Cloned Boy
Professional
- Messages
- 1,076
- Reaction score
- 820
- Points
- 113
Hello everyone! Anton Kornev with you! In this thread, we will talk about how the FSB is spying on us.
I will tell you which special services can spy, what methods they use, and whether ordinary citizens can feel safe. We will discuss whether it is possible to protect yourself completely, and whether there are secure messengers.
What stories about wiretapping do you know? Write in the comments!
Contents:
How the FSB is spying on us. There is a known case when the American ambassador was photographed and wiretapped with the help of a carpet. It happened in the distant Soviet Union. Soviet intelligence officers presented a gift to the American ambassador. It was a carpet with a star-spangled banner. It was so skillfully made that the ambassador hung it, naturally, in his office. And a microphone and a camera were skillfully woven into it, which photographed all the documents that were on the desk of the ambassador of the United States of America.
And these methods do not become obsolete. Quite recently, investigating a criminal case against Mr. Nikandrov, the head of the Main Investigative Department of the Investigative Committee for Moscow, the Federal Security Service and its operatives presented his accomplices, the head of the Internal Security Department of the Investigative Committee, Mr. Maksimenko, a samovar for their own professional holiday, Counterintelligence Day, in which a wiretapping device was installed.
And in such a simple way, this crime was exposed. Wait a second, a bribe of 1 million dollars. If you think that the FSB only monitors spies, you are very much mistaken. Let's figure out how things are now in our Mother Russia.
How are things now?
The Federal Security Service, by its nature, must be engaged in protecting the constitutional structure of the Russian Federation. That is, identifying and fighting everyone who, in its opinion, threatens the integrity and security of the Russian state. And as we understand, very often these are not only the spies themselves, but also the people who help them. Accordingly, the Federal Security Service has to, there is no other way to call it, monitor everyone.
How is this done? With the help of modern technology. It is no secret that the so-called Yarovaya package merely provided a legal basis for the many years of work that was already being carried out by the operational services.
Who can wiretap?
After all, we have heard about wiretapping and surveillance, when they follow this or that citizen and listen in on his telephone conversations.
The FSB, the Ministry of Internal Affairs, the Main Directorate of the Federal Penitentiary Service, the Foreign Intelligence Service, the Main Intelligence Directorate, the Customs Service and the Federal Protective Service. A fairly large list. How do they do it? It's all very simple. There is a program called SORM - the System of Technical Means for Ensuring the Function of Operational Investigative Activities.
Today, this is a program that has a neural network embedded in it. It is self-learning. I will tell you later why this is necessary.
What about the law?
But what about the legal aspects? After all, the secrets of personal life and the secrets of correspondence are protected not only by the criminal code, but also guaranteed by the Constitution of the Russian Federation.
Everything is simple to the point of banality, at least here in Russia. In order to start wiretapping a citizen, you need a court decision. But very often, based on the law on operational-search activities, if there are prerequisites for the commission of a crime, you can start operational-search activities without a court decision.
After all, operational-search activities very rarely become an evidence base. What is ORM? Operational-search activities are those activities that allow the investigation and operatives to understand where to look, understand who to detain and with whom to work. And not all data from operational-life activities are then converted into evidence.
Often, this is impossible to do in legal terms, because it was done with violations. But sometimes there is no point in this at all, because it is not evidence in itself. A simple example. Uncle Vanya talked to Uncle Petya. In this case, Uncle Petya took and cashed a very large sum of money.
This got to Rosfinmonitoring, because Uncle Petya had never done this before. Rosfinmonitoring became interested in where the money went. It turned out that it went somewhere to Ukraine. And then Rosfinmonitoring gives all this information to the Ministry of Internal Affairs. And the Ministry of Internal Affairs begins to monitor Uncle Vanya, who talked to Uncle Petya and asked him to cash this money. This is approximately how it works.
At the same time, this conversation is unlikely to be used as evidence, but they will look for irrefutable evidence in Uncle Vanya's activities. But in such a simple way, he attracted the attention of law enforcement agencies, and they, without notifying anyone about anything, without asking anyone anything, and especially without telling Uncle Vanya about this, began to wiretap him. At the same time, from a legal point of view, only two organizations are monitoring this interesting disgrace.
Some structures within the Ministry of Internal Affairs itself and all the other services I listed, which are called the internal security department, that is, an operative monitors an operative, and the prosecutor's office, which has the right, should and sometimes does so, check the conduct of operational-search activities and their compliance with the laws.
