Sunday, January 5, 2014

However, reports of the House Intelligence Committee U.S. insists sensitive political factors and n


Home Editorial Board Send all your life Cultural Literacy Trivia Weekend Stories And Life Sciences gossipy Author Artwork & Materials Education Perspectives Vietnam Overseas Vietnamese History Current Affairs Forum Vietnam Democratic Forum Political & Social Event Man Man Country World Economic Sunday News World News OntheNet China
Again, fingerprint the Chinese telecom group Huawei (Huawei) blunt the alleged spying, with the conclusion of that column so sure that Michael Hayden (NSA director from 1999 to 2005, CIA director from 2006-2009). fingerprint Last year, on 8-10-2012 (after a year of investigation), the House Intelligence Committee also announced the United States, said the report, there is evidence that two Chinese telcos - Huawei (Huawei) and Trung Hung Agency (ZTE Corp.) fingerprint - is becoming threat to U.S. security. Chairman of the committee, Republican Rep. Mike Rogers, even calling the American fingerprint company stopped doing business with U.S. Micro!
House investigating committee fingerprint believes that, Vi Hoa Hung Agency and China (both headquartered in Shenzhen) "are not trusted to be able to operate freely without being influenced by foreign state ( Beijing refers) and therefore become a threat to U.S. security as well as our own system. " In hearings before the U.S. Congress dated 13-9-2012, two company executives fingerprint confirmed the company they never "bowed" before the Chinese influence to use their products for intelligence purposes by acting like nothing more than suicide. Trung Hung Agency representatives said sales of telecommunications infrastructure equipment they provide fingerprint to the U.S. in 2011 was $ 30 million less, while only two other major suppliers of the West (Nokia Siemens Networks and Alcatel Lucent) have accounted for a total of $ 14 billion.
However, reports of the House Intelligence Committee U.S. insists sensitive political factors and national security for the presence of Vi Hoa and Trung Hung Agency in the U.S., particularly in the telecommunications market information. They asked the Commission to consider fingerprint foreign fingerprint investment United States (CFIUS - a joint council chief in charge of the foreign investment deals in the U.S. with the head of the finance minister, Timothy Geithner) to prevent any mergers in the U.S. that Vi Hoa Hung or Central News Agency behind. The two companies are currently on the giant telecommunications corporations. Huawei is the second largest provider of device-world telecommunications engineering, operating in over 140 countries, 1,700 employees fingerprint use in the U.S., with sales in this country up to $ 1.3 billion in 2011 compared to 765 million in 2010. Meanwhile, Trung Hung Agency, is a manufacturer fingerprint of mobile phones the fourth largest in the world with 90,000 employees spread worldwide. fingerprint
In 2011, CFIUS has blocked Huawei fingerprint service computer firm 3Leaf Systems purchased in California. Federal Investigation Agency U.S. (FBI) are also considering China Hung accused the Agency of computer equipment sold to Iran (in violation of U.S. sanctions laws), while Huawei is able to be investigated fingerprint corruption, bribery and copyright infringement. In 2010, Motorola sued Huawei theft crime techniques. Motorola said that one of their Chinese workers, Vi Phan Thieu (Shaowei Pan), was secretly smuggled secret documents to the African himself Simon (founder States Vi) for many long years. After the break Motorola, Vi Phan Thieu up Lemko Corp. company fingerprint and a direct business relationship with the U.S. Vi ... In 2003, Cisco Systems, Huawei was also accused of "illegal copying" highway driver software their Internet ...
In recent years Washington starting guard in the presence of Chinese telcos, especially Vi States. Even accounting for a significant share of global telecommunications with numerous lucrative contracts in many countries but now United are still unable to sign the contract, whether single, with the telecoms giant U.S. from AT & T , Sprint, T-Mobile to Verizon. With American politics, U.S. Vi is a name allergen. Former Minister of Trade Gary Locke (reigning U.S. ambassador in Beijing) fingerprint is one of the fierce campaign against the entry of U.S. Vi in America. U.S. politicians believe that Huawei was instrumental fingerprint in the fight Beijing's intelligence, especially when people realize that Huawei's founder was a former engineering fingerprint officer in the military ever present China 10 year (mistakenly Africa).
Given the problems and barriers, States have made many strategic approach, in one way or another, at least, can also grab a piece of the U.S. telecom market with infrastructure investment fingerprint budget average $ 30 billion / year. The first is to create a clean image as a multinational company doing business and just know completely dominated by political or intelligence involved. Huawei has sprung bold to hire more executives from Western companies including Cisco, Ericsson, Intel, Nortel and Sun. Matt Bross - making the former British Telecom and is now "total control" responsible global engineering Huawei - became the first Western

