law enforcement

Latest

  • Lasers could be the future of drunk-driving detection

    by 
    Sarah Silbert
    Sarah Silbert
    06.11.2014

    Forget the "walk-and-turn" field sobriety test; researchers have developed a laser that can detect drunk drivers remotely. A team at Warsaw's Military University of Technology shined a laser beam through a moving vehicle, along with a reflective mirror that bounced back to a detector, to pick up alcohol vapors. With a system to simulate a drunk driver's breath, the researchers were able to detect blood alcohol concentrations higher than 0.1 percent. (In the US, a concentration of 0.08 or greater is considered illegal.) With a real drunk person, though, the lasers-and-mirrors setup could likely detect even lower levels.

  • What customer information will Apple provide to the cops?

    by 
    John-Michael Bond
    John-Michael Bond
    05.13.2014

    At the beginning of May, Apple updated its Legal Process Guidelines for U.S. Law Enforcement. These are the guidelines that law enforcement and government entities within the U.S. must follow when seeking information from Apple Inc about the people who use their products, services, and devices. So what exactly do these guidelines say and, more importantly, what information will the company give to the police? The good news is that Apple takes the privacy of its customers seriously, so if personal information is being sought by law enforcement the company will notify you. Of course, there are always exceptions to every rule. Here are situations where Apple won't inform you: ...where providing notice is prohibited by the legal process itself, by a court order Apple receives (e.g., an order under 18 U.S.C. §2705(b)), or by applicable law or where Apple, in its sole discretion, believes that providing notice could create a risk of injury or death to an identifiable individual or group of individuals or in situations where the case relates to child endangerment. We know that Apple will notify you if your information is being requested in most situations, so how much information is Apple willing to give up? The answer is a lot, as long as there is a proper subpoena or warrant in place. Currently, law enforcement can gain access to your basic registration, customer information, and customer service records with a proper legal subpoena. This includes the name, address, email, and telephone number you provide when registering a device, your purchase date and device type, and records of support interactions with customer service. In addition, information about your device, warranty or repair history may also be available depending on the scope of the subpoena. Your iTunes information is slightly more complicated. Like your customer data, your iTunes subscriber information (name/physical address/email address/telephone number) and your IP addresses can be provided with a subpoena or warrant. Your iTunes purchases and download history can obtained with an order under 18 U.S.C. §2703(d) or a court order meeting the equivalent legal standard. A search warrant is required for Apple to provide the specific content purchased or downloaded. Apple will provide information for purchases made at its online and physical retail locations if subpoenaed, including your IP address, products purchased, debt card number, and the serial number of the item purchases if available. Your iCloud information is, surprisingly, very safe. In the interest of clarity, we've copied all of the information that is available from iCloud. i. Subscriber Information When a customer sets up an iCloud account, basic subscriber information such as name, physical address, email address, and telephone number may be provided to Apple. Additionally, information regarding iCloud feature connections may also be available. iCloud subscriber information and connection logs with IP addresses can be obtained with a subpoena or greater legal process. ii. Mail Logs iCloud mail logs are retained for approximately a period of 60 days. Mail logs include records of incoming and outgoing communications such as time, date, sender email addresses, and recipient email addresses. This information is available only through a court order under 18 U.S.C. § 2703(d) (or a court order with an equivalent legal standard) or a search warrant. iii. Email Content iCloud only stores the email a user has elected to maintain in the account while the customer's account remains active. Apple is unable to produce deleted content. Apple will produce customer content, as it exists in the customer's mailbox in response to a search warrant. iv. Other iCloud Content. PhotoStream, Docs, Contacts, Calendars, Bookmarks, iOS Device Backups iCloud only stores the content for these services that the customer has elected to maintain in the account while the customer's account remains active. Apple does not retain deleted content once it is cleared from Apple's servers. Apple will produce customer content in these categories only in response to a valid search warrant. What about the Find My Phone feature? No need to worry, as the feature is customer-facing and Apple doesn't have records of maps or email alerts provided through the service. In addition, the company cannot activate the feature on your device at the request of law enforcement if you have the feature turned off. However, Apple will turn over activity logs for when the feature is activated or if a request has been made to remotely lock or erase a device with a court order or search warrant. Finally, if provided with a valid search warrant Apple can remove certain types of active data from a password-locked iOS device. Apple can only remove unencrypted user-generated files that are contained in Apple's native apps. With a valid warrant, Apple can provide the following: SMS, photos, videos, contacts, audio recording, and call history. Apple cannot provide: email, calendar entries, or any third-party App data. This sounds more troubling that it actually is, however, because to get this information the cops have to already physically have your phone. The phone also has to be in good working order and using iOS 4 or higher. Then the police need to submit a valid warrant that specifically includes the device's serial number and IMEI. Once they have the warrant the device has to be sent to Apple's Cupertino headquarters. In keeping with the Fourth Amendment, Apple's guidelines for turning over user data requires specific information from law enforcement along with legal paperwork. If you're still worried about Apple's law enforcement guidelines, try to keep controversial information off your phone's native Apple apps.

