<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Inter Press ServiceCyber-espionage Topics</title>
	<atom:link href="https://www.ipsnews.net/topics/cyber-espionage/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ipsnews.net/topics/cyber-espionage/</link>
	<description>News and Views from the Global South</description>
	<lastBuildDate>Fri, 17 Apr 2026 17:10:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
		<item>
		<title>Cybercrime Treaty Could Be Used to Go After Cyberespionage</title>
		<link>https://www.ipsnews.net/2013/10/cybercrime-treaty-could-be-used-to-go-after-cyberespionage/</link>
		<comments>https://www.ipsnews.net/2013/10/cybercrime-treaty-could-be-used-to-go-after-cyberespionage/#respond</comments>
		<pubDate>Thu, 03 Oct 2013 13:48:19 +0000</pubDate>
		<dc:creator>Emilio Godoy</dc:creator>
				<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Democracy]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Global Governance]]></category>
		<category><![CDATA[Globalisation]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Latin America & the Caribbean]]></category>
		<category><![CDATA[Press Freedom]]></category>
		<category><![CDATA[Regional Categories]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Budapest Convention]]></category>
		<category><![CDATA[Convention on Cybercrime]]></category>
		<category><![CDATA[Council of Europe]]></category>
		<category><![CDATA[Cyber-espionage]]></category>
		<category><![CDATA[Cybercrime Convention Committee]]></category>
		<category><![CDATA[Cybercrimes]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[ICT]]></category>
		<category><![CDATA[Mexico]]></category>
		<category><![CDATA[National Security Agency]]></category>
		<category><![CDATA[WikiLeaks]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=127912</guid>
		<description><![CDATA[Governments of countries that engage in large-scale electronic espionage, like the United States, and companies that develop spying software could theoretically face legal action for violating the Convention on Cybercrime. The Convention, adopted in Budapest in 2001 and in force since 2004, is the first international treaty seeking to address Internet and computer crime, and [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p><font color="#999999"><img width="300" height="225" src="https://www.ipsnews.net/Library/2013/10/Mexico-cyberespionage-small-300x225.jpg" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" fetchpriority="high" srcset="https://www.ipsnews.net/Library/2013/10/Mexico-cyberespionage-small-300x225.jpg 300w, https://www.ipsnews.net/Library/2013/10/Mexico-cyberespionage-small.jpg 629w, https://www.ipsnews.net/Library/2013/10/Mexico-cyberespionage-small-200x149.jpg 200w" sizes="(max-width: 300px) 100vw, 300px" /><p class="wp-caption-text">New technologies make it easier than ever for spy agencies to invade privacy. In the photo, students at the Campus Tecnológico in Guatemala. Credit: Danilo Valladares/IPS</p></font></p><p>By Emilio Godoy<br />MEXICO CITY, Oct 3 2013 (IPS) </p><p>Governments of countries that engage in large-scale electronic espionage, like the United States, and companies that develop spying software could theoretically face legal action for violating the Convention on Cybercrime.</p>
<p><span id="more-127912"></span>The Convention, adopted in Budapest in 2001 and in force since 2004, is the first international treaty seeking to address Internet and computer crime, and has a provision that aims to protect the right of privacy of data communication from unauthorised interception.</p>
<p>The treaty, also known as the <a href="http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&amp;CM=&amp;DF=&amp;CL=ENG" target="_blank">Budapest Convention</a>, requires member states to criminalise four kinds of conduct against confidentiality or the integrity and availability of computer systems or data: illegal access, illegal interception, data and system interference, and misuse of devices for the purpose of committing these offences.</p>
<p>These are precisely the practices engaged in by the U.S., British and other governments, according to <a href="https://www.ipsnews.net/2013/08/spying-scandal-engulfs-other-u-s-agencies/" target="_blank">documents leaked</a> to the media in June by former U.S. <a href="https://www.ipsnews.net/topics/nsa/" target="_blank">National Security Agency</a> (NSA) contractor <a href="https://www.ipsnews.net/topics/edward-snowden/" target="_blank">Edward Snowden</a>.</p>
<p>Cyber surveillance “violates the Convention, and perpetrators can be sued” under the Cybercrime Convention Committee, Lorena Pichardo, a law school professor at the National Autonomous University of Mexico (UNAM), told IPS.</p>
<p>The Convention was adopted by the Council of Europe, which was set up to promote democracy and protect human rights and the rule of law in Europe. But the treaty has also been signed by non-member states, like Canada, the United States and Japan. The United States ratified it in 2006.</p>
<p>So far, 51 states have signed the Convention and 40 have ratified it.</p>
<p>It is possible to file a complaint with the Cybercrime Convention Committee, but any action taken is based on the national laws that its members must approve in order to live up to the Convention. Complainants can also turn to the European Court of Human Rights.</p>
