- Nov 5, 2011
- 5,855
Government hacking techniques and software for Internet surveillance topic here ..
List of hacking and surveillance techniques used by Governments: by Hacker 10 – Security Tips: http://www.hacker10.com/computer-security/list-of-hacking-and-surveillance-techniques-used-by-governments/
Quote:
'A list of normally secretive companies and products used by over 150 Governments from around the world to spy and hack into people’s computers - thanks to the Wall Street Journal Surveillance Catalog project': The Surveillance Catalog: http://projects.wsj.com/surveillance-catalog/
Quote:
'Documents obtained by The Wall Street Journal open a rare window into a new global market for the off-the-shelf surveillance technology that has arisen in the decade since the terrorist attacks of Sept. 11, 2001.'
'.. these confidential brochures explain what products are used by Governments for mass surveillance, some of the prospectuses have been partially blacked out as specific technical information is only available to authorised law enforcement personnel.
The surveillance tools are sold to law enforcement agencies and some corporations, its legality depend on the laws of the country where they are being applied, the tools have often been found in the hands of repressive regimes like China or Iran, since censoring of the web and mass spying is allowed in those countries, it is perfectly legal.
Note: In addition to these private contractors products, well resourced countries also develop their own custom hacking tools in-house.'
Internet surveillance is described by:
Mobile phone tracking
Linguistic Analysis
Social network analysis
Installing trojan horses
Deep packet inspection
Hide computer IP
Trojan horse on a USB
Interception of encrypted traffic.
Document Trove Exposes Surveillance Methods: by The Wall Street Journal / Technology: http://online.wsj.com/article/SB10001424052970203611404577044192607407780.html
.. Yes, 'since the terrorist attacks of Sept. 11, 2001'.
List of hacking and surveillance techniques used by Governments: by Hacker 10 – Security Tips: http://www.hacker10.com/computer-security/list-of-hacking-and-surveillance-techniques-used-by-governments/
Quote:
'A list of normally secretive companies and products used by over 150 Governments from around the world to spy and hack into people’s computers - thanks to the Wall Street Journal Surveillance Catalog project': The Surveillance Catalog: http://projects.wsj.com/surveillance-catalog/
Quote:
'Documents obtained by The Wall Street Journal open a rare window into a new global market for the off-the-shelf surveillance technology that has arisen in the decade since the terrorist attacks of Sept. 11, 2001.'
'.. these confidential brochures explain what products are used by Governments for mass surveillance, some of the prospectuses have been partially blacked out as specific technical information is only available to authorised law enforcement personnel.
The surveillance tools are sold to law enforcement agencies and some corporations, its legality depend on the laws of the country where they are being applied, the tools have often been found in the hands of repressive regimes like China or Iran, since censoring of the web and mass spying is allowed in those countries, it is perfectly legal.
Note: In addition to these private contractors products, well resourced countries also develop their own custom hacking tools in-house.'
Internet surveillance is described by:
Mobile phone tracking
Linguistic Analysis
Social network analysis
Installing trojan horses
Deep packet inspection
Hide computer IP
Trojan horse on a USB
Interception of encrypted traffic.
Document Trove Exposes Surveillance Methods: by The Wall Street Journal / Technology: http://online.wsj.com/article/SB10001424052970203611404577044192607407780.html
.. Yes, 'since the terrorist attacks of Sept. 11, 2001'.