Japan Made Secret Deals With the NSA That Expanded Global Surveillance

The documents, published Monday in collaboration with Japanese news broadcaster NHK, reveal the complicated relationship the NSA has maintained with Japan over a period of more than six decades. Japan has allowed NSA to maintain at least three bases on its territory and contributed more than half a billion dollars to help finance the NSA’s facilities and operations. In return, NSA has kitted out Japanese spies with powerful surveillance tools and shared intelligence with them. However, there is a duplicitous dimension to the partnership. While the NSA has maintained friendly ties with its Japanese counterparts and benefited from their financial generosity, at the same time it has secretly spied on Japanese officials and institutions.

Fuente: Japan Made Secret Deals With the NSA That Expanded Global Surveillance


Ciberguerra: cuando el arma más poderosa es un ejército de hackers

La ciberguerra ha dejado de ser una excentricidad reservada a actos aislados, a pequeñas cosas. Las nuevas tecnologías forman parte de los civiles y sus ejércitos. Y atacarlas se ha puesto a la par de la guerra convencional.

Fuente: Ciberguerra: cuando el arma más poderosa es un ejército de hackers


Someone Is Learning How to Take Down the Internet – Schneier on Security

Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet. These probes take the form of precisely calibrated attacks designed to determine exactly how well these companies can defend themselves, and what would be required to take them down. We don’t know who is doing this, but it feels like a large nation state. China or Russia would be my first guesses.

Fuente: Someone Is Learning How to Take Down the Internet – Schneier on Security


The NSA’s British Base at the Heart of U.S. Targeted Killing

in the heart of the tranquil English countryside, is the National Security Agency’s largest overseas spying base. Originally used to monitor Soviet communications through the Cold War, its focus has since dramatically shifted, and today it is a vital part of the NSA’s sprawling global surveillance network.

Fuente: The NSA’s British Base at the Heart of U.S. Targeted Killing


Israeli firm accused of creating iPhone spyware | World news | The Guardian

An Israeli technology company has been accused of creating and supplying an aggressive interception program capable of taking over Apple’s iPhones and turning them into remote spying devices, after it was allegedly used to target a Middle Eastern human rights activist and others.

Fuente: Israeli firm accused of creating iPhone spyware | World news | The Guardian


Bulk data collection vital to prevent terrorism in UK, report finds | World news | The Guardian

The bulk collection of personal data by British spy agencies is vital in preventing terrorist attacks, an independent review of draft security legislation has found.David Anderson QC, the independent reviewer of terrorism legislation, concluded that laws giving MI5, MI6 and GCHQ the right to gather large volumes of data from members of the public had a “clear operational purpose”.

Fuente: Bulk data collection vital to prevent terrorism in UK, report finds | World news | The Guardian


Cyber experts warn of hacking capability of drones – FT.com

Hackers could employ flying drones to buzz office buildings and intercept corporate communications, cyber security researchers have warned ahead of the industry’s annual gathering.A simple drone can be used to attack WiFi, bluetooth and other wireless connections such as those used in contactless payment cards, making it as easy to intercept information in a private building as it is in a public café.

Fuente: Cyber experts warn of hacking capability of drones – FT.com


Unicef propone usar WhatsApp para identificar fácilmente a los refugiados

La idea es tener acceso a los números de teléfono con los que se registraron en la aplicación, considerando que es el sistema que todos utilizan para seguir en contacto con sus familiares y amigos en sus países de origen.

Fuente: Unicef propone usar WhatsApp para identificar fácilmente a los refugiados


Edward Snowden desmiente encriptación de ISIS – FayerWayer

La herida por los ataques terroristas en París aún sigue fresca, pero el grupo de ISIS no se ha detenido en su campaña de propaganda y amenazas, alertando a las autoridades en su último movimiento, por la supuesta inclusión de métodos de cifrado avanzado para sus comunicaciones. Pero Edward Snowden no les cree nada.

Fuente: Edward Snowden desmiente encriptación de ISIS – FayerWayer


CIA to make sweeping structural changes with focus on cyber operations | US news | The Guardian

CIA to make sweeping structural changes with focus on cyber operations | US news | The Guardian.

 CIA headquartersA workman slides a dustmop over the floor at the Central Intelligence Agency headquarters in Langley, Virginia. Photograph: J Scott Applewhite/AP

CIA director John Brennan on Friday announced a major organizational overhaul of the intelligence agency, including the creation of an entirely new fifth wing to be known as the “directorate of digital innovation”.

