It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: Indigo5
originally posted by: fencesitter85
My god you people are paranoid as hell.
Let's say for a minute the CIA wanted to listen to you ranting over your microwave meal for one about how Obama is a Muslim - why the hell would functionality be built into alexa which makes it totally fail to respond when asked this question?
Let's say in 6 years whoever is in the WH has sufficiently exerted full authority over the intelligence community.
The Intelligence Community under the dictate to compete well in the ever emerging and ever more important cyber-war battlefield has developed and optimized it's hacks and backdoors to the "Internet of Things" apparatus....Phones, Health Trackers, Home assistants like Google Home and Alexia, interactive media browsers on TV's, home security systems and camera's etc.
At present those vulnerabilities are only being exploited for specific intelligence targets...
But as the Snowden Leak proved...there is utility in store-housing data.
The advantage to store-housed data at large is...once a potential terrorist, spy etc. is identified. You can look BACKWARDS and see what they were doing last week, last month, last year...vs. only seeing what they do tomorrow.
THAT is why the NSA was storing data on everyone in a mass-surveillance operation. Storing data is becoming ever cheaper and easier.
Apply that model to IOT (Internet of Everything)...Identify a suspect...look back at their...Health the past year? Distance walked and when? Heart-rate? Sleep Patterns? Hear audio excerpts from their home audio devices? Store: Keyword Trigger? Store video..
Let's say in an authoritarian regime...How could this be used to track, monitor and disrupt opposition? Could AI be deployed to asses public sentiment?
Paranoid?...Yes...but should we not pay attention until that paranoia is justified.
Last October...Some unknown hacking entity (Some suspect China) did the first known test run in the USA of an IOT exploit.
Hacked home devices caused massive Internet outage
The software uses malware from phishing emails to first infect a computer or home network, then spreads to everything on it, taking over DVRs, cable set-top boxes, routers and even Internet-connected cameras used by stores and businesses for surveillance.
www.usatoday.com...
Home Security Camera's?
Thinking of buying a security camera? Read this first
Security cameras aren’t all that secure
Most security cameras and their software aren’t built with computer security in mind. None of the vendors could provide me with a clear understanding of code reviews and penetration testing. In fact, most of my security inquiries were met with befuddlement.
www.infoworld.com...
Just saying...We might very well wake up sometime in the future where our government is executing an NSA collection program around our home devices...not just phones..and that data can be sourced for all kinds of political purposes, not just criminal investigations.
originally posted by: Silk
Hmmm seems spying is a little older than the USA - actually most things are (sorry guys) - its a thing that happens - if you dont accept it don't do wrong therefore nothing to worry about ?
Uploaded on Dec 3, 2009
What does the National Security Agency have to do with Microsoft? Apparently, a lot. The NSA worked with Microsoft in its development of the Windows 7 operating software. And the relationship may stretch further back -- as far as the late 80's and previous operating systems manufactured by the company. Is this cause for concern for people who want to ensure their privacy? Is this another exmaple of Big Brother watching?
Uploaded on Feb 5, 2010
Google is now in an open cooperation with the NSA, in order to counter China cyber attacks. Many other Silicon Valley companies have turned to the NSA in order to protect themselves from hackers from China and other nations. Webster Tarpley says that although Google has not been open to the government in the past, the reason it exists is due in part to the government.
Published on Aug 17, 2016 On Saturday, programming code for National Security Agency hacking tools was shared online. The content appears to be legitimate, but it is not clear if it was intentionally hacked or accidentally leaked. Hari Sreenivasan speaks with The Washington Post’s Ellen Nakashima and Paul Vixie of Farsight Security about where this development fits in the context of other recent cybersecurity breaches.
originally posted by: bknapple32
My own little experiment. She absolutely shuts down with the mention of CIA. But not FBI or something random like Mcdonalds