A U.S. monitoring the country's network exposure, "can almost track anyone"
Author:Global Times Time:2022.07.20
[Global Times special reporter Yuan Hong] A report released by the US domestic organization disclosed that the country is conducting a comprehensive monitoring of an invisible network of the people in the country. The behind -the -scenes institution that was not noticed by the public, the US Immigration and Customs Law Enforcement Agency (ICE), was also exposed.
The Privacy and Technical Law Center of George Dun University in the United States released the report of the "Disculles under the 21st Century Data Data Data Data" in May this year. After two years of investigation, the center found that ICE has successfully established an efficient surveillance network since its establishment in 2003, reprimanding the privacy data of a large number of US residents, and this move far exceeds the scope of authorization.
74%of the national population in the United States
The ICE created after the "September 11" attack was given extensive power to crack down on terrorism and execute immigration laws. Although ICE has always positioned itself as a law enforcement agency for "criminal foreigners", in fact, ICE crosses the limit of law and morality and weave a huge monitoring system.
Data map. Source: Visual China
In addition to using the resources of the states and local police, ICE also set out to establish a database from the law enforcement department and vigorously invest in projects to track ordinary people. The report shows that from 2008 to 2021, ICE spent about $ 2.8 billion to conduct new monitoring, data collection and data sharing plans. The annual expenditure on monitoring projects increased by nearly 5 times during this period, from about $ 71 million per year to soaring to soaring to soaring to soaring to soaring to soaring to soaring to soaring to a rise to soared to soaring to soaring to a rise to soared to soaring to soaring to a rise to soaring to soaring to a rise to soaring to soaring to soaring to a rise to soaring to a rise to soaring to the rise to soaring to the rise to soaring to the US $ 71 million to a surge About 388 million US dollars. In addition, ICE spent more than $ 1.3 billion in geographical positioning providers, and also spent about 96 million US dollars in biological identification technologies such as facial scanning, and $ 252 million to visit the International Public Safety and Judicial Network (NLETS), etc. Key government database.
According to the report, the authority that ICE is currently known can access 74%of the driver's license data for Americans and track the movement of 70%of the cars in the city. Even if you move into a new home, 74%of Americans can automatically obtain their new address as soon as they connect to natural gas, electricity, telephone or network.
"Can almost track anyone"
Nina Wang (Yin), a policy assistant of the Privacy and Technical Legal Center of Georgen University, said: "ICE has established a comprehensive set of monitoring infrastructure that can be tracked at any time. The ability to keep confidential and unintentional monitoring, avoiding restrictions, can act under the eyelids of the members. "
After the report revealed that ICE's various cross -line surveillance behaviors, multiple American media also joined the exposure ranks. The American Technology News Website "Edge" calls on relevant private companies to stop cooperation with ICE and ask the government to strengthen the supervision of such cooperation. The US "Congress" also disclosed that during the epidemic period, ICE developed a GPS mobile phone software called Smartlink to track immigration, claiming that it was only to ensure that they were attending the immigration court's hearing, but the software had been used in a large number of no. It is unknown whether there are other hidden uses on criminal records and no detention immigrants.
Three channels are openly stealing secret
The report shows that ICE uses the weaknesses of privacy law to openly steal secrets from the three channels, while US federal and state laws are unable to stop it.
The largest channel is to directly request data from states and local bureaucratic bureaucrats in the United States. There is evidence that ICE makes hundreds or thousands of requests to vehicle management departments every year. A federal law adopted by the United States Congress in 1994 failed to consider that the federal immigration law enforcement agency will actively infringe the privacy of the drivers, resulting in the ICE from obtaining driver data from the vehicle management institute. The state -level legal barrier is even weaker.
The second largest channel is to access relevant information through government databases, and at the same time, the service of face recognition and other services to help analyze relevant data. ICE deployed data sharing and data collection programs, almost obtaining data information of each American. At the same time, when Ice bypass the asylum policies promulgated by the city and the state, and continue to obtain personal information from the government databases such as NLETS, no institution claims to be responsible for the next data tracking behavior.
The third largest channel is to collect records of public facilities and purchase private company databases that have never been regulated by data agent channels. In terms of the protection of public facilities, the federal privacy law and the legal defects of many states are huge.
The report shows that the existing privacy law of the Federation only protects consumer information under limited conditions such as banks such as banks, and most states fail to take meaningful privacy protection measures to restrict the release of public business customer information to law enforcement agencies. For example, although California is legislative prohibiting relevant companies from selling customer data, it does not prevent these companies from sharing customer information for companies such as telecommunications and public institutional information exchange centers (NCTUE) for free from credit assessment and other purposes. Once the credit inspection is over, NCTUE has the right to resold its customer information to a third party such as ICE. As a result, ICE successfully bypass legal restrictions and purchase a lot of relevant information from the database of private companies.
Maybe there are similar situations
A professional professionals in a network security industry said, "The US government is a veritable 'hacker' '' stealing empire '. It not only has no different way to implement online attacks to obtain information on the world, but also implements all -round monitoring measures for the people of the country."
- END -
Beijing Yanqing District Market Supervision Bureau strengthens food safety supervision of catering service links
Summer is a sensitive period of high incidence of food safety accidents in the catering service session. In accordance with the work deployment of the food and beverage office of the Beijing Market S
"Chinese Bilingual" Pickings Guangzhou New Children's Activity Center
What Interesting Explorations did Ancient People Make for Flying to the Sky? What ...