Military Review

The story of mobile phones: paranoia or a real security threat

91
One of the most used by various media and online publications in the outgoing year names was the name of the American Edward Snowden, who revealed an impressive amount of information about the peculiarities of the activities of the American and British intelligence agencies. Of course, it is naive to believe that before Snowden's revelations, no one in the world had any idea that these methods are far from universal altruism and boundless virtue, that they completely fall into the laws of the state and conscience, but, nevertheless, “plums” Information from the American caused a great resonance.


The main characters who raised the alarm after the publication of the revelations of the work of the CIA and the NSA from Snowden are, of course, world leaders. 30, a former CIA ex-worker, said that American intelligence services’s tracking programs were deployed on such a large scale that the security services have all the opportunities for outright espionage not only for those who are allegedly involved in creating a terrorist threat to the US and the entire “progressive world” hundreds of millions of other inhabitants of the planet, including politicians. Among those politicians for whom the NSA was absolutely spying, according to information from Snowden, were Dmitry Medvedev, Angela Merkel, Dilma Rouseff and a number of other persons.

What happened next with Edward Snowden is well known to all. Against the background of all his “travels” around the world and the search for a safe haven in the territory of the Russian Federation, people began to pay much more attention to the technical communication devices they used. Before the revelations of a former employee of the Central Intelligence Agency of the USA, a mobile phone with Internet access (or no opportunity) was perceived by the overwhelming majority of users as a common technique that allows you to communicate with other people and draw the necessary information. But after the revelations, this technique has become by many a kind of key used by Western intelligence agencies to obtain information about a specific user. The same attitude gradually began to take shape with computers integrated into the Global Network.

It got to the point that the owners of smartphones and laptops began to glue the so-called front cameras, so as to protect themselves from probable surveillance of special services. Numerous tips appeared on the Web on how to use an iOS or Android based smartphone in general, so that the ubiquitous Western intelligence agencies would not be able to build a chain of user’s movements, follow his contacts, scan his place of work or rest, record his voice. It has come to the tips, in which the authors quite seriously recommend to wrap iPhones and other smartphones “at night” in several layers of foil and cover with a metal lid, while completely turning off the power by removing the battery (if possible). And if “before Snowden” many people were ironic about Estonian President Thomas Hendrik Ilves, who sealed the webcam on the laptop in the hope of protecting themselves from hackers, then “after” they began to say that here, in general, it’s not up to irony ...

Indeed, it is unlikely that someone would like to see the “independent” activation of the camera on his iPhone (or Android-based smartphone), someone (US intelligence agencies or an advanced neighbor) have the opportunity to get pictures of what is happening with you at that moment. absolutely do not want to share any pictures with anyone. By the way, the inclusion of photo and video cameras on mobile devices based on the mentioned operating systems was recorded by users long before Edward Snowden spoke about the methods used by Western special services.
Information about the strange behavior of mobile devices from Apple began to share users from all over the world in forums devoted to the discussion of the work of technology based on the software of the "apple" company. Mass remarks began to show themselves, starting with 2011, when iPhone 4 and iPhone 4S were actively distributed through retail outlets.

Here are just a few examples of messages about contacting Apple support (users posted their Online).

The user of the forum kar0786 (22 March 2011 of the year) (USA) writes:

My friend and I have the following problem: when we connect via FaceTime (video call service), then an old image of myself appears on the screen, and it has a black screen. In this case, the old image is not stored in the memory of the smartphone.


Another user writes that he has about the same problem: he uses the iPhone 4 for a video conversation, while on the screen he sees not his interlocutor, but himself, and at the moment of time that has already passed. The user claims that he did not turn on the iPhone’s camera before and, accordingly, could not save video files and photos. Moreover, according to him, the file that was displayed on his screen is not in the memory of the iPhone either. The user asks the question: if not in memory, then where is it stored, why is it randomly reproduced, and in general who has access to it?

Nasetron user (4 publication on April 2011 of the year) writes that he has the same “glitches” with an iPhone, and that he even changed it to another device. After replacing the situation is repeated. Nasetron claims that Apple’s tech support staff said they need to reinstall all applications and reconfigure the phone so that everything will be fixed. However, this did not help either. The owner of the iPhone naively (after all, it was up to the Snowden revelations) decided that the whole thing was a kind of software error of the operating system. Today, this “mistake” is understandable, just like where exactly the video information captured by the camera of a smartphone is stored and where exactly ...

It is noteworthy that approximately after a week-long discussion on the topic of “software” errors in iPhones, one of the forum users asks a question: or maybe Apple itself organizes the inclusion of iPhones cameras to get personal user data? Initially, this version is subjected to obstruction: they say, how could you think such a thing about the “Holy Company of Apple”, but over time the number of supporters of this theory only grows. The peak of growth is, of course, at the time that followed the revelations from Snowden.

Snowden actually forced him to admit his “program errors” not only to Apple, but also to other large American companies that pledged to “help” the CIA and the NSA “to stand guard over world peace.” As you know, the group of those who “burned” included Google, Facebook, Twitter and a number of other “sharks” of the Internet.

In our country, the situation was not responded to that belatedly, but not quite in time. Only now the legislators decided to request the Russian special services that they know about the possibility of foreign espionage through smartphones. In particular, the notorious deputy of the St. Petersburg Legislative Assembly Milon some time ago called on the Russian special services to check whether the Russians collect fingerprints in the NSA.

On the one hand, all this may seem paranoid, since the receipt of a photo by Ivan Ivanych from Khabarovsk or a fingerprint by Marivanna from Arkhangelsk is unlikely to upset these people. However, there is another side: not only “average” Russians Ivan Ivanich and Marivanna use smartphones and laptops, but also those who have access to the creation or control of military equipment, who belong to a number of high-ranking officials, to representatives of law enforcement agencies of the country. Mobile phones are allowed for use, for example, by soldiers of the Russian army serving in conscription.

The story of mobile phones: paranoia or a real security threat


If we assume that a smartphone can record information and send it to, so to speak, the current owners, then this device in the hands of the same private (not to mention its fathers-commanders) turns into a real weapon espionage, and, for example, the term "closed military unit" loses all meaning. Here, as it is said, the work of foreign satellites above the head is enough, but the smartphone can still present everything in more detail ... Even at the theoretical level, it can be assumed that the same iPhone of a design engineer of one of the defense enterprises can arbitrarily turn on and take a picture, for example drawings of the technology being developed or filming entering a password into the access system to a secret object, is there really no time for jokes ... Is the “closed meeting” of the government or parliament in this case exactly closed? ..



In this regard, the question arises: are conclusions drawn, or until everything is in the spirit: “we need to get rid of the persecution mania”?
Author:
91 comment
Information
Dear reader, to leave comments on the publication, you must to register.

I have an account? Sign in

  1. svp67
    svp67 17 December 2013 08: 02
    +9
    are conclusions being drawn, or is everything in the spirit: “we need to get rid of the persecution mania”?
    And there is only one conclusion - People making STATE DECISIONS ARE OBLIGED to take on some restrictions - in particular, communication by telephone numbers made abroad and by unverified special agencies. From here to the article, and one more conclusion - it is NECESSARY to develop such a production, and a MANDATORY COMPLETE CYCLE in our country ...
    1. pahom54
      pahom54 17 December 2013 09: 05
      +1
      for svp67
      Information protection services in our country began to be created back in the mid-70s, far ahead of the development of computer and consumer electronics, when there was no PC, no mobile phones, and so on. Even then, smart people said - the future is behind the basics of information security protection !!! But. as always in our state, this issue was generally missed, but they continue to deal with it. And these people have long developed rules for working with certain electronic devices of certain people in certain organizations, so there is no need to drive a blizzard about our general openness and accessibility for Western and other intelligence services. THIS IS NOT AND WILL NOT !!! And to sell secrets for a bottle of vodka (I exaggerate of course) - this can happen in Russia and this can happen.
      The problem of information security for Russia today consists primarily in the fact that there are practically no computers, no mobile phones, and so on, including software - OWN, RUSSIAN DEVELOPMENTS !!! And while we use all the imported equipment and software, the possibility of being under control remains.
      Well, well, with pleasure, without fear for maintaining state secrets, I authorize the NSA and the CIA of the USA to follow how I send natural necessities in the toilet, if they need it ... I somehow like that ...
      In general, not everything is as scary as the author draws. And may even ponder over the following: who cares every nigger or Russian lumpen listen and spy, and what dibs on the implementation of this idea, it is necessary to spend ... Bluff!
      1. Ivan.
        Ivan. 17 December 2013 13: 31
        +1
        Quote: pahom54
        The problem of information security for Russia today consists primarily in the fact that there are practically no computers, no mobile phones, and so on, including software - OWN, RUSSIAN DEVELOPMENTS !!!

        They wrote already that having seized upon the power of the United States, first of all, it began to deal with the destruction of electronic industry enterprises and specialized institutes involved in computer equipment and software. After all, long before that they knew where in the future the main, primary battles would unfold.
        Quote: pahom54
        In general, not everything is as scary as the author draws

        You can take it personally, I’m interested in this problem for a long time and I know that everything is much worse, there is a systematic underestimation of this danger.
        It got to the point that the owners of smartphones and laptops began to seal the so-called front cameras,
        Yes, the fear of the most harmless danger of modern electronic devices will come to their senses when it will be too late.
        Quote: pahom54
        who needs every nigga or Russian lumpen to listen to and peep, and what grandmas you need to spend on implementing this idea ... Bluff!

