{"id":255,"date":"2007-08-29T09:05:26","date_gmt":"2007-08-29T18:05:26","guid":{"rendered":"http:\/\/yvod.com\/ulan\/point-click-eavesdrop"},"modified":"2007-08-29T09:05:26","modified_gmt":"2007-08-29T18:05:26","slug":"point-click-eavesdrop","status":"publish","type":"post","link":"http:\/\/yvod.com\/ulan\/point-click-eavesdrop\/","title":{"rendered":"Point, Click &#8230; Eavesdrop"},"content":{"rendered":"<p><a href=\"http:\/\/www.wired.com\/politics\/security\/news\/2007\/08\/wiretap?currentPage=all\" target=\"_blank\">Point, Click &#8230; Eavesdrop: How the FBI Wiretap Net Operates<\/a><\/p>\n<p>&#8230;The network allows an FBI agent in New York, for example, to remotely set up a wiretap on a cell phone based in Sacramento, California, and immediately learn the phone&#8217;s location, then begin receiving conversations, text messages and voicemail pass codes in New York. With a few keystrokes, the agent can route the recordings to language specialists for translation&#8230;<\/p>\n<p>&#8230;More than 100 government officials in Greece learned in 2005 that their cell phones had been bugged, after an unknown hacker exploited CALEA-like functionality in wireless-carrier Vodafone&#8217;s network. The infiltrator used the switches&#8217; wiretap-management software to send copies of officials&#8217; phone calls and text messages to other phones, while simultaneously hiding the taps from auditing software&#8230;<\/p>\n<p>&#8230;A wiretap is, by definition, a vulnerability from the point of the third party. The question is, can you control it?&#8230;<\/p>\n<p>&#8212;-<\/p>\n<p>The USA government now has the technology to listen in on almost all forms of communication. Almost nothing is private.<\/p>\n<p>Is this really the world we wish to create?<\/p>\n<p>I need to find a way out of this madness.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Point, Click &#8230; Eavesdrop: How the FBI Wiretap Net Operates &#8230;The network allows an FBI agent in New York, for example, to remotely set up a wiretap on a cell phone based in Sacramento, California, and immediately learn the phone&#8217;s location, then begin receiving conversations, text messages and voicemail pass codes in New York. With &#8230; <a title=\"Point, Click &#8230; Eavesdrop\" class=\"read-more\" href=\"http:\/\/yvod.com\/ulan\/point-click-eavesdrop\/\" aria-label=\"Read more about Point, Click &#8230; Eavesdrop\">Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,9],"tags":[],"class_list":["post-255","post","type-post","status-publish","format-standard","hentry","category-code-computers","category-politics"],"_links":{"self":[{"href":"http:\/\/yvod.com\/ulan\/wp-json\/wp\/v2\/posts\/255","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/yvod.com\/ulan\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/yvod.com\/ulan\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/yvod.com\/ulan\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/yvod.com\/ulan\/wp-json\/wp\/v2\/comments?post=255"}],"version-history":[{"count":0,"href":"http:\/\/yvod.com\/ulan\/wp-json\/wp\/v2\/posts\/255\/revisions"}],"wp:attachment":[{"href":"http:\/\/yvod.com\/ulan\/wp-json\/wp\/v2\/media?parent=255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/yvod.com\/ulan\/wp-json\/wp\/v2\/categories?post=255"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/yvod.com\/ulan\/wp-json\/wp\/v2\/tags?post=255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}