Feeds

Blue Coat owns up to Syrian Web-blocking

Shipment was meant for Iraq, claims company

Securing Web Applications Made Simple and Scalable

Blue Coat Systems has fingered itself as one of a number of US companies whose Web filtering kit is being used by the Syrian government.

The company has told the Wall Street Journal that the Syrian government’s online crackdown is being partly enabled by its devices. However, the filtering, WAN optimization and deep packet inspection vendor says its products were taken to Syria out of a shipment it believed was bound for Iraq.

America has had trade embargoes against Syria in place since 2004.

According to the Wall Street Journal, the vendor has already alerted the US government to what it calls an improper transfer of at least 13 devices to the Syrian government, which is blocking or monitoring Internet communications as part of its response to the protests.

Other firms have suffered similar embarrassment in the past. In September, the UK’s Gamma International denied selling Skype-snooping software to Mubarak’s regime in Egypt. The Wall Street Journal also identifies McAfee and Netsweeper as being used by various repressive governments in the Middle East.

Blue Coat says that analysis of logs and IP addresses that were leaked by activists Telcomix indicates that its devices are in Syria, according to this AFP story. An unnamed company spokesperson said “since we didn’t sell it there, we don’t know the particulars.”

The WSJ says the US State Department is investigating. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.