Showing posts with label spying. Show all posts
Showing posts with label spying. Show all posts

Tuesday, August 7, 2018

The use of mobile telephones as the spying tool


Picture I
https://marxjatalous.blogspot.com/

Kimmo Huosionmaa

Use of the mobile telephones in multiple new purposes have made this thing also very effective spying tool. The mobile telephones 3D-scanning programs use the sonar system of the mobile telephone to create the 3D-models of the targeted piece. But do you know, that the similar systems can modify the mobile telephone very effectively the remote microphone and eavesdrop device, that can break privacy in any house, there is found the window? And behind that window, persons are talking about private talkings.


If some person would speak something, what is private, that kind of remote microphones and spying tools can record those talking, and the target would not notice anything. The resonance of the class can be meter also by using sonar or radar, and that resonance can change as the voice signal by using similar technology as the laser microphones use. Those mobile telephones can fly to the roof, near to the targeted window by using drones, and they can observe everything, what happens in the targeted room. If those systems are covered with new STEALTH-layers, what makes them merge in the background, like chameleons those systems would be invisible. And the active STEALTH uses the small cameras to make pictures from opposite side of the device, what makes them act like chameleons. Those drones can also equip with automatic rifles or submachine guns, and they can use to eliminate any target in the world.


And if the resolution capacity of SONAR is high enough, that system can break any privacy in the world. And the mobile telephones can be used as the eavesdropping device simply by leaving the Whatsapp or some other social media solution on and leaving the telephone in the room, and the voice inside that room would be analyzed by using computer programs. Those programs can separate speech from the back noise very effectively, and that's why even the weakest sounds can transform to normal recording.


This thing can allow that any person can record the voices behind the glass and modern mobile telephones also make photographing in the streets very unseen. That is the reason, why even the highly secret government facilities are not marked themselves by using the "photographing prohibited signs". That kind of signs are actually like red roosters for some photographers, and that's the reason why that sign is not found anywhere except near some military bases. It's impossible to control the photographing in ordinary streets. And for the better information security, those signs are not placed in the streets.

Picture I

https://o.aolcdn.com/images/dims?quality=100&image_uri=http%3A%2F%2Fo.aolcdn.com%2Fhss%2Fstorage%2Fmidas%2Ffe046bab7fb8f9af08ce716ad0b03dda%2F202523229%2Fmicrosoft-mobilefusion.jpg&client=cbc79c14efcebee57402&signature=86ad9c6e0ba7e562d807a0f0a0abf52c72656677

Saturday, July 14, 2018

How to mislead keylogger?





Kimmo Huosionmaa

Keylogger is the program, what will record the push of the keyboard buttons and that would allow the hackers to get passwords and other private stuff. That program can use the Internet to send that data, or it can record it and store it to USB-stick, what is put in the back of the computer. The local storage is always visible for the user, and if somebody has left USB to the computer, that thing must be removed before use.


The local storage is suitable in cases, where the hacker has access to the room, where the computer, what is under observation locates. And when the hacker would stop the eavesdropping, must this person just remove the USB stick and keylogger from the computer. But what if the keylogger would send the data to the Internet. One of the best way to avoid that observation and minimize the damages. This means that the public computers would just be used for public purposes, and personal data like bank Saldo must be checked from own computer.


In this case of the security solution that workplaces computers are used only for work, and the things, what the user can show even in the evening news. The reason for spying on the workers might be that the bosses want to know, what the workers are talking about them, but sometimes the purpose of the eavesdropping is just showing the superiority for other people who work as their henchmen.  But the keylogger can be misleading very easily. One of the best ways is the naping couple of extra letters ahead of the password, or write password a couple of times wrong, and that would confess, that the user would not access to some databases, what are interesting for some hackers.


Extra letters and false passwords can give the signal for the hackers, that the user has the memory problems, and if the keylogger has been set by the employer. In this scenario, the security chief would call the worker to the office, and tell that there are many errors in the passwords. And after that, this boss tells that the worker should go home and find a new job, and then he would uncover the secret that every computer in this company have been observed.  And that would be very nice to know.

Monday, January 22, 2018

The spy ship USS Pueblo's seajacking 23.1.1968.


USS Pueblo (AGER-2)
1n 1967
(Picture 1)


Kimmo Huosionmaa

The case of the spy ship USS Pueblo began 50 years ago 23.1.1968 when the North-Korean government seajacked American spy ship USS Pueblo near the coast of North Korea. The incident and hostage situation remained in 11 months and after that USA was retired, and the extortionate sailors returned home. In that incident, the USAF was ready to attack in North Korea with the nuclear weapons and F-105 Thuderchief fighter-bombers.