        It is intended for this - the main "wiretapping" will be carried out by software. People are needed here only for systematization and improvement. The database will be smaller in volume than the fsya film library and therefore nothing will be deleted from it. This is necessary for the "census" of the world's population as a preparation for the era of total electronic control. By the way, why are modern population censuses being conducted? Doesn't the authorities have comprehensive information (including in electronic form) about every passport holder?
        1. pahom54
          pahom54 17 December 2013 13: 49
          +6
          for Ivan
          I’ll try not to refute your cons and doubts, but to explain YOUR point of view.
          At one time, I graduated from the Krasnodar Higher Military High School, the only one in the Union, studied in the period 1973-1976. So then, already with us one of the main subjects was Information Security (OBI), the only thing is that we then studied all this on our fingers, and the teachers told us: anyway, this direction is the future ...
          Further more sensible guys started to graduate than my graduation. A striking example is Kaspersky, who not only graduates from our school and not only creates antivirus programs, but also organizes and implements counteraction against foreign intelligence at the government (state, more precisely) level, and not only in Russia, but also in its friendly states, and successfully.
          That is why I say to the flood, which is present in the article - NOT EVERYTHING IS SCARY, who needs it - takes measures, but it is not necessary to frighten people with horror stories once again.
          And in general, I wanted to note: if I don’t think about any issue here, I try to walk silently so that people can’t compost their brains with empty slogans ...
          1. Ivan.
            Ivan. 17 December 2013 14: 20
            0
            Quote: pahom54
            I try to walk silently

            I also try and partially agree about the article - there is nothing interesting in it, really some horror stories. + Only one - information security for some citizens will cease to be an empty phrase.
            But about "calmly citizens, it's okay" I disagree as well as I will not prove my point of view, because for this I would have to get into biology, psychology, physics and other scientific matters with multiple facts explaining my point of view. It is impossible to do this, here you can only compare your vision of complex problems.
            1. pahom54
              pahom54 17 December 2013 15: 42
              +3
              for Ivan
              So take a closer look, as I said above: The main danger is that we do not have our own designs for mobile phones, nor our computers, nor our own software, etc., that is, OUR DEVELOPMENTS for the civilian population !! ! But for the military and state structures, these developments are. And the article says that a simple mobile phone poses a threat to our state and national security !!! Well, is it not a flood ???
              The fact that they train through household electronic equipment and look for ways to influence our society is, of course, dangerous. But who is guilty of the fact that now even a Soviet-made iron, that is, Russian-made, cannot be bought? !!! In any microwave, washing machine, TV set and player, there are at least Chinese chips, and who knows what they are for. But since the state does not have the ability to protect the people in this everyday way, then let them arrange the production of at least irons without the chips of others. Well, now I'm falling into insanity, but there is something in it.
              1. Ivan.
                Ivan. 17 December 2013 16: 58
                +1
                Quote: pahom54
                And the article says that a simple mobile phone poses a threat to our state and national security !!! Well, is it not a flood ???

                Although such, this topic is hushed up or distorted, and those rare grains that are made public do not do weather. But the danger is, albeit indirect, there is no desire to give examples. Regarding the words-concepts, flood, IMHO, gadget, boxing, gasturbiter, tuning, adapter (try to understand what they mean by the power supply, adapter or something else), etc. I'm allergic to them. On their example, it is clearly visible how vulnerable our society is, so we are our language and the information it has been swallowed
                .
                Quote: pahom54
                But who is guilty of the fact that now even a Soviet-made iron, that is, Russian-made, cannot be bought ?!

                Quote: pahom54
                But since the state does not have the opportunity to protect the people in this everyday way, then let them arrange the production of at least irons without other people's chips

                So you agree to the extent that competition cannot be good, that we do not need rabid capitalism, and in general the state should belong to the people, although of course there is a grain to it laughing .

                Quote: pahom54
                The main danger is that we do not have our own development of mobile phones, nor our computers, nor our software, etc., that is, OUR DEVELOPMENTS for the civilian population !!

                I already wrote about this.
                The United States first of all began to deal with the destruction of electronic industry enterprises and specialized institutions involved in computer hardware and software.

                In general, everything that you say is clear, and I basically agree with this, therefore I will repeat once again (in which we do not agree) that the danger of computer technology, including wireless technology, is underestimated, including by you. I consider them in a complex: UEC, BIOMETRIC DOCUMENTS, ELECTRONIC GOVERNMENT TOGETHER WITH ФЗ210 OF 2010 OF THE GOVERNMENT SERVICES, CELLULAR COMMUNICATION TOGETHER WITH UHF ANTENUES ALL OVER THE COUNTRY, SOCIAL ONLY THERE ARE WAY TO SEE. optimism about our future - the enemy is terrible that you do not recognize or underestimate.
              2. The comment was deleted.
              3. rolik2
                rolik2 17 December 2013 17: 41
                -3
                for pahom54

                Quote: pahom54
                a simple mobile phone poses a threat to our state and national security !!!

                Maybe tell me what kind of threat they carry? Are the conversations of Aunt Masha or Uncle Vasya somehow undermining national security ??

                Quote: pahom54
                In any microwave, washing machine, TV set and player, at least Chinese chips are sitting, and who knows what they are for

                That you are the father maniac laughing . Dual purpose chips in the washer it's cool good
                Do you have any idea how much it costs to develop and launch the production of dual-use chips ???
                And why is it a PRIVATE company? And how much will such a chip be more expensive than usual?
                Well, even if such chips are in your washer, how do they activate them? And what information will they collect? And most importantly, how to transfer and to whom?
                I’m just wondering if you have any evidence that Russian or other specialists found dual-purpose chips in foreign technology, and what real harm did they bring?
                1. pahom54
                  pahom54 17 December 2013 19: 06
                  0
                  for rolik2
                  Have you ever carefully read what I wrote? They simply pulled out a phrase from the text - and I became a maniac. Come back, read ...
                  And about the chips in the irons - I said it myself - read - that this is insanity, BUT !!! I often read this muin and like it, not only on the Internet, but even here it comes across the forum.
                  1. rolik2
                    rolik2 17 December 2013 19: 56
                    0
                    I just developed your thought laughing
                    And do not be offended by a maniac)
        2. Sargord A.
          Sargord A. 17 December 2013 16: 01
          0
          Quote: Ivan.
          Do the authorities have no comprehensive information (including in electronic form) about each passport holder?

          Given how many people we live outside the place of registration, for example, think for yourself.
    2. Airman
      Airman 17 December 2013 09: 55
      +3
      Quote: svp67
      are conclusions being drawn, or is everything in the spirit: “we need to get rid of the persecution mania”?
      And there is only one conclusion - People making STATE DECISIONS ARE OBLIGED to take on some restrictions - in particular, communication by telephone numbers made abroad and by unverified special agencies. From here to the article, and one more conclusion - it is NECESSARY to develop such a production, and a MANDATORY COMPLETE CYCLE in our country ...

      This needs to be told to our IPHONE, because he is the second person in the state, and this is his PUBLIC PASSION,
      1. Hon
        Hon 17 December 2013 11: 07
        +6
        Quote: Povshnik
        This needs to be told to our IPHONE, because he is the second person in the state, and this is his PUBLIC PASSION,
      2. The comment was deleted.
      3. Ivan.
        Ivan. 17 December 2013 13: 35
        +1
        Quote: Povshnik

        This needs to be told to our IPHONE, because he is the second person in the state, and this is his PUBLIC PASSION,

        Why upset him to tear away from his favorite toys, you just need to use this drain channel and everything and the wolves are full and we feel good.
        1. Airman
          Airman 17 December 2013 16: 01
          0
          Quote: Ivan.
          Quote: Povshnik

          This needs to be told to our IPHONE, because he is the second person in the state, and this is his PUBLIC PASSION,

          Why upset him to tear away from his favorite toys, you just need to use this drain channel and everything and the wolves are full and we feel good.

          But he then merges secret information, not disinformation. Why send CIAshnikov (except to verify the information) if the main agent (iPhone) already blabs it all.
          1. Ivan.
            Ivan. 17 December 2013 17: 08
            +1
            Quote: Povshnik
            But he then merges secret information, not disinfect

            So his information is considered reliable, if desired, this can be used at least once. It must be of some use!
    3. Engineer
      Engineer 17 December 2013 18: 15
      0
      It is NECESSARY to develop such production, and MANDATORYLY COMPLETE CYCLE in our country ...

      This is not possible due to the lack of a range of technologies. Starting from the production of IP / MPLS routers ... ending with the production of telecommunication processors used in mobile communication centers (MSC) of cellular communication operators ..... well, the processors of smartphones and tablet computers themselves. You can list in detail the range of technologies, but I hope you understand what is at stake ....
  2. vlad0
    vlad0 17 December 2013 08: 09
    -1
    It seems that everything is much simpler: preparing a client base for yotafonov.
    They need to be sold to someone!
    1. Apollo
      Apollo 17 December 2013 08: 32
      +3
      quote-It got to the point that the owners of smartphones and laptops began to seal the so-called front cameras, so as to protect themselves from possible surveillance of special services.

