Ethiopia Paid US$ 1 Million to Hacking Team to Spy on Citizens

News Politics
ethiopia paid one million dollar for the provision of spying services and communication equipment to target specific groups and its citizens.
The Ethiopian regime have caused a hacking firm enough damage out of “their reckless and clumsy usage” of the spy tool, according to e-mails and documents released online this week from an Italian company “Hacking Team” that it was hacked. The document shows the regime paid a hefty one million dollar for the provision of spying services and communication equipment to enable the regime to target specific groups and spy on its citizens. (Photo: Kacper Pempel/Reuters)


AN INVOICE that was made public on the Internet by hackers depicted that the Ethiopian government paid US $ 1 million to an Italian company, Hacking Team, for its provision of professional services and communication equipment to target specific groups and spy on citizens.

$1 million USD was paid to Hacking Team by the Information Network Security Agency (INSA) on 2012 to access a powerful software for spying on dissidents and journalists and within and outside Ethiopia.

Citizen Lab reported in March 2015 that Hacking Team helped the Ethiopian government hack computers of Ethiopian Satellite Television and Radio (ESAT) journalists residing in the United States.

Hackers of Hacking Team revealed that Beniam Tewelde, who was believed to have a connection with Meles Zenawi Foundation, had communicated with Hacking Team in 2012 regarding the company’s Remote Control System software, communication equipment, and professional service.

The email showed that Beniam Tewelde appreciated Hacking Team for providing technical support “in getting high value target.” Beniam bought eight domains in the name of Meles Zenawi Foundation to spy on citizens.

Other reports indicate that the Ethiopian Network Security Agency (INSA) purchased Hacking Team’s products for $829,200 in 2012.

Sudan is another country, which paid the first 50% (480,000 euro) to Hacking Team for the Remote Control System- a powerful spyware to spy on people and companies.

Several other countries have been listed as clients of Hacking Team.

An unknown number of hackers accessed some 400 GB of data and documents of Hacking Team and made it public.

The $1million dollar HackingTeam Invoice made to Ethiopia among four other clients

– – – –

What it Took for Ethiopia to Lose Access to Hacking Tools it Used Against Journalists in the U.S.

By Andrea Peterson | The Washington Post

NOW we know what it takes to get your hacking tools taken away if you’re a repressive government.

It’s not enough to get caught spying on U.S.-based journalists — or even to have the story plastered on the front page of a major U.S. newspaper. But if you get caught doing it again because of your own sloppiness, that may just be enough to shame your vendor into cutting you off.

That’s what the public is now learning from a massive trove of e-mails and documents released online this week from Italian company Hacking Team, which was itself hacked.

Hacking Team is part of a burgeoning commercial surveillance industry that critics allege sells hacking tools once reserved for the most advanced intelligence agencies to any country that can pay. The company has long had a policy of not identifying its customers and has responded to previous reports of abuse by saying it has an internal process for responding to allegations of human rights abuses.

The e-mail cache, now archived by WikiLeaks, appears to show that the company relied on a biannual report from an international law firm to determine which countries it can legally sell its products and faced pressure from the United Nations and the Italian government over business relationships with repressive regimes. Last fall, the company briefly faced a ban on the export of its products by the Italian government, according to the e-mails. Around the same time, the company’s chief operating officer wrote in an e-mail that it had suspended Sudan as a client and that it was a “sensitive” time for the company.

But e-mails sent in the aftermath of a March report about Hacking Team tools being used by the Ethiopian government to target journalists based in the United States appear to show that the sloppiness of their Ethiopian customers, which exposed the use of the company’s technology, was a bigger concern for the company than potential human rights violations. And later, the company tried to secure a new contract with the country.

Researchers with Citizen Lab at the University of Toronto’s Munk School of Global Affairs discovered traces of Hacking Team’s tools on the computers of U.S.-based Ethiopian journalists, as reported in a front-page story by The Post in February of 2014. The Ethiopian government has a notoriously poor track record on freedom of the press, and Ethiopians living abroad play a significant role in providing independent news coverage of the country’s domestic situation.

