Overclock.net › Forums › Industry News › Technology and Science News › [Securelist] Targeted Mobile Implants in the Age of Cyber-Espionage
New Posts  All Forums:Forum Nav:

[Securelist] Targeted Mobile Implants in the Age of Cyber-Espionage

post #1 of 10
Thread Starter 
Quote:
When mass-produced electronic spying programs became widely known by the public, many email providers, businesses, and individuals started to use data encryption. Some of them have implemented forced encryption solutions to server connections, while others went further and implemented end-to-end encryption for data transmission as well as server storage.

Unfortunately, albeit important, said measures did not solve the core problem. Well, the original architectural design used in emails allows for metadata to be read as plain text on both sent and received messages. Said metadata includes recipient, sender, sent/receipt date, subject, message size, whether there are attachments, and the email client used to send out the message, among other data.....

.....Naturally, this scenario has made threat actors develop implants for mobile devices since, from a hacking perspective, they address all the aforementioned technical limitations―that is, the inability to intercept conversations between users who have migrated to these secure mobile messaging applications. What is an implant? This is an interesting terminology invented by the very same threat actors behind targeted attacks. We saw it for the first time during the Careto campaign we announced a few years ago.

Now we will analyze some implants developed by HackingTeam to infect mobile devices running on iOS (Apple), Android, Blackberry, and Windows Mobile. HackingTeam isn’t the only group developing mobile implants. There are several campaigns with different roots, which have been investing in the development of mobile malware and used it in targeted attacks at the regional and international level.

https://securelist.com/blog/research/73305/targeted-mobile-implants-in-the-age-of-cyber-espionage/

Conclusion: If governments really want to target you, they will. PGP and encrypted email is essentially useless (but this has been known for a while). Yes, Android fanboys, Android is one highly insecure OS vs. Apple iOS but both can easily be hijacked. Honestly, it's mindnumbing at times how insecure it is. Android user here. Also, you using those encrypted phonecall and message apps, are essentially useless as the backend is hijacked so it doesn't matter what apps you use on the next layer.

For background, HackingTeam is an Italian company that creates government cyber spying tools that are bought by governments around the world and as stated are not the only one around.
post #2 of 10
So they can read my texts.. damn, now they know il be 10 mins late home and think take away pizza is probably a better idea than making a full meal. Also that Im going to pick some beers up.
post #3 of 10
Quote:
Originally Posted by chinesekiwi View Post

https://securelist.com/blog/research/73305/targeted-mobile-implants-in-the-age-of-cyber-espionage/

Conclusion: If governments really want to target you, they will. PGP and encrypted email is essentially useless (but this has been known for a while). Yes, Android fanboys, Android is one highly insecure OS vs. Apple iOS but both can easily be hijacked. Honestly, it's mindnumbing at times how insecure it is. Android user here. Also, you using those encrypted phonecall and message apps, are essentially useless as the backend is hijacked so it doesn't matter what apps you use on the next layer.

For background, HackingTeam is an Italian company that creates government cyber spying tools that are bought by governments around the world and as stated are not the only one around.
The problem people aren't quite grasping, is that mass surveillance produces a wealth of data. That data can be worked by statisticians, much like it is in the advertising market, to develop marketing strategies and determine how to make their products appealing to people who wouldn't otherwise be interested.

The government, however, markets law. Your consent or even awareness of their spying is not necessary, and the same goes for their use of data garnished from said spying.

With a situation where they seem to never decline an opportunity to gather this data and store it indefinitely, it's hard not to conceive of them eventually employing the same tactics used in advertising.

With a wealth of "harmless" information, especially if quantified in real time, public relations could get much easier. This would be incredibly useful for packaging certain controversial laws in a way that would calm potential dissidents. At the very least, it could help to gauge the position of the public. For instance, you could match common metadata characteristics of gun law opposers by taking a sample group of people who spread pro-second-amendment videos or litetature on social media. Find the most prevalent data characteristics of those people, and cross-reference to find potential dissidents that weren't in your sample group.

Doing this would make it much easier for politicians to determine if a law will cause civil unrest before they even try it. It could help them choose the right times or create the right conditions to prevent people from opposing them, when they try to introduce law.

This would be great at keeping things peaceful, when the public is resistant to enacting laws that should be passed. It would also help politicians maintain the confidence and trust of the people, by intelligently predicting and preventing criticism.

If they haven't begun laying the groundwork for such a tool, they really should. It would help keep things peaceful at home, and prevent issues like we're seeing in the south. Lives would certainly be saved.
Trash Box
(15 items)
 
 
G73JH-A1
(13 items)
 
CPUMotherboardGraphicsRAM
i7 980x @ 4.4GHz Asus P6X58D-E Gigabyte 8GB GTX 1070 G1 Gaming 24GB Corsair Dominators 1600MHz 
Hard DriveHard DriveMonitorKeyboard
2x256GB C300's R0 1TB Samsung 850 Pro ASUS MG279Q, Catleap Q270 G19 
PowerCaseMouse
Corsair AX1200 Silverstone RV-02 G9x 
CPUMotherboardGraphicsRAM
AMD 965BE 125W Asus M4A77D Asus 5770 Cucore 4GB Kingston 800MHz 
Hard DriveOptical DriveOSKeyboard
2x750GB Seagates 22x LG DVD-RW w7 Ultimate 64-bit  G15 
PowerCase
Antec Earthwatts 430W 80+ Antec New Solution NSK6580B 
CPUMotherboardGraphicsRAM
720QM AsusTek Mobility HD5870 8GB Kingston 1600MHz 
Hard DriveOptical DriveOSMonitor
256GB C300/500GB Seagate Bluray Combo w7 Ultimate 64-bit 17'' 1080P 
Case
G73JH-A1 
  hide details  
Reply
Trash Box
(15 items)
 
 
G73JH-A1
(13 items)
 
CPUMotherboardGraphicsRAM
i7 980x @ 4.4GHz Asus P6X58D-E Gigabyte 8GB GTX 1070 G1 Gaming 24GB Corsair Dominators 1600MHz 
Hard DriveHard DriveMonitorKeyboard
2x256GB C300's R0 1TB Samsung 850 Pro ASUS MG279Q, Catleap Q270 G19 
PowerCaseMouse
Corsair AX1200 Silverstone RV-02 G9x 
CPUMotherboardGraphicsRAM
AMD 965BE 125W Asus M4A77D Asus 5770 Cucore 4GB Kingston 800MHz 
Hard DriveOptical DriveOSKeyboard
2x750GB Seagates 22x LG DVD-RW w7 Ultimate 64-bit  G15 
PowerCase
Antec Earthwatts 430W 80+ Antec New Solution NSK6580B 
CPUMotherboardGraphicsRAM
720QM AsusTek Mobility HD5870 8GB Kingston 1600MHz 
Hard DriveOptical DriveOSMonitor
256GB C300/500GB Seagate Bluray Combo w7 Ultimate 64-bit 17'' 1080P 
Case
G73JH-A1 
  hide details  
Reply
post #4 of 10
My 2 cents as this is more or less rehash thread.

I am currently in process of learning security and all this, and by no means an expert, however.
The three prevailing themes I tend to notice about these types of stories and discussions are

-People focusing on esoteric matters of right and wrong. If someone sabotages my drinking water I don't argue about the moral of the situation, I try fixing it first in anyway I can and than think who I am going to retaliate against. Similarly I would start by looking at this as a problem that can be fixed, but we just don't know how yet, and we should...
-Think outside the box. If we start discussing practical means, often we bikeshed on which hash to use and etc, while in reality we should look at a big picture. So, my phone is compromised, at what level? Is this a kernel vulnerability I can fix by recompiling with some settings?(disable hotplug mods, harden it in some way that will trap the malignant module). Is my protocol vulnerable? Is my software vulnerable? Are permissions managed correctly? Can I hardblock unwanted traffic my phone may be producing with my internal firewall? Can I rewrite that? Is my hardware compromised? Can I get an alternative(Pocket Pi, etc)? Can I debug some code myself and maybe rewrite it for everyone's benefit? I guarantee you that "they" have not thought of everything.

So under no circumstance we should
-Panic and overestimate the offenders strength. You have to remember that the most powerful tool the offender has is a aura of omnipotence that urges you to just lay down your arms and stop resisting. This is a good tactic to use and hard one to avoid, but you have to. Look around you, most OCN users work somewhere in some fashion. Look around your workplace and see how things are done. I would say on average you'll find mistakes and breakthroughs, laziness and hard work, insight and ignorance. This is how all of those agencies work to. They are people just like us, and they do make mistakes, write sloppy code and take of work early at same time as making new breakthrough, sharpening their propaganda skills and building elaborate infrastructure. The sooner the Omnipotent image is dispelled the sooner we will fix or at least partially mitigate and bring this problem back inline.

Those were my two cents. I think no matter the results, if we try we at very least become less ignorant about the subject and therefore the world and less ignorant public is always a good thing. ^^

p.s. I specifically avoided commenting on the "Conclusions" section of the article as some of those suggestions I find laughable and some outright malicious. But I do not know if its a bannable office on OCN to make those critiques = \
Edited by _Red_Dog_ - 1/22/16 at 2:45pm
Phantom
(13 items)
 
Flagship
(11 items)
 
Vel'Koz
(11 items)
 
CPUMotherboardGraphicsRAM
Pentium 4 HP 3.0 GHz GA-8IG-1000-Pro-G SAPPHIRE ATI RadeOn 9600 Pro 128 MB Corsair VS512MB400 x 2 = 1024 Mb duel channel 
Hard DriveOptical DriveOSMonitor
Western Digital 120 GB SONY CD-RW CRX320E Windows XP MAG LCD 17' 
KeyboardPowerCaseMouse
Logisys InWin PowerMan 350W Phantom ( power suply was replaced ) Logitech Optical mouse 
CPUMotherboardGraphicsRAM
AMD FX-8350  Gigabyte GA‑990FXA‑UD5 Nvidia crucial ballistix tactical 
Hard DriveHard DriveOptical DriveCooling
Seagate Barracuda ST1000DM003 western digital red CD Combo Drive cooler master hyper 212 evo 
OSPowerCase
FreeBSD 10.2 COUGAR A-Series A560 Rosewill REDBONE Mid tower 
CPUMotherboardGraphicsRAM
AMD Athlon 5350 Kabini Quad-Core 2.05 GHz Biostar AM1MHP EVGA GeForce GT 730 LP Low Profile Graphics Car... 4gb corsair vengeance 1600mhz ddr3 
Hard DriveCoolingOSKeyboard
ADATA Premier SP550 64GB ARCTIC Alpine M1 FreeBSD 10.2 Iogear Multimedia GKM561R Wireless 2.4 GHz Keyb... 
PowerCaseMouse Pad
SeaSonic SS‑400ET DIYPC DIY-F2-P Integral Trackball 
  hide details  
Reply
Phantom
(13 items)
 
Flagship
(11 items)
 
Vel'Koz
(11 items)
 
CPUMotherboardGraphicsRAM
Pentium 4 HP 3.0 GHz GA-8IG-1000-Pro-G SAPPHIRE ATI RadeOn 9600 Pro 128 MB Corsair VS512MB400 x 2 = 1024 Mb duel channel 
Hard DriveOptical DriveOSMonitor
Western Digital 120 GB SONY CD-RW CRX320E Windows XP MAG LCD 17' 
KeyboardPowerCaseMouse
Logisys InWin PowerMan 350W Phantom ( power suply was replaced ) Logitech Optical mouse 
CPUMotherboardGraphicsRAM
AMD FX-8350  Gigabyte GA‑990FXA‑UD5 Nvidia crucial ballistix tactical 
Hard DriveHard DriveOptical DriveCooling
Seagate Barracuda ST1000DM003 western digital red CD Combo Drive cooler master hyper 212 evo 
OSPowerCase
FreeBSD 10.2 COUGAR A-Series A560 Rosewill REDBONE Mid tower 
CPUMotherboardGraphicsRAM
AMD Athlon 5350 Kabini Quad-Core 2.05 GHz Biostar AM1MHP EVGA GeForce GT 730 LP Low Profile Graphics Car... 4gb corsair vengeance 1600mhz ddr3 
Hard DriveCoolingOSKeyboard
ADATA Premier SP550 64GB ARCTIC Alpine M1 FreeBSD 10.2 Iogear Multimedia GKM561R Wireless 2.4 GHz Keyb... 
PowerCaseMouse Pad
SeaSonic SS‑400ET DIYPC DIY-F2-P Integral Trackball 
  hide details  
Reply
post #5 of 10
Quote:
Originally Posted by Mookster View Post

The problem people aren't quite grasping, is that mass surveillance produces a wealth of data. That data can be worked by statisticians, much like it is in the advertising market, to develop marketing strategies and determine how to make their products appealing to people who wouldn't otherwise be interested.

The government, however, markets law. Your consent or even awareness of their spying is not necessary, and the same goes for their use of data garnished from said spying.

With a situation where they seem to never decline an opportunity to gather this data and store it indefinitely, it's hard not to conceive of them eventually employing the same tactics used in advertising.

With a wealth of "harmless" information, especially if quantified in real time, public relations could get much easier. This would be incredibly useful for packaging certain controversial laws in a way that would calm potential dissidents. At the very least, it could help to gauge the position of the public. For instance, you could match common metadata characteristics of gun law opposers by taking a sample group of people who spread pro-second-amendment videos or litetature on social media. Find the most prevalent data characteristics of those people, and cross-reference to find potential dissidents that weren't in your sample group.

Doing this would make it much easier for politicians to determine if a law will cause civil unrest before they even try it. It could help them choose the right times or create the right conditions to prevent people from opposing them, when they try to introduce law.

This would be great at keeping things peaceful, when the public is resistant to enacting laws that should be passed. It would also help politicians maintain the confidence and trust of the people, by intelligently predicting and preventing criticism.

If they haven't begun laying the groundwork for such a tool, they really should. It would help keep things peaceful at home, and prevent issues like we're seeing in the south. Lives would certainly be saved.

I will heartily disagree with you on this....Politicians RARELY think intelligently, they are bought and paid for by special interests(unions) and corporations.... They will use this data to point out to their benefactors how legislation would or would not pass let alone it will affect the re-election of the politician they are paying for IF the tried pushing such legislation....

So this is not to gauge the public sentiments in hopes of keeping the peace....this is more useful for politicians and the TRUE interests they serve....they know what things they can and cannot get away with, or even how they can INCREMENTALLY place certain legislation to get to the ultimate goal...

This is not intended to keep the peace or let politicians know the "true will of the people", this is just letting them know what they can and cannot get away with before a torch and pitchfork party shows up at their office...
my temp rig
(6 items)
 
  
CPUMotherboardGraphicsHard Drive
i7 6700K Asus Z170 Pro Gamin GTX1080 Samsung 830 256GB 
CoolingOS
Hyper 212+ EVO Windows 7 
  hide details  
Reply
my temp rig
(6 items)
 
  
CPUMotherboardGraphicsHard Drive
i7 6700K Asus Z170 Pro Gamin GTX1080 Samsung 830 256GB 
CoolingOS
Hyper 212+ EVO Windows 7 
  hide details  
Reply
post #6 of 10
Quote:
Originally Posted by soth7676 View Post

I will heartily disagree with you on this....Politicians RARELY think intelligently, they are bought and paid for by special interests(unions) and corporations.... They will use this data to point out to their benefactors how legislation would or would not pass let alone it will affect the re-election of the politician they are paying for IF the tried pushing such legislation....

So this is not to gauge the public sentiments in hopes of keeping the peace....this is more useful for politicians and the TRUE interests they serve....they know what things they can and cannot get away with, or even how they can INCREMENTALLY place certain legislation to get to the ultimate goal...

This is not intended to keep the peace or let politicians know the "true will of the people", this is just letting them know what they can and cannot get away with before a torch and pitchfork party shows up at their office...
I'm not really speculating intentions.

However, your proposal is pretty heavy. The push for access to information has come at a great cost to people; both in monetary terms and in terms of their civil rights.

If you think this has all been done under the guise of security, then you're talking about the commercial recruitment of militarized intelligence agencies for use against the general population. That's no small feat; certainly not an indication of lacking intellect, on part of those involved.

