SlideShare a Scribd company logo
1 of 32
STATE SPONSORED
WARRANTLESS
WIRETAPPING AND
GOVERNMENT MASS
SURVEILLANCE OVER
THE LAWFUL
INTERCEPTION
THE BIGGEST CYBER HAWK
AND PRYING EYES THREATS TO THE
WORLD
Wake up Neo… The Matrix has you… Follow the white rabbit…
Knock, Knock, Neo… (Matrix, 1999)
Dr.Sameera
@SriLanka
01
This webinar is merely compiled on the basis of factual information/data that accumulated evidence available in the public domain of the Internet sources and
every evidence is strictly accepted in the academic world. Author or any such author affiliated entity/individual hold no responsibility for anything stated in this
webinar. This statement deemed official and final to the public domain. [Dr. Sameera [22 September 2018
]]:
Howdy Everybody.
Dr.Sameera
@SriLankaWarning.
NOW LET’S KICK SOME SERIOUS
THINGS, THEN AGAIN TEDIOUS
THEORIES IN THE COLD-WAR ERA WITH
THE FOURTH DIMENSIONAL EYE.
Anti-Sleep Disclaimer
02
Dr.Sameera
@SriLanka
03
CONTENT
2
Backdoor Explained ina Nutshell - What Are those and how it isoperate ?
3
LawfulBackdooring and Unlawful Backdooring -What and Where Those Implants ?
4
Interception or Eavesdropping or Wiretapping - What Are Those ?
1
Spying/Espionage inDigital and Cyber-Era - What are those weirdowording?
Dr.Sameera
@SriLanka
04
CONTENT (Contd…)
6
What is LawfulInterception or Judicial Interception ?
7
State Sponsored Warrantless Wiretapping, What is it?
8
Surveillance or Mass Surveillance or Cyveillance ?
5
Isthe interception legal or illegal ?Formal Justification.
Dr.Sameera
@SriLanka
05
CONTENT (Contd…)
0
Military Intelligence and Cyber-Intel Command & Control Explained.9
What is Top-Secret Cyber-Hawk and Eagle-Eye Covert Operation ?
Dr.Sameera
@SriLanka
06
Spying/Espionage in Digital and Cyber-Era.
What are those weirdo wording ?
INTRODUCTION
Dr.Sameera
@SriLanka
07
Introduction.
Espionage or Spying, is the action of gaining clandestine (classified) or confidential information
without the authorization of its owner. Undercover infiltrators assist secret-services and covert-
agencies to disclose top-secret information captured from numerous sources in the world. Any
individual or spy ring, in the service of a government, military, intelligence, privately held
company or self-governing operation could commit or launch an espionage campaign.
Dr.Sameera
@SriLanka
08
Backdoor Explained in a Nutshell.
What Are those and how it is operate ?
INTRODUCTION
Dr.Sameera
@SriLanka
09
Introduction.
Backdoor is a computer technique, frequently secret, of evading or bypassing standard
authentication or encrypted formation in a computer system, a device, or an embedded
device, etc. The Backdoor could hidden inside any digital device (especially hardware) or
software applications. There are numerous forms of backdoors, OS, Application,
Hardware, VM, Kernel, Network, Script-Code Level (as Shrink-Wrap Code), etc.
The Backdoor is also called a trapdoor. Backdoor mostly is an undocumented technique of
circumventing regular authentication or secured remote access to a computer system or a
device. In other words, it is an unlawful technique of gaining access to a software or
hardware, online service/system, or an entire computer system. The backdoor is written by
the coder who forms the code for the legitimate software. A backdoor is denoted as a
potential security risk by the professional world.
Dr.Sameera
@SriLanka
10
Lawful Backdooring and Unlawful Backdooring
What and Where Those Hardware Implants ?
INTRODUCTION
Dr.Sameera
@SriLanka
11
Introduction.
Hardware Backdoors or hardware implants are form of backdoors in hardware, such as covert or
stealth code inside hardware or firmware of computer chips. These backdoors may be straightly
implemented as hardware Trojan codes or hardware Rootkit codes in the Integrated Circuit (IC).
.
Hardware Implants are anticipated to challenge security in various Smartcards, sometimes several HSM
(Hardware Security Modules), Hardware Authentication Tokens, CD/DVD/BR Disks, USB Drives, TPM Chips,
various Microprocessors, and other Cryptoprocessors except exceptional investment is made in anti-backdoor
technology to design extraordinary methods for special military and intelligence (top-secret government)
operations in the world. The hardware implants have also been considered for automobile hacking Ex. Smart
Cars, Smart Tractors, etc.
Dr.Sameera
@SriLanka
12
Interception or Eavesdropping or Wiretapping.
What Are Those?
INTRODUCTION
Dr.Sameera
@SriLanka
13
Introduction.
Interception explained that an unauthorized individual or party has gained access to an
asset that is extremely significant. The outside party can be an individual, an entity, a
program, or a computing or clustered computer or networked system. Examples of this
type of failure are illicit copying of program or data files (data leaks or exfiltration.
