Quote:
Originally Posted by serial
Rather than have to find the evil doers, its so much easier if they can "buy" a targetted "campaign" with Phorm. They pick the keywords to be analysed, set up a few channels, then anyone with a profile that causes concern they get a warrant and pull their complete history from the ISP.
|
That is the kind of function creep we will read about in times ahead of us if these evil scums manage to get their feet under the table.
I'm sure others here have considered that Phormscum and NebuBad will be on their bestest behaviour at the moment. The early stages require them to try and slip in under the radar as quietly as possible. They are looking not to raise too much awareness about their infiltration and hopefully not setoff any tripwires (failed already). The aim of the exercise is to creep into the networks with a minimum of fuss and to wave potentially huge wads of cash at their creedy nieve host ISPs bases. They buy off the outer defense perimeter with gifts and promises of great benefits (i.e. buy off the likes of Simon Davies with paid work that will tie his hands, buy off gullible politicians and critical journalist with PR psychology and hospitality sweetners). They do under the table deals with authority, government officials and regulators.
Eventually when Kent Ertugrul has done his best PR psychology lying work and splashed a bit of cash around the hope is that the insidious spying network has got a green light to be installed across the board and all the paperwork has been rubber stamped (we can see that the HomeOffice and Police have already tacitly colluded with BT/Phormscum in allowing this). The next stage is to catch as many victims in the spy-net as possible and this will be achieved through public apathy, public misunderstanding, campaigns of deception in collusion with national media outlets doing their hardest to look the other way, and a process of osmosis.
Eventually once the hard struggle of slowly strangling the opposition has been effective they (Phormscum/NebuBad types) can move up a gear and start altering the system in unopposed way 'we' fear would eventually happen. This is when the dark forces in government will start to look for a bit of payback for helping these filths to get their shiity system through the door in the first place.
If you need an example of how these kind of things are done just go back 15 years and imagine what kind of things were thought up with regards surveillance everywhere. Now we have it 'ALL' ... CCTV, License plate recognition cameras, DNA databases, ID databases (early days) and all the laws and paperwork to harmonise the complete system. So if you don't understand or don't believe in mission creep you only have to look at the evidence of what has been happening regarding this technology abuse over the years. Now add Phorm spying via ISPs, the system is ripe for this kind of abuse to go ahead relatively unchallenged.
Start learning about PGP, Secure Private Networks, SSL/TLS and start telling your friends and family about it too.
Note: Regarding creeping into the networks and what this actually looks like from a analogy point of view - David Attenborough did a fantastic natural history series about "The Private Life of Plants" in one of the episodes Attenborough covered the parasites of the plant world. The Borneo Stranger Fig (a member of the vine family) is a brilliant example of Phormscum on British networks. The Stranger Fig sends out tiny tendrils to search out its victims. Once a victim is found (a healthy tree) the tendril shoots up the tree and thickens out, eventually the Stranger Fig totally embraces the tree with its vine and strangles the tree to death, by this time the Fig is so massive and has put down so many of its own roots that when the dead tree within collapses the Stranger Fig has the structure to stand alone without support. And the life cycle process continues as the Stanger Fig network of vines strangles all the victims in the forest.
http://en.wikipedia.org/wiki/Strangler_fig [ wiki LINK ]
images of the Phorm parasite Stranger Fig network [ Google image LINKS ]