It's far more effective to speculate the potential of technological advances and then access the risks of trusting the intentions of those who have access to said advances. That, or you can merely speculate the potential of the technology in various fields. Let people make their own assumptions; this forum isn't a place to discuss the intentions of politicians, but it's a good place to discuss the convergence of technology and government.
Trash Box
(15 items)
 
 
G73JH-A1
(13 items)
 
CPUMotherboardGraphicsRAM
i7 980x @ 4.4GHz Asus P6X58D-E Gigabyte 8GB GTX 1070 G1 Gaming 24GB Corsair Dominators 1600MHz 
Hard DriveHard DriveMonitorKeyboard
2x256GB C300's R0 1TB Samsung 850 Pro ASUS MG279Q, Catleap Q270 G19 
PowerCaseMouse
Corsair AX1200 Silverstone RV-02 G9x 
CPUMotherboardGraphicsRAM
AMD 965BE 125W Asus M4A77D Asus 5770 Cucore 4GB Kingston 800MHz 
Hard DriveOptical DriveOSKeyboard
2x750GB Seagates 22x LG DVD-RW w7 Ultimate 64-bit  G15 
PowerCase
Antec Earthwatts 430W 80+ Antec New Solution NSK6580B 
CPUMotherboardGraphicsRAM
720QM AsusTek Mobility HD5870 8GB Kingston 1600MHz 
Hard DriveOptical DriveOSMonitor
256GB C300/500GB Seagate Bluray Combo w7 Ultimate 64-bit 17'' 1080P 
Case
G73JH-A1 
  hide details  
Reply
Trash Box
(15 items)
 
 
G73JH-A1
(13 items)
 
CPUMotherboardGraphicsRAM
i7 980x @ 4.4GHz Asus P6X58D-E Gigabyte 8GB GTX 1070 G1 Gaming 24GB Corsair Dominators 1600MHz 
Hard DriveHard DriveMonitorKeyboard
2x256GB C300's R0 1TB Samsung 850 Pro ASUS MG279Q, Catleap Q270 G19 
PowerCaseMouse
Corsair AX1200 Silverstone RV-02 G9x 
CPUMotherboardGraphicsRAM
AMD 965BE 125W Asus M4A77D Asus 5770 Cucore 4GB Kingston 800MHz 
Hard DriveOptical DriveOSKeyboard
2x750GB Seagates 22x LG DVD-RW w7 Ultimate 64-bit  G15 
PowerCase
Antec Earthwatts 430W 80+ Antec New Solution NSK6580B 
CPUMotherboardGraphicsRAM
720QM AsusTek Mobility HD5870 8GB Kingston 1600MHz 
Hard DriveOptical DriveOSMonitor
256GB C300/500GB Seagate Bluray Combo w7 Ultimate 64-bit 17'' 1080P 
Case
G73JH-A1 
  hide details  
Reply
post #7 of 10
Quote:
Originally Posted by Mookster View Post

I'm not really speculating intentions.

However, your proposal is pretty heavy. The push for access to information has come at a great cost to people; both in monetary terms and in terms of their civil rights.

If you think this has all been done under the guise of security, then you're talking about the commercial recruitment of militarized intelligence agencies for use against the general population. That's no small feat; certainly not an indication of lacking intellect, on part of those involved.

It's far more effective to speculate the potential of technological advances and then access the risks of trusting the intentions of those who have access to said advances. That, or you can merely speculate the potential of the technology in various fields. Let people make their own assumptions; this forum isn't a place to discuss the intentions of politicians, but it's a good place to discuss the convergence of technology and government.

Well you did speculate the intentions to "keep the peace" with the information...However I was more talking motives than intentions....

and though discussing the convergence of technology and government is helpful....tbh if you arent sure on the motivations of WHY they are doing so...your speculation can be WAY off base....

Though I will admit...MY speculation on their motivation dovetails a bit with "keeping the peace" however it is for their benefit, not for the country as a whole....
my temp rig
(6 items)
 
  
CPUMotherboardGraphicsHard Drive
i7 6700K Asus Z170 Pro Gamin GTX1080 Samsung 830 256GB 
CoolingOS
Hyper 212+ EVO Windows 7 
  hide details  
Reply
my temp rig
(6 items)
 
  
CPUMotherboardGraphicsHard Drive
i7 6700K Asus Z170 Pro Gamin GTX1080 Samsung 830 256GB 
CoolingOS
Hyper 212+ EVO Windows 7 
  hide details  
Reply
post #8 of 10
Quote:
Originally Posted by _Red_Dog_ View Post

My 2 cents as this is more or less rehash thread.