But it must be admitted that the volume is very large, and people simply cannot cope or do not want to.
Who is being wiretapped?
But it must be understood that, naturally, they are not wiretapping everyone. There are so-called key words, which, if the program hears in a conversation, it will automatically begin to pay increased attention to these subscribers. Bomb, cashing out, and so on and so forth. These words are specially selected, filtered out, and this is how wiretapping of everyone and everything occurs by key words.
This is the simplest and first step. Then they take note of all those who are of interest, that is, there is a specific criminal or suspect, and he has a circle of contacts. Moreover, the circle of contacts is currently established, including with the help of social networks, even if the person took and wiped everything from there.
And it is this circle of contacts that is also wiretapped even before a criminal case is initiated and any charges are brought against the suspect. This is the so-called work on collecting evidence so that later all this can be presented to the prosecutor's office and in court and a criminal case can be initiated. Of course, these are mainly extremists, terrorists and other types of serious criminals who are plotting or preparing something.
Despite Nord-Ost, Beslan, Crocus City Hall, this work is still being done. Maybe not as effectively as you and I would like, but it is being done. Also, those who are bearers of state secrets, academics, people admitted to state secrets, and cases of treason have been heard in court quite often in the last five years.
Naturally, with such opportunities, there is a great temptation to do something outside the law. For example, when a list is published for a specific criminal case or for a specific pre-investigation check, for a specific event, when the case has not yet been initiated, and the very evidence is collected to initiate a criminal case, 20, 30, 40 people are included in the list of those people who are of interest to law enforcement agencies, someone left for money.
How much it costs, no one knows, but the fact that it happens periodically is a reliable fact. Unfortunately, corruption has remained as it was, so it is quite easy to get on the lists of those people who will be wiretapped, even if you do nothing wrong.
At the same time, no one discounts friendly and family ties. Very often this is used when making large transactions in order to dig up dirt on this or that CEO, top manager or owner. Our press has abused this a lot. Let's take, for example, the famous investigator Mr. Karaulov, we do not know where he got his information from, but periodically his incriminating materials included transcripts of correspondence and calls.
Different methods of surveillance.
But in addition to physical wiretapping as such, there are also different ways to follow us. For example, the well-known surveillance, when a person was followed by so-called "stompers", four people in a box, and, taking turns, they watched where he would go. Now there is no need for this, and it is very expensive.
Now you are being watched by cameras and by phone. The thing is that our phone, even in airplane mode and even if the battery is completely discharged, as it seems to you, still communicates with the cell tower, in any case. That is why all the latest gadgets do not have a removable battery and even when your phone is turned off, it still sends a signal to the cell tower that it has entered the appropriate cell. This is called billing, and with the help of billing, you can determine the location of a cell phone with an accuracy of 3 meters in Moscow.
Naturally, somewhere in the Tundra, everything is much more complicated, but nevertheless. Therefore, now everything is moving to a new digital level, and the secret services are adopting all the technologies that humanity has. In addition, do not forget that, for example, in Moscow there are more than 250 thousand cameras in all courtyards and streets, on all roads.
If we look at our ally China, there are more than a million of them in Beijing. But we will talk about how things are in China a little later. Naturally, it is impossible to process such a huge amount of information without neural networks. Even basic cameras that stand on the street have already learned to recognize the face of citizens. And they went even further.
Even a face in a mask can already be recognized. All this is done by a neural network. It is specially trained. Without this, it is no longer possible to cope. There is no individual operative officer sitting and watching, checking something there. In no case. All this is done by the program. The operative officer only needs to enter the criteria of what he needs. A specific person or a specific area.
And then filter what the program has knocked out. That is, first the program finds everything it needs, then the operative officer double-checks it, if he understands that there was no error, and there are fewer and fewer errors, he begins to work with it. Of course, all these operational-search materials can be legalized in court. This is exactly what they do when they investigate criminal cases, bring the results of operational-search activities to court and legalize them in the part that is possible and necessary for the investigation.
Not all of them, as I have already said. As for SORM, in 2015 the UN Geneva Convention recognized this program as violating human rights. Apparently, they forgot that they had a prism, which Snowdov spoke about in 2013.
Naturally, with this approach, everyone spat on the UN decision. Another way is cyber surveillance, that is, checking your mail, e-mail, how you communicate on the Internet and how you use instant messengers. Looking ahead, I want to say that no secure instant messengers exist. Understand one simple thing. If any messenger works on the territory of the country, then there is access to it.
