It doesn't matter what we do re:computer security

Synthaholic

Diamond Member
Jul 21, 2010
71,454
50,997
3,605
*
Secret Manuals Show the Spyware Sold to Despots and Cops Worldwide

When Apple and Google unveiled new encryption schemes last month, law enforcement officials complained that they wouldn’t be able to unlock evidence on criminals’ digital devices. What they didn’t say is that there are already methods to bypass encryption, thanks to off-the-shelf digital implants readily available to the smallest national agencies and the largest city police forces — easy-to-use software that takes over and monitors digital devices in real time, according to documents obtained by The Intercept.

We’re publishing in full, for the first time, manuals explaining the prominent commercial implant software “Remote Control System,” manufactured by the Italian company Hacking Team. Despite FBI director James Comey’s dire warnings about the impact of widespread data scrambling — “criminals and terrorists would like nothing more,” he declared — Hacking Team explicitly promises on its website that its software can “defeat encryption.”

The manuals describe Hacking Team’s software for government technicians and analysts, showing how it can activate cameras, exfiltrate emails, record Skype calls, log typing, and collect passwords on targeted devices. They also catalog a range of pre-bottled techniques for infecting those devices using wifi networks, USB sticks, streaming video, and email attachments to deliver viral installers. With a few clicks of a mouse, even a lightly trained technician can build a software agent that can infect and monitor a device, then upload captured data at unobtrusive times using a stealthy network of proxy servers, all without leaving a trace. That, at least, is what Hacking Team’s manuals claim as the company tries to distinguish its offerings in the global marketplace for government hacking software.



More at the link, including screen shots
 
As far as I know, paper has never had a computer virus/spyware attack.

But it is susceptible to dogs, water, fire and wind. Be careful.
That's why you always keep extra copies and use a photocopier. ;)

They have been bugging and hacking photocopiers for decades.
Perhaps, but not mine. Though even if they did, I write stuff down on paper by hand. So unless the photocopier develops two legs and an arm, I am safe.
 
Computer security/encryption/hacking is following the same offense/defense swing that weapons and protection have been going through for milenia.

Ape slaps ape, ape uses arm to deflect slap, ape holds small rock when slapping, aple wraps arm in leaves, ape grabs bigger rock, ape uses thicker mat of leaves, and on and on and on.
 
Obama shuts China, Russian exploit...
:cool:
Obama not to seek access to encrypted user data, FBI irked
Oct 11, 2015: The Obama administration has backed down in its bitter dispute with Silicon Valley over the encryption of data on iPhones and other digital devices, concluding that it is not possible to give American law enforcement and intelligence agencies access to that information without creating an opening that China, Russia, cybercriminals and terrorists could also exploit.
With its decision, which angered the FBI and other law enforcement agencies, the administration essentially agreed with Apple, Google, Microsoft and a group of the nation's top cryptographers and computer scientists that millions of Americans would be vulnerable to hacking if technology firms and smartphone manufacturers were required to provide the government with "back doors," or access to their source code and encryption keys.

That would enable the government to see messages, photographs and other data now routinely encrypted on smartphones. Current technology puts the keys for access to the information in the hands of the individual user, not the companies. The first indication of the retreat came on Thursday, when the FBI director James B Comey told the Senate Homeland Security and Governmental Affairs Committee that the administration would not seek legislation to compel the companies to create such a portal.But the decision, made at the White House a week ago, goes considerably beyond that.

While the administration said it would continue to try to persuade companies like Apple and Google to assist in criminal and national security investigations, it determined that the government should not force them to breach the security of their products. In essence, investigators will have to hope they find other ways to get what they need, in terms of encrypted data.

Obama not to seek access to encrypted user data, FBI irked - The Times of India
 

Forum List

Back
Top