrade Guide Blue Coat Systems Proxy SG Appliance SGOS 5.x Upgrade Guide Blue Coat Systems Proxy SG Appliance Configuration and Management Guide: Volume 10: Content Policy Language Guide
Man ual
Man ual
Man ual
Man ual
2 5 0 2 5 1 25 2
Blue Coat Systems Proxy SG Appliance SGOS 5.x Upgrade Guide Blue Coat Systems Proxy SG Appliance Configuration and Management Guide: Volume 10: Content Policy Language Guide
Man ual
Man ual
Blue Coat Systems SG Appliance Volume 11: Command Line Interface Reference
Document Title
Date
1 0 5
Homeland Security Program Technical Specification - Public Safety Systems and Passport Network of The Great Libyan Arab Jamahiriya
Ame sys
Cont ract
unsp ecifie d
Document Title
Co mpa ny
ume nt Typ e
Date
1 0 5
Homeland Security Program Technical Specification - Public Safety Systems and Passport Network of The Great Libyan Arab Jamahiriya
Ame sys
Cont ract
unsp ecifie d
Document Title
Company
Date
2 7 4 2 7 6
Electronic Blitz: Intelligence ops are poised to gather, move and analyze more information than ever before
Glimmergla ss
2010 -04
You
unsp ecifie d
2 7 4 2 7 6
Electronic Blitz: Intelligence ops are poised to gather, move and analyze more information than ever before
Glimmergla ss
N ew s lett er N ew s lett er
2010 -04
You
unsp ecifie d
8 3
AMUR Rec ording of all communication from voice and data networks
A LT R ON
Catalo gue
1 0 8
BEA
Catalo gue
1 2 2
E B S Electr onic
Catalo gue
1 2 4
Elaman Catalogue
ELAM AN
Catalo gue
1 2 2
E B S Electr onic
Catalo gue
20 08 -0 6 20 08 -0 5 20 11 -0 1 20 11 -0 1 20 11 -0 1
1 2 4
Elaman Catalogue
ELAM AN
Catalo gue
1 4 6
IPS
Catalo gue
2 7 5
Glimm erglas s
Catalo gue
2 7 8
STRA TIGN
Catalo gue
The Spy Files, files released so far... 287 The Spy Files Index pages Main List Document Type
The Spy Files, les released so far... 287 The Spy Files
Index pages Main List Document Type Brochure Catalogue Contract Manual Newsletter Paper Presentation Pricelist Video Company Name ABILITY ADAE - Authority for the Assurance of Communication Security and
Privacy (Greece) ALCATEL-LUCENT ALTRON AQSACOM ATIS ATIS Systems GmbH AcmePacket Agnitio Amesys Atis Uher BEA BLUECOAT CCT Cecratech CELLEBRITE CLEARTRAIL COBHAM CRFS CRYPTON-M Cambridge Consultants DATAKOM DATONG DETICA DREAMLAB Delta SPA Dialogic DigiTask EBS Electronic ELAMAN ELTA ETIGROUP ETSI ETSI TC LI ETSI TC-LI EVIDIAN Endace Expert System
FOXIT GRIFFCOMM GROUP2000 GTEN GUIDANCE Glimmerglass HP HackingTeam INNOVA SPA INVEATECH IPOQUE IPS Kapow Software LOQUENDO Mantaro Medav NETI NEWPORT NETWORKS NICE NICE Systems NetOptics NetOptics Inc. NetQuest Netronome Nokia Siemens Networks Ntrepid OXYGEN OnPath PACKETFORENSICS PAD PALADION PANOPTECH PLATH Phonexia Pine Digital Security Protei
QOSMOS RETENTIA SEARTECH SHOGI SIEMENS SPEI SS8 STRATIGN Scan & Target Septier Septier Communication Ltd. Simena Speech Technology Center TRACESPAN Thales Utimaco Utimaco Safeware AG VUPEN Security VasTech telesoft Service Product ADSL Interception Analysis Software Audio / Video digital recorder Audio Receiver Audio Surveillance Audio Transmitter Capture and Recording of All Traffic Cellphone Forensic Counter Surveillance DR Data Retention Detection Encryption Exploits
Fibre Interception GPS Tracker GPS Tracking Software GSM Tactical Interception GSM Transceiver IP DR IP LI IT security & forensic Incident Response Intelligence Analysis Software Jammer Systems LI LI DR LI DR DPI ISS Lawful Interception Monitoring Monitoring Center Monitoring Systems PDA Tracking Software Passive Surveillance RCS Trojan Receiver Recording Recoring Satellite Interception Session Border Control Social Network Analysis Software Speech Recognition Storage Strategic / Tactical Interception Monitoring Strategic Internet Monitoring & Recording Strategic Surveillance / Recording TCSM TROJAN TSU training equipment schedule Tactical