How did he get it? Question three. Voluntarily surrendered, kidnapped, tortured, or connected, or infiltrated, it doesn't matter. If the FSB does not have access to the messenger, it does not work on the territory of the Russian Federation. This was the case with BlackBerry. Such a phone, which had its own encryption protocol, is quite complex, and since BlackBerry did not provide decryption keys, these phones did not work here.
But as for this particular company, in 2020 it ceased to exist. Enlightened Europe also did not like the fact that BlackBerry did not provide decryption keys. I would like to dwell separately on Telegram. The encryption protocol that Pavel Durov is proud of is really good enough.
But not as much as the founder promotes it. This is the MTP-rota protocol. It only works in secret chats. Your regular chats and conversations are very easy to hack and extract information from them. And only secret chats have final encryption. This encryption system works on the client-client method, according to which the content of the message will be correctly perceived by the recipients only with the help of the sender.
It turns out that your chat exists only between you and your interlocutor. This is the main problem. The chat exists between you and the person you wrote to. It is not enough to destroy it yourself, you also need to destroy it from the person you wrote to, and destroy it in the cloud storage. And according to the Yarovaya law, all storages are located in the Russian Federation, and law enforcement agencies have access to them.
That's all. All the same applies to WhatsApp, Viber, Signal. A very funny story happened with WhatsApp in general. The richest man in the world was hacked, and his secret correspondence leaked there from WhatsApp. Some will say, then I will change my account. The FSB has a special program, also impossible to dispel, comrade major calls it a joke.
It identifies people by their patterns, correspondence patterns. It's like handwriting, and it won't be difficult to identify you if you write from different All this became possible thanks, among other things, to the pioneers in the implementation of neural networks ISK-NDS - an analytical system for monitoring tax collection, which began to be implemented back in 2000.
Now it's in its third generation. This neural network allows you to track various gray and criminal tax evasion schemes, based on its successes, the successes of its implementation, and began to implement the same approximate algorithms, the same neural networks in STORMs, and approximately the same programmers are doing this, who, for a second, are employees of the Federal Security Service.
It is on their servers that all this is stored. And about how else the tax authorities monitor us, what this can threaten, I talk about in my free webinar. Link in the description. Changing SIM cards is also not an option. The fact is that they monitor a unique phone number, and not just your phone number.
Moreover, of course, there is already voice recognition and so on and so forth. And all this is to say that it has become more and more difficult to do dark deeds.
How to protect yourself from surveillance?
Are there any ways to protect yourself from this? Yes? To completely abandon all the benefits of civilization. Electronic ones, I mean. Live somewhere in the taiga. Preferably, where there is a dense forest. So that you cannot be seen from a satellite. And somewhere deeper, so that no quadcopter with a thermal imager can observe you either.
Something like that. That is why terrorist organizations are very fond of the caves of Afghanistan, a hard-to-reach area where there is nothing, no electricity, no water, no gadgets. This is already due to the category of utopia. Of course, if a person lives an ordinary life, he has nothing to piss himself about. Any technology is a double-edged sword.
They bring both an ease of life and serious restrictions, restrictions of your freedom.
The state knows everything about us.
Of course, we already need to get used to the fact that the state knows everything about us - where we went, when we left, when we returned. Take at least an ordinary entrance to a Moscow apartment building. Starting in 2018, when we hosted the World Cup, all entrances to all apartment buildings in Moscow were equipped with special cameras.
These cameras recognize the faces of everyone who enters and leaves. They didn’t ask us about this, they just took and installed them. All entrances, all buildings in Moscow. This program is called “Safe City”. It has now been implemented in all million-plus cities.
Rostec is implementing it together with the FSB. Quite serious funding is allocated for this. This includes not only courtyards, but also roads, interchanges, train stations, airports, etc. This system not only helps fight crime, but also respond to emergency situations. There are pros and cons, but, of course, it can be used and is used to find out as much information about a specific citizen as possible, if law enforcement agencies need it.
Using "bugs".
And finally, the last method that I want to tell you about today is banal bugs, listening devices. As old as the world, as I already said, nothing changes, sometimes in a carpet, sometimes in a samovar. Bugs have now reached a completely different technological level, they have become very, very tiny, they do not need a constant power source, they can be activated from a distance, that is, the bug lies, does not beep, does not work.
