Wikileaks Publica Documentos sobre a Indústria Global de Espionagem

Por Luis R. Miranda
The Real Agenda
1 de Dezembro 2011

Dezenas de empresas em uma indústria não regulamentada localizadas principalmente em países desenvolvidos fornecem tecnologias para militares e agências governamentais. Esta tecnologia permite que as agências de espionagem entrem em computadores e telefones e criem perfis que permitem identificar o paradeiro de qualquer pessoa.

Wikileaks publicou a primeira parte da informação confidencial que revela um sistema de espionagem global completo que opera em 25 países. O fundador do site Wikileaks, Julian Assange deu uma conferência de imprensa revelando os segredos da indústria.

O site já publicou cerca de 287 documentos em seu banco de dados, obtidas de 60 empresas de inteligência internacional. A base de dados inclui documentos internos de empresas como Gamma do Reino Unido, Ipoque da Alemanha, Amesys VUPEN da França, VASTech da África do Sul, a ZTE Corp na China, Phoenexia na República Checa, SS8 e Blue Coat em os EUA.UU., entre outros.

Este é apenas o primeiro passo pela organização Wikileaks de publicar seus arquivos do projeto criado para expor as empresas que estão fazendo bilhões de dólares vendendo ferramentas de hacking para controlar a atividade em computadores e telefones celulares. A indústria está completamente desregulamentada e cuja tecnologia moderna criada em países desenvolvidos pode facilmente encontrar o seu caminho em qualquer lugar do mundo.

De acordo com os dados filtrados, os dispositivos produzidos por britânicos, franceses, sul-africanos e chineses foram usados pelos regimes de Hosni Mubarak no Egito e Muamar Kadafi na Líbia para monitorar e controlar todos os movimentos dos cidadãos desses estados.

“As agências de inteligência das forças militares e policiais são capazes de silênciosamente obter informação assim como interceptar e gravar esta informação sem a ajuda ou conhecimento dos provedores de telecomunicações”, diz o comunicado oficial do WikiLeaks. “A localização física dos usuários pode ser encontradas através dos telefones celulares mesmo em modo de espera ou desligado.”

Os programas criados por empresas de espionagem são capazes de “seqüestrar” os computadores pessoais e telefones móveis populares, incluindo aqueles com sistemas operacionais tais como Android, IOS e Blackberry.

Outro ramo da indústria são as ferramentas de reconhecimento de voz que ajudam a identificar e localizar um indivíduo pela sua única “impressão vocal”. A CIA, acredita-se, usa essas ferramentas para analisar dados de voz reunidos por aeronaves não-tripuladas Predator no Oriente Médio e na identificação e localização exata de indivíduos procurados.

Na nova realidade não há necessidade de os serviços de inteligência estejam focados em localizar uma pessoa de interesse. Eles têm acesso a informações relevantes sobre qualquer pessoa sensível, em que pode se interessar no futuro.

Os documentos desclassificados estão disponíveis no site oficial do projeto.

 

Wikileaks Publica Documentos sobre la Industria Espía Global

Por Luis R. Miranda
The Real Agenda
01 de Diciembre, 2011

Decenas de empresas en una industria no regulada que se localizan principalmente en países desarrollados proveen tecnologías a agencias militares y gubernamentales. Esta tecnología permite a las agencias espiar en computadoras y teléfonos así como crear huellas vocales e identificar el paradero de cualquier persona.

Wikileaks ha publicado la primera parte de la información confidencial que revela un sistema completo de espionaje mundial operando en 25 países. El fundador del sitio Wikileaks, Julian Assange ofreció una conferencia de prensa, revelando los secretos de la industria.

El sitio ha publicado unos 287 documentos en su enorme base de datos, obtenidos de 60 contratistas de inteligencia internacional. La base de datos incluye documentos internos de empresas tales como la Gamma en el Reino Unido, Ipoque de Alemania, Amesys y VUPEN en Francia, VASTech en Sudáfrica, ZTE Corp en China, Phoenexia en la República Checa, SS8 y Blue Coat en los EE.UU., entre otros.

Este es sólo el primer paso por parte de la organización WikiLeaks en su proyecto de publicación de archivos, creado para exponer a las compañías que están haciendo miles de millones de dólares vendiendo herramientas de espionaje para rastrear actividad en computadoras y telefonos celulares. La industria está completamente desregulada y la tecnología moderna creada por las empresas comerciales en los países desarrollados puede encontrar fácilmente su camino a cualquier país del mundo.

Según los datos filtrados, los dispositivos producidos por británicos, franceses, sudafricanos, y la corporación china fueron utilizados por los regímenes de Mubarak en Egipto y Gadafi en Libia para seguir y controlar cada movimiento de los ciudadanos de esos estados.

“Las agencias de inteligencia, las fuerzas militares y policiales son capaces de silenciosamente, y en masa, interceptar secretamente y archivar información sin la ayuda o el conocimiento de los proveedores de telecomunicaciones”, dice el comunicado oficial de WikiLeaks. “La ubicación física de los usuarios puede ser encontrada a través de sus teléfonos móviles, incluso en su modo de stand by o apagado”.

