Top Banner
1 JURIDIQUE Anonymous et légalité
16

VoX anonymous ENGLISH

Mar 19, 2016

Download

Documents

vox mag

Extract of french VoX about INDECT
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: VoX anonymous ENGLISH

1

JURIDIQUE Anonymous et légalité

Page 2: VoX anonymous ENGLISH

2

Page 3: VoX anonymous ENGLISH

3

EDITORIAL

This is a short excerpt from vox (https://voxlemag.wordpress.com/2012/09/25/vox-3-sortie/) translated into English. It seemed important to convey informa-tion about INDECT, which is why we chose this article and not another. The number 3 Vox, in French, also con-tains other topics on the monitoring at work, opmexico, monitoring in general and the risks according to the Anons actions (DDoS, defaces, etc ...) If you are interested in relaying one of these themes, to translate us or verify proper translation if your mother tongue is English, please contact us on irc.anonops.com/6697 #vox or # op-towerofbabel. Thank you in advance! This translation is a first test, it is possi-ble that errors have crept. We apologize in advance, do not hesitate to report anything that might seem strange!

VoX is a free magazine distribution and unofficial. Unoffi-cial, for the simple reason that it does not exist and does not exist or discourse Anonymous officials. Do not be fooled by the title, VoX is not the voice of Anonymous, it does not exist. We do not claim any legitimacy. VoX is one of many key ranges that make up the choir. The role that we have given is to present our numbers over these different voices. We try to work seriously, but not take too seriously. We believe that laughter, humor and self-deprecation are fundamental to the spirit of Anonymous, and more generally to the spirit of the Internet. The team members are volunteers, do not benefit from some natures whatsoever in the preparation of this ma-gazine. Members do not all say Anonymous, but we share to preserve anonymity, as we give ourselves the duty to protect those of others. As Anonymous, VoX is apolitical, we deny that the maga-zine is exploited in a partisan perspective. We can condemn political action, but never on behalf of a party or an ideology. VoX calls upon all people of goodwill to join the team, but we require a minimum of skills to give the best to our readers. We also invite you to debate, criticize. To do this, you can find us on the chan # vox on Anonops (IRC).

About VoX

Page 4: VoX anonymous ENGLISH

DOSSIER Surveillance INDECT, TRAPWIRE et BigBrother

4

INDECT INDECT (Intelligent information system supporting observation, searching and detection for the security of citizens in urban environment) is a project initia-ted by the European Union on which several private companies and acade-mic institutions work since 2009 . INDECT was designed to cross databa-ses from government files, Internet, existing or planned surveillance sys-tems (cameras, microphones, drones) to track "non-normal" behaviors captu-red by the IRL system (In Real Life) as-sociated to the data that the system can access (criminal records or any sen-sitive data about a person, that the sys-tem can find on the net and that looks "strange" to him). That will be identi-fied and reported in order to prevent potential crimes before they occur. If until now we have talked about ca-meras and how quickly the images are humanly analyzed (including video-discrimination), we now discuss about how INDECT automatizes the way these images are processed and its correla-tion analysis with other sensitive data. INDECT is therefore related to an artifi-cial intelligence that would be able to distinguish normal from abnormal be-havior. An intelligence based on the traces left by the individual on the In-ternet ...

from : http://www.indect-project.eu/

Étape 1

Étape 2 et 3

The Big Bug Brother

Page 5: VoX anonymous ENGLISH

DOSSIER Surveillance INDECT, TRAPWIRE et BigBrother

5

Origins of INDECT And his father, FP7

The actual birth of INDECT may lie with the Prüm Treaty of 2005: it is a cross-border co-operation treaty for the fight against terror-ism, cross border crime and illegal migration. France, like many other European countries (Belgium, Germany, Luxembourg, Nether-lands, Austria, Spain), will sign this treaty that will allow: - Cooperation with other countries for per-sonal and non-personal data and exchanges, information on vehicles ... - Police cooperation in air transport - Cooperation at major events: demonstra-tions, riots ... One can recognize several issues that will be dealt later with INDECT.

In 2006, the European Council authorizes FP7 (Seventh Framework Program), a multidisciplinary research program, which covers many activities, including the future INDECT. His total budget reaches 54.6 billion Eros, 1.35 billion will be spent on security.

1 350 000 000 EUROS

= 931 034 SMIC

(economic growth interprofesional minimum salary)

( 1450 euros monthly )

= 77 586 years of SMIC

Page 6: VoX anonymous ENGLISH

DOSSIER Surveillance INDECT, TRAPWIRE et BigBrother

6

- Biosciences and nanotechnologies: Generate new knowledge on interface phe-nomena and phenomena related to the size, integration of technologies at the nano-scale, including surveillance and detection ... - Aerospace: Protection of aircrafts and passengers; im-proved measures to protect travelers, crew, aircraft and air transportation system, includ-ing improved methods of data collection and identification ... - About Space: Development of systems and techniques for in situ and satellite surveillance and quick alerts, including the safety of citizens in the management of the environment and secu-rity, and integration of these systems and components located on the ground or boarded on ships or aircrafts... Satellite communication services, continu-ously integrated in to the global elec-tronic communications networks, used by individuals and businesses, and in sectors like civil protection, e-government, telemedicine, remote education operations, search and res-cue operations, tourism and leisure, personal navigation, fleet management, agriculture and forestry, meteorology and generic users. - Regarding security: Allow optimal and concerted use of available technologies to the benefit of civil European security, to stimulate the cooperation be-tween civil security solutions providers and users in order to strengthen the competitive-ness of the European security industry ...

- Security activities: Citizens: production of technological solutions for civil protection, including biosecurity and protection against crime and terrorism threats. Infrastructures and public services: analyze and secure infrastructures, systems and ser-vices and/or established networks, public and/or private, existing and to come. Intelligent surveillance and border security: focusing on technologies and capabilities to enhance the effectiveness and performance of all systems, equipment, tools, processes and methods for quick identification needed to strengthen European border security and land coastal, particularly in terms of monitoring and border surveillance. - Cross-cutting themes: Integration, interconnectivity and interopera-bility of security systems: Intelligence gather-ing and civil security, focus on technologies to improve the interoperability between sys-tems, equipment, services, processes and rapid identification necessary to improve European border and land coastal security, including information provided by forces that operate in the fight against fire, civil defense and medical issues ... Security and society: research directed to-wards the achievement of socio-economics analyzes, build-in scenarios ... structured and coordinated research in secu-rity field: coordination of European research and international security, development of synergies between the research in the fields of civil protection, defense and security, improvement of legal environment and en-couragement for the optimal use of existing infrastructures.

under FP7 Planned reseach

Page 7: VoX anonymous ENGLISH

DOSSIER Surveillance INDECT, TRAPWIRE et BigBrother

7

In 2008 Marco Malacarne, then head of the research and devel-opment in security unit within the Directorate General for En-terprise and Industry of the European Commission recalls that the priority of the frame-work program is security re-search , which is a new ap-proach. "If the main objective of the research in this area is to ensure the safety and well-being of citi-

zens, while fully respecting the civil liberties and privacy, European industry is involved in a large number of technological developments and innovations in this sector. " The security aspect of FP7 is to develop the technologies and knowledge that will allow us to build the needed mediums to ensure the safety of citizens facing threats such as terror-ism, natural disasters, and crime. FP7 should allow optimal and concerted use of available technologies to the benefit of civil European security.

On 1 January 2009, the Indect pro-ject officially starts. It will end in 2013. Meanwhile, the Polish police has already left the project saying that finally, there was enough means at their disposal for monitoring. An ethics commission has found nothing to complain about INDECT and even if they say otherwise, IN-DECT has all ready been tested on non-volunteers: Anons Polish Indect Task Force have seen that append during the European Championships football this year.

“Specific requirements regard

confidentiality must be re-

spected, without affecting the

transparency of research results.” Marco Malacarne

Ma

rco M

ala

ca

rne

Page 8: VoX anonymous ENGLISH

DOSSIER Surveillance INDECT, TRAPWIRE et BigBrother

8

How INDECT Imagine a gigantic fisherman's net, whose strings are connected by nodes: is somehow a representation of the IN-DECT system , if we ignore the nature of the nodes, which are sometimes physi-cal (a drone, a camera is considered a physical node). The string is the net-work and its ability to communicate be-tween nodes, data transfer or storage. At the end of the net, there are users who control the system by requesting data, controlling certain nodes. Users also feed the data collection, then, police may for example, send the data they collect on the selected spot, so it they can be correlated with other data col-lected by the system. The network is by nature, of various kinds : wired or wireless, all relays are good for Indect to connect, even Blue-tooth.

works

INDECT

Intelligent

Monitoring for

Threat Detection

Threat Detection in

Computer Networks

(Internet)

Data Protection and

Privacy Protection

? ? ? ?

from : http://www.indect-project.eu/

Page 9: VoX anonymous ENGLISH

DOSSIER Surveillance INDECT, TRAPWIRE et BigBrother

9

PHYSICAL NODES

Gathering of information to feed the system INDECT and the request of it's users is total, unlike the current surveillance systems which usually use camera images and sometimes are coupled with, for example, registration plates recognition software. To capture information IRL, this is what indect has planned: - Drones (UAV, Unmanned Aerial Vehicle) for air and mobile surveillance. - GPS / GSM tracing devices that will be able to plot the position of a vehicle and report its position. Autonomous, they will control the UAV and obtain information from the system. - mobile Tracing devices moving in a grid array. This is a small device used to track ob-jects. It must be designed to enable its small size and a long operation time without charg-ing the battery. Optionally, the unit can be equipped with a GPS receiver to obtain more precise information on the location of the object. It will be used on the police. - Cameras. - Microphones that will initiate an alert when they will pick: glass noises, screams, fights or insults.

Page 10: VoX anonymous ENGLISH

DOSSIER Surveillance INDECT, TRAPWIRE et BigBrother

10

DATA GATHERING ON THE INTERNET

We can already see the power of intel collection IRL that INDECT offers, which is already unique in its way to gather and analyze data, and in its total aspect: visual, audio, police live data, police data-base. Everything is connected. But what is even more unusual is that IRL's data and police data can be crossed with all the information about the sus-pect that the system will find on the Internet... Here is a sample of the methods that INDECT uses on the Internet to find your identity or guiltiness - Automatic Content Extraction (ACE): This system uses various sources such as news, comments ... allowing to create relationship between involved persons. - Knowledge Base Population (KBP): This system will focus on persons identification, organization, geopolitical entity, rent, social, geographical or political environment, vehicles and weapons. It will be based on the collection of information on on line databases (eg Wikipedia). - NetFlix: analysis of video database. - WEPS-2: Analysis of web pages, information ex-traction according to 18 predefined criteria (names, attributes, date of birth, relationship ...). - Analysis of chat-rooms.

INDECT Will look in all :

Web pages

Blogs

Forums

News

Chats

Comments

Vidéos

(analyzing dialo-

gues )

Social networks

Usenet […]

Page 11: VoX anonymous ENGLISH

JURIDIQUE Anonymous et légalité

Page 12: VoX anonymous ENGLISH

DOSSIER Surveillance INDECT, TRAPWIRE et BigBrother

12

NON-NORMAL BEHAVIOR ACCORDING

TO INDECT

Before developing this question, we need to keep in mind that INDECT will cross its data with, for example, a "troll" message posted on a blog, praising the deceased Bin Laden, but making you a villain worthy of interest, whatever your true opinions are. Same for your pro-file, will interest INDECT especially if you per-form the actions shown on page 31. We deduce that we will not have to be lazy, dis-tracted, hesitating and dreamy. It is better to stay sharp and not be nervous. One Should not gather outside and be noisy. The street, INDECT, belongs only to pedestrians, literally those who walk without wander, but however not to speedy. Any event will, therefore, be suspect.

Example of alert INDECT will trigger the event "burglary" after noticing those behaviors in the same individual: loitering in front of a door, touching the entry door handle, look through the windows, playing with the lock, several go and come-back to the door. It is pretty close to the event "car theft" : wandering around the car, touching the handle of the car, looking inside the car, playing with the lock.

Pussy riots

Page 13: VoX anonymous ENGLISH

JURIDIQUE Anonymous et légalité

Page 14: VoX anonymous ENGLISH

DOSSIER Surveillance INDECT, TRAPWIRE et BigBrother

14

INDECT claims to defend privacy by implementing a certain kind of protections such as digi-tal marking on images to track them if they leak on YouTube, for example, to find the villain who exposes to public monitoring images supposed to be confidential. INDECT according to its designers would be a shield against human weaknesses and video discrimination that focuses not on reasonably criminal targets, but on the stereotypes of criminals (young, black etc..). INDECT, cold reasonable machine, would spot the real offenders through its rational discrimination: its analysis of abnormal behavior coupled with nasty information found on the Internet and police databases.

