SlideShare a Scribd company logo
1 of 25
Download to read offline
Report
Briefing for the
Italian Government
on Hacking Team’s
surveillance
exports
Introduction
Formorethanadecade,ItaliansurveillancecompanyHackingTeam hassoldinvasive
surveillancetechnologiesto law enforcementand intelligenceagenciesacrossthe
globe.1
Itsflagship product,the“RemoteControlSystem”(RCS),ismarketed by
HackingTeam asan“effective,easy-to-useoffensivetechnology”thatitprovidesto
“worldwide law enforcementand intelligence communities.”2
Hacking Team hasa
consistenttrackrecordofdeliveringitssoftware,includingtheRCS,togovernment
agencies with records ofhuman rights abuse and unlawfulsurveillance,and its
productshavebeenrepeatedlyusedtoconductunlawfulsurveillanceofjournalists,
activistsandhumanrightsdefenders.
Thisbriefing canvassesHacking Team'sproductsand customerbase.It'srelease
coincideswiththepublicationofnewevidence,uncoveredbyPrivacyInternational,and
anindependentinvestigationbyVICEMotherboard,thatHackingTeam hassoldits
RemoteControlSystem totheUnitedStatesArmyandtheDrugEnforcementAgency
(DEA).
Since2012,HackingTeamsoftwarehasbeenidentifiedandassociatedwithattackson
politicaldissidents,journalistsandhumanrightsdefenders,andevidencehasbeen
publishedconfirmingitssuspecteddeploymentinatleast21countries.However,when
presentedwithcompellingevidenceofthedeploymentofitsproductsbyhumanrights
abusinggovernments,HackingTeam hasconsistentlychosento'neitherconfirm nor
deny'allegations,ignoringdemandsfortransparencyaboutitscustomerbase,and
disregardingvictims'claimsforredressagainstoffenders.
Inpublishingthisbriefing,PrivacyInternationalconsolidatesforthefirsttimeresearch
on Hacking Team thatithas compiled overfouryears ofinvestigations and
campaigning.Thereleaseofthisbriefingisparticularlytimelyasitcomesonlymonths
afterEuropeanlawwasamendedtorestricttheexportofHackingTeam'sRCSproduct,
subjectingtheItaliancompanytostrictlicensingrequirementsdesignedtopreventits
invasivetechnologiesfromfallingintothewronghands.
1 http://www.hackingteam.it/index.php/about-us
2 http://www.hackingteam.it/index.php/about-us:http://www.hackingteam.it/index.php/remote-
control-system
Originsandgrowth
HackingTeam tracesitsbeginningsto2001,whentwoItaliancomputerprogrammers
createdtheEttercapprogramme,designedtofacilitateman-in-the-middleattack.3
The
ItalianPolicequicklyrealized theprogramme'spotentialforsurveillanceoperations
againstcommonencrypted communicationservicessuchasSkype,e-mail,instant
messaging,webcamsand computeraudio systems,4
andbecameoneofHacking
Team'sfirstcustomers.
Hacking Team hasbenefited considerablyfrom itsconnectionswith Italian public
authorities.Thecompanyreceivedover;1millioninpublicfinancingfromtheRegionof
Lombardy.5
Recently,theItaliangovernmenttabledlegislationdesignedtoexplicitly
empoweritsagenciestouseRemoteControlSystems.Thecounter-terrorism decree
wassubsequentlyblockedbyoppositioninParliament,butwouldhavebecomethefirst
Europeanlegislationpermittingtheuseofsuchsystemshaditbeenconvertedintolaw.6
Today,Hacking Team,lead by CEO David Vincenzetti,has over50 staff,and
subsidiariesinAnnapolis,United StatesofAmerica,and inSingapore.Itsellsits
servicesandproductstolawenforcementandintelligenceagenciesacrosstheglobe.7
Technologyandservices
Hacking Team'sflagship productisthe Remote ControlSystem software.In the
company'swords:
RCS (RemoteControlSystem)isasolutionthatsupportsinvestigationsby
activelyandpassivelytappingdataandinformationfromthedevicestargetedby
theinvestigations.Infact,TCSanonymously,creates,setsandinstallssoftware
agentsthatcollectdataand information,sending theresultsto thecentral
databasetobedecryptedandsaved.8
3 http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-
hack-into-computers
4 http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-
hack-into-computers:https://www.privacyinternational.org/?q=node/147
5 https://www.privacyinternational.org/?q=node/147
6 http://in.reuters.com/article/2015/03/26/italy-security-internet-idINKBN0MM24620150326
7 http://www.hackingteam.it/index.php/about-us:https://citizenlab.org/2014/02/mapping-hacking-
teams-untraceable-spyware/
8 https://s3.amazonaws.com/s3.documentcloud.org/documents/1348003/rcs-9-admin-final.pdf
ThetwomainRCSsystemscurrentlymarketedbyHackingTeamarethe“DaVinci”and
“Galileo” solutions.9
These products are intrusion technologies thatcan covertly
collect,modifyand/orextractdatafrom adevicethroughtheinstallationofmalicious
softwareonthedevice.Themalwareisinsertedonthecomputerasatrojan,ora
maliciouscodedisguisedininconspicuousfilesorattachments,andisexecutedonthe
device.Themaliciouscodecanrunoperationsinaclandestinemanneronthedevice,
makingitundetectablebytheusersofthedevice.10
These solutionsare capable ofbypassing encryption in common communications
servicessoftware,andofloggingSkypecalls,emails,instantmessaging,webbrowsing
records,deletedfilesandshotstakenfromthecomputer’sownwebcam.Thecompany
claimsthattheirproductnotonlyrelayswhatishappeningonatarget’scomputer,but
alsoenablessurveillanceofanythingoccurringwithintherangeofthecomputer’s
internalcameraormicrophone.HackingTeam alsoclaimstobeabletocompromise
computersrunningMacOSandWindows,inadditiontoarangeofsmartphones.11
The
malwareisdeliveredthroughman-in-the-middle-attacks,i.e.disguisedasrequeststo
commonupdates,andthroughsocialengineering,i.edisguisedasattachmentstoe-
mails.
Contributiontohumanrightsabuses
EvidencesuggeststhatHackingTeam'sRCS isoneofthemostpopularintrusion
technologiesonthemarket,andisusedwidelybycountrieswithpoorhumanrights
records.However,whenpresentedwithcompellingevidenceofthedeploymentofits
productsbyhumanrightsabusinggovernments,HackingTeamhasconsistentlychosen
to'neitherconfirm nordeny'allegations,ignoringdemandsfortransparencyaboutits
customerbase,anddisregardingvictims'claimsforredressagainstoffenders.
Since2012,HackingTeamsoftwarehasbeenidentifiedandassociatedwithattackson
politicaldissidents,journalistsandhumanrightsdefenders,andevidencehasbeen
publishedconfirmingitssuspecteddeploymentinatleast21governments,spanningsix
9 http://www.hackingteam.it/index.php/remote-control-system
10 https://www.privacyinternational.org/?q=node/73
11 http://www.cso.com.au/article/431882/_crisis_os_x_trojan_made_by_lawful_intercept_vendor_hackin
gteam/
contents.12
Itissuspected,however,thatHackingTeam'scustomerbaseisactually
muchlarger,andthecompany'sintelligencetoolsmaybeinuseinmorethan60
countries.13
CitizenLabattheUniversityofTorontohas,incooperationwithClaudioGuarnieri,
identifiedthefollowinggovernmentsassuspectedusers14
ofHackingTeamsoftware:
Azerbaijan Colombia Egypt Ethiopia
Hungary Italy Kazakhstan Malaysia
Mexico Morocco Nigeria Oman
Panama Poland SaudiArabia SouthKorea
Sudan Thailand Turkey UnitedArabEmirates
Uzbekistan
ThreeofHackingTeam'sclients–Uzbekistan,SaudiArabiaandSudan–arerankedas
“theworstoftheworst”intermsoffreedom,Freedom House's2015Freedom inthe
Worldindex.15
Anotherthreeoftheclients–Colombia,MexicoandTurkey–areonthe
CommitteefortheProtectionofJournalists“20DeadliestCountries”listinranking
attacksonjournalists.16
Additionally,severalofHackingTeam'sclientshaveahistoryof
humanrightsabuselinkedtosurveillanceandintelligencetechnologies,asdetailed
below.
Azerbaijan
CitizenLab“identifiedanRCSendpointinAzerbaijan(Azertelekom:109.235.193.83)
thatwasactivebetweenJuneandNovember2013.”17
AzerbaijanisoneoftheCentralAsianstateswiththemostserioushistoryofarresting
bloggers,andthoseusinginformationandcommunicationstechnologies.18
Freedom
HouseobservesthatAzerbaijaniauthoritiesrelyonsweepinginvestigatorypowersthat
12 ACitizenlabmapofhackingTeamproliferationisannexedtothisreport.SeeAnnexIII
https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/
13 http://www.wired.com/2014/06/remote-control-system-phone-surveillance/
14 https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/
15 https://freedomhouse.org/report/freedom-world/freedom-world-2015#.VSaUezvF8Yc
16 https://cpj.org/killed/
17 https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/
18 https://freedomhouse.org/report/freedom-net/2012/azerbaijan#.VSenQTvF8Yd
leavingsubstantialleewayforabuseofpowers:
“Thelaw “Onoperative-searchactivity”(Article10,sectionIV)authorizeslaw
enforcementagenciestoconductsurveillancewithoutacourtorderincases
regarded as necessary “to preventserious crimes againstthe person or
especiallydangerouscrimesagainstthestate.”Theunclearparametersforwhat
constitutespreventiveactionleavethelawopentoabuse.”19
Governmentagencies in Azerbaijan have increasingly invested in surveillance
technologies,whileimplementingmethodsofblanketsurveillanceonmobilephone
users,and consistentlytargeting foreignersand activistswithinvasivesurveillance
tools.20
Ethiopia
In2014,investigationsbyCitizenLabrevealedthatanindependentEthiopianmedia
outletintheUnitedStates,theEthiopianSatelliteTelevisionService,hadbeenattacked
withspywareonseveraloccasions.21
CitizenLabconcludedthattheattacktoobtain
“filesand passwords,and interceptSkypecallsand instantmessages”could be
attributedtotheuseofsoftware“soldexclusivelytogovernmentsbyMilan-based
HackingTeam.”22
BoththeresultsoftheinvestigationsandtheEthiopianGovernment's
previous conflicts with the Television Service indicate thatEthiopian intelligence
agenciesstagedtheattack,usingRCS.
Kazakhstan
RCStechnologyhasbeentracedtotelecommunicationscompanyJSC Kazakhtelecom
Slyzhebnyi.23
Inat2014report,HumanRightsWatchnotedthat“Kazakhstan’spoor
humanrightsrecordcontinuedtodeterioratein2013,”24
citingasacauseoverlybroad
lawsthatallow forthesuppressionoffreespeech,dissent,andfreedom ofassembly
andreligion.In2011,nationalunresttriggeredacrack-downfromsecurityforceswhere
civilsociety activists and prominentmembers ofthe politicalopposition were
19 https://freedomhouse.org/report/freedom-net/2012/azerbaijan#.VS5gfxOUdHg
20 Seealsohttps://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/#12
21 https://citizenlab.org/2014/02/hacking-team-targeting-ethiopian-journalists/;
https://citizenlab.org/2015/03/hacking-team-reloaded-us-based-ethiopian-journalists-targeted-
spyware/
22 https://citizenlab.org/2014/02/hacking-team-targeting-ethiopian-journalists/
23 https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/#12
24“HumanRightsWatchWorldReport2014”,HumanRightsWatch,2014,availableat
http://www.hrw.org/sites/default/files/wr2014_web_0.pdf
imprisoned.Oppositiongroupsandindependentmediaoutletsandjournalistswere
harassed,andoftenforcedtoclose.25
Tortureremainscommonplaceinthecountry.26
Asrecentlyas2014,testimoniesweresubmittedtotheUNCommitteeAgainstTorture,
allegingthatKazakhintelligenceagencieshaveperpetrated37countsofill-treatment
andcoercedtestimonies.27
Morocco
TheEconomist'sIntelligenceUnits2014DemocracyIndexclassifiesMoroccoasan
authoritarianregime.InarecentreportbyPrivacyInternational,Theireyesonme:
storiesofsurveillanceinMorocco,28
ithasbeenfoundthatMoroccohasaggressively
increaseditssurveillancecapacitysince2011.29
Thereportincludestestimoniesfrom
severaljournalistsandhumanrightsworkerswhohavebeensubjecttoattacksfrom
“hacking militias” thatare suspected to have connections with the Moroccan
intelligencecommunity.Asrecentlyas2012,the“Mamkfinch”websiteandGlobal
Voices(acitizenmediaplatform)staffweretargetedwithHackingTeamsoftware.30
UnitedArabEmirates
ReportersWithoutBordershasobservedthattheUAEhasbeenimplementinginternet
surveillance and censorship programs since 2008,31
underpinned by legislation
suppressingcommunications“'opposingIslam,''insultinganyreligionrecognisedby
thestate'or'contraveningfamilyvaluesandprinciples.'”32
Specifically,UAEuseofRCS
technologyhasbeentiedtothearrestofbloggerAhmadMansoorin2011oncharges
ofinsultingthePresidentandCrownPrince.33
25“AmnestyInternationalReport2013:Thestateoftheworld’shumanrights”,AmnestyInternational,
2013,availableat
http://files.amnesty.org/air13/AmnestyInternational_AnnualReport2013_complete_en.pdf
26“HumanRightsWatchWorldReport2014”,HumanRightsWatch,2014,availableat
http://www.hrw.org/sites/default/files/wr2014_web_0.pdf
27“Kazakhstan:SubmissiontotheUNCommitteeAgainstTorture”,HumanRightsWatch,October
2014,availableathttp://www.hrw.org/news/2014/10/20/kazakhstan-submission-un-committee-
against-torture
28https://www.privacyinternational.org/?q=node/554
29 https://www.privacyinternational.org/sites/default/files/Their%20Eyes%20on%20Me%20-
%20English_0.pdf
30 Pg16-19https://www.privacyinternational.org/sites/default/files/Their%20Eyes%20on%20Me%20-
%20English_0.pdf
31 http://en.rsf.org/surveillance-united-arab-emirates,39760.html
32 http://en.rsf.org/surveillance-united-arab-emirates,39760.html
33 https://citizenlab.org/2012/10/backdoors-are-forever-hacking-team-and-the-targeting-of-dissent/
Uzbekistan
DigitalforensicinvestigationssuggestthedeploymentofHackingTeamtechnologiesat
SarkorTelecom,inUzbekistan.34
NumerousjournalistsandactivistslivinginUzbekistanandoutsideofit,inexile,report
thattheircommunicationshave been monitored.Uzbekauthoritiesappearto be
monitoring phonescallsand emailsofUzbeksworking on whatstate authorities
perceive to be politically sensitive topics,often using transcripts ofprivate
communicationsincriminalproceedingsagainstthem.Insomecases,authoritiesalso
appeartohaveobtainedaccesstoVoIPcommunicationssuchasSkype.Whilethe
methodsandstoriesvary,theaccountsevidencethepolitically-motivatednatureof
surveillanceinUzbekistan.Humanrightsactivistsandjournalistsaretargetedwhere
theyareconsideredaviablethreattotheregime.35
PrivacyInternational'srecentreportPrivateInterests:MonitoringCentralAsia36
)details
testimoniesofindividualsthatsuggestthattheUzbekintelligencecommunityhas
targeted persons communicating human rights concerns to UN bodies and the
internationalhumanrightscommunityonnumerousoccasionssince2005.Aslateas
2013,Uzbekintelligenceagenciesspiedonprivateandconfidentialcommunications,
carriedoverencryptedSkypelinks,betweenfamiliesofarresteddissidentsandhuman
rightslawyers.37
SaudiArabia
CitizenLabhastracedtheuseofRCSsoftwareinSaudiArabiatoEtihadEtisalatand
Al-KhomasiaShipping&MaintenanceCoLtd.38
According to Freedom House,SaudiArabia has implemented surveillance and
censorshipprogrammesresultingin“notablepoliticalcensorship”.39
AFreedom House
reportnotes:
34 https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/#12
35 PG68-70https://www.privacyinternational.org/sites/default/files/Private%20Interests%20with%20annex_0.pdf
36 https://www.privacyinternational.org/?q=node/293
37 https://www.privacyinternational.org/sites/default/files/Private%20Interests%20with%20annex_0.pdf
38 https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/#12
39 https://freedomhouse.org/report/freedom-net/2012/saudi-arabia#.VSfPtzvF8Yc
“SurveillanceisrampantinSaudiArabia.Anyonewho usescommunication
technologyissubjecttogovernmentmonitoring,whichisofficiallyjustifiedunder
theauspicesofprotectingnationalsecurityandmaintainingsocialorder.The
authoritiesregularlymonitorwebsites,blogs,chatrooms,socialmediasites,and
thecontentofemailandmobilephonetextmessages.”40
Surveillancetechnologieshavealsobeenusedtoidentifyanddetainwomen'srights
activists.41
In 2014,Citizen Lab uncovered thatHacking Team malware had been
packagedwithnewsapplicationsaimedattheShiaminorityinSaudiArabia.42
Sudan
InvestigationsbyCitizenLabhastracedtheuseofRCSsoftwaretoVisionValleyin
Sudan.43
The Association forProgressive Communications has observed thatSudan uses
censorshipandsurveillancetechnologieswithanaimofsuppressingnon-Islamicnorms
and governmentopposition.44
Hacking Team technologieshavebeenused bythe
Sudanese Government's“CyberJihadistUnit” since 2011 to target“government
opponents,journalists,humanrightsactivistsandvariousyouthgroups.”45
ComplicityinpotentiallyunlawfulUSsurveillance
InvestigationsbyPrivacyInternational,publishedtodaybyVICE,revealthatHacking
Team hassolditsRemoteControlSystem totheDrugEnforcementAgencyandUS
militaryviaafrontcompanybasedintheUS.46
Recordsshow thatin 2011,a companycalled Cicom,with a registered address
identicalto thatatwhichHacking Team’sUS officeisregistered (1997Annapolis
ExchangeParkwaySuite30x),solda“RemoteControlSystem”,originatinginItaly,to
theUSArmyforUSD$350,000.47
40 https://freedomhouse.org/report/freedom-net/2012/saudi-arabia#.VSfPtzvF8Yc
41 https://freedomhouse.org/report/freedom-net/2012/saudi-arabia#.VSfPtzvF8Yc
42 https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/
43 https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/#12
44 http://www.apc.org/en/blog/online-surveillance-and-censorship-sudan
45 http://www.apc.org/en/blog/online-surveillance-and-censorship-sudan
46 https://www.fpds.gov/ezsearch/search.do?
indexName=awardfull&templateName=1.4.4&s=FPDSNG.COM&q=CICOM
47AnnexIV
Onlymonthslater,inMarch2012,theDEAreleasedacallfortenderfora“Remote
ControlHostBasedInterceptionSystem”:
“TheDEAisseekinginformationfrom potentialsourceswithafullyfunctional
andoperationalproductproventobecapableofprovidingaRemoteControl
HostBasedInterceptionSystemfordeviceortargetspecificcollectionpursuant
toauthorizedlawenforcementuse.”48
In August2012,the DEA's Office ofInvestigative Technology paid an initial
USD$575,000ofanAllOptionsValueofUSD$2,410,000toCicom,andhascontinued
to pay annualinstallments to the company.The mostrecentrecord shows a
transaction,effectiveinAugust2014and to becompleted inAugust2015,fora
“Remote ControlHostBased Interception System and supportservices”.49
The
transactionsareduetoendin2017.
ThetransferscomeinthewakeofrecentrevelationsoftheDEA'smasssurveillance
programme,throughwhichtheagencyhasbeencollectingandstoringthetelephone
recordsofordinaryAmericansformorethantwodecades.50
Itisnow clearthat,in
addition to such bulkcollection practices,the DEA also possessesthe technical
capacity to conductintrusive surveillance on individuals across the globe,using
HackingTeam'sproducts.Whetherlaw enforcementuseofintrusivesurveillanceis
lawfulintheUSisnotclear,assomecourtshaverefusedtoissuewarrantsauthorising
suchactivities.
Internalduediligence–isitenough?
Privacy Internationalbelieves thatunderno circumstances should Hacking Team
provideitsproductsandservicestogovernmentend-userswhenthereisalikelihood
thatthoseproductswillbeusedforunlawfulsurveillanceorotherhumanrightsabuses.
Norshould productssuch asthe RCS everbe deployed by,and thussold to,
governmentagenciesin the absence ofrigorouslegalframeworksand oversight
regimes.
48https://www.fbo.gov/index?
s=opportunity&mode=form&id=7eb60b154c178c5a0abd3d5dfbba2709&tab=core&_cview=0
49AnnexV
50 https://firstlook.org/theintercept/2015/04/08/dea-surveillance-phone-records-crisscross-nsa/
ExportofaproductliketheRCS totheUnitedStatesraisesanumberofcritical
questionsaboutthe role ofcompanieslike Hacking Team in facilitating unlawful
surveillance.Thereisunclearstatutoryauthorityauthorisingthedeploymentofspyware
byUSfederalorlaw enforcementagencies,meaningthatdeploymentoftheRCSby
theDEAortheArmyispotentiallyunlawfulunderUSlaw.Furthermore,becauseRCSis
designedtobeusableagainsttargetsevenwhiletheyareoutsideoftheend-user's
legaljurisdiction,itraisesseriouslegalquestionsconcerningtheabilityofUSagencies
andthemilitarytotargetindividualsbasedoutsideoftheUnitedStates.Companies'
internalduediligencepoliciesthatdonottakeintoaccountthattheircustomercannot
lawfullyusetheirproductsareinherentlyproblematic,andultimatelyinadequateto
properlypreventagainsthumanrightsviolations.
In its branding and communications materials,Hacking Team claims to have
understandingofthe“potentialforabuseofthesurveillancetechnologies”andasserts
thatitenforcesaprecautionaryapproachinmanagingitsservices.51
EricRabe,Hacking
Team'sChiefMarketingandCommunicationsOfficerhasassertedthatHackingTeam
goes“furtherthan anyothercompanyto addressthe concernsofhuman rights
organizationsandCitizenLabnotonlythroughourownpoliciesbutalsobycomplying
withinternationalstandardsincludingtheWassenaarArrangementprotocols.”52
TheHackingTeam CustomerPolicydetailsanumberofmeasures53
tominimizetherisk
ofhumanrightsabuse,includingconductingsalesreviewswitha“paneloftechnical
expertsandlegaladvisors”andmonitoringthehumanrightsrecordofpotentialclients;
implementing training thatallows Hacking Team employees identify “red flags”
according to the U.S.Commerce and Foreign Trade “Know YourCustomer”
Guidance;54
and inserting conditionalityclausesinsalesagreementsrequiring legal
compliancewithapplicablelaws.Nevertheless,theseinternalprocessesarenotby
themselvessufficienttopreventthesaleofinvasiveproductssuchastheRCS to
51 http://www.hackingteam.it/index.php/customer-policy
52 HackingTeamResponsetoCitizenLabReportofMarch9,2015:
http://www.hackingteam.it/index.php/about-us
53 ThecompleteCustomerPolicyisappendedtothisreport.SeealsoCustomerPolicy
http://www.hackingteam.it/index.php/customer-policy
54 http://www.ecfr.gov/cgi-bin/text-idx?
c=ecfr&sid=b598042103e95c10c396b0140e0620b7&rgn=div9&view=text&node=15:2.1.3.4.21.0.1.7.2
2&idno=15
governmentagencieswithahistoryofpotentiallyunlawfulsurveillance,nortostopthe
saleofsuchsystemstogovernmentswithgravehistoriesofhumanrightsabuse.Thus,
HackingTeam'sinternalduediligenceprocess,totheextenttheyexist,arewoefully
inadequatetoensurethatthecompanyisnotcomplicitinhumanrightsviolations.
Afirststep:regulationofexports
TheprofitmodelofcompaniessuchasHackingTeam istheprovisionofincrediblyin-
trusiveproductsandservicestolawenforcementandintelligenceagenciesacrossthe
world,whousethemforbothlegitimate,andunlawful,surveillanceoftheirpopulations.
Althoughthecompanyhasbasicinternalduediligencepolicies,thesepoliciesappear
nottohavepreventedtheexportofintrusiontechnologytosomeoftheworld'sworst
humanrightsabusers,andtogovernmentagencieswithhistoriesofunlawfulsurveil-
lance.Keytocontrollingtheproliferationofthistechnology,therefore,areregulations
whichrequirecompaniessuchasHackingTeam toobtainlicencespriortoexporting
theirproductsandservices.
AsanItaliancompany,HackingTeam’stechnologiesarenow subjecttoEuropean
Unionexportrestrictions.Asof1January2015,theEUDual-UseRegulation429/2008
restrictstheexportofintrusionsoftware,definedinamannerthatcapturestheRCS.
TheEUdevelopmentsaregroundedinagreementsmadeata2013conveningofStates
partiestotheWassenaarArrangement,anintergovernmentalexportcontrolregime
usedtodeterminewhichitemsshouldbesubjectedtoexportlicensingbyitsparticipat-
orystatesinordertofosterinternationalsecurity.55
Theinclusionofthecategoryrelating
tointrusionsoftwarewasinstigatedbytheUnitedKingdom in2012,aftercampaigning
byPrivacyInternationalandothers,motivatedbyincreasingevidencethatintrusion
technologieswere being exported to authoritarian stateswith poorhuman rights
recordsandbeingusedtotargetactivists.
AsofJanuary2015,HackingTeam hasasserteditsimmediatecompliancewiththeEU
regulation,andhasundertakentoseekauthorizationforexportsundertheItalianMin-
istryofEconomicDevelopment.56
However,althoughthetechnologyisnowsubjectto
55 http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2009:134:0001:0269:en:PDF
56 ThecompleteHackingteamnewsreleaseonitscompliancewithexportregimesisappendedtothis
report.Seealso:HackingTeamComplieswithWassenaarArrangementExportControlsonSurveillance
andLawEnforcement/IntelligenceGatheringToolshttp://www.hackingteam.it/index.php/about-us
licensing,itisincumbantontheItalianauthoritiestoappropriatelyassesswhetheror
notatransfershouldbeauthorised.Asafirststep,theauthoritiesshouldconsiderthe
eightcommoncriteriaforarmsexportsalreadyinplacewithintheEUcommonposition
onarmsexports.57
Inadditiontothis,theauthoritiesmustalsolookatthelegalframeworkwhichregulates
theuseofthetechnologyinquestioninthedestinationcountry,therecordoftheend-
userandhowitusesintelligence,aswellasthepotentialoftheproposedtechnologyto
beusedagainsttheprinciplesestablishedwithintheEuropeanCovenantonHuman
Rights.
Conclusion
HackingTeam'sRCSisoneofthemostwidelydocumentedandreportedsurveillance
technologiesonthemarket.Whilethecompanyhasrepeatedlystipulatedthatitre-
spectshumanrightsandhasinternalproceduresinplacetoensurethattheirproducts
arenotusedforhumanrightsviolations,itisnotenoughtorelyonself-regulation.The
impositionofeffectiveexportregulationswithappropriateandstronghumanrightspro-
visionsisanessentialstepinensuringthatthesaleofRCSandsimilartechnologyisac-
countable,moretransparent,andthatitultimatelydoesnotleadtohumanrightsab-
uses.
PrivacyInternationaliscurrentlysecretariatforaninternationalNGO campaign
callingforeffective,humanrights-based,exportcontrolstobeputintoplaceto
stopexportsofsurveillancetechnologywhichposeathreattofundamentalhu-
manrights.MoreinformationontheCoalitionAgainstUnlawfulSurveillanceEx-
portscanbefoundathttp://www.globalcause.net/.
57 http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2009:134:0001:0269:en:PDF
AnnexI:HackingTeam “CustomerPolicy”58
CustomerPolicy
SincewefoundedHackingTeam,wehaveunderstoodthepowerofoursoftwareinlaw
enforcementandintelligenceinvestigations.
Wealsounderstandthepotentialforabuseofthesurveillancetechnologiesthatwe
produce,andsowetakeanumberofprecautionstolimitthepotentialforthatabuse.
Weprovideoursoftwareonlytogovernmentsorgovernmentagencies.Wedonotsell
productstoindividualsorprivatebusinesses.
WefullycomplywithdualuseandexportcontrolscalledforinthenineteenthPlenary
meetingoftheWassenaarArrangement.
WedonotsellproductstogovernmentsortocountriesblacklistedbytheU.S.,E.U.,
U.N.,NATO orASEAN.
Wemonitortheinternationalgeopoliticalsituationandwereviewpotentialcustomers
beforeasaletodeterminewhetherornotthereisobjectiveevidenceorcredible
concernsthatHackingTeamtechnologyprovidedtothecustomerwillbeusedto
facilitatehumanrightsviolations.
Wehaveestablishedapaneloftechnicalexpertsandlegaladvisors,uniqueinour
industry,thatreviewspotentialsales.
Moreover,inHTcontracts,werequirecustomerstoabidebyapplicablelaw.We
reservetherightinourcontractstosuspendsupportforoursoftwareifwefindterms
ofourcontractsareviolated.IfwesuspendsupportforHTtechnology,theproduct
soonbecomesuseless.
Wewillrefusetoprovideorwewillstopsupportingourtechnologiestogovernmentsor
governmentagenciesthat:
• WebelievehaveusedHTtechnologytofacilitategrosshumanrightsabuses.
• Whorefusetoagreetoorcomplywithprovisionsinourcontractsthatdescribe
intendeduseofHTsoftware,orwhorefusetosigncontractsthatincluderequirements
thatHTsoftwarebeusedlawfully.
• Who refuse to acceptauditing features builtinto HT software thatallow
administratorstomonitorhowthesystemisbeingused.
HTpoliciesandproceduresareconsistentwiththeU.S.KnowYourCustomer
guidelines.Weconductongoingemployeetrainingtoassurethatemployeesknowand
understandtheprovisionsoftheseguidelines.
Shouldwediscover“redflags”describedintheseguidelineswhilenegotiatingasale,
wewillconductadetailedinquiryintothematterandraisetheissuewiththepotential
customer.Ifthe“redflags”cannotbereasonablyexplainedorjustified,wemay
suspendthetransaction.
58 http://www.hackingteam.it/index.php/customer-policy
Ourreviewwillinclude:
• StatementsmadebythepotentialcustomereithertoHTorelsewherethatreflect
thepotentialforabuse.
• Thepotentialcustomer'slaws,regulationsandpracticesregardingsurveillance
includingdueprocessrequirements.
• Crediblegovernmentornon-governmentreportsreflectingthatapotential
customercouldusesurveillancetechnologiestofacilitatehumanrightsabuses.
HackingTeamencouragesanyonewithinformationaboutapparentmisuseorabuseof
oursystemsandsolutionstopromptlyreportthatinformationtous
atinfo@hackingteam.comThise-mailaddressisbeingprotectedfromspambots.You
needJavaScriptenabledtoviewit.
HackingTeamhasestablishedaprocessofmonitoringnewsmedia,activistcommunity
blogsandotherInternetcommunication,andotheravailablesourcesforexpressed
concernsabouthumanrightsabusesbycustomersorpotentialcustomers.Should
questionsberaisedaboutthepossibleabuseofHTsoftwareinhumanrightscases,HT
willinvestigatetodeterminethefactstotheextentpossible.Ifwebelieveoneofour
customersmaybeinvolvedinanabuseofHTsoftware,wewillcontactthecustomeras
partofthisinvestigation.Basedontheresultsofsuchaninvestigation,HTwilltake
appropriateaction.
Annex II:Hacking Team News Release on Compliance with
WassenaarArrangementExportControls59
HackingTeam CompliesWithWassenaarArrangement
ExportControlsonSurveillanceandLawEnforcement/
IntelligenceGatheringTools
Milan,Italy(Feb.25,2015)HackingTeam,theworldleaderinprovidingstate-of-the-art
softwaretoolsforsurveillancetolawenforcementandintelligenceagencies,saidtoday
itiscomplyingfullywiththeexportcontrolscalledforinthenineteenthPlenarymeeting
oftheWassenaarArrangement.Noothercompanyinthelawfulsurveillanceindustry
hasmadethiscommitment.
Theseexportcontrolsaredesignedtoassurethatonlyappropriategovernmentsor
governmentagenciesareabletousesurveillancesoftwareandthattheuseofthe
softwareinnowaythreatensinternationalorregionalsecurityorstability.
OnJanuary1,2015,theEuropeanUnion(E.U.)implementedtheWassenaarguidance
andapplicabledualuselegislation.HackingTeaminstitutedthenewprocedures
immediately.
“Wedesignedoursystemtobeusedtofightcrimeandterrorismandwewantittobe
usedforthatpurpose,”saidDavidVincenzetti,CEO ofHackingTeam.“Criminalsand
terroristsaroundtheworldroutinelyusemobilephones,mobiledevices,computers,
andtheInternettocommithorrificcrimesandterrorism.WithoutHTtechnologylaw
enforcementisblindtothisactivity.”
“Wearenowthefirstinourindustrytocomplywiththeselatestinternationallaws,and
wearedoingsobecausewearecommittedtoassuringthatourproductsarenot
misused,”Vincenzettisaid.
UndertheproceduresagreedtobyHackingTeamandtheItalianMinistryofEconomic
Development,HTwillrequestfromtheItalianGovernmentexportauthorizationforits
technologies.
Previoustothisregulation,thecompanyhadalreadyinstitutedinternalcontrolsand
procedurestoassureitssoftwareisnotabused.TheWassenaarprotocolsadd
additionalinsurancethatHackingTeamtechnologiesareonlyprovidedtoandusedby
appropriateagenciesandgovernments.
Sinceitsfounding,HackingTeamhasrecognizedthepowerofitstoolsthatallowlaw
enforcementagenciestomonitorcomputertraffic,mobilephoneandothersimilar
communications.Thecompanyvoluntarilyinstitutedacustomerpolicypublishedon
thehackingteam.comwebsitetoassurethatitstoolswerenotabused.
HackingTeamhasalsocommittedtoabidingbyinternationalblacklistsandother
guidelinessothatitssurveillancesystemisnotsoldtostatesorstateagenciesthat
mightabuseit.
59 http://www.hackingteam.it/index.php/about-us
Forfurtherinformation:
EricRabe
ChiefMarketingandCommunicationsOfficer
HackingTeam
215-839-6639
e.rabe@hackingteam.comThise-mailaddressisbeingprotectedfromspambots.You
needJavaScriptenabledtoviewit
AnnexIII:MapofHackingTeam SoftwareProliferation60
60 https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/
4/7/2015 FPDS-NG : ICDUSER [ Award ]
https://www.fpds.gov/common/jsp/LaunchWebPage.jsp?command=execute&requestid=58233081&version=1.4 1/2
                          