The changes were designed to improve handling of cyber threats and the use of digital technology, streamline management, enhance recruiting and training and encourage intra-agency information sharing, Brennan said in a memo posted on the CIA website and in a briefing with reporters.

“Never has the need for the full and unfettered integration of our capabilities been greater,” Brennan said in the memo, comparing the restructuring to the agency’s post-9/11 “response to the emergence of global terrorism”.

In addition to the creation of the digital directorate, Brennan’s blueprint establishes 10 new “mission centers” to pool expertise and operations on a particular region or threat. Four longtime agency directorates – the organizational bones of the agency, historically – would remain in place, although two would take on different names.

The reorganization announced Friday follows major shifts in the CIA’s role and operations after 9/11, when the agency took up drone warfare and was reinvented, in some analyses, as a paramilitary organization.


NSA Claims Iran Learned from Western Cyberattacks – The Intercept

NSA Claims Iran Learned from Western Cyberattacks – The Intercept.

Featured photo - NSA Claims Iran Learned from Western Cyberattacks

The U.S. Government often warns of increasingly sophisticated cyberattacks from adversaries, but it may have actually contributed to those capabilities in the case of Iran.

top secret National Security Agency document from April 2013 reveals that the U.S. intelligence community is worried that the West’s campaign of aggressive and sophisticated cyberattacks enabled Iran to improve its own capabilities by studying and then replicating those tactics.

The NSA is specifically concerned that Iran’s cyberweapons will become increasingly potent and sophisticated by virtue of learning from the attacks that have been launched against that country. “Iran’s destructive cyber attack against Saudi Aramco in August 2012, during which data was destroyed on tens of thousands of computers, was the first such attack NSA has observed from this adversary,” the NSA document states. “Iran, having been a victim of a similar cyber attack against its own oil industry in April 2012, has demonstrated a clear ability to learn from the capabilities and actions of others.”

The document was provided to The Intercept by NSA whistleblower Edward Snowden, and was prepared in connection with a planned meeting with Government Communications Headquarters, the British surveillance agency. The document references joint surveillance successes such as “support to policymakers during the multiple rounds of P5 plus 1 negotiations,” referring to the ongoing talks between the five permanent members of the U.N. Security Council, Germany and Iran to forge an agreement over Iran’s nuclear program.


El Estado Islámico inunda las redes sociales alternativas | Diario Público

El Estado Islámico inunda las redes sociales alternativas | Diario Público.

Móvil con la bandera de ISIS en la pantalla

Móvil con la bandera de ISIS en la pantalla

DAVID BOLLERO

A finales de 2014, la ONU mostraba su preocupación por el hecho de que al menos 15.000 extranjeros procedentes de más de 80 países hubieran viajado a Siria, Irak, Somalia, Yemen y la región del Magreb y el Sahel para unirse a grupos extremistas. Se estima que una cuarta parte de los combatientes del Estado Islámico (EI) podrían ser extranjeros. Buena parte de este poder de captación se canaliza a través de las nuevas tecnologías.

El primer ministro británico, David Cameron, sugería esta misma semana la prohibición del uso de aplicaciones como Whatsapp por la dificultad de interceptar sus comunicaciones al estar cifradas y ser directamente de terminal a terminal. Si bien es verdad que el EI ha utilizado este tipo de aplicaciones no es menos cierto que desde el pasado mes de octubre el Estado Islámico desaconsejó a sus seguidores utilizarla por considerar que la NSA sí podía interceptar las comunicaciones. De esta manera, el EI encuentra recambio a Whatsapp en otros servicios de mensajería instantánea, como Kik, a través de los cuales coordina sus operaciones en el mercado negro, recluta o, incluso, organiza incursiones en primera línea de combate.

En ocasiones, las herramientas utilizadas por grupos extremistas como el EI ni siquiera se encuentran cuidadosamente ocultas; más bien al contrario, a plena luz de los internautas. El problema es que el volumen de información es tan elevado en la red que, precisamente, esa es su mejor baza para pasar inadvertidos. Es el caso de la aplicación móvil para Android que se descubrió el año pasado en Google Play: ‘The Dawn of Glad Tidings’, también conocida simplemente como ‘Dawn’.

Activa desde abril de 2014, fue descargada por miles de usuarios -se calcula que entre 5.000 y 10.000 descargas- bajo la descripción de “la aplicación que te informa sobre Siria, Irak y el mundo islámico”. Más de 600 calificaciones de la aplicación fueron de 4.9 estrellas, siendo una de las mejor posicionadas.