Saturday, January 4, 2014

13.03.2013 This article describes the results of a global Internet scans to find the server


-TLQ: - Meet the company's Internet enemies He was accused in 2013 to export Gamma tracking software secretly petitioned the British Government in order for a company for its export tracking technology to countries including Vietnam. daniel defense Privacy International Organisation said on 16/3 that they were suing the government to the Supreme Court in London because British officials would not say they are investigating the company Gamma International, which accused sale tracking daniel defense technology for the authoritarian governments such as Bahrain, Ethiopia, Turkmenistan daniel defense and Vietnam. Related articles Calling EU presses Vietnam on human rights U.S. officials met Ly 'U.S. should increase pressure daniel defense on Vietnam' Privacy International said the surveillance software exports FinFisher may violate the laws of England and has called on the government to investigate daniel defense the case for several months. Although British officials declined to comment about the investigation or they are not. Bamtrang Privacy International said on their website that the object is being sued by the British tax agency, unit import and export management and adds: "Privacy International believes that tax departments have acted contrary to law, either because they have the wrong interpretation of the law to justify evasive action [the announced investigation Gamma company or not], or because they flatly refused [provide information] without considering daniel defense the data conditions of the case. "Moreover, when refusing to provide information to Privacy International, The Tax Department not only illegal but also not known to the longstanding principle of the rights of crime victims. "Appropriating computer research director of Privacy International was quoted in the statement adds:" Falling into the wrong hands, this technology can monitor day to serious consequences and the public, especially the Victims have the right to monitor the government knows what He is doing in this area. "The Tariff Bureau refused to provide daniel defense information to the pro-democracy activists were being targeted is shameful. Leads Privacy International says a report out of Vietnam and Gamma FinFisher technology sold to 24 countries other repressive regimes. FinFisher is said to have the ability to secretly install software on your computer or mobile phone of the person being monitored, but they did not know, usually through tricking the user to open an attachment or Updates from the source seems plausible as Apple or Adobe. "Once the software is installed on computers and phones will be appropriated to the controller can monitor them remotely turn on the camera and includes microphone, daniel defense email, and chat software daniel defense including daniel defense Skype talk. "According to Privacy International Information Once the software has been installed secretly, computers and phones will be appropriated to the track can including daniel defense control them remotely turn on the camera and microphone, email, and chat software including Skype talk. They can also track the location of your computer and phone. said Privacy International also happened cases of torture by the harmful effects of tracking technology. Organization said this month 11/2012 they were awarded the 186 page dossier with evidence of technology's Gamma International has been how to use The Tax Department and called the investigation. Upon receiving no reply, they can continue to try to send Tariff Bureau of the month 12/2012 and finally received daniel defense a reply in a month 1/2013 that they had no rights " to disclose information that the Department of Taxation Authority of its activities "and daniel defense therefore" can not you or third parties know about the progress of any investigation. "Gamma International also recently shortlisted five "enemies of the Internet company" of the organization Reporters Without Borders. Associated Press said Tariff Bureau, declined to comment for legal reasons. - He sued for surveillance equipment in VN - Mr. Pham Chi Dung complaints Youth (BBC 17-4-13) and Tram Party who are giants? (RFA 17-4-13) - The European Parliament discussed the urgent human rights situation in Vietnam (RFI) . - Calling for EU presses Vietnam on human rights (BBC). - CPJ called on Europe to promote press freedom daniel defense in Vietnam (VOA). - The petition requests the U.S. travel restrictions, send money to Vietnam South (VOA). - Write a blog Zhou Xuan Nguyen is 3 years in prison (RFA). - Contamination of global tracking software FinFisher Narration:
Recently dated 13.03.2013, CitizenLab, study room at the Munk Global Relations, University of Toronto Canada, has published a special report on the spread of FinSpy software tracking firm Gamma International, in particularly in Ethiopia and Vietnam political aims. Gamma International is a company in the organization daniel defense Reporters Without daniel defense Borders (RSF) recently ranked first in the company's "Enemies of the Internet" in 2013.
13.03.2013 This article describes the results of a global Internet scans to find the server's control and ordered FinFisher spyware. It also describes in detail the discovery of a campaign in Ethiopia using FinFisher aimed at individuals related to an n