  • Moves can now share your info with Facebook and the police

    by 
    John-Michael Bond
    John-Michael Bond
    05.06.2014

    Following the release of the iPhone 5s with the M7 motion coprocessor, a number of fitness apps sprang up to utilize all the data it could capture. Our favorite app was Moves, a user-friendly fitness tracker that makes it easy to cycle through the number of steps you've taken, the number of calories burned, the number of miles walked and the amount of time spent moving in a given day. Then the app was purchased by Facebook on April 24 of this year, much to the chagrin of many users. Moves announced its new privacy policy on May 5, and thanks to its new owner, privacy minded users may want to think twice before using the app to track their movements. The terms of service for the app have been updated to include sharing with third parties, including new owner Facebook, one of the largest data mining operations in the world. We may share information, including personally identifying information, with our Affiliates (companies that are part of our corporate groups of companies, including but not limited to Facebook) to help provide, understand, and improve our Services. They'll also share your information with the police. We may access, use, preserve, and share your information, including your personally identifying information, with third parties when we have a good faith belief that it is necessary to: detect, prevent and address fraud and other illegal activity; protect ourselves, you and others, including as part of investigations; or prevent death or imminent bodily harm. We may also share such information if we believe that you have abused your rights to use the Services or violated an applicable law, or in connection with any dispute between you and us with respect to the Services. Oh yeah, and if they sell the business or even part of their business, they can use your personal information as part of that transaction. If we sell all or part of our business, make a sale or transfer of assets, are otherwise involved in a merger or business transfer, or in the event of bankruptcy, we may disclose and transfer your personally identifying information to one or more third parties as part of that transaction. In short, Facebook can use your information for whatever purpose it likes; it could target ads to you based on businesses you pass on your run, or sell your information to developers wanting to know if an area is popular with fitness fans. They can also share your location information with the police if they want to, totally without your consent. Of course, this may just sound paranoid. Exactly how much information could Moves have on you? Here's everything that Moves collects from your phone, copied directly from their own website. Data collection and processing Moves collects data from your phone to provide you with an easy way to track how and where you move in your everyday life. When you install, run or use our services we collect: Location. Our system starts to collect location data from sources such as GPS, Wi-Fi and cell towers once you install the App and consent to the App's tracking your location. We also collect Accelerometer samples, Wi-Fi network IDs, activity data, and places you identify with the Services. You may choose to stop our collection of location data through the Settings that we provide in the App, or by removing the App from your phone. Information you provide. If you choose to create an account, you provide us your email and a password. You may also provide other information such as your gender, height, weight, and birth year in order to use all of the App's features. Information from your device. This includes information about your operating system, device identifier, carrier, language, battery performance, wi-fi or other network connections, or other data that you permit the App to access on your device including through permissions on your device (e.g. Google Play on Android). Communications with us. If you communicate with us, we collect the information and content you provide to us, including personally identifying information such as your name, email or other contact information. You can provide anonymous feedback by using an email account that does not reveal your identity. Signing this agreement only gives Facebook access to your travel data and personal information down to how fast you walk or run and what your average battery life is like. Given that Facebook isn't exactly known for respecting the privacy of its users when money can be made, this update is especially troubling for anyone who worries about the increasing amount of personal information that must be traded just to use simple programs. I reiterate: it's possible that this is just my paranoia kicking in. It's also possible that you'll see "David ran 2 miles this week, how far could you go with Moves" ads in your Facebook feed. We'll have to wait and see. If that level of information sharing is not to your liking, there are many other M7-enabled apps that aren't owned by Facebook, including RunKeeper's Breeze (free).

