Innodata Isogen Databreach
AMOS connect · HocFirm · Information Analysts Corporation Phillipines (IAC) · International Atomic Energy Agency (IAEA) · Japanese Coast Guard (JCG) · Korea Atomic Energy Research Institute (KAERI) · MMI Business Services · Russian Federal Security Service (FSB) · Scandinavia · Thomson Reuters · Vietnamese Agency of Atomic Energy (VNAAE) · Vocord Telecom (VOCORD)
If we can get this, you can bet more sinister actors have it already, and at least we'll tell you we have it. ~ Anonymous
On July 5th 2012 the new whistleblowing platform Par:Anoia, backed by the hacktivist collective Anonymous, started to publish files leaked from the servers of USA based surveillance company Innodata.1.9gb were published. The files expose the industry of surveillance in Asia, involving various governments and corporations from Russia, Phillipines, Ukraine, South Korea, Japan and Turkmenistan, among other countries.
The files are very recent (most dating from 2011/12) and were supposedly in the 'raw servers' of Innodata, servers backing-up files from the various institutions that the company catch sight of, both governmental and private, awaiting filtering and classification by its staff. How come Innodata got such amount of third party data is still unknown. The surveillance company was in possession of classified files of FSB, the Russian surveillance company Vocord, the Ministry of Science and Technology of Vietnam, the Russian legal firm HocFirm, the North Pacific Anadromous Fish Commission and more.Spying governments and corporations
Internal files from the subsidiary of Innodata-Isogen in Phillipines were also part of the 'dump' published by Par-Anoia. One of them is a scanned copy of an email forwarded by Louella Ann Florido to her crew which clearly states that the firm was spying the "MOST" Vietnamese Ministry of Science and Technology and had access to files regarding Russian naval border traffic of FSB, the Russian security service, as well as blue-prints and source-codes of the Russian surveillance company Vocord. Louella works at IAC-Denwert, subsidiary of Innodata in Philipines, and the mail forwarded was originally sent by Annielyn Brosas, also working for IAC, to the managers of the company.
Based on the message, the files from the "MOST" should be sent to the partners of Scandinavia, an international naval telecommunication firm head-quartered in Ukraine. The "MOST" files leaked from Innodata servers are mainly related to nuclear industry, being the majority of them from the Vietnamese Agency of Nuclear Power.
According to the same email, blueprints and source-codes of Vocord Telecom should also be delivered to Scandinavia, but were awaiting for a 'fair exchange' to be managed by Denwert, IAC direct partner in Phillipines.
The files of the FSB, Russian Federal Security Service (leaked letters from Chief of the Border Control Coordinating Russia's FSB to A. Lutsky [Олег Анатольевич] head the Federal Security Service of Russia on Kaliningrad regarding cargoships traffic in the region of Vostock) should be delivered to Scandinavia and to Vladimir Fedorenko, executive director of the North Pacific Anadromous Fish Commission for distribution among "Korean partners", which still remain unknown. Most of the files leaked from the FSB are related to maritime traffic control of the Primorsky Krai. By coincidence or not, the border authorities of the same region were recently denounced of laundering 10 million rubles in a scheme.Vocord Telecom complains with its partner in Turkmenistan
In a leaked email sent by Dmitry Zavarikin, CEO of "Vocord", to Armand Jafarov (who has his certificate of achievement of an IBM course disclosed among the leaked files in possession of Innodata) of MMI Business Services, Vocord's partner in Turkmenistan, Zavarikin states that "part of the archives clearly belong to MMI" and "this information is interpreted as compromising for Vocord company". Beside that, the document is a proof of the authenticity of the files published by Par:Anoia.Dynamics of surveillance industry
The leak of thousands of documents held by the intelligence firm Innodata Isogen once again reveals the power and the reach of intelligence firms in the world. It also shows that the commerce of hidden information from governments and corporations, the surveillance industry, has been commonly used to manipulate business and society.
The flick is relevant on revealing the kind of information that Innodata stores in their servers, showing the public in which sphere the corporation performs its activities. Innodata Isogen, founded in 1988, employs more than 5,000 people worldwide. It is headquartered at Hackensack, NJ, and has offices in the United States, Europe, Israel, India, the Philippines, Sri Lanka and a business presence in China.
The company tripled its revenue to $60 million from $20 million between 1999 and 2001, earning accolades from Business Week and Fortune Magazine as a top-performing public company. In 2001, Innodata acquired Isogen International and integrated both company’s content management and publishing technologies, structured information standards and outsourcing services. (Source: Wikipedia.)
The leaked material gives public a lesson on how intelligence firms have access to a huge range of information by legal and illegal means. What do receipts of vessels crossing from Russia to Korea have to do with classified documents of Russia's governmental security agency? Why does Innodata hold copies of passports of the personnel of the Vietnamese Agency of Nuclear Power, along with their applications for scientific visits? Why does a report on a new kit for testing genetic susceptibility of asthma in children stand alongside with blueprints of complex devices?
Maybe journalists, activists and media in general will bring more concrete revelations as well as deeper analysis. But as for now one thing is clear and proved: Innodata and its partners have been performing both industrial and governmental espionage.
Translations - Documents translated into English
Document Naming Conventions - Find documents by company and topic.
Сегодня произошла массштабная утечка конфиденциальной информации компании Innodata (RT.KORR, July 8th 2012)
Хакеры заявили, что рассекретили похищенные документы ФСБ (donbass.ua, July 11th 2012)
Par:AnoIA: Anonymous Launches WikiLeaks-esque Site for Data Dumps (WIRED, July 13th 2012)
Anonymous запустили сайт для публикации дампов (xakep.ru, July 16th 2012)
Anonymous deja ver su 'Par:AnoIA' en la red, lanza un portal similar a WikiLeaks (actualidad.rt.com, July 16th 2012)
Anonymous lanza portal similar a WikiLeaks; el sitio almacena miles de documentos confidenciales (http://matrizur.org, July 17th 2012)
Please consider to donate a few bitcoins to support our infrastructure and keep this project running:
CC-by-SA 2012 PaR:AnoIA · No rights reserved.