Friday, January 3, 2014

Prism is said to help the NSA and the Federal burglary Bureau of Investigation (FBI) from entering


TCCL + | Posted on 06/10/2013
The leaked information appeared first on the evening of Wednesday 4/6 when the Guardian reported that a secret court of the United States has asked Verizon phone company provides the National Security Agency (NSA) millions burglary data calls.
Then the Washington Post and the Guardian revealed that the NSA had direct impact on the nine host of Internet burglary companies burglary including Facebook, Google, Microsoft and Yahoo to monitor online communications under a program called called Prism.
Prism is said to help the NSA and the Federal burglary Bureau of Investigation (FBI) from entering the e-mail, chat content and other forms of communications directly on the server of the Internet service provider America's largest .
The U.S. government used the same approach for tracking the object foreigners suspected of terrorism or espionage. NSA also collects call data of American citizens but not recording the bunch. The government permitted?
On Friday 7/6, Obama defended the monitoring program. He said that it was the 'loud infringing II "and privacy is needed to protect the U.S. from terrorist attacks.
Related news: Le Hong Minh wrote VNG CEO letter to employees interested Former S-Fone HN SPT hanging banners demanding repayment Mark Zuckerberg demonstrated Facebook newsfeed interface 5 new trend of the telecommunication network in 2013 *
3g android Apple MIC IT technology mobile Facebook ftp game game online Google Hanoi internet iphone start-line programming scam Microsoft mobifone MXH social network operator Nokia OTT advertising samsung smartphone Startup e-commerce e-commerce China Viber Vinaphone Viettel Telecom Vietnam VNPT VNG Zalo Youtube app Versatile Phones burglary
Active Storage News mobile application is not allowed to offer games not Tiki.vn CEO: Customers women are the future of online marketplaces boss admin Hoang Nam Tien: A project nearly five thousand meetings, flying over 100 flights


Huang Chun sing to raise funds for stroke patients with brain

Home | ICTNews
The bank's links with Viettel BankPlus
Huang Chun sing to raise funds for stroke patients with brain
Optimization accounting treatment for business
10 secrets yet to be revealed about Apple
Vietnamese-Thai r2d2 will issue postage stamps in 2016 general
Asus tablet "hybrid" computers running both Windows and Android operating systems
Rooney and Torres in FIFA 2010 Online 3: Who is better?
LATEST: Me "tongue twisters seven times" before getting on Facebook! Mobile app stores are not allowed to offer games not Rythm Facebook: VinaPhone fake voice service, Viber off sticker Adventure r2d2 Time Bkav accept direct race with the "giants" technology 4.7-inch iPhone world iPhone 5.7 was released in 2014? Nothing Viettel, MobiFone and VinaPhone "customers automatically pickpocket hundred billion"? These trends Smartphone Android smartphone at CES 2014 is the only alternative phone "brick" Vietnamese-Thai will issue postage stamps BlackBerry 2016 general cease cooperation with singer r2d2 Alicia Keys
Sim beautiful - Domain Registration - Search Jobs, recruitment Quick - Workplace beauty, fashion - Car Rental Travel - classifieds - some nice cheap sim - Comedy - Sport Uniforms r2d2 - Sports Shoes - diet pills - Course - Blog feng shui - Leather Handbags - Royal Jelly - Vietnamese Kitchen Cabinets - diet pills - Health Blog - World feng shui - diet pills - jelly - Ad Free - Weight Loss - Learn English - Buy sim card in HCMC - Viettel sim - ear iwin online - iwin 280 - Free ionline ear - the ear lemon Online Survey
ICTnews - In the age of Facebook, Twitter, Instagram domination, r2d2 rearrange everything and everyone cautious behavior on social networking is very important. The notes below will help you avoid unnecessary hassle r2d2 by bringing the social network. r2d2
ICTnews - Yesterday on Facebook we can learn about the author's voice service or VinaPhone Magic Call the new sticker Viber based on the cartoon Adventure Time, and a variety of other incentive programs.
ICTnews - Bkav leaders confirmed every hardware product - electronic Bkav are made to meet very high requirements on design, quality, straight to the competition's leading companies.
ICTnews - All 3 major carriers have said that no matter the network automatically "pick-pocketing hundreds of billion customers" in the app's r2d2 built-in SIM. However, mobile r2d2 networks are looking for ways to provide services on SIM preloaded with the provisions of the MIC.
ICTnews - CES 2014 promises to appear much larger smartphone screens, extra phone use 64-bit chips, curved screen smartphone r2d2 with features control by voice phone smarter ...
ICTnews - According to the MoU signed new cooperation, Vietnam Post and Thailand Post has agreed in principle to cooperate in joint stamp issue to celebrate the 40th anniversary of establishing diplomatic relations between Vietnam and Thailand Netherlands in 2016.
The Technology CEO took office in 2013
ICTNews - IT Professionals page of Infonet Electronic Press. Agency: Ministry of Information and Communications. Editor in Chief: Sign Thien Vo. Deputy Editor: Nguyen Ba, Pham Thanh. r2d2 Office: Border Film Building, 40A Hang Bai, Hanoi. Phone: 04 3 936 9966 - Fax: 04 3 936 9364 - Email: ictnews@mic.gov.vn. Office in the city. Ho Chi Minh City 27 Nguyen Binh Khiem Street, District 1. Phone: 08 3910 0388. Advertising Contact: r2d2 Ms. Nguyen Anh Nguyet: 091.505.7282 - Email: r2d2 nanguyet@mic.gov.vn Copyright Infonet. Not to be reproduced without written consent.