Eavesdropping originates from the practice of standing under the roof space of a house,
listening to human conversations inside. Eavesdropping is the fulltime or partial time
unauthorized real-time interception of a private communication, such as a phone call
(analog or digital) including wired and wireless 2G/3G/4G or upcoming 5G, radio link
communication, Li-Fi (in the future), instant message, video-conference, wi-fi
communication, military communication, or fax transmission. Also, denoted as MiTM using
session hijacking attacks in computer security domain.
Wiretapping defined in the history perspective the wiretapping litigations have always had struggle in
balancing privacy rights under the human rights of individuals with the concerns of government, military,
intelligence, and law enforcement. Technically wiretapping is the stealthy electronic monitoring of telephone,
telegraph, cellular/mobile, fax or Internet-based communications.
Dr.Sameera
@SriLanka
14
Is the interception legal or illegal ?
Formal Justification
INTRODUCTION
Dr.Sameera
@SriLanka
15
Introduction.
Interception refers to the hearing or other forms of acquisition of the contents of any wire,
wireless, electronic, or oral communication over the use of any electronic, mechanical, or
other device.
Interception in legal manner is gaining communications network data or information from a
lawful authority for the determination of analysis or evidence or research. A
communications network data or information contain of signaling or network management
information or any other sensitive information. It also consist of the content of
communications. One of the rudiments for legal seizure is the interception of
telecommunications by law enforcement agencies, supervisory or directorial agencies,
secret military, and intelligence services.
Dr.Sameera
@SriLanka
16
What is Lawful Interception or Judicial Interception ?
INTRODUCTION
Dr.Sameera
@SriLanka
17
Introduction.
Lawful Interception denotes to the services in telecommunications and telephone
networks that permit intelligence, military, or law enforcement agencies with court order or
other legal permission to selectively wiretap individual subscribers. Most nation states
require certified telecommunications operators to deliver their networks with Legal
Interception gateways and nodes for the interception of communications. The end
interfaces of these gateways have been standardized by telecommunication
standardization organizations.
With the legacy or traditional public switched telephone network (PSTN), wireless (Wi-Fi),
packet switched networks, soft-switch technology, server-based applications, and cable
systems with modems, lawful interception was usually executed by gain access to the
mechanical or digital switches backup the targets’ communication.
Dr.Sameera
@SriLanka
18
State Sponsored Warrantless Wiretapping, What is it ?
INTRODUCTION
Dr.Sameera
@SriLanka
19
Introduction.
Warrantless Wiretapping is defined as a segment of the warrantless surveillance refers
to the surveillance of peoples within the specific region or the particular country, including
their own citizens, during the collection of theoretically foreign intelligence by the
intelligence agencies as section of the terrorist surveillance or counter-terrorism act of the
worldwide perception.
Several top-secret agencies were sanctioned to monitor, without obtaining a warrant from
the court, the phone calls, Internet or cyber-activity, text/sms messages, and other
communication connecting any party/individual alleged by the intelligence agencies to be
outside the particular state, even if the other end of the communication positioned within
their own state.
Dr.Sameera
@SriLanka
20
Surveillance or Mass Surveillance or Cyveillance ?
INTRODUCTION
Dr.Sameera
@SriLanka
21
Introduction.
Surveillance is defined in espionage (spying) and surveillance is the monitoring of
behavior, activities, actions, or other altering information for the determination of
manipulating, managing, guiding, or defending people. This consist of observation from a
remote location by means of electronic equipment or interception of phone calls or Internet
traffic as such electronically transmitted information. Surveillance is used by governments
and military organizations or mostly intelligence agencies for reconnaissance or gathering
intelligence, deterrence of crimes in a state.
Cyveillance is uniquely carried out throughout the form of Cyberspace perspective and the
notion derived from Cyber+Surveillance = Cyveillance. These forms of clandestine or covert
operations are now regularly launch by various authoritative governments, military forces,
and intelligence agencies in the whole world.
Mass Surveillance is the sophisticated surveillance of an entire or a considerable segment of a nation in
order to monitor that group of citizens. The surveillance is frequently carried out by local and federal
governments or governmental organizations. Then again, it may also be carried out by corporations or
defense contractors (either on behalf of governments or at their own initiative). Depending on each nation's
regulations and judicial aspects, the authority of and the permission required to engage in mass surveillance
diverges.
Dr.Sameera
@SriLanka
22
What is Top-Secret Cyber-Hawk and
Eagle-Eye Covert Operation ?
INTRODUCTION
Dr.Sameera
@SriLanka
23
Introduction.
EagleEye is an anti-terrorism initiative that teaches individuals how to identify and report possible
terrorist activity over the digital and cyber-media. The program provides a 24-hour hotline, allowing
information to be reported as soon as suspicious activity occurs. Reports are disseminated among
federal and local law agencies, as well as to commanders, in order to ensure appropriate action is
taken. These counter-actions will be taken by undisclosed top-secret organizations that is
established by the appropriate state with secret agents’ ring lead by previously arranged covert
operation.
CyberHawk is top-secret surveillance and counter-surveillance technique lead by the state shadow-
organization(s) and/or private defense contractors. The sole determination of this particular approach is to
safeguard the assets/buildings, VIP's, military or law enforcement, intel-squads, and more. Mostly by use of
UAV (Unmanned Aerial Vehicles) Inspector Drones or Military Drones (Nano Technology based invisible
Drones) listed in the covert/secret catalogue of state gear for Spying numerous assets and technologies such
as Phones, Internet Technological Assets, EME/EMP (Electro-Magnet Emittance or Pulse), Radio Frequency
(RF) based assets, Signaling assets over the SIGINT (Signal Intelligence) explained in Mass Surveillance.
Dr.Sameera
@SriLanka
24
Military Intelligence and Intel-Cyber
Command & Control (C&C) Explained
INTRODUCTION
Dr.Sameera
@SriLanka
25
Introduction.
Command-&-Control to pro-actively monitor critical-infrastructure or government
infrastructure, cyber or network operations over the espionage or usually called as spying in
real-time. The C&Cs are typically integrates and conducts full-spectrum cyberspace
operations, electronic or digital warfare, and secret information operations, confirming freedom
of action for friendly forces or homeland security in and over the cyber domain and the
information environment. Sometimes, it designated as the covert campaign of authority and
direction lead by a properly designated senior officer over assigned and attached forces in the
accomplishment of the top-secret mission. In an state, the president and the secretary of
defense keep the authority and the control of the armed military forces, intelligence, through
two distinct branches of the chain of command. The sole determination of the C&C is to
combat Botnets, DDoS/RDoS Attacks, APT/SSAPT Coordinated Attacks over the Sphere
Phishing Schemes, Spam, Malware, or Spyware/Trojan Attacks, Counter-Intelligence for FIS
(Foreign Intelligence Service), Hacker Attacks, Detect Traitors (Disgruntled Insiders) and
Whistleblowers, etc.
Military Intelligence is a covert military techniques that uses of accumulating top-secret information and
analysis tactics to offer guidance and direction to assist military/intelligence in their decisions to counter
numerous situations in-terms of national security. This objective is accomplished by offering an assessment of
data (massive data-mining) from numerous range of sources, engaged towards the authorities' mission
requirements or responding to questions as part of shadow-operational or covert-campaign preparation. To offer
analysis, the authority's information requirements are initially identified, which are then incorporated into covert-
intelligence collection, analysis, and dissemination or distribution.
Dr.Sameera
@SriLanka
26
Government Threats.
NORTH AMERICA
SOUTH AMERICA
SOUTH
AFRICA
ASIA
EUROPE
AUSTRALIA
RapidGrowthofGovernmentAttackswith
MILandINTEL
72%74%
34%
78%
88%
RUSSIA
72%
Dr.Sameera
@SriLanka
27
PoC
Evidence Demo Sources
Dr.Sameera
@SriLanka
28
EoP.
THAT’S ALL FOR TODAY
Dr.Sameera
@SriLanka
29
NOW TALK FOR FAQ.
WHAT
WHY
WHERE
WHEN
WHO
HOW
Dr.Sameera
@SriLankaContact.
@M: business@cyberintel.online
@P: +9471 247 7284
@BBM PIN: oo7r00t | 2BABA4EE
@WWW: https://www.cyberintel.online
t
v
in
Social Media
@Dr_Sam33ra
Dr.Sameera.De.Alwis
/ sameera-de-alwis-phd-dba-ence-ceh-chfi-gcih-iam-iem-gcfe-grem-5887349
Voice/Text + COM
30
Dr.Sameera
@SriLanka
THE END
THANK YOU VERY MUCH
… everything that has a beginning has an end …
[The Oracle @ The Matrix Revolutions, 2003]

