TechCrunch News 前天 21:57
政府监控软件滥用普遍,远超预期打击范围
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

政府监控软件的制造商长期以来声称其技术仅用于打击重罪犯和恐怖分子,且使用有限。然而,全球大量证据表明,记者、人权活动家和政界人士在专制国家和民主国家都成为了目标。该软件的易用性和供应商的定价模式(通常基于可同时监控的目标数量)导致其使用范围不断扩大,远远超出了最初的设想。缺乏透明度和问责制也助长了政府的滥用行为。尽管有一些国家和公司开始采取措施应对,但这一庞大的全球市场能否被有效限制仍是未知数。

🛡️ **监控软件滥用普遍,目标群体广泛**:政府监控软件的制造商声称其技术仅用于打击重罪犯和恐怖分子,且使用有限。然而,全球范围内大量证据显示,记者、人权活动家和政界人士,无论是在专制政权还是民主国家,都成为了监控软件的受害者。最新的案例表明,这种监控已远远超出了“罕见”或“有限”的攻击范畴,涉及的受害者数量不断增加,这与最初的宣传形成了鲜明对比。

💰 **定价模式助长滥用,目标数量成关键**:监控软件的供应商通常收取一次性技术购买费用,以及后续的软件更新和技术支持费用。关键在于,初始费用往往基于政府机构能够同时监控的目标数量。这意味着,为了最大化利用购买的许可,政府可能会倾向于扩大监控范围,将更多非预期目标纳入其中,尤其是在对监控有强烈需求的国家。

⚖️ **缺乏透明与问责,促使政府大胆滥用**:普遍存在的透明度不足和问责机制的缺失,使得政府能够无所顾忌地使用这些复杂的监控技术,而不必担心后果。这种“有恃无恐”的态度,尤其体现在针对“小人物”的监控上,反映出政府在部署侵入性极强的间谍软件来对付反对派时,感受到的相对豁免权。受害者在追究责任方面面临巨大挑战。

💡 **应对措施初现,市场前景仍不明朗**:尽管面临严峻挑战,一些积极的应对措施正在出现。例如,Paragon公司 publicly 终止了与意大利政府的合作,NSO Group 也曾披露断开了十个滥用其技术的政府客户。一些国家(如希腊和波兰)已启动了对间谍软件滥用的调查,美国也对部分间谍软件公司实施了制裁。然而,鉴于这是一个价值数十亿美元的全球市场,公司乐于向有强烈监控需求的政府提供先进技术,这些努力是否能有效遏制或限制市场规模,仍有待观察。

For more than a decade, makers of government spyware have defended themselves from criticism by saying that their surveillance technology is intended to be used only against serious criminals and terrorists, and only in limited cases.  

The evidence gathered from dozens, if not hundreds of documented instances of spyware abuse all over the world, however, shows that neither of those arguments are true.  

Journalists, human rights activists, and politicians have repeatedly been targeted in both repressive regimes and democratic countries. The latest example is a political consultant who works for left-wing politicians in Italy, who came out as the most recently confirmed victim of Paragon spyware in the country. 

This latest case shows that spyware is proliferating far beyond the scope of what we have typically considered to be “rare” or “limited” attacks targeting only a few people at a time. 

“I think that there is some misunderstanding at the heart of stories about who gets targeted by this kind of government spyware, which is that if you are targeted, you are Public Enemy Number One,” Eva Galperin, the director of cybersecurity at the Electronic Frontier Foundation, who has studied spyware for years, told TechCrunch.  

“In reality, because targeting is so easy, we have seen governments use surveillance malware to spy on a broad range of people, including relatively minor political opponents, activists, and journalists,” said Galperin. 

There are several reasons that explain why spyware often ends up on the devices of people who, in theory, should not be targeted.  

The first explanation lies in the way that spyware systems work. Generally, when an intelligence or law enforcement agency purchases spyware from a surveillance vendor — like NSO Group, Paragon, and others — the government customer pays a one-time fee to acquire the technology, and then lower additional fees for future software updates and tech support.  

The upfront fee is usually based on the number of targets that the government agency can spy on at any moment in time. The more targets, the higher the price. Previously leaked documents from the now-defunct Hacking Team show that some of its police and government customers could target anywhere from a handful of people to an unlimited number of devices at once. 

While some democratic countries typically had fewer targets that they could surveil in one go, it wasn’t uncommon to see countries with questionable human rights records with an extremely high number of concurrent spyware targets.  

Giving such a high number of concurrent targets to countries with such strong appetites for surveillance all but guaranteed that the governments would target far more people outside the scope of just criminals and terrorists. 

Do you have more information about government spyware? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email. You also can contact TechCrunch via SecureDrop.

Morocco, the United Arab Emirates (twice), and Saudi Arabia (several times), have all been caught targeting journalists and activists over the years. Security researcher Runa Sandvik, who works with activists and journalists who are at risk of being hacked, curates an ever-expanding list of cases of spyware abuse around the world.  

Another reason for the high number of abuses is that, especially in recent years, is that spyware — such as NSO’s Pegasus or Paragon’s Graphite — makes it extremely easy for government customers to successfully target whoever they want. In practice, those systems are essentially consoles where police or government officials type in a phone number, and the rest happens in the background.  

John Scott-Railton, a senior researcher at The Citizen Lab who has investigated spyware companies and their abuses for a decade, said that government spyware carries a “huge abuse temptation” for government customers.  

Scott-Railton said spyware “needs to be treated like the threat to democracy and elections that it is.” 

The general lack of transparency and accountability has also contributed to governments brazenly using this sophisticated surveillance technology without fear of consequences. 

“The fact that we have seen targeting of relatively small fish is particularly concerning because it reflects the relative impunity that the government feels in deploying this exceptionally invasive spyware against opponents,” Galperin told TechCrunch. 

In terms of victims getting accountability, there is some good news.  

Paragon made a point of very publicly cutting ties with the Italian government earlier this year, arguing that the country’s authorities refused help from the company in investigating abuses allegedly involving its spyware.  

NSO Group previously revealed in court that it disconnected 10 government customers in recent years for abusing its spyware technology, although it refused to say which countries. And it’s unclear if those include the Mexican or Saudi government, where there have been countless documented cases of abuse.  

On the customer side, countries like Greece and Poland have launched investigations into spyware abuses. The United States, during the Biden administration, targeted some spyware makers such as Cytrox, Intellexa and NSO Group by imposing sanctions on the companies —  and their executives — and putting them on economic blocklists. Also, a group of mostly Western countries led by the U.K and France are trying to use diplomacy to put the brakes on the spyware market.  

It remains to be seen if any of these efforts will curb or limit in any way what is now a global multi-billion dollar market, with companies more than happy to supply advanced spyware to governments with a seemingly endless appetite to spy on pretty much everyone they want to.  

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

政府监控软件 间谍软件 隐私 人权 滥用 监管 Government Spyware Spyware Privacy Human Rights Abuse Regulation
相关文章