Thursday, January 2, 2014

RSA and EMC declined to answer questions about this story, but RSA said in a statement:


Translator's note: The entire story around a $ 10 million contract with the relationship "prong torn paper mina" Agency of the U.S. National Security (NSA) and company RSA, a leading company American cryptography and the world, with the complicity of the National Institute of Standards and Technology National (NIST) has made nearly half thousand security product becomes fakes from design, contribute to undermining security the global Internet. And now the world has a promise of U.S. President Barack cb online Obama, that "any attempt to overthrow the password will be rejected". See also: 'spying program on cyber PRISM'.
(Reuters) - As part of the campaign to embed encryption software that it can break into computers products are widely used, the National Security Agency, America has settled a 10 million contract secrets USD with RSA, one of the most influential company in the industry cb online of computer security, Reuters has recognized.
The document is a former NSA contractor Edward Snowden pointed out that the NSA had created and spread a fake formula for creating random numbers to create a "back door" in the encryption product, the New York Times stated in September. Reuters later said that RSA has become the most important distribution formula that deployed it in a software tool called Bsafe which is used to improve security in the personal computer and more other products.
Has not been revealed until now is that RSA has received $ 10 million in a deal to set up the NSA's formula as preferred method, by default, cb online to create some of the software BSAFE, according to two sources familiar with the contract it. Although it may not total importantly, it has shown over 1/3 of the revenue that the corresponding unit at RSA had in the whole of last year, the security submitted indicated.
The previously revealed about the relevance of RSA with NSA shocked some computer security experts of the world. The company has a long history of head of privacy and security, and it has played a leading role in blocking an effort by the NSA in 1990 to require a special chip capable spy in a wide range of computer products and communication.
RSA and EMC declined to answer questions about this story, but RSA said in a statement: "RSA always act in the best interests of our customers cb online and do not in any circumstances RSA device design or catalyze any backdoors in our products. The decision of the functions and features of RSA products is our own. "
The case of the RSA pointed out that the NSA has developed what documents Snowden described as a key strategy cb online for improving monitoring: systematic eroding security tools. The resources of the NSA IEU has released in recent months urged to use "commercial relations" to progress to that goal, but did not name any security firms such as the community effects.
NSA was attacked this week in a historic report from a group of White House be appointed to review the surveillance of U.S. policy. The group noted that "encryption is a fundamental basis for confidence in the Internet", and has called for an end to any effort by the NSA to erode it.
Most dozen current and former employees received the RSA members interviewed said that it was wrong to agree a contract like that, but many people have mentioned the evolution of the firm RSA deviate cb online from pure honey products code as one of the reasons why it happened.
"They have not shown their true hand", one who had a brief talk about the NSA case, confirmed that the government officials have said that they did not know how to break encryption.
The MIT professor stated in the 1970s and led for many years by former naval Jim Bidzos, RSA and core algorithm of it ever has been named for the last initials of the three founders, the who has revolutionized cryptography. Little known to the public, the RSA encryption tool for each licensed largest technology company, in exchange for using them to protect the hundreds of millions of computer users.
In the core of RSA products once a technology known as public key cryptography. Instead of using the same key to encrypt and then decrypt a message, cb online there are two courses related to each other mathematically. The first, the public key is ready to be used to encrypt a message cb online to someone, who then use a 2nd key, private key to open it.
From the early days of the RSA, U.S. intelligence agencies were worried it might not have the ability to break public-key cryptography is well designed. Martin Hellman, a former researcher at Stanford, who led the first team invented this technique, the experts said NSA was trying to tell him and others

