After the Arab Spring, Surveillance in Egypt Intensifies

It’s been four years since a popular uprising known as the Arab Spring forced Egyptian President Hosni Mubarak to resign, and yet leading information activists say that government surveillance is getting worse, not better.
The establishment of the High Council for Cyber Crime by decree of the Prime Minister on Dec. 14 cemented control of already tightly constrained Internet activity in Egypt, according to Ramy Raoof, one of the founders of Motoon, a new organization that provides information security consulting to non-governmental organizations and private companies. “The whole idea of [the Cyber Crime Council] is to make repression clearer and organized for the state,” he says.
The High Council for Cyber Crime is headed by Atef Holmi, the minister of Communications and Information Technology, and brings together top officials from across the Egyptian government, including the Ministries of Interior and Defense. Its sweeping mandate is “to fight threats in cyberspace.”
In the past, divisions between competing state bodies, whether ministries or institutions like the military, impeded cooperation in spying on and cracking down on civilian opponents. “Within the security agencies, they don’t share much information,” Raoof says. “They might share what they know, but not how they know it.”
The announcement of the formation of the High Council for Cyber Crime is part of a broader government shift toward greater surveillance on opposition figures and activists, according to Raoof.
“The Ministry of Interior has changed the way it talks about surveillance, from denials to, ‘Yes, we are spying, but only on the bad guys,’” Raoof says, speaking from Motoon’s office, which is modeled on the tech spaces of Silicon Valley, replete with beanbag chairs, Tetris graphics on the walls and a kitchen stocked with coffee and cookies.
The Ministry of Interior and other government officials have lately been saying, “We are trying to keep up with other democracies around the world, to move our country forward in a direction like the U.S.,” Raoof says. “So they give examples of the U.K. and U.S. as the model of governance that needs to be followed. And that model involves only surveillance.”
Egypt has a long history of communications surveillance. In the early 2000s, the Egyptian government began to pressure mobile companies to give up subscriber information. Tapping calls and text messages was then the Mubarak regime’s primary means of monitoring mass communications.
When it became clear that this was the best way to obtain operating permits and expand business, “mobile companies started to offer up information and strategies [to the government] for tracking users,” Raoof says.
In 2008, the state’s technological capacities for Internet surveillance leapt forward when it established an emergency task force to monitor and intercept online communications in response to a wave of protests in the industrial city of Mahalla. The Egyptian government turned to Western companies, purchasing hi-tech digital surveillance software such as Blue Coat, an online communication monitoring software developed by a U.S. company of the same name that has the ability to comb information from social media and emails, as well as penetrate programs like WhatsApp and Skype.
The sister-company to Blue Coat, called See Egypt, won a contract with the Egyptian government last year to sell its software and train the government in its use. Other Internet monitoring soft wares, like FinSpy from the U.K.-based Gamma International, and Remote Control System from the Italian-based company Hacking Team, have also won contracts with the Egyptian government.
In March 2011, protestors broke into the Egyptian State Security building and discovered documents that attested to extensive state surveillance activities — those revelations kicked off a series of high-profile information scandals. Yet rather than rolling back surveillance, the military-controlled government has used counterterrorism to justify expanding surveillance, according to Raoof and other activists. A rise in bomb attacks in Egypt, and the leak of a government tender requesting more advanced surveillance software, pushed the government to justify its activities, while also offering the excuse of national security.
The Egyptian government is far from alone in its domestic Internet surveillance activities, notes Runa Sandvik, an independent security researcher based in Washington, D.C. “As a security researcher in 2011 with the TOR project [developing software for anonymous internet browsing], I discovered that top information technology people from governments in the Middle East were meeting yearly to discuss website block lists, how to block TOR and other activities,” she says.
The biggest leaks have come from anonymous government figures attempting to compromise the presidency, yet the Ministry of Interior has focused on identifying and arresting groups of people critical of the regime, often based on little more than comments on Facebook, according to Amr Gharbeia, an information privacy advocate, who points to the recent condemnation of a prominent opposition blogger and activist to five years in prison by Egyptian courts.
In February, the pro-Muslim Brotherhood TV channel Mekameleen, based in Turkey, aired audio of what appeared to be Egyptian President Abdel Fatah El Sisi and senior government officials speaking contemptuously about wealthy Gulf funders, despite having received billions of dollars in cash and petroleum from Gulf states. It’s widely suspected that the leak, called Egypt’s “Watergate,” came from government sources.
Despite leaks like those, the authorities have focused mainly on prosecuting those critical of the regime, says Gharbeia, who is part of the Arab Digital Expression Foundation, a base for training Arab youth in digital technology and programming. “Police sources have been boasting of arresting people in the hundreds, even children, sweeping up groups of people associated with a particular IP address,” he says.   
Firstlook  http://ow.ly/KfJMI    Opensourceintelligence   http://ow.ly/KfJRE

 

« Wikipedia challenging mass surveillance by NSA
Snowden: IT Workers Are Now the Target of Spies »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

softScheck

softScheck

softScheck is an IT security consultancy. Services range from pentesting and compliance testing to security auditing of software and IT infrastructure.

CSA Events

CSA Events

Cloud Security Alliance conducts a series of conferences around the world. This listing provides a link to details of upcoming events.

Cyber Akademie (CAk)

Cyber Akademie (CAk)

Cyber Akademie is a training and education center providing high-quality training and information events on information security and data protection.

Pole SCS (Secure Communicating Solutions)

Pole SCS (Secure Communicating Solutions)

SCS is a world-class competitiveness cluster dedicated to digital technologies in the fields of Microelectronics, Internet Of Things, Digital Security, Artificial Intelligence And Big Data.

Thomas Miller Specialty

Thomas Miller Specialty

Thomas Miller Specialty is a commercial Managing General Agency providing specialty risks insurance including Cyber & e-crime insurance.

Viasat

Viasat

Viasat is a provider of high-speed satellite broadband services and secure networking systems covering military and commercial markets.

Mitek Systems

Mitek Systems

Mitek's global mobile capture and identity verification technology optimizes the digital user experience for thousands of financial services organizations.

Me Learning

Me Learning

Me Learning provides engaging, informative and clearly explained learning materials for complex and challenging professional environments in areas including GDPR and Information Governance.

Wizlynx PTE LTD

Wizlynx PTE LTD

Wizlynx PTE LTD is the Singapore branch of Wizlynx Group located in Singapore, offering Information and Cyber Security Services throughout the entire Asia Pacific (APAC) region.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

Digitale Gründerinitiative Oberpfalz (DGO)

Digitale Gründerinitiative Oberpfalz (DGO)

Digital Founder Initiative Oberpfalz's goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

Spyderbat

Spyderbat

Spyderbat ATI closes the manual investigation gap between detection and response by instantly presenting causally connected threat activity to security analysts at the onset of an investigation.

Hubify

Hubify

Hubify is an experienced, service-driven technology company specialising in business connectivity across mobile, data, voice, cloud, & cyber security solutions.

BrainStorm

BrainStorm

BrainStorm Threat Defense takes a new human-focused approach to security awareness that traditional training lacks. It’s a cutting-edge platform to make your users more security savvy.

Birch Cline Cybersecurity

Birch Cline Cybersecurity

Birch Cline specializes in helping Local Government and Education agencies, as well as mid-market organizations, build and maintain successful cybersecurity programs.

CyberRey

CyberRey

CyberRey is a leading distributor of comprehensive cybersecurity solutions, empowering organizations of all sizes to thrive in the digital age.