More Related Content

What's hot

2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...Benjamin Ang
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking - Mark - Fullbright
 
Data Sheet_What Darktrace Finds
Data Sheet_What Darktrace FindsData Sheet_What Darktrace Finds
Data Sheet_What Darktrace FindsMelissa Lim
 
Cehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackingCehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackinganonymousrider
 
Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell GoodmanCloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodmanjonneiditz
 
Insights Into Modern Day Threat Protection
Insights Into Modern Day Threat ProtectionInsights Into Modern Day Threat Protection
Insights Into Modern Day Threat ProtectionAbhinav Biswas
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Alisha Deboer
 
Generic and efficient constructions of attribute based encryption with verifi...
Generic and efficient constructions of attribute based encryption with verifi...Generic and efficient constructions of attribute based encryption with verifi...
Generic and efficient constructions of attribute based encryption with verifi...LeMeniz Infotech
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Researchmarciahofmann
 
Cyber warfare an architecture for deterrence
Cyber warfare an architecture for deterrenceCyber warfare an architecture for deterrence
Cyber warfare an architecture for deterrenceBikrant Gautam
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999TomParker
 
3 f6 security
3 f6 security3 f6 security
3 f6 securityop205
 
2015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i32015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i3NTT Innovation Institute Inc.
 
