VoX anonymous ENGLISH

Page 1

JURIDIQUE Anonymous et légalité

1


2


EDITORIAL

This is a short excerpt from vox (https:// voxlemag.wordpress.com/2012/09/25/ vox-3-sortie/) translated into English. It seemed important to convey information about INDECT, which is why we chose this article and not another. The number 3 Vox, in French, also contains other topics on the monitoring at work, opmexico, monitoring in general and the risks according to the Anons actions (DDoS, defaces, etc ...) If you are interested in relaying one of these themes, to translate us or verify proper translation if your mother tongue is English, please contact us on irc.anonops.com/6697 #vox or # optowerofbabel. Thank you in advance! This translation is a first test, it is possible that errors have crept. We apologize in advance, do not hesitate to report anything that might seem strange!

ďƒ˘ About VoX VoX is a free magazine distribution and unofficial. Unofficial, for the simple reason that it does not exist and does not exist or discourse Anonymous officials. Do not be fooled by the title, VoX is not the voice of Anonymous, it does not exist. We do not claim any legitimacy. VoX is one of many key ranges that make up the choir. The role that we have given is to present our numbers over these different voices. We try to work seriously, but not take too seriously. We believe that laughter, humor and selfdeprecation are fundamental to the spirit of Anonymous, and more generally to the spirit of the Internet. The team members are volunteers, do not benefit from some natures whatsoever in the preparation of this magazine. Members do not all say Anonymous, but we share to preserve anonymity, as we give ourselves the duty to protect those of others. As Anonymous, VoX is apolitical, we deny that the magazine is exploited in a partisan perspective. We can condemn political action, but never on behalf of a party or an ideology. VoX calls upon all people of goodwill to join the team, but we require a minimum of skills to give the best to our readers. We also invite you to debate, criticize. To do this, you can find us on the chan # vox on Anonops (IRC). 3


DOSSIER Surveillance INDECT, TRAPWIRE et BigBrother

INDECT

The Big Bug Brother

INDECT (Intelligent information system supporting observation, searching and detection for the security of citizens in urban environment) is a project initiated by the European Union on which several private companies and academic institutions work since 2009 . INDECT was designed to cross databases from government files, Internet, existing or planned surveillance systems (cameras, microphones, drones) to track "non-normal" behaviors captured by the IRL system (In Real Life) associated to the data that the system can access (criminal records or any sensitive data about a person, that the system can find on the net and that looks "strange" to him). That will be identified and reported in order to prevent potential crimes before they occur.

from : http://www.indect-project.eu/

Étape 1

If until now we have talked about cameras and how quickly the images are humanly analyzed (including videodiscrimination), we now discuss about how INDECT automatizes the way these images are processed and its correlation analysis with other sensitive data. INDECT is therefore related to an artificial intelligence that would be able to distinguish normal from abnormal behavior. An intelligence based on the traces left by the individual on the Internet ...

Étape 2 et 3 4


DOSSIER Surveillance INDECT, TRAPWIRE et BigBrother

Origins of INDECT And his father, FP7

The actual birth of INDECT may lie with the Pr端m Treaty of 2005: it is a cross-border cooperation treaty for the fight against terrorism, cross border crime and illegal migration. France, like many other European countries (Belgium, Germany, Luxembourg, Netherlands, Austria, Spain), will sign this treaty that will allow: - Cooperation with other countries for personal and non-personal data and exchanges, information on vehicles ... - Police cooperation in air transport - Cooperation at major events: demonstrations, riots ... One can recognize several issues that will be dealt later with INDECT.

In 2006, the European Council authorizes FP7 (Seventh Framework Program), a multidisciplinary research program, which covers many activities, including the future INDECT. His total budget reaches 54.6 billion Eros, 1.35 billion will be spent on security.

