In a Wikileaks media release on 15 September, a Singapore company is named as one of several which have allegedly purchased “weaponised German surveillance malware” for use.

The products are apparently provided by FinFisher, which Wikileaks described as a “company that produces and sells computer intrusion systems, software exploits and remote monitoring systems that are capable of intercepting communications and data from OS X, Windows and Linux computers as well as Android, iOS, BlackBerry, Symbian and Windows Mobile devices.”

Wikileaks, which is led by Julian Assange, says the malware is “used by intelligence agencies around the world to spy on journalists, political dissidents and others.”

Mr Assange, WikiLeaks Editor in Chief, said:

“FinFisher continues to operate brazenly from Germany selling weaponised surveillance malware to some of the most abusive regimes in the world. The Merkel government pretends to be concerned about privacy, but its actions speak otherwise. Why does the Merkel government continue to protect FinFisher? This full data release will help the technical community build tools to protect people from FinFisher including by tracking down its command and control centers.”

FinFisher is also a subsidiary of the Gamma group which, it says, “provides advanced technical surveillance and monitoring solutions and international consultancy to National and State Intelligence Departments and Law Enforcement Agencies.”

According to Reporters Without Borders (RWB), “Gamma has offices and subsidiaries in the United Kingdom, including the Channel Islands, and Germany, but also in Southeast Asia and the Middle East.”
RWB says “Gamma International sells interception equipment to government and law enforcement agencies exclusively.”

“Its FinFisher Suite (which includes Trojans to infect PCs, mobile phones, other consumer electronics and servers, as well as technical consulting) is regarded as one of the most advanced in today’s market,” RWB says.

It gave examples of how governments use FinFisher spyware products to monitor activities.

“A computer or smartphone is remotely infected by a Trojan, which is then controlled by government agencies through command and control servers. A computer can be infected via false update notifications of software, malicious emails or through physical access to a machine. Finfisher also offers technology to infect an entire Internet cafe in order to survey all possible users. When installed, it is almost impossible to safely remove the Trojan. Also, there are no safe ways to circumvent Finfisher on an infected machine.”

According to other online sources:

“FinFisher malware is installed in various ways, including fake software updates, emails with fake attachments, and security flaws in popular software. Sometimes the surveillance suite is installed after the target accepts installation of a fake update to commonly used software. Code which will install the malware has also been detected in emails. The software, which is designed to evade detection by antivirus software, has versions which work on mobile phones of all major brands.”

The Singapore company which is said to have purchased the products is apparently PCS Security Pte Ltd, which was incorporated in 1998, and headed by five Singaporeans.

On its website, PCS says it prides itself “in delivering value-added systems with our domain expertise and experience in Homeland Security and Infocomm Security.”

“We have the expertise and capability to deliver cutting-edge technology solutions for our Customers in the Government, trade and the commercial sector,” it said.

Some of the software licences which PCS Security Pte Ltd has apparently purchased include FinSpy, FinIntrusion, and FinUSB Suite.

According to official records, PCS Security Pte Ltd itself is fully owned by another outfit – the Phoenix Co-operative Society.

However, not much is known about the co-operative except that it has an office at the Trade Hub in Boon Lay Way, and owns all the shares of PCS Security Pte Ltd.

In 2010, Phoenix Co-operative Society was one of two co-operatives which were given an exemption under the Co-operative Societies Act. The other was the Singapore Police Co-operative Society Limited.
It is unclear what exactly the exemption for Phoenix Co-operative Society was for.

According to Wikileaks, PCS Security Pte Ltd apparently spent some 3,166,560 euros (around 5.1 million Singapore dollars) in 2012 on the licences for the malware products.

Based on the licenses which were purchased by PCS Security Pte Ltd, up to 500 target computers can be monitored using the spying system, recording the online activities of the user as well as logging all usernames and passwords. Installation of the spying system can be easy as just plugging a USB stick into the computer with little or no technical knowledge.

