FORGET ABOUT 1984-WELLCOME TO 2014: Christopher Soghoian: ON PRIVATE COMPANIES SELLING HACKING TECHNOLOGY THAT ALLOWS REMOTE SURVELLANCE OF LAPTOPS, DESTOPS AND CELLPHONE CAMERAS, MICROPHONES AND COMPUTER ACTIVITIES.
Filed under: 1984, Christopher Soghoian, LAPTOPS-DESTOPS -CELLPHONE-CAMERAS-MICRPHONES-COMPUTER ACTIVITIES, PRIVATE COMPANIES SELLING HACKING TECHNOLOGY, REMOTE SURVELLANCE, Uncategorized, WELLCOME TO 2014
HOW LONG WILL IT BEFORE ANYONE WILL HAVE COMERCIALLY AVAILABE HACKING TECHNOLOGY TO SPY ON ANYONE OR EVERYONE UNDETECTECTED?
Hacking technology is available not only to governments and government agencies but also state, county and city governments. It is a only a matter of time before the technology is available to private individuals and groups if it is not already. Thus your cellphone microphone can be turned on with out you knowing it as well as your lap top and desktop microphones and video cameras. This is in addition to the tracking and downloading of all internet activities. This stealth technology is undetectable to the average person or company and often to more sophisticated users. This raises the question of competitors, wives, husbands, neighbors, ex-boyfriends or girlfriends or officious persons and groups obtaining commercially available hacking technology for illegal surveillance activities. While Mr. Soghoian doesn’t speak of the private use of commercially developed hacking technology this is an obvious step. Some employers may find it de rigueur or make consent as a condition of employment, while in other transactions individuals may be forced to give up their privacy rights just as on many occasions they have to now consent to arbitration before a dispute arises as a matter of course as is the case the telephone company.
“Privacy researcher Christopher Soghoian sees the landscape of government surveillance shifting beneath our feet, as an industry grows to support monitoring programs. Through private companies, he says, governments are buying technology with the capacity to break into computers, steal documents and monitor activity — without detection. This TED Fellow gives an unsettling look at what’s to come.” TED TALKS.