List of hacking and surveillance techniques used by Governments

Discussion in 'privacy general' started by lotuseclat79, Nov 20, 2011.

Thread Status:
Not open for further replies.
  1. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,102
  2. Ranget

    Ranget Registered Member

    Joined:
    Mar 24, 2011
    Posts:
    846
    Location:
    Not Really Sure :/
    Trojan are the Most scary

    they can split your computer Open and Bring You Down!!!!
    with Tones of evidence
     
  3. dw426

    dw426 Registered Member

    Joined:
    Jan 3, 2007
    Posts:
    5,543
    Why would you be more afraid of the one technique on the list that is the most easily preventable? None of this stuff is new, these are everyday techniques.
     
  4. caspian

    caspian Registered Member

    Joined:
    Jun 17, 2007
    Posts:
    2,301
    Location:
    Oz
    They mentioned sneaking trojans in through your Windows updates and Firefox updates. How would you know what was going on if they did something like that?
     
  5. dw426

    dw426 Registered Member

    Joined:
    Jan 3, 2007
    Posts:
    5,543
    Fake updates have been going on for years, and I don't see Microsoft nor Mozilla being party to such a measure. One there is too much risk involved, two, if a trojan came through an official update and MS or Mozilla knew about it, and it was found out about, there would be no holding back the devastating backlash. Doing something like that could literally kill Mozilla. Besides, the use of these tools are very targeted operations, they are not just going to "show up" on any website. There's no need for them anyway, and they are rarely used. Agencies can simply attach themselves to the few control points that operate the Internet if they want to go all out (and they already do that).
     
  6. caspian

    caspian Registered Member

    Joined:
    Jun 17, 2007
    Posts:
    2,301
    Location:
    Oz
    Thanks for explaining that. And I would assume, hopefully anyway, that these techniques would only be used against terrorists or something really serious like that.
     
  7. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    Take a look at FinFisher FinFly ISP.

     
    Last edited: Nov 24, 2011
  8. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  9. Spooony

    Spooony Registered Member

    Joined:
    Apr 30, 2011
    Posts:
    514
    They just use Narus
    http://blogs.law.harvard.edu/surveillance/2008/11/11/narus-security-through-surveillance/

    Thats all they use
     
  10. Meriadoc

    Meriadoc Registered Member

    Joined:
    Mar 28, 2006
    Posts:
    2,642
    Location:
    Cymru
    In fact there are a myriad of delivery and scrutiny modus operandi.
     
  11. Noob

    Noob Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    6,468
    So now encrypted connections are lame or according to these they can decrypt it if they get their devices in the network?
     
Loading...
Thread Status:
Not open for further replies.