It is impossible to detect it, because it is nothing until it is powered. And at the right moment it turns on on command. Or it is powered by electromagnetic fields from all those electronics, from all those electrical networks that are, for example, in the house.
This is the most banal and the most common method. You don't need to listen in on anything, you don't need, as was the case in one of the criminal cases, to raise a quadcopter, call the criminal on the phone to see what PIN code he enters. This has happened too. Just place bugs in the places where conversations take place. Often this is a car, an apartment and an office.
Everything is very simple. And you don't need to be clever, you don't need to go to any operator, ask for something there. You just sit and listen. And, unfortunately, not only law enforcement agencies take advantage of this. Be vigilant, especially if you have a successful business and suddenly a conflict with one of the partners. At the same time, do not forget that the tax service does this too, but not itself.
The on-site tax audit must include two employees of the Economic Security Department and the PC of the former Economic Security Department. Exactly so that they could, within the framework of the law on police and operational-search activities, conduct operational-search activities in relation to tax persons of interest, conducting a tax audit.
Be very careful if you have an on-site tax audit. What else should you do if a tax audit has begun? How to behave during interrogation? How to work with self-employed individual entrepreneurs safely? I tell you in my articles.
How to behave so as not to arouse suspicion?
At the same time, know that if you do not leave a so-called digital trace, This, on the contrary, only increases suspicion.
As I always say, you need to be moderate, you need to show moderate activity on social networks, in correspondence, and not disappear from there forever. This only arouses more interest in you on the part of law enforcement agencies. There is a certain, I repeat, a certain average picture, which the neural network is trained to, how a hypothetical citizen-entrepreneur should behave, if he has no evil intentions.
It is with this template, with this pattern, that everything is compared. In a nutshell, this is how SORM works. Well, and a little about how everything is arranged.
How is everything arranged?
The Lavabit mail service was very popular in the 2000s. And everything was fine, and people used secure mailboxes. The service was considered one of the most secure on the Internet. But one fine day, on August 8, 2013, the service completely closed. Without warning or announcements. Just closed. Users lost all their secure correspondence, with no chance of getting it back. All the letters ended up in the CIA. And it all happened because of the data that Edward gave to Snowd. This is how Enlightened Democracy responded to the threat from Edward Solovyov: it simply withdrew the entire mail service.
Black market.
Curtain. Of course, against the backdrop of such unprecedented collection of personal data, the black market for trading in this personal data has flourished. This is the flip side of technological progress. We, as citizens, are no longer a mystery to our state.
Wiretapping.
As for wiretapping phones, even when they do not work through a microphone, I also remember the old belief when laptop cameras were taped over, all this took place. It is not so difficult to write a malicious program that can activate both the microphone and the camera from a distance. It is more difficult to plant this malicious program, but there are also ways.
I am not even talking about Alice and Marusya, as they say, the comment is superfluous.
What awaits us?
Well, what awaits us? It seems that there is no point in hiding, everyone will find out, it is not so simple. The array of data that currently exists and is being processed is still very difficult to process even with the software methods that exist. And, of course, very often everything simply does not reach, is not detected.
This is still only at the very beginning. But this will naturally be refined. Its network will be trained. More and more data will be processed. For example, in China, in Beijing, with a population of 22 million, there are more than a million cameras that recognize a person by their face. But still, there is one city in China that is a testing ground for such research.
This is the city of Guian. There, with a population of 5 million people, there are half a million cameras, twice as many as in the capital, Beijing. It is there, as many analysts think, that China is working out new algorithms for training neural networks for face recognition, gait recognition, gender and even nationality. And a register of all those people who fall into the field of view of these cameras is maintained.
If suddenly a person is not in the register, they are dealt with separately and very closely, even despite the fact that he is a foreigner. At the same time, it should be understood that back in 2005, our law enforcement agencies concluded an agreement on the exchange of information between the Chinese and Russian special services. Judging by what is happening now, this will only get stronger, and we will go down the path of even greater control by the state.
But I will repeat once again, if you are an ordinary citizen, an honest entrepreneur, then you have absolutely nothing to fear. Yes, a narrow circle of specialists will find out about your life if you fall into their field of vision. If you fall into their field of vision, and they start asking you some questions and calling you somewhere so that you answer their questions, you need to immediately contact a lawyer.
These are all the basic rules of life in this wonderful world of the future.
