Thursday, 1 December 2011

The Spy Files On Thursday, December 1st, 2011 WikiLeaks began publishing The Spy Files, thousands of pages and other materials exposing the global mass surveillance industry

WikiLeaks logo 
The Spy Files, 
files released so far... 
287

Index pages

Document Type

Company Name

Service Product

ADSL Interception
Analysis Software
Audio / Video digital recorder
Audio Receiver
Audio Surveillance
Audio Transmitter
Capture and Recording of All Traffic
Cellphone Forensic
Counter Surveillance
DR
Data Retention
Detection
Encryption
Exploits
Fibre Interception
GPS Tracker
GPS Tracking Software
GSM Tactical Interception
GSM Transceiver
IP DR
IP LI
IT security & forensic
Incident Response
Intelligence Analysis Software
Jammer Systems
LI
LI DR
LI DR DPI ISS
Lawful Interception
Monitoring
Monitoring Center
Monitoring Systems
PDA Tracking Software
Passive Surveillance
RCS Trojan
Receiver
Recording
Recoring
Satellite Interception
Session Border Control
Social Network Analysis Software
Speech Recognition
Storage
Strategic / Tactical Interception Monitoring
Strategic Internet Monitoring & Recording
Strategic Surveillance / Recording
TCSM
TROJAN
TSU training equipment schedule
Tactical
Tactical Audio Microphone
Tactical Audio Receiver Transmitter
Tactical Audio Recorder
Tactical Audio Transmitter
Tactical Audio Video recorder
Tactical Camcorder
Tactical Covert Audio Transmitter over GSM
Tactical Covert Digital Audio Recorder
Tactical Covert GPS Tracker
Tactical Covert Microphone
Tactical Digital Audio and Video Recorder
Tactical GPS Audio Transmitter
Tactical GPS Tracking
Tactical GSM / 3G Interception
Tactical GSM UMTS Satellite Wifi Interception
Tactical Microphone
Tactical Tracking
Tactical Video recorder
Tactitcal Tracking
Tactitcal Transceiver for audio video
Trojans
VDSL Interceptor
VIP protection
Video Surveillance
WIFI Intercept
recorders
surveillance vehicles
tracking

