Casos verificados de uso ilegítimo de software de vigilancia por parte de gobiernos de América Latina 2015-2016

  • Rafael Bonifaz Universidad de Buenos Aires, Buenos Aires, Argentina
  • Andrés Delgado-Ron Universidad de Buenos Aires, Buenos Aires, Argentina

Resumen

El presente artículo es una investigación bibliográfica y análisis exploratorio acerca de la vigilancia estatal en internet en América Latina. Describe los alcances de las capacidades de vigilancia gubernamental mediante el estudio de la documentación publicada por Edward Snowden y Wikileaks entre 2011 y 2017. Resume la presencia de la industria de vigilancia en América Latina y presenta cuatro casos de estudio sobre uso ilegítimo de software de espionaje y vigilancia en la región.

Citas

Ablon, L., Libicki, M. C., & Golay, A. a. (2014). Markets for Cybercrime Tools and Stolen Data. National Security Research Division, 1–85. https://doi.org/10.7249/j.ctt6wq7z6

Agencia AFP. (2015, December 22). Corte Suprema de Panamá ordena detención de expresidente Martinelli. Diario El Heraldo. Retrieved from http://www.elheraldo.hn/ mundo/913506-466/corte-suprema-de-panamá-ordena-detención-de-expresidente-martinelli

Albirini, A. (2008). The Internet in developing countries: a medium of economic, cultural and political domination. International Journal of Education and Development Using Information and Communication Technology (IJEDICT), 4(1), 49–65. Retrieved from http://ijedict.dec. uwi.edu//viewarticle.php?id=360

Ali, A., & Hudaib, Z. (2014). Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology, (8), 97–158.

Article 19, R3D, & SocialTIC. (2017). Gobierno Espía: Vigilancia sistemática a periodistas y defensores de derechos humanos en México. Retrieved from https://r3d.mx/ gobiernoespia

Arturo, Á. (2015). México, el principal cliente de una empresa que vende software para espiar. Animal Político. Animal Político. Retrieved from http://www. animalpolitico.com/2015/07/ empresa-de-hackers-exhibida-por-venta-de-software-espia-a-paises-represores-y-mexico-resulta-su-principal-cliente/

Barret, B. (2017). The Encryption Debate Should End Right Now. WIRED. Retrieved from https://www.wired.com/story/ encryption-backdoors-shadow-brokers-vault-7-wannacry/

Bonifaz, R. (2017). The NSA Surveillance Capabilities According to the Snowden Documents. In Actas del IX Congreso Iberoamericano de Seguridad Informática CIBSI2017. Buenos Aires: Facultad de Ingeniería, Universidad de Buenos Aires

Botello, N. A. (2015). Doing surveillance studies in Latin America: The insecurity context. Surveillance and Society, 13(1), 78–90.

Caldera, E., & Parraguez Kobek, L. (2016). Cyber Security and Habeas Data: The Latin American response to information security and data protection. OASIS, 0(24), 109–128. https://doi.org/http://dx.doi. org/10.18601/16577558.n24.07

Cox, J. (2016). Privacy Activists Launch Database to Track Global Sales of Surveillance Tech. VICE. Retrieved from https://motherboard. vice.com/en_us/article/qkjznm/ privacy-activists-launch-database-to-track-global-sales-of-surveillance-tech

Fidler, M. (2014). Anarchy or Regulation : Controlling the Global Trade in Zero-Day Vulnerabilities. Stanford University. Retrieved from http:// purl.stanford.edu/zs241cm7504

Gellman, B., & Poitras, L. (2013, June 7). U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program. The Washington Post. Retrieved from https://www.washingtonpost. com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845- d970ccb04497_story.html

Greenwald, G. (2014). No Place to Hide. Metropolitan Books.

Ilv. (2015). Hacking Team, Chile y Ecuador. Tor Project. Retrieved from https://web.archive.org/ web/20150924185925/https:// people.torproject.org/~ilv/ht_ chile_ecuador.html

Lee, M., Greenwald, G., & Marquis-Boire, M. (2015). BEHIND THE CURTAIN: A Look at the Inner Workings of NSA’s XKEYSCORE. Retrieved January 14, 2018, from https:// theintercept.com/2015/07/02/ look-under-hood-xkeyscore/

Maciel, M., Foditsch, N., Belli, L., & Castellon, N. (n.d.). Cyber security, privacy and trust. Trends in Latin America, 7–12. Retrieved from https:// bibliotecadigital.fgv.br/dspace/ bitstream/handle/10438/16706/ Cyber-Security%2C Privacy and Trust Trends in the Latin American and Caribbean region and the way forward.pdf

Marczak, B., Scott-Railton, J., Senft, A., Poetranto, I., & McKune, S. (2015). PAY NO ATTENTION TO THE SERVER BEHIND THE PROXY: Mapping FinFisher’s Continuing Proliferation. Retrieved from https://citizenlab.ca/2015/10/mapping-finfishers-continuing-proliferation/

Marczak, W. R., Scott-Railton, J., Marquis-Boire, M., & Paxson, V. (2014). When Governments Hack Opponents: A Look at Actors and Technology. Proceedings of the 23rd USENIX Security Symposium, 511– 525.

Pérez de Acha, G. (2016). Hacking Team Malware para la Vigilancia en Amé- rica Latina. Derechos Digitales.

Scott-Railton, J., & Marczak, B. (2016). THE MILLION DOLLAR DISSIDENT: NSO Group’s iPhone Zero-Days used against a UAE Human Rights Defender. Retrieved January 14, 2018, from https://citizenlab. ca/2016/08/million-dollar-dissident-iphone-zero-day-nsogroup-uae/

Scott-Railton, J., Marquis-Boire, M., Guarnieri, C., & Marschalek, M. (2015). PACKRAT: Seven Years of a South American Threat Actor. Retrieved January 14, 2018, from https:// citizenlab.ca/2015/12/packrat-report/

Setty, S. (2015). Surveillance, Secrecy, and the Search for Meaningful Accountability. Stanford Journal of International Law, 51(1), 69–103.

The ZMap Team. (2017). The Zmap Project. Retrieved from https://zmap. io/

Tinoco, T. (2015). Cyber ataque - parte 2. Quito, Ecuador: Ecuavisa. Retrieved from http://www.ecuavisa. com/video/video-vision-360/ destacados-360/cyber-ataque-parte-2-0

Wikileaks. (2011a). Strategic Telecommunication Network Monitoring. Retrieved October 29, 2017, from https://wikileaks.org/spyfiles/ docs/VASTECH_2011_StraTeleNetw_en.html

Wikileaks. (2011b). The Spy Files. Retrieved September 6, 2017, from https://wikileaks.org/the-spyfiles. html

Wikileaks. (2014). Spy Files. Retrieved August 28, 2017, from https://www. wikileaks.org/spyfiles/

Wikileaks. (2017). Vault 7: CIA Hacking Tools Revealed. Retrieved December 18, 2017, from https:// wikileaks.org/ciav7p1/

Publicado
2018-04-21
Sección
Ingeniería en Sistemas y Computación