Una vez descargada, la aplicación tuiteaba a la cuenta del usuario –con enlaces, fotos, hashtags…- y, por ejemplo, el día que el EI se hizo con la ciudad de Mosul –la segunda ciudad de Irak- se registraron cerca de 40.000 tuits desde la aplicación.

Cuando el EI se hizo con
la ciudad de Mosul, se registraron cerca de 40.000 tuits desde la aplicación.

Una presencia en Twitter que, además, se refuerza utilizando cuentas como @ActiveHashtags que publica en árabe los trending topics (TT). Asimismo, estos grupos extremistas abren continuamente cuentas similares que únicamente publican contenido yihadista, consiguiendo cientos de retuits por tuit y, ya no sólo postear los principales TT sino, además, crearlos.

Manual ante una cuenta cerrada

Los esfuerzos por identificar estas cuentas y cancelarlas por parte de las principales redes como Facebook, Twitter e, incluso, YouTube se han intensificado, especialmente, desde la primera emisión del vídeo que mostraba la decapitación del periodista James Foley con campañas como #ISISmediablackout. Lo mismo sucede con otras redes como Tumblr, Flickr, SoundCloud o Instagram (y clones móviles como Iphoneogram).

Sin embargo, en los diversos foros yihadistas circulan recomendaciones sobre lo que hay que hacer cuando una cuenta es cancelada. Entre estos consejos, además de hackear los medios occidentales, figuran diversificar las redes, redirigiendo seguidores a canales distintos a Twitter o subiendo vídeos a canales diferentes a los de YouTube. Además, desde el EI animan a configurar servidores alternativos para dar salida a sus publicaciones, ampliando las aplicaciones más allá de la polaca Just Paste. Mixlr se perfila como otra de las bazas multimedia para el EI, brindando la oportunidad de emitir y sintonizar transmisiones en directo de audio.

Redes descentralizadas

Como alternativa a Twitter, los terroristas han dado con Quitter, donde también sufren el cierre de cuentas con son detectadas por el sistema. Del mismo modo, los yihadistas encuentras en redes como la rusa VKontakte una alternativa a Facebook. No es la única, puesto que existen otras alternativas como la árabe Gulpup o las de código abierto Friendica y especialmente Diaspora por su mayor calado, que también se han convertido en una vehículo de propagando y reclutamiento para el Estado Islámico.

Diaspora es una red sin ánimo de lucro que, a diferencia de otras redes sociales, no tiene sus servidores centralizados sino repartidos en una red de podmins, esto es, administradores de pods, como se denomina al servidor web personal de un usuario, que puede albergar múltiples cuentas. Es su responsabilidad eliminarlas o no, algo a lo que se anima desde Diaspora, pero sobre lo que no se toma acción directa por lo que el EI puede desarrollar su comunidad de adeptos más fácilmente.

Preguntas y respuestas

Otros métodos seguidos por el Estado Islámico para reclutar seguidores son las webs del tipo de la letona Ask.fm, donde los usuarios lanzan preguntas y otros las responden. El EI habría hecho uso de páginas como ésta para identificar a los reclutas más jóvenes y extender la propaganda. Informes del MEMRI (The Middle East Media Research Institute) revelan incluso cómo, dado que el portal no realiza ningún tipo de monitorización del contenido subido por los usuarios, un tal Abu Abdullah –que en Twitter llegó a operar como @Al_Brittani- habría viajado a Siria vía Turquía para unirse al Estado Islámico y habría respondido preguntas acerca de la yihad, armas, combatir o de cómo viajar a Siria, entre otras.

Estas técnicas, como sucede con las producciones ‘hollywoodienses’ de algunos de sus vídeos, persiguen aparecerse como una causa atractiva a los potenciales candidatos aliados, sin olvidar la amplificación de su mensaje. Complementando este planteamiento, el EI cuenta con su propia publicación, DABIQ, cuyos números pueden descargarse fácilmente desde diversas páginas web y están especialmente dirigidas a los musulmanes occidentales.


How you could become a victim of cybercrime in 2015 | Technology | The Guardian

How you could become a victim of cybercrime in 2015 | Technology | The Guardian.

Cybersecurity experts’ predictions for the year ahead: from ransomware and healthcare hacks to social media scams and state-sponsored cyberwar

Will 2015 be a happy new year for cybercriminals?
 Will 2015 be a happy new year for cybercriminals? Photograph: Alamy

Will 2015 be a happy new year for internet users? Not if cybercriminals have their way.