At the time, Ethiopia denied using Hacking Team’s products. The government did not respond to a request for comment for the story.

This March, Citizen Lab published evidence that Hacking Team spyware had again been used to target Ethiopian journalists in the United States — and the software appeared to have been updated since the earlier attacks were disclosed, suggesting that the company had continued to support the Ethiopian government as a client even after reports of abuse.

Hacking Team declined to confirm its relationship with the company at the time, telling The Post that “assertions that may seem perfectly obvious to some can be extremely difficult to actually prove.” But internally, there was little debate about the accuracy of the Citizen Lab report.

“[T]hey know they are right,” wrote one software architect for the company, according to the e-mails. “[E]very technician reading the report will come to the same conclusions.” The “infrastructure” supporting Ethiopia was shut down after Hacking Team reviewed the report, according to the e-mails.

But the ensuing internal investigation appeared limited. The company did send an inquiry to their contact with Ethiopia’s Information Network Security Agency about the allegations, according to the e-mails. The Ethiopian agent argued that the target was a member of an opposition political movement that the government had declared a terrorist group and that the government did not consider him a journalist, the e-mails said.

The response seemed to satisfy Hacking Team, with Chief Operating Officer Giancarlo Russo writing that it “seems that from a legal point of view they are compliant with their own law.”

Still, concerns remained about the financial fallout from Ethiopia’s use of the Hacking Team products. “I think that we all agree that we should interrupt any business with them due to the recurring media exposure and resulting technical issues,” Operations Manager Daniele Milan wrote in an e-mail.

“The issue is their incompetent use of [HackingTeam] tools,” wrote Hacking Team communications chief Eric Rabe, who is also affiliated with the University of Pennsylvania, in the e-mails. “They can argue about whether their target was a justified target or not, but their use of the tool several times from the same email address, and in repeatedly targeting and failing to get access is what caused the exposure of our technology.”

The internal reaction reveals a lot about the company’s priorities, said Bill Marczak, one of the researchers who worked on the Citizen Lab reports. “Their primary concern seems to have been not getting caught again,” he said.

The e-mails represent only part of the company’s discussion, Rabe told The Post in a statement, and the company was “justifiably concerned” by the Citizen Lab reports that Ethiopia was using its technology for political rather than law enforcement purposes. “While many opinions were expressed reaching a decision, the fact is that Hacking Team suspended the use of our system by this client in late 2014 and then ended our relationship altogether in 2015,” he said. “The company rejected [a] subsequent argument that a new restricted contract could be reached.”

But the e-mails suggest that Ethiopia did not lose access to spying capabilities until March. Pressed on the apparent discrepancy, Rabe said that the suspension meant that the Ethiopian government “would still have had some ability to collect data from existing surveillance” but could not select new targets and that a complete cutoff did not occur until this year.

Hacking Team, he said, was concerned after the February 2014 Citizen Lab report on Ethiopia’s use of its tools and had a “protracted series of discussions” with the client. “Ultimately, we were unable to determine the actual facts of the case,” Rabe said.

But the company realized “the client’s activity risked exposing our system not just for this client, but also possibly for others,” so it took steps to protect the systems from detection, he said. Hacking Team also warned Ethiopia to use the system only for law enforcement purposes and required additional training for operators of the system, according to Rabe.

There does appear to have been a contract dispute in late 2014, with more training and a new user agreement being promoted by Hacking Team and the Ethiopian contact complaining about the “bad performance” of the company’s system, according to the e-mails.

However, the messages also show that Hacking Team continued to negotiate with Ethiopia before and after the March 2015 Citizen Lab report.

In May, the company offered Ethiopia a contract with more on the ground training and supervision at a hefty price tag, according to the e-mails. The country continued to have at least some limited access to data within Hacking Team’s systems until June, when a “read-only” license provided to Ethiopia expired, according to the e-mails — and as recently as the beginning of July, some inside the company were hoping to keep it on board as a client.

“I would like them to renew,” an account manager wrote in a July 1 e-mail checking on the country’s status.