Skip to main content

How the Internet-observations officer chooses the individual, who is put under surveillance?


(Picture 1)


Kimmo Huosionmaa

Many people are thinking, that it is safe to avoid the hotel's WiFi networks because the operators can catch the data from the WiFi, but they are entirely wrong in this case. The reason why those persons are wrong is that if they don't use the free Internet, there might be something to hide with those people because they don't use that WLAN even with big laptops, and this makes the observers curious. They are looking for people, who use sophisticated and robust network security when that will compile in the things what they do on the Internet.


The situation, when the safety makes person suspected data criminal is like using the enterprise-level security solutions in-home network, and of course, if those solutions are expensive, could that cause that the interest of put this person under surveillance will grow extremely high. Those surveillance operators will not use only one method to break the privacy of the targeted person, and those operators use normally also telescopes, binoculars and small remote control helicopters in their missions. But the massive number of data will go thru the Internet Sockets all the time.


But somebody will know, that exception to the normal behavior will be noticed by the surveillance team. If some person normally uses credit-cards for paying, but suddenly will that same person starts to use cash, will that cause the reaction in the surveillance screens. And the reason for the change of behavior must be found. Another way to make the surveillance team very interested in avoiding some services.


One of the misunderstandings is just avoiding the franchise hotels, what belong to some ring. In the small independent hotels have the smaller number of information in those databases and the operators must just check the data.  If there were many more users, the data storage will be so large, that the systematical check of that information would be very long action. But in the big and small systems is small differences. Then somebody wants to keep the name as the secret, will this person choose small size system, where the "surface data" flow only in the hands of the small group.


But in the small system, the deep scanning of data will be possible and give more effective information for surveillance operators who work in this kind of system. In big systems, many operators will see "surface data" of the users, but deeper analyze of information will be difficult because there is the larger number of bytes and there are many same-ranked officers who are watching the system. In small system might have only one high-school trained operator or maybe that service is produced by some other actor. This allows those men to work alone without afraid that somebody even sees what is going on.

Picture 1

http://www.sifytechnologies.com/wp-content/uploads/2017/03/datacenterhosting_managedservice_taxialways_fod.jpg

Comments

Popular posts from this blog

MIT's tractor beam can make the new types of SASER systems possible

   "This chip-based "tractor-beam," which uses an intensely focused beam of light to capture and manipulate biological particles without damaging the cells, could help biologists study the mechanisms of diseases."(Interesting Engineering, MIT’s Star Wars-inspired ‘tractor beam’ uses light to capture, manipulate cells) MIT's tractor beam can make the new types of SASER systems possible. The tractor beam just hovers the nanoparticle in air or medium, and then the laser or some other electromagnetic system transports oscillation into those particles. The ability to make cells and other particles hover in the system makes it possible to create particles whose energy level or resonance frequencies are accurately calculated things.  That thing makes it possible to create things that transmit wave movement accurately and cleanly. This is one version of the use of a tractor beam. Modern tractor beams are like acoustic tweezers where sound waves lock the object in its cr

The new observations tell that the thunderstorms form gamma-rays. That could make gamma-ray lasers possible.

  "An illustration of NASA’s research plane ER-2 flying over thunderstorms. Credit: University of Bergen / Mount Visual (CC BY 4.0), edited" (ScitechDaily, Surprising Discovery: NASA’s Retrofitted U2 Spy Plane Reveals Tropical Lightning Storms Are Radioactive) The new observations tell that the thunderstorms form gamma-rays. That could make gamma-ray lasers possible. The process has been observed by the NASA (Lockheed) ER-2 research plane, which is a modified U-2 spy plane. The gamma-ray formation in thunderstorms. Where lightning and electric fields release electrons that impact the air molecules and water droplets is an interesting thing. That thing opens the route to solving many mysteries.  "The general physics behind how thunderstorms create high-energy flashes of gamma radiation is not a mystery. As thunderstorms develop, swirling drafts drive water droplets, hail, and ice into a mixture that creates an electric charge much like rubbing a balloon on your shirt. Pos

Chinese innovations and space lasers are interesting combinations.

Above: "Tiangong is China's operational space station located in low Earth orbit. (Image credit: Alejomiranda via Getty Images)" (Scpace.com, China's space station, Tiangong: A complete guide) Chinese are close to making nuclear-powered spacecraft.  Almost every day, we can read about Chinese technical advances. So are, the Chinese more innovative than Western people? Or is there some kind of difference in culture and morale between Western and Chinese societies? The Chinese superiority in hypersonic technology is one of the things that tells something about the Chinese way of making things.  In China, the mission means. And the only thing that means is mission. That means that things like budgets and safety orders are far different from Western standards. If some project serves the Chinese communist party and PLA (People's Liberation Army) that guarantees unlimited resources for those projects. Chinese authorities must not care about the public opinion.  If we th