Open letter to Hacking Team

March 9, 2015

Tagged: , ,

Categories: Ron Deibert

March 5, 2015

Sent via e-mail: info@hackingteam.com

Dear Mr. Vincenzetti and team,

Pursuant to the procedure outlined in your customer policy,1 the Citizen Lab at Munk School of Global Affairs, University of Toronto, is submitting the attached report regarding apparent misuse or abuse of Hacking Team systems and solutions.

As detailed more fully in the report, journalists at the Ethiopian Satellite Television Service (ESAT) in the United States were again targeted in late 2014, with what appear to be two updated versions of Hacking Team’s Remote Control System (RCS) spyware. Our research suggests that the attacker is the same governmental entity as that implicated in December 2013 attacks using RCS against ESAT journalists, on which we previously reported.2 The attacker may be the Ethiopian Information Network Security Agency.

Hacking Team’s customer policy suggests that the company is capable of exercising wide discretion in ensuring its customers do not employ the technology in a manner that undermines human rights. The policy references contractual restrictions on misuse, as well as “auditing features built into HT software that allow administrators to monitor how the system is being used.”3 The policy also notes Hacking Team investigates potential rights abuses involving its software and “take[s] appropriate action.”4 Should Hacking Team decide to cease supporting a particular customer’s installation, “the product soon becomes useless.”5

The new incidents we have documented, however, suggest that rather than restricting the capabilities provided to the governmental attacker targeting ESAT, Hacking Team may have continued to provide support for RCS software used by that attacker, including in the form of updates to the software to evade detection.

Quite simply put, after all of the prior reporting surrounding the use of RCS against ESAT journalists in December 2013 and its human rights implications, how has it come to pass that RCS is again linked in late 2014 to the same activity? What steps will Hacking Team take to control such apparent misuse of its technology and prevent the continued targeting of ESAT journalists?

We request that you provide clarification regarding the apparent repeated misuse of RCS against ESAT journalists as soon as possible. The United Nations Guiding Principles on Business and Human Rights detail effectiveness criteria for operational-level grievance mechanisms established by business enterprises, including transparency: “keeping parties to a grievance informed about its progress, and providing sufficient information about the mechanism’s performance to build confidence in its effectiveness and meet any public interest at stake.”6 We encourage Hacking Team to, at a minimum, inform the journalists affected by these attacks of concrete action taken by the company to address the concerns raised in the attached report.

We also note that on February 25, 2015, Hacking Team published a press release regarding its compliance with Wassenaar Arrangement export controls covering certain surveillance technologies.7 Given that these controls are manifested in the form of a licensing regime implemented at the national level,8 what specific Italian regulations govern Hacking Team’s exports? Under which export control classification numbers do Hacking Team products fall (e.g., 4A005, 4D004, 4E001.c, 5A001.j)?9 To which countries are exports of Hacking Team products prohibited outright? What, if any, license exceptions apply to Hacking Team products? How many requests for export authorization has Hacking Team made to date?

Finally, we take this opportunity to remind you that we have not yet received any reply from Hacking Team to our letter of August 8, 2014.10 We reiterate the questions raised in that letter, and request that your response to this correspondence address said questions as well.

Thank you in advance for a timely reply.

Sincerely,
Professor Ronald Deibert
Director, The Citizen Lab
Munk School of Global Affairs
University of Toronto

Source:  https://citizenlab.org/2015/03/open-letter-hacking-team-march-2015/

//]]>