      I immediately remembered Alexander Romanov when he complained about how he was photographed several times a day by a camera from a compass. Considering that the US intelligence agencies work in close coordination with the intelligence services of Western Europe, in my opinion, Romanov’s photos include all the intelligence services of Western countries, which means that he got into history in the literal and figurative sense of the word. laughing
      1. svp67
        svp67 17 December 2013 08: 52
        +1
        Quote: Apollon
        which means he got

        ... and where, we will learn from the next Snowder. So I think, soon we may have such a "SnowDer" ...
      2. Ascetic
        Ascetic 17 December 2013 10: 44
        +2
        He was probably led to the heap as a namesake Mafiosi with a wide nonsense and in all contacts wassat
        On December 11, the Civil Guard conducted a special operation against the "Russian mafia" in Spain called "Dirieba", which was coordinated by Europol. Eight people were taken into custody - both citizens of the Kingdom and Russians. Among those arrested, the police especially singled out Alexander Romanov, who, according to their version, is one of the leaders of the "Taganskaya" criminal group. They raided him with searches on a luxury villa located right on the seashore worth 3 million euros. There, according to a report from the Spanish authorities, a large collection of paintings was found, as well as stacks of dollars, euros, pounds and rubles. All valuables were confiscated. Alexander Romanov and his wife Natalia Vinogradova were arrested.
        Former head of "Crystal" arrested in Spain as the leader of the mafia
        And his avatar clearly hints at a connection with the Kristall plant, so he got into development ..
        In Moscow, Alexander Romanov is known as the former general director of the Moscow Plant Kristall. He headed this enterprise from 2000 to 2005, and the change of power at the vodka enterprise was accompanied by loud scandals. Soon after his dismissal for "financial violations", a criminal case was initiated against Mr. Romanov on the facts of large-scale fraud (part 4 of article 159 of the Criminal Code of the Russian Federation) and abuse of office (article 201 of the Criminal Code of the Russian Federation). According to the investigation, Alexander Romanov and his deputy Pavel Lobanov bought the plant for 220 million rubles. unsecured promissory notes of two firms - General Investment Company LLC and Kvant LLC. By that time, Pavel Lobanov managed to hide abroad, and Alexander Romanov was arrested in September 2005.

        Eventually in 2006, the Zelenograd District Court sentenced him to three and a half years in prison. After serving this period and having been released, Alexander Romanov moved to Mallorca, where, apparently, he will again face trial.
    2. AlNikolaich
      AlNikolaich 17 December 2013 10: 57
      +2
      So "yotafon" is molded abroad (Singapore)! And his components are Chinese! And Google's android is on it ...
      In short, another "patriotic gadget"!
      And the "bookmarks" there definitely wake up!
    3. Aleks75070
      Aleks75070 17 December 2013 23: 59
      -1
      Perhaps you are right ..
  3. makarov
    makarov 17 December 2013 08: 26
    +2
    In pre-war and post-war times there were a lot of posters with different images, but the same slogan "Don't talk !!!"
    1. svp67
      svp67 17 December 2013 08: 33
      +3
      Quote: makarov
      but with the same slogan "Don't talk !!!"
      All army communications have always had the inscription "Caution. The enemy is LISTENING!"
  4. ReifA
    ReifA 17 December 2013 08: 31
    +2
    Even if it’s passion from scratch, God saves the safe.
  5. jjj
    jjj 17 December 2013 08: 41
    +3
    In the shipyards of Severodvinsk, from the very beginning it is forbidden to carry even a simple phone with a camera over the entrance.
    Another case from history. When we did not have a Duma, and the Congress of People's Deputies was in session, the elected officials decided that voting by raising seats was not comme il faut. We decided to order a computerized system. And when they did, the Committee found the bookmarks. Okay, this special order. All the first computers were delivered to us in a spy version. All these 386s, 486s and the first Pentiums.
    1. Professor
      Professor 17 December 2013 12: 11
      0
      Quote: jjj
      In the shipyards of Severodvinsk, from the very beginning it is forbidden to carry even a simple phone with a camera over the entrance.

      At Rafael, employees only bring smartphones and other mobile phones if they physically remove the camera from them. I personally witnessed how a client brought a brand new iPhone in a box to the workshop and asked to get the camera out.
    2. Mature naturalist
      Mature naturalist 17 December 2013 12: 13
      +1
      Quote: jjj
      All the first computers were delivered to us in a spy version. All these 386s, 486s and the first Pentiums.

      Let me not believe it. In those days, computers worked mostly locally. The Internet was an email from the Relcom network, accessed through a 2400 baud modem.
      Computer Photo and video cameras did not exist, etc.

      And mass purchases of personnel, for example, by the Central Bank, took place under the control of the FAPSI - was / is it? such a PII, which selectively from the party these personalists checked for bookmarks
    3. The comment was deleted.
  6. La-5
    La-5 17 December 2013 08: 45
    +2
    Back in 1998, the film Enemy of the State was shown; now it is prophetic. The problem of espionage using household appliances has been around for a long time, but for some reason the excitement began with Snowden. Before him, were people a deep gray mass?
    1. sasska
      sasska 17 December 2013 11: 30
      0
      But are all useful smartphones technically savvy enough to master at least all the functions of their device? not to mention the analysis of technical information transmitted by the device.
      Here is an example of getting SSH access to iPhone via USB:
      ./iphone_tunnel -lport 2222 ssh -p 2222 [email protected] password: alpine
    2. Ivan.
      Ivan. 17 December 2013 13: 41
      0
      Quote: La-5
      Before him, were people a deep gray mass?

      Night blindness is called.
  7. jjj
    jjj 17 December 2013 08: 47
    +2
    Yes, I completely forgot. Have you ever wondered: why on our military training grounds, naval bases, military-industrial complex enterprises and in the places of deployment of a large number of military units, the "civilian" GPE works with increased accuracy
    1. Wedmak
      Wedmak 17 December 2013 09: 45
      +2
      Yes, I completely forgot. Have you ever wondered: why on our military training grounds, naval bases, military-industrial complex enterprises and in the places of deployment of a large number of military units, the "civilian" GPE works with increased accuracy

      Where does this information come from? And tell me, how can a GPS work at a naval base with increased accuracy, and in a nearby city with a lower accuracy?
      If I’m not mistaken, the signals from the satellites are the same, different only the devices that receive them (more precisely, the firmware and the controller’s crystal).
      1. Professor
        Professor 17 December 2013 12: 15
        +1
        Quote: Wedmak
        If I’m not mistaken, the signals from the satellites are the same, different only the devices that receive them (more precisely, the firmware and the controller’s crystal).

        You are right, but not entirely. The bourgeois civilian GPS signal is sometimes deliberately "distorted" by introducing an error in the positioning of some satellites (located at the moment over the required territory). However, such a distortion covers almost half of Europe and certainly not a base or a city.
    2. Engineer
      Engineer 17 December 2013 16: 42
      +1
      To understand the issue ... GPS and GLONASS satellite navigation groupings have several frequency ranges .... L1 and L2 (P (Y) - GPS code and BT code for GLONASS). It is precisely because of this that the navigational equipment of users (NAP) for military use has increased accuracy and ... increased noise immunity (increase up to 10-12 dB) .... If an adaptive antenna array is used in the NAP, then the increase is another 35-40 dB. Civil NAP has, as a rule, only the L1 frequency range for GPS and GLONASS ..... There is also a geodetic NAP .... but there is another song .....
  8. saag
    saag 17 December 2013 08: 58
    +1
    information security paranoid is the normal way of working
  9. awg75
    awg75 17 December 2013 09: 03
    +6
    I can imagine how many state secrets our small Aifonchik whispered on his favorite toy --- Mama Do not Cry ...
    1. Wedmak
      Wedmak 17 December 2013 09: 57
      +2
      If only immediately upon arrival to the Kremlin the FSO did not take this toy away. And she gave her in the same building.
    2. alone
      alone 17 December 2013 20: 02
      0
      Quote: awg75
      I can imagine how many state secrets our small Aifonchik whispered on his favorite toy --- Mama Do not Cry ...


      Whispered? Have you seen the man talking with the phone in a whisper? He did not whisper. He spoke in a steady and normal voice)) laughing
      1. rolik2
        rolik2 17 December 2013 20: 08
        +1
        I can imagine how many state secrets our small Aifonchik whispered on his favorite toy --- Mama Do not Cry ...


        You know so do not respect your special services good
        Or do you really think that someone gave him a call on that iPhone?
        And to correspond via the Internet?
        The fact that he talked with them on TV is something like the popularization of high technology.
  10. sanyabasik
    sanyabasik 17 December 2013 09: 06
    +8
    There were always enough talkers ..
    1. svp67
      svp67 17 December 2013 09: 50
      +3
      Quote: sanyabasik
      There were always enough talkers ..

      Like fools ... And most of them are ONE AND THE SAME FACES ...
    2. kirgudu
      kirgudu 17 December 2013 10: 13
      +5
      “There is one person I'm afraid to rely on.”
      - Who is he? Name this dog, sir!
      “It's you, Traloni.”
    3. HAM
      HAM 17 December 2013 13: 33
      0
      HAPPY !!!
    4. samoletil18
      samoletil18 17 December 2013 17: 19
      0
      Quote: sanyabasik
      There were always enough talkers ..

