Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

Orwell’s World - Mass Surveillance

  • 08-01-2012 1:39pm
    #1
    Registered Users, Registered Users 2 Posts: 23


    International surveillance companies are based in the more technologically sophisticated countries, and they sell their technology on to every country of the world. This industry is, in practice, unregulated.

    Intelligence agencies, military forces and police authorities are able to silently, and on mass, and secretly intercept calls and take over computers without the help or knowledge of the telecommunication providers.

    On January 6th 2011 reports of Symantec (makers of Norton Anitvirus) being hacked surfaced. http://www.reuters.com/article/2012/01/06/us-symantec-code-idUSTRE80523W20120106
    The group of hackers behind the attack were from India. In a statement issued by a member from the Lords of Dharamraja group, the group said:

    "As of now we start sharing with all our brothers and followers information from the Indian Militaty (sic) Intelligence servers, so far we have discovered within the Indian Spy Programme (sic) source codes of a dozen software companies which have signed agreements with Indian TANCS programme (sic) and CBI" http://indiatoday.intoday.in/story/servers-of-indian-embassy-in-paris-hacked/1/164664.html

    Ignoring the typing error, gaining access to Indian Military’s Intelligence servers is pretty damning for the Indian agency. The hack got covered in the press since the hackers claimed to have acces to Norton’s source code.

    However here is a link https://imgur.com/a/8XoGf/noscript, to a set of documents from the Indian Group that they got when their hacked the Indian Government server, these are actual internal communications between the Indian Military. The documents claim the existence of a system known as RINOA SUR. RINOA possibly stands for RIM, NOkia and Apple.

    And this is where things start to get very interesting, according to the released set of Indian MI documents, the RINOA SUR platform was used to spy on the http://www.uscc.gov/ USCC—the US-China Economic and Security Review Commission.

    We are all on the radar and this is further proof, India spying on the USA with what looks like backdoor access granted by communications companies with an eye on a 1 billion person market, communications companies are selling a vast range of mass surveillance equipment to intelligence agencies. Given their source codes of their software to Government's and their agents is not uncommon, the government agencies what to establish that there are no backdoor's via the vendor system and software to their own servers and information. without the source code release from the vendor, then no contract for the vendor.

    In the last ten years systems for indiscriminate, mass surveillance have become the norm. Intelligence companies such as VASTech secretly sell equipment to permanently record the phone calls of entire nations. Others record the location of every mobile phone in a city, down to 50 meters. Systems to infect every Facebook user, or smart-phone owner of an entire population group are on the intelligence market.

    When citizens overthrew the dictatorships in Egypt and Libya last year, they uncovered listening rooms where devices from Gamma corporation of the UK, Amesys of France, VASTech of South Africa and ZTE Corp of China monitored their every move online and on the phone.

    Surveillance companies like SS8 in the U.S., Hacking Team in Italy and Vupen in France manufacture viruses (Trojans) that hijack individual computers and phones (including iPhones, Blackberries and Androids), take over the device, record its every use, movement, and even the sights and sounds of the room it is in.

    Other companies like Phoenexia in the Czech Republic collaborate with the military to create speech analysis tools. They identify individuals by gender, age and stress levels and track them based on ‘voiceprints’. Blue Coat in the U.S. and Ipoque in Germany sell tools to governments in countries like China and Iran to prevent dissidents from organizing online.

    Trovicor, previously a subsidiary of Nokia Siemens Networks, supplied the Bahraini government with interception technologies that tracked human rights activist Abdul Ghani Al Khanjar. He was shown details of personal mobile phone conversations from before he was interrogated and beaten in the winter of 2010-2011.

    In January 2011, the US National Security Agency broke ground on a $1.5 billion facility in the Utah desert that is designed to store billions of terabytes of domestic and foreign intelligence data forever and process it for years to come.

    Telecommunication companies are very forthcoming when it comes to disclosing client information to the local authorities - no matter the country.

    During the August 2011 unrest in the UK, it exposed how Research in Motion (RIM), makers of the Blackberry, offered to help the UK government identify their clients. RIM has been in similar negotiations to share BlackBerry Messenger data with the governments of India, Lebanon, Saudi Arabia, and the United Arab Emirates.

    Across the world now, mass surveillance contractors are helping intelligence agencies spy on individuals and ‘communities of interest’ on an industrial scale.

    Orwell's World indeed is here and its in a mobile device near you.


Comments

  • Registered Users, Registered Users 2 Posts: 6,696 ✭✭✭Jonny7


    This is cut and paste from different articles or written by you?


  • Registered Users, Registered Users 2 Posts: 23 ODuill


    This is original opinions interspersed with direct quotes from a number of different sources as well as hyperlinks to various sites.

    Mass surveillance is now a complicated and multifaceted area, the top of a very large tech iceberg is only just visible, from interceptions of phone calls and faxes in the 70’s and 80’s to the monitoring of all electronic transactions now.

    The evolution of mass surveillance has grown a thousand fold and as such there are not just governments and their agencies, but private contractors and individuals with the means and the reasons to spy on companies, individuals and organisations were profits and information is king.

    Wire taps are things of the past, isolating traffic of interest electronically is where the future is as regards mass surveillance.

    Colossal volumes of data sets can be sifted through very quickly now, monitoring and filtering equipment is not only available to governments, but can now be purchased off the shelf. You can monitor some 2,500+ mobile phones activities on one monitoring device.

