- Super Smash Bros. Ultimate player’s trans flag removed for being ‘political’ Monday 7:37 PM
- Does Donald Trump Jr. know what American soldiers do? Monday 7:17 PM
- Sophie Turner has a hot take on Arya’s ‘Game of Thrones’ sex scene Monday 6:50 PM
- Parked Tesla Model S bursts into flames in shocking video Monday 3:12 PM
- Fortnite is getting an Avengers Endgame event Monday 2:44 PM
- The living are facing the end of the world in the latest ‘Game of Thrones’ Monday 2:37 PM
- The best Korean beauty toners for your skincare routine Monday 2:33 PM
- Warren’s plan to cancel student debt stimulates the bad-take economy Monday 2:27 PM
- Video shows Easter Bunny punching man on sidewalk Monday 2:09 PM
- The 7 best lubes for when you wanna do butt stuff Monday 2:00 PM
- 11 best sex toys under $35 to blow your mind Monday 1:30 PM
- Twitch streamer inadvertently documents all the times she was sexually, verbally harassed on vacation Monday 1:12 PM
- Raptors coach Nick Nurse becomes a relatable meme Monday 1:12 PM
- Man wears bandage that blends in with his skin tone, and Twitter has all the feelings Monday 12:55 PM
- The 8 best Korean sunscreens to add to your bag Monday 12:15 PM
U.S. company allegedly caught aiding Syria and Iran in censorship efforts
France’s Reflets has discovered that Blue Coat is currently providing the two countries with powerful software for filtering and spying on their countries’ Internet activities.
The French investigative publication Reflets has discovered that the American company Blue Coat is currently providing the government of Syrian leader Bashar Al-Assad and that of the Islamic Republic of Iran with software to filter and spy on their countries’ Internet activities in contravention of U.S. law.
Reflets, in an earlier report in October 2011, found that 15 servers in Syria were “regularly updating their software by calling home (that’s the USA, and this is technically, an export).” According to U.S. law, companies are legally forbidden to export certain types of products, including software, to certain countries, including Syria. Blue Coat insists on its website that it abides by these injunctions.
A recent report, however, found 37 servers still reporting in Syria to the U.S. for updates.
“In 2011, the U.S. government, despite the evidence we published, only blamed Blue Coat’s German distributor,” Reflet’‘s Fabrice Epelboin told the Daily Dot. The U.S. Department of Commerce then allowed the company to continue distributing its software.
“This time, it’s gonna be a little more difficult for them to explain how they got there… Again.”
In the current study, Reflets found 171 Blue Coat servers in Iran, a country off-limits to U.S. software exports (with the apparent exception of Stuxnet).
“There’s no way Blue Coat can ignore that there is such a massive amount of Blue Coat servers located in Iran,” said Epelboin. “This is a clear violation of the U.S.’s embargo law, and that technology is, without a shadow of a doubt, being used to violate human rights”
Iran consistently ranks among the worst abusers of human rights among nongovernmental organizations, such as Freedom House and Human Rights Watch. Corruption is rife, fair trials are rare, and criminal imprisonment is often used as a tool to stifle speech.
Could Blue Coat be ignorant of the use by Iran and Syria of their software? That’s unlikely, according to Reflets.
“One could imagine that Blue Coat does not carry out… geolocation before the first case that we revealed in late 2011,” Reflets wrote in its report. “Today it is hard to believe. Blue Coat has necessarily had to review the logs of connections to its appliances, scattered around the world, if only to ‘prove’ to the Department of Commerce that none of it was still located in a countries embargoed by the U.S. government.”
Reflets used a tool called “Nmap,” which, as Wikipedia explains it, “provides a variety of features for probing computer networks such as host discovery, service and operating system detection and other more in depth system information. These features are further extended by scripts that can perform more advanced service detection, vulnerability detection, and other information.”
In conjunction with the collaboration of local hackers, especially in Syria, Reflets was able to produce a map of servers using the Blue Coat products. The process is outlined, with examples, by Reflets in its article on the Syrian discoveries.
Reflets also discovered during the course of its investigations that the French software company Amesys, best known for providing Libya’s former strongman Muammar Qaddafi with his suite of filtering and spying software, is back in business and back in Libya.
Purchased by a former employee of its one-time owner, a company called Bull, Amesys has been rechristened “Advanced Middle East Systems” and is now headquartered in the United Arab Emirates. Reflets has tracked AMEsys operations in Morocco, Qatar, and other countries not renowned for their openness to online speech. The problem with this is, in part, the fact that the French state is part-owner of Bull.
The problem of Western companies providing tyrannical countries with the means to muzzle and punish their citizens for their speech and organizing online is not new. The importance of the Reflets investigation, however, is the detail.
A U.S. company is allegedly currently and actively providing aid to Iran, an avowed enemy of the United States in direct contravention of American law. This aid provides means by which the Iranian government can shut off dissent, discover dissenters, and punish advocates for the very values this country holds up as aspirational.
Blue Coat is also apparently providing the same aid to Syria, a country that is being torn apart by a devastating civil war in which the forces of President Bashar al-Assad have been accused of using poisonous gas on their own citizens and cutting off access to the Internet.
Requests for comment to Blue Coat and the Office of Foreign Assets Control at the U.S. Department of the Treasury were not returned.
Illustration by Jason Reed
Curt Hopkins has over two decades of experience as a journalist, editorial strategist, and social media manager. His work has been published by Ars Technica, Reuters, Los Angeles Times, and San Francisco Chronicle. He is the also founding director of the Committee to Protect Bloggers, the first organization devoted to global free speech rights for bloggers