      On this device you need to throw disa - will go right to the destination.
  11. rolik2
    rolik2 17 December 2013 09: 37
    +2
    to capture the password entry in the access system to the secret object


    The author is clearly not familiar with measures to protect secret data in the troops.
    There are two components organizational and technical.
    In order to get into the office with the secret equipment, they shaken out everything from me, down to the pens and keys with the key fob from the alarm (to the car), while working on the secret computer they also turned on the "Volna".

    In the meeting room Vibrators on the walls and windows are constantly turned on, and a jammer for mobile phones is constantly on.

    But they did not begin to make the truth long ago, with the advent of a new commander, and with the old it was all up to the lantern.
    1. Volodin
      17 December 2013 12: 41
      +3
      Alexander, I can personally introduce you to a person (which, of course, I will not do smile), working at ARZ (defense aircraft repair plant) in the so-called "secret shop", proud of the presence of photos in the phone's memory against the background of very interesting "gizmos" with all their stuffing. Is the "jammer" really bad there ...
      1. rolik2
        rolik2 17 December 2013 13: 54
        +1
        Quote: Volodin
        I personally can introduce you to a person (which, of course, I will not do smile), who works at ARZ (military-industrial complex aircraft repair plant) in the so-called "secret shop", proud of the presence of photos in the phone's memory against the background of very interesting "gizmos" from all of them stuffing.



        there the first section does not itch, and the head of the nut does not tighten, everyone just p ... th.

        To plant a couple of such "proud" comrades, together with comrades who are obliged to ensure secrecy at the enterprise, and then systematically carry out a set of measures to counteract the smuggling and use of l / s photo and video equipment.
        1. Volodin
          17 December 2013 14: 01
          +2
          About that and speech ...
      2. alone
        alone 17 December 2013 20: 03
        0
        Quote: Volodin
        Is the "jammer" really bad there ...


        Question: does a jammer exist there or is it just a formality?
        1. rolik2
          rolik2 17 December 2013 20: 18
          0
          Quote: lonely
          Question: does a jammer exist there or is it just a formality?


          There is, it costs itself what it will be?
    2. Ivan.
      Ivan. 17 December 2013 13: 46
      +2
      Foo scared, I already thought Odessa Romanians captured.
  12. rpek32
    rpek32 17 December 2013 09: 41
    +1
    and in the new iamobyl village there is a fingerprint scanner. nazdorovitsa. laughing
  13. kirgudu
    kirgudu 17 December 2013 10: 03
    +5
    This is not paranoia, this is reality. Even 10 years ago, a friend showed how remotely you can cut a microphone on a fresh one back then, Siemens S25. I only cut into the path with diagnostic equipment and a test cell.

    Well, or there was a cartoon about 5 years ago, when Intel's server network cards died from a special package that the damn thing could come from.

    For good, Russia needs its own complete elemental base, its software, its engineers. Any Ketai or UWB harmless chip can lead to loss of combat capability at the right time. At least in the defense industry and state. organs.

    Moreover, you need to think about your communication networks, an analogue of the Internet. So that we can at any moment not be left without everything.

  14. Grbear
    Grbear 17 December 2013 10: 07
    +1
    Paranoia develops due to the realization that it is impossible to influence anything. Everything else is a normal culture of the user, who should understand that the phone is in order to make calls, and not "plant" the brains of his neighbor with his experiences, pictures and other information junk. If someone wants to track such a user, then the flag is ...

    An entirely different matter is the protection of information of applied value. Here, indeed, it is necessary to move away from the "shareware" software and the technical base of Western "partners". We have enough brains for this. Maybe just take money from Skolkovo and launch a competition among our hackers. I remember how our "stuffed" their meter games into 256K RAM. I don't think everyone is extinct.
  15. saag
    saag 17 December 2013 10: 15
    0
    Quote: kirgudu
    For good, Russia needs its own complete elemental base, its software, its engineers.

    There was a developer of Elbrus, now Intel works
  16. rolik2
    rolik2 17 December 2013 10: 21
    0
    Quote: GrBear
    it is necessary to move away from the "shareware" software and the technical base of Western "partners"


    Whose hardware and software, in principle, does not differ, in all parts of the computer for working out secret documents, it is not known where, by whom, and from what components is that and the software of the same Bill Gates. But I didn’t hear information about leakage of secret data through technical channels.

    It all depends on the regime of secrecy and its observance.
  17. Kowalsky
    Kowalsky 17 December 2013 10: 43
    0
    I think the NSA is working for the future. They not only spy on us through their phones, but, of course, have full access to any computer connected to the Internet. And all in order to create and catalog the Global Collection of the World * no. Then, when the collapse of human society comes and we shout in panic "Chief, everything is lost!", They will appear - People in Black and say: "Calm down, humanity! We have saved the most important data and achievements of civilization!"
  18. Averias
    Averias 17 December 2013 10: 50
    +2
    An acquaintance went to Angel Falls (Venezuela), brought a bunch of pictures. I dropped them on the "cloud". I asked to show, he answered: So come to me on the "cloud". I, to him: And the password? In response: 12345. Comments are unnecessary.

    For reference: Project "Social Networks", this is a project of the British military, see what and how. The result exceeded all expectations.
    1. Mature naturalist
      Mature naturalist 17 December 2013 12: 21
      +1
      Quote: Averias
      Project "Social Networks" is a project of the British military, see what and how

      I completely agree. There is some kind of network exhibitionism when everyone wants to lay out all the information about themselves. I confess, at first I registered at Odnoklassniki, then I demolished all the real data.

      But they follow us without our special consent: Windows 8 stores everything on Outlook.com, Androids on Google ...
    2. The comment was deleted.
  19. ZU-23
    ZU-23 17 December 2013 11: 09
    +2
    Yes, for the top, of course, you need to be careful, you need to deal with it and be encrypted by any methods and there are a lot of them, but for me personally on the drum. Generally they say that millions of terabytes of information have accumulated in the NSA, so it’s not realistic to process so much information. Further more, soon everyone in the world will have a smartphone tablet or computer, many even have it all at once, so for ordinary people this is all crap.
  20. IGS
    IGS 17 December 2013 11: 16
    +7
    Yes it is not a great secret, most operating systems have a "back door". And any schoolchild will cram software for spying on someone into a modern phone. The camera will include a microphone, read SMS and know the location. Also with computers. Or do you think you installed antivirus and that's it? Going online, clearly imagine that EVERYTHING you are doing is not a secret, anonymity on the Internet is fiction, it can be difficult to determine your actions, but not excluded. Modern cellular is constantly on the network. It is simply impossible to remove the batteries on some. When you press the shutdown button, it simply goes into "Stand by" mode. And if you did take off ... on many devices there is another one, right on the board, a little truth. Didn't notice removed the battery for half an hour, set it on, but the time is right. smile? If you are afraid of surveillance, just do not use these devices. Now it is in vogue to follow your wives (husbands) through the phone, which they themselves presented. So we are not talking about the NSA, your wife can follow you, despite the fact that she will slap this software on your bodies herself, no matter how you consider her a "blonde", it is not easy, but very simple.
    And the NSA is now investing in projects for processing large amounts of data, they have already received ways to obtain data, now they need to be processed quickly. And in the near future, most will be under a tight cap, even if you do not use a phone and a computer, there are cameras installed almost everywhere, there are street cameras that can read your iris, however, so far at not very large distances. Plastic travel cards. Already, there are cases that were disclosed by the police using data obtained from the turnstiles, near which the owner of the transport card passed.
    So get used to it. Even if there are laws restricting all this, in essence it will not change anything. Look for the pros (well, or relax and have fun), for example, now I know when my children went to school, what they bought for lunch, when they left, after a year there will be and what kind of assessment they received, SMS messages come in real time. And if you want to know where your child is, the operators have tariffs when their location is tracked.
    There is only one way to protect yourself - to go to ... in the Stone Age wassat
    1. Engineer
      Engineer 17 December 2013 17: 43
      +1
      NSA is now investing in large data processing projects

      Not quite so in relation to Russia .... We ourselves are investing in the development of their (NSA) infrastructure, not only in terms of building the Rostelecom IP / MPLS backbone network, but also in upgrading 3G and building a promising 4G (LTE) network. I would like to note that the LTE network will be used in the interests of the FSB, FSO, the Ministry of Internal Affairs and the Ministry of Defense .... on the basis of a decision of the Security Council (SB) of October 01, 2010. The national security of Russia is directly related to the modernization (or rather, the construction of a new one) of the communication system.
      1. IGS
        IGS 18 December 2013 10: 10
        0
        The national security of Russia is directly related to the modernization (or rather, the construction of a new one) of the communication system.
        I don’t quite understand what you have under that? Building a closed network that does not have access to external resources? There are such. Or the fact that now the Germans are trying to shove after the scandal? So is this just a routing change? Or do you want to introduce your national protocol, with a complete change of all telecommunication equipment? What's the point? Cut it?
        1. Engineer
          Engineer 18 December 2013 12: 44
          0
          Once again for understanding (read full) ....
          that the LTE network will be used in the interests of the FSB, FSO, the Ministry of Internal Affairs and the Ministry of Defense ....based on the decision of the Security Council (SB) of October 01, 2010. The national security of Russia is directly related to the modernization (or rather, the construction of a new) communication system ....
          Or do you want to introduce your national protocol, with a complete change of all telecommunication equipment?

