Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Blue Coat Appliances Used by Governments to Monitor, Censor Web Traffic

    By
    Robert Lemos
    -
    January 17, 2013
    Share
    Facebook
    Twitter
    Linkedin

      A group of researchers urged the United States and the international community to take a close look at technology companies that provide network-filtering appliances to repressive regimes, after an Internet scan showed that 61 countries use one maker’s hardware to block or monitor communications.

      On Jan. 16, a human-rights-focused technology group at the University of Toronto, known as The Citizen Lab, published a report analyzing Internet data for signs of network appliances built by security and infrastructure firm Blue Coat Systems. The interest in the Sunnyvale, Calif. company followed a 2011 investigation by hacktivists and researchers that found its appliances being used by the Syrian government to monitor and censor its domestic opposition.

      The company’s products are widely used by governments with known interest in censoring or monitoring their citizens, including China, Egypt, Russia and Venezuela, according to the report.

      “The point is not to demonize this technology, but to create a broader discussion about these types of technologies,” said Morgan Marquis-Boire, lead technical researcher for the Citizen Lab, which is part of the UT’s Munk School of Global Affairs.

      The investigation found the devices in 61 countries—including nations in the Gulf Cooperation Council, which favors censoring certain types of Internet content, and in Lebanon, Turkey and Malaysia.

      In 2011, researchers discovered that network-infrastructure appliances made by Blue Coat Systems and Network Appliance, which had been sold to a company in the United Arab Emirates, had been trans-shipped to Syria. Extensive logs from the devices, obtained by hacktivists, showed that Syria used the devices to censor and monitor activists. The U.S. government added the company and individuals responsible for delivering the devices to Syrian officials to the Entity List, a compilation of individuals and groups that act against the United States and are prohibited from receiving U.S. products.

      “We believe that these logs were obtained by hacking into one or more unsecured third-party servers where the log files were exported and stored,” Blue Coat Systems said in a statement at the time. “We have verified that the logs likely were generated by [Blue Coat] ProxySG appliances and that these appliances have IP addresses generally assigned to Syria. We do not know who is using the appliances or exactly how they are being used.”

      Blue Coat and NetApp devices are considered “dual-use” technologies: They are capable of being used to defend networks, while at the same time, posing the threat of censoring and monitoring individuals. Perhaps the most well-known dual-use digital technology is encryption, the focus of a protracted legal battle between the U.S. and technology companies in the 1990s.

      Because the widespread use of encryption can help protect dissidents, most digital-rights activists protested limits on the export of encryption. In the current battle, however, human-rights activists instead support a debate on limiting the use of networking hardware capable of inspecting and blocking traffic.

      “One of the key goals of the debates surrounding dual-use technologies is to determine a method of crafting effective controls on such technology that simultaneously limit its sale and deployment for purposes that negatively impact human rights, while protecting those uses that serve legitimate purposes and result in benefits to society,” the Citizen Lab report stated.

      There is no easy solution to the problem because many countries have legitimate uses for the technology and nations are typically loath to pass judgment on their peers. Instead, the best solution may be for companies to become good corporate citizens and know their customers, said Marquis-Boire.

      “Ethical corporate behavior is a pretty mainstream idea these days,” he said. “I don’t see why a minimum standard of good corporate behavior cannot be expected these days. If the minimum standard is that we won’t sell to anyone not explicitly banned—that’s a pretty low bar.”

      Avatar
      Robert Lemos
      Robert Lemos is an award-winning freelance journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×