  • LogAnalysis maps the structure of gangs using phone records

    by 
    Sarah Silbert
    Sarah Silbert
    04.14.2014

    It's no surprise that law enforcement agencies use mobile phone records to investigate criminal activity, but a platform called LogAnalysis could facilitate some of the most sophisticated analysis for all that raw data. Developed by Emilio Ferrara and his team at Indiana University, the software uses call records and other info to map hierarchies within criminal organizations according to "social network theory." (Hint: Those who make the most calls are usually at the bottom, while those in charge tend to communicate the least.) And by automatically importing call records and removing ambiguous or redundant information, LogAnalysis streamlines the process of analyzing that data. In a paper, Ferrara and other researchers describe how LogAnalysis processed call records for a group convicted of several robberies, drug trafficking and extortion. By clustering together calls based on the time and date, the software revealed which numbers traced back to gang members involved in a particular robbery or murder. The data also clumped calls together in 14 different subgroups, revealing individuals (or at least phone numbers) involved in specific crimes. As the MIT Technology Review points out, many of the researchers behind this paper are based in Sicily, so it's likely that some of the call data in this case comes from Italy. If that's true, we have a pretty good idea what criminal organization they're talking about here.

  • Homeland Security reconsiders plans for a national license plate recognition database

    by 
    Emily Price
    Emily Price
    02.19.2014

    Homeland Security has decided it doesn't need a database of everyone's license plates after all -- at least not yet. Law enforcement officials across the country are already using license plate readers to track vehicles, but currently those cameras aren't connected together in any sort of meaningful way. The Department of Homeland Security was interested in tying together the nation's cameras, and posted a call for contractors earlier this week to find someone to create a new National License Plate Recognition Database to house them all. Originally reported by Ars Technica, a 29-page document detailing the program describes a technology where officers could upload a photo of a license plate from their smartphone, and then get alerts on their phone regarding the location of a vehicle. The database could allow officers to track vehicles over state lines, and quickly locate criminals on the run. Turns out that document and the contractor listing were posted prematurely. An ICE representative told the Washington Post Wednesday that the documents had not reviewed by the organization's leaders, and they're pulling the request for now. That doesn't mean your wheels are in the clear just yet -- the group plans to revisit the idea, and could potentially repost the listing in the future.

  • Daily Update for May 10, 2013

    by 
    Steve Sande
    Steve Sande
    05.10.2013

    It's the TUAW Daily Update, your source for Apple news in a convenient audio format. You'll get all the top Apple stories of the day in three to five minutes for a quick review of what's happening in the Apple world. You can listen to today's Apple stories by clicking the inline player (requires Flash) or the non-Flash link below. To subscribe to the podcast for daily listening through iTunes, click here. No Flash? Click here to listen. Subscribe via RSS

