After the Arab Spring, Surveillance in Egypt Intensifies

It’s been four years since a popular uprising known as the Arab Spring forced Egyptian President Hosni Mubarak to resign, and yet leading information activists say that government surveillance is getting worse, not better.
The establishment of the High Council for Cyber Crime by decree of the Prime Minister on Dec. 14 cemented control of already tightly constrained Internet activity in Egypt, according to Ramy Raoof, one of the founders of Motoon, a new organization that provides information security consulting to non-governmental organizations and private companies. “The whole idea of [the Cyber Crime Council] is to make repression clearer and organized for the state,” he says.
The High Council for Cyber Crime is headed by Atef Holmi, the minister of Communications and Information Technology, and brings together top officials from across the Egyptian government, including the Ministries of Interior and Defense. Its sweeping mandate is “to fight threats in cyberspace.”
In the past, divisions between competing state bodies, whether ministries or institutions like the military, impeded cooperation in spying on and cracking down on civilian opponents. “Within the security agencies, they don’t share much information,” Raoof says. “They might share what they know, but not how they know it.”
The announcement of the formation of the High Council for Cyber Crime is part of a broader government shift toward greater surveillance on opposition figures and activists, according to Raoof.
“The Ministry of Interior has changed the way it talks about surveillance, from denials to, ‘Yes, we are spying, but only on the bad guys,’” Raoof says, speaking from Motoon’s office, which is modeled on the tech spaces of Silicon Valley, replete with beanbag chairs, Tetris graphics on the walls and a kitchen stocked with coffee and cookies.
The Ministry of Interior and other government officials have lately been saying, “We are trying to keep up with other democracies around the world, to move our country forward in a direction like the U.S.,” Raoof says. “So they give examples of the U.K. and U.S. as the model of governance that needs to be followed. And that model involves only surveillance.”
Egypt has a long history of communications surveillance. In the early 2000s, the Egyptian government began to pressure mobile companies to give up subscriber information. Tapping calls and text messages was then the Mubarak regime’s primary means of monitoring mass communications.
When it became clear that this was the best way to obtain operating permits and expand business, “mobile companies started to offer up information and strategies [to the government] for tracking users,” Raoof says.
In 2008, the state’s technological capacities for Internet surveillance leapt forward when it established an emergency task force to monitor and intercept online communications in response to a wave of protests in the industrial city of Mahalla. The Egyptian government turned to Western companies, purchasing hi-tech digital surveillance software such as Blue Coat, an online communication monitoring software developed by a U.S. company of the same name that has the ability to comb information from social media and emails, as well as penetrate programs like WhatsApp and Skype.
The sister-company to Blue Coat, called See Egypt, won a contract with the Egyptian government last year to sell its software and train the government in its use. Other Internet monitoring soft wares, like FinSpy from the U.K.-based Gamma International, and Remote Control System from the Italian-based company Hacking Team, have also won contracts with the Egyptian government.
In March 2011, protestors broke into the Egyptian State Security building and discovered documents that attested to extensive state surveillance activities — those revelations kicked off a series of high-profile information scandals. Yet rather than rolling back surveillance, the military-controlled government has used counterterrorism to justify expanding surveillance, according to Raoof and other activists. A rise in bomb attacks in Egypt, and the leak of a government tender requesting more advanced surveillance software, pushed the government to justify its activities, while also offering the excuse of national security.
The Egyptian government is far from alone in its domestic Internet surveillance activities, notes Runa Sandvik, an independent security researcher based in Washington, D.C. “As a security researcher in 2011 with the TOR project [developing software for anonymous internet browsing], I discovered that top information technology people from governments in the Middle East were meeting yearly to discuss website block lists, how to block TOR and other activities,” she says.
The biggest leaks have come from anonymous government figures attempting to compromise the presidency, yet the Ministry of Interior has focused on identifying and arresting groups of people critical of the regime, often based on little more than comments on Facebook, according to Amr Gharbeia, an information privacy advocate, who points to the recent condemnation of a prominent opposition blogger and activist to five years in prison by Egyptian courts.
In February, the pro-Muslim Brotherhood TV channel Mekameleen, based in Turkey, aired audio of what appeared to be Egyptian President Abdel Fatah El Sisi and senior government officials speaking contemptuously about wealthy Gulf funders, despite having received billions of dollars in cash and petroleum from Gulf states. It’s widely suspected that the leak, called Egypt’s “Watergate,” came from government sources.
Despite leaks like those, the authorities have focused mainly on prosecuting those critical of the regime, says Gharbeia, who is part of the Arab Digital Expression Foundation, a base for training Arab youth in digital technology and programming. “Police sources have been boasting of arresting people in the hundreds, even children, sweeping up groups of people associated with a particular IP address,” he says.   
Firstlook  http://ow.ly/KfJMI    Opensourceintelligence   http://ow.ly/KfJRE