Perhaps a more sinister product purchased is the FinIntrusion which allows agents using the software to record all accounts logged in to public wi-fi access networks such as in hotel lobbies, libraries, etc.

In recent months, the Singapore government has been reinforcing its cyber security capabilities.
In August, the Singapore government announced the setting up of a Cyber Watch Centre which it said will give the government “wider detection capabilities”.

“This upgrade will allow us to better monitor government websites and inspect if there are malicious activities, which could affect access to online public services,” Communications and Information Minister, Yaacob Ibrahim, said then.
yaccob ibrahim
At the same time, the government also said it was creating “a Monitoring and Operations Control Centre to help the Government guard against, and respond swiftly, to security threats.” (CNA)
Dr Yaacob was reported as saying that the centre “will provide the government with a full suite of capabilities to guard against security threats and respond to them in a timely manner.”
It is unclear if the products purchased by PCS Security Pte Ltd are legal, or are for use for its work with the Singapore government; and what exactly is it that the Phoenix Co-operative Society does.
The Online Citizen has written to the police for clarification on the legality of the reported purchases by PCS Security Pte Ltd.

Subscribe
Notify of
13 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
You May Also Like

Graphic novelist educates public about face masks through a short comic

Award-winning graphic novelist Sonny Liew, made a short comic titled “Baffled Bunny…

日本出现首宗死亡病例 80岁老妇感染新冠病毒去世

日本厚生劳动省周四(14日)晚间宣布,一名神奈川县80岁老妇因感染新冠病毒去世,为日本首宗死亡病例,亦是继菲律宾和香港,第三宗死亡病例。 据《日本放送协会》(NHK)报道,该名老妇于上月22日身体不适,2月1日开始住院,期间曾出现呼吸状态恶化,直至12日病情恶化,于13日不幸离世。 日本当局表示,该名女死者并没有外游,故此将详细调查她的感染途径。 此外,综合日媒报道,日本近日所新增的四起确诊病例之一,包括老妇的70岁多岁的计程车司机亲戚,据该名患者指出,他曾搭载一名看似中国人的乘客;另一名则为50多岁的外科医生。 《共同社》报导,该50多岁和歌山县男性外科医师是日本国内首位确诊新冠肺炎的医务人员,1月31日出现肺炎的发烧症状后,2月3日至5日自行服用退烧药,并且继续看诊,直到10日才住院治疗,13日确诊新冠肺炎。 据医师称,他过去14天未曾前往中国,也未跟中国人有接触,因此无法掌握感染路径。 目前医师所在医院已安排全员接受检查。 和歌山县知事表示,目前“还不能说济生会有田医院已出现院内感染” 日本宣布对疑似患者隔离 日本厚生劳动相加藤胜信亦宣布今日(14日)起降按照传染病检疫的相关法例,在入境前对新冠病毒患者或疑似感染者实施“隔离”与“停留”等措施,隔离即指如发现疑似感染患者,且检测属阳性的情况下,将感染者直接送往医疗机构入院治疗;而停留则指只要飞机或船舶上只要有一名确诊者,乘客全员要住进医疗机构,直至有检测结果为止。 另外,日前在日本停留的钻石公主号游轮,因陆续出现确诊病患,乘客被迫在船上隔离。日本厚生劳动省也表示,让日高齡、有基礎疾病的旅客提前下船,在下船前必须进行病毒检测确认阴性。 厚生劳动省表示,船上2千666名旅客中大多是高龄者,80岁以上旅客也有226人。…

吴家和揭八旬老人露宿街头发抖 当局称已协助逾30名街友

本月16日,社运份子吴家和分享,和支援团队在牛车水街道上,发现有八旬年长街友,躺在纸板上,盖着非常薄且肮脏的床单,瑟瑟发抖着。 吴家和指出,昨夜下着细雨,而他们在发现这些老人家后,就提供被子或睡袋、套衫和饼干。他相信可能还有更多需要帮助的年长街友。再者,年末通常都是雨季,许多露宿者的睡眠都受到了这寒冷天气的影响。 A volunteer helping a elderly homeless to stay warm during…