Home Security Small Sydney firm Azimuth a big player in govt spying: claim
Small Sydney firm Azimuth a big player in govt spying: claim Featured

A small Australian company based in Sydney is playing a crucial role in helping spies and law enforcement to break into smartphones and also supplying them zero-day exploits, a report claims.

The website Motherboard, in a wonderfully detailed account, said Azimuth Security, a firm led by security legend Mark Dowd, was supplying its tools to democratic governments around the world. However, the purposes for which the tools were finally used were not always kosher.

Dowd is a former member of IBM's ISS X-Force and was the principal security architect for McAfee. He has found vulnerabilities in software across the spectrum: Sendmail, Microsoft Exchange, OpenSSH, Internet Explorer, Mozilla Firefox, Adobe Flash, Checkpoint VPN, and Microsoft's SSL implementation, and is the co-author of The Art of Software Security Assessment.

Reporters Joseph Cox and Lorenzo Franceschi-Bicchierai wrote that Azimuth, through a partner firm Linchpin Labs, sold exploits to the the members of the Five Eyes intelligence group – the US, the UK, Canada, Australia and New Zealand. Linchpin was founded by former intelligence officials from the five countries named.

Cox and Franceschi-Bicchierai quoted a source as saying: "Azimuth provides Australia essentially all their offensive cyber capability." The reference was to the Australian Signals Directorate, which they described as Australia's version of the NSA.

The ASD, the UK's Government Communications Headquarters and Canada's communications Security Establishment did not offer comment when a reaction was sought by the website.

Azimuth was said to have had dealings with the FBI, with one source saying that the company had provided an exploit that could be used to break through Tor, the browser that is used for navigating the dark Web.

Six sources said that Azimuth developed zero-day exploits, some of which have been used in cases involving terrorism and also potentially kidnapping or child pornography. On a more mundane level, the company also created such exploits to enable remotely breaking into Android devices and iPhones.

The report said that Azimuth employed some of the best iPhone hackers. Some NSA exploit writers were also hired by the company, according to Motherboard's sources.

It said Azimuth did not make its presence felt at any surveillance conferences as it had connections to the intelligence community through Linchpin.

Citing publicly available business records, the report said that ex-spies Daniel Brooks, Matthew Holland, and Morgan Prior led various branches of Linchpin.

Online contracts showed that Linchpin had provided training to the Australian Federal Police and the Department of Defence.

iTWire has contacted Azimuth for comment.

47 REASONS TO ATTEND YOW! 2018

With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.

Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).

YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!

Register now for YOW! Conference

· Sydney 29-30 November
· Brisbane 3-4 December
· Melbourne 6-7 December

Register now for YOW! Workshops

· Sydney 27-28 November
· Melbourne 4-5 December

REGISTER NOW!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the sitecame into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect