I’ve read a really nice article about the current and future voice recognition technology and how it serves and it will serve the Intelligence Agencies to work on their objectives: GO TO THE ARTICLE ON DEFENSEONE.COM
I was remembering about the summer 2013. It was middle June, right after the first Edward Snowden’s revelations about the massive surveillance activity of NSA against alleys but also the same US citizens she has to protect. In these days there was really some kind of revolution, all the media were involved in the World biggest disclosure about control technologies and, in reaction to this pacific revolution, we have gained knowledge and safety. Government infrastructures are more safe, citizen computing is more safe, cryptography is spread as never before but what about now?
This question is “old like the World”, we use to say in my Country. How can we trust of a secrecy protocol or implementation that the worldwide community can’t study, test and modify? Who may assure us that the rules of the game are clear and there’s a full respect of them?
When we are going to use a closed encryption protocol or implementation for our communications we can only trust on the service. It’s like telling a secret to our best friend: we choose someone we trust and we tell him our secret but, in fact, who knows if he will respect our privacy. Maybe our best friend may approach his cousin and say: “Hey, can you keep a secret?” and obviously the answer is “Yes!”.
It’s a technology fact: virtual peripherals controls hardware peripherals in the virtual domain size.
Once a system is connected to the Internet, the virtual domain assumes the dimensions of the Internet: worldwide.
Your screen, your webcam, your microphone, your input methods, your disks… practically each part of your computer/smartphone/device is controllable by the Internet.
Sometimes these features are enabled by the owner, other times by pirates attacking the system of the victim with a malware and least but not last, standing to Snowden revelations, even Governmental interception systems has the capability of activate a data stream from you computer.
Remote Control System (RCS) is a suite from the Italian company Hacking Team that provides all the functionalities that governmental interception needs. RCS, like softwares as FinFisher, is likely to provide a scalable, os-wide, spyware infrastructure.
Also the commercial of RCS Galileo claims that it is able to do really amazing things. Take a look at the commercial that follows