Transaction  Information
Award  Type: Purchase  Order   Prepared  Date: 03/31/2011  07:16:28   Prepared  User: SHAWN.M.SMITH4.W911W4@MI.ARMY.MIL
Award  Status: Final   Last  Modified  Date: 03/31/2011  15:20:09   Last  Modified  User: RANDY.DREYER.W911W4@MI.ARMY.MIL
Document  Information
Agency Procurement  Identifier Modification  No Trans  No
Award  ID: 9700 W911W411P0055 0 0
Referenced  IDV  ID:
Reason  For  Modification:
Solicitation  ID: W911W411T0107
Agency
Identifier
Main
Account
Sub
Account
Initiative
Treasury  Account  Symbol: Select  One
Dates Amounts
Date  Signed  (mm/dd/yyyy)  : 03/31/2011
Effective  Date  (mm/dd/yyyy)  : 03/31/2011
Completion  Date  (mm/dd/yyyy)  : 04/30/2011
Est.  Ultimate  Completion  Date  (mm/dd/yyyy)  : 04/30/2011
Action  Obligation: $350,000.00
Base  And  Exercised  Options  Value: $350,000.00
Base  And  All  Options  Value: $350,000.00
Fee  Paid  for  Use  of  IDV: $0.00
Purchaser  Information
Contracting  Office  Agency  ID: 2100 Contracting  Office  Agency  Name: DEPT OF THE ARMY
Contracting  Office  ID: W911W4 Contracting  Office  Name: W00Y CONTR OFC DODAAC
Funding  Agency  ID: 2100 Funding  Agency  Name: DEPT OF THE ARMY
Funding  Office  ID: W23BFK Funding  Office  Name: W4VY INSCOM MISSION SPT CMD
Foreign  Funding: Not  Applicable
Contractor  Information
SAM
Exception:
  