The seajacking of that ship was the very serious thing, and on that ship were many NSA:s highly classified papers. And the spy equipment of that ship was going to hands of North-Korea. Those documents were not involved the most secret files, but this incident was the very bad thing for NSA, what was the classified agency in that time, and of course, the diplomatic way was better than open warfare against that small country. The spy ship didn't have anything so classified, what NSA couldn't replace, but that case was shown that spy ships are good targets for attack.

F-105 "Thunderchief"
(Picture 2)


And what is the most important thing, what NSA noticed, is that there must always be the system, what replaces another if this kind of unpredictable thing would happen. And of course, the most important thing in those cases is that every code table must be replaced by the new one if some code books will go to hands of the terrorists. But when we are thinking about the "case Pueblo" in the way of the intelligence, this kind of action could be the fiasco.


The opponent would get the information of the attack, and the codebooks were changed immediately when the alarm was given. And if we are starting to speculate about this kind of things, we must say that the radio-equipments of that ship could send the information about the radio-transmissions during the operation. In some scenarios, some "half secret" aircraft would be given to the opponent, and then this plane would take to the best military base, where it would investigated by the military and engineer stuff, what the opponent has, and then the automatized systems inside that wreck would give the information about the military base.


In some stories the "UFO, what was dropped to Roswell" was actually the trojan horse what was slipped in the most secret military base in the USA. I used this case as an example of the way of thinking, what the military intelligence has. They might try to slip the spy plane or spy ship to the best military base what the enemy has, and then automatized spy systems might record the pictures and electronic voices of that complex.


And also they might have the sniffers to make the chemical analyses about fuel, and if we use our imagination, we must think that those trojan horses would also scan the DNA from the workers of the base. And then some agent will get some work to the date and offers the person sodium amytal, and then that agent could ask the questions about this top-secret base.

https://en.wikipedia.org/wiki/USS_Pueblo_(AGER-2)

http://www.history.com/this-day-in-history/uss-pueblo-captured

https://en.wikipedia.org/wiki/Republic_F-105_Thunderchief

Picture 1

https://fi.wikipedia.org/wiki/USS_Pueblo_(AGER-2)#/media/File:USS_Pueblo_(AGER-2).jpg

Picture 2

http://www.talkingproud.us/Military/Military/Sanders_files/357thtfsf105.jpg

Friday, October 20, 2017

Think always, why some service is so cheap?



Kimmo Huosionmaa

Is cheap service also safe is a question, what must be asked when man or woman faces very cheap service. They must ask why some services are so cheap? Every businessman must get profit from their services, so he must keep so high price, that he or she will get enough money to live with that business. When we meet cheap services, must we ask about one good question, and that is, “Is that service some kind of honeypot”. Marks of good service are excellent work methods, good equipment, open marketing and of course nice and polite service without any covert lists what is hiding in the service desk.


Cheap style place, where feels absolutely necessary to make some kind of crimes. That kind of places acts like some carnivorous plants. They put the bait for criminals to catch those people. One identification mark for that type of action is that place is like made for some criminal activities.


And there is sometimes stuff, what mission is to troll out criminals to work more openly. That makes them make mistakes, and tell lots of things about their gangs for those operators. Those places are calling as “kill houses”. They are equipped with microphones and net surveillance tools. That material is collecting the governmental and private organizations what missions are sometimes illegal.



When some organization is collecting surveillance data from the target person, it will not use it against anyone. The data itself is a weapon which effectiveness will depend on people. Normally professional intelligence organizations do not use data against anyone. When they choose the target for their operations, the target must have something that is interesting in their opinion.




If some intelligence organization will use the information against normal people, it’s “kill house” will be uncovered and will become useless. That’s why they must choose their target very carefully. The target must have information, what that organization wants. Normal thieves don't work like this. Normally they use single data collecting operation and clean the places.



They don’t blackmail any person for years. So if somebody is collecting information about bank directors or somebody else, they might want information. Information what they want might be accounts where the money comes from government or some military and high-tech companies, which products are wanted in every conflict area.



Weapon technology is normally classified, and some mobile solutions are denied to take outside EU because it can use as a military support system. And that kind of technology is interested in intelligence. Also, some security solutions are interested in private spy organizations, because that data can be sold to other criminals.

New autonomous task units are entering service.

"The deal will create much-needed competition for the Department of War acquisition process. (Representational image)" (Interestin...