I will tell you which special services can spy, what methods they use, and whether ordinary citizens can feel safe. We will discuss whether it is possible to protect yourself completely, and whether there are secure messengers.
What stories about wiretapping do you know? Write in the comments!
Contents:
- How are things now?
- Who can engage in wiretapping?
- What about the law?
- Who is being wiretapped?
- Different ways of surveillance
- How to protect yourself from surveillance?
- The state knows everything about us
- Using "bugs"
- How to behave so as not to arouse suspicion?
- How does it all work?
- Black market
- Wiretapping
- What awaits us?
How the FSB is spying on us. There is a known case when the American ambassador was photographed and wiretapped with the help of a carpet. It happened in the distant Soviet Union. Soviet intelligence officers presented a gift to the American ambassador. It was a carpet with a star-spangled banner. It was so skillfully made that the ambassador hung it, naturally, in his office. And a microphone and a camera were skillfully woven into it, which photographed all the documents that were on the desk of the ambassador of the United States of America.
And these methods do not become obsolete. Quite recently, investigating a criminal case against Mr. Nikandrov, the head of the Main Investigative Department of the Investigative Committee for Moscow, the Federal Security Service and its operatives presented his accomplices, the head of the Internal Security Department of the Investigative Committee, Mr. Maksimenko, a samovar for their own professional holiday, Counterintelligence Day, in which a wiretapping device was installed.
And in such a simple way, this crime was exposed. Wait a second, a bribe of 1 million dollars. If you think that the FSB only monitors spies, you are very much mistaken. Let's figure out how things are now in our Mother Russia.
How are things now?
The Federal Security Service, by its nature, must be engaged in protecting the constitutional structure of the Russian Federation. That is, identifying and fighting everyone who, in its opinion, threatens the integrity and security of the Russian state. And as we understand, very often these are not only the spies themselves, but also the people who help them. Accordingly, the Federal Security Service has to, there is no other way to call it, monitor everyone.
How is this done? With the help of modern technology. It is no secret that the so-called Yarovaya package merely provided a legal basis for the many years of work that was already being carried out by the operational services.
Who can wiretap?
After all, we have heard about wiretapping and surveillance, when they follow this or that citizen and listen in on his telephone conversations.
The FSB, the Ministry of Internal Affairs, the Main Directorate of the Federal Penitentiary Service, the Foreign Intelligence Service, the Main Intelligence Directorate, the Customs Service and the Federal Protective Service. A fairly large list. How do they do it? It's all very simple. There is a program called SORM - the System of Technical Means for Ensuring the Function of Operational Investigative Activities.
Today, this is a program that has a neural network embedded in it. It is self-learning. I will tell you later why this is necessary.
What about the law?
But what about the legal aspects? After all, the secrets of personal life and the secrets of correspondence are protected not only by the criminal code, but also guaranteed by the Constitution of the Russian Federation.
Everything is simple to the point of banality, at least here in Russia. In order to start wiretapping a citizen, you need a court decision. But very often, based on the law on operational-search activities, if there are prerequisites for the commission of a crime, you can start operational-search activities without a court decision.
After all, operational-search activities very rarely become an evidence base. What is ORM? Operational-search activities are those activities that allow the investigation and operatives to understand where to look, understand who to detain and with whom to work. And not all data from operational-life activities are then converted into evidence.
Often, this is impossible to do in legal terms, because it was done with violations. But sometimes there is no point in this at all, because it is not evidence in itself. A simple example. Uncle Vanya talked to Uncle Petya. In this case, Uncle Petya took and cashed a very large sum of money.
This got to Rosfinmonitoring, because Uncle Petya had never done this before. Rosfinmonitoring became interested in where the money went. It turned out that it went somewhere to Ukraine. And then Rosfinmonitoring gives all this information to the Ministry of Internal Affairs. And the Ministry of Internal Affairs begins to monitor Uncle Vanya, who talked to Uncle Petya and asked him to cash this money. This is approximately how it works.
At the same time, this conversation is unlikely to be used as evidence, but they will look for irrefutable evidence in Uncle Vanya's activities. But in such a simple way, he attracted the attention of law enforcement agencies, and they, without notifying anyone about anything, without asking anyone anything, and especially without telling Uncle Vanya about this, began to wiretap him. At the same time, from a legal point of view, only two organizations are monitoring this interesting disgrace.
Some structures within the Ministry of Internal Affairs itself and all the other services I listed, which are called the internal security department, that is, an operative monitors an operative, and the prosecutor's office, which has the right, should and sometimes does so, check the conduct of operational-search activities and their compliance with the laws.
