Skip to content or view screen version

Arms fair's cyber security breached

Corporate Watch | 19.09.2015 13:41 | Anti-militarism | Other Press | Terror War | London | World

Anarchists calling themselves the 'Information Liberation Front' (ILF) have leaked documents [ 1 | 2 ] to the Indymedia UK website, which show that they were able to gain access to Hacking Team's company EZONE account on the DSEI arms fair's website and register a fake exhibitor at the fair. DSEI is one of the world's biggest arms fairs and is taking place in London's Docklands today. Hacking Team is a cyber surveillance company, which is exhibiting at the fair.



The security breach comes after several activists managed to breach DSEI's physical security and get into the fair (see here and here).

This message was posted by the ILF with the leaked documents: “Hacking Team are war criminals, DSEI are war criminals, their security is shit... They should have expected us”.

Hacking Team have been hacked before. The company, which sells hacking technology to governments, police forces and corporations worldwide, had its security breached in July 2015. 400 gigabytes of the company's private data was leaked, including a customer list. At the time the US Federal Bureau of Investigation (FBI), the Centro Nacional de Inteligencia in Spain, the Muhabarrat al A'amah in Saudi Arabia, The Egyptian MOD and the Turkish National Police were among Hacking Team's list of clients. Private companies such as Barclays Bank and Deutsche Bank were also Hacking Team customers. Elbit, the leading Israeli drone manufacturer, was in partnership with Hacking Team.

The ILF leak also revealed the information sent to exhibitors at DSEI by Clarion Events, the company hosting the fair. This includes detailed site plans for the fair, details of speakers and events, security information, and information on how to import weapons to the UK to exhibit at the fair.

Many government and army personnel participated in the fair, including Michael Fallon, the Defence Secretary, Philip Dunne, the Minister of State for Defence Procurement, and the Chiefs of Staff for the air force, army and navy (see here).

The leaked documents show that DSEI exhibitors are able to request time with the hundreds of visiting government delegations during the DSEI arms fair, in order to promote arms sales.

Corporate Watch
- Homepage: https://corporatewatch.org/news/2015/sep/18/arms-fairs-cyber-security-breached

Comments

Hide the following 4 comments

Arms fair's cyber security breached

01.10.2015 09:38

Arms fair's cyber security breached = we registered for the event and then downloaded the information supplied to all the delegates and exhibitors most of which was already in the public domain.

Reality Check


@ Reality Check

01.10.2015 11:22

I agree trying to present this as a "hack" of the DSEI system is a little silly, they clearly did nothing of the sort. What makes it all the more embarrising is they only managed to do most of it after the event had already ended !

Protest against DSEI was lamentable this year with the loest ever number of protestors.

Another


Anonymous is full of losers

10.10.2015 13:19

Yes it is quite pathetic. Like most people from Anonymous these activists clearly have zero technical skills. Perhaps if they threw away their tofu burgers and ate some meat the protein would help their brains develop to the point that they can learn how to hack?

Nigel Farage


Something has gone wrong

12.10.2015 06:15

I'm not sure what the problem is but protests and actions against the arms trade have just about collapsed these days. The 'Close H&K' campaign in Nottingham closed down, the regular protests outside BAE Systems in Warton have stopped (not heard of one for nearly four years). The Space Hijackers called it a day and just recently CAAT was unable to co-ordinate a meaningful protest outside DSEI.

If the full extent of what we can manage is this nonsense above then we really do have problems. Is anybody aware of other campaigns ?

Jane