Online security companies have been making their predictions for 2015, from the malware that will be trying to weasel its way onto our computers and smartphones to the prospect of cyberwar involving state-sponsored hackers.

Here’s a summary of what you should be watching out for online in 2015, based on the predictions of companies including BitDefender, KPMGAdaptiveMobile,Trend MicroBAE SystemsWebSenseInfoSec InstituteSymantecKaspersky,Proofpoint and Sophos. The links lead to their full predictions.


Rusia y Occidente aceleran su ciberguerra | SurySur

Rusia y Occidente aceleran su ciberguerra | SurySur.

 

ciberguerra

Según un comandante de EE.UU., la anexión de Crimea por parte de Rusia y el posterior conflicto que estalló en Ucrania demostraron que Rusia supo integrar en su operativo militar una estrategia ciberofensiva que resultó muy eficaz.

La confrontación en curso entre Rusia y Occidente reactivó una disciplina cuyo imaginario ha sido alimentado por la informática, el cine, la literatura, los rumores y un puñado de hechos constatados: la ciberguerra. El desplazamiento de un conflicto desde un territorio al ciberespacio lleva años generando especulaciones y, en algunos casos, enfrentamientos reales como el ciberataque masivo de que fue objeto Estonia en 2007, el ataque contra los sistemas de misiles aire-tierra de Siria en el mismo año, los operativos en Georgia, el permanente hostigamiento digital que protagonizan China y Estados Unidos, o la operación (2010) contra el programa nuclear iraní urdida por Estados Unidos e Israel mediante el virus Stuxnet. Este dispositivo es el descendiente del programa Olympic Games desarrollado por la NSA norteamericana y la unidad 8200 de Israel. La crisis que se desató con Rusia aceleró el recurso a la ciberguerra. Durante la última cumbre –4 y 5 de septiembre– celebrada en plena crisis con Moscú, la OTAN actualizó sus estándares de defensa de Europa por medio de un programa llamado política de ciberdefensa reforzada. Según el comandante norteamericano de las fuerzas aliadas en Europa, la anexión de Crimea por parte de Rusia y el posterior conflicto que estalló en Ucrania demostraron que Rusia supo integrar en su operativo militar una estrategia ciberofensiva que resultó muy eficaz. Moscú habría conseguido interrumpir todas las comunicaciones electrónicas entre las tropas ucranianas estacionadas en la península y los centros de comando repetidos en el resto de Ucrania. Este es el argumento de Occidente para desarrollar en el ciberespacio un frente de conflicto.

El documento elaborado por la OTAN sobre la ciberguerra es de hecho una postura amenazante. La Alianza Atlántica extendió al ciberespacio todas las garantías del Tratado. Ello quiere decir que cualquier ataque contra las redes informáticas de un país miembro será considerado como un ataque contra todos, o sea, equivalente a una agresión clásica. Occidente crea con este texto un ciberespacio “indivisible”. La consecuencia es evidente: si un Estado exterior a la Alianza Atlántica aparece como responsable de un ciberataque será objeto de represalias que pueden incluir incluso los medios clásicos. Con su recurrente cinismo hambriento de confrontaciones, la Alianza Atlántica hace el papel de futura víctima como si la OTAN o sus miembros más poderosos, Estados Unidos por ejemplo, nunca hubiesen lanzado ciberataques contra alguno de sus adversarios, o espiado la intimidad de cada ser humano del planeta mediante el dispositivo Prism montado por la Agencia Nacional de Seguridad, la NSA, con la servil colaboración de empresas privadas –Google, Yahoo, Facebook, Microsoft, etc.–. Sorin Ducaru, adjunto al secretario general de la OTAN y encargado de los “desafíos emergentes” aclaró que el organismo se limitará a defenderse. Según Ducaru, está “excluido lanzar operaciones ciberofensivas. Estás son del dominio de cada país miembro”.


Isis in duel with Twitter and YouTube to spread extremist propaganda | World news | The Guardian

Isis in duel with Twitter and YouTube to spread extremist propaganda | World news | The Guardian.

Guardian investigation reveals subterfuge used by social media arm of Islamic State to hijack topics to spread jihadi views
An Isis propaganda video
An Isis propaganda video. The group’s media arm is using slick and fast techniques to spread its content online, Photograph: Screengrab/YouTube

Propaganda operatives from Islamic State (Isis) are piggybacking on popular internet hashtags and forums to secure the widest distribution of their videos, in an increasingly devious game of cat and mouse with police and internet companies, the Guardian can reveal.

