Casos verificados de uso ilegítimo de software de vigilancia por parte de gobiernos de América Latina 2015-2016
Resumen
El presente artículo es una investigación bibliográfica y análisis exploratorio acerca de la vigilancia estatal en internet en América Latina. Describe los alcances de las capacidades de vigilancia gubernamental mediante el estudio de la documentación publicada por Edward Snowden y Wikileaks entre 2011 y 2017. Resume la presencia de la industria de vigilancia en América Latina y presenta cuatro casos de estudio sobre uso ilegítimo de software de espionaje y vigilancia en la región.Citas
Ablon, L., Libicki, M. C., & Golay, A. a. (2014). Markets for Cybercrime Tools and Stolen Data. National Security Research Division, 1–85. https://doi.org/10.7249/j.ctt6wq7z6
Agencia AFP. (2015, December 22). Corte Suprema de Panamá ordena detención de expresidente Martinelli. Diario El Heraldo. Retrieved from http://www.elheraldo.hn/ mundo/913506-466/corte-suprema-de-panamá-ordena-detención-de-expresidente-martinelli
Albirini, A. (2008). The Internet in developing countries: a medium of economic, cultural and political domination. International Journal of Education and Development Using Information and Communication Technology (IJEDICT), 4(1), 49–65. Retrieved from http://ijedict.dec. uwi.edu//viewarticle.php?id=360
Ali, A., & Hudaib, Z. (2014). Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology, (8), 97–158.
Article 19, R3D, & SocialTIC. (2017). Gobierno Espía: Vigilancia sistemática a periodistas y defensores de derechos humanos en México. Retrieved from https://r3d.mx/ gobiernoespia
Arturo, Á. (2015). México, el principal cliente de una empresa que vende software para espiar. Animal Político. Animal Político. Retrieved from http://www. animalpolitico.com/2015/07/ empresa-de-hackers-exhibida-por-venta-de-software-espia-a-paises-represores-y-mexico-resulta-su-principal-cliente/
Barret, B. (2017). The Encryption Debate Should End Right Now. WIRED. Retrieved from https://www.wired.com/story/ encryption-backdoors-shadow-brokers-vault-7-wannacry/
Bonifaz, R. (2017). The NSA Surveillance Capabilities According to the Snowden Documents. In Actas del IX Congreso Iberoamericano de Seguridad Informática CIBSI2017. Buenos Aires: Facultad de Ingeniería, Universidad de Buenos Aires
Botello, N. A. (2015). Doing surveillance studies in Latin America: The insecurity context. Surveillance and Society, 13(1), 78–90.
Caldera, E., & Parraguez Kobek, L. (2016). Cyber Security and Habeas Data: The Latin American response to information security and data protection. OASIS, 0(24), 109–128. https://doi.org/http://dx.doi. org/10.18601/16577558.n24.07
Cox, J. (2016). Privacy Activists Launch Database to Track Global Sales of Surveillance Tech. VICE. Retrieved from https://motherboard. vice.com/en_us/article/qkjznm/ privacy-activists-launch-database-to-track-global-sales-of-surveillance-tech
Fidler, M. (2014). Anarchy or Regulation : Controlling the Global Trade in Zero-Day Vulnerabilities. Stanford University. Retrieved from http:// purl.stanford.edu/zs241cm7504
Gellman, B., & Poitras, L. (2013, June 7). U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program. The Washington Post. Retrieved from https://www.washingtonpost. com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845- d970ccb04497_story.html
Greenwald, G. (2014). No Place to Hide. Metropolitan Books.
Ilv. (2015). Hacking Team, Chile y Ecuador. Tor Project. Retrieved from https://web.archive.org/ web/20150924185925/https:// people.torproject.org/~ilv/ht_ chile_ecuador.html
Lee, M., Greenwald, G., & Marquis-Boire, M. (2015). BEHIND THE CURTAIN: A Look at the Inner Workings of NSA’s XKEYSCORE. Retrieved January 14, 2018, from https:// theintercept.com/2015/07/02/ look-under-hood-xkeyscore/
Maciel, M., Foditsch, N., Belli, L., & Castellon, N. (n.d.). Cyber security, privacy and trust. Trends in Latin America, 7–12. Retrieved from https:// bibliotecadigital.fgv.br/dspace/ bitstream/handle/10438/16706/ Cyber-Security%2C Privacy and Trust Trends in the Latin American and Caribbean region and the way forward.pdf
Marczak, B., Scott-Railton, J., Senft, A., Poetranto, I., & McKune, S. (2015). PAY NO ATTENTION TO THE SERVER BEHIND THE PROXY: Mapping FinFisher’s Continuing Proliferation. Retrieved from https://citizenlab.ca/2015/10/mapping-finfishers-continuing-proliferation/
Marczak, W. R., Scott-Railton, J., Marquis-Boire, M., & Paxson, V. (2014). When Governments Hack Opponents: A Look at Actors and Technology. Proceedings of the 23rd USENIX Security Symposium, 511– 525.
Pérez de Acha, G. (2016). Hacking Team Malware para la Vigilancia en Amé- rica Latina. Derechos Digitales.
Scott-Railton, J., & Marczak, B. (2016). THE MILLION DOLLAR DISSIDENT: NSO Group’s iPhone Zero-Days used against a UAE Human Rights Defender. Retrieved January 14, 2018, from https://citizenlab. ca/2016/08/million-dollar-dissident-iphone-zero-day-nsogroup-uae/
Scott-Railton, J., Marquis-Boire, M., Guarnieri, C., & Marschalek, M. (2015). PACKRAT: Seven Years of a South American Threat Actor. Retrieved January 14, 2018, from https:// citizenlab.ca/2015/12/packrat-report/
Setty, S. (2015). Surveillance, Secrecy, and the Search for Meaningful Accountability. Stanford Journal of International Law, 51(1), 69–103.
The ZMap Team. (2017). The Zmap Project. Retrieved from https://zmap. io/
Tinoco, T. (2015). Cyber ataque - parte 2. Quito, Ecuador: Ecuavisa. Retrieved from http://www.ecuavisa. com/video/video-vision-360/ destacados-360/cyber-ataque-parte-2-0
Wikileaks. (2011a). Strategic Telecommunication Network Monitoring. Retrieved October 29, 2017, from https://wikileaks.org/spyfiles/ docs/VASTECH_2011_StraTeleNetw_en.html
Wikileaks. (2011b). The Spy Files. Retrieved September 6, 2017, from https://wikileaks.org/the-spyfiles. html
Wikileaks. (2014). Spy Files. Retrieved August 28, 2017, from https://www. wikileaks.org/spyfiles/
Wikileaks. (2017). Vault 7: CIA Hacking Tools Revealed. Retrieved December 18, 2017, from https:// wikileaks.org/ciav7p1/
Los derechos de autor son propiedad inalienable de los autores, quienes son los propietarios irrestrictos de sus derechos de propiedad intelectual. El contenido de los artículos científicos y de las publicaciones que aparecen en la revista es responsabilidad exclusiva de sus autores. La distribución de los artículos publicados en la Revista de la Pontificia Universidad Católica del Ecuador PUCE se realiza bajo una licencia Creative Commons Reconocimiento-CompartirIgual 4.0 Internacional License.