Diginotar Hack - Black-tulip
Diginotar Hack  - Black-tulipDiginotar Hack  - Black-tulip
Diginotar Hack - Black-tulipTheMindSmith
 
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...Brian Bissett
 

What's hot (20)

2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
Data Sheet_What Darktrace Finds
Data Sheet_What Darktrace FindsData Sheet_What Darktrace Finds
Data Sheet_What Darktrace Finds
 
Cehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hackingCehv6 module 01 introduction to ethical hacking
Cehv6 module 01 introduction to ethical hacking
 
Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell GoodmanCloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodman
 
Insights Into Modern Day Threat Protection
Insights Into Modern Day Threat ProtectionInsights Into Modern Day Threat Protection
Insights Into Modern Day Threat Protection
 
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 
Generic and efficient constructions of attribute based encryption with verifi...
Generic and efficient constructions of attribute based encryption with verifi...Generic and efficient constructions of attribute based encryption with verifi...
Generic and efficient constructions of attribute based encryption with verifi...
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 
Cyber warfare an architecture for deterrence
Cyber warfare an architecture for deterrenceCyber warfare an architecture for deterrence
Cyber warfare an architecture for deterrence
 
Securty Issues from 1999
Securty Issues from 1999Securty Issues from 1999
Securty Issues from 1999
 
3 f6 security
3 f6 security3 f6 security
3 f6 security
 
2015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i32015 Global Threat Intelligence Report Executive Summary | NTT i3
2015 Global Threat Intelligence Report Executive Summary | NTT i3
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Diginotar Hack - Black-tulip
Diginotar Hack  - Black-tulipDiginotar Hack  - Black-tulip
Diginotar Hack - Black-tulip
 
Cyber of things 2.0
Cyber of things 2.0Cyber of things 2.0
Cyber of things 2.0
 
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
 

Similar to Government Mass Surveillance and Backdoor Threats

TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholderskevinwetzel
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverPJStarr
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism Accenture
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd Iaetsd
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
StuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuart Millar
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundohdbundo
 
Information Security
Information SecurityInformation Security
Information Securitysteffiann88
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdfAnupmaMunshi
 

Similar to Government Mass Surveillance and Backdoor Threats (20)

TSCM Overview for Stakeholders
TSCM Overview for StakeholdersTSCM Overview for Stakeholders
TSCM Overview for Stakeholders
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no cover
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
 
C018131821
C018131821C018131821
C018131821
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
StuartMillar_13616005_PIA
StuartMillar_13616005_PIAStuartMillar_13616005_PIA
StuartMillar_13616005_PIA
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
Information Security
Information SecurityInformation Security
Information Security
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
 

Recently uploaded

How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 

Recently uploaded (20)