Tags

ABILITY 3G GSM
ACME Packet
ADAE LI
AGNITIO Speech Recognition
ALTRON
ALTRON AKOR-3 TCSM
ALTRON AMUR Recording Interception
ALTRON MONITORING
ALTRON TRACKING
ALTRON WIFI
AMESYS
AMESYS ADSL Tactical
AMESYS COMINT
AMESYS STRAGEGIC MASSIVE
AMESYS Strategic Interception
AMESYS Targetlist
AMESYS WIFI
AQSACOM
AQSACOM LI
ATIS
ATIS LI
Audio Surveillance
BEA
BEA Tactical
BLUECOAT
CAMBRIDGECON COMINT
CCT
CELLEBRITE Mobile Forensic
CLEARTRAIL
COBHAM
COBHAM Repeater
COBHAM Tactical LI
COMINT
CRFS RFEYE
CRYPTON-M Strategic Internet Traffic Monitoring Recording
Cloud Computing
Counter Surveillance
DATAKOM LI
DATONG
DELTA SPA Satellite Interception
DETICA
DIGITASK
DIGITASK LI IP
DIGITASK Trojans
DIGITASK WIFI
DPI
DR
DREAMLAB LI
Detection
EBS Electronic GPRS Tracking
ELAMAN COMINT
ELTA IAI Tactical GSM UMTS Satellite Wifi Interception
ENDACE COMPLIANCE
ETIGROUP LI
ETSI
EVIDIAN BULL
EXPERT SYSTEM Analytics
EXPERT SYSTEM Semantic Analytics
Encryption
FOXIT FoXReplay Analytics Software
FOXIT FoxReplay Covert Analytics Software
FOXIT FoxReplay Personal Workstation Analysis Software
FOXIT FoxReplay Workstation Protection Analysis Software
Forensics
GLIMMERGLASS
GLIMMERGLASS SIGINT
GLIMMERGLASS Strategic / Tactical Interception Monitoring
GRIFFCOMM GPS Tracker Tactical
GRIFFCOMM Recording
GRIFFCOMM Tactical Audio
GRIFFCOMM Tactical Audio Microphone
GRIFFCOMM Tactical Audio Transmitter
GRIFFCOMM Tactical Audio Transmitter Receiver
GRIFFCOMM Tactical Audio Video
GRIFFCOMM Tactical Audio Video Recorder
GRIFFCOMM Tactical Audio Video Transceiver
GRIFFCOMM Tactical Camcorder
GRIFFCOMM Tactical Covert Microphone
GRIFFCOMM Tactical GPS Tracking
GRIFFCOMM Tactical Microphone
GRIFFCOMM Tactical Tracking GPS
GRIFFCOMM Tactical Video recorder
GUIDANCE Incident Response
HACKINGTEAM RCS TROJAN
HACKINGTEAM TROJAN
HP Hewlett Packard LI Monitoring DR DPI ISS
INNOVA SPA TACTICAL
INTREPID Analytics
INTREPID OSI
INVEATECH LI
IP
IP Interception
IPOQUE DPI
IPS
IPS Monitoring
IT security & forensic
Intelligence
Interception
Jammer Systems
KAPOW OSINT
LI
LI ALCATEL-LUCENT
LI DR
LI ETSI
LI IP
LI Monitoring
LOQUENDO Speech Recognition
MANTARO COMINT
MEDAV MONITORING
Mobile
Mobile Forensic
Monitoring
Monitoring Systems
NETOPTICS COMINT
NETOPTICS LI
NETQUEST LI
NETRONOME Monitoring
NEWPORT NETWORKS LI
NEWPORT NETWORKS VOIP
NICE
NICE Monitoring
ONPATH LI
PACKETFORENSICS
PAD
PAD Tactical GPS Audio Transmitter
PAD Tactical GPS Tracking Audio Transmitter
PALADION
PANOPTECH
PHONEXIA Speech Recognition
PLATH Profiling
QOSMOS COMINT
QOSMOS DPI
QOSMOS Identification
QOSMOS Monitoring
RAYTHEON
SCAN&TARGET Analytics
SEARTECH TACTICAL AUDIO TRANSMITTER
SEARTECH TACTICAL RECEIVER
SEPTIER LI
SHOGI GSM Interception
SIEMENS Monitoring Center
SIGINT
SIMENA LI
SMS
SPEI GPS Tracking Software
SPEI Tactical Audio Transmitter
SPEI Tactical Receiver
SPEI Tactical Tracking GPS
SPEI Tactical Transceiver
SPEI Tracking Software
SS8 IP Interception
SS8 Intelligence Analysis Software
SS8 Social Network Analysis Software
STC Speech Recognition
STRATIGN
Strategic Interception
TELESOFT DR
TELESOFT IP INTERCEPT
THALES Strategic Monitoring
TRACESPAN
TRACESPAN FIBRE INTERCEPTION
TRACESPAN Monitoring
TROJANS
TSU training equipment schedule
Targeting
UTIMACO DR
UTIMACO LI
UTIMACO LI DPI
UTIMACO LI Monitoring
VASTECH Strategic Interception / Recording / Monitoring
VASTECH ZEBRA
VIP protection
VOIP
VUPEN EXPLOITS TROJANS
Video Surveillance
recorders
surveillance vehicles
tracking

by Date of Document

by Date of Release

Our Partners

Community resources

courage is contagious

The Spy Files

On Thursday, December 1st, 2011 WikiLeaks began publishing The Spy Files, thousands of pages and other materials exposing the global mass surveillance industry