DUNS  No: 963322842
Vendor  Name: CICOM USA, LLC
DBAN:
Street: 1997 ANNAPOLIS EXCHANGE PKWY STE 30
Street2:
City: ANNAPOLIS
State: MD   Zip:   214013271
Country: UNITED STATES
Phone: (443) 949-7470
Fax  No: (443) 949-7471
Congressional  
District:
MARYLAND 03
Business  Category
Organization  Type:    PARTNERSHIP
Number  of  Employees:    3
State  of  Incorporation:   
Country  of  Incorporation:   
Annual  Revenue:    $3,000,000
  
Business  Types
Partnership  or  Limited  Liability  Partnership
Socio  Economic  Data
Minority  Owned  Business
Hispanic  American  Owned
Line  Of  Business
Educational  Institution
Hispanic  Servicing  Institution
Relationship  With  Federal  Government
Both  (Contracts  and  Grants)
Organization  Factors
For  Profit  Organization
Limited  Liability  Corporation
Certifications
DoT  Certified  Disadvantaged  Business  Enterprise
Contract  Data
Type  of  Contract: Firm  Fixed  Price
Multiyear  Contract: Select  One
Major  Program:
National  Interest  Action: None
Cost  Or  Pricing  Data: Select  One
Purchase  Card  Used  As  Payment  Method: No
Undefinitized  Action: No
Performance  Based  Service  Acquisition:  
*  FY  2004  and  prior;;  80%  or  more  specified  as  performance  requirement  
Not  Applicable
Annex IV
4/7/2015 FPDS-NG : ICDUSER [ Award ]
https://www.fpds.gov/common/jsp/LaunchWebPage.jsp?command=execute&requestid=58233081&version=1.4 2/2
*  FY  2005  and  later;;  50%  or  more  specified  as  performance  requirement
Contingency  Humanitarian  Peacekeeping  Operation: Not  Applicable
Contract  Financing: Not  Applicable
Cost  Accounting  Standards  Clause: Select  One
Consolidated  Contract: No
Number  Of  Actions: 1
Legislative  Mandates Principal  Place  of  Performance
Clinger-­Cohen  Act: No
Service  Contract  Act: No
Walsh-­Healey  Act: No
Davis  Bacon  Act: No
Interagency  Contracting  Authority: Not  Applicable
Other  Interagency  Contracting  Statutory  Authority:  
(1000  characters)
Principal  Place  Of  Performance  Code:
State Location Country
MD USA
Principal  Place  Of  Performance  County  Name: ANNE ARUNDEL
Principal  Place  Of  Performance  City  Name: ANNAPOLIS
Congressional  District  Place  Of  Performance: 03
Place  Of  Performance  Zip  Code(+4): 21401   -­   3271   USPS  ZIP  Codes
Product  Or  Service  Information
Product/Service  Code: 7030 Description: ADP SOFTWARE
Principal  NAICS  Code: 541512 Description: COMPUTER SYSTEMS DESIGN SERVICES
Bundled  Contract: Not  a  bundled  requirement
System  Equipment  Code: 000 Description: NONE
Country  of  Product  or  Service  Origin: ITA ITALY
Place  of  Manufacture: Mfg  outside  U.S.  -­  Qualifying  country  (DoD  only)
Domestic  or  Foreign  Entity: Foreign-­Owned  Business  Not  Incorporated  in  the  U.S.
Recovered  Materials/Sustainability: No  Clauses  Included  and  No  Sustainability  Included OMB  Policy  on  Sustainable  Acquisition
InfoTech  Commercial  Item  Category: Commercially  Available
Claimant  Program  Code: C9E Description: ALL OTHERS NOT IDENTIFIABLE TO ANY OTHER PROCUREMENT PROGRAM
Sea  Transportation: No
GFE/GFP  Provided  Under  This  Action: Transaction  does  not  use  GFE/GFP
Use  Of  EPA  Designated  Products: Meets  Requirements
Description  Of  Requirement:  
(4000  characters) REMOTE CONTROL SYSTEM
Competition  Information
Extent  Competed  For  Referenced  IDV:
Extent  Competed: Not  Competed
Solicitation  Procedures: Only  One  Source
Type  Of  Set  Aside: No  set  aside  used.
Evaluated  Preference: No  Preference  used
SBIR/STTR: Select  One
Fair  Opportunity/Limited  Sources: Select  One
Other  Than  Full  And  Open  Competition: National  Security  (FAR  6.302-­6)
Local  Area  Set  Aside: No
FedBizOpps: Yes
A76  Action: No
Commercial  Item  Acquisition  Procedures: Commercial  Item
Number  Of  Offers  Received: 1
Small  Business  Competitiveness  Demonstration  Program:
Commercial  Item  Test  Program: No
Preference  Programs  /  Other  Data
Contracting  Officer's  Business  Size  Selection: Small  Business
Subcontract  Plan: Plan  Not  Required
Price  Evaluation  Percent  Difference: %
4/7/2015 FPDS-NG : ICDUSER [ Award ]
https://www.fpds.gov/common/jsp/LaunchWebPage.jsp?command=execute&requestid=58233171&version=1.4 1/3
                          
Transaction  Information
Award  Type: Definitive  Contract   Prepared  Date: 09/09/2014  14:08:40   Prepared  User: JCGIRARD
Award  Status: Final   Last  Modified  Date: 10/02/2014  08:10:25   Last  Modified  User: JCGIRARD
Document  Information
Agency Procurement  Identifier Modification  No Trans  No
Award  ID: 1524 DJD12C0033 6 0
Referenced  IDV  ID:
Reason  For  Modification: EXERCISE AN OPTION
Solicitation  ID:
Agency
Identifier
Main
Account
Sub
Account
Initiative
Treasury  Account  Symbol: 15 1100 000 Select  One
Dates Amounts
Date  Signed  (mm/dd/yyyy)  : 09/09/2014
Effective  Date  (mm/dd/yyyy)  : 08/29/2014
Completion  Date  (mm/dd/yyyy)  : 08/26/2015
Est.  Ultimate  Completion  Date  (mm/dd/yyyy)  : 08/26/2015
Current Total
Action  Obligation: $140,000.00 $927,000.00
Base  And  Exercised  Options  Value: -$20,000.00 $1,952,000.00
Base  And  All  Options  Value: $25,000.00 $2,457,000.00
Fee  Paid  for  Use  of  IDV: $0.00
Purchaser  Information
Contracting  Office  Agency  ID: 1524 Contracting  Office  Agency  Name: DRUG ENFORCEMENT ADMINISTRATION
Contracting  Office  ID: DEAHQ Contracting  Office  Name: HEADQUARTERS-DRUG ENFORCEMENT ADMINISTRATION
Funding  Agency  ID: 1524 Funding  Agency  Name: DRUG ENFORCEMENT ADMINISTRATION
Funding  Office  ID: DEAST Funding  Office  Name: LABORATORY-SPECIAL TESTING
Foreign  Funding: Not  Applicable
Contractor  Information
SAM
Exception:
  
DUNS  No: 963322842
Vendor  Name: CICOM USA, LLC
DBAN:
Street: 1997 ANNAPOLIS EXCHANGE PKWY STE 30
Street2:
City: ANNAPOLIS
State: MD   Zip:   214013271
Country: UNITED STATES
Phone: (443) 949-7470
Fax  No: (443) 949-7471
Congressional  
District:
MARYLAND 03
Business  Category
Organization  Type:    OTHER
Number  of  Employees:    3
State  of  Incorporation:   
Country  of  Incorporation:   
Annual  Revenue:    $3,000,000
  