An analysis of one of the most recent Isis video distributions shows the variety of techniques being used – including latching on to the huge interest in the Scottish independence referendum – to boost distribution of their extremist material on Twitter and YouTube.

The sophisticated strategies have prompted law enforcement agencies to work closer than ever with the world’s largest tech and social media companies to try to win the propaganda war. A specialist British police squad is working with companies including Twitter and YouTube to block and delete about 1,100 pieces of gruesome content a week, which they say contravene UK terror laws. The vast majority of the material – 800 items a week – relates to Syria and Iraq.

Officers from the UK’s counter-terrorism internet referral unit (CTIRU) acknowledge they are up against a slick and fast-moving dissemination of propaganda and much of the material being targeted involves suspending Twitter accounts or taking down videos of murder, torture, combat scenes, sniper attacks and suicide missions.


Privacy under attack: the NSA files revealed new threats to democracy | Technology | The Guardian

Privacy under attack: the NSA files revealed new threats to democracy | Technology | The Guardian.

Thanks to Edward Snowden, we know the apparatus of repression has been covertly attached to the democratic state. However, our struggle to retain privacy is far from hopeless

US National Security Agency
The US National Security Agency threat operations centre in Fort Meade, Maryland, in 2006. Photograph: Paul Richards/AFP/Getty Images

In the third chapter of his History of the Decline and Fall of the Roman Empire, Edward Gibbon gave two reasons why the slavery into which the Romans had tumbled under Augustus and his successors left them more wretched than any previous human slavery. In the first place, Gibbon said, the Romans had carried with them into slavery the culture of a free people: their language and their conception of themselves as human beings presupposed freedom. And thus, says Gibbon, for a long time the Romans preserved the sentiments – or at least the ideas – of a freeborn people. In the second place, the empire of the Romans filled all the world, and when that empire fell into the hands of a single person, the world was a safe and dreary prison for his enemies. As Gibbon wrote, to resist was fatal, and it was impossible to fly.

The power of that Roman empire rested in its leaders’ control of communications. The Mediterranean was their lake. Across their European empire, from Scotland to Syria, they pushed roads that 15 centuries later were still primary arteries of European transportation. Down those roads the emperor marched his armies. Up those roads he gathered his intelligence. The emperors invented the posts to move couriers and messages at the fastest possible speed.

Using that infrastructure, with respect to everything that involved the administration of power, the emperor made himself the best-informed person in the history of the world.

That power eradicated human freedom. “Remember,” said Cicero to Marcellus in exile, “wherever you are, you are equally within the power of the conqueror.”

The empire of the United States after the second world war also depended upon control of communications. This was more evident when, a mere 20 years later, the United States was locked in a confrontation of nuclear annihilation with the Soviet Union. In a war of submarines hidden in the dark below the continents, capable of eradicating human civilisation in less than an hour, the rule of engagement was “launch on warning”. Thus the United States valued control of communications as highly as the Emperor Augustus. Its listeners too aspired to know everything.

We all know that the United States has for decades spent as much on its military might as all other powers in the world combined. Americans are now realising what it means that we applied to the stealing of signals and the breaking of codes a similar proportion of our resources in relation to the rest of the world.

The US system of listening comprises a military command controlling a large civilian workforce. That structure presupposes the foreign intelligence nature of listening activities. Military control was a symbol and guarantee of the nature of the activity being pursued. Wide-scale domestic surveillance under military command would have violated the fundamental principle of civilian control.

Instead what it had was a foreign intelligence service responsible to the president as military commander-in-chief. The chain of military command absolutely ensured respect for the fundamental principle “no listening here”. The boundary between home and away distinguished the permissible from the unconstitutional.

The distinction between home and away was at least technically credible, given the reality of 20th-century communications media, which were hierarchically organised and very often state-controlled.

When the US government chose to listen to other governments abroad – to their militaries, to their diplomatic communications, to their policymakers where possible – they were listening in a world of defined targets. The basic principle was: hack, tap, steal. We listened, we hacked in, we traded, we stole.

In the beginning we listened to militaries and their governments. Later we monitored the flow of international trade as far as it engaged American national security interests.


A Global Campaign to Monitor the "Digital Weapons" Trade | TechPresident

A Global Campaign to Monitor the “Digital Weapons” Trade | TechPresident.

BY Carola Frediani | Tuesday, April 8 2014

A map from the CAUSE website shows where surveillance technology has been sold to countries with spotty human rights records.