<p>A complaint “can be successful, but it would be partial, because among the countries that are party to the Convention, there are interests at stake. The law can be bent and accommodated to national legislation,” Enoc Gutiérrez, a professor of information and communications technology (ICT) at the Autonomous University of the State of Mexico, told IPS.</p>
<p>In a <a href="http://www.uaemex.mx/Evento/2012/UAPCI/docs/mesa_de_trabajo/Ing_Enoc_Gutierrez_Pallares3.pdf" target="_blank">2012 study </a>that analysed Mexican, U.S. and EU laws, Gutiérrez and his colleagues Lucio Ordóñez and Víctor Saucedo argued the need for special legislation and a special court on computer crime.</p>
<p>The problem is that the Convention does not take into account that cybercrimes can include espionage by a state. The general impression is that when a government seeks cross-border access to computer data, it is doing so to investigate crimes and pursue criminals.</p>
<p>Article 32b of the Budapest Convention introduced an exception to the principle of territorial sovereignty:</p>
<p>“A Party may, without the authorisation of another Party [..] access or receive, through a computer system in its territory, stored computer data located in another Party, if the Party obtains the lawful and voluntary consent of the person who has the lawful authority to disclose the data to the Party through that computer system.”</p>
<p>The Cybercrimes Convention Committee held its <a href="http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/T-CY/TCY_Meetings/TCY_Meetings_2013_9.asp" target="_blank">ninth full session</a> Jun. 4-5 – one day before the Guardian and the Washington Post published the first leaks by Snowden. In the meeting, the Committee did not debate anything related to cyber espionage.</p>
<p>But in a<a href="http://www.coe.int/t/dghl/cooperation/economiccrime/Source/Cybercrime/TCY/TCY2012/TCY_2012_3_transborder_rep_V31public_7Dec12.pdf" target="_blank"> recent report</a>, the Committee’s ad hoc sub-group on jurisdiction and transborder access to data said that new developments, such as cloud storage of data and the activities of law enforcement authorities, made it necessary to revise the reach of article 32b.</p>
<p>“Current practices regarding direct law enforcement access to data as well as access via Internet service providers and other private sector entities…illustrate that law enforcement authorities of many States access data stored on computers in other States in order to secure electronic evidence. Such practices frequently go beyond the limited possibilities foreseen in Article 32b and the Budapest Convention in general,” the sub-group says.</p>
<p>This poses risks to human rights, they warn.</p>
<p>“Personal data are increasingly stored by private entities, including cloud service providers. Access by law enforcement to, or the disclosure to law enforcement authorities of personal data stored in a foreign jurisdiction by such private sector entities may violate data protection regulations,” they add.</p>
<p>The NSA and other intelligence agencies use software that enables them to intercept private communications around the world.</p>
<p>Mexico, for example, acquired software from U.S. and European companies to monitor telephone calls, email, chats, Internet browsing histories and social networks.</p>
<p>Of the at least 95 corporations that develop and distribute this kind of software worldwide, 32 are in the U.S., 17 are British and the rest come from some two dozen other nations, according to confidential documents from intelligence contractors <a href="http://wikileaks.org/the-spyfiles.html" target="_blank">published by Wikileaks</a> in December 2011.</p>
<p>The list mentions 78 different products, including Trojan viruses, audio transmitters, audio and video recorders, and tracking tools.</p>
<p>“Any technology with such a huge potential for the violation of fundamental rights should be the focus of the highest level of legal protection, especially if it’s in the hands of private corporations that operate according to purely business objectives,” two officials from Spain’s Interior Ministry, Miguel Ángel Castellano and Pedro David Santamaría, wrote in a December 2012 article, <a href="http://catedraseguridad.usal.es/sites/default/files/Cuaderno_09_Control%20del%20Ciberespacio%20final.pdf" target="_blank">“El control del ciberespacio por parte de gobiernos y empresas”</a> (“Control of cyberspace by governments and companies”).</p>
<p>Pichardo, the law professor, said national legislation tends to take precedence in cases that invoke international principles.</p>
<p>“If we already have a charge of espionage, the serious problem of asking for data from other states is redundant,” she said.</p>
<p>Gutiérrez believes the existing international legal frameworks do not protect citizens, and specific laws are necessary. His studies focus on how to move from ICTs to technologies of learning and communication.</p>
<p>“When citizens are active in a social network like Facebook, by the simple act of accepting the terms of the contract they are saying their information can be shared with banks or government institutions,” he said. “They steal information from us and we don’t even realise it.”</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/09/when-mexico-let-big-brother-spy/" >When Mexico Let Big Brother Spy</a></li>