Socio  Economic  Data
Minority  Owned  Business
Hispanic  American  Owned
Line  Of  Business
Educational  Institution
Hispanic  Servicing  Institution
Relationship  With  Federal  Government
Both  (Contracts  and  Grants)
Organization  Factors
For  Profit  Organization
Limited  Liability  Corporation
Certifications
DoT  Certified  Disadvantaged  Business  Enterprise
Self-­Certified  Small  Disadvantaged  Business
Contract  Data
Type  of  Contract: Firm  Fixed  Price
Multiyear  Contract: Yes
Major  Program:
National  Interest  Action:
None
Cost  Or  Pricing  Data: No
Purchase  Card  Used  As  Payment  Method: No
Undefinitized  Action: No
Performance  Based  Service  Acquisition:  
*  FY  2004  and  prior;;  80%  or  more  specified  as  performance  requirement  
Not  Applicable
Annex V
4/7/2015 FPDS-NG : ICDUSER [ Award ]
https://www.fpds.gov/common/jsp/LaunchWebPage.jsp?command=execute&requestid=58233171&version=1.4 2/3
*  FY  2005  and  later;;  50%  or  more  specified  as  performance  requirement
Contingency  Humanitarian  Peacekeeping  Operation: Not  Applicable
Contract  Financing: Select  One
Cost  Accounting  Standards  Clause: Not  Applicable  exempt  from  CAS
Consolidated  Contract: No
Number  Of  Actions: 1
Legislative  Mandates Principal  Place  of  Performance
Clinger-­Cohen  Act: No
Service  Contract  Act: Not  Applicable
Walsh-­Healey  Act: Not  Applicable
Davis  Bacon  Act: Not  Applicable
Interagency  Contracting  Authority: Not  Applicable
Other  Interagency  Contracting  Statutory  Authority:  
(1000  characters)
Principal  Place  Of  Performance  Code:
State Location Country
VA USA
Principal  Place  Of  Performance  County  Name: FAIRFAX
Principal  Place  Of  Performance  City  Name: LORTON
Congressional  District  Place  Of  Performance: 08
Place  Of  Performance  Zip  Code(+4): 22079   -­   1447   USPS  ZIP  Codes
Product  Or  Service  Information
Product/Service  Code: 7010 Description: ADPE SYSTEM CONFIGURATION
Principal  NAICS  Code: 334290 Description: OTHER COMMUNICATIONS EQUIPMENT MANUFACTURING
Bundled  Contract: Not  a  bundled  requirement
System  Equipment  Code: Description:
Country  of  Product  or  Service  Origin: USA UNITED STATES
Place  of  Manufacture: Mfg  in  U.S.
Domestic  or  Foreign  Entity: U.S.  Owned  Business
Recovered  Materials/Sustainability: No  Clauses  Included  and  No  Sustainability  Included OMB  Policy  on  Sustainable  Acquisition
InfoTech  Commercial  Item  Category: Select  One
Claimant  Program  Code: Description:
Sea  Transportation: Select  One
GFE/GFP  Provided  Under  This  Action: Transaction  does  not  use  GFE/GFP
Use  Of  EPA  Designated  Products: Not  Required
Description  Of  Requirement:  
(4000  characters) IGF::CL::IGF
Remote Control Host Based Interception Systems and support services
Competition  Information
Extent  Competed  For  Referenced  IDV:
Extent  Competed: Not  Competed
Solicitation  Procedures: Only  One  Source
Type  Of  Set  Aside: No  set  aside  used.
Evaluated  Preference: No  Preference  used
SBIR/STTR: Select  One
Fair  Opportunity/Limited  Sources: Select  One
Other  Than  Full  And  Open  Competition: Only  One  Source-­Other  (FAR  6.302-­1  other)
Local  Area  Set  Aside: No
FedBizOpps: Yes
A76  Action: No
Commercial  Item  Acquisition  Procedures: Commercial  Item
Number  Of  Offers  Received: 1
Small  Business  Competitiveness  Demonstration  Program:
Commercial  Item  Test  Program: No
Preference  Programs  /  Other  Data
Contracting  Officer's  Business  Size  Selection: Small  Business
Subcontract  Plan: Plan  Not  Required
Price  Evaluation  Percent  Difference: 0 %
4/7/2015 FPDS-NG : ICDUSER [ Award ]
https://www.fpds.gov/common/jsp/LaunchWebPage.jsp?command=execute&requestid=58233171&version=1.4 3/3
4/9/2015 FPDS-NG : ICDUSER [ Award ]
https://www.fpds.gov/common/jsp/LaunchWebPage.jsp?command=execute&requestid=58282777&version=1.4 1/2
                          
Transaction  Information
Award  Type: Definitive  Contract   Prepared  Date: 08/30/2012  12:29:56   Prepared  User: GXSHABNAM
Award  Status: Final   Last  Modified  Date: 09/06/2012  09:25:13   Last  Modified  User: GXSHABNAM
Document  Information
Agency Procurement  Identifier Modification  No Trans  No
Award  ID: 1524 DJD12C0033 0 0
Referenced  IDV  ID:
Reason  For  Modification:
Solicitation  ID:
Agency
Identifier
Main
Account
Sub
Account
Initiative
Treasury  Account  Symbol: 15 1100 Select  One
Dates Amounts
Date  Signed  (mm/dd/yyyy)  : 08/20/2012
Effective  Date  (mm/dd/yyyy)  : 08/17/2012
Completion  Date  (mm/dd/yyyy)  : 08/26/2013
Est.  Ultimate  Completion  Date  (mm/dd/yyyy)  : 08/26/2017
Action  Obligation: $575,000.00
Base  And  Exercised  Options  Value: $1,950,000.00
Base  And  All  Options  Value: $2,410,000.00
Fee  Paid  for  Use  of  IDV: $0.00
Purchaser  Information
Contracting  Office  Agency  ID: 1524 Contracting  Office  Agency  Name: DRUG ENFORCEMENT ADMINISTRATION
Contracting  Office  ID: DEAIT Contracting  Office  Name: OFFICE-INVESTIGATIVE TECHNOLOGY
Funding  Agency  ID: 1524 Funding  Agency  Name: DRUG ENFORCEMENT ADMINISTRATION
Funding  Office  ID: DEAIT Funding  Office  Name: OFFICE-INVESTIGATIVE TECHNOLOGY
Foreign  Funding: Not  Applicable
Contractor  Information
SAM
Exception:
  
DUNS  No: 963322842
Vendor  Name: CICOM USA, LLC
DBAN:
Street: 1997 ANNAPOLIS EXCHANGE PKWY STE 30
Street2:
City: ANNAPOLIS
State: MD   Zip:   214013271
Country: UNITED STATES
Phone: (443) 949-7470
Fax  No: (443) 949-7471
Congressional  
District:
MARYLAND 03
Business  Category
Organization  Type:    OTHER
Number  of  Employees:    3
State  of  Incorporation:   
Country  of  Incorporation:   
Annual  Revenue:    $3,000,000
  
Socio  Economic  Data
Minority  Owned  Business
Hispanic  American  Owned
Line  Of  Business
Educational  Institution
Hispanic  Servicing  Institution
Relationship  With  Federal  Government
Both  (Contracts  and  Grants)
Organization  Factors
For  Profit  Organization
Limited  Liability  Corporation
Certifications
DoT  Certified  Disadvantaged  Business  Enterprise
Self-­Certified  Small  Disadvantaged  Business
Contract  Data
Type  of  Contract: Firm  Fixed  Price
Multiyear  Contract: Yes
Major  Program:
National  Interest  Action: None
Cost  Or  Pricing  Data: No
Purchase  Card  Used  As  Payment  Method: No
Undefinitized  Action: No
Performance  Based  Service  Acquisition:  
*  FY  2004  and  prior;;  80%  or  more  specified  as  performance  requirement  
*  FY  2005  and  later;;  50%  or  more  specified  as  performance  requirement
Not  Applicable
Contingency  Humanitarian  Peacekeeping  Operation: Not  Applicable
4/9/2015 FPDS-NG : ICDUSER [ Award ]
https://www.fpds.gov/common/jsp/LaunchWebPage.jsp?command=execute&requestid=58282777&version=1.4 2/2
Contract  Financing: Select  One
Cost  Accounting  Standards  Clause: Not  Applicable  exempt  from  CAS
Consolidated  Contract: No
Number  Of  Actions: 1
Legislative  Mandates Principal  Place  of  Performance
Clinger-­Cohen  Act: No
Service  Contract  Act: Not  Applicable
Walsh-­Healey  Act: Not  Applicable
Davis  Bacon  Act: Not  Applicable
Interagency  Contracting  Authority: Not  Applicable
Other  Interagency  Contracting  Statutory  Authority:  
(1000  characters)
Principal  Place  Of  Performance  Code:
State Location Country
VA USA
Principal  Place  Of  Performance  County  Name: FAIRFAX
Principal  Place  Of  Performance  City  Name: LORTON
Congressional  District  Place  Of  Performance: 08
Place  Of  Performance  Zip  Code(+4): 22079   -­   1447   USPS  ZIP  Codes
Product  Or  Service  Information
Product/Service  Code: 7010 Description: ADPE SYSTEM CONFIGURATION
Principal  NAICS  Code: 334290 Description: OTHER COMMUNICATIONS EQUIPMENT MANUFACTURING
Bundled  Contract: Not  a  bundled  requirement
System  Equipment  Code: Description:
Country  of  Product  or  Service  Origin: USA UNITED STATES
Place  of  Manufacture: Mfg  in  U.S.
Domestic  or  Foreign  Entity: U.S.  Owned  Business
Recovered  Materials/Sustainability: No  Clauses  Included  and  No  Sustainability  Included OMB  Policy  on  Sustainable  Acquisition
InfoTech  Commercial  Item  Category: Select  One
Claimant  Program  Code: Description:
Sea  Transportation: Select  One
GFE/GFP  Provided  Under  This  Action: Transaction  does  not  use  GFE/GFP
Use  Of  EPA  Designated  Products: Not  Required
Description  Of  Requirement:  
(4000  characters) Critical Functions: Software
Competition  Information
Extent  Competed  For  Referenced  IDV:
Extent  Competed: Not  Competed
Solicitation  Procedures: Only  One  Source
Type  Of  Set  Aside: No  set  aside  used.
Evaluated  Preference: No  Preference  used
SBIR/STTR: Select  One
Fair  Opportunity/Limited  Sources: Select  One
Other  Than  Full  And  Open  Competition: Only  One  Source-­Other  (FAR  6.302-­1  other)
Local  Area  Set  Aside: No
FedBizOpps: Yes
A76  Action: No
Commercial  Item  Acquisition  Procedures: Commercial  Item
Number  Of  Offers  Received: 1
Small  Business  Competitiveness  Demonstration  Program:
Commercial  Item  Test  Program: No
Preference  Programs  /  Other  Data
Contracting  Officer's  Business  Size  Selection: Small  Business
Subcontract  Plan: Plan  Not  Required
Price  Evaluation  Percent  Difference: 0 %

More Related Content

Similar to Briefing for the italian government on hacking team's surveillance exports

Hi-Tech Crime Trends 2015
Hi-Tech Crime Trends 2015Hi-Tech Crime Trends 2015
Hi-Tech Crime Trends 2015
Group-IB
 
Organised Crime in the Digital Age
Organised Crime in the Digital AgeOrganised Crime in the Digital Age
Organised Crime in the Digital Age
YogeshIJTSRD
 
ppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptxppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptx
jmiham
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
Ed Alcantara
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
Ed Alcantara
 
A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
A Study on Honeypots and Deceiving Attacker using Modern Honeypot NetworkA Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
ijtsrd
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
Asish Verma
 
targeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-septtargeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-sept
*****Dominic A Ienco
 

Similar to Briefing for the italian government on hacking team's surveillance exports (20)

Hi-Tech Crime Trends 2015
Hi-Tech Crime Trends 2015Hi-Tech Crime Trends 2015
Hi-Tech Crime Trends 2015
 
Organised Crime in the Digital Age
Organised Crime in the Digital AgeOrganised Crime in the Digital Age
Organised Crime in the Digital Age
 
ppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptxppt_deck_cybersecurity_for_Everyone.pptx
ppt_deck_cybersecurity_for_Everyone.pptx
 
ITrust Company Overview EN
ITrust Company Overview ENITrust Company Overview EN
ITrust Company Overview EN
 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
 
Forensics Expo, London 2015
Forensics Expo, London  2015Forensics Expo, London  2015
Forensics Expo, London 2015
 
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs,  PATCH Act, & Wan...Open Source Insight: Artifex Ruling, NY Cybersecurity Regs,  PATCH Act, & Wan...
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
Why Organisations Need_Barac
Why Organisations Need_BaracWhy Organisations Need_Barac
Why Organisations Need_Barac
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet
 
Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017Matt LaVigna - Cyber Security - NCFTA 2017
Matt LaVigna - Cyber Security - NCFTA 2017
 
Cyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis CenterCyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis Center
 
223 - Computer ethics
223 - Computer ethics223 - Computer ethics
223 - Computer ethics
 
Trustless Computing Initiative
Trustless Computing InitiativeTrustless Computing Initiative
Trustless Computing Initiative
 
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
ASFWS 2013 - Critical Infrastructures in the Age of Cyber Insecurity par Andr...
 
