Blog Feeds
Spirit of Contradiction
Public InquiryInterested in maladministration. Estd. 2005
The SakerA bird's eye view of the vineyard
Human Rights in IrelandA Blog About Human Rights
| Finnish counterintelligence able to brake into computers and monitor traffic![]() ![]() ![]() ![]() ![]() ![]() Possible electronic surveillance threat Finnish companies are facing now and in the future. Commercial Business Information Bulletin on Feb 30 2002; for security reasons being published AS A WORK DRAFT for NON-COMMERCIAL USE at INDY on FEB 26 2002; © Copyright 2002, From Apupoika - Business Intelligence Finland, All rights reserved. May be recopied, distributed for non-profit purposes only; May not be posted on an Internet web site without express written authorization. Contact [email protected] for permission. Title.....: Finnish counterintelligence able to brake into computers and monitor traffic Abstract..: Possible electronic surveillance threat Finnish companies are facing now and in the future. 30 Feb 2002 [26 Feb 2002 AS A WORK DRAFT]
BI-FIN The mass media and police have handled business security issue one-sided. Despite all glamorous police stories presented in the public media, were criminals have being caught by the police, have mass media only presented the other side of the story. Rest of story would have explained surveillance violations having taken place, known to exist or expected to take place against company and private citizen.
Police Act entered into force last year[5] expanded Finnish Police authority also into business security area were police have become a potential threat to those running business on Finnish territory [8]. Police is now able to make the decision when they need to practise surveillance against 'the expected cause (i.e. person) of threat causing a threat for life or health[9]' [5]. A sentence, that could be understood as 'causing or expected to cause a threat for life or health against a government authority'[8]- in which case it would lead to deliberate Police Act abuse. Possible target companies for such monitoring could be found from chemical industry or some engineering companies. By using this ‘imagined threat’ police is able to monitor company CEO or the company’s main analysts working for Research & Development (R&D). Electronic surveillance abuse would be examined by the same police organisation committing the abuse[8] in a situation were layers have not even determined any real punishment for electronic surveillance / monitoring abuse case[8].
I would be very surprised even without Police Act abuse cases, if Finnish counterintelligence (i.e. Security Police, Police and Army) would not be 'snooping' computers at least on Finnish territory[1-5 and 7]. Especially after when STT published an article in which police have explained the level of their expertise in committing real time network monitoring and catching computer hackers in real time [1]. Those who doubt any such act ever taken place, I may only ask "How some secret business issues have leaked in public?"[8]. Theoretically speaking it is also possible to hi-jack your www-session, besides police listening network traffic [7]. This gives you a valid reason to protect your business against previously told threats.
At some laboratories and government bureau you are not allowed to connect your computer to a public network. Such bureau usually have a separate network for business and surfing. You are not allowed to use company computer to anything else except to company matter. This means no personal software installed or ‘other’ data allowed in the computer! -Not even a single CD-ROM or disk swapped into the drive. All vital information kept in the computer should be crypt for security reasons [10]. In case Your computer is connected to an open network for some reason, then any incoming or outgoing information should be crypt. There is always a possibility of someone listening the network traffic. In case Your company is making R&D, then I am very strongly suggesting You to consult a security expert - and I mean security expert not 'a computer expert'. Usually these steps are adequate running normal business and preventing government access company computers. (Ake Tyvi, Apupoika - Business Intelligence Finland) _________________________
[2] [3] [4] [5] [6] [7] [8] [9] [10]
|