<?xml version="1.0" encoding="UTF-8" standalone="yes"?><oembed><version><![CDATA[1.0]]></version><provider_name><![CDATA[The Tactical Hermit]]></provider_name><provider_url><![CDATA[https://hcsblogdotorg.wordpress.com]]></provider_url><author_name><![CDATA[The Tactical Hermit]]></author_name><author_url><![CDATA[https://hcsblogdotorg.wordpress.com/author/thetacticalhermit/]]></author_url><title><![CDATA[Espionage Files: Surveillance For Hire In&nbsp;Africa]]></title><type><![CDATA[link]]></type><html><![CDATA[<p class="graf--p graf-after--p"><img data-attachment-id="16674" data-permalink="https://hcsblogdotorg.wordpress.com/2016/06/24/espionage-files-surveillance-for-hire-in-africa/africa/" data-orig-file="https://hcsblogdotorg.files.wordpress.com/2016/06/africa.jpeg" data-orig-size="1100,760" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="AFRICA" data-image-description="" data-medium-file="https://hcsblogdotorg.files.wordpress.com/2016/06/africa.jpeg?w=300" data-large-file="https://hcsblogdotorg.files.wordpress.com/2016/06/africa.jpeg?w=1024" class="aligncenter size-large wp-image-16674" src="https://hcsblogdotorg.files.wordpress.com/2016/06/africa.jpeg?w=1024&#038;h=707" alt="AFRICA" srcset="https://hcsblogdotorg.files.wordpress.com/2016/06/africa.jpeg?w=1024&amp;h=707 1024w, https://hcsblogdotorg.files.wordpress.com/2016/06/africa.jpeg?w=150&amp;h=104 150w, https://hcsblogdotorg.files.wordpress.com/2016/06/africa.jpeg?w=300&amp;h=207 300w, https://hcsblogdotorg.files.wordpress.com/2016/06/africa.jpeg?w=768&amp;h=531 768w, https://hcsblogdotorg.files.wordpress.com/2016/06/africa.jpeg 1100w" sizes="(max-width: 1024px) 100vw, 1024px"   /></p>
<p id="8c2a" class="graf--p graf-after--p">In July 2012, one year after the Arab Spring shook Arab regimes around the world, an email appeared in the inbox of Mamfakinch, a Moroccan online publication critical of the government.</p>
<p id="45fc" class="graf--p graf-after--p">Under the subject line “<em class="markup--em markup--p-em">dénonciation” — </em>French for “denunciation” — was a single sentence. “Please don’t use my name or anything else, I don’t want any trouble.” And under that, a link to what appeared to be a Word document with the name “scandale(2).doc.”</p>
<p id="bda0" class="graf--p graf-after--p">But instead of insider information about corrupt government officials, the file turned out to be malware, as the Canadian NGO Citizen Lab <a class="markup--anchor markup--p-anchor" href="https://citizenlab.org/2012/10/backdoors-are-forever-hacking-team-and-the-targeting-of-dissent/">later determined</a>after Mamfakinch’s staff got suspicious and and contacted experts.</p>
<div class="section-inner layoutSingleColumn">
<p id="1b80" class="graf--p graf-after--figure">Reverse-engineering the malware, Citizen Lab concluded that Mamfakinch had fallen victim to a sophisticated cyber attack, likely at the hands of Morocco’s intelligence service.</p>
<p id="a3ec" class="graf--p graf-after--p">A year later in December 2013, a similar attack <a class="markup--anchor markup--p-anchor" href="https://www.hrw.org/news/2015/08/13/ethiopia-hacking-team-lax-evidence-abuse">targeted</a> the Ethiopian Satellite Television Service, an opposition media network based in the United States. Two journalists were contacted via Skype from the account of a former collaborator. The sender tried to get the reporters to download malware disguised as a Word file.</p>
<p id="e6fc" class="graf--p graf-after--p">The software would have allowed the attacker to completely take over any compromised computer.</p>
<p id="680b" class="graf--p graf-after--p">Even <a class="markup--anchor markup--p-anchor" href="https://www.privacyinternational.org/sites/default/files/Uganda_Report_1.pdf">more aggressive</a> was the strategy of the Ugandan police and secret service during the run-up to and aftermath of the presidential elections 2011. Privacy International, a human rights organization, detailed in a report how the agencies created fake wireless networks in parliament and hotels frequented by the opposition and used blackmail and bribery to install malware on smartphone and computers.</p>
</div>
<div class="section-inner sectionLayout--outsetRow"> Read the Remainder at <strong><a href="https://warisboring.com/private-companies-are-helping-african-governments-spy-on-their-own-people-6545d30b1107?mc_cid=39db86371b&amp;mc_eid=1149a36069#.jw39wguch">War is Boring</a></strong></div>
]]></html><thumbnail_url><![CDATA[https://hcsblogdotorg.files.wordpress.com/2016/06/africa.jpeg?fit=440%2C330]]></thumbnail_url><thumbnail_width><![CDATA[440]]></thumbnail_width><thumbnail_height><![CDATA[304]]></thumbnail_height></oembed>