I am currently in process of learning security and all this, and by no means an expert, however.
The three prevailing themes I tend to notice about these types of stories and discussions are

-People focusing on esoteric matters of right and wrong. If someone sabotages my drinking water I don't argue about the moral of the situation, I try fixing it first in anyway I can and than think who I am going to retaliate against. Similarly I would start by looking at this as a problem that can be fixed, but we just don't know how yet, and we should...
-Think outside the box. If we start discussing practical means, often we bikeshed on which hash to use and etc, while in reality we should look at a big picture. So, my phone is compromised, at what level? Is this a kernel vulnerability I can fix by recompiling with some settings?(disable hotplug mods, harden it in some way that will trap the malignant module). Is my protocol vulnerable? Is my software vulnerable? Are permissions managed correctly? Can I hardblock unwanted traffic my phone may be producing with my internal firewall? Can I rewrite that? Is my hardware compromised? Can I get an alternative(Pocket Pi, etc)? Can I debug some code myself and maybe rewrite it for everyone's benefit? I guarantee you that "they" have not thought of everything.

So under no circumstance we should
-Panic and overestimate the offenders strength. You have to remember that the most powerful tool the offender has is a aura of omnipotence that urges you to just lay down your arms and stop resisting. This is a good tactic to use and hard one to avoid, but you have to. Look around you, most OCN users work somewhere in some fashion. Look around your workplace and see how things are done. I would say on average you'll find mistakes and breakthroughs, laziness and hard work, insight and ignorance. This is how all of those agencies work to. They are people just like us, and they do make mistakes, write sloppy code and take of work early at same time as making new breakthrough, sharpening their propaganda skills and building elaborate infrastructure. The sooner the Omnipotent image is dispelled the sooner we will fix or at least partially mitigate and bring this problem back inline.

Those were my two cents. I think no matter the results, if we try we at very least become less ignorant about the subject and therefore the world and less ignorant public is always a good thing. ^^

p.s. I specifically avoided commenting on the "Conclusions" section of the article as some of those suggestions I find laughable and some outright malicious. But I do not know if its a bannable office on OCN to make those critiques = \

This was a really insightful post and I enjoyed reading it. Sorry that is all I have to add to the thread.
Just another 900D
(32 items)
 
  
CPUMotherboardGraphicsGraphics
Intel 4770K MSI Z87 Mpower MAX EVA GTX 980Ti SC EVGA GTX 980Ti SC 
RAMHard DriveHard DriveHard Drive
Gskill Ripjaws X Samsung 840 EVO WD Blue Crucial MX100 
Hard DriveOptical DriveCoolingCooling
Crucial MX100  NONE ATM EK Supremecy Acetal/Copper Tons of Black Bitspower 
CoolingCoolingCoolingCooling
VPP655 PWM w/ EK D5 XTOP VPP655 PWM w/ EK D5 XTOP EK CoolStream 480 XT Series EK CoolStream 240 XT Series 
CoolingCoolingCoolingCooling
EK Titan X EK CoolStream 420 XTX Series EK RES X3 250 Primochill Advanced LRT Clear 
CoolingOSMonitorMonitor
Mayhems Pastel Yellow Win 7 64 Bit ASUS PB278Q  Qnix QX2710LED @ 96Hz 
KeyboardPowerCaseMouse
Corsair K90 EVGA SuperNOVA 1300 G2(in process of full sleev... 900D Corsair M65 
Mouse PadAudioAudioAudio
Razer Creative Soundblaster Z  Schitt Valhalla Phillips Fidelio X1 
  hide details  
Reply
Just another 900D
(32 items)
 
  
CPUMotherboardGraphicsGraphics
Intel 4770K MSI Z87 Mpower MAX EVA GTX 980Ti SC EVGA GTX 980Ti SC 
RAMHard DriveHard DriveHard Drive
Gskill Ripjaws X Samsung 840 EVO WD Blue Crucial MX100 
Hard DriveOptical DriveCoolingCooling
Crucial MX100  NONE ATM EK Supremecy Acetal/Copper Tons of Black Bitspower 
CoolingCoolingCoolingCooling
VPP655 PWM w/ EK D5 XTOP VPP655 PWM w/ EK D5 XTOP EK CoolStream 480 XT Series EK CoolStream 240 XT Series 
CoolingCoolingCoolingCooling
EK Titan X EK CoolStream 420 XTX Series EK RES X3 250 Primochill Advanced LRT Clear 
CoolingOSMonitorMonitor
Mayhems Pastel Yellow Win 7 64 Bit ASUS PB278Q  Qnix QX2710LED @ 96Hz 
KeyboardPowerCaseMouse
Corsair K90 EVGA SuperNOVA 1300 G2(in process of full sleev... 900D Corsair M65 
Mouse PadAudioAudioAudio
Razer Creative Soundblaster Z  Schitt Valhalla Phillips Fidelio X1 
  hide details  
Reply
post #9 of 10
Quote:
Originally Posted by soth7676 View Post