A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
A Study on Honeypots and Deceiving Attacker using Modern Honeypot NetworkA Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016
 
targeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-septtargeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-sept
 

More from Luca Rinaldi

More from Luca Rinaldi (20)

Esito Asta Aler Milano del 9 maggio 2024
Esito Asta Aler Milano del 9 maggio 2024Esito Asta Aler Milano del 9 maggio 2024
Esito Asta Aler Milano del 9 maggio 2024
 
Sostegno alla vita e alle donne in stato di fragilità
Sostegno alla vita e alle donne in stato di fragilitàSostegno alla vita e alle donne in stato di fragilità
Sostegno alla vita e alle donne in stato di fragilità
 
Delibera ospedali comunità Regione Lombardia
Delibera ospedali comunità Regione LombardiaDelibera ospedali comunità Regione Lombardia
Delibera ospedali comunità Regione Lombardia
 
La proposta di legge sul fine vita dell'Associazione Luca Coscioni
La proposta di legge sul fine vita dell'Associazione Luca CoscioniLa proposta di legge sul fine vita dell'Associazione Luca Coscioni
La proposta di legge sul fine vita dell'Associazione Luca Coscioni
 
Il bollettino settimanale del mercato ortofrutticolo di Milano
Il bollettino settimanale del mercato ortofrutticolo di MilanoIl bollettino settimanale del mercato ortofrutticolo di Milano
Il bollettino settimanale del mercato ortofrutticolo di Milano
 
I prezzi al consumo a Milano
I prezzi al consumo a MilanoI prezzi al consumo a Milano
I prezzi al consumo a Milano
 
Delibera AGCM Balocco-Ferragni
Delibera AGCM Balocco-FerragniDelibera AGCM Balocco-Ferragni
Delibera AGCM Balocco-Ferragni
 
Terza Relazione Periodica - primo semestre 2023
Terza Relazione Periodica - primo semestre 2023Terza Relazione Periodica - primo semestre 2023
Terza Relazione Periodica - primo semestre 2023
 
Deliberazione XII/295 Regione Lombardia
Deliberazione XII/295 Regione LombardiaDeliberazione XII/295 Regione Lombardia
Deliberazione XII/295 Regione Lombardia
 
bilancio-preventivo-comune-milano-sintesi-spese-missione.pdf
bilancio-preventivo-comune-milano-sintesi-spese-missione.pdfbilancio-preventivo-comune-milano-sintesi-spese-missione.pdf
bilancio-preventivo-comune-milano-sintesi-spese-missione.pdf
 
La relazione sul carcere di Opera della Camera Penale di Milano
La relazione sul carcere di Opera della Camera Penale di MilanoLa relazione sul carcere di Opera della Camera Penale di Milano
La relazione sul carcere di Opera della Camera Penale di Milano
 
La risoluzione approvata il 5 luglio 2016
La risoluzione approvata il 5 luglio 2016La risoluzione approvata il 5 luglio 2016
La risoluzione approvata il 5 luglio 2016
 
Il sondaggio BiDiMedia/Today sulle elezioni Regionali 2023 Lombardia
Il sondaggio BiDiMedia/Today sulle elezioni Regionali 2023 LombardiaIl sondaggio BiDiMedia/Today sulle elezioni Regionali 2023 Lombardia
Il sondaggio BiDiMedia/Today sulle elezioni Regionali 2023 Lombardia
 
Monitoraggio prima attuazione riforma sanità Lombardia 2021
Monitoraggio prima attuazione riforma sanità Lombardia 2021Monitoraggio prima attuazione riforma sanità Lombardia 2021
Monitoraggio prima attuazione riforma sanità Lombardia 2021
 
Delibera Corte dei conti n. 35 del 2018.pdf
Delibera Corte dei conti n. 35 del 2018.pdfDelibera Corte dei conti n. 35 del 2018.pdf
Delibera Corte dei conti n. 35 del 2018.pdf
 
Erogazioni a Fratelli d'Italia dal 1 gennaio 2022
Erogazioni a Fratelli d'Italia dal 1 gennaio 2022Erogazioni a Fratelli d'Italia dal 1 gennaio 2022
Erogazioni a Fratelli d'Italia dal 1 gennaio 2022
 
Erogazioni ai partiti e ai movimenti politici iscritti nel registro nazionale
Erogazioni ai partiti e ai movimenti politici iscritti nel registro nazionaleErogazioni ai partiti e ai movimenti politici iscritti nel registro nazionale
Erogazioni ai partiti e ai movimenti politici iscritti nel registro nazionale
 
Piano interventi Milano-Cortina 2026
Piano interventi Milano-Cortina 2026Piano interventi Milano-Cortina 2026
Piano interventi Milano-Cortina 2026
 
PEBA comune di Milano
PEBA comune di MilanoPEBA comune di Milano
PEBA comune di Milano
 
Piano degli interventi, concernente le opere relative ai Giochi, predisposto ...
Piano degli interventi, concernente le opere relative ai Giochi, predisposto ...Piano degli interventi, concernente le opere relative ai Giochi, predisposto ...
Piano degli interventi, concernente le opere relative ai Giochi, predisposto ...
 

Recently uploaded

9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
hyt3577
 
The political system of the united kingdom
The political system of the united kingdomThe political system of the united kingdom
The political system of the united kingdom
lunadelior
 
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
Faga1939
 

Recently uploaded (20)

declarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfdeclarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdf
 
Group_5_US-China Trade War to understand the trade
Group_5_US-China Trade War to understand the tradeGroup_5_US-China Trade War to understand the trade
Group_5_US-China Trade War to understand the trade
 
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
 
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
 
06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf
 
9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
 
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreieGujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
 
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
 
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkoEmbed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
 
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
 
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
 
422524114-Patriarchy-Kamla-Bhasin gg.pdf
422524114-Patriarchy-Kamla-Bhasin gg.pdf422524114-Patriarchy-Kamla-Bhasin gg.pdf
422524114-Patriarchy-Kamla-Bhasin gg.pdf
 
The political system of the united kingdom
The political system of the united kingdomThe political system of the united kingdom
The political system of the united kingdom
 
04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf
 
Politician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full DetailsPolitician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full Details
 
05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf
 
China's soft power in 21st century .pptx
China's soft power in 21st century   .pptxChina's soft power in 21st century   .pptx
China's soft power in 21st century .pptx
 
Job-Oriеntеd Courses That Will Boost Your Career in 2024
Job-Oriеntеd Courses That Will Boost Your Career in 2024Job-Oriеntеd Courses That Will Boost Your Career in 2024
Job-Oriеntеd Courses That Will Boost Your Career in 2024
 