List of documents > by Release Date

page 1/6   -   Previous - 1 - 2 - 3 - 4 - 5 - 6 - Next

#Document TitleCompanyDocument TypeDate
1 VoIP security: Myths and Reality AcmePacket Presentation 2007-02
2 National LI Systems ATIS Systems GmbH Presentation 2007-02
3 Lawful Interception and Location Based Services Atis Uher Presentation 2007-02
4 Target and Service Based Interception in an IP Environment ATIS Systems GmbH Presentation 2007-02
5 National LI Systems ATIS Presentation 2007-02
6 The Challenge of Packet Data Collection from Satellite Communication Space Segment and Effective Solutions Delta SPA Presentation 2007-02
7 High performance signaling in gathering intelligence form Mobile Networks Dialogic Presentation 2007-02
8 Why sample when you can monitor all network traffic inexpensively? Endace Presentation 2007-02
9 Where Endace Presentation 2007-02
10 Electronic Evidence: Worth it Endace Presentation 2007-02
11 State of the Art Solutions for Interception GTEN Presentation 2007-02
12 The Search for Results in Voice Analysis: how different identification technologies can work together effecively LOQUENDO Presentation 2007-02
13 Deploying Media Probes in Evolving VoIP Networks NEWPORT NETWORKS Presentation 2007-02
14 IP Data Retention: The challenge of IP Data Retention to Traditional Approach RETENTIA Presentation 2007-02
15 Siemens Intelligence Platform SIEMENS Presentation 2007-02
16 Intelligent Probing for Intelligence and LI Applications telesoft Presentation 2007-02
17 IP Trapper Thales Presentation 2007-02
18 A New Generation System Architecture for Intelligence Systems, taking advantage of Moore VasTech Presentation 2007-02
19 Security framework for an LI/DR Infrastructure ADAE - Authority for the Assurance of Communication Security and Privacy (Greece) Presentation 2008-10
20 Currently deployed field proven Biometric Speaker Identification and Verification Technology Agnitio Presentation 2008-10
21 From Lawful to Massive Interception: Aggregation of Sources Amesys Presentation 2008-10
22 Interception Domain Architecture for CS and IP Networks CCT Cecratech Presentation 2008-10
23 The New Front Line: Dealing with the retained communications data explosion DETICA Presentation 2008-10
24 Remote Forensic Software DigiTask Presentation 2008-10
25 Future Challenges in the Lawful Interception fo IP based Telecommunication DigiTask Presentation 2008-10
26 Data Retention Requirements ETSI TC-LI Presentation 2008-10
27 Delivering Retained Data: The ETSI Handover Interface DETICA Presentation 2008-10
28 ETSI/TC LI Overview on Lawful Interception and Retained Data handling ETSI Presentation 2008-10
29 Data Retention Challenges GROUP2000 Presentation 2008-10
30 LIMA Lawful Interception in the evolving world of telecom GROUP2000 Presentation 2008-10
31 Remote Control System V5.1 HackingTeam Presentation 2008-10
32 Data in a Haystack - Monitoring System with advanced workflow management NETI Presentation 2008-10
33 3GPP SA 3 LI handling US and European needs Nokia Siemens Networks Presentation 2008-10
34 Mobile forensic analysis for smartphones OXYGEN Presentation 2008-10
35 ETSI Pine Digital Security Presentation 2008-10
36 Real Time Traffic Analysis Protei Presentation 2008-10
37 Layer 7 Identity Management for Lawful Interception QOSMOS Presentation 2008-10
38 Dual Usage Strategy of Lawful Interception Systems Septier Communication Ltd. Presentation 2008-10
39 Real Time Intercept from Packet Networks, Challenges and Solutions telesoft Presentation 2008-10
40 New solutions for massive monitoring Thales Presentation 2008-10
41 Passive surveillance in support of LI VasTech Presentation 2008-10
42 Convergence - LI and DR A Strategic Concept AQSACOM Presentation 2009-06
43 Tactical Lawful Intercept COBHAM Presentation 2009-06
44 Combining Lawful Interception, Mediation & Data Retention in IP-networks DATAKOM Presentation 2009-06
45 Challenges in Intercepting WiFi DigiTask Presentation 2009-06
46 Remote Forensic Software DigiTask Presentation 2009-06
47 ETSI activities on Retained Data handling and Lawful Interception standardisation ETSI TC LI Presentation 2009-06
48 Lawful Interception: The bigger picture GROUP2000 Presentation 2009-06
49 Speech intelligence for security and defense Phonexia Presentation 2009-06
50 Managing Virtual Identities Across IP Networks QOSMOS Presentation 2009-06

Posted via email from projectbrainsaver