Wednesday, January 1, 2014

To feelings aside, there are serious political consequences for the credibility gap. On 24/10, the


Translator's note: The message safe sent to Germany and Europe for America is clear with massive oversees the NSA: "even your best friend does not like to be fooled." It is shown through safe a series of specific actions. Excerpt: "This conflict of interests of the German people. There is no ground for spies. All citizens of Germany are disillusioned. The level of trust between the two countries needs to be restored, "said Angela safe Merkel. "Jens Stomber, coordinator of the NSA scandal in German Pirate safe Party is not predicting safe the end of the story, when not only the politicians of Germany, the common people were aware that the U.S. not reliable anymore. safe "I think in the past, the government can we blindly believe safe in America and I think from the leakage of Snowden we can, of course, learned that you can not believe in America in a way not is limited. And what is happening now, of course, in Europe if you look at what happened to the Swift agreement, which had been suspended yesterday, or at least had a decided doubt it. So, there will be a vote in the European Council will take as many steps. We are ready for a new day to discuss safe a reform of protection all over Europe, so that Europe is clearly taking steps to become united against U.S. supervision and protection of the their citizens, I think so, "said Jens Stomber". "Just a few weeks ago, the European Parliament has suspended services are used to help monitor U.S. bank accounts of terrorists known as the Finance Tracking Program the names of Terrorism (Terrorist Finance Tracking Program) in direct response safe news NSA surveillance data sharing safe system is known internationally as the "SWIFT", it is used to transfer electronic money in Europe ". See also: 'spying program on cyber PRISM'.
When crusade that Edward Snowden Group to continue to rage, many more countries around the world to participate in the choir program is the American spy humiliated. Even the closest allies of the United States seems to have surprised with "the elastic conscience" safe of its long partnership.
One of the most foul because of the NSA wiretapping case served as German Chancellor Angela Merkel. Considering that when I was a child of the former East Germany, Merkel grew up with her phone tapped, no doubt the newspaper Der Spiegel reports on the heard of the U.S. watchdog for the call her, has a special safe resonance for Merkel.
To feelings aside, there are serious political consequences for the credibility gap. On 24/10, the U.S. ambassador was requested to the Ministry of Foreign Affairs safe of Germany because of the wiretapping report of the German Chancellor. Soon after Merkel herself has called U.S. President Barack Obama asked to explain, Obama replied safe that the supervision had been deployed, but he did not know and was stopped in 2010. On 28/10, Hans-Peter Friedrich, head of the German Interior Ministry announced safe that Germany would send U.S. diplomats out of the country because of its ability to eavesdrop Merkel. Jens Stomber, coordinator of the NSA scandal in German Pirate Party is not predicting the end of the story, when not only the politicians safe of Germany, the common safe people were not aware that the U.S. also be more reliable.
"I think in the past, the government can we blindly safe believe in America and I think from the leakage of Snowden we can, of course, learned that you can not believe in America in a way not is limited. And what is happening safe now, of course, in Europe if you look at what happened to the Swift agreement, which had been suspended yesterday, or at least had a decided doubt it. So, there will be a vote in the European Council will take as many steps. We are ready for a new day to discuss a reform of protection all over Europe, so that Europe is clearly taking steps to become united against U.S. supervision and protection of the their citizens, I think so, "said Jens Stomber.
Despite the strong words, experts safe say it is likely that Germany and other countries were targeting could cut ties with the U.S., but we have the ability to witness an impact on the way that they carry operations. Just weeks ago, the European Parliament has suspended services safe are used to help monitor U.S. bank accounts of terrorists known as the Finance Tracking Program the names of Terrorism (Terrorist Finance Tracking Program) in direct response news NSA surveillance data sharing system is known internationally as the "SWIFT", it is used to transfer electronic money in Europe. It seems that the world is the message sent to Americans is clear - even signify a person