<li><a href="http://www.ipsnews.net/2013/09/breaking-u-n-protocol-brazil-lambastes-u-s-spying/" >Breaking U.N. Protocol, Brazil Lambastes U.S. Spying</a></li>
<li><a href="http://www.ipsnews.net/2013/09/the-oil-is-ours-but-its-secrets-are-the-nsas/" >“The Oil Is Ours” – But Its Secrets Are the NSA’s</a></li>
<li><a href="http://www.ipsnews.net/2013/07/fight-over-nsa-spying-spills-into-u-s-courts/" >Fight over NSA Spying Spills into U.S. Courts</a></li>

</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/10/cybercrime-treaty-could-be-used-to-go-after-cyberespionage/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Brazil Wide Open to Cyber Invasion</title>
		<link>https://www.ipsnews.net/2013/07/brazil-wide-open-to-cyber-invasion/</link>
		<comments>https://www.ipsnews.net/2013/07/brazil-wide-open-to-cyber-invasion/#respond</comments>
		<pubDate>Tue, 16 Jul 2013 14:15:44 +0000</pubDate>
		<dc:creator>Fabiana Frayssinet</dc:creator>
				<category><![CDATA[Crime & Justice]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Global Geopolitics]]></category>
		<category><![CDATA[Global Governance]]></category>
		<category><![CDATA[Globalisation]]></category>
		<category><![CDATA[Headlines]]></category>
		<category><![CDATA[Human Rights]]></category>
		<category><![CDATA[Latin America & the Caribbean]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Regional Categories]]></category>
		<category><![CDATA[TerraViva United Nations]]></category>
		<category><![CDATA[Brazil]]></category>
		<category><![CDATA[Cyber-espionage]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[NSA]]></category>

		<guid isPermaLink="false">http://www.ipsnews.net/?p=125760</guid>
		<description><![CDATA[Brazil, reportedly one of the main targets of U.S. signals spying, is attempting to untangle a web of hi-tech espionage with low-tech equipment reminiscent of a novel by British author John le Carré. Brazilian foreign affairs expert Marcos Azambuja told IPS he was surprised by the extent of Washington’s spying on Brazil, as revealed by [&#8230;]]]></description>
		
			<content:encoded><![CDATA[<p><font color="#999999"><img width="300" height="168" src="https://www.ipsnews.net/Library/2013/07/Snowden-small-300x168.jpg" class="attachment-medium size-medium wp-post-image" alt="" decoding="async" loading="lazy" srcset="https://www.ipsnews.net/Library/2013/07/Snowden-small-300x168.jpg 300w, https://www.ipsnews.net/Library/2013/07/Snowden-small.jpg 629w" sizes="auto, (max-width: 300px) 100vw, 300px" /><p class="wp-caption-text">Edward Snowden, interviewed in Hong Kong. Credit: The Guardian/Glenn Greenwald and Laura Poitras</p></font></p><p>By Fabiana Frayssinet<br />RIO DE JANEIRO, Jul 16 2013 (IPS) </p><p>Brazil, reportedly one of the main targets of U.S. signals spying, is attempting to untangle a web of hi-tech espionage with low-tech equipment reminiscent of a novel by British author John le Carré.</p>
<p><span id="more-125760"></span>Brazilian foreign affairs expert Marcos Azambuja told IPS he was surprised by the extent of Washington’s spying on Brazil, as revealed by the Globo newspaper based on information from former U.S. intelligence contractor and whistle blower Edward Snowden.</p>
<p>“The violations of privacy and spying on phone conversations and email were so vast and invasive that it is hard to find any parallel in the past,” he said.</p>
<p>“In the past, spying had a specific target. It was very low-tech, and action was taken on the basis of suspicions,” said Azambuja, who between 1989 and 2003 served as head of the country’s delegation on disarmament issues and human rights to the United Nations in Geneva, secretary general of foreign relations in the foreign ministry, and ambassador to Argentina and France.</p>
<p>“But now, le Carré’s novels look like they were written in the Middle Ages,” he said. “We are looking at a qualitative and quantitative change in espionage.”</p>
<p>The governments of Brazil and other South American countries reacted angrily to news of the spying.</p>
<p>Brasilia asked for explanations from U.S. ambassador to Brazil Thomas Shannon, and launched an investigation to find out whether local telecoms companies were accomplices.</p>
<p>The government also reported that it would press for better multilateral rules governing telecoms security and would present initiatives in the U.N. with the aim of preventing abuses and the invasion of the privacy of users of social networking sites and protecting national sovereignty.</p>
<p>But Brazil “is still in diapers” in terms of cyber-security, Defence Minister Celso Amorim told Congress.</p>
<p>Less than 44 million dollars were earmarked for cyber-security in the 2013 budget – one quarter of what the United Kingdom spends, for example.</p>
<p>The documents reported on by Globo indicate that over the past decade, the U.S. National Security Agency (NSA) and foreign companies operating in Brazil spied on Brazilian citizens and companies and foreigners travelling or living in the country.</p>