Los programas creados por las empresas de espionaje son capaces de ‘secuestrar’ los ordenadores personales y teléfonos móviles populares, incluyendo aquellos con sistemas operativos Android, iOS y Blackberry.

Otra rama de la industria son las herramientas de reconocimiento de voz, que ayudan a identificar y localizar a un individuo por su única “huella de voz”. La CIA, se cree, utiliza estas herramientas para el análisis de datos de voz recogidos por aviones no tripulados Predator en el Medio Oriente y la identificación de la ubicación exacta de los individuos más buscados.

En la nueva realidad no hay necesidad de que los servicios de inteligencia se centren en localizar a un individuo de interés. Ellos tienen acceso a la información pertinente sobre cualquier persona sensible, en los que pueden llegar a interesarse en el futuro.

Los documentos desclasificados están disponibles en el sitio web oficial del proyecto.

WikiLeaks Releases ‘Global Surveillance Industry’ Documents

Unregulated industry allows companies in developed countries to provide technologies to military and government agencies. This technology allows such agencies to hack into computers and telephones and come up with voiceprints and to pinpoint anyone’s whereabouts.

Russia Today
December 1, 2011

WikiLeaks has released the first portion of sensitive data revealing a new global surveillance and interception industry spanning 25 countries. Site founder Julian Assange held a press conference, revealing the secrets of the industry.

­The whistleblowing site has published some 287 documents from its huge database, collected from 160 international intelligence contractors. The database includes internal documents of such companies like Gamma corporation in the UK, Ipoque of Germany, Amesys and Vupen in France, VASTech in South Africa, ZTE Corp in China, Phoenexia in the Czech Republic, SS8 and Blue Coat in the US, among others.

And this was only the first step of the WikiLeaks Spy Files project, established to expose companies, which are making billions of dollars selling sophisticated tracking and surveillance tools. The industry is completely unregulated and modern technology created by commercial companies in developed nations can easily find their way to any country of the world.

According to the leaked data, the devices produced by British, French, South African, and Chinese corporation were used by the regimes of Mubarak in Egypt and Gaddafi in Libya to track and monitor every move of those states’ citizens.

­“Intelligence agencies, military forces and police authorities are able to silently, and on mass, and secretly intercept calls and take over computers without the help or knowledge of the telecommunication providers ,” says the statement on the official WikiLeaks Spy Files sites. “Users’ physical location can be tracked if they are carrying a mobile phone, even if it is only on stand by.”

­The pieces of software created by surveillance companies are capable of hijacking personal computers and popular mobile phones, including those with Android, iOS, and Blackberry operating systems.

Another branch of the industry is voice recognition tools, which help identify and track down individual by his unique “voiceprint”. The CIA is believed to be using those tools for analyzing the voice data collected by Predator drones in the Middle East and identifying the exact location of most wanted individuals.

In the new reality there is no need for intelligence services to focus on tracking down an individual person of interest. They have access to relevant sensitive information about any person in whom they may become interested in the future.

Declassified documents are available on the project’s official website.­

Internet Wiretapping Coming to a Server Near You

Federals want to spy on internet communications “to keep you safe”.  Internet Wiretapping to become common trend as military industrial complex expands power grab.  Not that they don’t do it already!

Charlie Savage

Federal law enforcement and national security officials are preparing to seek sweeping new regulations of the Internet, arguing that their ability to wiretap criminal and terrorism suspects is “going dark” as people increasingly communicate online instead of by telephone.

Essentially, officials want Congress to require all services that enable communications — including encrypted e-mail transmitters such as BlackBerry, social networking websites such as Facebook and software that allows direct “peer-to-peer” messaging such as Skype — to be technically capable of complying if served with a wiretap order. The mandate would include being able to intercept and unscramble encrypted messages.

The legislation, which the Obama administration plans to submit to Congress next year, raises fresh questions about how to balance security needs with protecting privacy and fostering technological innovation. And because security services around the world face the same problem, it could set an example that is copied globally.

James Dempsey, vice president of the Center for Democracy and Technology, an Internet policy group, said the proposal had “huge implications” and challenged “fundamental elements of the Internet revolution” — including its decentralized design.

“They are really asking for the authority to redesign services that take advantage of the unique, and now pervasive, architecture of the Internet,” he said. “They basically want to turn back the clock and make Internet services function the way that the telephone system used to function.”

But law enforcement officials contend that imposing such a mandate is reasonable and necessary to prevent the erosion of their investigative powers.

“We’re talking about lawfully authorized intercepts,” said Valerie Caproni, general counsel for the FBI. “We’re not talking expanding authority. We’re talking about preserving our ability to execute our existing authority in order to protect the public safety and national security.”

