Military Review

The Internet as a means of fighting for US security

15
The fact that the special services have long used the Internet for their own purposes is known to all. There is nothing special about this. Even on the contrary, given that social networks have become the main means of communication for radical elements in almost all countries of the world, this is a necessity. But until yesterday, special services, in particular the United States, were making big eyes when answering a question about the Internet.




It seems like we only track overt terrorists. And the whole system is not interesting to us. What is written there, what secrets for the sake of their own dubious popularity give out - none of our business. Personal information for us is a complete taboo.

But as much as a whip is not worn, a moment will come when the tip of this very whip will still give you a serious slap in the face. Yes, so slapped that often the scar remains for life. Approximately such a "scar" many got playing in social networks in heroes and know-alls.

"When considering a request from foreign citizens for US visas, US government officials will, if they deem it necessary, view the accounts of applicants on social networks." This was confirmed by State Department spokesman John Kirby at a briefing on Monday, December 14.

So, dear readers, we are now "under the hood" of the American special services officially. The games are over. What used to be called the achievements of democracy, too. Any person, regardless of the country of residence, can now become the object of close study of all correspondence and this information about him on the Internet.

Moreover, if a person uses a special protection that does not allow officials from the US Security Department to examine personal information about him, then this may be the reason for refusing entry into the country.

Okay. We do not observe a huge number of those who want to go to the USA today. There is a certain, rather monolithic part of people who, due to circumstances, are forced to cross the border of this state. Artists, businessmen, politicians. Some of the scientists, students. For the most part, we are homebodies. There are not many people who want to cross the ocean even by plane.

Only who said that now specialists from the United States will officially check the network only for those who want to ride? And for potential applicants, why should there be exceptions? And they will not. All under total control!

Interestingly it turns out. The United States is not particularly in a hurry to beat terrorists in Syria. Yes, and do not rush to recognize terrorists. But look for potential terrorists in a hurry. What is it for?

It seems to me that today the Americans have not just voiced the possibility of spying on people on the Internet. More precisely, even legalized this opportunity. Today happened what the science fiction writers once warned about. The man almost lost the ability to avoid surveillance. The official opportunity, I emphasize.

We are monitored by camcorders. We are listening through modern smartphones. We are controlled almost coffee grinders. Now also full control of the correspondence.

We are waiting for similar statements from the special services of other countries. A start, and the other worse? Especially since there is a very good reason. For some reason, the terrorists went wild. Even where most of the money goes to keep them.
Author:
15 comments
Information
Dear reader, to leave comments on the publication, you must to register.

I have an account? Sign in

  1. kebeskin
    kebeskin 16 December 2015 06: 42 New
    +1
    Internet surveillance is a small part. Radio equipment is also monitored. The USA has an example of the train. We had our own similar SOUD system, but unfortunately it was closed in 2002. One way or another, these systems are used mainly not only for revealing terrorists and other barmoleis, but also for obtaining information about a potential enemy. Well, Americans are collecting data doing their job. Perhaps they are fighting terrorism where and when it is beneficial to them. Well, the fact that they all say these words.
    1. kebeskin
      kebeskin 16 December 2015 06: 45 New
      0
      Well, we now have a SORM system. They can control. Like the Internet and calls. It is a pity that there are flaws that are now trying to solve, such as interception of modern voip data transfer protocols.
    2. 222222
      222222 16 December 2015 10: 20 New
      +3
      kebeskin RU Today, 06:42 AM New
      "" Surveillance on the Internet is a small part. Radio equipment is also monitored. The United States has an example of Echelon. "
      Two postulates:
      1. an excess of information .. often harms the analysis and search for truth
      2. Lack of information is also information ...
      ... As for American democracy, the information war built on lies has temporary success. In the future, they simply stop believing it ....
  2. Mik13
    Mik13 16 December 2015 07: 01 New
    0
    All under total control!

    Will not work. It is simply not possible. There are not enough controllers.

    The most realistic option is to store in some data centers (which still need to be built) the maximum possible information about all users of interest - but it will be possible to study it exclusively selectively for some key reasons. Of course, there are all sorts of software tools that track keywords or membership in certain communities, etc. - but relying on this seriously is not serious.