But it must be admitted that the volume is very large, and people simply cannot cope or do not want to.
Who is being wiretapped?
But it must be understood that, naturally, they are not wiretapping everyone. There are so-called key words, which, if the program hears in a conversation, it will automatically begin to pay increased attention to these subscribers. Bomb, cashing out, and so on and so forth. These words are specially selected, filtered out, and this is how wiretapping of everyone and everything occurs by key words.
This is the simplest and first step. Then they take note of all those who are of interest, that is, there is a specific criminal or suspect, and he has a circle of contacts. Moreover, the circle of contacts is currently established, including with the help of social networks, even if the person took and wiped everything from there.
And it is this circle of contacts that is also wiretapped even before a criminal case is initiated and any charges are brought against the suspect. This is the so-called work on collecting evidence so that later all this can be presented to the prosecutor's office and in court and a criminal case can be initiated. Of course, these are mainly extremists, terrorists and other types of serious criminals who are plotting or preparing something.
Despite Nord-Ost, Beslan, Crocus City Hall, this work is still being done. Maybe not as effectively as you and I would like, but it is being done. Also, those who are bearers of state secrets, academics, people admitted to state secrets, and cases of treason have been heard in court quite often in the last five years.
Naturally, with such opportunities, there is a great temptation to do something outside the law. For example, when a list is published for a specific criminal case or for a specific pre-investigation check, for a specific event, when the case has not yet been initiated, and the very evidence is collected to initiate a criminal case, 20, 30, 40 people are included in the list of those people who are of interest to law enforcement agencies, someone left for money.
How much it costs, no one knows, but the fact that it happens periodically is a reliable fact. Unfortunately, corruption has remained as it was, so it is quite easy to get on the lists of those people who will be wiretapped, even if you do nothing wrong.
At the same time, no one discounts friendly and family ties. Very often this is used when making large transactions in order to dig up dirt on this or that CEO, top manager or owner. Our press has abused this a lot. Let's take, for example, the famous investigator Mr. Karaulov, we do not know where he got his information from, but periodically his incriminating materials included transcripts of correspondence and calls.
Different methods of surveillance.
But in addition to physical wiretapping as such, there are also different ways to follow us. For example, the well-known surveillance, when a person was followed by so-called "stompers", four people in a box, and, taking turns, they watched where he would go. Now there is no need for this, and it is very expensive.
Now you are being watched by cameras and by phone. The thing is that our phone, even in airplane mode and even if the battery is completely discharged, as it seems to you, still communicates with the cell tower, in any case. That is why all the latest gadgets do not have a removable battery and even when your phone is turned off, it still sends a signal to the cell tower that it has entered the appropriate cell. This is called billing, and with the help of billing, you can determine the location of a cell phone with an accuracy of 3 meters in Moscow.
Naturally, somewhere in the Tundra, everything is much more complicated, but nevertheless. Therefore, now everything is moving to a new digital level, and the secret services are adopting all the technologies that humanity has. In addition, do not forget that, for example, in Moscow there are more than 250 thousand cameras in all courtyards and streets, on all roads.
If we look at our ally China, there are more than a million of them in Beijing. But we will talk about how things are in China a little later. Naturally, it is impossible to process such a huge amount of information without neural networks. Even basic cameras that stand on the street have already learned to recognize the face of citizens. And they went even further.
Even a face in a mask can already be recognized. All this is done by a neural network. It is specially trained. Without this, it is no longer possible to cope. There is no individual operative officer sitting and watching, checking something there. In no case. All this is done by the program. The operative officer only needs to enter the criteria of what he needs. A specific person or a specific area.
And then filter what the program has knocked out. That is, first the program finds everything it needs, then the operative officer double-checks it, if he understands that there was no error, and there are fewer and fewer errors, he begins to work with it. Of course, all these operational-search materials can be legalized in court. This is exactly what they do when they investigate criminal cases, bring the results of operational-search activities to court and legalize them in the part that is possible and necessary for the investigation.
Not all of them, as I have already said. As for SORM, in 2015 the UN Geneva Convention recognized this program as violating human rights. Apparently, they forgot that they had a prism, which Snowdov spoke about in 2013.