Keeping up with technology

Investigators have been concerned for years that changing communications technology could damage their ability to conduct surveillance. In recent months, officials from the FBI, the Justice Department, the National Security Agency, the White House and other agencies have been meeting to develop a proposed solution.

There is not yet agreement on important elements, such as how to word statutory language defining who counts as a communications service provider, according to several officials familiar with the deliberations.

But they want it to apply broadly, including to companies that operate from servers abroad, such as Research In Motion, the Canadian maker of BlackBerry devices. In recent months, that company has come into conflict with the governments of Dubai and India over their inability to conduct surveillance of messages sent via its encrypted service.

In the United States, phone and broadband networks are already required to have interception capabilities, under a 1994 law called the Communications Assistance to Law Enforcement Act. It aimed to ensure that government surveillance abilities would remain intact during the evolution from a copper-wire phone system to digital networks and cell phones.

Often, investigators can intercept communications at a switch operated by the network company. But sometimes — like when the target uses a service that encrypts messages between his computer and its servers — they must instead serve the order on a service provider to get unscrambled versions.

Like phone companies, communication service providers are subject to wiretap orders. But the 1994 law does not apply to them. While some maintain interception capacities, others wait until they are served with orders to try to develop them. That can cause big delays, which the new regulations would seek to forestall.

Daftar Akun Bandar Togel Resmi dengan Hadiah 4D 10 Juta Tahun 2024

Togel resmi adalah langkah penting bagi para penggemar togel yang ingin menikmati permainan dengan aman dan terpercaya. Tahun 2024 menawarkan berbagai kesempatan menarik, termasuk hadiah 4D sebesar 10 juta rupiah yang bisa Anda menangkan. Anda perlu mendaftar akun di Daftar Togel yang menawarkan hadiah tersebut. Proses pendaftaran biasanya sederhana dan melibatkan pengisian formulir dengan informasi pribadi Anda serta verifikasi data untuk memastikan keamanan transaksi. Setelah akun Anda selasai terdaftar, Anda dapat berpartisipasi dalam berbagai permainan togel berbagai fitur yang disediakan oleh situs togel terbesar.

Bermain di Link Togel memungkinkan Anda memasang taruhan dengan minimal 100 perak, sehingga semua kalangan bisa ikut serta. Meskipun taruhan rendah, Anda tetap bisa memenangkan hadiah besar dan mendapatkan bonus. Untuk mulai bermain, Anda harus mendaftar terlebih dahulu.

Bagi pemain togel yang ingin menikmati diskon terbesar, mendaftar di situs togel online terpercaya adalah langkah yang tepat. Bo Togel Hadiah 2d 200rb tidak hanya memberikan jaminan keamanan dalam bertransaksi, tetapi juga menawarkan berbagai diskon untuk jenis taruhan tertentu. Diskon yang besar ini memungkinkan pemain untuk menghemat lebih banyak dan memasang taruhan dalam jumlah yang lebih banyak. Dengan begitu, peluang untuk mendapatkan hadiah juga semakin tinggi, sekaligus memastikan bahwa setiap taruhan dilakukan di situs yang aman dan resmi.

Link Slot Gacor Terpercaya untuk Menang Setiap Hari

Slot gacor hari ini menjadi incaran para pemain Link Slot Gacor yang ingin menikmati peluang jackpot besar hanya dengan menggunakan modal kecil, sehingga mereka bisa merasakan pengalaman bermain yang lebih menyenangkan dan penuh keuntungan.

Situs dengan slot Mahjong Ways gacor memberikan jackpot dan Scatter Hitam lebih sering di tahun 2024. Pastikan memilih situs terpercaya yang menyediakan fitur scatter unggulan, sehingga peluang Anda untuk menang lebih besar dan aman.

Dengan Situs Slot Depo 5k, Anda bisa bermain dengan modal kecil namun tetap memiliki kesempatan besar untuk meraih hadiah. Banyak platform judi online kini menawarkan pilihan deposit rendah ini, sehingga pemain dengan budget terbatas tetap bisa menikmati permainan slot favorit mereka. Bermain slot dengan deposit kecil seperti ini tentu memberikan kenyamanan bagi pemain baru maupun veteran.

Situs Slot Gacor Gampang Menang RTP Live Tertinggi

Strategi bermain slot online kini semakin berkembang, terutama dengan munculnya data rtp slot gacor tertinggi. Para pemain dapat memanfaatkan rtp live untuk memilih slot gacor dengan rtp slot yang terbaik, memastikan mereka memiliki peluang menang yang lebih besar. Slot rtp tertinggi yang tersedia hari ini bisa menjadi panduan penting bagi siapa saja yang ingin menikmati permainan yang lebih menguntungkan. Dengan memahami rtp slot online, pemain dapat bermain dengan lebih strategis dan mendapatkan hasil yang lebih memuaskan.

Related Links:

Togel178

Pedetogel

Sabatoto

Togel279

Togel158

Colok178

Novaslot88

Lain-Lain

Partner Links