Tactical Audio Microphone Tactical Audio Receiver Transmitter Tactical Audio Recorder Tactical Audio Transmitter Tactical Audio Video recorder Tactical Camcorder Tactical Covert Audio Transmitter over GSM Tactical Covert Digital Audio Recorder Tactical Covert GPS Tracker Tactical Covert Microphone Tactical Digital Audio and Video Recorder Tactical GPS Audio Transmitter Tactical GPS Tracking Tactical GSM / 3G Interception Tactical GSM UMTS Satellite Wifi Interception Tactical Microphone Tactical Tracking Tactical Video recorder Tactitcal Tracking Tactitcal Transceiver for audio video Trojans VDSL Interceptor VIP protection Video Surveillance WIFI Intercept recorders surveillance vehicles tracking Tags ABILITY 3G GSM ACME Packet ADAE LI AGNITIO Speech Recognition ALTRON ALTRON AKOR-3 TCSM
ALTRON AMUR Recording Interception ALTRON MONITORING ALTRON TRACKING ALTRON WIFI AMESYS AMESYS ADSL Tactical AMESYS COMINT AMESYS STRAGEGIC MASSIVE AMESYS Strategic Interception AMESYS Targetlist AMESYS WIFI AQSACOM AQSACOM LI ATIS ATIS LI Audio Surveillance BEA BEA Tactical BLUECOAT CAMBRIDGECON COMINT CCT CELLEBRITE Mobile Forensic CLEARTRAIL COBHAM COBHAM Repeater COBHAM Tactical LI COMINT CRFS RFEYE CRYPTON-M Strategic Internet Traffic Monitoring Recording Cloud Computing Counter Surveillance DATAKOM LI DATONG DELTA SPA Satellite Interception DETICA DIGITASK
DIGITASK LI IP DIGITASK Trojans DIGITASK WIFI DPI DR DREAMLAB LI Detection EBS Electronic GPRS Tracking ELAMAN COMINT ELTA IAI Tactical GSM UMTS Satellite Wifi Interception ENDACE COMPLIANCE ETIGROUP LI ETSI EVIDIAN BULL EXPERT SYSTEM Analytics EXPERT SYSTEM Semantic Analytics Encryption FOXIT FoXReplay Analytics Software FOXIT FoxReplay Covert Analytics Software FOXIT FoxReplay Personal Workstation Analysis Software FOXIT FoxReplay Workstation Protection Analysis Software Forensics GLIMMERGLASS GLIMMERGLASS SIGINT GLIMMERGLASS Strategic / Tactical Interception Monitoring GRIFFCOMM GPS Tracker Tactical GRIFFCOMM Recording GRIFFCOMM Tactical Audio GRIFFCOMM Tactical Audio Microphone GRIFFCOMM Tactical Audio Transmitter GRIFFCOMM Tactical Audio Transmitter Receiver GRIFFCOMM Tactical Audio Video GRIFFCOMM Tactical Audio Video Recorder GRIFFCOMM Tactical Audio Video Transceiver GRIFFCOMM Tactical Camcorder GRIFFCOMM Tactical Covert Microphone
GRIFFCOMM Tactical GPS Tracking GRIFFCOMM Tactical Microphone GRIFFCOMM Tactical Tracking GPS GRIFFCOMM Tactical Video recorder GUIDANCE Incident Response HACKINGTEAM RCS TROJAN HACKINGTEAM TROJAN HP Hewlett Packard LI Monitoring DR DPI ISS INNOVA SPA TACTICAL INTREPID Analytics INTREPID OSI INVEATECH LI IP IP Interception IPOQUE DPI IPS IPS Monitoring IT security & forensic Intelligence Interception Jammer Systems KAPOW OSINT LI LI ALCATEL-LUCENT LI DR LI ETSI LI IP LI Monitoring LOQUENDO Speech Recognition MANTARO COMINT MEDAV MONITORING Mobile Mobile Forensic Monitoring Monitoring Systems NETOPTICS COMINT
NETOPTICS LI NETQUEST LI NETRONOME Monitoring NEWPORT NETWORKS LI NEWPORT NETWORKS VOIP NICE NICE Monitoring ONPATH LI PACKETFORENSICS PAD PAD Tactical GPS Audio Transmitter PAD Tactical GPS Tracking Audio Transmitter PALADION PANOPTECH PHONEXIA Speech Recognition PLATH Profiling QOSMOS COMINT QOSMOS DPI QOSMOS Identification QOSMOS Monitoring RAYTHEON SCAN&TARGET Analytics SEARTECH TACTICAL AUDIO TRANSMITTER SEARTECH TACTICAL RECEIVER SEPTIER LI SHOGI GSM Interception SIEMENS Monitoring Center SIGINT SIMENA LI SMS SPEI GPS Tracking Software SPEI Tactical Audio Transmitter SPEI Tactical Receiver SPEI Tactical Tracking GPS SPEI Tactical Transceiver SPEI Tracking Software
SS8 IP Interception SS8 Intelligence Analysis Software SS8 Social Network Analysis Software STC Speech Recognition STRATIGN Strategic Interception TELESOFT DR TELESOFT IP INTERCEPT THALES Strategic Monitoring TRACESPAN TRACESPAN FIBRE INTERCEPTION TRACESPAN Monitoring TROJANS TSU training equipment schedule Targeting UTIMACO DR UTIMACO LI UTIMACO LI DPI UTIMACO LI Monitoring VASTECH Strategic Interception / Recording / Monitoring VASTECH ZEBRA VIP protection VOIP VUPEN EXPLOITS TROJANS Video Surveillance recorders surveillance vehicles tracking