Naturally, with this approach, everyone spat on the UN decision. Another way is cyber surveillance, that is, checking your mail, e-mail, how you communicate on the Internet and how you use instant messengers. Looking ahead, I want to say that no secure instant messengers exist. Understand one simple thing. If any messenger works on the territory of the country, then there is access to it.
How did he get it? Question three. Voluntarily surrendered, kidnapped, tortured, or connected, or infiltrated, it doesn't matter. If the FSB does not have access to the messenger, it does not work on the territory of the Russian Federation. This was the case with BlackBerry. Such a phone, which had its own encryption protocol, is quite complex, and since BlackBerry did not provide decryption keys, these phones did not work here.
But as for this particular company, in 2020 it ceased to exist. Enlightened Europe also did not like the fact that BlackBerry did not provide decryption keys. I would like to dwell separately on Telegram. The encryption protocol that Pavel Durov is proud of is really good enough.
But not as much as the founder promotes it. This is the MTP-rota protocol. It only works in secret chats. Your regular chats and conversations are very easy to hack and extract information from them. And only secret chats have final encryption. This encryption system works on the client-client method, according to which the content of the message will be correctly perceived by the recipients only with the help of the sender.
It turns out that your chat exists only between you and your interlocutor. This is the main problem. The chat exists between you and the person you wrote to. It is not enough to destroy it yourself, you also need to destroy it from the person you wrote to, and destroy it in the cloud storage. And according to the Yarovaya law, all storages are located in the Russian Federation, and law enforcement agencies have access to them.
That's all. All the same applies to WhatsApp, Viber, Signal. A very funny story happened with WhatsApp in general. The richest man in the world was hacked, and his secret correspondence leaked there from WhatsApp. Some will say, then I will change my account. The FSB has a special program, also impossible to dispel, comrade major calls it a joke.
It identifies people by their patterns, correspondence patterns. It's like handwriting, and it won't be difficult to identify you if you write from different All this became possible thanks, among other things, to the pioneers in the implementation of neural networks ISK-NDS - an analytical system for monitoring tax collection, which began to be implemented back in 2000.
Now it's in its third generation. This neural network allows you to track various gray and criminal tax evasion schemes, based on its successes, the successes of its implementation, and began to implement the same approximate algorithms, the same neural networks in STORMs, and approximately the same programmers are doing this, who, for a second, are employees of the Federal Security Service.
It is on their servers that all this is stored. And about how else the tax authorities monitor us, what this can threaten, I talk about in my free webinar. Link in the description. Changing SIM cards is also not an option. The fact is that they monitor a unique phone number, and not just your phone number.
Moreover, of course, there is already voice recognition and so on and so forth. And all this is to say that it has become more and more difficult to do dark deeds.
How to protect yourself from surveillance?
Are there any ways to protect yourself from this? Yes? To completely abandon all the benefits of civilization. Electronic ones, I mean. Live somewhere in the taiga. Preferably, where there is a dense forest. So that you cannot be seen from a satellite. And somewhere deeper, so that no quadcopter with a thermal imager can observe you either.
Something like that. That is why terrorist organizations are very fond of the caves of Afghanistan, a hard-to-reach area where there is nothing, no electricity, no water, no gadgets. This is already due to the category of utopia. Of course, if a person lives an ordinary life, he has nothing to piss himself about. Any technology is a double-edged sword.
They bring both an ease of life and serious restrictions, restrictions of your freedom.
The state knows everything about us.
Of course, we already need to get used to the fact that the state knows everything about us - where we went, when we left, when we returned. Take at least an ordinary entrance to a Moscow apartment building. Starting in 2018, when we hosted the World Cup, all entrances to all apartment buildings in Moscow were equipped with special cameras.
These cameras recognize the faces of everyone who enters and leaves. They didn’t ask us about this, they just took and installed them. All entrances, all buildings in Moscow. This program is called “Safe City”. It has now been implemented in all million-plus cities.
Rostec is implementing it together with the FSB. Quite serious funding is allocated for this. This includes not only courtyards, but also roads, interchanges, train stations, airports, etc. This system not only helps fight crime, but also respond to emergency situations. There are pros and cons, but, of course, it can be used and is used to find out as much information about a specific citizen as possible, if law enforcement agencies need it.
Using "bugs".
And finally, the last method that I want to tell you about today is banal bugs, listening devices. As old as the world, as I already said, nothing changes, sometimes in a carpet, sometimes in a samovar. Bugs have now reached a completely different technological level, they have become very, very tiny, they do not need a constant power source, they can be activated from a distance, that is, the bug lies, does not beep, does not work.