1 350 000 000 EUROS

= 931 034 SMIC (economic growth interprofesional minimum salary)

( 1450 euros

monthly )

= 77 586 years of SMIC 5


DOSSIER Surveillance INDECT, TRAPWIRE et BigBrother

Planned reseachunder FP7 - Biosciences and nanotechnologies: Generate new knowledge on interface phenomena and phenomena related to the size, integration of technologies at the nanoscale, including surveillance and detection ...

- Security activities: Citizens: production of technological solutions for civil protection, including biosecurity and protection against crime and terrorism threats.

- Aerospace: Protection of aircrafts and passengers; improved measures to protect travelers, crew, aircraft and air transportation system, including improved methods of data collection and identification ...

Infrastructures and public services: analyze and secure infrastructures, systems and services and/or established networks, public and/ or private, existing and to come.

- About Space: Development of systems and techniques for in situ and satellite surveillance and quick alerts, including the safety of citizens in the management of the environment and security, and integration of these systems and components located on the ground or boarded on ships or aircrafts... Satellite communication services, continuously integrated in to the global electronic communications networks, used by individuals and businesses, and in sectors like civil protection, e-government, telemedicine, remote education operations, search and rescue operations, tourism and leisure, personal navigation, fleet management, agriculture and forestry, meteorology and generic users. - Regarding security: Allow optimal and concerted use of available technologies to the benefit of civil European security, to stimulate the cooperation between civil security solutions providers and users in order to strengthen the competitiveness of the European security industry ...

6

Intelligent surveillance and border security: focusing on technologies and capabilities to enhance the effectiveness and performance of all systems, equipment, tools, processes and methods for quick identification needed to strengthen European border security and land coastal, particularly in terms of monitoring and border surveillance. - Cross-cutting themes: Integration, interconnectivity and interoperability of security systems: Intelligence gathering and civil security, focus on technologies to improve the interoperability between systems, equipment, services, processes and rapid identification necessary to improve European border and land coastal security, including information provided by forces that operate in the fight against fire, civil defense and medical issues ... Security and society: research directed towards the achievement of socio-economics analyzes, build-in scenarios ... structured and coordinated research in security field: coordination of European research and international security, development of synergies between the research in the fields of civil protection, defense and security, improvement of legal environment and encouragement for the optimal use of existing infrastructures.


DOSSIER Surveillance INDECT, TRAPWIRE et BigBrother

Marco Malacarne

In 2008 Marco Malacarne, then head of the research and development in security unit within the Directorate General for Enterprise and Industry of the European Commission recalls that the priority of the framework program is security research , which is a new approach. "If the main objective of the research in this area is to ensure the safety and well-being of citizens, while fully respecting the civil liberties and privacy, European industry is involved in a large number of technological developments and innovations in this sector. " The security aspect of FP7 is to develop the technologies and knowledge that will allow us to build the needed mediums to ensure the safety of citizens facing threats such as terrorism, natural disasters, and crime. FP7 should allow optimal and concerted use of available technologies to the benefit of civil European security.

“Specific requirements regard confidentiality must be respected, without affecting the transparency of research results.� Marco Malacarne On 1 January 2009, the Indect project officially starts. It will end in 2013. Meanwhile, the Polish police has already left the project saying that finally, there was enough means at their disposal for monitoring. An ethics commission has found nothing to complain about INDECT and even if they say otherwise, INDECT has all ready been tested on non-volunteers: Anons Polish Indect Task Force have seen that append during the European Championships football this year. 7


DOSSIER Surveillance INDECT, TRAPWIRE et BigBrother

How INDECT works

Imagine a gigantic fisherman's net, whose strings are connected by nodes: is somehow a representation of the INDECT system , if we ignore the nature of the nodes, which are sometimes physical (a drone, a camera is considered a physical node). The string is the network and its ability to communicate between nodes, data transfer or storage. At the end of the net, there are users who control the system by requesting data, controlling certain nodes. Users also feed the data collection, then, police may for example, send the data they collect on the selected spot, so it they can be correlated with other data collected by the system. The network is by nature, of various kinds : wired or wireless, all relays are good for Indect to connect, even Bluetooth.

