Developers: | Federal Security Service (FSB of the Russian Federation) |
Branches: | Government and social institutions |
A system is intended (judging by technical specifications on the website of state procurements) for "accumulation, processing and the analysis of billing information on the set criteria with the subsequent visualization of the received results".
In August, 2010 it became known that the Federal Security Service (FSS) intends to upgrade the system processing data on telephone conversations of Russians. From information from what number, on what number from where and when called, it is possible to gather a lot of interesting, experts consider. But security officers want not only to increase systems capabilities of the analysis of a talk, but also to make it more closed for the colleagues. It is possible to purchase from authorized intelligence agencies cheap practically any information today.
The military unit 68240 is going to upgrade the directory Yastreb-M system and is ready to spend for it 7 million rubles. Such message appeared a few days ago on the official site of state procurements.
Military unit 68240 — one of technical divisions of FSB. By request of this organization several systems for the analysis of telephone negotiations are already created — security officers want to determine by conversation recording nationality speaking, its psychoemotional status, a surrounding situation (the room size, make of the car, etc.).
"Yastreb-M" has no relation to the content of a talk. This system analyzes their statistics: how many times you called from what place you, by what numbers, what is the time spoke. In rules of interaction of the Russian telecom operators with security officers (Rules of interaction of telecom operators with the authorized state bodies performing operational search activity. Are approved by the order of the Government of the Russian Federation of 8/27/05 No. 538) it is written that FSB should have access to databases of operators with information on users (A surname, a name, a middle name, the residence and details of the main identity document — for the subscriber citizen; the name (trade name) of the legal entity, its location and also the list of the persons using the terminal equipment of the legal entity — for the subscriber legal entity) and the communication services (data of databases on calculations for the rendered communication services, including on connections, traffic and payments of subscribers) rendered to them processes These data of FSB using the Yastreb-M system.
Why to intelligence agencies statistics
For what formal data on telephone conversations, but not about their contents are necessary? For example, for establishment of dispositive facts, the expert in the field of the telecommunication right Anton Bogatov notes. Proofs can be required by field investigators that this subscriber of mobile communication in certain time was in a certain place.
From statistics of a talk it is also possible to take much interesting. A suspicious talk can be revealed, for example, on a long chain of readdressing, the head of Ankort company (is engaged in production of the electronic cryptographic equipment and the software for data protection) Anatoly Klepov notes. It is possible to keep track also of other suspicious statistical regularities. For example, if the people using the SIM card of mobile operator only for one call often call on the phone number in the North Caucasus, can become interested in this number of intelligence agency.
Protection against the
Upgrade of "Yastreb-M" is provided in the technical project published on the website of state procurements. Protection against unauthorized access to a system from bodies of operational search activity appears the first point. Today confidential data about a talk can be got at authorized intelligence agencies, the expert in the field of telecommunications told. It is no wonder that the upgraded system will have to provide "check of the rights of the user to issue of requests from this RMO (attendant workstation) and on issue of requests of this type".
See Also
- Censorship on the Internet. World experience
- Censorship (control) on the Internet. Experience of China
- Censorship (control) on the Internet. Experience of Russia, Roskomnadzor
- Law on regulation of Runet
- VPN and privacy (anonymity, anonymizers)
- Protection of critical information infrastructure of Russia
- Law On security of critical information infrastructure of the Russian Federation
- National Biometric Platform (NBP)
- Single Biometric System (SBS) of these clients of banks
- Biometric identification (market of Russia)
- Directory of solutions and projects of biometrics
- Digital economy of Russia
- Information security of digital economy of Russia
- SORM (System for Operative Investigative Activities)
- State detection system, warnings and mitigations of consequences of the computer attacks (State system of detection, prevention and elimination of consequences of computer attacks)
- National filtering system of Internet traffic (NASFIT)
- Yastreb-M Statistics of telephone conversations
- How to bypass Internet censorship of the house and at office: 5 easy ways
- The auditor - a control system of blocking of the websites in Russia
- The Single Network of Data Transmission (SNDT) for state agencies (Russian State Network, RSNet)
- Data network of public authorities (SPDOV)
- Single network of telecommunication of the Russian Federation
- Electronic Government of the Russian Federation
- Digital economy of Russia
- Cyber crime in the world
- Requirements of a NIST
- Global index of cyber security
- Cyber wars, Cyber war of Russia and USA
- Cyber crime and cyber conflicts: Russia, FSB, National coordination center for computer incidents (NKTsKI), Information Security Center (ISC) of FSB, Management of K BSTM of the Ministry of Internal Affairs of the Russian Federation, Ministry of Internal Affairs of the Russian Federation, Ministry of Defence of the Russian Federation, National Guard of the Russian Federation
- Cyber crime and cyber conflicts: Ukraine
- Cyber crime and cyber conflicts: USA, CIA, NSA, FBI, US Cybercom, U.S. Department of Defense, NATO, Department of Homeland Security, Cybersecurity and Infrastructure Security Agency (CISA)
- Cyber crime and cyber conflicts: Europe, ENISA
- Cyber crime and cyber conflicts: Israel
- Cyber crime and cyber conflicts: Iran
- Cyber crime and cyber conflicts: China
- As the USA spied on production of chips in the USSR
- Security risks of communication in a mobile network
- Information security in banks
- Digital transformation of the Russian banks
- Overview: IT in banks 2016
- The policy of the Central Bank in the field of data protection (cyber security)
- Losses of the organizations from cyber crime
- Losses of banks from cyber crime
- Trends of development of IT in insurance (cyberinsurance)
- Cyber attacks
- Overview: Security of information systems
- Information security
- Information security (world market)
- Information security (market of Russia)
- The main trends in data protection
- Software for data protection (world market)
- Software for data protection (the market of Russia)
- Pentesting (pentesting)
- Cybersecurity - Means of enciphering
- Cryptography
- VPN - Virtual private networks
- Security incident management: problems and their solutions
- Authentication systems
- Law on personal data No. 152-FZ
- Personal data protection in the European Union and the USA
- Quotations of user data in the market of cybercriminals
- Jackpotting
- Virus racketeer (encoder)
- WannaCry (virus racketeer)
- Petya/ExPetr/GoldenEye (virus racketeer)
- Malware (malware)
- APT - Targeted or target attacks
- DDoS and DeOS
- Attacks on DNS servers
- DoS-attacks on content delivery networks, CDN Content Delivery Network
- How to be protected from DDoS attack. TADetails
- Rootkit
- Fraud Detection System (fraud, fraud, fraud detection system)
- Solutions Antifraud directory and projects
- How to select an antifraud system for bank? TADetails
- Security Information and Event Management (SIEM)
- Directory of SIEM solutions and projects
- Than a SIEM system is useful and how to implement it?
- For what the SIEM system is necessary and as it to implement TADetails
- Intrusion detection and prevention systems
- Reflections of local threats (HIPS)
- Confidential information protection from internal threats (IPC)
- Phishing, DMARC, SMTP
- Trojan
- Botha's botnet
- Backdoor
- Worms Stuxnet Regin
- Flood
- Information loss preventions (DLP)
- Skimming (shimming)
- Spam
- Sound attacks
- Antispam software solutions
- Classical file infectors
- Antiviruses
- Cybersecurity: means of protecting
- Backup system
- Backup system (technologies)
- Backup system (security)
- Firewalls