This exceptionally sporadic topic evidently vowing the PoC for the nutshell theory of Glenn Greenwald’s “NO PLACE TO HIDE” vouched over his authored book. I am demonstrating the true impact of the Lawful Cyber-Espionages and many other Top-Secret Covert Cyber Associated Intelligence Eagle-Eye campaigns that persistently lead by the worldwide authoritative governments with the reputed sources. The evidence only based on every publically available verified source and every document is redacted by the specified responsible parties. This incredibly challenging topic discussed only by few experts in the world due to its sensitive nature and the lack of the spot-on knowledge with regards to the Top-Secret Covert Cyber Operations, inadequate knowledge in Military/Law Enforcement and Intelligence Agencies, and mostly the natural anxiety factor of the human being. Only more than a few brave souls openly addressed these factual in the past. In this demonstration, I am only relying on the publicly available source of evidence and that academically putative evidence are all lawfully acknowledged by those who responsible for their own actions over the world’s cyber spectrum.
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Government Mass Surveillance and Backdoor Threats
1. STATE SPONSORED
WARRANTLESS
WIRETAPPING AND
GOVERNMENT MASS
SURVEILLANCE OVER
THE LAWFUL
INTERCEPTION
THE BIGGEST CYBER HAWK
AND PRYING EYES THREATS TO THE
WORLD
Wake up Neo… The Matrix has you… Follow the white rabbit…
Knock, Knock, Neo… (Matrix, 1999)
2. Dr.Sameera
@SriLanka
01
This webinar is merely compiled on the basis of factual information/data that accumulated evidence available in the public domain of the Internet sources and
every evidence is strictly accepted in the academic world. Author or any such author affiliated entity/individual hold no responsibility for anything stated in this
webinar. This statement deemed official and final to the public domain. [Dr. Sameera [22 September 2018
]]:
Howdy Everybody.
4. Dr.Sameera
@SriLanka
03
CONTENT
2
Backdoor Explained ina Nutshell - What Are those and how it isoperate ?
3
LawfulBackdooring and Unlawful Backdooring -What and Where Those Implants ?
4
Interception or Eavesdropping or Wiretapping - What Are Those ?
1
Spying/Espionage inDigital and Cyber-Era - What are those weirdowording?
5. Dr.Sameera
@SriLanka
04
CONTENT (Contd…)
6
What is LawfulInterception or Judicial Interception ?
7
State Sponsored Warrantless Wiretapping, What is it?
8
Surveillance or Mass Surveillance or Cyveillance ?
5
Isthe interception legal or illegal ?Formal Justification.
8. Dr.Sameera
@SriLanka
07
Introduction.
Espionage or Spying, is the action of gaining clandestine (classified) or confidential information
without the authorization of its owner. Undercover infiltrators assist secret-services and covert-
agencies to disclose top-secret information captured from numerous sources in the world. Any
individual or spy ring, in the service of a government, military, intelligence, privately held
company or self-governing operation could commit or launch an espionage campaign.
10. Dr.Sameera
@SriLanka
09
Introduction.
Backdoor is a computer technique, frequently secret, of evading or bypassing standard
authentication or encrypted formation in a computer system, a device, or an embedded
device, etc. The Backdoor could hidden inside any digital device (especially hardware) or
software applications. There are numerous forms of backdoors, OS, Application,
Hardware, VM, Kernel, Network, Script-Code Level (as Shrink-Wrap Code), etc.
The Backdoor is also called a trapdoor. Backdoor mostly is an undocumented technique of
circumventing regular authentication or secured remote access to a computer system or a
device. In other words, it is an unlawful technique of gaining access to a software or
hardware, online service/system, or an entire computer system. The backdoor is written by
the coder who forms the code for the legitimate software. A backdoor is denoted as a
potential security risk by the professional world.
12. Dr.Sameera
@SriLanka
11
Introduction.
Hardware Backdoors or hardware implants are form of backdoors in hardware, such as covert or
stealth code inside hardware or firmware of computer chips. These backdoors may be straightly
implemented as hardware Trojan codes or hardware Rootkit codes in the Integrated Circuit (IC).