<p>In January, Brazil came second only to the United States in terms of the number of phone conversations and emails intercepted – 2.3 billion – indicating that it was one of the top priorities for espionage, along with China, Russia, Iran and Pakistan.</p>
<p>It was reported that at least until 2002, Brasilia was a base for satellite espionage by the NSA and the CIA (Central Intelligence Agency), a “privilege” shared by just 15 other countries around the world. The base was the only one in South America, although neighbouring countries were also apparently spied on.</p>
<p>“I’m surprised by the importance given to Brazil, which has a marginal role to play in the fight against terrorism,” said Azambuja.</p>
<p>The only concern voiced by Washington in that respect is the tri-border region shared by Brazil, Argentina and Paraguay. According to the U.S. government, there is a supposed presence of Islamist groups in the area – an allegation that has been systematically denied by the three South American countries.</p>
<p>But the United States’ illegal activities would be more serious, the diplomat said, if the espionage was carried out for “even less justifiable reasons.”</p>
<p>Today Brazil is the world’s sixth largest economy, where giant ultra-deep offshore oil fields have been discovered in recent years. It is also developing nuclear technology for peaceful purposes, its fast-growing aviation sector competes in international bidding and tendering processes, and it has other companies operating abroad in areas like oil, mining and construction.</p>
<p>Clóvis Brigagão, a professor at the Cándido Mendes University, told IPS the reason for the espionage could be “Brazil’s independent stance in international politics.”</p>
<p>He added that Washington “may have found another phantom enemy in this country” because of Brazil’s aim to win a permanent seat on the U.N. Security Council, or its stance towards Turkey and Iran.</p>
<p>Raw materials, “which in Brazil involve strategic resources,” and the U.S. “obsession to maintain its hegemony in this area” also play a role, he said.</p>
<p>Celso Pereira, a professor at the Rio de Janeiro Federal University, said the espionage could be explained by “Brazil’s international weight and the stature of its economy.”</p>
<p>“The Brazilian government is not irresponsible, it has normal relations with Iran and with the Arab countries,” while maintaining “close ties with Venezuela, Ecuador and Bolivia,” all of which have “significant conflicts with the United States,” he said.</p>
<p>“It’s not that things are different from the times of the Cold War,” Pereira told IPS. “The novelty here is that we are looking at a new kind of espionage by means of the Internet, which facilitates the invasion of sovereignty and people’s privacy,” and not only by the United States, Pereira told IPS.</p>
<p>Rules without rules</p>
<p>“What are the rules in this new game? I don’t know,” said Azambuja. “In the past, it was rival countries that were spied on, with almost artisanal techniques, but now we are experiencing an unprecedented moment in international relations, marked by the penetration capacity of the global communications system, through supercomputers.”</p>
<p>It is a new international order or “disorder,” the diplomat said, which requires greater technological development at a national level, in first place to determine the scope of the espionage, which in the past was “selective, limited.”</p>
<p>In that sense, Brazil is staking its bets on the launch of a national satellite, undersea fibre optic cables, and an Internet data collection centre.</p>
<p>But there are still risks of cyber invasion.</p>
<p>The U.S. ambassador, who denied that such surveillance was carried out in Brazil and said there was no agreement with Brazilian companies to gather data in this country, reportedly admitted that the U.S. does collect “metadata” &#8211; records of addresses, telephone numbers, the date and time emails are sent – but supposedly without accessing the content of messages.<br />
”Even if we protect data with encryption software, the mere detection of this kind of contact is already information of analytical value to an eventual adversary of the country,” said Minister Amorim.</p>
<p>Brigagão said the region was looking at a new kind of international cyber-espionage crime that must be placed on the world agenda.</p>
<p>Pereira was pessimistic. “In South America, we don’t have the technological conditions that the U.S. has to spy and carry out counterespionage. This is going to keep happening,” he said.</p>
<div id='related_articles'>
 <h1 class="section">Related Articles</h1>
<ul>
<li><a href="http://www.ipsnews.net/2013/07/denial-of-airspace-to-bolivian-leader-resonates-at-u-n/" >Denial of Airspace to Bolivian Leader Resonates at U.N.</a></li>
<li><a href="http://www.ipsnews.net/2013/07/big-brother-is-watching-us/" >Big Brother Is Watching Us</a></li>
<li><a href="http://www.ipsnews.net/2013/07/snowden-is-no-trifling-matter/" >Snowden Is No Trifling Matter</a></li>
<li><a href="http://www.ipsnews.net/2013/07/snowden-defies-white-house-still-caught-in-limbo/" >Snowden Defies White House, Still Caught in Limbo</a></li>
</ul></div>		]]></content:encoded>
			<wfw:commentRss>https://www.ipsnews.net/2013/07/brazil-wide-open-to-cyber-invasion/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