How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 

Government Mass Surveillance and Backdoor Threats

  • 1. STATE SPONSORED WARRANTLESS WIRETAPPING AND GOVERNMENT MASS SURVEILLANCE OVER THE LAWFUL INTERCEPTION THE BIGGEST CYBER HAWK AND PRYING EYES THREATS TO THE WORLD Wake up Neo… The Matrix has you… Follow the white rabbit… Knock, Knock, Neo… (Matrix, 1999)
  • 2. Dr.Sameera @SriLanka 01 This webinar is merely compiled on the basis of factual information/data that accumulated evidence available in the public domain of the Internet sources and every evidence is strictly accepted in the academic world. Author or any such author affiliated entity/individual hold no responsibility for anything stated in this webinar. This statement deemed official and final to the public domain. [Dr. Sameera [22 September 2018 ]]: Howdy Everybody.
  • 3. Dr.Sameera @SriLankaWarning. NOW LET’S KICK SOME SERIOUS THINGS, THEN AGAIN TEDIOUS THEORIES IN THE COLD-WAR ERA WITH THE FOURTH DIMENSIONAL EYE. Anti-Sleep Disclaimer 02
  • 4. Dr.Sameera @SriLanka 03 CONTENT 2 Backdoor Explained ina Nutshell - What Are those and how it isoperate ? 3 LawfulBackdooring and Unlawful Backdooring -What and Where Those Implants ? 4 Interception or Eavesdropping or Wiretapping - What Are Those ? 1 Spying/Espionage inDigital and Cyber-Era - What are those weirdowording?
  • 5. Dr.Sameera @SriLanka 04 CONTENT (Contd…) 6 What is LawfulInterception or Judicial Interception ? 7 State Sponsored Warrantless Wiretapping, What is it? 8 Surveillance or Mass Surveillance or Cyveillance ? 5 Isthe interception legal or illegal ?Formal Justification.
  • 6. Dr.Sameera @SriLanka 05 CONTENT (Contd…) 0 Military Intelligence and Cyber-Intel Command & Control Explained.9 What is Top-Secret Cyber-Hawk and Eagle-Eye Covert Operation ?
  • 7. Dr.Sameera @SriLanka 06 Spying/Espionage in Digital and Cyber-Era. What are those weirdo wording ? INTRODUCTION
  • 8. Dr.Sameera @SriLanka 07 Introduction. Espionage or Spying, is the action of gaining clandestine (classified) or confidential information without the authorization of its owner. Undercover infiltrators assist secret-services and covert- agencies to disclose top-secret information captured from numerous sources in the world. Any individual or spy ring, in the service of a government, military, intelligence, privately held company or self-governing operation could commit or launch an espionage campaign.
  • 9. Dr.Sameera @SriLanka 08 Backdoor Explained in a Nutshell. What Are those and how it is operate ? INTRODUCTION
  • 10. Dr.Sameera @SriLanka 09 Introduction. Backdoor is a computer technique, frequently secret, of evading or bypassing standard authentication or encrypted formation in a computer system, a device, or an embedded device, etc. The Backdoor could hidden inside any digital device (especially hardware) or software applications. There are numerous forms of backdoors, OS, Application, Hardware, VM, Kernel, Network, Script-Code Level (as Shrink-Wrap Code), etc. The Backdoor is also called a trapdoor. Backdoor mostly is an undocumented technique of circumventing regular authentication or secured remote access to a computer system or a device. In other words, it is an unlawful technique of gaining access to a software or hardware, online service/system, or an entire computer system. The backdoor is written by the coder who forms the code for the legitimate software. A backdoor is denoted as a potential security risk by the professional world.
  • 11. Dr.Sameera @SriLanka 10 Lawful Backdooring and Unlawful Backdooring What and Where Those Hardware Implants ? INTRODUCTION
  • 12. Dr.Sameera @SriLanka 11 Introduction. Hardware Backdoors or hardware implants are form of backdoors in hardware, such as covert or stealth code inside hardware or firmware of computer chips. These backdoors may be straightly implemented as hardware Trojan codes or hardware Rootkit codes in the Integrated Circuit (IC). . Hardware Implants are anticipated to challenge security in various Smartcards, sometimes several HSM (Hardware Security Modules), Hardware Authentication Tokens, CD/DVD/BR Disks, USB Drives, TPM Chips, various Microprocessors, and other Cryptoprocessors except exceptional investment is made in anti-backdoor technology to design extraordinary methods for special military and intelligence (top-secret government) operations in the world. The hardware implants have also been considered for automobile hacking Ex. Smart Cars, Smart Tractors, etc.
  • 13. Dr.Sameera @SriLanka 12 Interception or Eavesdropping or Wiretapping. What Are Those? INTRODUCTION
  • 14. Dr.Sameera @SriLanka 13 Introduction. Interception explained that an unauthorized individual or party has gained access to an asset that is extremely significant. The outside party can be an individual, an entity, a program, or a computing or clustered computer or networked system. Examples of this type of failure are illicit copying of program or data files (data leaks or exfiltration. Eavesdropping originates from the practice of standing under the roof space of a house, listening to human conversations inside. Eavesdropping is the fulltime or partial time unauthorized real-time interception of a private communication, such as a phone call (analog or digital) including wired and wireless 2G/3G/4G or upcoming 5G, radio link communication, Li-Fi (in the future), instant message, video-conference, wi-fi communication, military communication, or fax transmission. Also, denoted as MiTM using session hijacking attacks in computer security domain. Wiretapping defined in the history perspective the wiretapping litigations have always had struggle in balancing privacy rights under the human rights of individuals with the concerns of government, military, intelligence, and law enforcement. Technically wiretapping is the stealthy electronic monitoring of telephone, telegraph, cellular/mobile, fax or Internet-based communications.
  • 15. Dr.Sameera @SriLanka 14 Is the interception legal or illegal ? Formal Justification INTRODUCTION
  • 16. Dr.Sameera @SriLanka 15 Introduction. Interception refers to the hearing or other forms of acquisition of the contents of any wire, wireless, electronic, or oral communication over the use of any electronic, mechanical, or other device. Interception in legal manner is gaining communications network data or information from a lawful authority for the determination of analysis or evidence or research. A communications network data or information contain of signaling or network management information or any other sensitive information. It also consist of the content of communications. One of the rudiments for legal seizure is the interception of telecommunications by law enforcement agencies, supervisory or directorial agencies, secret military, and intelligence services.
  • 17. Dr.Sameera @SriLanka 16 What is Lawful Interception or Judicial Interception ? INTRODUCTION
  • 18. Dr.Sameera @SriLanka 17 Introduction. Lawful Interception denotes to the services in telecommunications and telephone networks that permit intelligence, military, or law enforcement agencies with court order or other legal permission to selectively wiretap individual subscribers. Most nation states require certified telecommunications operators to deliver their networks with Legal Interception gateways and nodes for the interception of communications. The end interfaces of these gateways have been standardized by telecommunication standardization organizations. With the legacy or traditional public switched telephone network (PSTN), wireless (Wi-Fi), packet switched networks, soft-switch technology, server-based applications, and cable systems with modems, lawful interception was usually executed by gain access to the mechanical or digital switches backup the targets’ communication.
  • 19. Dr.Sameera @SriLanka 18 State Sponsored Warrantless Wiretapping, What is it ? INTRODUCTION
  • 20. Dr.Sameera @SriLanka 19 Introduction. Warrantless Wiretapping is defined as a segment of the warrantless surveillance refers to the surveillance of peoples within the specific region or the particular country, including their own citizens, during the collection of theoretically foreign intelligence by the intelligence agencies as section of the terrorist surveillance or counter-terrorism act of the worldwide perception. Several top-secret agencies were sanctioned to monitor, without obtaining a warrant from the court, the phone calls, Internet or cyber-activity, text/sms messages, and other communication connecting any party/individual alleged by the intelligence agencies to be outside the particular state, even if the other end of the communication positioned within their own state.
  • 21. Dr.Sameera @SriLanka 20 Surveillance or Mass Surveillance or Cyveillance ? INTRODUCTION
  • 22. Dr.Sameera @SriLanka 21 Introduction. Surveillance is defined in espionage (spying) and surveillance is the monitoring of behavior, activities, actions, or other altering information for the determination of manipulating, managing, guiding, or defending people. This consist of observation from a remote location by means of electronic equipment or interception of phone calls or Internet traffic as such electronically transmitted information. Surveillance is used by governments and military organizations or mostly intelligence agencies for reconnaissance or gathering intelligence, deterrence of crimes in a state. Cyveillance is uniquely carried out throughout the form of Cyberspace perspective and the notion derived from Cyber+Surveillance = Cyveillance. These forms of clandestine or covert operations are now regularly launch by various authoritative governments, military forces, and intelligence agencies in the whole world. Mass Surveillance is the sophisticated surveillance of an entire or a considerable segment of a nation in order to monitor that group of citizens. The surveillance is frequently carried out by local and federal governments or governmental organizations. Then again, it may also be carried out by corporations or defense contractors (either on behalf of governments or at their own initiative). Depending on each nation's regulations and judicial aspects, the authority of and the permission required to engage in mass surveillance diverges.
  • 23. Dr.Sameera @SriLanka 22 What is Top-Secret Cyber-Hawk and Eagle-Eye Covert Operation ? INTRODUCTION
  • 24. Dr.Sameera @SriLanka 23 Introduction. EagleEye is an anti-terrorism initiative that teaches individuals how to identify and report possible terrorist activity over the digital and cyber-media. The program provides a 24-hour hotline, allowing information to be reported as soon as suspicious activity occurs. Reports are disseminated among federal and local law agencies, as well as to commanders, in order to ensure appropriate action is taken. These counter-actions will be taken by undisclosed top-secret organizations that is established by the appropriate state with secret agents’ ring lead by previously arranged covert operation. CyberHawk is top-secret surveillance and counter-surveillance technique lead by the state shadow- organization(s) and/or private defense contractors. The sole determination of this particular approach is to safeguard the assets/buildings, VIP's, military or law enforcement, intel-squads, and more. Mostly by use of UAV (Unmanned Aerial Vehicles) Inspector Drones or Military Drones (Nano Technology based invisible Drones) listed in the covert/secret catalogue of state gear for Spying numerous assets and technologies such as Phones, Internet Technological Assets, EME/EMP (Electro-Magnet Emittance or Pulse), Radio Frequency (RF) based assets, Signaling assets over the SIGINT (Signal Intelligence) explained in Mass Surveillance.
  • 25. Dr.Sameera @SriLanka 24 Military Intelligence and Intel-Cyber Command & Control (C&C) Explained INTRODUCTION
  • 26. Dr.Sameera @SriLanka 25 Introduction. Command-&-Control to pro-actively monitor critical-infrastructure or government infrastructure, cyber or network operations over the espionage or usually called as spying in real-time. The C&Cs are typically integrates and conducts full-spectrum cyberspace operations, electronic or digital warfare, and secret information operations, confirming freedom of action for friendly forces or homeland security in and over the cyber domain and the information environment. Sometimes, it designated as the covert campaign of authority and direction lead by a properly designated senior officer over assigned and attached forces in the accomplishment of the top-secret mission. In an state, the president and the secretary of defense keep the authority and the control of the armed military forces, intelligence, through two distinct branches of the chain of command. The sole determination of the C&C is to combat Botnets, DDoS/RDoS Attacks, APT/SSAPT Coordinated Attacks over the Sphere Phishing Schemes, Spam, Malware, or Spyware/Trojan Attacks, Counter-Intelligence for FIS (Foreign Intelligence Service), Hacker Attacks, Detect Traitors (Disgruntled Insiders) and Whistleblowers, etc. Military Intelligence is a covert military techniques that uses of accumulating top-secret information and analysis tactics to offer guidance and direction to assist military/intelligence in their decisions to counter numerous situations in-terms of national security. This objective is accomplished by offering an assessment of data (massive data-mining) from numerous range of sources, engaged towards the authorities' mission requirements or responding to questions as part of shadow-operational or covert-campaign preparation. To offer analysis, the authority's information requirements are initially identified, which are then incorporated into covert- intelligence collection, analysis, and dissemination or distribution.
  • 27. Dr.Sameera @SriLanka 26 Government Threats. NORTH AMERICA SOUTH AMERICA SOUTH AFRICA ASIA EUROPE AUSTRALIA RapidGrowthofGovernmentAttackswith MILandINTEL 72%74% 34% 78% 88% RUSSIA 72%
  • 30. Dr.Sameera @SriLanka 29 NOW TALK FOR FAQ. WHAT WHY WHERE WHEN WHO HOW
  • 31. Dr.Sameera @SriLankaContact. @M: business@cyberintel.online @P: +9471 247 7284 @BBM PIN: oo7r00t | 2BABA4EE @WWW: https://www.cyberintel.online t v in Social Media @Dr_Sam33ra Dr.Sameera.De.Alwis / sameera-de-alwis-phd-dba-ence-ceh-chfi-gcih-iam-iem-gcfe-grem-5887349 Voice/Text + COM 30
  • 32. Dr.Sameera @SriLanka THE END THANK YOU VERY MUCH … everything that has a beginning has an end … [The Oracle @ The Matrix Revolutions, 2003]