.
Hardware Implants are anticipated to challenge security in various Smartcards, sometimes several HSM
(Hardware Security Modules), Hardware Authentication Tokens, CD/DVD/BR Disks, USB Drives, TPM Chips,
various Microprocessors, and other Cryptoprocessors except exceptional investment is made in anti-backdoor
technology to design extraordinary methods for special military and intelligence (top-secret government)
operations in the world. The hardware implants have also been considered for automobile hacking Ex. Smart
Cars, Smart Tractors, etc.
14. Dr.Sameera
@SriLanka
13
Introduction.
Interception explained that an unauthorized individual or party has gained access to an
asset that is extremely significant. The outside party can be an individual, an entity, a
program, or a computing or clustered computer or networked system. Examples of this
type of failure are illicit copying of program or data files (data leaks or exfiltration.
Eavesdropping originates from the practice of standing under the roof space of a house,
listening to human conversations inside. Eavesdropping is the fulltime or partial time
unauthorized real-time interception of a private communication, such as a phone call
(analog or digital) including wired and wireless 2G/3G/4G or upcoming 5G, radio link
communication, Li-Fi (in the future), instant message, video-conference, wi-fi
communication, military communication, or fax transmission. Also, denoted as MiTM using
session hijacking attacks in computer security domain.
Wiretapping defined in the history perspective the wiretapping litigations have always had struggle in
balancing privacy rights under the human rights of individuals with the concerns of government, military,
intelligence, and law enforcement. Technically wiretapping is the stealthy electronic monitoring of telephone,
telegraph, cellular/mobile, fax or Internet-based communications.
16. Dr.Sameera
@SriLanka
15
Introduction.
Interception refers to the hearing or other forms of acquisition of the contents of any wire,
wireless, electronic, or oral communication over the use of any electronic, mechanical, or
other device.
Interception in legal manner is gaining communications network data or information from a
lawful authority for the determination of analysis or evidence or research. A
communications network data or information contain of signaling or network management
information or any other sensitive information. It also consist of the content of
communications. One of the rudiments for legal seizure is the interception of
telecommunications by law enforcement agencies, supervisory or directorial agencies,
secret military, and intelligence services.
18. Dr.Sameera
@SriLanka
17
Introduction.
Lawful Interception denotes to the services in telecommunications and telephone
networks that permit intelligence, military, or law enforcement agencies with court order or
other legal permission to selectively wiretap individual subscribers. Most nation states
require certified telecommunications operators to deliver their networks with Legal
Interception gateways and nodes for the interception of communications. The end
interfaces of these gateways have been standardized by telecommunication
standardization organizations.
With the legacy or traditional public switched telephone network (PSTN), wireless (Wi-Fi),
packet switched networks, soft-switch technology, server-based applications, and cable
systems with modems, lawful interception was usually executed by gain access to the
mechanical or digital switches backup the targets’ communication.
20. Dr.Sameera
@SriLanka
19
Introduction.
Warrantless Wiretapping is defined as a segment of the warrantless surveillance refers
to the surveillance of peoples within the specific region or the particular country, including
their own citizens, during the collection of theoretically foreign intelligence by the
intelligence agencies as section of the terrorist surveillance or counter-terrorism act of the
worldwide perception.
Several top-secret agencies were sanctioned to monitor, without obtaining a warrant from
the court, the phone calls, Internet or cyber-activity, text/sms messages, and other
communication connecting any party/individual alleged by the intelligence agencies to be
outside the particular state, even if the other end of the communication positioned within
their own state.
22. Dr.Sameera
@SriLanka
21
Introduction.
Surveillance is defined in espionage (spying) and surveillance is the monitoring of
behavior, activities, actions, or other altering information for the determination of
manipulating, managing, guiding, or defending people. This consist of observation from a
remote location by means of electronic equipment or interception of phone calls or Internet
traffic as such electronically transmitted information. Surveillance is used by governments
and military organizations or mostly intelligence agencies for reconnaissance or gathering
intelligence, deterrence of crimes in a state.
Cyveillance is uniquely carried out throughout the form of Cyberspace perspective and the
notion derived from Cyber+Surveillance = Cyveillance. These forms of clandestine or covert
operations are now regularly launch by various authoritative governments, military forces,
and intelligence agencies in the whole world.
Mass Surveillance is the sophisticated surveillance of an entire or a considerable segment of a nation in
order to monitor that group of citizens. The surveillance is frequently carried out by local and federal
governments or governmental organizations. Then again, it may also be carried out by corporations or
defense contractors (either on behalf of governments or at their own initiative). Depending on each nation's
regulations and judicial aspects, the authority of and the permission required to engage in mass surveillance
diverges.
24. Dr.Sameera
@SriLanka
23
Introduction.
EagleEye is an anti-terrorism initiative that teaches individuals how to identify and report possible
terrorist activity over the digital and cyber-media. The program provides a 24-hour hotline, allowing
information to be reported as soon as suspicious activity occurs. Reports are disseminated among
federal and local law agencies, as well as to commanders, in order to ensure appropriate action is
taken. These counter-actions will be taken by undisclosed top-secret organizations that is
established by the appropriate state with secret agents’ ring lead by previously arranged covert
operation.
CyberHawk is top-secret surveillance and counter-surveillance technique lead by the state shadow-
organization(s) and/or private defense contractors. The sole determination of this particular approach is to
safeguard the assets/buildings, VIP's, military or law enforcement, intel-squads, and more. Mostly by use of
UAV (Unmanned Aerial Vehicles) Inspector Drones or Military Drones (Nano Technology based invisible
Drones) listed in the covert/secret catalogue of state gear for Spying numerous assets and technologies such
as Phones, Internet Technological Assets, EME/EMP (Electro-Magnet Emittance or Pulse), Radio Frequency
(RF) based assets, Signaling assets over the SIGINT (Signal Intelligence) explained in Mass Surveillance.
26. Dr.Sameera
@SriLanka
25
Introduction.
Command-&-Control to pro-actively monitor critical-infrastructure or government
infrastructure, cyber or network operations over the espionage or usually called as spying in
real-time. The C&Cs are typically integrates and conducts full-spectrum cyberspace
operations, electronic or digital warfare, and secret information operations, confirming freedom
of action for friendly forces or homeland security in and over the cyber domain and the
information environment. Sometimes, it designated as the covert campaign of authority and
direction lead by a properly designated senior officer over assigned and attached forces in the
accomplishment of the top-secret mission. In an state, the president and the secretary of
defense keep the authority and the control of the armed military forces, intelligence, through
two distinct branches of the chain of command. The sole determination of the C&C is to
combat Botnets, DDoS/RDoS Attacks, APT/SSAPT Coordinated Attacks over the Sphere
Phishing Schemes, Spam, Malware, or Spyware/Trojan Attacks, Counter-Intelligence for FIS
(Foreign Intelligence Service), Hacker Attacks, Detect Traitors (Disgruntled Insiders) and
Whistleblowers, etc.
Military Intelligence is a covert military techniques that uses of accumulating top-secret information and
analysis tactics to offer guidance and direction to assist military/intelligence in their decisions to counter
numerous situations in-terms of national security. This objective is accomplished by offering an assessment of
data (massive data-mining) from numerous range of sources, engaged towards the authorities' mission
requirements or responding to questions as part of shadow-operational or covert-campaign preparation. To offer
analysis, the authority's information requirements are initially identified, which are then incorporated into covert-
intelligence collection, analysis, and dissemination or distribution.
31. Dr.Sameera
@SriLankaContact.
@M: business@cyberintel.online
@P: +9471 247 7284
@BBM PIN: oo7r00t | 2BABA4EE
@WWW: https://www.cyberintel.online
t
v
in
Social Media
@Dr_Sam33ra
Dr.Sameera.De.Alwis
/ sameera-de-alwis-phd-dba-ence-ceh-chfi-gcih-iam-iem-gcfe-grem-5887349
Voice/Text + COM
30