The following was gleaned from the pages of El Telegrafo, September 5, 2013 — an Ecuadorian newspaper. 


Spy Files 3

The Spy Files #3 form part of the documents that the organization Wikileaks has published since 2011 regarding companies dedicated to providing intelligence and security. In this research which  includes El Telegrapho from Ecuador, WikiLeaks reveals a network of 92 companies involved in global espionage.
The corporation, Wikileaks founded by Australian Julian Assange, shows new files that expose several businesses that offer assistance to governments, companies or independent societies “national security”.  These include such companies as Qosmos, Scan & Targe, IPS Intelligence, Gamma and Thales.

Research Unit

WikiLeaks laid bare on September 4, 2013 more than 92 surveillance, espionage and security companies operating in the world, mostly in the United States, Britain, France and other European countries. Ecuador does not appear in the documents, in Latin America, only Mexico is mentioned. The 200 files are called Spy Files 3 and the first was published in 2011.

These Spy Files are divided into three parts. The first contains brochures, catalogues, and presentations of espionage and surveillance companies; in the second part are revealed contracts or agreements of confidentiality and the third section  shows a list of countries visited in recent years by some of the private surveillance companies. Detailing the movements of the 92 company’s one of the findings is that South America is not a recurring site for the corporations.

Among the services offered by companies comprising the Spy Files: Internet monitoring, mobile information extraction, content decoding or any social networking website monitoring mechanisms to identify faces, record conversations and other services.

Julian Assange believes that we are living under “Orwellian” conditions

Interesting only one of these corporations dates from 2000, the others are from 2009 to 2012. This shows that the private surveillance industry is relatively new; in fact, its conception was September 11, 2001, the day of the attack on the Twin Towers in New York.  Since then these companies began to emerge more quickly monitoring services and security, according to the Washington Post.

Jacob Appelbaum, a computer security researcher stated that:

“These companies spend tens of thousands of people in the world and move multiple billions of dollars” (

For example, the documents from the National Security Agency (NSA for its acronym in English) revealed by Edward Snowden , according to The Washington Post, found that the intelligence budget in the United States reached $52,600 million dollars in 2013 alone.  In the Spy Files 3  it has come to light the young companies who operate is secrecy. There is a snapshot of the technical capabilities of these companies, which advertise that their products are designed to protect national security, engage in counter terrorism, and combat drug trafficking, child pornography and money laundering.  This is how the companies peddle their necessity and from most accounts, Americans seem to buy it.

250 confidential documents were revealed in the Spy Files 3 WikiLeaks.  The organizational documents show that there are organizations that provide operating systems, software, computer virus malware type, to devices such as cameras, recorders or audio and video transmitters, complete equipment, from cellular, to satellites, among others. They also offer other services to governments and private companies, municipalities or independent corporations.

Julian Assange, who also was quick to note that we live in “Orwellian Times” (referring to the 1984 book by George Orwell) went on to note:

“The spying industry works closely with governments worldwide to facilitate illegal surveillance of citizens. With little oversight and no regulation, this immense system entangles us all against our will and often without our knowledge. WikiLeaks is committed to expose and educate the public about this industry, in order that together we can build the knowledge and tools to protect ourselves, and each other” (ibid).


Product companies such as Gamma (Germany), Dreamlabs (Switzerland) and Hacking Team (Italy) include sophisticated malware like viruses that cannot be detected by a traditional antivirus program. They can infect computers and mobile devices.

These malware programs, such as Gamma FinSpy, convey all the activity that occurs on the infected machine to the servers of the government agency that purchased the virus. There have been incidents of its use in 25 countries, including Ethiopia, Estonia, Singapore, Malaysia, Turkmenistan, Germany, Mexico and Japan.

Internet surveillance

Among the companies that are dedicated to monitoring the Internet, social networks like Facebook and Twitter, or email, such as Gmail or Yahoo! Mail, etc., are companies that extract metadata analysis providing information or intercept the use of the Internet to see real-time movements.

One such company is Italian Intelligence, IPS, with Facebook Relation Analysis service, which extracts information from users of this social network. What you get if you use such companies as Italian Intelligence is this: profiles, a list of contacts, the number of messages exchanged, all chat conversations, graphics relations with other Internet users and data export html, xml, or txt for all of this information.

Another bit of software that works with data extraction is Kapow Katalyst, from the Kofax Company, which gets text in multiple languages, and all images, audio and video from any open source intelligence, and media websites, governmental websites, emails and social networks, anonymously and without a trace. The software also retains information no matter the state of the connection. Kapow provides service to 500 customers, including telecommunication company AT & T, Audi car brand and the Intel Corporation, to name just a few.

IxMachine Qosmos is also part of this group and it extracts metadata online traffic and recognized protocols and applications like Skype, MSN, YouTube, Gtalk, Hotmail, Dailymotion, among others.

Scan & Target Scan Surveillance provides a service that has the ability to analyze large volumes of content intercepted in real time from the web or mobile phones and applications. This system can detect potential terrorists or criminal content in SMS, Twitter, email, Facebook, blogs, forums, etc.  It also detects algorithms and secret codes.

Extracting information from cell phones

Forensic Telecommunications Company specializes in extracting information from mobile phones. The service offered is divided into three parts. The first, SIMiFOR, is able to obtain all SIM card data; the second is HEX Raptor, which can extract deleted data from cell phones “commonly available” such as Nokia, Sony Ericsson, Samsung, Motorola, LG and others. With what is called “chip-off” technique, Hex Raptor can obtain data even from damaged phones.  Finally, there is what is known as Ixam — software that collects and retrieves information, specifically from iPods and iPhones.  This company works with countries like the U.S., England, Canada, Germany, Lebanon, Saudi Arabia, Pakistan, Malaysia and Bali.

Spy Tools

Then there is Audioscope, a machine with 345 microphones able to capture all the audio detail in a bustling and allows access to the recording of the complete environment and then is able to zoom in and isolate the voices or noises that require spying.  In the catalog for Audioscope there is also an audio nano transmitter Beowulf II Bubble Gum called Covert. In addition, there are voice analysis systems such as VoiceGrid.


In Mexico the French company Thales provides security services to the city of Mexico, in partnership with Telmex, a telecommunications corporation.


Assange and Wikileaks have done a tremendous job uncovering the private spy agencies and software being used today all over the world.  But this is just the tip of the iceberg for as this is being written, new companies are popping up everywhere.

The forces of reaction now have full spectrum dominance over the world’s communications and under the auspices of protecting the public, we can be sure that their clandestine use will not only put the public in grave danger, but will do so while maximizing profits for the owners of the Orwellian systems and their investors and partners on Wall Street and other stock exchanges.

The concepts from “Brave New World” (a novel by Aldous Huxley) have now teamed up with social repression and Orwell to assure that the one percent, their governments and their transnational corporations, will have all they need to quell any resistance to their imperialist and fascist plans.  You can be sure that they are reading this right now!