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
 

Briefing for the italian government on hacking team's surveillance exports

  • 1. Report Briefing for the Italian Government on Hacking Team’s surveillance exports
  • 2. Introduction Formorethanadecade,ItaliansurveillancecompanyHackingTeam hassoldinvasive surveillancetechnologiesto law enforcementand intelligenceagenciesacrossthe globe.1 Itsflagship product,the“RemoteControlSystem”(RCS),ismarketed by HackingTeam asan“effective,easy-to-useoffensivetechnology”thatitprovidesto “worldwide law enforcementand intelligence communities.”2 Hacking Team hasa consistenttrackrecordofdeliveringitssoftware,includingtheRCS,togovernment agencies with records ofhuman rights abuse and unlawfulsurveillance,and its productshavebeenrepeatedlyusedtoconductunlawfulsurveillanceofjournalists, activistsandhumanrightsdefenders. Thisbriefing canvassesHacking Team'sproductsand customerbase.It'srelease coincideswiththepublicationofnewevidence,uncoveredbyPrivacyInternational,and anindependentinvestigationbyVICEMotherboard,thatHackingTeam hassoldits RemoteControlSystem totheUnitedStatesArmyandtheDrugEnforcementAgency (DEA). Since2012,HackingTeamsoftwarehasbeenidentifiedandassociatedwithattackson politicaldissidents,journalistsandhumanrightsdefenders,andevidencehasbeen publishedconfirmingitssuspecteddeploymentinatleast21countries.However,when presentedwithcompellingevidenceofthedeploymentofitsproductsbyhumanrights abusinggovernments,HackingTeam hasconsistentlychosento'neitherconfirm nor deny'allegations,ignoringdemandsfortransparencyaboutitscustomerbase,and disregardingvictims'claimsforredressagainstoffenders. Inpublishingthisbriefing,PrivacyInternationalconsolidatesforthefirsttimeresearch on Hacking Team thatithas compiled overfouryears ofinvestigations and campaigning.Thereleaseofthisbriefingisparticularlytimelyasitcomesonlymonths afterEuropeanlawwasamendedtorestricttheexportofHackingTeam'sRCSproduct, subjectingtheItaliancompanytostrictlicensingrequirementsdesignedtopreventits invasivetechnologiesfromfallingintothewronghands. 1 http://www.hackingteam.it/index.php/about-us 2 http://www.hackingteam.it/index.php/about-us:http://www.hackingteam.it/index.php/remote- control-system
  • 3. Originsandgrowth HackingTeam tracesitsbeginningsto2001,whentwoItaliancomputerprogrammers createdtheEttercapprogramme,designedtofacilitateman-in-the-middleattack.3 The ItalianPolicequicklyrealized theprogramme'spotentialforsurveillanceoperations againstcommonencrypted communicationservicessuchasSkype,e-mail,instant messaging,webcamsand computeraudio systems,4 andbecameoneofHacking Team'sfirstcustomers. Hacking Team hasbenefited considerablyfrom itsconnectionswith Italian public authorities.Thecompanyreceivedover;1millioninpublicfinancingfromtheRegionof Lombardy.5 Recently,theItaliangovernmenttabledlegislationdesignedtoexplicitly empoweritsagenciestouseRemoteControlSystems.Thecounter-terrorism decree wassubsequentlyblockedbyoppositioninParliament,butwouldhavebecomethefirst Europeanlegislationpermittingtheuseofsuchsystemshaditbeenconvertedintolaw.6 Today,Hacking Team,lead by CEO David Vincenzetti,has over50 staff,and subsidiariesinAnnapolis,United StatesofAmerica,and inSingapore.Itsellsits servicesandproductstolawenforcementandintelligenceagenciesacrosstheglobe.7 Technologyandservices Hacking Team'sflagship productisthe Remote ControlSystem software.In the company'swords: RCS (RemoteControlSystem)isasolutionthatsupportsinvestigationsby activelyandpassivelytappingdataandinformationfromthedevicestargetedby theinvestigations.Infact,TCSanonymously,creates,setsandinstallssoftware agentsthatcollectdataand information,sending theresultsto thecentral databasetobedecryptedandsaved.8 3 http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police- hack-into-computers 4 http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police- hack-into-computers:https://www.privacyinternational.org/?q=node/147 5 https://www.privacyinternational.org/?q=node/147 6 http://in.reuters.com/article/2015/03/26/italy-security-internet-idINKBN0MM24620150326 7 http://www.hackingteam.it/index.php/about-us:https://citizenlab.org/2014/02/mapping-hacking- teams-untraceable-spyware/ 8 https://s3.amazonaws.com/s3.documentcloud.org/documents/1348003/rcs-9-admin-final.pdf
  • 4. ThetwomainRCSsystemscurrentlymarketedbyHackingTeamarethe“DaVinci”and “Galileo” solutions.9 These products are intrusion technologies thatcan covertly collect,modifyand/orextractdatafrom adevicethroughtheinstallationofmalicious softwareonthedevice.Themalwareisinsertedonthecomputerasatrojan,ora maliciouscodedisguisedininconspicuousfilesorattachments,andisexecutedonthe device.Themaliciouscodecanrunoperationsinaclandestinemanneronthedevice, makingitundetectablebytheusersofthedevice.10 These solutionsare capable ofbypassing encryption in common communications servicessoftware,andofloggingSkypecalls,emails,instantmessaging,webbrowsing records,deletedfilesandshotstakenfromthecomputer’sownwebcam.Thecompany claimsthattheirproductnotonlyrelayswhatishappeningonatarget’scomputer,but alsoenablessurveillanceofanythingoccurringwithintherangeofthecomputer’s internalcameraormicrophone.HackingTeam alsoclaimstobeabletocompromise computersrunningMacOSandWindows,inadditiontoarangeofsmartphones.11 The malwareisdeliveredthroughman-in-the-middle-attacks,i.e.disguisedasrequeststo commonupdates,andthroughsocialengineering,i.edisguisedasattachmentstoe- mails. Contributiontohumanrightsabuses EvidencesuggeststhatHackingTeam'sRCS isoneofthemostpopularintrusion technologiesonthemarket,andisusedwidelybycountrieswithpoorhumanrights records.However,whenpresentedwithcompellingevidenceofthedeploymentofits productsbyhumanrightsabusinggovernments,HackingTeamhasconsistentlychosen to'neitherconfirm nordeny'allegations,ignoringdemandsfortransparencyaboutits customerbase,anddisregardingvictims'claimsforredressagainstoffenders. Since2012,HackingTeamsoftwarehasbeenidentifiedandassociatedwithattackson politicaldissidents,journalistsandhumanrightsdefenders,andevidencehasbeen publishedconfirmingitssuspecteddeploymentinatleast21governments,spanningsix 9 http://www.hackingteam.it/index.php/remote-control-system 10 https://www.privacyinternational.org/?q=node/73 11 http://www.cso.com.au/article/431882/_crisis_os_x_trojan_made_by_lawful_intercept_vendor_hackin gteam/
  • 5. contents.12 Itissuspected,however,thatHackingTeam'scustomerbaseisactually muchlarger,andthecompany'sintelligencetoolsmaybeinuseinmorethan60 countries.13 CitizenLabattheUniversityofTorontohas,incooperationwithClaudioGuarnieri, identifiedthefollowinggovernmentsassuspectedusers14 ofHackingTeamsoftware: Azerbaijan Colombia Egypt Ethiopia Hungary Italy Kazakhstan Malaysia Mexico Morocco Nigeria Oman Panama Poland SaudiArabia SouthKorea Sudan Thailand Turkey UnitedArabEmirates Uzbekistan ThreeofHackingTeam'sclients–Uzbekistan,SaudiArabiaandSudan–arerankedas “theworstoftheworst”intermsoffreedom,Freedom House's2015Freedom inthe Worldindex.15 Anotherthreeoftheclients–Colombia,MexicoandTurkey–areonthe CommitteefortheProtectionofJournalists“20DeadliestCountries”listinranking attacksonjournalists.16 Additionally,severalofHackingTeam'sclientshaveahistoryof humanrightsabuselinkedtosurveillanceandintelligencetechnologies,asdetailed below. Azerbaijan CitizenLab“identifiedanRCSendpointinAzerbaijan(Azertelekom:109.235.193.83) thatwasactivebetweenJuneandNovember2013.”17 AzerbaijanisoneoftheCentralAsianstateswiththemostserioushistoryofarresting bloggers,andthoseusinginformationandcommunicationstechnologies.18 Freedom HouseobservesthatAzerbaijaniauthoritiesrelyonsweepinginvestigatorypowersthat 12 ACitizenlabmapofhackingTeamproliferationisannexedtothisreport.SeeAnnexIII https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ 13 http://www.wired.com/2014/06/remote-control-system-phone-surveillance/ 14 https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ 15 https://freedomhouse.org/report/freedom-world/freedom-world-2015#.VSaUezvF8Yc 16 https://cpj.org/killed/ 17 https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/ 18 https://freedomhouse.org/report/freedom-net/2012/azerbaijan#.VSenQTvF8Yd
  • 6. leavingsubstantialleewayforabuseofpowers: “Thelaw “Onoperative-searchactivity”(Article10,sectionIV)authorizeslaw enforcementagenciestoconductsurveillancewithoutacourtorderincases regarded as necessary “to preventserious crimes againstthe person or especiallydangerouscrimesagainstthestate.”Theunclearparametersforwhat constitutespreventiveactionleavethelawopentoabuse.”19 Governmentagencies in Azerbaijan have increasingly invested in surveillance technologies,whileimplementingmethodsofblanketsurveillanceonmobilephone users,and consistentlytargeting foreignersand activistswithinvasivesurveillance tools.20 Ethiopia In2014,investigationsbyCitizenLabrevealedthatanindependentEthiopianmedia outletintheUnitedStates,theEthiopianSatelliteTelevisionService,hadbeenattacked withspywareonseveraloccasions.21 CitizenLabconcludedthattheattacktoobtain “filesand passwords,and interceptSkypecallsand instantmessages”could be attributedtotheuseofsoftware“soldexclusivelytogovernmentsbyMilan-based HackingTeam.”22 BoththeresultsoftheinvestigationsandtheEthiopianGovernment's previous conflicts with the Television Service indicate thatEthiopian intelligence agenciesstagedtheattack,usingRCS. Kazakhstan RCStechnologyhasbeentracedtotelecommunicationscompanyJSC Kazakhtelecom Slyzhebnyi.23 Inat2014report,HumanRightsWatchnotedthat“Kazakhstan’spoor humanrightsrecordcontinuedtodeterioratein2013,”24 citingasacauseoverlybroad lawsthatallow forthesuppressionoffreespeech,dissent,andfreedom ofassembly andreligion.In2011,nationalunresttriggeredacrack-downfromsecurityforceswhere civilsociety activists and prominentmembers ofthe politicalopposition were 19 https://freedomhouse.org/report/freedom-net/2012/azerbaijan#.VS5gfxOUdHg 20 Seealsohttps://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/#12 21 https://citizenlab.org/2014/02/hacking-team-targeting-ethiopian-journalists/; https://citizenlab.org/2015/03/hacking-team-reloaded-us-based-ethiopian-journalists-targeted- spyware/ 22 https://citizenlab.org/2014/02/hacking-team-targeting-ethiopian-journalists/ 23 https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/#12 24“HumanRightsWatchWorldReport2014”,HumanRightsWatch,2014,availableat http://www.hrw.org/sites/default/files/wr2014_web_0.pdf
  • 7. imprisoned.Oppositiongroupsandindependentmediaoutletsandjournalistswere harassed,andoftenforcedtoclose.25 Tortureremainscommonplaceinthecountry.26 Asrecentlyas2014,testimoniesweresubmittedtotheUNCommitteeAgainstTorture, allegingthatKazakhintelligenceagencieshaveperpetrated37countsofill-treatment andcoercedtestimonies.27 Morocco TheEconomist'sIntelligenceUnits2014DemocracyIndexclassifiesMoroccoasan authoritarianregime.InarecentreportbyPrivacyInternational,Theireyesonme: storiesofsurveillanceinMorocco,28 ithasbeenfoundthatMoroccohasaggressively increaseditssurveillancecapacitysince2011.29 Thereportincludestestimoniesfrom severaljournalistsandhumanrightsworkerswhohavebeensubjecttoattacksfrom “hacking militias” thatare suspected to have connections with the Moroccan intelligencecommunity.Asrecentlyas2012,the“Mamkfinch”websiteandGlobal Voices(acitizenmediaplatform)staffweretargetedwithHackingTeamsoftware.30 UnitedArabEmirates ReportersWithoutBordershasobservedthattheUAEhasbeenimplementinginternet surveillance and censorship programs since 2008,31 underpinned by legislation suppressingcommunications“'opposingIslam,''insultinganyreligionrecognisedby thestate'or'contraveningfamilyvaluesandprinciples.'”32 Specifically,UAEuseofRCS technologyhasbeentiedtothearrestofbloggerAhmadMansoorin2011oncharges ofinsultingthePresidentandCrownPrince.33 25“AmnestyInternationalReport2013:Thestateoftheworld’shumanrights”,AmnestyInternational, 2013,availableat http://files.amnesty.org/air13/AmnestyInternational_AnnualReport2013_complete_en.pdf 26“HumanRightsWatchWorldReport2014”,HumanRightsWatch,2014,availableat http://www.hrw.org/sites/default/files/wr2014_web_0.pdf 27“Kazakhstan:SubmissiontotheUNCommitteeAgainstTorture”,HumanRightsWatch,October 2014,availableathttp://www.hrw.org/news/2014/10/20/kazakhstan-submission-un-committee- against-torture 28https://www.privacyinternational.org/?q=node/554 29 https://www.privacyinternational.org/sites/default/files/Their%20Eyes%20on%20Me%20- %20English_0.pdf 30 Pg16-19https://www.privacyinternational.org/sites/default/files/Their%20Eyes%20on%20Me%20- %20English_0.pdf 31 http://en.rsf.org/surveillance-united-arab-emirates,39760.html 32 http://en.rsf.org/surveillance-united-arab-emirates,39760.html 33 https://citizenlab.org/2012/10/backdoors-are-forever-hacking-team-and-the-targeting-of-dissent/
  • 8. Uzbekistan DigitalforensicinvestigationssuggestthedeploymentofHackingTeamtechnologiesat SarkorTelecom,inUzbekistan.34 NumerousjournalistsandactivistslivinginUzbekistanandoutsideofit,inexile,report thattheircommunicationshave been monitored.Uzbekauthoritiesappearto be monitoring phonescallsand emailsofUzbeksworking on whatstate authorities perceive to be politically sensitive topics,often using transcripts ofprivate communicationsincriminalproceedingsagainstthem.Insomecases,authoritiesalso appeartohaveobtainedaccesstoVoIPcommunicationssuchasSkype.Whilethe methodsandstoriesvary,theaccountsevidencethepolitically-motivatednatureof surveillanceinUzbekistan.Humanrightsactivistsandjournalistsaretargetedwhere theyareconsideredaviablethreattotheregime.35 PrivacyInternational'srecentreportPrivateInterests:MonitoringCentralAsia36 )details testimoniesofindividualsthatsuggestthattheUzbekintelligencecommunityhas targeted persons communicating human rights concerns to UN bodies and the internationalhumanrightscommunityonnumerousoccasionssince2005.Aslateas 2013,Uzbekintelligenceagenciesspiedonprivateandconfidentialcommunications, carriedoverencryptedSkypelinks,betweenfamiliesofarresteddissidentsandhuman rightslawyers.37 SaudiArabia CitizenLabhastracedtheuseofRCSsoftwareinSaudiArabiatoEtihadEtisalatand Al-KhomasiaShipping&MaintenanceCoLtd.38 According to Freedom House,SaudiArabia has implemented surveillance and censorshipprogrammesresultingin“notablepoliticalcensorship”.39 AFreedom House reportnotes: 34 https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/#12 35 PG68-70https://www.privacyinternational.org/sites/default/files/Private%20Interests%20with%20annex_0.pdf 36 https://www.privacyinternational.org/?q=node/293 37 https://www.privacyinternational.org/sites/default/files/Private%20Interests%20with%20annex_0.pdf 38 https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/#12 39 https://freedomhouse.org/report/freedom-net/2012/saudi-arabia#.VSfPtzvF8Yc