  • Connected To The Case to use Facebook for crowd-sourced crime solving

    by 
    Jamie Rigg
    Jamie Rigg
    10.01.2012

    Ready the spandex and decide on a name for your alter ego, because come October 16th, you'll have the chance to fight crime from the comfort of your computer. On that date, the "Connected To The Case" website goes live with the aim of crowd-sourcing tips from its users to help the cops solve active investigations. You'll use your Facebook login for access, as the service pulls data from your profile to prioritize cases with which you might have a connection. Morgan Wright, CEO and Chief Crime Fighter of Crowd Sourced Investigations, told us its system looks at five key areas when digging for pertinent triggers: "date, location, time, relation and demographics." It then uses that data to tailor notifications of unsolved crimes based on -- for example -- proximity to your school, or where you used to work. Rest assured that you control the privacy settings, and if you've got useful info to share, you can do so anonymously. Law enforcement agencies can register to include their cases from today, with the initial roll-out targeting the US. The plan is to expand first to other English-speaking countries, with foreign language support in the future to build a global network of internet do-gooders. Including data from other social networks is also in the pipeline, starting with Twitter and later, Foursquare and Pinterest. A smartphone app is also on the agenda, so get your detective devices ready -- we can be heroes, if just for one click.

  • Judge rules Facebook users can share friends' profiles with the feds

    by 
    Donald Melanson
    Donald Melanson
    08.16.2012

    It's not the backdoor access that the FBI has been pushing for, but US District Judge William Pauley III has now ruled that it and other law enforcement agencies are entitled to view your Facebook profile if one of your "friends" gives them permission to do so. As GigaOm reports, that ruling comes as part of a New York City racketeering trial, in which one of the accused, Melvin Colon, had tried to suppress evidence turned up on Facebook that led to his indictment. That information was obtained through an informant who gave investigators access to the profile, something that Colon had argued violated his rights against unreasonable searches and seizures under the Fourth Amendment. In the ruling, Judge Pauley dismissed that claim, likening the Facebook access instead to a phone wiretap in which one person on the call allows the government to monitor it -- a practice that has been ruled constitutional. GigaOm also has the ruling in its entirety at the source link below for those interested.

  • PlayBook Mobile Responder app puts police tools in a finger-friendly package

    by 
    Terrence O'Brien
    Terrence O'Brien
    08.10.2012

    The PlayBook may not have taken off in the consumer market, but its enterprise-friendly features may help it find a home elsewhere -- especially now that it's packing a speedy 4G radio. Fresh on the heels of the LTE edition hitting Canadian shores, Intergraph has unveiled its Mobile Responder app that turns RIM's slate into a formidable tool for police and other emergency responders. The app taps into the company's Computer Aided Dispatch system, which pulls in data from police databases, keeps dispatch centers just a tap away and allows the immediate filing of incident reports. The suite is getting its first public demo next week at the Canadian Association of Chiefs of Police Conference in Nova Scotia. For more, check out the PR after the break.

  • Subpoenas issued over 38 Studios deal, Citizens Bank sues Schilling [Updated]

    by 
    Justin Olivetti
    Justin Olivetti
    06.14.2012

    While the fallout from 38 Studios' collapse carries with it a human toll, it also has triggered a legal one as well. State and federal law enforcement agencies have issued subpoenas to both Bank Rhode Island and the Rhode Island Economic Development Corporation over the loans that enticed the game studio to the state. Currently, the RI state police, the state attorney general's office, the FBI, and the US attorney's office are jointly looking into the situation. Police are investigating the specifics of the deals in an attempt to figure out what exactly happened. The subpoenas requested records of the financial contracts and loans. Both the RIEDC's $75M in taxpayer bonds and Bank Rhode Island's $8.5M loan are unlikely to be repaid following the studio's bankruptcy. [Update: Massively reader Zaken tipped us off to the fact that Citizens Bank has announced it is suing 38 Studios' Curt Schilling to the tune of $2.4 million "in an attempt to recoup its money from the ex-ballplayer's personal assets."]

