6. Tracking smart devices

How to protect user's communications, but provide law enforcement only with tools to track and trace criminals?
----
Back to 20 years ago, law enforcement could go to a switch room to listen to a phone call. So we could implement encryption to protect all phone calls, which could only be decrypted at a switch room. Hackers couldn't eave drop the airwaves or phone [cable] line to listen to our conversation.

Same arguments for Internet communications, law enforcement could enter an ISP control room to monitor an Internet communications using fiber optical, cable, telephone wires, or wireless carriers. No snooping able along the lines.

* We could run direct lines hanging on light posts from a switch room or an ISP control room to a nearest building hosting law enforcement officers to track criminals. This probably the only time we see hanging lines well. Why? It didn't look good?

Anyways law enforcement has the privilege to enter those control rooms, not hackers. This is a better method to monitor suspects. Having snooping or eavesdropping tools in order to monitor Internet and voice calls anywhere would leak those tools to hackers. We can't expect what insane in the streets do.

Seriously we have enough junk devices on earth currently.
- How many PC, smart phones, tablets, and smart devices are safe?
- Which one was the listeners spread everywhere on earth?

No comments:

Post a Comment