  • 9. “SurveillanceisrampantinSaudiArabia.Anyonewho usescommunication technologyissubjecttogovernmentmonitoring,whichisofficiallyjustifiedunder theauspicesofprotectingnationalsecurityandmaintainingsocialorder.The authoritiesregularlymonitorwebsites,blogs,chatrooms,socialmediasites,and thecontentofemailandmobilephonetextmessages.”40 Surveillancetechnologieshavealsobeenusedtoidentifyanddetainwomen'srights activists.41 In 2014,Citizen Lab uncovered thatHacking Team malware had been packagedwithnewsapplicationsaimedattheShiaminorityinSaudiArabia.42 Sudan InvestigationsbyCitizenLabhastracedtheuseofRCSsoftwaretoVisionValleyin Sudan.43 The Association forProgressive Communications has observed thatSudan uses censorshipandsurveillancetechnologieswithanaimofsuppressingnon-Islamicnorms and governmentopposition.44 Hacking Team technologieshavebeenused bythe Sudanese Government's“CyberJihadistUnit” since 2011 to target“government opponents,journalists,humanrightsactivistsandvariousyouthgroups.”45 ComplicityinpotentiallyunlawfulUSsurveillance InvestigationsbyPrivacyInternational,publishedtodaybyVICE,revealthatHacking Team hassolditsRemoteControlSystem totheDrugEnforcementAgencyandUS militaryviaafrontcompanybasedintheUS.46 Recordsshow thatin 2011,a companycalled Cicom,with a registered address identicalto thatatwhichHacking Team’sUS officeisregistered (1997Annapolis ExchangeParkwaySuite30x),solda“RemoteControlSystem”,originatinginItaly,to theUSArmyforUSD$350,000.47 40 https://freedomhouse.org/report/freedom-net/2012/saudi-arabia#.VSfPtzvF8Yc 41 https://freedomhouse.org/report/freedom-net/2012/saudi-arabia#.VSfPtzvF8Yc 42 https://citizenlab.org/2014/06/backdoor-hacking-teams-tradecraft-android-implant/ 43 https://citizenlab.org/2014/02/mapping-hacking-teams-untraceable-spyware/#12 44 http://www.apc.org/en/blog/online-surveillance-and-censorship-sudan 45 http://www.apc.org/en/blog/online-surveillance-and-censorship-sudan 46 https://www.fpds.gov/ezsearch/search.do? indexName=awardfull&templateName=1.4.4&s=FPDSNG.COM&q=CICOM 47AnnexIV
  • 10. Onlymonthslater,inMarch2012,theDEAreleasedacallfortenderfora“Remote ControlHostBasedInterceptionSystem”: “TheDEAisseekinginformationfrom potentialsourceswithafullyfunctional andoperationalproductproventobecapableofprovidingaRemoteControl HostBasedInterceptionSystemfordeviceortargetspecificcollectionpursuant toauthorizedlawenforcementuse.”48 In August2012,the DEA's Office ofInvestigative Technology paid an initial USD$575,000ofanAllOptionsValueofUSD$2,410,000toCicom,andhascontinued to pay annualinstallments to the company.The mostrecentrecord shows a transaction,effectiveinAugust2014and to becompleted inAugust2015,fora “Remote ControlHostBased Interception System and supportservices”.49 The transactionsareduetoendin2017. ThetransferscomeinthewakeofrecentrevelationsoftheDEA'smasssurveillance programme,throughwhichtheagencyhasbeencollectingandstoringthetelephone recordsofordinaryAmericansformorethantwodecades.50 Itisnow clearthat,in addition to such bulkcollection practices,the DEA also possessesthe technical capacity to conductintrusive surveillance on individuals across the globe,using HackingTeam'sproducts.Whetherlaw enforcementuseofintrusivesurveillanceis lawfulintheUSisnotclear,assomecourtshaverefusedtoissuewarrantsauthorising suchactivities. Internalduediligence–isitenough? Privacy Internationalbelieves thatunderno circumstances should Hacking Team provideitsproductsandservicestogovernmentend-userswhenthereisalikelihood thatthoseproductswillbeusedforunlawfulsurveillanceorotherhumanrightsabuses. Norshould productssuch asthe RCS everbe deployed by,and thussold to, governmentagenciesin the absence ofrigorouslegalframeworksand oversight regimes. 48https://www.fbo.gov/index? s=opportunity&mode=form&id=7eb60b154c178c5a0abd3d5dfbba2709&tab=core&_cview=0 49AnnexV 50 https://firstlook.org/theintercept/2015/04/08/dea-surveillance-phone-records-crisscross-nsa/
  • 11. ExportofaproductliketheRCS totheUnitedStatesraisesanumberofcritical questionsaboutthe role ofcompanieslike Hacking Team in facilitating unlawful surveillance.Thereisunclearstatutoryauthorityauthorisingthedeploymentofspyware byUSfederalorlaw enforcementagencies,meaningthatdeploymentoftheRCSby theDEAortheArmyispotentiallyunlawfulunderUSlaw.Furthermore,becauseRCSis designedtobeusableagainsttargetsevenwhiletheyareoutsideoftheend-user's legaljurisdiction,itraisesseriouslegalquestionsconcerningtheabilityofUSagencies andthemilitarytotargetindividualsbasedoutsideoftheUnitedStates.Companies' internalduediligencepoliciesthatdonottakeintoaccountthattheircustomercannot lawfullyusetheirproductsareinherentlyproblematic,andultimatelyinadequateto properlypreventagainsthumanrightsviolations. In its branding and communications materials,Hacking Team claims to have understandingofthe“potentialforabuseofthesurveillancetechnologies”andasserts thatitenforcesaprecautionaryapproachinmanagingitsservices.51 EricRabe,Hacking Team'sChiefMarketingandCommunicationsOfficerhasassertedthatHackingTeam goes“furtherthan anyothercompanyto addressthe concernsofhuman rights organizationsandCitizenLabnotonlythroughourownpoliciesbutalsobycomplying withinternationalstandardsincludingtheWassenaarArrangementprotocols.”52 TheHackingTeam CustomerPolicydetailsanumberofmeasures53 tominimizetherisk ofhumanrightsabuse,includingconductingsalesreviewswitha“paneloftechnical expertsandlegaladvisors”andmonitoringthehumanrightsrecordofpotentialclients; implementing training thatallows Hacking Team employees identify “red flags” according to the U.S.Commerce and Foreign Trade “Know YourCustomer” Guidance;54 and inserting conditionalityclausesinsalesagreementsrequiring legal compliancewithapplicablelaws.Nevertheless,theseinternalprocessesarenotby themselvessufficienttopreventthesaleofinvasiveproductssuchastheRCS to 51 http://www.hackingteam.it/index.php/customer-policy 52 HackingTeamResponsetoCitizenLabReportofMarch9,2015: http://www.hackingteam.it/index.php/about-us 53 ThecompleteCustomerPolicyisappendedtothisreport.SeealsoCustomerPolicy http://www.hackingteam.it/index.php/customer-policy 54 http://www.ecfr.gov/cgi-bin/text-idx? c=ecfr&sid=b598042103e95c10c396b0140e0620b7&rgn=div9&view=text&node=15:2.1.3.4.21.0.1.7.2 2&idno=15
  • 12. governmentagencieswithahistoryofpotentiallyunlawfulsurveillance,nortostopthe saleofsuchsystemstogovernmentswithgravehistoriesofhumanrightsabuse.Thus, HackingTeam'sinternalduediligenceprocess,totheextenttheyexist,arewoefully inadequatetoensurethatthecompanyisnotcomplicitinhumanrightsviolations. Afirststep:regulationofexports TheprofitmodelofcompaniessuchasHackingTeam istheprovisionofincrediblyin- trusiveproductsandservicestolawenforcementandintelligenceagenciesacrossthe world,whousethemforbothlegitimate,andunlawful,surveillanceoftheirpopulations. Althoughthecompanyhasbasicinternalduediligencepolicies,thesepoliciesappear nottohavepreventedtheexportofintrusiontechnologytosomeoftheworld'sworst humanrightsabusers,andtogovernmentagencieswithhistoriesofunlawfulsurveil- lance.Keytocontrollingtheproliferationofthistechnology,therefore,areregulations whichrequirecompaniessuchasHackingTeam toobtainlicencespriortoexporting theirproductsandservices. AsanItaliancompany,HackingTeam’stechnologiesarenow subjecttoEuropean Unionexportrestrictions.Asof1January2015,theEUDual-UseRegulation429/2008 restrictstheexportofintrusionsoftware,definedinamannerthatcapturestheRCS. TheEUdevelopmentsaregroundedinagreementsmadeata2013conveningofStates partiestotheWassenaarArrangement,anintergovernmentalexportcontrolregime usedtodeterminewhichitemsshouldbesubjectedtoexportlicensingbyitsparticipat- orystatesinordertofosterinternationalsecurity.55 Theinclusionofthecategoryrelating tointrusionsoftwarewasinstigatedbytheUnitedKingdom in2012,aftercampaigning byPrivacyInternationalandothers,motivatedbyincreasingevidencethatintrusion technologieswere being exported to authoritarian stateswith poorhuman rights recordsandbeingusedtotargetactivists. AsofJanuary2015,HackingTeam hasasserteditsimmediatecompliancewiththeEU regulation,andhasundertakentoseekauthorizationforexportsundertheItalianMin- istryofEconomicDevelopment.56 However,althoughthetechnologyisnowsubjectto 55 http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2009:134:0001:0269:en:PDF 56 ThecompleteHackingteamnewsreleaseonitscompliancewithexportregimesisappendedtothis report.Seealso:HackingTeamComplieswithWassenaarArrangementExportControlsonSurveillance andLawEnforcement/IntelligenceGatheringToolshttp://www.hackingteam.it/index.php/about-us
  • 13. licensing,itisincumbantontheItalianauthoritiestoappropriatelyassesswhetheror notatransfershouldbeauthorised.Asafirststep,theauthoritiesshouldconsiderthe eightcommoncriteriaforarmsexportsalreadyinplacewithintheEUcommonposition onarmsexports.57 Inadditiontothis,theauthoritiesmustalsolookatthelegalframeworkwhichregulates theuseofthetechnologyinquestioninthedestinationcountry,therecordoftheend- userandhowitusesintelligence,aswellasthepotentialoftheproposedtechnologyto beusedagainsttheprinciplesestablishedwithintheEuropeanCovenantonHuman Rights. Conclusion HackingTeam'sRCSisoneofthemostwidelydocumentedandreportedsurveillance technologiesonthemarket.Whilethecompanyhasrepeatedlystipulatedthatitre- spectshumanrightsandhasinternalproceduresinplacetoensurethattheirproducts arenotusedforhumanrightsviolations,itisnotenoughtorelyonself-regulation.The impositionofeffectiveexportregulationswithappropriateandstronghumanrightspro- visionsisanessentialstepinensuringthatthesaleofRCSandsimilartechnologyisac- countable,moretransparent,andthatitultimatelydoesnotleadtohumanrightsab- uses. PrivacyInternationaliscurrentlysecretariatforaninternationalNGO campaign callingforeffective,humanrights-based,exportcontrolstobeputintoplaceto stopexportsofsurveillancetechnologywhichposeathreattofundamentalhu- manrights.MoreinformationontheCoalitionAgainstUnlawfulSurveillanceEx- portscanbefoundathttp://www.globalcause.net/. 57 http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2009:134:0001:0269:en:PDF
  • 14. AnnexI:HackingTeam “CustomerPolicy”58 CustomerPolicy SincewefoundedHackingTeam,wehaveunderstoodthepowerofoursoftwareinlaw enforcementandintelligenceinvestigations. Wealsounderstandthepotentialforabuseofthesurveillancetechnologiesthatwe produce,andsowetakeanumberofprecautionstolimitthepotentialforthatabuse. Weprovideoursoftwareonlytogovernmentsorgovernmentagencies.Wedonotsell productstoindividualsorprivatebusinesses. WefullycomplywithdualuseandexportcontrolscalledforinthenineteenthPlenary meetingoftheWassenaarArrangement. WedonotsellproductstogovernmentsortocountriesblacklistedbytheU.S.,E.U., U.N.,NATO orASEAN. Wemonitortheinternationalgeopoliticalsituationandwereviewpotentialcustomers beforeasaletodeterminewhetherornotthereisobjectiveevidenceorcredible concernsthatHackingTeamtechnologyprovidedtothecustomerwillbeusedto facilitatehumanrightsviolations. Wehaveestablishedapaneloftechnicalexpertsandlegaladvisors,uniqueinour industry,thatreviewspotentialsales. Moreover,inHTcontracts,werequirecustomerstoabidebyapplicablelaw.We reservetherightinourcontractstosuspendsupportforoursoftwareifwefindterms ofourcontractsareviolated.IfwesuspendsupportforHTtechnology,theproduct soonbecomesuseless. Wewillrefusetoprovideorwewillstopsupportingourtechnologiestogovernmentsor governmentagenciesthat: • WebelievehaveusedHTtechnologytofacilitategrosshumanrightsabuses. • Whorefusetoagreetoorcomplywithprovisionsinourcontractsthatdescribe intendeduseofHTsoftware,orwhorefusetosigncontractsthatincluderequirements thatHTsoftwarebeusedlawfully. • Who refuse to acceptauditing features builtinto HT software thatallow administratorstomonitorhowthesystemisbeingused. HTpoliciesandproceduresareconsistentwiththeU.S.KnowYourCustomer guidelines.Weconductongoingemployeetrainingtoassurethatemployeesknowand understandtheprovisionsoftheseguidelines. Shouldwediscover“redflags”describedintheseguidelineswhilenegotiatingasale, wewillconductadetailedinquiryintothematterandraisetheissuewiththepotential customer.Ifthe“redflags”cannotbereasonablyexplainedorjustified,wemay suspendthetransaction. 58 http://www.hackingteam.it/index.php/customer-policy
  • 15. Ourreviewwillinclude: • StatementsmadebythepotentialcustomereithertoHTorelsewherethatreflect thepotentialforabuse. • Thepotentialcustomer'slaws,regulationsandpracticesregardingsurveillance includingdueprocessrequirements. • Crediblegovernmentornon-governmentreportsreflectingthatapotential customercouldusesurveillancetechnologiestofacilitatehumanrightsabuses. HackingTeamencouragesanyonewithinformationaboutapparentmisuseorabuseof oursystemsandsolutionstopromptlyreportthatinformationtous atinfo@hackingteam.comThise-mailaddressisbeingprotectedfromspambots.You needJavaScriptenabledtoviewit. HackingTeamhasestablishedaprocessofmonitoringnewsmedia,activistcommunity blogsandotherInternetcommunication,andotheravailablesourcesforexpressed concernsabouthumanrightsabusesbycustomersorpotentialcustomers.Should questionsberaisedaboutthepossibleabuseofHTsoftwareinhumanrightscases,HT willinvestigatetodeterminethefactstotheextentpossible.Ifwebelieveoneofour customersmaybeinvolvedinanabuseofHTsoftware,wewillcontactthecustomeras partofthisinvestigation.Basedontheresultsofsuchaninvestigation,HTwilltake appropriateaction.
  • 16. Annex II:Hacking Team News Release on Compliance with WassenaarArrangementExportControls59 HackingTeam CompliesWithWassenaarArrangement ExportControlsonSurveillanceandLawEnforcement/ IntelligenceGatheringTools Milan,Italy(Feb.25,2015)HackingTeam,theworldleaderinprovidingstate-of-the-art softwaretoolsforsurveillancetolawenforcementandintelligenceagencies,saidtoday itiscomplyingfullywiththeexportcontrolscalledforinthenineteenthPlenarymeeting oftheWassenaarArrangement.Noothercompanyinthelawfulsurveillanceindustry hasmadethiscommitment. Theseexportcontrolsaredesignedtoassurethatonlyappropriategovernmentsor governmentagenciesareabletousesurveillancesoftwareandthattheuseofthe softwareinnowaythreatensinternationalorregionalsecurityorstability. OnJanuary1,2015,theEuropeanUnion(E.U.)implementedtheWassenaarguidance andapplicabledualuselegislation.HackingTeaminstitutedthenewprocedures immediately. “Wedesignedoursystemtobeusedtofightcrimeandterrorismandwewantittobe usedforthatpurpose,”saidDavidVincenzetti,CEO ofHackingTeam.“Criminalsand terroristsaroundtheworldroutinelyusemobilephones,mobiledevices,computers, andtheInternettocommithorrificcrimesandterrorism.WithoutHTtechnologylaw enforcementisblindtothisactivity.” “Wearenowthefirstinourindustrytocomplywiththeselatestinternationallaws,and wearedoingsobecausewearecommittedtoassuringthatourproductsarenot misused,”Vincenzettisaid. UndertheproceduresagreedtobyHackingTeamandtheItalianMinistryofEconomic Development,HTwillrequestfromtheItalianGovernmentexportauthorizationforits technologies. Previoustothisregulation,thecompanyhadalreadyinstitutedinternalcontrolsand procedurestoassureitssoftwareisnotabused.TheWassenaarprotocolsadd additionalinsurancethatHackingTeamtechnologiesareonlyprovidedtoandusedby appropriateagenciesandgovernments. Sinceitsfounding,HackingTeamhasrecognizedthepowerofitstoolsthatallowlaw enforcementagenciestomonitorcomputertraffic,mobilephoneandothersimilar communications.Thecompanyvoluntarilyinstitutedacustomerpolicypublishedon thehackingteam.comwebsitetoassurethatitstoolswerenotabused. HackingTeamhasalsocommittedtoabidingbyinternationalblacklistsandother guidelinessothatitssurveillancesystemisnotsoldtostatesorstateagenciesthat mightabuseit. 59 http://www.hackingteam.it/index.php/about-us