8

INDECT Intelligent Monitoring for Threat Detection

? ?

Threat Detection in Computer Networks (Internet)

Data Protection and Privacy Protection

?

from : http://www.indect-project.eu/

?


DOSSIER Surveillance INDECT, TRAPWIRE et BigBrother

ď‚˜PHYSICAL NODES

Gathering of information to feed the system INDECT and the request of it's users is total, unlike the current surveillance systems which usually use camera images and sometimes are coupled with, for example, registration plates recognition software. To capture information IRL, this is what indect has planned: - Drones (UAV, Unmanned Aerial Vehicle) for air and mobile surveillance. - GPS / GSM tracing devices that will be able to plot the position of a vehicle and report its position. Autonomous, they will control the UAV and obtain information from the system. - mobile Tracing devices moving in a grid array. This is a small device used to track objects. It must be designed to enable its small size and a long operation time without charging the battery. Optionally, the unit can be equipped with a GPS receiver to obtain more precise information on the location of the object. It will be used on the police. - Cameras. - Microphones that will initiate an alert when they will pick: glass noises, screams, fights or insults. 9


DOSSIER Surveillance INDECT, TRAPWIRE et BigBrother

DATA GATHERING ON THE INTERNET

We can already see the power of intel collection IRL that INDECT offers, which is already unique in its way to gather and analyze data, and in its total aspect: visual, audio, police live data, police database. Everything is connected. But what is even more unusual is that IRL's data and police data can be crossed with all the information about the suspect that the system will find on the Internet... Here is a sample of the methods that INDECT uses on the Internet to find your identity or guiltiness - Automatic Content Extraction (ACE): This system uses various sources such as news, comments ... allowing to create relationship between involved persons. - Knowledge Base Population (KBP): This system will focus on persons identification, organization, geopolitical entity, rent, social, geographical or political environment, vehicles and weapons. It will be based on the collection of information on on line databases (eg Wikipedia). - NetFlix: analysis of video database. - WEPS-2: Analysis of web pages, information extraction according to 18 predefined criteria (names, attributes, date of birth, relationship ...). - Analysis of chat-rooms.

10

INDECT Will look in all :

Web pages Blogs Forums News Chats Comments Vidéos (analyzing dialogues ) Social networks Usenet […]


JURIDIQUE Anonymous et légalité


DOSSIER Surveillance INDECT, TRAPWIRE et BigBrother

ď‚˜NON-NORMAL BEHAVIOR ACCORDING

TO INDECT

Pussy riots Before developing this question, we need to keep in mind that INDECT will cross its data with, for example, a "troll" message posted on a blog, praising the deceased Bin Laden, but making you a villain worthy of interest, whatever your true opinions are. Same for your profile, will interest INDECT especially if you perform the actions shown on page 31. Example of alert We deduce that we will not have to be lazy, distracted, hesitating and dreamy. It is better to stay sharp and not be nervous. One Should not gather outside and be noisy. The street, INDECT, belongs only to pedestrians, literally those who walk without wander, but however not to speedy. Any event will, therefore, be suspect.

12

INDECT will trigger the event "burglary" after noticing those behaviors in the same individual: loitering in front of a door, touching the entry door handle, look through the windows, playing with the lock, several go and come-back to the door. It is pretty close to the event "car theft" : wandering around the car, touching the handle of the car, looking inside the car, playing with the lock.


JURIDIQUE Anonymous et légalité


DOSSIER Surveillance INDECT, TRAPWIRE et BigBrother

What will change with INDECT INDECT claims to defend privacy by implementing a certain kind of protections such as digital marking on images to track them if they leak on YouTube, for example, to find the villain who exposes to public monitoring images supposed to be confidential. INDECT according to its designers would be a shield against human weaknesses and video discrimination that focuses not on reasonably criminal targets, but on the stereotypes of criminals (young, black etc..). INDECT, cold reasonable machine, would spot the real offenders through its rational discrimination: its analysis of abnormal behavior coupled with nasty information found on the Internet and police databases.