  • Sheriff's department streamlines traffic citation process with iOS devices

    by 
    Steve Sande
    Steve Sande
    06.13.2012

    The next time you're caught speeding in St. John the Baptist Parish in Louisiana, don't be surprised if the sheriff uses an iPad or iPhone to write your ticket. The Sheriff's Office in this parish about 30 miles west of New Orleans is using a ticketing solution developed by Zerion Software on their iFormBuilder platform for iOS. The idea behind the system is to allow law enforcement officers to enter data directly onto an iPad, iPhone or iPod touch while they're talking with drivers. They won't have to return to their vehicles to enter the information into a dashboard-mounted computer, thus saving time. Data entry errors are expected to fall as well thanks to the use of a Socket Mobile barcode scanner to capture driver's license and vehicle information. The ticket is printed on a Zebra mobile printer and given to the errant driver. The citation info is sent to a server for storage and processing, or held for later transfer if the device is offline. There's no word on whether the devices will be pre-loaded with Angry Birds for those long traffic stakeouts, or use Siri to find local donut shops.

  • Authorities decrypt laptop without defendant's help, Fifth Amendment need not apply

    by 
    Michael Gorman
    Michael Gorman
    03.03.2012

    Constitutional junkies have had their eyes on Colorado for awhile now, because a federal judge there ordered a woman to decrypt her hard drive in a criminal trial. This, despite her cries that doing so would violate her Fifth Amendment right to be free from self-incrimination. The argument is now moot, as authorities have managed to access the laptop's data without any aid from the defendant, thereby obviating any Constitutional conundrums. Who knows if the feds found the evidence of bank-fraud they were looking for, or whether it was brute force or a lucky guess that did the trick, but at least we can say it's the last of the laptop-related Fifth Amendment court cases for awhile, right?

  • Court upholds Fifth Amendment, prevents forced decryption of data

    by 
    James Trew
    James Trew
    02.26.2012

    When our forefathers were amending the constitution for the fifth time, they probably didn't have TrueCrypt-locked hard drives in mind. However, a ruling from the 11th Circuit Appeals Court has upheld the right of an anonymous testifier to not forcibly decrypt their data. The case relates to a Jon Doe giving evidence in exchange for immunity. The protection afforded to them under this case wouldn't extend to any other incriminating data that might be found, and as such Doe felt this could lead to violation of the fifth amendment. The validity of the prosecution's demands for the data decryption lies in what they already know, and how they knew it -- to prevent acting on hopeful hunches. The prosecutors were unable to demonstrate any knowledge of the data in question, leading the 11th Circuit to deem the request unlawful, adding that the immunity should have extended beyond just the current case. This isn't the first time we've seen this part of the constitution under the digital spotlight, and we're betting it won't be the last, either.

  • Taser's on-officer cameras catch you in the act, right to remain silent imperative

    by 
    Andrew Munchbach
    Andrew Munchbach
    02.21.2012

    Taser International has released an update to its on-officer system, the AXON Flex. The new rig provides law enforcement officials with body-mounted cameras that capture video evidence "from the officer's perspective." These recording devices can be affixed to the hat, collar, shoulder or on specially designed Oakley shades and are ruggedized to IPX2 standards. That's all well and good, but what really gives this setup nerd-cred is what can be done with the captured video. Through a partnership with evidence.com, the Flex system can send footage to a "military grade" cloud-based storage system for safe keeping; there is also an on-site storage option for IT-savvy forces. As if that weren't enough, Taser and Looxcie have co-developed a smartphone app -- available for iOS or Android -- that will allow officers to review captured clips and add GPS coordinates, notes or timestamps. The system's goal is to protect officers from "false claims, enhance public trust [and] decrease litigation." AXON Flex is set to be released in Q1 and will have a base price of around $700. Don't tase film me, bro.