  • 19. 4/7/2015 FPDS-NG : ICDUSER [ Award ] https://www.fpds.gov/common/jsp/LaunchWebPage.jsp?command=execute&requestid=58233081&version=1.4 1/2                   Transaction  Information Award  Type: Purchase  Order  Prepared  Date: 03/31/2011  07:16:28  Prepared  User: SHAWN.M.SMITH4.W911W4@MI.ARMY.MIL Award  Status: Final  Last  Modified  Date: 03/31/2011  15:20:09  Last  Modified  User: RANDY.DREYER.W911W4@MI.ARMY.MIL Document  Information Agency Procurement  Identifier Modification  No Trans  No Award  ID: 9700 W911W411P0055 0 0 Referenced  IDV  ID: Reason  For  Modification: Solicitation  ID: W911W411T0107 Agency Identifier Main Account Sub Account Initiative Treasury  Account  Symbol: Select  One Dates Amounts Date  Signed  (mm/dd/yyyy)  : 03/31/2011 Effective  Date  (mm/dd/yyyy)  : 03/31/2011 Completion  Date  (mm/dd/yyyy)  : 04/30/2011 Est.  Ultimate  Completion  Date  (mm/dd/yyyy)  : 04/30/2011 Action  Obligation: $350,000.00 Base  And  Exercised  Options  Value: $350,000.00 Base  And  All  Options  Value: $350,000.00 Fee  Paid  for  Use  of  IDV: $0.00 Purchaser  Information Contracting  Office  Agency  ID: 2100 Contracting  Office  Agency  Name: DEPT OF THE ARMY Contracting  Office  ID: W911W4 Contracting  Office  Name: W00Y CONTR OFC DODAAC Funding  Agency  ID: 2100 Funding  Agency  Name: DEPT OF THE ARMY Funding  Office  ID: W23BFK Funding  Office  Name: W4VY INSCOM MISSION SPT CMD Foreign  Funding: Not  Applicable Contractor  Information SAM Exception:   DUNS  No: 963322842 Vendor  Name: CICOM USA, LLC DBAN: Street: 1997 ANNAPOLIS EXCHANGE PKWY STE 30 Street2: City: ANNAPOLIS State: MD  Zip:   214013271 Country: UNITED STATES Phone: (443) 949-7470 Fax  No: (443) 949-7471 Congressional   District: MARYLAND 03 Business  Category Organization  Type:   PARTNERSHIP Number  of  Employees:   3 State  of  Incorporation:   Country  of  Incorporation:   Annual  Revenue:   $3,000,000   Business  Types Partnership  or  Limited  Liability  Partnership Socio  Economic  Data Minority  Owned  Business Hispanic  American  Owned Line  Of  Business Educational  Institution Hispanic  Servicing  Institution Relationship  With  Federal  Government Both  (Contracts  and  Grants) Organization  Factors For  Profit  Organization Limited  Liability  Corporation Certifications DoT  Certified  Disadvantaged  Business  Enterprise Contract  Data Type  of  Contract: Firm  Fixed  Price Multiyear  Contract: Select  One Major  Program: National  Interest  Action: None Cost  Or  Pricing  Data: Select  One Purchase  Card  Used  As  Payment  Method: No Undefinitized  Action: No Performance  Based  Service  Acquisition:   *  FY  2004  and  prior;;  80%  or  more  specified  as  performance  requirement   Not  Applicable Annex IV
  • 20. 4/7/2015 FPDS-NG : ICDUSER [ Award ] https://www.fpds.gov/common/jsp/LaunchWebPage.jsp?command=execute&requestid=58233081&version=1.4 2/2 *  FY  2005  and  later;;  50%  or  more  specified  as  performance  requirement Contingency  Humanitarian  Peacekeeping  Operation: Not  Applicable Contract  Financing: Not  Applicable Cost  Accounting  Standards  Clause: Select  One Consolidated  Contract: No Number  Of  Actions: 1 Legislative  Mandates Principal  Place  of  Performance Clinger-­Cohen  Act: No Service  Contract  Act: No Walsh-­Healey  Act: No Davis  Bacon  Act: No Interagency  Contracting  Authority: Not  Applicable Other  Interagency  Contracting  Statutory  Authority:   (1000  characters) Principal  Place  Of  Performance  Code: State Location Country MD USA Principal  Place  Of  Performance  County  Name: ANNE ARUNDEL Principal  Place  Of  Performance  City  Name: ANNAPOLIS Congressional  District  Place  Of  Performance: 03 Place  Of  Performance  Zip  Code(+4): 21401  -­   3271  USPS  ZIP  Codes Product  Or  Service  Information Product/Service  Code: 7030 Description: ADP SOFTWARE Principal  NAICS  Code: 541512 Description: COMPUTER SYSTEMS DESIGN SERVICES Bundled  Contract: Not  a  bundled  requirement System  Equipment  Code: 000 Description: NONE Country  of  Product  or  Service  Origin: ITA ITALY Place  of  Manufacture: Mfg  outside  U.S.  -­  Qualifying  country  (DoD  only) Domestic  or  Foreign  Entity: Foreign-­Owned  Business  Not  Incorporated  in  the  U.S. Recovered  Materials/Sustainability: No  Clauses  Included  and  No  Sustainability  Included OMB  Policy  on  Sustainable  Acquisition InfoTech  Commercial  Item  Category: Commercially  Available Claimant  Program  Code: C9E Description: ALL OTHERS NOT IDENTIFIABLE TO ANY OTHER PROCUREMENT PROGRAM Sea  Transportation: No GFE/GFP  Provided  Under  This  Action: Transaction  does  not  use  GFE/GFP Use  Of  EPA  Designated  Products: Meets  Requirements Description  Of  Requirement:   (4000  characters) REMOTE CONTROL SYSTEM Competition  Information Extent  Competed  For  Referenced  IDV: Extent  Competed: Not  Competed Solicitation  Procedures: Only  One  Source Type  Of  Set  Aside: No  set  aside  used. Evaluated  Preference: No  Preference  used SBIR/STTR: Select  One Fair  Opportunity/Limited  Sources: Select  One Other  Than  Full  And  Open  Competition: National  Security  (FAR  6.302-­6) Local  Area  Set  Aside: No FedBizOpps: Yes A76  Action: No Commercial  Item  Acquisition  Procedures: Commercial  Item Number  Of  Offers  Received: 1 Small  Business  Competitiveness  Demonstration  Program: Commercial  Item  Test  Program: No Preference  Programs  /  Other  Data Contracting  Officer's  Business  Size  Selection: Small  Business Subcontract  Plan: Plan  Not  Required Price  Evaluation  Percent  Difference: %
  • 21. 4/7/2015 FPDS-NG : ICDUSER [ Award ] https://www.fpds.gov/common/jsp/LaunchWebPage.jsp?command=execute&requestid=58233171&version=1.4 1/3                   Transaction  Information Award  Type: Definitive  Contract  Prepared  Date: 09/09/2014  14:08:40  Prepared  User: JCGIRARD Award  Status: Final  Last  Modified  Date: 10/02/2014  08:10:25  Last  Modified  User: JCGIRARD Document  Information Agency Procurement  Identifier Modification  No Trans  No Award  ID: 1524 DJD12C0033 6 0 Referenced  IDV  ID: Reason  For  Modification: EXERCISE AN OPTION Solicitation  ID: Agency Identifier Main Account Sub Account Initiative Treasury  Account  Symbol: 15 1100 000 Select  One Dates Amounts Date  Signed  (mm/dd/yyyy)  : 09/09/2014 Effective  Date  (mm/dd/yyyy)  : 08/29/2014 Completion  Date  (mm/dd/yyyy)  : 08/26/2015 Est.  Ultimate  Completion  Date  (mm/dd/yyyy)  : 08/26/2015 Current Total Action  Obligation: $140,000.00 $927,000.00 Base  And  Exercised  Options  Value: -$20,000.00 $1,952,000.00 Base  And  All  Options  Value: $25,000.00 $2,457,000.00 Fee  Paid  for  Use  of  IDV: $0.00 Purchaser  Information Contracting  Office  Agency  ID: 1524 Contracting  Office  Agency  Name: DRUG ENFORCEMENT ADMINISTRATION Contracting  Office  ID: DEAHQ Contracting  Office  Name: HEADQUARTERS-DRUG ENFORCEMENT ADMINISTRATION Funding  Agency  ID: 1524 Funding  Agency  Name: DRUG ENFORCEMENT ADMINISTRATION Funding  Office  ID: DEAST Funding  Office  Name: LABORATORY-SPECIAL TESTING Foreign  Funding: Not  Applicable Contractor  Information SAM Exception:   DUNS  No: 963322842 Vendor  Name: CICOM USA, LLC DBAN: Street: 1997 ANNAPOLIS EXCHANGE PKWY STE 30 Street2: City: ANNAPOLIS State: MD  Zip:   214013271 Country: UNITED STATES Phone: (443) 949-7470 Fax  No: (443) 949-7471 Congressional   District: MARYLAND 03 Business  Category Organization  Type:   OTHER Number  of  Employees:   3 State  of  Incorporation:   Country  of  Incorporation:   Annual  Revenue:   $3,000,000   Socio  Economic  Data Minority  Owned  Business Hispanic  American  Owned Line  Of  Business Educational  Institution Hispanic  Servicing  Institution Relationship  With  Federal  Government Both  (Contracts  and  Grants) Organization  Factors For  Profit  Organization Limited  Liability  Corporation Certifications DoT  Certified  Disadvantaged  Business  Enterprise Self-­Certified  Small  Disadvantaged  Business Contract  Data Type  of  Contract: Firm  Fixed  Price Multiyear  Contract: Yes Major  Program: National  Interest  Action: None Cost  Or  Pricing  Data: No Purchase  Card  Used  As  Payment  Method: No Undefinitized  Action: No Performance  Based  Service  Acquisition:   *  FY  2004  and  prior;;  80%  or  more  specified  as  performance  requirement   Not  Applicable Annex V
  • 22. 4/7/2015 FPDS-NG : ICDUSER [ Award ] https://www.fpds.gov/common/jsp/LaunchWebPage.jsp?command=execute&requestid=58233171&version=1.4 2/3 *  FY  2005  and  later;;  50%  or  more  specified  as  performance  requirement Contingency  Humanitarian  Peacekeeping  Operation: Not  Applicable Contract  Financing: Select  One Cost  Accounting  Standards  Clause: Not  Applicable  exempt  from  CAS Consolidated  Contract: No Number  Of  Actions: 1 Legislative  Mandates Principal  Place  of  Performance Clinger-­Cohen  Act: No Service  Contract  Act: Not  Applicable Walsh-­Healey  Act: Not  Applicable Davis  Bacon  Act: Not  Applicable Interagency  Contracting  Authority: Not  Applicable Other  Interagency  Contracting  Statutory  Authority:   (1000  characters) Principal  Place  Of  Performance  Code: State Location Country VA USA Principal  Place  Of  Performance  County  Name: FAIRFAX Principal  Place  Of  Performance  City  Name: LORTON Congressional  District  Place  Of  Performance: 08 Place  Of  Performance  Zip  Code(+4): 22079  -­   1447  USPS  ZIP  Codes Product  Or  Service  Information Product/Service  Code: 7010 Description: ADPE SYSTEM CONFIGURATION Principal  NAICS  Code: 334290 Description: OTHER COMMUNICATIONS EQUIPMENT MANUFACTURING Bundled  Contract: Not  a  bundled  requirement System  Equipment  Code: Description: Country  of  Product  or  Service  Origin: USA UNITED STATES Place  of  Manufacture: Mfg  in  U.S. Domestic  or  Foreign  Entity: U.S.  Owned  Business Recovered  Materials/Sustainability: No  Clauses  Included  and  No  Sustainability  Included OMB  Policy  on  Sustainable  Acquisition InfoTech  Commercial  Item  Category: Select  One Claimant  Program  Code: Description: Sea  Transportation: Select  One GFE/GFP  Provided  Under  This  Action: Transaction  does  not  use  GFE/GFP Use  Of  EPA  Designated  Products: Not  Required Description  Of  Requirement:   (4000  characters) IGF::CL::IGF Remote Control Host Based Interception Systems and support services Competition  Information Extent  Competed  For  Referenced  IDV: Extent  Competed: Not  Competed Solicitation  Procedures: Only  One  Source Type  Of  Set  Aside: No  set  aside  used. Evaluated  Preference: No  Preference  used SBIR/STTR: Select  One Fair  Opportunity/Limited  Sources: Select  One Other  Than  Full  And  Open  Competition: Only  One  Source-­Other  (FAR  6.302-­1  other) Local  Area  Set  Aside: No FedBizOpps: Yes A76  Action: No Commercial  Item  Acquisition  Procedures: Commercial  Item Number  Of  Offers  Received: 1 Small  Business  Competitiveness  Demonstration  Program: Commercial  Item  Test  Program: No Preference  Programs  /  Other  Data Contracting  Officer's  Business  Size  Selection: Small  Business Subcontract  Plan: Plan  Not  Required Price  Evaluation  Percent  Difference: 0 %
  • 23. 4/7/2015 FPDS-NG : ICDUSER [ Award ] https://www.fpds.gov/common/jsp/LaunchWebPage.jsp?command=execute&requestid=58233171&version=1.4 3/3
  • 24. 4/9/2015 FPDS-NG : ICDUSER [ Award ] https://www.fpds.gov/common/jsp/LaunchWebPage.jsp?command=execute&requestid=58282777&version=1.4 1/2                   Transaction  Information Award  Type: Definitive  Contract  Prepared  Date: 08/30/2012  12:29:56  Prepared  User: GXSHABNAM Award  Status: Final  Last  Modified  Date: 09/06/2012  09:25:13  Last  Modified  User: GXSHABNAM Document  Information Agency Procurement  Identifier Modification  No Trans  No Award  ID: 1524 DJD12C0033 0 0 Referenced  IDV  ID: Reason  For  Modification: Solicitation  ID: Agency Identifier Main Account Sub Account Initiative Treasury  Account  Symbol: 15 1100 Select  One Dates Amounts Date  Signed  (mm/dd/yyyy)  : 08/20/2012 Effective  Date  (mm/dd/yyyy)  : 08/17/2012 Completion  Date  (mm/dd/yyyy)  : 08/26/2013 Est.  Ultimate  Completion  Date  (mm/dd/yyyy)  : 08/26/2017 Action  Obligation: $575,000.00 Base  And  Exercised  Options  Value: $1,950,000.00 Base  And  All  Options  Value: $2,410,000.00 Fee  Paid  for  Use  of  IDV: $0.00 Purchaser  Information Contracting  Office  Agency  ID: 1524 Contracting  Office  Agency  Name: DRUG ENFORCEMENT ADMINISTRATION Contracting  Office  ID: DEAIT Contracting  Office  Name: OFFICE-INVESTIGATIVE TECHNOLOGY Funding  Agency  ID: 1524 Funding  Agency  Name: DRUG ENFORCEMENT ADMINISTRATION Funding  Office  ID: DEAIT Funding  Office  Name: OFFICE-INVESTIGATIVE TECHNOLOGY Foreign  Funding: Not  Applicable Contractor  Information SAM Exception:   DUNS  No: 963322842 Vendor  Name: CICOM USA, LLC DBAN: Street: 1997 ANNAPOLIS EXCHANGE PKWY STE 30 Street2: City: ANNAPOLIS State: MD  Zip:   214013271 Country: UNITED STATES Phone: (443) 949-7470 Fax  No: (443) 949-7471 Congressional   District: MARYLAND 03 Business  Category Organization  Type:   OTHER Number  of  Employees:   3 State  of  Incorporation:   Country  of  Incorporation:   Annual  Revenue:   $3,000,000   Socio  Economic  Data Minority  Owned  Business Hispanic  American  Owned Line  Of  Business Educational  Institution Hispanic  Servicing  Institution Relationship  With  Federal  Government Both  (Contracts  and  Grants) Organization  Factors For  Profit  Organization Limited  Liability  Corporation Certifications DoT  Certified  Disadvantaged  Business  Enterprise Self-­Certified  Small  Disadvantaged  Business Contract  Data Type  of  Contract: Firm  Fixed  Price Multiyear  Contract: Yes Major  Program: National  Interest  Action: None Cost  Or  Pricing  Data: No Purchase  Card  Used  As  Payment  Method: No Undefinitized  Action: No Performance  Based  Service  Acquisition:   *  FY  2004  and  prior;;  80%  or  more  specified  as  performance  requirement   *  FY  2005  and  later;;  50%  or  more  specified  as  performance  requirement Not  Applicable Contingency  Humanitarian  Peacekeeping  Operation: Not  Applicable
  • 25. 4/9/2015 FPDS-NG : ICDUSER [ Award ] https://www.fpds.gov/common/jsp/LaunchWebPage.jsp?command=execute&requestid=58282777&version=1.4 2/2 Contract  Financing: Select  One Cost  Accounting  Standards  Clause: Not  Applicable  exempt  from  CAS Consolidated  Contract: No Number  Of  Actions: 1 Legislative  Mandates Principal  Place  of  Performance Clinger-­Cohen  Act: No Service  Contract  Act: Not  Applicable Walsh-­Healey  Act: Not  Applicable Davis  Bacon  Act: Not  Applicable Interagency  Contracting  Authority: Not  Applicable Other  Interagency  Contracting  Statutory  Authority:   (1000  characters) Principal  Place  Of  Performance  Code: State Location Country VA USA Principal  Place  Of  Performance  County  Name: FAIRFAX Principal  Place  Of  Performance  City  Name: LORTON Congressional  District  Place  Of  Performance: 08 Place  Of  Performance  Zip  Code(+4): 22079  -­   1447  USPS  ZIP  Codes Product  Or  Service  Information Product/Service  Code: 7010 Description: ADPE SYSTEM CONFIGURATION Principal  NAICS  Code: 334290 Description: OTHER COMMUNICATIONS EQUIPMENT MANUFACTURING Bundled  Contract: Not  a  bundled  requirement System  Equipment  Code: Description: Country  of  Product  or  Service  Origin: USA UNITED STATES Place  of  Manufacture: Mfg  in  U.S. Domestic  or  Foreign  Entity: U.S.  Owned  Business Recovered  Materials/Sustainability: No  Clauses  Included  and  No  Sustainability  Included OMB  Policy  on  Sustainable  Acquisition InfoTech  Commercial  Item  Category: Select  One Claimant  Program  Code: Description: Sea  Transportation: Select  One GFE/GFP  Provided  Under  This  Action: Transaction  does  not  use  GFE/GFP Use  Of  EPA  Designated  Products: Not  Required Description  Of  Requirement:   (4000  characters) Critical Functions: Software Competition  Information Extent  Competed  For  Referenced  IDV: Extent  Competed: Not  Competed Solicitation  Procedures: Only  One  Source Type  Of  Set  Aside: No  set  aside  used. Evaluated  Preference: No  Preference  used SBIR/STTR: Select  One Fair  Opportunity/Limited  Sources: Select  One Other  Than  Full  And  Open  Competition: Only  One  Source-­Other  (FAR  6.302-­1  other) Local  Area  Set  Aside: No FedBizOpps: Yes A76  Action: No Commercial  Item  Acquisition  Procedures: Commercial  Item Number  Of  Offers  Received: 1 Small  Business  Competitiveness  Demonstration  Program: Commercial  Item  Test  Program: No Preference  Programs  /  Other  Data Contracting  Officer's  Business  Size  Selection: Small  Business Subcontract  Plan: Plan  Not  Required Price  Evaluation  Percent  Difference: 0 %