Skip to comments.The Surveillance Catalog - Where governments get their tools
Posted on 11/21/2011 1:09:54 AM PST by LibWhacker
Documents obtained by The Wall Street Journal open a rare window into a new global market for the off-the-shelf surveillance technology that has arisen in the decade since the terrorist attacks of Sept. 11, 2001.
The techniques described in the trove of 200-plus marketing documents include hacking tools that enable governments to break into peoples computers and cellphones, and "massive intercept" gear that can gather all Internet communications in a country.
The documentsthe highlights of which are cataloged and searchable here...[snip]
(Excerpt) Read more at projects.wsj.com ...
I’ve seen one of those 8 or 9 years ago. I pulled it out of a junk mail bin at an apartment complex. I held on to it for a month and then gave it to my 15 year-old nephew. He’s been working at a local credit union for the last five years or so.
IPHONE and IPads; is there software to exponge trojan malware, etc from operating system?
Don’t need it. Apple’s walled garden approach means it pretty much can’t get in.
More, you can do a restore that wipes the device in minutes and recovers from the pristine Apple system image and downloaded app backups the device makes to your computer or iCloud.