It might seem that there is little connection between Milan and the atrocities occurring in Syria under the regime of President Bashar al-Assad but we now know that a little known Italian tech company called Area SpA was providing Assad with technology that could virtually allow him to seize and search any e-mail that passed through the country. Unfortunately, such an example is now fairly commonplace: Vodafone in Egypt, as well as Siemens and Nokia in Iran, to name a few.

Though Area SpA later announced it was curtailing its surveillance project in Syria, in an alarming trend, surveillance technology companies, many of them in western countries with decent human rights records are selling such technology to countries with fairly sinister ones. This problem, which some activists have called the “digital arms trade” is global and complex in nature and is at the heart of a new global campaign launched on April 4 by an international group of leading NGOs. They banded together to create the Coalition Against Unlawful Surveillance Exports (CAUSE), calling for governments to take action on the international trade in communication surveillance technologies.

The group — which includes Amnesty International, Digitale Gesellschaft, the International Federation for Human Rights (FIDH), Human Rights Watch, the New America Foundation’s Open Technology Institute, Privacy International, and Reporters without Borders — wants governments and private companies to tackle the proliferation and abuse of these technologies across the world, since they are more often than not used to violate their citizens’ right to privacy, free speech and a host of other human rights. World leaders are responsible for keeping such invasive surveillance systems and technologies out of the hands of dictators and oppressive regimes, said the coalition’s organizers.

“What is unique about the CAUSE coalition are the groups that are part of it,” Mike Rispoli, Communication Manager of UK-based Privacy International, says to techPresident. “You have organizations like Privacy International, as well as Open Technology Institute or Digitale Gesellschaft, that focus on technology, digital rights, etc., but you also have more traditional human rights groups like Amnesty International, Human Rights Watch, and Reporters without Borders. The reason why this is so important is that there’s a broad recognition that surveillance technologies pose significant threat to the enjoyment of rights around the world, not just the right to privacy but also freedom of expression.”

What exactly do these technologies do? There is malware that allows surreptitious data extraction from personal devices such as phone and PCs; tools that can intercept telecommunications traffic; spygear that geolocates mobile phones and can therefore track their owners; monitoring systems that allow authorities to track entire populations; and devices used to tap undersea fiber optic cables to enable NSA-style internet monitoring and filtering.


«Die Schweiz hätte ein Zeichen setzen können» – St.Galler Tagblatt Online

«Die Schweiz hätte ein Zeichen setzen können» – St.Galler Tagblatt Online.

Tagblatt Online, 28. Februar 2014, 10:07 Uhr

 

Zoom

Kenneth Page NGO Privacy International, London Politikverantwortlicher

 

Unternehmen haben ihre Exportgesuche für Überwachungssoftware aus der Schweiz zurückgezogen. Zufrieden?

Ja. Die Schweiz hat aber auch eine gute Chance verpasst. Die Regierung hätte viel proaktiver vorgehen und die Exportgesuche ablehnen können. Stattdessen haben die Unternehmen aus Ungeduld nun selber Entscheide gefällt. Die Schweiz hätte auf internationaler Ebene ein viel stärkeres Zeichen setzen können, indem sie die wachsenden Menschenrechtsbedenken gegenüber diesen Technologien anerkannt hätte. Zumal das Land dieses Jahr den OSZE-Vorsitz innehat.

 

Werden einige dieser Unternehmen nun Überwachungstechnik ohne Erlaubnis exportieren?

 

Sie brauchen eine Lizenz, um aus der Schweiz zu exportieren. Ansonsten würden sie Exportvorschriften verletzen. Einige Unternehmen haben aber Büros in anderen europäischen Ländern und können unter einer Gesetzgebung arbeiten, die ihnen passt. Die Firma Gamma zum Beispiel hat regionale Büros in Malaysia, den Vereinigten Arabischen Emiraten, Singapur oder Libanon. Es ist zudem wichtig, sich nicht allein auf diese Firmen zu fokussieren, da die Technologie oft über strategische Geschäftspartnerschaften verkauft wird.


Lenovo braced for Cfius scrutiny over Motorola handset deal – FT.com

Lenovo braced for Cfius scrutiny over Motorola handset deal – FT.com.

 

As the largest Chinese technology deal in the US, Lenovo’s $2.9bn purchase of Motorola’s handset business last week will be closely scrutinised by a US government committee that reviews transactions for national security concerns.

As part of the purchase from GoogleLenovo will assume 2,000 patents and receive a licence to other Google smartphone intellectual property, which will be combed through by the Committee on Foreign Investment in the United States (Cfius).