監控與反監控技術的基本知識
監控與反監控技術的基本知識
一、過去監控以竊聽和跟蹤監視為主
現代監控技術開始於美國與蘇聯之間的冷戰。開始主要是政府用竊聽器,再結合電波傳遞信息。平時可能想不到的有這樣幾種可能的做法:第一、竊聽器可以小到象一個紐扣,可以放在不顯眼的地方。比如,放在一把螺絲刀的把手裡面。第二、可以不用換電池,長期使用。可能象現在新出的手機無線充電。第三、也可以不在目標附近放竊聽器,遠遠的用高靈敏度的儀器聽。人說話的時候,周圍的物體都會振動。特別是窗戶玻璃振動可以從很遠的地方發射人眼看不到的光,探測到振動,用儀器分析以後,就象耳朵貼在窗戶上聽一樣。另外,水管子,下水道管子,都會把聲音傳的很遠。
對於這些傳統的竊聽方式,可能採取的措施有:禮物中可能會有問題;可能被對方知道的地點都可能有問題。如果是自己家裡,首先要加厚窗帘,然後最簡單的辦法是加背景聲音,比如說,把電視聲音開大。
傳統的監控攝像比竊聽要難一些,主要是因為攝像頭必須能夠看到被監控目標。跟蹤拍照是傳統監視的主要手段。
二、當代手機和電腦是最常用監聽監視工具
最近二、三十年信息技術的發展,一方面,政府和大公司的收集個人信息能力大大加強,另一方面,技術門檻也越來越低。
在美國,有法律和輿論制約政府、企業和個人。在中國,中共一直在用多種技術手段對民眾進行監控。
電話公司會記錄通話時間、時長。一旦盯上一個人,可以錄下一個人的所有通話內容。也可以用電腦把電話聲音轉成文字,分析,再選出一小部分人工分析。
現在的電腦、智能手機和網路大大提高了對個人的監控能力。
原來困難的監視攝像頭現在聯上網路,安的到處都是。手機通話會廣播出去,用專門儀器,很容易竊聽。
智能手機隨身帶,通過導航(GPS),手機信號都可以定位。存放在手機上的信息,往往會有眾多的應用收集。
多數網站和手機應用,都會和廣告商合作,收集用戶信息。然後通過大數據分析,廣告商對一個人的了解程度,很多時候會超過他的親人甚至本人。然後結合通訊錄上的名單,和電話記錄,廣告商可以了解一個人的社交圈。對社交圈中的其他人,也可以推斷出很多信息。然後廣告商和服務商會推出更吸引人的服務,實際上也是加強了對人的控制,讓人越來越依賴於這些技術,越來越願意主動把自己個人和朋友的信息提供(泄露)出去。
在中國,這些廣告商、服務商都可能和中共合作、監控個人。所以購買電腦、手機,如能盡量避免中國的品牌、避免用國產軟體,可以幫助避免個人信息方便的落到中共手裡。手機上的應用軟體(APP),盡量少裝,因為這些應用往往會在安裝的時候,要求很多許可權。最常見的要求,如通訊錄、通話記錄、無線上網信息、GPS定位、話筒、攝像頭。然後這個應用軟體就可以利用做監聽、監視了。在這場迫害中,作為法輪功學員,通訊軟體和服務也要避免用國產的。
三、國外軟體並非絕對安全
美國的軟體產品情況要複雜一些。大企業收集個人信息會有加密處理,然後一般會存在美國的機器上,受到美國法律的保護和監管。這些信息中共很難拿到。但是,也不是絕對安全。比如,這些年出現的一些特例,都是美國公司和中國公司合作,或者把伺服器放在中國,或者是在中國有分部,然後借口要符合當地的法律,給中共提供用戶信息或都配合中共過濾信息。
受到媒體關注的事件有:
SKYPE通過中國公司出特製版本。雅虎中國向中共提供異見人士信息。谷歌中國曾經在中國提供搜尋服務,會過濾搜尋結果。谷歌新聞從中國訪問,也會過濾結果。蘋果公司下架VPN軟體。蘋果公司把中國用戶放在iCloud上的信息轉到中國內地的伺服器,也就是說,中共的執法部門可以去索要伺服器上的任何個人信息。谷歌正在進行「蜻蜓計畫」,想再次推出過濾版(中國版)的搜尋應用。
現在知道的大公司都是既不想失去現有用戶的信任,又想迎合中共來換取進入中國市場,採取的做法都是把針對中國的業務分離出來,把相關的伺服器和工作人員放在中國,和其公司在海外的主體業務切割開來。
所以如果知道使用的服務是美國大公司針對多數用戶提供的,一般性的使用是可以信任的。但是更敏感和機密的事情還是不能保證這些公司的員工不會看。
四、使用VPN翻牆也非絕對安全
所有的VPN服務商都可以看到用戶網路地址和要訪問的網站。國內的服務商,都可能會把這些信息交給中共。
五、網上身份信息難保安全
身份信息一旦上網後就很難保證信息安全。不但會被各家收集、廣為流傳,而且還可能被用於冒名欺詐。
網上欺詐、電話欺詐的最主要方式就是假冒他人。如果是電話,不僅能夠看到來電號碼,還能聽到對方的聲音,以此確認通話對像,要好得多。但是,面對中共用一個政府的力量來對付個人,即使面對面看到,也不能保證原來的朋友現在不是在被脅迫做事。網上只憑用戶名和文字,那就很容易出現被冒名的情況。
English Version: https://en.minghui.org/html/articles/2018/12/25/173757.html
Overview of Phone and Internet Surveillance
December 25, 2018
(Minghui.org) The Chinese communist regime has used many methods to persecute Falun Gong practitioners, including hate propaganda and violence. Most importantly it is quite active in bugging phones, cellular phone tracking, and video surveillance.