Well you did speculate the intentions to "keep the peace" with the information...However I was more talking motives than intentions....

and though discussing the convergence of technology and government is helpful....tbh if you arent sure on the motivations of WHY they are doing so...your speculation can be WAY off base....

Though I will admit...MY speculation on their motivation dovetails a bit with "keeping the peace" however it is for their benefit, not for the country as a whole....

Conversation about just how a government can utilize this data is the topic that's most interesting and probably most revealing. Getting into specific intentions of specific governments and politicians is akin to a debate about religion; it's mostly predicated on faith and tends to be heated and completely pointless.

It seems easier just to work on the common assumption that government is ultimately working for the good of the people. That's what most people believe. That's the best way to illuminate the subject and speculate on just what's possible without falling into a volatile political debate.
Trash Box
(15 items)
 
 
G73JH-A1
(13 items)
 
CPUMotherboardGraphicsRAM
i7 980x @ 4.4GHz Asus P6X58D-E Gigabyte 8GB GTX 1070 G1 Gaming 24GB Corsair Dominators 1600MHz 
Hard DriveHard DriveMonitorKeyboard
2x256GB C300's R0 1TB Samsung 850 Pro ASUS MG279Q, Catleap Q270 G19 
PowerCaseMouse
Corsair AX1200 Silverstone RV-02 G9x 
CPUMotherboardGraphicsRAM
AMD 965BE 125W Asus M4A77D Asus 5770 Cucore 4GB Kingston 800MHz 
Hard DriveOptical DriveOSKeyboard
2x750GB Seagates 22x LG DVD-RW w7 Ultimate 64-bit  G15 
PowerCase
Antec Earthwatts 430W 80+ Antec New Solution NSK6580B 
CPUMotherboardGraphicsRAM
720QM AsusTek Mobility HD5870 8GB Kingston 1600MHz 
Hard DriveOptical DriveOSMonitor
256GB C300/500GB Seagate Bluray Combo w7 Ultimate 64-bit 17'' 1080P 
Case
G73JH-A1 
  hide details  
Reply
Trash Box
(15 items)
 
 
G73JH-A1
(13 items)
 
CPUMotherboardGraphicsRAM
i7 980x @ 4.4GHz Asus P6X58D-E Gigabyte 8GB GTX 1070 G1 Gaming 24GB Corsair Dominators 1600MHz 
Hard DriveHard DriveMonitorKeyboard
2x256GB C300's R0 1TB Samsung 850 Pro ASUS MG279Q, Catleap Q270 G19 
PowerCaseMouse
Corsair AX1200 Silverstone RV-02 G9x 
CPUMotherboardGraphicsRAM
AMD 965BE 125W Asus M4A77D Asus 5770 Cucore 4GB Kingston 800MHz 
Hard DriveOptical DriveOSKeyboard
2x750GB Seagates 22x LG DVD-RW w7 Ultimate 64-bit  G15 
PowerCase
Antec Earthwatts 430W 80+ Antec New Solution NSK6580B 
CPUMotherboardGraphicsRAM
720QM AsusTek Mobility HD5870 8GB Kingston 1600MHz 
Hard DriveOptical DriveOSMonitor
256GB C300/500GB Seagate Bluray Combo w7 Ultimate 64-bit 17'' 1080P 
Case
G73JH-A1 
  hide details  
Reply
post #10 of 10
https://www.google.com/search?q=Hacking+Team+hacked&ie=utf-8&oe=utf-8

https://www.wikileaks.org/spyfiles/docs/hackingteam/31_remote-control-system-v5-1.html
New Posts  All Forums:Forum Nav:
  Return Home
  Back to Forum: Technology and Science News
Overclock.net › Forums › Industry News › Technology and Science News › [Securelist] Targeted Mobile Implants in the Age of Cyber-Espionage