Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Create Your Own Internet in a Suitcase
#1
K. Belyanin: Democracy download from the internet.

U.S. State Department has begun to establish a global network of fighters with authoritarian regimes


10:49 14.06.2011

Translated article from Russia

The U.S. administration plans to increase funding for projects to establish systems of the Shadow Internet "and independent of mobile networks, the deployment which would allow" human rights defenders and dissidents, "sharing information, avoiding the prohibitions of the authorities. In the U.S. State Department does not hide the fact that new technologies are primarily designed for "civic activists" in Iran, Syria and Libya. The list of countries that restrict freedom of information, referred to Russia, where, according to Washington, used "selective censorship".

The fact that Barack Obama endorsed the drafting of a "shadow Internet and independent of mobile networks, which can be" used to undermine repressive regimes, "the newspaper reported The New York Times. Secretary of State Hillary Clinton reiterated the newspaper that her agency did not intend to abandon programs to "spread freedom on the Internet." "More and more people around the world use the Internet, mobile communications and other technologies to be heard to protest against injustice - explained the Secretary of State .- For us, this historic chance to help them implement positive change in the world who support America."

Large-scale project supervised by the Pentagon and State Department officials, and to the developments involved not only military engineers and diplomats, but also "programmers and dissidents from at least 12 countries." In addition to the deployment of cellular networks enable the exchange of information, bypassing the operating in the country cellular providers, the project involves the creation of points "uncensored" internet connections, as well as security systems that prevent the identity of the user.

"We're going to create an isolated network infrastructure, which can not be controlled, it is impossible to track and very difficult to destroy", - says Director of Open Technology Initiative Sasha Minras, responsible for developing the program "Internet in a suitcase." The creation of new technology the State Department provided a grant of $ 2 million According to the programmers, "suitcase" allows you to create your own internet at a time when all other means of communication are blocked by the state. Special software allows plugged in computers and mobile phones freely exchange information and to leave the World Wide Web without creating a single access point.

"Suitcase" can be provided with additional antennas to expand coverage, and in the kit may include an additional CD-ROMs and memory cards, allowing to install the necessary software on any number of phones and computers. When the device is so compact that can be transferred through the border states, without causing any particular suspicion.

No less important component of the project may be to develop, allows us to modify the function Bluetooth, which is equipped with every modern mobile phone. According to an immigrant from Iran, Mehdi Yahyanezhada responsible for this trend, about half of the recent protests in Tehran, share photos and videos using mobile phones. Designed with the money the State Department program allows you to configure Bluetooth so that the video "beating one of the protesters, for example, will be automatically sent from one device to another through a network of" trusted users ".

But the most ambitious project may become the creation of independent mobile networks, already tested in Afghanistan. Until now, militants of the Taliban managed to neutralize the country's cellular systems, intimidating employees of telephone companies or exploding mobile phone towers. As a countermeasure to the Pentagon proposed to deploy in Afghanistan, "shadow network" with a transmission "cells" in the U.S. military bases.

Such a scheme can be used in other countries. To gather information about North Korea, for example, American diplomats are using cellular networks of Chinese operators. Tower, located on the hills in the province of Jilin, provide reliable reception and at the border of North Korea. According to The New York Times, U.S. embassy staff and their "operating assistant" hiding cell phones in the border zone. By using these phones are confirmed and the Director of State Department-funded Radio Free Asia Libby Liu. According to her, so radio journalists get information about life in North Korea.

Cyril Belyanin

The newspaper "Kommersant", â„– 105 / B (4646), 14.06.2011

Source - Kommersant
Permanent address - http://www.centrasia.ru/newsA.php?st=1308034140

http://translate.googleusercontent.com/t...2NKbOoGm-Q

http://therearenosunglasses.wordpress.co...-blocking/
"Where is the intersection between the world's deep hunger and your deep gladness?"
Reply


Messages In This Thread
Create Your Own Internet in a Suitcase - by Ed Jewett - 15-06-2011, 01:38 AM

Possibly Related Threads…
Thread Author Replies Views Last Post
  Researchers Map How Scientific Misinformation Spreads On The Internet Drew Phipps 2 6,583 10-01-2016, 03:13 PM
Last Post: Drew Phipps
  New Malware spying at Internet service & telecommunications companies..and you! Peter Lemkin 2 6,066 25-11-2014, 09:13 AM
Last Post: Magda Hassan
  MAIDSAFE - A New Attempt At An Alternative 'Internet' - with Privacy and Annonymity Peter Lemkin 2 4,578 14-08-2014, 04:03 PM
Last Post: Peter Lemkin
  Who holds the seven keys to the internet? Magda Hassan 0 2,749 01-03-2014, 02:00 AM
Last Post: Magda Hassan
  Scientist scanned internet for traces of time travellers David Guyatt 0 2,798 04-01-2014, 10:54 AM
Last Post: David Guyatt
  3D-printer with nano-precision - Could create or recreate almost anything!! Peter Lemkin 7 8,052 24-09-2013, 03:55 PM
Last Post: David Guyatt
  Internet TVs can watch you as you watch them David Guyatt 1 2,773 04-05-2013, 02:42 AM
Last Post: Magda Hassan
  Homeland Attack On Internet Anonymity Albert Doyle 2 3,551 16-10-2012, 01:12 PM
Last Post: Magda Hassan
  How To Create a Terrorist - MK Ultra and the War on Terror Anthony Thorne 1 4,236 05-08-2012, 05:22 AM
Last Post: Peter Lemkin
  Non-profit ISP start up promises fully encrypted, private Internet Magda Hassan 0 2,589 13-04-2012, 02:50 PM
Last Post: Magda Hassan

Forum Jump:


Users browsing this thread: 1 Guest(s)