ď ľEverything you say on the Internet will be monitored and suspected Any message, comment, or video that you will post on the web will be analyzed to measure your level of abnormality, your capacity to be a villain. Furthermore the Indect analysis systems will detect your relationships with other villains. If you build websites or blogs, they will be scrutinized and all the information revealing your locating or your identity will be be dissected. You better not have a little provocative speech or play troll. You also better not be curious and have fun at extremist web pages to find out what is being said. You better not investigate awkward web pages. Because all these examples will make you a suspect in the eyes of INDECT and trigger increased surveillance. Let's consider these examples: you are a jolly fellow who likes to test the reactions of his comrade on the web by launching speech worthy of a neo-Nazi. You analyze each perspective in all the details and you search in web pages on the opposite of your beliefs as, say, religious extremists.

14

You are a student in psychology and for your memoir, you make a very difficult study Immersion on pedophile forums , you are a sociologist and try to understand how the individual becomes a terrorist. Say you have one of these roles. The next time you would borrow the car of your girlfriend, you will not be able to open the door, because, like an idiot, you try with your keys and so you turn-back running to get the right keys. you will be targeted by INDECT who will alert police

Internet users will lose their freedom.


DOSSIER Surveillance INDECT, TRAPWIRE et BigBrother

ď ľUnification, centralization of the means of surveillance If today monitoring is disparate, localized, separated from other monitoring centers and only reunited in the context of specific investigations, INDECT will allow to unify all monitoring means (video, audio, database) and therefore to track persons wherever they are, including the Internet. Total, the system is terrifying in that aspect that it will never allow peace to suspected preys , prey that may very well be you, as innocent as you would be. The introduction of UAVs and their aerial surveillance, barrier-free, transforms the indected territory in to a larger surveillance plot. Be normal in all circumstances, walk straight in the right direction, do not shout, do not fall, be aware of your messages on the internet, do not write any non-sense on your blogs because any quirk can turn against you. In silence, without you noticing, as the world seems to be the same as yesterday, INDECT will track you and judge your behavior. Do not be fancy or original, do not have personality and stand out walking in the wrong direction. Do not wander the streets or be lost in the city, behave as INDECT wants you to behave. Say goodbye to your freedom.

ď ľWhat if ... The above scenarios are not the worst. If INDECT claims itself to secure its own system, what would happen if one of our beautiful European countries had to change and become a totalitarian state. Or if INDECT was like, Qosmos, sold to dictatorships? It would become a tool of population control permanently used to track any opinion or attitude against the power, or who knows, survey any lack of attention to the rules of religious extremists. With such a system, people would not have even the slightest second of freedom, no opportunity to raise up ... INDECT, once completed, will be sold. To anyone. This extreme scenario of INDECT in the hands of dictatorships is not an awful fantasy. This is a very likely probability.

Qosmos Wednesday, July 25, 2012, the League of Human Rights (LDH) and the International Federation of Human Rights (FIDH) filled a lawsuit against Qosmos, a French cybersecurity company for selling its products to the Syrian regime. Qosmos software permitted the regime to identify and therefore to stop (and probably torture and kill) Syrian rebels. The case of a French company that sells its services to dictatorships is not isolated, and it joined the scandalous case of Amesys company who sold supplies and tools for monitoring the Qaddafi regime. The Qosmos case had already made some noise since its initial public offering and informal links with countries not very well seen. Qosmos looks like this on his official website: "Qosmos provides network intelligence technology that identifies and analyzes real-time data flowing over networks," One can understand reading this that Qosmos develops software used to identify a user and trace its activities. This is a tragic example of the use of mass surveillance systems and making us believe that it was designed for our own safety (we mean in this case the current development of INDECT). That is to be said, security is double-edged monitoring devices designed by highly sophisticated private companies to protect population are used to control or enslavement and oppression in countries such as Syria.

15


JURIDIQUE Anonymous et légalité

16


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.