Post by woodyz on Jul 26, 2013 12:49:37 GMT -7
So I am assuming like most anything we could be tracked by a cell phone, GPS, auto, intranet access, almost anything.
But beyond just tracking I assume the have to go to a provider for accounts made or stored.
As an example, if they can ID and track a GPS can they SEE/UPLOAD history data? Locations stored in the device? It seems like the media etc makes it appear the data dumps and active listening are achieved by a different process?
If my kindle has documents stored on it and they are able to remove a document when they need to, do they know what documents are stored on it, can they see copy remove them?
If my GPS has stored locations one, two and three are they able to know discover those locations?
I know a lot of people use GPS devices or applications to store cache locations. Can those be hacked?
While I think the technology is very useful I don't rely on anything but a natural marker to locate my cache locations even though I have close to a hundred, I don't even try to remember them. I remember a path process, then to me the cache locations along that path are easy to find.
But recently I noticed my son and a couple of others would take a reference picture on their phone and mark it with a GPS application.
In using the phone the pictures and locations may already be a part of the providers records.
So I believe the damage to OPSEC is done, they would have to be targeting individuals to make use of it, but......
On the other hand this generation behind me probably could not remember anything with out some gadget help. I doesn't make them wrong, had I been of that generation I would more than likely be the same. But it does add liability to OPSEC.
With this latest round of goberment spying revealed the next step is applications to encrypt or hide the data on those devices as we do on computers, which will go around and around again requiring a whole new level within the opsec and security of survival.
But beyond just tracking I assume the have to go to a provider for accounts made or stored.
As an example, if they can ID and track a GPS can they SEE/UPLOAD history data? Locations stored in the device? It seems like the media etc makes it appear the data dumps and active listening are achieved by a different process?
If my kindle has documents stored on it and they are able to remove a document when they need to, do they know what documents are stored on it, can they see copy remove them?
If my GPS has stored locations one, two and three are they able to know discover those locations?
I know a lot of people use GPS devices or applications to store cache locations. Can those be hacked?
While I think the technology is very useful I don't rely on anything but a natural marker to locate my cache locations even though I have close to a hundred, I don't even try to remember them. I remember a path process, then to me the cache locations along that path are easy to find.
But recently I noticed my son and a couple of others would take a reference picture on their phone and mark it with a GPS application.
In using the phone the pictures and locations may already be a part of the providers records.
So I believe the damage to OPSEC is done, they would have to be targeting individuals to make use of it, but......
On the other hand this generation behind me probably could not remember anything with out some gadget help. I doesn't make them wrong, had I been of that generation I would more than likely be the same. But it does add liability to OPSEC.
With this latest round of goberment spying revealed the next step is applications to encrypt or hide the data on those devices as we do on computers, which will go around and around again requiring a whole new level within the opsec and security of survival.