banner



Surveillance Catalog is Creepy Read

An online catalog of promotional embodied from companies hawking advanced spy products to law enforcement and news agencies was published now by the Wall Street Daybook. It's a catalog that's at the best, heavy and at worst, unnerving.

The Journal created the catalog from much 200 marketing documents gathered at a surveillance conference in Washington, D.C. last month. Information technology's a compendium of tools for breaking into computers, cell phones, and computer networks, as wellspring as attractive in online subterfuge. (See also "Spies Like Us: Spy Gear for Your Inner Secret Agent.")

Hacking Squad (click to enlarge)

Although law enforcement and intelligence agencies around the world behave their own surveillance work, in recent years they've turned to the buck private sector for their spy tools, the Journal says. Citing information from the evidenc's wheeler dealer, TeleStrategies, it reports that the annual retail market for surveillance tools has mushroomed from nearly missing in 2001 to $5 billion now. (See also "Undercover agent Tools: Tips from the Pros.")

The Daybook's catalog is organized into five surveillance areas: hacking, interception, information analysis, web scraping and namelessness. In the hacking area, for illustrate, an European nation company called HackingTeam seems to be offering government agencies the ability make over their own botnets for monitoring hundreds of thousands of targets. Another selling point of its spy solution is that information technology's cross-platform, capable of infecting machines supported the Windows, OS X, iOS, Android, Symbian, and Blackberry operating systems.

Packet Forensics situation

In the interception area, an Arizona company called Packet Forensics makes portable packet review appliances. Those devices are used to stop data happening a network and analyze the packets that carry it. Some marketing points for its LI-5 unit: information technology's solid state so it lacks moving parts; and with the company's software, information technology makes controlling hundreds of meshwork probes as plain as handling one.

Data depth psychology companies produce tools for reviewing electronic recordings and constructing social networks. The social networks that these companies focus happening, however, go beyond infiltrating Facebook or Twitter. For example, California-based SS8, which also has offices in Europe, South America, the Middle East, North Africa, China, and Malaysia, says its Intellego product can extract relationships from intercepted communications and display those relationships in an visceral and interactive elbow room.

Kapow Software's Katalyst

World Wide Web Scraping, another expanse covered away the catalog, refers to tools wont to mine the public Net for information. Intelligence-lastingness tools, nevertheless, deliver capabilities on the far side those that might be used by a typical selling intelligence firm. Kapow Software, for instance, notes that its Katalyst solution has the kind of rich understanding of webpage social structure needed to snatch data across the Internet. "Without that capability," its marketing materials say, "data cannot constitute completely or accurately harvested from websites — and that's not good enough when national certificate is at jeopardize." (See also "10 Top Spy Gadgets.")

Anonymity is still scarce a recess in the surveillance tools food market according to The Journal. In point of fact, only 1 company appeared at the show with an namelessness offering. Called ION (Internet Operations Net), the society makes solutions that hide operating theatre disguise IP addresses. According to the company, its production "offers multiple levels of indirection that provide a secure platform from which to conduct foreign and domestic research that is not credited to some government entity, or anyone else that would raise suspicion."

"Oregon anyone else that would rise suspicion?" How offensive is that?

Follow freelance technology author John P. Mello Jn. and Nowadays@PCWorld on Twitter.

Source: https://www.pcworld.com/article/478423/surveillance_catalog_is_creepy_read.html

Posted by: friersonjustitingich1966.blogspot.com

0 Response to "Surveillance Catalog is Creepy Read"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel