Jump to content

How do they know what we sent online


5936
 Share

Recommended Posts

How do they know what we transmit through electronic medias such as email, sms, blogs?

 

Did ah kong go through every transactions,

 

Are there lots of people going through what we discussed? Such as putting

 

What are the limits of what we can say and stay within safe-zone?

 

To know their modus operandi and play within limits to avoid being caught.

 

 

↡ Advertisement
Link to post
Share on other sites

Neutral Newbie

Well, technically, is it even possible for them to tap into the emails, SMS servers etc? (That would require warrants I believe.)

It is possible if they are tapping into the exchange nodes unless encrypted or scrambled... Correct me if I'm wrong though.

 

Or if we are high-tech enough, keywords would be picked out by exchange servers/nodes for possible monitoring.

 

My 2 cents.. =)

Link to post
Share on other sites

Supercharged

SPF has a dedicated IT specialist team who monitors blogs, internets, forums 24/7......

 

and they can track all IP addresses.......... they showcased it publicly recently coz of terrorists threats

Link to post
Share on other sites

SPF has a dedicated IT specialist team who monitors blogs, internets, forums 24/7......

 

and they can track all IP addresses.......... they showcased it publicly recently coz of terrorists threats

 

 

Police Intelligence Department aka Intel.

Link to post
Share on other sites

I think it's the key words scanning.

As long as you use use metaphor from today onwards it should be safe.

 

They are watching more intensely from now onwards as the YOG is over and the next big thing should be the erection ceremony.

May the YOG flame burn tall and bright.

I love my country!

Link to post
Share on other sites

Supercharged

oh yes they can.......

 

yr MSNs and SMS are never secure..... even your own company can see yr MSNs if you use office PCs to chat

Link to post
Share on other sites

Yes they can monitor. Even China being such a large country with so many internet users, the authorities can keep watch. Google "free tibet" or "dalai lama" returns 0 (ZERO) results [laugh] [laugh] [laugh] So I think they do it with key-words. Still it is not fool-proof. Users in china have developed their own code-words and use these to discuss controversial events without alerting the censors and watchers.

 

When you post anything, always do it with the assumption that someone is watching. You'll be safe if you keep to simple rules, don't libel or defame others, etc.

Edited by Sosaria
Link to post
Share on other sites

There is another method called steganography which you can hide messages or attachments in images to exchange between parties.

Steganography works by hidding the information (which can be encrypted) within pixels and there are tens of thousands of images added to the web daily, if spf or any agencies can detect these, I take my hats off them.

 

The facebook guy made a stupid mistake on his part by displaying his photograph and name.

By filtering it and getting more info from ICA, they can compare the name and photo easily. No escape liao.

And to visit his workplace, CPF has his workplace details.

 

On the other hand, ask them to track down bicycle thieves or car scratcher, do you think they'll have such efficiency?

 

Link to post
Share on other sites

but what of emails, SMSes, MSN chats etc?

 

They can't freely tap into those lines of communication right? :blink:

 

They can if they want by placing filters over at the ISP side.

They won't track all packets unless something of interest attracts them.

In just a minute, a few hundred megabytes of data can be captured. Who on earth would have the time to shift through each and every of them.

 

When shifting through my company's daily server logs, we just filter those that are of interest and ignore the rest. Reading these filtered logs can take hours already.

 

 

Link to post
Share on other sites

Neutral Newbie

I think all our teleconv by hp are recorded or goes through some recording software.

 

I saw a documentary on the Mumbai attack on cable..

 

Surprisingly they were able to play back the actual bad guys communication during the attack, how they were planning amongst themselves during the actual attack.

 

 

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
 Share

×
×
  • Create New...