Everything you say on the Internet will be monitored and suspected

Any message, comment, or video that you will post on the web will be analyzed to measure your level of abnormality, your capacity to be a villain. Furthermore the Indect analysis sys-tems will detect your relationships with other villains. If you build websites or blogs, they will be scrutinized and all the information revealing your locating or your identity will be be dissected. You better not have a little pro-vocative speech or play troll. You also better not be curious and have fun at extremist web pages to find out what is being said. You better not investigate awkward web pages. Because all these examples will make you a suspect in the eyes of INDECT and trigger increased sur-veillance. Let's consider these examples: you are a jolly fellow who likes to test the reactions of his comrade on the web by launching speech worthy of a neo-Nazi. You analyze each per-spective in all the details and you search in web pages on the opposite of your beliefs as, say, religious extremists.

You are a student in psychology and for your memoir, you make a very difficult study Immersion on pedophile forums , you are a sociologist and try to understand how the individual becomes a terrorist. Say you have one of these roles. The next time you would borrow the car of your girlfriend, you will not be able to open the door, because, like an idiot, you try with your keys and so you turn-back running to get the right keys. you will be targeted by INDECT who will alert police

Internet users

will lose their

freedom.

What will change with INDECT

Page 15: VoX anonymous ENGLISH

DOSSIER Surveillance INDECT, TRAPWIRE et BigBrother

15

Unification, centralization of the means of surveillance

If today monitoring is disparate, localized, separated from other monitoring centers and only re-united in the context of specific investigations, INDECT will allow to unify all monitoring means (video, audio, database) and therefore to track persons wherever they are, including the Internet. Total, the system is terrifying in that aspect that it will never allow peace to suspected preys , prey that may very well be you, as innocent as you would be. The introduction of UAVs and their aerial surveillance, barrier-free, transforms the indected territory in to a larger surveillance plot. Be nor-mal in all circumstances, walk straight in the right direction, do not shout, do not fall, be aware of your messages on the internet, do not write any non-sense on your blogs because any quirk can turn against you. In silence, without you noticing, as the world seems to be the same as yesterday, IN-DECT will track you and judge your behavior. Do not be fancy or original, do not have personality and stand out walking in the wrong direction. Do not wander the streets or be lost in the city, be-have as INDECT wants you to behave. Say goodbye to your freedom.

What if ...

The above scenarios are not the worst. If INDECT claims itself to secure its own system, what would happen if one of our beautiful European countries had to change and become a totalitarian state. Or if INDECT was like, Qosmos, sold to dicta-torships? It would become a tool of population control per-manently used to track any opinion or attitude against the power, or who knows, survey any lack of attention to the rules of religious extremists. With such a system, people would not have even the slight-est second of freedom, no op-portunity to raise up ... INDECT, once completed, will be sold. To anyone. This ex-treme scenario of INDECT in the hands of dictatorships is not an awful fantasy. This is a very likely probability.

Qosmos Wednesday, July 25, 2012, the League of Human Rights (LDH) and the International Federation of Human Rights (FIDH) filled a lawsuit against Qosmos, a French cybersecurity company for selling its products to the Syrian regime. Qosmos software per-mitted the regime to identify and therefore to stop (and proba-bly torture and kill) Syrian rebels. The case of a French com-pany that sells its services to dictatorships is not isolated, and it joined the scandalous case of Amesys company who sold sup-plies and tools for monitoring the Qaddafi regime. The Qosmos case had already made some noise since its initial public offering and informal links with countries not very well seen. Qosmos looks like this on his official website: "Qosmos pro-vides network intelligence technology that identifies and ana-lyzes real-time data flowing over networks," One can under-stand reading this that Qosmos develops software used to identify a user and trace its activities. This is a tragic example of the use of mass surveillance systems and making us believe that it was designed for our own safety (we mean in this case the current development of INDECT). That is to be said, security is double-edged monitoring devices designed by highly sophisticated private companies to protect population are used to control or enslavement and oppression in countries such as Syria.

Page 16: VoX anonymous ENGLISH

JURIDIQUE Anonymous et légalité

16