#alternate * Log In * Register Now * Help * Home Page * Today's Paper * Video * Most Popular Edition: U.S. / Global Search All NYTimes.com ____________________ Search New York Times Business Day * World * U.S. * N.Y. / Region * Business * Technology * Science * Health * Sports * Opinion * Arts * Style * Travel * Jobs * Real Estate * Autos ____________________ Search * Global * DealBook * Markets * Economy * Energy * Media * Personal Tech * Small Business * Your Money [imp.gif?client=ca-nytimes_display_html&event=noscript] Advertise on NYTimes.com Rights Group Reports on Abuses of Surveillance and Censorship Technology By JOHN MARKOFF Published: January 16, 2013 A Canadian human rights monitoring group has documented the use of American-made Internet surveillance and censorship technology by more than a dozen governments, some with harsh human rights policies like Syria, China and Saudi Arabia. Jakub Dalek of the Munk School of Global Affairs. Thor Swift for The New York Times Morgan Marquis-Boire led the research with Mr. Dalek. The Citizen Lab Internet research group, based at the Munk School of Global Affairs at the University of Toronto, used computer servers to scan for the distinctive signature of gear made by Blue Coat Systems of Sunnyvale, Calif. It determined that Egypt, Kuwait, Qatar, Saudi Arabia and the United Arab Emirates employed a Blue Coat system that could be used for digital censorship. The group also determined that Bahrain, China, India, Indonesia, Iraq, Kenya, Kuwait, Lebanon, Malaysia, Nigeria, Qatar, Russia, Saudi Arabia, South Korea, Singapore, Thailand, Turkey and Venezuela used equipment that could be used for surveillance and tracking. The authors said they wanted to alert the public that there was a growing amount of surveillance and content-filtering technology distributed throughout the Internet. The technology is not restricted from export by the State Department, except to countries that are on embargo lists, like Syria, Iran and North Korea. “Our findings support the need for national and international scrutiny of the country Blue Coat implementations we have identified, and a closer look at the global proliferation of dual-use information and communications technology,” the group noted. “We hope Blue Coat will take this as an opportunity to explain their due diligence process to ensure that their devices are not used in ways that violate human rights.” A spokesman for Blue Coat Systems said the firm had not seen the final report and was not prepared to comment. In 2011, several groups, including Telecomix and Citizen Lab, raised concerns that Blue Coat products were being used to find and track opponents of the Syrian government. The company initially denied that its equipment had been sold to Syria, which is subject to United States trade sanctions. Shortly afterward, Blue Coat reversed itself and acknowledged that the systems were indeed in Syria, but it said that the devices had been shipped to a distributor in Dubai, and said that it thought that they had been destined for the Iraqi Ministry of Communications. The Citizen Lab research project was led by Morgan Marquis-Boire and Jakub Dalek. Mr. Marquis-Boire, a Google software engineer, has during the last year been involved in a variety of research projects aimed at exposing surveillance tools used by authoritarian regimes. He said that he carefully segregated his work at Google from his human rights research. Last year, Mr. Marquis-Boire used computer servers to identify the use of an intelligence-oriented surveillance software program, called FinSpy, which was being used by Bahrain to track opposition activists. On a hunch last month, the researchers used the Shodan search engine, a specialized Internet tool intended to help identify computers and software services that were connected to the Internet. They were able to identify a number of the Blue Coat systems that are used for content filtering and for “deep packet inspection,” a widely used technology for detecting and controlling digital content as it travels through the Internet. The researchers stressed that they were aware that there were both benign and harmful uses for the Blue Coat products identified as ProxySG, which functions as a Web filter, and a second system, PacketShaper, which can detect about 600 Web applications and can be used to control undesirable Web traffic. “I’m not trying to completely demonize this technology,” Mr. Marquis-Boire said. The researchers also noted that the equipment does not directly fall under the dual-use distinction employed by the United States government to control the sale of equipment that has both military and civilian applications, but it can be used for both political and intelligence applications by authoritarian governments. “Syria is subject to U.S. export sanctions,” said Sarah McKune, a senior researcher at the Citizen Lab. “When it comes to other countries that aren’t subject to U.S. sanctions it’s a more difficult situation. There could still be significant human rights impact.” The researchers also noted that a large number of American and foreign companies supplied similar gear in what Gartner, the market research firm, described as a $1.02 billion market in a report issued in May 2012. The researchers said that some American security technology companies, like Websense, had taken strong human rights stands, but had declined to grapple with the issue of the possible misuse of the technology. This article has been revised to reflect the following correction: Correction: January 17, 2013 An article on Wednesday about a report on countries that are using digital censorship tools misspelled the surname of a senior researcher at the Citizen Lab Internet research group. She is Sarah McKune, not McCune. The article also misstated part of the name of a country that had a system that could be used for digital censorship. It is the United Arab Emirates — not the United Arab Republic, a political union between Egypt and Syria from 1958 to 1961. A version of this article appeared in print on January 16, 2013, on page B4 of the New York edition with the headline: Rights Group Reports on Abuses of Surveillance and Censorship Technology. Get Free E-mail Alerts on These Topics Computers and the Internet Human Rights and Human Rights Violations Surveillance of Citizens by Government Research Advertise on NYTimes.com IFRAME: https://myaccount.nytimes.com/regilite?product=DK The Clinton Doctrine of American Foreign Policy Also in IHT Rendezvous » * In Beijing, No Tears Over Clinton's Departure * Obama's Second Term: Not Necessarily Cursed IHT RENDEZVOUS Advertisements [IHT2234_Digi-Subs_86x60pxl_v1.jpg] [Print_Subs_336x79pxl_Generic.jpg] [moth_reverse.gif] [moth_forward.gif] Inside NYTimes.com Booming » A Prodigy’s Death and the Limitations of Talent A Prodigy’s Death and the Limitations of Talent Opinion » The Stone: Why Do We Cling to the Idea of Race? The Stone: Why Do We Cling to the Idea of Race? U.S. » Young, Liberal and Open to Big Government Young, Liberal and Open to Big Government N.Y. / Region » Doubting if Tomorrow Will Ever Come for Taxi Doubting if Tomorrow Will Ever Come for Taxi Opinion » Op-Ed: A Tax to Pay for War By tying military action to additional revenue, the president would have a freer hand in deciding when to use force. Books » ‘Ghostman’ by Roger Hobbs ‘Ghostman’ by Roger Hobbs World » Conspiracy Buffs Gain in Court Ruling on Crash Opinion » Letters: Police Dishonesty in the Courtroom Business » In Makeover, Channel Takes Cue From Esquire Theater » An Arctic Awakening With Song and Soul Opinion » What Do the Older Jobless Need? Job seekers in their 50s and 60s are struggling. Room for Debate asks: Should they train for new fields? Or take internships? T Magazine » The Circus of Fashion * © 2013 The New York Times Company * Site Map * Privacy * Your Ad Choices * Advertise * Terms of Sale * Terms of Service * Work With Us * RSS * Help * Contact Us * Site Feedback [f8b6788Q2FoooQ3EQ7DQ2F-IcQ2FtoIqQ2FQ51rNQ5Ejt(Q2FQ5B2j!Q7Dqq.XcUeQ3EQ3 EFQ3EQ7Dk!kQ3E] [&t=6&s=0&ui=&r=&u=www%2dnc%2enytimes%2ecom%2f2013%2f01%2f16%2fbusiness %2frights%2dgroup%2dreports%2don%2dabuses%2dof%2dsurveillance%2dand%2dc ensorship%2dtechnology%2ehtml%3f%3d%5fr%3d6] DCSIMG