FeolnotynonA

Government Spying On Everyone -Thanks Microsoft

Jan 25th, 2013
77
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.22 KB | None | 0 0
  1. Government Spying On Everyone -Thanks Microsoft
  2.  
  3.  
  4. Anonyton@: we hear that Microsoft buys Skype and makes changes to allow Police surveillance. Then on 01-07-2013 we hear that a professor at the Warsaw University of Technology, Wojciech Mazurczyk, found a way to insert secret 70 bits of data and add secret information similar to steganography.
  5. Lawful Intercept is what it’s called and we just heard punch – counter-punch from the government. I just posted about corporations and governments using offensive cyber weapons to fight crime, but this looks like just plain old spying on citizens like China, Iraq and Syria does. Skype is owned by Microsoft and we know that Word and other products have back doors for them to snoop and governments to use in criminal cases. I guess they do it the proper way and get a real FISA document to monitor us it’s citizens.
  6. @reaction@ our re-elected President Obama signs FISA Warrantless Wiretapping Program. STOP – SAY WHAT. Forget about gun control how about the privacy of citizens, are we becoming like China, Iraq and Syria the more I find out about this the crazier it becomes. I hate Skypes but now finding this out NO WAY DUDE-
  7.  
  8. I did a little digging and I found a document from the Straford hack from the LutzBoat crew and this has been on the play board for a long time. More and more governments that play nice with the America and Microsoft will have to live with the fact that they are spying on us, the people. I voted for Obama but I’m pretty sure any president would want to be able to justify this abuse of power to monitor it’s citizens, what get’s me is we scream and yell when other countries do it but here we are doing to ourselves and nobody is talking about this- Hay press wake up. I have nothing to hide but if you do you have been warned – enjoy your government spying on you behind your back - gAtO oUt
  9.  
  10. Lab Notes:
  11.  
  12. IT security continues to be the greatest challenge facing government CIOs worldwide. Most experts agree that governments require stronger partnerships between the public and private sectors for both better protection of government IT systems from intruders and for greater visibility into operators’ network traffic to fight crime. However, government systems and intelligence activities constitute a very sensitive information environment. Governments must proceed with caution when forming technology partnerships for hardening their IT network security. Melissa E. Hathaway, who in February 2009 was named to be the Obama Administration’s top cyber security official, points out how
  13.  
  14. Lawful Intercept
  15.  
  16. Challenge
  17.  
  18. Criminals, predators and hackers now use chats, blogs, webmail and Internet applications such as online gaming and file-sharing sites to hide their communications.
  19.  
  20. Solution
  21.  
  22. Qosmos provides law enforcement agencies with a powerful solution to identify a target using multiple virtual IDs and intercept all related IP- based communications. Any trigger, such as a “user login = target” initiates intercept of all IP traffic related to the “target.”
  23.  
  24. Example of recognized applications and protocol.
  25. VoIP Email (POP, SMTP)
  26. Webmail (Gmail, Hotmail, Live Mail, SquirrelMail, Yahoo mail, etc.)
  27. Instant Messaging (Aim, SNM, Skype, Yahoo, Google Talk, QQ, Maktoob, Paltalk, etc.)
  28. Online games (World of Warcraft)
  29. Online classified ads
  30. Audio/Video (H.323, SIP, MGCP, RTP, RTCP, MMSE, RTSP, SHOUTcast, Yahoo Video,
  31. MSN Video, SCCP, etc.)
  32. Web applications (Dailymotion, Google, eBay, Google Earth, HTTP, MySpace, Wikipedia,
  33. YouTube, etc.)
  34. Example of information extracted
  35. Caller, phone number, called party, duration of call
  36. Webmail login, email address, sender, receiver, subject matter, attached documents
  37. Instant messaging sender, receiver, contact lists and status
  38. Forum login, IP address, MAC address, mobile ID (IMSI, IMEI)
  39. Protocols identified even for unidirectional traffic (e.g. email by satellite).
  40. http://www.huffingtonpost.com/2012/12/30/obama-fisa-warrantless-wiretapping_n_2385690.html
  41. http://enterprise-call-recording.tmcnet.com/topics/enterprise-call-recording/articles/321789-sounds-silence-skype-hold-more-than-expected-thanks.htm
  42. http://www.ronpaulforums.com/showthread.php?399961-Microsoft-Buys-Skype-Makes-Changes-to-Allow-Police-Surveillance
Advertisement
Add Comment
Please, Sign In to add comment