    With the scale now of network and mobile cellular surveillance that is going on now, Orwell’s World is alive and kicking in ways not even envisaged a few years ago and in ways that have yet to become apparent to the billions who communicate with each other.


  • Closed Accounts Posts: 1,207 ✭✭✭Pablo Sanchez


    So are you not worried that by giving away all their tactics that you might end up having a 'acident'?


  • Registered Users, Registered Users 2 Posts: 23 ODuill


    No I am only a small fry, I am only scratching a little surface, a surface where packet capture methods and processing in combination with high-throughput computing is changing daily and where methods today are redundant tomorrow.

    However, one does need though to be proxied up with variable IP's these days unless you are just posting blah blah to social sites and booking tickets on the internet.


  • Registered Users, Registered Users 2 Posts: 6,696 ✭✭✭Jonny7


    I fail to see how any of this has affected my life in any negative way - apart from a bit of spam mail that is.

    Actually, no, they've caught some of the main offending spammers by using this kind of technology, so I get less spam mail now.

    God bless this new Orwellian technology :)


  • Advertisement
  • Registered Users, Registered Users 2 Posts: 23 ODuill


    We have been brainwashed to believe that it is necessary to protect us from dangerous groups.

    However what about your right to privacy?

    Privacy is an essential component needed in the exercise of your individual freedoms.

    We are sleepwalking into an electronic surveillance police state.

    We have become blinded to what is now going on, we are living in a world where we leave electronic foot prints all over the place and where our movements past and present are monitored, where our utterances are recorded, our associations are mapped and even our future actions could be predicted by algorithms.

    The UK was described by the Surveillance Studies Network http://www.surveillance-studies.net/ as being “the most surveilled country' among the industrialized Western countries”. The link below is to a UK report in to surveillance and where it all may lead to and the erosion of all civil rights.
    http://www.publications.parliament.uk/pa/ld200809/ldselect/ldconst/18/1802.htm

    CCTV networks with face recognition tracks you when you are out and about, your communications are captured such as your IM chat conversations, your text messages, your voicemails, your emails, your videos and pictures, your mobile phone been tracked, your IP address activity tracked, keystroke software, vehicle tracking, DNA databases, travelling logs etc, the list goes on and on.

    Hundreds of millions of Euro’s are been spent globally on mass internet and communications surveillance systems by organisations. The UK are using “Mastering the Internet” (MTI) with very deep packet inspection devices, Teraflops of data are been analysed each second of every day which are kept forever, what you say today can and will be used in a court of law against you tomorrow.
    http://www.nytimes.com/2010/07/25/magazine/25privacy-t2.html?_r=1&ref=technology


  • Registered Users, Registered Users 2 Posts: 6,696 ✭✭✭Jonny7


    Dramatic statements :)

    Unfortunately, that's all they are.. dramatic.. oh the technology exists, but we're not being monitored 24-7. Far from it.

    Its ironic, any conspiracy theorist types (a few old student friends) I know go on about this too, yet they continue downloading illegally, buying drugs, breaking the law as before - they preach it but they don't believe it.


  • Registered Users, Registered Users 2 Posts: 23 ODuill


    Students will be students, they do eventually grow up allegedly, however there are so many ways to track a person nowadays that it’s become too much for some to take in and to be able to contemplate it and they cant answer the question "Why".

    People don’t see where the advantages are for the monitors, they don’t see the techno systems deployed to monitor them, they can’t see any advantages to anyone monitoring them as they don’t do anything and just go about the day to day.

    Why then is it such big business and why is the tech developed and deployed privately or covertly by the intelligence agencies?

    The many and varied means of today's electronic keyhole Kate’s is mindboggling.

    This article by computer scientist Arvind Narayanan goes some ways in to explaining it in laypersons terms as regards the internet
    http://cyberlaw.stanford.edu/node/6701

    Interactive map. The United Nations of Surveillance. http://owni.eu/2011/12/01/interactive-map-the-united-nations-of-surveillance/


  • Registered Users, Registered Users 2 Posts: 692 ✭✭✭CyberJuice


    as long as they are not lookin at me when i am goin to the toilet,or doing anything that involves me being naked or masterbating then good luck to them i say,let them watch away,im only walkin the dog or shopping or eating or watever,im not making bombs or going for secret cult meetings or locking children in my basement


  • Registered Users, Registered Users 2 Posts: 23 ODuill


    The point is from their side is that they don't know if you are making bombs or going to secret cult meetings (Cumann's) or locking children in your basement.

    But by profiling you, your family, your friends, your/their/friends actions, they can begin to build a picture. A picture of everything you do and say, a picture of what you may do and say.

    Did you give permission for every move you and yours make?

    No you did not, but none the less they are watching.

    If they were on the garden wall looking in your windows and following you to work etc, you would soon react and do something.

    However we don't know the levels that we are been watched and profiled.

    Here are some essential links that will shock, will amaze and will stun, don't just take my word on this.

    http://topics.nytimes.com/topics/reference/timestopics/subjects/s/surveillance_of_citizens_by_government/index.html

    http://www.independent.ie/business/technology/in-a-state-of-surveillance-1301589.html

    http://projects.wsj.com/surveillance-catalog/#/

    http://www.wired.com/images_blogs/threatlevel/files/dpi.pdf

    If you can manage to read these, then you will awaking to the fact that we are @#!":'^~#ed.


  • Advertisement
Advertisement