For example, after banners with the words 「Falun Dafa is good」 were found in January 2017 in Harbin City, Heilongjiang Province, police tracked down practitioners by using video surveillance, phone tapping, location tracking, and vehicle monitoring. This led to the arrests of at least five practitioners, four of whom were illegally sentenced to prison several months ago.
It is important to understand some basic information concerning surveillance and counter surveillance.
Conventional Surveillance
The modern surveillance technology got its start during the cold war several decades ago. Government agencies collected information through detectaphones, which transmitted information through electronic waves. Several methods were used to make such devices undetectable.
The first one was a small, button-sized device which was easy to conceal, and could easily fit into a screwdriver handle. Second, the device had an extended battery life, so it could be used for a long time. It could also be made to resemble a common wireless cellphone charger. Third, instead of placing a detectaphone in proximity of the target, a highly-sensitive device could be used from far away. This is possible because, as one speaks, the surroundings, including windows, vibrate in certain ways reflecting the sounds within. Once such signals are collected and analyzed, they could be played back as if you were placing your ear against the window to listen. Water and sewer pipes can also send sound waves over long distances and can be used for serveillance.
There are several ways to deal with these methods. Examples include being cautious about receiving gifts from suspect people, being careful in locations that are already known to suspect people. One way to prevent home surveillance is to have heavy window curtains; another is to have background noise such as television audio.
Videotaping in conventional ways is more challenging because a video camera needs to be aimed at the target. Following and taking photos or videos are also options used for surveillance.
Cellphones and Computers
With the development of information technology over the past 20 or 30 years, government agencies and large companies have developed more powerful tools to collect personal information. At the same time, the technology required to achieve this has become increasingly accessible.
Governments, companies, and individuals often refrain from abusing these tools outside of China, because of laws and public opinion. However, these technologies are widely exploited by the communist regime to suppress people in China.
Telephone company records include phone numbers, call times, and length of conversations. Once a target is identified, all the conversations can be converted to text through software, followed by filtering, and analysis by a human.
Contemporary computers, smart phones, and Internet have simplified tracking down individuals. Video recording devices are now seen in many places, and cellular phone conversations can be easily obtained through backdoor software, transmitted remotely, then analyzed.
Since many people keep a cell phone on hand at all times, the GPS function allows surveillance operatives to locate this person. Numerous apps may also collect information from phones and send it to remote servers.
Many websites and cell phone application vendors cooperate with advertising agencies to collect user information. Through powerful information analysis, the advertising agencies may know more about a person than family members or even the person him-or-herself. When combined with contact lists and phone records, the advertising agency can construct a social profile of this individual, and based on this, generate more information. Many apps may seem user friendly, but their convenience may indicate that much information about a person and their circle of friends is collected without notice.
Inside China, these advertising agencies and vendors can profile individuals for the Communist Party. It is thus better to avoid computers or cell phones made in China, and even software developed in China. The surveillance potential can be minimized if phone users install fewer apps, as many apps request permission to access one』s contact list, phone log, wifi information, GPS location, microphone, and camera. These tools can enable the cell phone or computer to be used as a powerful surveillance device.
Therefore, due to the persecution we recommend that Falun Gong practitioners avoid communication software or services provided from China.
Software Outside China
Software provided from elsewhere, including the United States, is somewhat different. The information is often encrypted and stored in the U.S., where it is subject to protection and regulation by relevant laws. Generally, the Chinese government has no access to such information, but there are exceptions. In some incidents during the past years, some American companies have cooperated with Chinese firms, and store information for some users on servers in China. In the name of complying with Chinese laws, these business partners in China may provide related information to the communist regime.
Such cases have been reported by the news media. For example, Skype produced a special version for China, Yahoo China provided information on dissidents to the communist regime, Google used to filter search results when it had operations in China, Apple removed some VPN apps from its App Store, and it stored Chinese users' iCloud information on servers in China. Therefore, law enforcement agencies in China could request information for these individuals. To make things worse, Google has been reportedly developing a search engine tailored for China in a project named Dragonfly.
Large companies usually do not want to lose current customers. Meanwhile, they want to make profits in the Chinese market. As a compromise, they may separate services in China from core businesses overseas, but it cannot guarantee confidentiality, nor can it be guaranteed that highly-sensitive information is not being leaked.
VPN Tools
Many VPN tools are available both inside and outside of China. Since the VPN vendors have stored the IP addresses and sites users visit, information collected inside China is vulnerable because it could be turned over to the communist regime upon request.
Fraudulence and Identity Theft
Once a person's information is online, it may be collected by many parties and shared among them. It could make people victims of fraudulent activities and identity theft.
Many types of fraudulent activities and identity theft are common. Relatively speaking, fraudulent phone activities are easier to identify since it involves both a phone number and voice. But inside China, under its totalitarian communist regime, people may be forced to do things against their will when under pressure. Fraudulent activities on the Internet, however, are much more common and one should be even more careful in this arena.
轉載自明慧網
原文標題:監控與反監控技術的基本知識 - 美博園
美博園文章均為「原創 - 首發」,請尊重辛勞撰寫,轉載請以上面完整鏈接註明來源!
軟體著作權歸原作者!個別轉載文,本站會註明為轉載。
這裡是你留言評論的地方
