Judging by the targets of REGIN as it has been dubbed, demonstrates quite clearly that the surveillance apparatus has NOTHING whatsoever to do with counter terrorism and everything to do with industrial/commercial espionage on a grand scale. ( counter terrorism probably being just a smokescreen). the timing is interestng as well since in the UK Theresa may in the UK has made big play of using tracking methodoligies in order to locate and disrupt the activities of people deemed to have been ( or are being) "radicalised". it is known from past events that this level of surveillance has been and is used against. for example. journalists conducting their legitimate business ( this particularly has a knock on effect for investigative journalists who rely on confidentiality to find information that is clearly in the public interest. ) to go a little off topic lets consider the definition of liberalization. at its most extreme it is a process whereby an individual or group of individuals undergoes a shift in their beleifs and transitions to plotting, planning and ultimately executing violent acts in support of their views, on the other hand redicaziation can , in its most benign form refers to a radical shift in viewpoints that is contrary to government thinking and policy but leads to reasoned argument and protest as a consequence.. Of course no one in their right mind would object to measures designed to curb violent conduct in all its forms but their is a growing concern i think that theese massive surveilance measures are in danger of being used for potentially heinous reasons like rounding up minority groups because they are not "economically viable". what's the betting that, in the not too distant future it will be quite possible to intercept the electrical impulses from an individuals brain. decode those impulses and then extract the individuals thought processes in human readable form in real time. ( it has already been demonstrated that images can be captured from the occipital lobe of the brain and viewed on a screen ). ATB Shaun On 25/11/2014 18:34, doug wrote: > > > Hi Aftermath & Coderman, > > I read the report by Symantec on the url you gave. It is a very > impressive piece of software. Quite amazing really. If this is the > sort of standard the state security sector has developed to, then one > can see why there is such concern throughout the world wide security > and intelligence industries, particularly in those private sectors and > corporations which are NOT involved in state security. How does one > conduct a business these days, if not only one's computers, but > private and corporate networks are being taken over "p0wned I think > the phrase is) by the NSA and other state intelligence and security > organisations. How does a finance officer or a chief executive > offier, or a board of directors keep business matters confidential > these days. It is bad enough having word of mouth in the boardroom, > having it swept for bugs, and stopping directors from having any > electronic equipment in the boardroom in attempting to get some kind > of confidentiality and security of company data, stratagems and so > on. Finance officers are going to find it increasing difficult to > present the financial states of their companies if there are no > controls put in place. The USA may be the most clever and most > sophisticated and spend the most resources in the field at the moment, > but other nation states are learning, particularly since Snowden > opened the back and front doors on the activities of the NSA. One can > see it all back firing on the USA any time soon. > > It is quite remarkable that Symantec has managed to find out so much > about this piece of software. Just goes to show, that no matter how > much the perpetrators try to keep it secret, it still comes out in the > end. > > One little query I have, which, hopefully you can help me with, is on > the question of triggers. I understand the concept, but how does this > help to conceal the malware within the software? > ATB > > On 24/11/14 02:29, Aftermath wrote: >> >> >> >> Regin: Top-tier espionage tool enables stealthy surveillance >> >> http://www.symantec.com/connect/blogs/regin-top-tier-espionage-tool-enables-stealthy-surveillance >> >> >> [pdf] >> http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/regin-analysis.pdf >> >> _______________________________________________ >> > > > -- *_PRIVACY IS A BASIC RIGHT - NOT A CONCESSION _* https://www.eff.org/deeplinks/2014/11/when-time-comes-we-need-be-ready-fight-tpps-secret-anti-user-agenda