          I do not want to enter anything ..... I am familiar with the Security Council decision on this issue ....
          Three tasks were set for the Security Council ..... carefully study the open part of the Security Council decision ... well, the closed part ... is another story. Replacement of telecommunication equipment is the decision of the Security Council .... there was no question of introducing a national protocol ......
    2. Engineer
      Engineer 17 December 2013 18: 09
      0
      And in the near future, most will be under a tight cap, even if you do not use your phone and computer

      This is a misconception ... the main task of the NSA is not to control the residents of the village of Chmarovka .....
      there are street cameras capable of counting your iris, however, so far at not very large distances.

      Identification of the person by the iris is very expensive, so you do not need to mislead users. For example, the CIA uses a Russian 3D technology, which was sold by students from Russia, for identifying a person ..... The US Navy also uses this technology from Russia .....
      According to the Russian Ministry of Internal Affairs, the identity of the cameras is not more than 15% ... For information, a huge amount of money was invested in the Safe City project (by video cameras) in the interests of the Ministry of Internal Affairs .... however, the results leave much to be desired .... about efficiency is better not to speak in the media .....
      1. IGS
        IGS 18 December 2013 09: 50
        -1
        What do you mean by 3D? Is it that a person goes to the camera and spins? Or hung up with cameras? VOCORD FaceControl 3D? Designed in Skolkovo? Well, well ... You would be silent about this five-year cut. Or are you one of those who damn it promotes this stuff.
        Americans can use a lot of things like us.
        The identification algorithms in graphic files or streams were first widely used in Las Vegas, they poured a lot of casino money into it and there it justifies itself. Ours in Moscow simply drank the loot by installing cheap cameras instead of normal ones, and somewhere completely fake ones, somewhere and there wasn’t, there was a scandal when even the wiring was not connected to most cameras, and a static picture was displayed on the operator’s monitor, or was duplicated from another camera.
        For example, the CIA uses a Russian 3D technology, which was sold by students from Russia, for identifying a person ..... The US Navy also uses this technology from Russia .....
        What kind of technology? which algorithm? Title to the studio.
        Identification by the iris is very expensive
        Is it cheaper to use 3D cameras instead of one? And a wagon of CPU time. And even more so at the command post, and not "in the crowd."
        no more 15%
        Where are these numbers from? 15% of what? 15% "in the crowd" in real time is a very good result, even much more than excellent.
        Or do you mean, recognition of a person by a person in the image? Then yes ! Even if the identifiable person bury, you can recognize it only in 15%, with those cameras that are installed.
        1. Engineer
          Engineer 18 December 2013 12: 37
          0
          You would be silent about this five-year cut. Or are you one of those who damn it promotes this nonsense.

          You’ll be more careful with your snot and expressions .... if you don’t know something, then it’s better to just stupidly shut up and don’t need to show your emotions here .....
          1. The International Organization for Standardization (ISO) has decided to include three-dimensional face recognition in biometric standards. Russia suggested changing the standard, which was the first international initiative of our country in the field of high technologies, and the authors of the three-dimensional recognition method are our compatriots, graduates of MSTU named after Bauman .....
          Source - http://npo-inform.ru/press/250106/
          2.3D scanner - for registering the shape and texture of the surface of objects, as well as creating their high-quality two- and three-dimensional models ... Learn
          http://npo-inform.ru/produkt/bskiud/3gf/3dkdr/
          3. About iris identification - tell me in another place ...
          4. The numbers were announced by the representative of the Ministry of Internal Affairs of Russia at the conference ....
          http://stismvd.ru/
          I personally was at this conference .... and recorded the report ...
          1. IGS
            IGS 18 December 2013 21: 34
            0
            From Baumanka, the guys have nothing to do with the Ministry of Internal Affairs or have skolkovo.
            You are more careful with your snot and expressions.
            VOCORD FaceControl 3D, how many were allocated to it in skolkovo, can you tell? In addition to articles, conferences and YOUR SOPLE, where is the result?
            The numbers were announced by the representative of the Ministry of Internal Affairs of Russia at the conference ....
            http://stismvd.ru/
            Indicate the article and not the entire site.
            D scanner - for registration of the shape and surface texture of objects
            • 2D and 3D high-resolution images
            • Working distance from 0.5 to 2.5 meters
            • Viewing angle 45º
            • Speed ​​of data collection and processing up to 15 frames / sec
            It? The normal camera operates at 8–10 m with a suspension height of 2–3 m.
            Do you propose to put this on the front door of the apartment? And how will it work outside? And at the entrance (that it will work at the entrance, I doubt if 3 person goes) or the command post, in such places the Videolocator software will perfectly cope with this with cheap IP cameras (or generally AceCorp at a price of 16 thousand rubles in addition with video capture card), without superdevices. Moreover, this is not a super device, but a very simplified megapixel toy, an analogue of the system of the not new communicator LG Optimus 3D (by the way, there is a 5 megapixel matrix, with 3D we divide by 2). But the cost is not a toy. Another drink? And for the future, comrade specialist, in order to get a 3D image on squares (airport, metro stations, etc.), the cameras must be decently spaced and very clearly synchronized. Therefore, it is easier to use conventional cameras and associated image processing algorithms.
            A retinal scanner for IR costs about 12 thousand rubles (you can buy cheaper for a computer http://myequipment.ru/blog/gadjets/3363.html),a you can simplify and use the picture of the iris, but this scanner is easier to fool, it cost 200-300 dollars, for this you can also use an ordinary color camera with good resolution, and significantly increase the distance.
            1. Engineer
              Engineer 18 December 2013 21: 43
              0
              IGS - do not spray snot .... It seems that YOU are not at all in the topic, if you did not know about the 3D scanner ....
              1. IGS
                IGS 18 December 2013 22: 02
                0
                Do you have something to say to the engineer? I'm allergic to 3D, and why he explained and gave an example of earning money (VOCORD FaceControl 3D). Therefore, your comment is just ... if not, then give comrade engineer the name of what the Baumanites developed. And can you give me the price for what is so expensive for a retina or shell scanner? And why is it more expensive and non-functional than 3D cameras? If not, go "engineer" further.
                1. Engineer
                  Engineer 18 December 2013 22: 23
                  0
                  Bring Comrade engineer the name of what Baumanovtsy developed.

                  Already cited - BROADWAY ™ Wide-Field 3D Camera .... poor Internet access ?????
                  http://npo-inform.ru/produkt/bskiud/3gf/3dkdr/
                  Biometric barrier - BROADWAY CHECK POINT ™
                  http://npo-inform.ru/produkt/bskiud/3gf/bbdvSKUD/
                  I don’t help you ... do not make a request here .... http: //npo-inform.ru/contact/
                  Address: 117105, Russia, Moscow, Warsaw highway, 37a
                  Tel. + 7 (495) 937-16-46
                  So study and study ....
                  If not, go "engineer" further.

                  Where I go is not for you to decide ... This resource is not yours ... so sit on the rail .. exactly. Here you are not a sandbox .....
            2. Engineer
              Engineer 18 December 2013 22: 13
              0
              IGS !!! No snotty pointers!
              From Baumanka guys have nothing to do with the Ministry of Internal Affairs

              What are you saying ??????
              Read again and again carefully:
              Activities of NPO "Information" .... Participates in the program for the creation of Russian biometric passports as a subcontractor of the FSUE NII "Voskhod" - supplies software and hardware systems for registration and control of biometric data. Priority complexes put into operation at the institutions of the Ministry of Foreign Affairs and the Federal Migration Service in Moscow and Kaliningrad ....
              The Russian project to amend the ISO / IEC 19794-5 standard in the field of digital face imaging, prepared by the Information Society, is supported by 30 countries ...
              Read here ..... http: //npo-inform.ru/
              Here's the company’s announcement of the introduction in the US ....
              A4Vision Inc. made a statement that the Federal Security Service (FSO) under the US Department of Homeland Security has implemented its biometric three-dimensional face recognition technology in its 10th District Center. The Vision Access 3D Face Reader system, which is the world's first three-dimensional reader for identification / verification of identity by the shape of the face surface, has been controlling physical access to the building of the District Center since October 2005. The installation of this system pursued two goals: to provide access control to the building and evaluate the technical capabilities of A4Vision products.
              http://npo-inform.ru/news/070206/
              So IGS sit exactly on the train .... ne .... and, continue to put your cameras on the front door of the apartment and entrances, Mr. Installer ..... your cameras and decisions have nothing to do with identity identification ... ..
              1. IGS
                IGS 18 December 2013 22: 23
                0
                What kind of guys are you talking about now? About those who ran away? They didn’t want to wait 2500 years, according to them, and the link to which you gave me, and which slammed 36 lyam greens? Or just about the whole MSTU, which had the honor to finish. Kuntsevsky branch at MRTZ, faculty of TM.
                Now tell me the cost of this miracle of development and installation. I think not only will I be interested to know
                1. Engineer
                  Engineer 18 December 2013 22: 26
                  0
                  who slammed 36 lyam greens?

                  Oh well .... but they didn’t give you ?????
                  1. IGS
                    IGS 18 December 2013 22: 36
                    0
                    For example, the CIA uses a Russian 3D technology sold by students from Russia to identify themselves.

                    A4Vision Inc, Did students from Baumanka sell them? According to your statements, it turns out like this. laughingThey founded it, if you think that this is the norm for things, when ours work for them, then I'm sorry. Then changing all the equipment will not help, sorry. And the decisions of the Security Council too.
                    1. Engineer
                      Engineer 18 December 2013 22: 43
                      0
                      Dear IGS .... All information is online. All you are doing now is pure flood water .....
                      You wrote in one of the messages ...
                      there are street cameras capable of counting your iris, however, so far at not very large distances.

