Skip to main content

Connecting data from different sources could cause problems for privacy and security


Kimmo Huosionmaa

When people are connecting data by using different tools, they can create a very good profile of the person, who is targeted for surveillance. The data can be collected by using social media services, what are not all time person's own. The surveillance operators or hackers can try to find out the names of the persons, who are working with the target. They can collect the names by using the company's homepages, or those persons may try to slip in the stairway, and try to find the neighbors last names. Then they might just google those names, and sometimes the searches give the pictures of those people. And then they might ask those persons for their Facebook friends and also take photographs of the parking areas of the firm to find out the vehicles, what the employee uses.

The process allows to get all information what is possible to get about the targeted organization, and if those trackers have equipment and permission, they can also eavesdrop the target, and then use those discussions in the propaganda or more handsome way to say PSY-OP (Psychological Operations) writings, what purpose is to make the target panicking. One version is to claim, that some person in the company has told secrets by self.

And the more influential way to operate would be open the false image in the Facebook, and then use that image for delivering the secret or confidential information, what has been collected by using espionage methods. And that thing can cause kick off the company. The idea is to make pressure to the target, that this makes mistakes. When people are targeted, the operators can use the images of the targeted person's car in the false-information operation.

The registration number of the car can be faked in the films, where is happening the accidents. This thing can cause very serious problems for the target. And the marriage life of the person is causing very bad troubles if on the internet is delivering the films, where that husband just hangs in the bar and drinks all night long. This kind of films can be faked, and they can cause very bad problems. In those cases, the idea would just get that person kicked off the job, and then that man or woman is very delicate to tell the secrets of the company for the person, who offers shoulder and support.

And if the kicks off have been happened in the unfair situation, and the victim could not even defend self, would that cause need to tell secrets for some other person. This is the way to get information, what kind of applications that company respects, and that would be a good way to slip the man, who works for those spies inside the company. The best way for that is to cause the kicks to some key worker, and the company must open the new vacancy for next employee. And one of the best position, what spy can get in the company is the micro support person. That spy can put a microphone in every single room in the company and also install surveillance cameras, what allows to get passwords and other things from the screen.

Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that