2014年8月15日星期五

wireless ip camera videos


This is exactly what GCHQ is doing. Internal documents explain that they are
interested in "[n]ot just collecting voice and SMS and geo-locating phone, but
getting intelligence from all the extra functionality that iPhones and
BlackBerrys offer." Further documents explain that GCHQ can now obtain “any
content from phone, e.g. SMS, MMS, e-mails, web history, call records,ip camera wireless ip camera videos,
photos, address book, notes, calendar.”
GCHQ’s ability to do so relies on a malware toolkit named, oddly, after
characters in the TV series The Smurfs. An ability to make both iPhone and
Android phones’ microphones 'hot', in order to remotely switch on the
microphone and listen in to conversations is named "Nosey Smurf". High-
precision geolocation is called "Tracker Smurf". Covertly switching on a phone
is codenamed "Dreamy Smurf" while the malware’s concealment capabilities are
codenamed "Paranoid Smurf".
Disproportionate interference
This completely unchecked deployment of government malware amounts to some of
the most intrusive forms of surveillance any government has conducted.
In allowing GCHQ to extract a huge amount of information, and to turn an
individual’s own devices against them by co-opting the devices as instruments
of video and audio surveillance, it is at least as intrusive as searching a
person’s house and installing bugs so as to enable continued monitoring. In
fact, it is more intrusive, because of the amount of information now generated
and stored by computers and mobile devices, the speed, ease and
surreptitiousness with which surveillance camera security systems can be conducted, and because it
allows the ongoing surveillance to continue wherever the affected person may
be.
In these circumstances any justification would have to be extremely specific
and compelling in order to render that activity proportionate. Regrettably, no
such consideration has been given to this in public debate. Secret action, on
the basis of secret policy, is the order of the day.
Millions of devices
Far from this tactic being deployed only in exceptional circumstances, the NSA
has aggressively developed these tools to infect potentially millions of
computers and phones worldwide,surveillance system according to The Intercept. GCHQ plays an
integral role. Using tools like TURBINE, designed to “relieve the user from
needing to know/care about the details” the NSA is now able to conduct
“industrial-scale exploitation”.
That technique involves covert installation of software onto the user’s
computer through one of a number of means, such as tricking the user into
clicking a malicious link, or injectingip camera system 4ch NVR System  their malicious code into the network
transmission that individuals receive when browsing websites like Facebook or
LinkedIn so as to transfer the malware as part of the computer’s ordinary
downloading of data.

没有评论:

发表评论