  • Hawaii's online tracking law is all but dead, lead sponsor confirms

    by 
    Amar Toor
    Amar Toor
    02.01.2012

    The Hawaii state legislature has apparently pulled an about face on a proposed internet tracking bill, amid swelling concerns from civil libertarians and internet service providers alike. First introduced last week, the controversial measure calls for all ISPs to track and record a user's online activity and identity within individual digital dossiers. The law's supporters trumpeted it as a vital step in protecting "victims of crime," but its momentum has all but come to a halt, now that its lead champion has proclaimed its death. In a recent interview with CNET, Democratic Representative John Mizuno (pictured left) confirmed that his bill has been shelved, attributing the decision to the avalanche of critical feedback he's received (see the coverage links, below). "It's generated a lot of national attention," Mizuno explained. "I've taken into consideration the thousands of e-mails (which were often) colorful and passionate, which is absolutely fine... This bill just isn't ready. It needs a lot of work." Unfortunately, this doesn't mean spell an outright death for the law, as Mizuno still believes that keeping a record of browsing history could help authorities hunt down pedophiles and other evil doers. "I think both would be very strong pieces of evidence if there's going to be a criminal proceeding," he argued. Despite our own fundamental misgivings with Mizuno's approach, it's still encouraging to see politicians respond to public outcry so swiftly and, as with the SOPA debacle, appropriately.

  • AR goggles take crime scene technology to CSI: Miami level

    by 
    Andrew Munchbach
    Andrew Munchbach
    01.31.2012

    Dutch researchers are looking to catapult crime scene investigation into the 21st century through the use of augmented reality (AR). The prototype system, designed by the Delft University of Technology, employs a pair of AR goggles, two head-mounted cameras and a portable laptop rig to allow investigators to build virtual crime scenes by tagging evidence and placing objects they are viewing. After mapping an area, additional law enforcement personnel can review the investigator's work and request additional information -- asking the CSI to define or place additional objects. Researchers hope that the 3D renders will be used as court-admissible evidence in the near future; the technology is set to be tried on a real Dutch crime scene later this year. We can see it now: Lieutenant Horatio Caine whips off his shades and tosses on a pair of (equally stylish) crime-fighting goggles... YEAAAAAAAAH!

  • Judge forces defendant to decrypt laptop, fuels debate over Fifth Amendment rights

    by 
    Amar Toor
    Amar Toor
    01.24.2012

    A judge in Colorado yesterday ordered a defendant to decrypt her laptop's hard drive at the prosecution's request, adding new fire to the ongoing debate surrounding consumer technology and the Fifth Amendment. The defendant, Ramona Fricosu, is facing charges of bank fraud, stemming from a federal investigation launched in 2010. As part of this investigation, federal authorities used a search warrant to seize her Toshiba Satellite M305 laptop. Fricosu's legal team had previously refused to decrypt the computer, on the grounds that doing so would violate her Fifth Amendment rights to avoid self-incrimination. On Monday, though, US District Judge Robert Blackburn ruled against the defendant, arguing that the prosecution retained the right to access her device, as stipulated under the All Writs Act -- a law that requires mobile operators to comply with federal surveillance."I conclude that the Fifth Amendment is not implicated by requiring production of the unencrypted contents of the Toshiba Satellite M305 laptop computer," Blackburn wrote, adding that there was strong evidence to suggest that Fricosu's computer contained information pertinent to the case. Fricosu's lawyer, Phil Dubois, is hoping to obtain a stay on the ruling, in the hopes of taking the case to an appeals court. "I think it's a matter of national importance," Dubois explained. "It should not be treated as though it's just another day in Fourth Amendment litigation." It remains to be seen whether Dubois succeeds in his appeal, though civil libertarians are already paying close attention to the case, since the US Supreme Court has yet to weigh in on the matter.

  • NYPD begins testing long-distance gun detector as alternative to physical searches

    by 
    Amar Toor
    Amar Toor
    01.21.2012

    As part of its ongoing effort to keep New York City safe, the NYPD has begun testing a new scanning device capable of detecting concealed firearms from a distance of about 16 feet. Developed in conjunction with the Department of Defense, the technology uses terahertz imaging detection to measure the radiation that humans naturally emit, and determine whether the flow of this radiation is impeded by a foreign object -- in this case, a gun. During a speech Tuesday, Police Commissioner Ray Kelly said the device shows "a great deal of promise as a way of detecting weapons without a physical search." Kelly went on to say that the technology would only be deployed under "reasonably suspicious circumstances," though some civil liberties activists are already expressing concerns. "We find this proposal both intriguing and worrisome," New York Civil Liberties Union executive director Donna Lieberman said in a statement, adding that the scanner could all too easily infringe upon civilian privacy. "If the NYPD is moving forward with this, the public needs more information about this technology, how it works and the dangers it presents." For now, the NYPD is only testing the device at a shooting range in the Bronx, and has yet to offer a timeline for its potential deployment.