 

« Wikipedia challenging mass surveillance by NSA
Snowden: IT Workers Are Now the Target of Spies »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: Future-proof your security with Secure Access Service Edge (SASE)

ON-DEMAND WEBINAR: Future-proof your security with Secure Access Service Edge (SASE)

Watch this webinar to explore the Security orchestration, automation, and response (SOAR) paradigm, its relationship with organization IT practices, and its role in your security strategy.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

UK Cyber Week Expo & Conference

UK Cyber Week Expo & Conference

Award-winning event organiser ROAR B2B announces the launch of UK Cyber Week and its inaugural event on 4 and 5 April 2023 at the Business Design Centre, London.

Roka Security

Roka Security

Roka Security is a boutique security firm specializing in full-scale network protection, defending against advanced attacks, and rapid response to security incidents.

DigiCert

DigiCert

DigiCert is the only provider of enterprise-grade SSL, IoT and PKI solutions. Our certificates are trusted everywhere, millions of times every day, by companies across the globe.

General Dynamics Information Technology

General Dynamics Information Technology

General Dynamics IT delivers cyber security services to defend critical information and infrastructure.

evoila

evoila

evoila GmbH is one of the leading providers in consulting, analysis, implementation and management of cloud infrastructure.

Cyber Threat Intelligence Network (CTIN)

Cyber Threat Intelligence Network (CTIN)

CTIN provides cyber threat intelligence services including training, platform evaluation, ISAC/ISAO systems development and counter botnet operations.

Sigma Payment Solutions

Sigma Payment Solutions

Sigma Payment Solutions offers a comprehensive suite of automated payment processing services, solutions, and technology to businesses in the USA.

BeCyberSure

BeCyberSure

BeCyberSure is an independent cyber security consultancy working across the full spectrum of the ‘Information Security’ threat.

Protenus

Protenus

Protenus provide a solution to proactively monitor and protect patient privacy in the electronic health record (EHR).

Forter

Forter

Forter provides new generation fraud prevention to meet the challenges faced by modern enterprise e-commerce.

Cervello

Cervello

Cervello is a leading provider of comprehensive and proven solutions to protect railways against cyber attacks.

Indeed

Indeed

Indeed is a worldwide employment-related search engine for job listings covering job types in all industries, including cybersecurity.

CyberSecJobs.com

CyberSecJobs.com

CyberSecJobs.com is a career site and job fair company providing services and resources to the cyber security community.

Liquid Intelligent Technologies

Liquid Intelligent Technologies

Liquid Intelligent Technologies is a leading communications solutions provider across Africa, providing reliable connectivity, hosting, co-location, and digital services including cyber security.

Unisys

Unisys

Unisys is a global information technology company providing industry-focused solutions integrated with leading-edge security to clients in the government, financial services and commercial markets.

Europol - European Cybercrime Centre (EC3)

Europol - European Cybercrime Centre (EC3)

The European Cybercrime Centre (EC3) was set up by Europol to strengthen the law enforcement response to cybercrime in the EU.

National Cybersecurity Alliance

National Cybersecurity Alliance

The National Cybersecurity Alliance is a non-profit organization on a mission to create a more secure, interconnected world.