                      I answered you ...Identification by the iris is very expensive
                      That's all ..... but the topic is different and is called: The story of mobile phones: paranoia or a real security threat
                      1. IGS
                        IGS 18 December 2013 22: 49
                        0
                        The world will not bark, but the iris is not expensive, the retina (with all capillaries) is expensive, and it’s not harmless, they say. smile
                      2. Engineer
                        Engineer 18 December 2013 23: 30
                        0
                        but the iris is not expensive, the retina is expensive (with all capillaries)

                        The world .. agrees with you ..... You, I hope, agree with me - the more implementations, the cost of products decreases ...... I participated in many international conferences on identification .... I know many technologies .... Of course, you are right that Russia has a large corruption component ..... Yes ... I am familiar with VOCORD FaceControl 3D developments (as well as with the general director) .... here I fully support you .... unfortunately, there is clearly a corruption scheme ... I have repeatedly spoken about this at more than one meeting in the FMS and the Ministry of Internal Affairs ......
                        As for the guys from the Moscow State Technical University, who "stole" the technology of personal identification, let the FSB do it ... This is not my business, I hope for understanding .... I think it's good that Russian technologies work for the benefit of people .. ..
                        Yes ... at one of the conferences in Turkey (Istanbul) .... there was a report on identification of the person by the iris .... indeed the report aroused great interest from all participants ... and the representative of the US Department of State (they interested in the introduction of identification technologies in the United States). Gos. the department is directly connected with the FBI and the CIA .... + NSA. That is why, for 2015 it was (from memory in one of the reports) that the full deployment of AFIS in the USA ... and Europe .....
                        Here is something like this .....
                      3. IGS
                        IGS 19 December 2013 00: 16
                        0
                        Yes, God bless them with the guys, you can understand them, they would be bent here, and if they even took away the algorithm, which I think is the main thing, it's a pity, but God is with him. And I just ran into this topic at work a year ago, it was necessary to create a "protection", although it was a "high" whim, so I had to rummage in all this. I really didn't know about this sensor, although it seems to be not a novelty, it would have come off for a control point. I just went to the exhibition in Krasnaya Presnya, and saw so many "noodles for the ears of the people" that I was amazed, but there are serious developments, but mostly .... and for a lot of money, it feels like they were not going to imagine, but to get away with what do something. But this is IMHO.
                        We will argue about the advisability of changing network equipment. There seems to be no one of its own, the protocols are the same, but who will guarantee that the encores will be the same in it as those presented for certification? And this is only the beginning of the questions, but not today laughing wife will kill.
                        And about IP / MPLS I agree with you. I have not yet delved into the intricacies, I delve into it, but I think there are a lot of holes there, and not because of multi-protocol, but because of its routing.
                      4. Engineer
                        Engineer 19 December 2013 13: 23
                        0
                        God be with them guys, they can be understood, they would have bent here

                        I agree with you ....
                        We will argue about the feasibility of changing network equipment

                        This is not my decision .... it was written down in the decision of the Security Council of Russia .... I just took part, in my part, in preparing the document - nothing more.
  • predator.3
    predator.3 17 December 2013 11: 22
    +1
    here is the current poster on the topic.
  • Vasia kruger
    Vasia kruger 17 December 2013 11: 25
    +4
    Well, as they say, if you are paranoid, this does not mean that they do not follow you.
    In every joke ... there is a fraction of a joke.
  • Baton
    Baton 17 December 2013 14: 20
    +1
    When, back in Soviet times, I worked at TASS, and we created our own equipment room in the Grand Kremlin Palace, severe uncles came in, measured something from the street and forced me to push the PC away from the walls in the room ...
  • saag
    saag 17 December 2013 16: 18
    0
    A poster with a theme, modern version - "Don't talk - the phone is nearby" or "The phone is listening" :-)
  • samoletil18
    samoletil18 17 December 2013 17: 06
    0
    There are programmers, there are electronic engineers, production facilities are empty. What prevents you from doing your own completely? And also for export?
    1. Engineer
      Engineer 17 December 2013 18: 25
      0
      Hmm ... you are deeply mistaken ..... well then create powerful IP / MPLS routers, processors (preferably 4 core) for smartphones, but what can I say, let them make international and long-distance stations like AX-10, which cost everywhere on the Rostelecom network ..... Hmm ... and also mobile switching centers of mobile operators ..... It's not so simple .....
      1. samoletil18
        samoletil18 17 December 2013 22: 41
        0
        We must start simple, let the chips roll "thicker", let them work with a huge cooler, let them be backward. But let's not start, nothing will be 100% secure. The elementary base should be its own in important areas. And supercomputers are often needed for games. It's the same with operating systems.
        I myself understand - it's not easy, but even the DPRK has released its smartphone.
  • saag
    saag 17 December 2013 17: 19
    0
    Quote: samoletil18
    There are programmers, there are electronic engineers, production facilities are empty. What prevents you from doing your own completely? And also for export?

    Equipment for a 90-nm process, such an export is not necessary at all, unless there are any microcontrollers or DSPs, chip designers, if any, what are your ideas?
  • Engineer
    Engineer 17 December 2013 17: 32
    +3
    Hmm ... the tasks and goals of the NSA are not to listen to individual people from the village of Chmarovka ...
    The NSA collects and analyzes foreign communications, their coordinates, directions, and also performs highly specialized tasks for obtaining information based on the analysis of the communication traffic of foreign countries ..... Of course, the NSA is responsible for protecting state communications channels of the state. US institutions .....
    The NSA was fundamentally entrenched in Russia and, unfortunately, no one can do anything (no specialists) .....
    You can talk for a long time about the reasons why this became possible, but this is an unconditional fact related to the technological capabilities of the United States and the ill-conceived personnel policy of Russia at the turn of the 90s.
    To understand the issue, I will give only ONE fact (the one who wants to hear will hear!): In pr. ABN fully controls the national traffic (Rostelecom) of Russia using its Juniper (USA) equipment installed on the Rostelecom backbone network (total length of local networks: more than 2,5 million km - number of fixed-line subscribers: 33 million - Number of broadband subscribers: 6,75 , 48 million (XNUMX% of the Russian market) .....
    The Rostelecom network is based on 8 nodes of automatic switching (UAK) and 11 international switching centers (MCC) on which Juniper (USA) equipment is installed ....
    On the IP / MPLS network of Rostelecom in pr. The T640 Core Router dominates, which is a scalable high-performance multi-service core router in a small half-rack form factor housing. Each of the eight slots of the router provides speeds of more than 50 Gbit / s. Serves up to 8 ports OC-768c / STM-256, 40 ports with a speed of more than 10 Gbit / s (10GbE or OC-192 / STM-64) .... More Details on performance characteristics see here
    http://www.juniper.net/ru/ru/products-services/routing/
    One could talk about the cellular infrastructure, which is 100% built on the equipment of foreign manufacturers ... but this is a different and long story ... That's something like that ...
  • Engineer
    Engineer 17 December 2013 17: 56
    +1
    Edward Snowden taught a great lesson not only to the US NSA ... but also to all the special services of the world powers and, above all, specials. services of Russia .... Of course, Snowden could not know all the plans of the NSA, especially regarding the control of international and international highways of Russia .... we even have Min. Russian communications now do not know them (hmm .... checked) .... Although, I can say 100% that there are still aksakals who know the entire communication network of Russia .... Snowden could not know the plans to control mobile networks, to say only that subscribers of cellular networks are tapped, this is not relevant in 2013 .... The importance of monitoring a subscriber of a cellular network is not to control a subscriber at the level of a mobile switching center (MSC), there is a completely different task !!! !! Snowden is a cunning move by the United States, this is a distraction that is known to all specialists .... The US NSA will not waste resources on processing a huge amount of information received from routers located on the IP / MPLS network of Rostelecom - this is extremely expensive and ineffective ... . It is a pity that many were "led" to this "duck" -Snowden ....
  • saag
    saag 17 December 2013 18: 07
    0
    Edward Snowden seeks political asylum in Brazil, the eccentric man does not understand that it’s easiest to kill him there, there are a lot of poor people, but with weapons
    1. Engineer
      Engineer 17 December 2013 18: 28
      0
      Are you sure they want to kill him ?????
      1. saag
        saag 17 December 2013 18: 40
        0
        as it was said once before: "No man - no problem"
        1. Engineer
          Engineer 17 December 2013 19: 21
          0
          I agree with you. However, think for yourself and ask yourself the question: how dangerous is Snowden for the United States, that they cannot destroy it, especially in Russia? You will be surprised ... but over time, many will realize that it was just an operational game of the US special services, the goals of which are very, very clear .... You can easily find materials on this person on the network ... and the conditions for granting him asylum in Russia. Compare all the information .... and a lot of things will fall into place. And once again I repeat: the NSA works for the United States Department of Defense, whose goals in the present ambitious enough .... for this Snowden was invented ....
          1. saag
            saag 17 December 2013 19: 35
            0
            Of course, it is possible to destroy in Russia, but as foreign special services recognize, Russia is a country with a difficult operational regime
            1. Engineer
              Engineer 17 December 2013 19: 50
              0
              This is only in the movies .... The money that the US special services have is huge, so there is no question about the destruction of a particular person, and there has never been such a question. The goal of ABN in relation to Snowden is "ostentatious punishment", most likely it is an operational game of the CIA and ABN in the interests of the US Defense Ministry ...
              The goals of this game are known (everything repeats in a spiral) :))))))
              Somehow like this...
  • saag
    saag 17 December 2013 18: 10
    0
    Quote: Engineer
    The NSA will not spend resources on processing a huge amount of information received from routers located on Rostelecom's IP / MPLS network - this is extremely expensive