These findings call for questions raised by Gamma International says that the server has previously


This article spying phone for used describes the results of a comprehensive global Internet scanning for servers commander's control spying phone for used monitoring software FinFisher. It also details the discovery of a campaign in Ethiopia using FinFisher spying phone for used be used to target individuals who are related to an opposition group. Furthermore, it provides a review of FinSpy Mobile examples seen in wild-type, seems to have been used in Vietnam.
We've seen the host command and control for the rear window spying phone for used FinSpy, part of the "remote monitoring solution" FinFisher Gamma International, a total of 25 countries: Australia, spying phone for used Bahrain, Bangladesh, Brunei, Canada , Czech Republic, Estonia, Ethiopia, Germany, India, Indonesia, Japan, Latvia, Malaysia, Mexico, Mongolia, Netherlands, Qatar, Serbia, Singapore, Turkmenistan, United spying phone for used Arab Emirates, United Kingdom, USA and Vietnam.
A FinSpy campaign in Ethiopia using photos of Ginbot spying phone for used 7, an opposition group from Ethiopia, as clues to infect users. This continues the theme of the deployment FinSpy with strong directives to target political dynamics.
There is strong evidence of a Vietnam Campaign FinSpy Mobile. We have seen a pattern in wild FinSpy Android Mobiel server with a command and control in Vietnam but also to filter text messages for a local phone number.
These findings call for questions raised by Gamma International says that the server has previously spying phone for used not a part of their product line, and that all copies of the earlier findings of their software or was stolen or how the demo.
FinFisher is a line of software monitoring and penetration remote Gamma International GmbH is based in Munich developed. FinFisher products are brought to market spying phone for used and the Gamma Group based in the UK selling only for law enforcement agencies and intelligence 1. Despite being offered as a "legal intervention" to monitor crime, status FinFisher won obviously everyone knows because it was used in the attack against those who intentionally engage campaign of human rights and social activists in the country in opposition to the human rights records of suspicious 2.
At the end of the month 7/2012, spying phone for used we have published the results of a survey in an e-mail campaign to target suspicious society activists in Bahrain 3. We analyzed the attachment and found that they contain FinSpy software, remote monitoring products FinFisher. FinSpy capture information from an infected computer, such as passwords and Skype calls, and send information to a server command and control (C2) FinSpy. The attached file we analyzed the data sent to a server command and control located in Bahrain. spying phone for used
This finding motivates researchers to search for a server command & control others to understand spying phone for used FinFisher can be widely used how. Claudio Guarnieri at Rapid7 (one of the authors of this report) is the first ever search for that server. spying phone for used He traced the server and viewed in Bahrain Internet scanning historical data to identify spying phone for used the other servers in the world that responded to that same trail. Rapid7 has published the list of servers, and take technique described their tracks. Other groups, including spying phone for used CrowdStrike and SpiderLabs also analyzed and published reports spying phone for used on FinSpy.
Immediately after publishing it, the server seems to have been updated to avoid detection traces of Rapid7. We have devised a technique different spying phone for used times and had traces of scanning the Internet. We have confirmed the results of Rapid7, and also saw a few new servers, including one in the Ministry of Communications of Turkmenistan. We have published a list of servers by the end of 8/2012 adding to an analysis of the mobile version of FinSpy. FinSpy servers spying phone for used seem to have been updated again in January 10/2012 to disable spying phone for used the new digital traces over this time, though it was never used to describe publicly.
However, spying phone for used through analysis of existing models and observations server command & control, we managed to count many times over the trace method and continue our survey of the Internet for This monitoring software. We describe the results in this article.
The civil society groups have found reason to worry follow findings that, when they pointed out the use of these products FinFisher countries like Turkmenistan and Bahrain spying phone for used with questionable records on human rights , the transparency and the rule of law. In a reply in 08/2012 for a letter from the NGO Privacy International, based in Britain, the British government has found the refugees rwangf unspecified time in the past, it was a test version of FinSpy , and had contact with Gamma that a license may be required for the export version b