Monitored by this information and how?

hi,

long ago I read that once intelligence agencies found the organizers of the attacks in a computer game: people have been in conversation in the online game, not discussing the subject directly started.

Tell me how it all works and how monitored? Here are a few examples that interest me:

1) Any in-game chats. How?
As I see it, the entire history of the conversations within the game the idea is stored on the game server. Do I understand correctly that the owners of these servers provide access to special services for monitoring? For example, a man writes in the game using certain keys by which he may be interested in the bodies. The game can also be used for other purposes. How this monitoring works whether?

2) for Example, services online: Google documents or as an example of a design Figma (online service to create layouts that can have multiple people in a document at once).

What interests if any in such programs people are discussing something forbidden, they immediately come to the attention of the authorities? How I figure it: enter text somewhere is duplicated and automatically monitored and subject to the necessary keys. Here's another situation: what if the person does not enter text, and conditionally loads images or vector objects, which replace words or imitate the words.

In this case, the authorities will find potential intruders?

3) Cloud storage. All the information is loaded for example on dropbox or daily monitor? Example: here's an example of people uploaded to the cloud any compressed file with passwords and other protection, which discusses prohibited. How do we find him?

4) the Lead-in question to the above, omitting the situation with the bodies: and sold this information to advertisers?

For example, a person in the game discusses the concrete in the chat and he is starting to promote concrete.
Google documents and other services online a man writes about mattresses and he was beginning to sell colorisation history.

I will appreciate any useful info!
March 20th 20 at 11:37
5 answers
March 20th 20 at 11:39
Solution
long read
I recently read that the Martians captured US.

Monitored by this information and how?
Intelligence agencies and police - no.
Merchants - Yes.
For the security forces too much information where they money and the means to take it? And the merchants it pays off, so money is not a problem. And that's all.
Intelligence services and the police often selectively request information when it is needed, or in rare cases can a while make a total monitoring in certain areas.

In this case, the authorities will find potential intruders?
Special services like the police work differently. They work primarily with people, not with technology.
Therefore, the testimony, interviewing people, working with informants. And when there is a suspicion - then, and correspondence to the monitor, if it is very much necessary. In most nafig is not necessary, and so lacking.
The work of rozzer in principle, not much has changed in the last few hundred years. Is that on a car ride more comfortable than on a horse, and the phone is more convenient than carrier pigeons.

Do I understand correctly that the owners of these servers provide access to special services for monitoring?
If the owner will come representatives of the authorities, or just people with money and ask for this information, he will call, otherwise not. If the information is interesting to potential advertisers and they are willing to pay sell.

here's an example of people uploaded to the cloud any compressed file with passwords and other protection, which discusses prohibited. How do we find him?
Recognize that it is communicating with suspicious people, will come, will search, will find the evidence. If you really need to be password-protected file - politely but firmly ask where you downloaded the file, and what password. Download the file and unpack.But most often this file nafig they do not need to be.

and sold this information to advertisers?
Vengeance. All Sovremenny Internet on this should.
For example, a person in the game discusses the concrete in the chat and he is starting to promote concrete.
So.
In addition your smart TV collects and sends the statistics to the owners - what kind of movies you watch, what is switch, what queries you enter.
Further to any modern smartphone is a powerful processor (and not only in smartphone) for this CPU to compress the voice from a microphone in real-time is imperceptible load in the area of several percent, compressed hours talking about megabytes and the data should be sent to the server is not difficult.
In the end you downloaded a game or some app on Android, while installing it asked for microphone access, writes your conversation, sends to the server, gives a to recognize, pulls key words and please the advertiser knows that advertising is the owner of this phone number and an account in Google.
For the security forces too much information where they money and the means to take it?
from the budget - Elizabeth commented on March 20th 20 at 11:42
@sofia_Kuhlman88Kidding me? The budget thing is not elastic, the money was not much, but expenditure a lot.
And it is necessary to include the army and social programs, and ways to do and doctors to pay.
Therefore, the security forces are unable to spend large amounts - except in rare cases where without it in any way.

And merchants, unlike the security forces unable to spend any money if I know it'll pay off. - vance.Kertzmann72 commented on March 20th 20 at 11:45
@jermey73,
When talking about surveillance - it becomes rubber

And as in that joke: "no I'm not going to drink less" - Elizabeth commented on March 20th 20 at 11:48
@sofia_Kuhlman88, the Budget can not be rubber. Where is the money going to come from? Warriors limit? Or way less to build?

And as in that joke: "no I'm not going to drink less"
This principle operates in cases of extreme necessity. If strongly it is necessary, you can restrict other for a while.
But in fact such a need arises infrequently.

And all because the good old methods of work, is still effective, and far better than all these surveillance over the Internet. - vance.Kertzmann72 commented on March 20th 20 at 11:51
@jermey73,
Where is the money going to come from?

Warriors limit
road less to build


This principle operates in cases of extreme necessity.
in theory. In practice...
Well you can see for yourself - Elizabeth commented on March 20th 20 at 11:54
@sofia_Kuhlman88, It is in practice.
To monitor all this in the first place by the right people. And to get them nowhere and nothing. Contain this a lot of people is expensive, and the exhaust is minimal.
Everything can be done much less without total monitoring.

Here operators are forced to store the data, okay.
If strongly it is necessary - you can dig in this pile and extract information for a specific person. Cheap and effective.
And to monitor - not enough money.
It is the state security forces need to increase again in dvdate from the current one. And it is not relevant this case. - vance.Kertzmann72 commented on March 20th 20 at 11:57
@jermey73,

What's the problem in the staff, if they all want to be chenovnikov?
What is the problem in money, while you have resources?

Well, actually, and before monitored, that's just the style that you describe
And now all fell

I hope you have no samsagace to deny everything, even if the arguments don't hold water? - Elizabeth commented on March 20th 20 at 12:00
@sofia_Kuhlman88,
What's the problem in the staff, if they all want to be chenovnikov?

Firstly why everyone wants to become officials? For example, I don't want to, I freelance good.
In the second problem the staff one - it is necessary to prepare, train, contain, and that takes money, and their lacking.

Well, actually, and before monitored, that's just the style that you describe
It is not clear - in what style can you clarify? - vance.Kertzmann72 commented on March 20th 20 at 12:03
@jermey73,
Why ask the others

Training of officials coped

SORM - Elizabeth commented on March 20th 20 at 12:06
@sofia_Kuhlman88,
"SORM-1" — system wiretapping, organized in 1996;
In fact, this technique allows you to listen when you need a specific person if he was interested. All without exception listened.
"SORM-2", and SORM-3 is the system for collecting and storing information. Ie is a system logging and not monitoring.

I hope you the difference between monitoring and storage of information see. - vance.Kertzmann72 commented on March 20th 20 at 12:09
@jermey73,

You see, it wasn't that expensive
Even in netocny years all turned out to do - Elizabeth commented on March 20th 20 at 12:12
@sofia_Kuhlman88What to do? Where do you see the monitor? - vance.Kertzmann72 commented on March 20th 20 at 12:15
March 20th 20 at 11:41
Solution
How this monitoring works whether?

Do you seriously think that there are people here that I will take and say it? If it is, no one will never admit. It is impossible to prove the fact that it is impossible to prove the opposite - so take a situation which is worse - that the monitoring is.
For example, services online: Google documents

Not only monitored, but may without notice remove what they don't like. Google the story about how a year ago a porn video company found that Google has lost all their videos on hugedrive. Of course you will say - this is porn. And I say - and tomorrow criteria will change :)
All the information is loaded for example on dropbox or daily monitor

Of course. Many don't even hide this fact. Password-protected and encrypted archives can "accidentally" beaten and either abyss or be unreadable for the owner just to do stuff, especially free storage, where no one owes nothing to anyone.
Google documents and other services online a man writes about mattresses and he was beginning to sell colorisation history.

Of course. For this and everything revolves - Google collects such volumes exactly in order to sell, to sell and to sell advertising... And You thought there kind uncle sitting?
Funny that you think the collection of non-personal big data and targeted advertising evil) It is, however, a compromise – you are developing high quality free services, instead of watching adequate to your interests remodelirovania advertising instead of spam. Probably the ideal would be to add a paid subscription exempting from advertising, but KAMON who will buy it, 1 of 1000000!? - trinity_Crooks70 commented on March 20th 20 at 11:44
you enjoy developing high-quality free services

Come on, come on, in this place pliz is more... of Cakim is a free high quality services I use? Guglofonom? He should be glad I'm looking through it and he can monitor my search queries? Gmyla? There are account for every shit and spam, if Google suddenly feel an urge to block it - let's get another.
With Dropbox, GDrive? Eat yourself. Control over your data ends where it ends the control of their physical location. - Nathen.Bos commented on March 20th 20 at 11:47
March 20th 20 at 11:43
No one monitors
Why the big delay in the video on TV? The correspondent say "Hello", and he's half a turnip cards and looks at the sky. - carlo_Cronin commented on March 20th 20 at 11:46
@Herminia.Turner, often driven via a satellite and there latency large
I kept the websites and game servers no there's nothing to monitor - shannon_Jenki commented on March 20th 20 at 11:49
@Abbie51, here I would like to know why the delay. To the moon and back light enough for 2.5 seconds. - carlo_Cronin commented on March 20th 20 at 11:52
@Herminia.Turner, well, we're not light all sent and received - shannon_Jenki commented on March 20th 20 at 11:55
@Herminia.Turner, Because there is a buffer. For unforeseen situations. And the buffer is quite large. in order to catch in which case it is not regular to disable the channel. To the left in a straight line. - Estrella.Jones commented on March 20th 20 at 11:58
March 20th 20 at 11:45
Data storage - different countries have different laws, on average, even after you have stopped buying the service (e.g. email) your data will still be stored a month.
The results of data - comes the official request from the court/FBI/local gendarmerie specify explicitly what and for what period of time the firm is obliged to provide. for example all the logs of sent and received emails of the user vasya@coolemail.exapmle from 1st April's the 17th of April. and is applicable to any other service.

About advertising - it depends on what you subscribe to in the user agreement, there may be anything at all.
March 20th 20 at 11:47
Companies able to carry out a full analysis of the information is probably on the fingers of one hand can be counted.

First, you can hire an army of 'monkeys' and they will read and see all your messages, view all pictures, and so forth, prohibiting all communication, do not understand these overseers, and even in this case, there are ways to hide information steganography or smearing of the information on the parallel accounts, that is part of the information necessary for understanding the context out of this chat, nothing and no one can make it to do something.

Of course due to this none of the automated tools won't help, no matter how much you are spent on the development of artificial intelligence.

But that doesn't mean don't do that, why do you think Google is investing billions in information analysis, speech recognition and images.

p.s. if you are young and stupid, and you have come to the company, affilirovannaja with heterostructures, think thrice, whether you are ready to make a deal with his conscience and with his own hands to build a future totalitarian hell for themselves and their children.

Any development on the topic of redaction and analysis of information to monitor and control - walk on the razor's edge, whatever you said, whatever it supposedly was not created.

Find more questions by tags Data miningMonitoringInformation securityAnonymity