    So Big Brother, of course, looks at everyone, but not everyone sees.
    1. kebeskin
      kebeskin 16 December 2015 07: 18 New
      +3
      How would these systems work on the keywords related in the conversation. After that, the user profile and the structure (diagram) of his contacts are compiled. It becomes automatic. After which information is also filtered by similar systems. And the analyst gets a few really interesting letters.
      1. Mik13
        Mik13 16 December 2015 08: 14 New
        0
        Quote: kebeskin
        How would these systems work on the keywords related in the conversation. After that, the user profile and the structure (diagram) of his contacts are compiled. It becomes automatic. After which information is also filtered by similar systems. And the analyst gets a few really interesting letters.

        Therefore, the interlocutors may well use the "Aesopian language" or some fairly primitive code. Then the filter by keywords can be ignored.

        If the object has already come into the attention zone, this will not help, but it will completely protect it from being hit. Well, there are other different ways.
        1. midivan
          midivan 17 December 2015 02: 08 New
          +4
          Quote: Mik13
          Therefore, the interlocutors may well use the "Aesopian language"

          it’s like I’ve fooled around the white house and the gate opened and closed, well, the visa was running away, and meanwhile I had wished health from the house many times many times fellow am
  3. Neophyte
    Neophyte 16 December 2015 07: 59 New
    +4
    User! When you sit in front of the computer, show the figs, then stick a peephole over the paper
    video cameras. In the future, scold the West in every way and defend the honor of Russia in the networks!
    (Memo of the militia in the info war).
    1. midivan
      midivan 17 December 2015 01: 57 New
      +4
      Quote: Neophyte
      User! When you sit in front of the computer, show the figs, then stick a peephole over the paper
      video cameras. In the future, scold the West in every way and defend the honor of Russia in the networks!
      (Memo of the militia in the info war).

      and if you take off your pants and show the device through the peephole, will it bite like a peephole? Or will they be calculated by fingerprints? laughing
  4. Sirocco
    Sirocco 16 December 2015 08: 32 New
    0
    I compare control on the Internet with the central nervous system of the body, it controls everything, and is responsible for everything. It seems that we are on the verge of creating a new "organism" or a new life. rather, we are already participating in this creation.
  5. Stanislas
    Stanislas 16 December 2015 08: 52 New
    +2
    The Internet as a means of fighting for US security
    It would be strange if the American battle management information system, which was originally the Internet, transformed from a Pentagon military project to a global information project without the help of the CIA. What Americans can hardly be suspected of is global altruism.
  6. Gor-1974
    Gor-1974 16 December 2015 08: 56 New
    +1
    In this world, nothing can be hidden, everything can be found out about everyone, for this all these technologies were “presented” to us from above. It seems to me that you can chat whatever you want, all the ideas are still brought to people from the go-ahead from the top. The most dangerous thing is when a person is silent and, roughly speaking, “wanders” in his head — this is a precedent — this is alarming. Not the one who talks, but the one who is silent, the enemies of any regime.
  7. vladimirvn
    vladimirvn 16 December 2015 10: 54 New
    +2
    We have successes as well. .. "Russian programmers walked around Google’s specialists and won the world championship in face recognition, which was held at the University of Washington. A unique algorithm based on neural network technology allows you to recognize a person with a probability of more than 70 percent, regardless of facial expressions and camera angle." ..http: //oko-planet.su/ekstrim/ekstrimsovet/302807-programmisty-iz-
    rossii-stali-luchshimi-na-chempionate-mira.html
  8. gridasov
    gridasov 16 December 2015 12: 13 New
    0
    There is a huge difference between what we mean by the process of collecting information and what is meant by the analysis of this collected information. If someone is talking. that he collects information, it means that he can be deeply mistaken in that he is not able to distinguish information from misinformation. Therefore, mathematical technologies are very important for determining the necessary analysis vectors with respect to system landmarks. However, innovative discoveries are also needed here that would not allow the analysis to rely on uncertainties and inaccuracies, but could clearly appeal to such volumes of information that would not allow mistakes to be made in the analysis. The Internet is only part of the opportunity that develops information technology to the ability to perform analysis at any level.
  9. midivan
    midivan 17 December 2015 02: 14 New
    +4
    so you need to be more active as much as possible, let them go broke on flash drives and software, and the hotter the better for us, well, for those who are not going for a puddle laughing laughing although, from prison and scrip do not renounce, Abama h ... m ... zero