    And why would they build such a large data center in Utah ???
    1. Engineer
      Engineer 17 December 2013 18: 19
      0
      To understand the issue - you need to clearly know the tasks of the NSA ....
      The NSA does not work in order to know the conversation of the inhabitants of village A with village B ....
      The tasks of the NSA are somewhat different ....
    2. Engineer
      Engineer 17 December 2013 20: 05
      0
      The United States began to create a huge identification system .... A few years ago at one of the foreign conferences there was such a report, I did not pay much attention then .... But 2015 was named there. T.O. for 2015, several interspecific identification systems (and something else) will be deployed. At the national level, the FBI + the international CIA - the Automated Fingerprint Identification System (AFIS) manufactured by Mototola (a good system deployed not only in the US but also in many European countries) ... Russia will have to connect as well (hmm, meets the Federal Migration Service of the Russian Federation) to AFIS.
      Well, and in the interests of the US Defense Ministry - the NSA ... So. a huge resource will be created with the participation of the FBI + CIA + NSA ..... Here's a brief summary somehow .....
  • saag
    saag 17 December 2013 18: 29
    0
    Quote: Engineer
    The tasks of the NSA are somewhat different ..

    Share a secret, Comrade Snowden :-)
    1. Engineer
      Engineer 17 December 2013 18: 41
      0
      The NSA does not work for itself .... In order to understand the tasks of the NSA, you had better talk with a reserve officer with ORTBr reserve officers from the OSNaz GRU brigade, Torgau (GSVG) ....
      1. saag
        saag 17 December 2013 18: 51
        0
        I certainly do not belong to such officers, but I can say what the NSA's tasks are, it all lies on the surface, so its tasks are to collect, analyze information of interest to the US national security, the area of ​​interest is the whole globe.
        1. Engineer
          Engineer 17 December 2013 18: 58
          -1
          The NSA collects and analyzes foreign communications, their coordinates, directions, and also performs highly specialized tasks for obtaining information based on the analysis of the communication traffic of foreign countries ..... Of course, the NSA is responsible for protecting state communications channels of the state. US institutions .....
          I would like to note that the NSA reports directly to the US Secretary of Defense .... i.e. in fact, it works in the interests of not the FBI, as the NSA is represented here by wiretapping, but in the interests of the US Department of Defense .... Moreover, the NSA is not the CIA ....
          The tasks of the NSA, in fact, are the same as those of the Osnaz GRU ....
  • voliador
    voliador 17 December 2013 18: 30
    0
    Maybe this is all paranoia, but providing secure communication is necessary not only for the first persons of the state.
    1. Engineer
      Engineer 17 December 2013 19: 36
      0
      but providing secure communications is necessary not only for the first persons of the state.

      It is very expensive ... ZAS equipment for a wide range of users is not a cheap product .... and the key system is expensive ... Yes, and why ... the entropy of information of the residents of the village of Chmmarovka - no ....
      I would like to note that the ZAS equipment is not even in the tactical command level of the Russian Armed Forces .... not to mention the MFD of Russia ...
      Another thing is that Rostelecom-approved routers should be on Rostelecom's international and long-distance communication networks (they will have enough work for many, many years to come !!!) .....
      And that's not all ..... It is time for the Russian Navy's warships to abandon the use of the Inmarsat satellite communications system of the United States .... It seems strange today that the RF Ministry of Defense pays the United States annually for "defense services" Russia more than 2 US dollars.
      1. I think so
        I think so 17 December 2013 20: 15
        0
        Dear Engineer, I dare to doubt that you are an engineer, I think that you are not even a technician judging by your statements. What ZAS are you talking about with a terribly smart look? Why is ZAS? In a simple mobile phone, the processor is so powerful that any (!) Traffic encryption for it is not a problem BUT! It turns out that the pi.ndosovskaya NSA and the CIA banned the use of such phones both at home and at ALL of their satellites. And therefore, NO ONE does such SUCH mobile phones, although encryption algorithms (asymmetric) make it possible to quickly provide encrypted communication without problems. And if anyone is trying to make mobile phones with traffic encryption, then they will quickly BURG it (there were examples of such companies in the USA). If Russia had brains and desire, it would have been able to produce the same phones for a long time, but this is not necessary for them! They also WANT to keep track of their citizens ... That's the whole problem, not how you say ZAS ZAS ...
        1. rolik2
          rolik2 17 December 2013 20: 31
          +2
          Quote: I think so
          although encryption algorithms (asymmetric) allow you to quickly and easily provide encrypted communication.


          I’m wondering how do you imagine the organization of mobile communications with asymmetric encryption at least within the same country ??
        2. Engineer
          Engineer 18 December 2013 04: 35
          0
          Funny .... You carefully read what is at stake ....
        3. Engineer
          Engineer 18 December 2013 13: 15
          0
          although encryption algorithms (asymmetric) allow you to quickly and easily provide encrypted communication

          Well ... one more special. appeared on cryptography !!!!! You will offer your stupidity to the guys from Skolkovo ..... and attach YOUR own scheme for organizing classified communications for the General Staff and the military district ..... on the removal from service of the ZAS (E-11C products) and T-237E
          And more ... contact OAO PO Elektropribor with your proposal ...
          OJSC "PO" Elektropribor "is one of the leading enterprises in Russia for the manufacture and supply of telecommunication and communication facilities for special purposes, which provide reliable cryptographic protection of confidential speech, documentary, graphic information and are used on stationary and mobile (wheeled and tracked, helicopters, airplanes, spacecraft, on surface and underwater sea-based objects) control points for various purposes ... Dear I think so.... You are not in the sandbox here ..... You tell your graduate about the encryption algorithms on the communication networks of the Armed Forces and the use of mobile phones in the Moscow Region under the nickname of the Krasnodar VVKU pahom54 !
          At one time, I graduated from the Krasnodar Higher Military High School, the only one in the Union, studied in the period 1973-1976.

          Special respect pahom54 !!
  • your1970
    your1970 17 December 2013 20: 21
    +1
    do you represent the amount of information to be processed ????? slang, dialects, professionalism, jargon ??? languages ​​?? "Nastya is a girl, and bad weather is really bad weather !!! and the box is for pilots, tankers and skaters! For railway workers, any diesel locomotive / electric locomotive is a" car ", and cars are" sick "! We know about half of the information not from the telephone conversation, but from the knowledge of the interlocutor, his profession, habits, etc.
  • sxn278619
    sxn278619 17 December 2013 20: 30
    +1
    Either we make an aircraft carrier, or a 4-core processor for the tablet. Decide which is more important for safety. Where is the money zing? From the oligarchs to take away? So they do not give. Contract police and army will protect those who pay them.
  • Mikhail3
    Mikhail3 17 December 2013 20: 56
    +1
    How it works. No, they don’t keep an eye on you on your camera. Well, in the sense - they don’t look now! What for? But if someone needs to ...
    The task comes in - to find out about Ivanov Ivan Ivanovich. Well, this is where it begins. First of all, Ivanov's movements are analyzed, carefully stored in the servers of cellular companies. Then - to whom Ivan called. And the data of the movements of everyone with whom this Ivan had contacts by phone and computer is taken. Then - everyone who, in that period of time that Ivan walked (or drove) along the street, photographed something about the same place or talked, since you can see Ivanov in the photos (as well as his contacts, connections, etc.) etc.) and audio files can (and will remain) the sounds required for real illumination of the "Ivanov object".
    Of course, all friends, relatives, enemies, colleagues and dog hairdressers of Ivan's beloved bitch are carefully studied. It’s good that you don’t have to run after anyone! Everything is posted on social networks! Voluntarily! The students themselves, their friends, enemies and just passers-by! Etc. etc....
    In general, you guys don't have any bookmarks on your phones. It's useless to joke them there, switch to "domestic iPhones" and toil with other stupidity. You yourself provide a powerful information flow about yourself and about all-all state secrets. A beautiful autumn park photographed? Uh-huh ... And who was there in the background? Or had to go through all the data, and not go through? Alas...
    1. rolik2
      rolik2 17 December 2013 21: 11
      +1
      Quote: Mikhail3
      The task arrives - to find out about Ivanov, Ivan Ivanich.


      Quote: Mikhail3
      And they take the data of the movements of all those with whom he had contacts via phone and computer.