  • The necessary relationship between Blizzard and law enforcement

    by 
    Mathew McCurley
    Mathew McCurley
    12.16.2011

    Pop law abounds in The Lawbringer, your weekly dose of WoW, the law, video games and the MMO genre. Mathew McCurley takes you through the world running parallel to the games we love and enjoy, full of rules, regulations, pitfalls and traps. Back in 2009, a man named Alfred Hightower escaped to Canada from the United States after a warrant was issued for his arrest in Indiana for drug dealing and other charges. The Howard County Sheriff's Department had no idea where Hightower ran off to until a deputy figured out that Alfred Hightower was a World of Warcraft player. After a politely worded request for information about the guy to Blizzard, the detectives had everything they needed to find, alert the proper authorities in Canada, and arrest Alfred Hightower. Blizzard didn't really have to easily comply with the information request by the Howard County Sheriffs Department but did so in a smooth and cooperative way. Sure, there are scenarios where some information would be compulsory and downright necessary (in the case of national emergency or someone in mortal danger), but this was just some dealer who ran to Canada. There's usually a longer process. Antisec, the hacker anti-security movement, released a document back in November that allegedly discusses how Blizzard will respond to law enforcement information requests and provide law enforcement with a sort of a primer on World of Warcraft and what to expect from Blizzard's cooperation. What's interesting is that this primer and information packet had to have been created to streamline the process of helping out law enforcement. Someone made this packet to save time, which means there have been plenty of requests for people's information.

  • WikiLeaks' Spy Files shed light on the corporate side of government surveillance

    by 
    Amar Toor
    Amar Toor
    12.02.2011

    WikiLeaks' latest batch of documents hit the web this week, providing the world with a scarily thorough breakdown of a thoroughly scary industry -- government surveillance. The organization's trove, known as the Spy Files, includes a total of 287 files on surveillance products from 160 companies, as well as secret brochures and presentations that these firms use to market their technologies to government agencies. As Ars Technica reports, many of these products are designed to get around standard privacy guards installed in consumer devices, while some even act like malware. DigiTask, for example, is a German company that produces and markets software capable of circumventing a device's SSL encryption and transmitting all instant messages, emails and recorded web activity to clients (i.e., law enforcement agencies). This "remote forensic software" also sports keystroke logging capabilities, and can capture screenshots, as well. Included among DigiTask's other products is the WifiCatcher -- a portable device capable of culling data from users linked up to a public WiFi network. US-based SS8, Italy's Hacking Team and France's Vupen produce similar Trojan-like malware capable of documenting a phone or computer's "every use, movement, and even the sights and sounds of the room it is in," according to the publication. Speaking at City University in London yesterday, WikiLeaks founder Julian Assange said his organization decided to unleash the Spy Files as "a mass attack on the mass surveillance industry," adding that the technologies described could easily transform participating governments into a "totalitarian surveillance state." The documents, released on the heels of the Wall Street Journal's corroborative "Surveillance Catalog" report, were published alongside a preface from WikiLeaks, justifying its imperative to excavate such an "unregulated" industry. "Intelligence agencies, military forces, and police authorities are able to silently, and on mass, and [sic] secretly intercept calls and take over computers without the help or knowledge of the telecommunication providers," wrote Wikileaks in its report. "In the last ten years systems for indiscriminate, mass surveillance have become the norm." The organization says this initial document dump is only the first in a larger series of related files, scheduled for future release. You can comb through them for yourself, at the source link below.