It is impossible to detect it, because it is nothing until it is powered. And at the right moment it turns on on command. Or it is powered by electromagnetic fields from all those electronics, from all those electrical networks that are, for example, in the house.
This is the most banal and the most common method. You don't need to listen in on anything, you don't need, as was the case in one of the criminal cases, to raise a quadcopter, call the criminal on the phone to see what PIN code he enters. This has happened too. Just place bugs in the places where conversations take place. Often this is a car, an apartment and an office.
Everything is very simple. And you don't need to be clever, you don't need to go to any operator, ask for something there. You just sit and listen. And, unfortunately, not only law enforcement agencies take advantage of this. Be vigilant, especially if you have a successful business and suddenly a conflict with one of the partners. At the same time, do not forget that the tax service does this too, but not itself.
The on-site tax audit must include two employees of the Economic Security Department and the PC of the former Economic Security Department. Exactly so that they could, within the framework of the law on police and operational-search activities, conduct operational-search activities in relation to tax persons of interest, conducting a tax audit.
Be very careful if you have an on-site tax audit. What else should you do if a tax audit has begun? How to behave during interrogation? How to work with self-employed individual entrepreneurs safely? I tell you in my articles.
How to behave so as not to arouse suspicion?
At the same time, know that if you do not leave a so-called digital trace, This, on the contrary, only increases suspicion.
As I always say, you need to be moderate, you need to show moderate activity on social networks, in correspondence, and not disappear from there forever. This only arouses more interest in you on the part of law enforcement agencies. There is a certain, I repeat, a certain average picture, which the neural network is trained to, how a hypothetical citizen-entrepreneur should behave, if he has no evil intentions.
It is with this template, with this pattern, that everything is compared. In a nutshell, this is how SORM works. Well, and a little about how everything is arranged.
How is everything arranged?
The Lavabit mail service was very popular in the 2000s. And everything was fine, and people used secure mailboxes. The service was considered one of the most secure on the Internet. But one fine day, on August 8, 2013, the service completely closed. Without warning or announcements. Just closed. Users lost all their secure correspondence, with no chance of getting it back. All the letters ended up in the CIA. And it all happened because of the data that Edward gave to Snowd. This is how Enlightened Democracy responded to the threat from Edward Solovyov: it simply withdrew the entire mail service.
Black market.
Curtain. Of course, against the backdrop of such unprecedented collection of personal data, the black market for trading in this personal data has flourished. This is the flip side of technological progress. We, as citizens, are no longer a mystery to our state.
Wiretapping.
As for wiretapping phones, even when they do not work through a microphone, I also remember the old belief when laptop cameras were taped over, all this took place. It is not so difficult to write a malicious program that can activate both the microphone and the camera from a distance. It is more difficult to plant this malicious program, but there are also ways.
I am not even talking about Alice and Marusya, as they say, the comment is superfluous.
What awaits us?
Well, what awaits us? It seems that there is no point in hiding, everyone will find out, it is not so simple. The array of data that currently exists and is being processed is still very difficult to process even with the software methods that exist. And, of course, very often everything simply does not reach, is not detected.
This is still only at the very beginning. But this will naturally be refined. Its network will be trained. More and more data will be processed. For example, in China, in Beijing, with a population of 22 million, there are more than a million cameras that recognize a person by their face. But still, there is one city in China that is a testing ground for such research.
This is the city of Guian. There, with a population of 5 million people, there are half a million cameras, twice as many as in the capital, Beijing. It is there, as many analysts think, that China is working out new algorithms for training neural networks for face recognition, gait recognition, gender and even nationality. And a register of all those people who fall into the field of view of these cameras is maintained.
If suddenly a person is not in the register, they are dealt with separately and very closely, even despite the fact that he is a foreigner. At the same time, it should be understood that back in 2005, our law enforcement agencies concluded an agreement on the exchange of information between the Chinese and Russian special services. Judging by what is happening now, this will only get stronger, and we will go down the path of even greater control by the state.
But I will repeat once again, if you are an ordinary citizen, an honest entrepreneur, then you have absolutely nothing to fear. Yes, a narrow circle of specialists will find out about your life if you fall into their field of vision. If you fall into their field of vision, and they start asking you some questions and calling you somewhere so that you answer their questions, you need to immediately contact a lawyer.
These are all the basic rules of life in this wonderful world of the future.