      After Comrade Ivanov put under control all his movements are written, and before that you can only trace the history of calls, his location by cell, which sites he visited and what he dropped off to, but WHAT HE SAID, AND WHAT HE SENT IT you do not know.
      And do not care what kind of phone he has and what kind of software he uses.
  • karavay1982
    karavay1982 17 December 2013 21: 14
    0
    Woke up !!!
    For a long time already the statement exists - who possesses the information, possesses the world.
    Damn revealed a secret iPhone or android spying on the owner.
    Any state by its nature seeks to control its citizens in line with certain ideas.
    Often scouts in interviews said that 90% of the information was obtained from open sources and only 10% was secret.
    And then they woke up, the NSA watched through mobile devices.
    Are you sure that the NSA was the initiator of such surveillance.
    Now companies, in order to launch a product, study their consumers so thoroughly that it looks like the work of special services in collecting information on a terrorist.
    Information is collected about where he lives, what he does in the evenings, where he likes to relax, what prayer he reads on Fridays, what socks he wears ...
    And what is surprising is that the NSA took advantage of the opportunities that were originally laid down in mobile devices.
    Well, no one will really explain that, for example, for about 15 years everyone wore cameras with a film and were not indignant. And now such digital cameras have appeared - just fantastic.
    But strangely - almost the main characteristic of the PHONE was the built-in camera. He did not call somehow differently; we also often do not hear our interlocutors. The connection itself has not changed.
    But here is the built-in camera.
    I wonder what the effectiveness of the event is UNIVERSAL CONTROL.
    And as a result, the devices of influential people are still controlled.
    Note- Prokhorov, for example, does not have a mobile phone at all.
    And about control for people, go to the social network and if a person is not an antisocial type, then in the questionnaire you will learn a lot about a person.
    This is about the tip of the iceberg.
    And our politicians, as always, aroused a threat to national security.
    A threat is when the national elite keeps everything abroad.
    1. Ivan.
      Ivan. 17 December 2013 22: 05
      0
      Quote: karavay1982
      And what is surprising is that the NSA took advantage of the opportunities that were originally laid down in mobile devices.

      The key here is originally laid down and the special services really use it or not for the second time, and they are not only embedded in electronic devices or software, but also in the concept and it was planned before the creation of physical media and the world wide web did not just appear to the world. In general, it is already impossible to ignore the obvious described hundreds of years ago or thousands in the Bible about the coming of the Antichrist, which the small people are preparing. Everything has long gone out of the category of speculation and assumptions and we are entering the final phase, and as was predicted by the majority, this will be welcomed, albeit under different pretexts. Total electronic control is on the verge ...
      1. rolik2
        rolik2 17 December 2013 22: 23
        0
        Quote: Ivan.
        INITIALLY mortgaged

        And why are you so sure that they were originally laid?
        Phones are manufactured by various companies around the world, WHY do they complicate the design of the phone (which affects its price) just to lay spy functions there?

        Or do you shield that ALL companies that produce phones, computers, etc. work for special services ??

        The whole problem is that the software is quite complex and has quite a few vulnerabilities, which are known to your comrades.

        For example, can you name at least one software that has not yet been hacked?
        1. Ivan.
          Ivan. 18 December 2013 00: 17
          0
          Quote: rolik2
          And why are you so sure that they were originally laid?

          I'm really not sure about this, but I am sure that with the help of money you can control everything or almost everything (as some Rothschild said - give me control of finances and I will control everything, somehow I don’t remember exactly. I’m sure that all evil which we see are not created by the peoples, but by those who manipulate them, and therefore I think that it was not without control here too. etc. etc. For this life speaks if you are careful and draw your own conclusions and not under the influence of the SMD.
  • rolik2
    rolik2 17 December 2013 21: 21
    0
    Quote: karavay1982
    iPhone or Android spying on the host.

    He does not spy, but with his help other people spy.
    And do you think that all the information traffic passing through them is written on some kind of server?
    This whole tricked crap just SIMPLIFYING access to the information stored on it allows you to use it to monitor its owner.
    If To comrades it will be necessary so they will listen to you, see and read your correspondence from ancient phones and computers, only for this they will have to spend significantly more time and resources.
  • saag
    saag 17 December 2013 21: 35
    0
    Put the firewall on Android, ban everything you can, run it and then look at the logs, a curious sight, for example, I get banned packages from the kernel that follow somewhere in chinanet
    1. rolik2
      rolik2 17 December 2013 21: 52
      0
      Quote: saag
      packages from the kernel following somewhere in chinanet

      What is the size of these packages?
      And why do you think that he is sending "spy" information? maybe this is service traffic, requests for updating the system, antivirus, when installing programs, we sometimes do not notice that we agree to "help the manufacturer" that is, if any failures are detected, information about them is transmitted to the manufacturer, and so on.
      1. saag
        saag 17 December 2013 21: 58
        0
        does not write, indicates the AppID, name of the application, IP where packets were sent and the number of blocked
        1. rolik2
          rolik2 17 December 2013 22: 15
          0
          I agree. But most visitors to this site are sure that they are totally written laughing
          Today my business man says to me, "do you know my phone is being tapped" I almost fell off my chair, I ask "why such confidence?" and she "my son-in-law told me (he is a district policeman) if you dial * 33 # on the phone and dashes appear on the screen, then the phone is tapped" I generally went nuts with this, everyone who was present began to dial, who had dashes, who didn’t boom "us listen "I say crap is that fig who listens to the OBS, I will tell you the source is 100% verified.
          I called a classmate, he works for the SBU, I don't have time to tell the situation, I hear a geometric cackle. He says "last week we got drunk here by inventing this joke, and here you call from the other end of Ukraine and ask is it true?"
          I retell my heard, but do not care, they are already calling friends here to share "reliable" info.
          1. Ivan.
            Ivan. 18 December 2013 00: 26
            0
            Quote: rolik2
            I hear a geometric cackle.

            laughing crying laughing How is it right to say, a life joke or an anecdotal life? smile
      2. saag
        saag 17 December 2013 22: 09
        0
        I did not claim that this is "spyware", but the packages come from the kernel, and the kernel is usually the driver
        1. rolik2
          rolik2 17 December 2013 22: 27
          0
          Quote: saag
          I did not claim that this is "spyware", but the packages come from the kernel, and the kernel is usually the driver

          If there is a familiar programmer, let him try to see what it is, maybe there is a purely official bodyagi who has no relation to spy mania.
  • saag
    saag 17 December 2013 21: 38
    0
    Quote: rolik2
    If the Comrades need to so they will listen to you, see and read your correspondence from ancient phones and computers, only for this they will have to spend significantly more time and resources.

    What resources will they have to spend, has the provider already installed everything at its own expense (SORM-1, SORM-2)?
    1. Apollo
      Apollo 17 December 2013 22: 17
      0
      Its safer
      A special mobile phone for officials is planned to be developed in Russia.

      Officials, perhaps in a few years, will be required to use only domestic mobile phones as required. This conclusion directly follows from the statements of the head of the Ministry of Communications, and this position is associated with security requirements. The problem, however, is to create such a phone. Even the newest Russian YotaPhone, Russian, strictly speaking, is not.
      http://vz.ru/economy/2013/12/17/664814.html
      1. rolik2
        rolik2 17 December 2013 22: 24
        +1
        Quote: Apollon
        only domestic mobile phones.

        So that only domestic special services can listen to their conversations, read correspondence, see photos laughing good
        1. Apollo
          Apollo 17 December 2013 22: 28
          0
          Quote: rolik2
          So that only domestic special services can listen to their conversations, read correspondence, see photos


          one would think that domestic intelligence services do not currently carry out this practice.
          1. rolik2
            rolik2 17 December 2013 22: 31
            0
            Quote: Apollon
            one would think that domestic intelligence services do not currently carry out this practice.

            Therefore, it does not matter whose hardware and software, whether foreign or ours, with its help, they will both listen and see. Then why invest in and make the same phone and computer listened to by all?
  • basil200
    basil200 18 December 2013 05: 13
    0
    For example, you can create a program for the phone’s OS, which blocks access to other functions besides communication. And do not let the application download. Like a PC for mobilization, there tested computers everywhere are FSB stickers, right down to the mouse. And the fact that there are third-party chips for wiretapping through an iron or a washer most likely they are not there. But they can stick everything there after purchase, upon delivery or by connecting this washing machine.
  • Snoop
    Snoop 18 December 2013 07: 11
    0
    You need to create your own smartphones and OS to them. In my opinion, we have no problems with bright heads in these technologies. Wherever you look everywhere, former immigrants from the USSR sit and work in corporations. That would create a new separate industry, and on TV you can stink about Putin's super achievements. You look, in addition to special smartphones, one could arrange the release of simpler and cheaper smartphones in terms of security. And the same specials. smartphones of the export version could be distributed abroad, who would like to buy information security.
    Interestingly, but the Finns (Nokia) are not involved in information leaks, or is it only for Amer giants?
  • saag
    saag 18 December 2013 07: 16
    0
    Quote: Snoop
    You need to create your own smartphones and OS to them.

    And you can take the source codes of Android, read 30 million lines of code and analyze them for bookmarks and do as you wish, this is essentially cheaper, but for some reason no one takes it
  • blizart
    blizart 20 December 2013 13: 39
    0
    I have been serving in the army of Kazakhstan, it’s forbidden to use mobile phones for about 5 for years (we use it of course), but the fact of the ban indicates that the command knew about the possibility of using the gadget in the above way and long before the Snowden case
  • Andriuha077
    Andriuha077 20 December 2013 16: 56
    0
    A soldier runs across the field, carrying an inflatable balloon with a target above it. The same airships over all units. But this does not bother them at all: we have got rid of the persecution mania.
  • Engineer
    Engineer 23 December 2013 21: 16
    0
    For information .... Here is a presentation of STC ATLAS incl. SPECIAL CELL PHONE M-500, etc.
    http://rusfolder.com/39276556