Home / Game / Pokémon came to the defense

Pokémon came to the defense

The theme of information security today almost all concerned. It’s hard to argue, since anyone who reads these lines, do it with a computer, tablet, smartphone. Any such device is the storeroom of personal data and can tell a lot about a person, in case of obtaining of access to it. However, despite the fact that of the story of Edward Snowden, we learned that the NSA has access to virtually all the world’s IT giants (Google, Facebook, Twitter, Apple), many still remains unclear how this applies to them personally.

Покемоны дорвались до оборонкиAnd the theme, I must say, is quite normal. Let us recall the history of U.S. intelligence.

The CIA was created in 1947 with the aim of fighting against Soviet Russia. It is the authority of the Federal government.

The NSA was created later, in 1952, as a division of radio and electronic intelligence U.S. Department of defense.

It is clear that for nearly half a century, the United States ‘ greatest enemy was the Soviet Union. No one secret.

After the dismantling of the Soviet Union is not our enemy, but “partners” pretended as if we are “friends”. If friendship can be called the relationship of boa constrictor and a rabbit, of course. I will not go into recent history, which you all know. I will mention only one thing.

The NSA is the largest state intelligence Agency of the United States. The number is classified but it is known that in 2014 the budget was $45.000.000.000.

For comparison, Russia’s military budget for 2015 amounted to $66.4 billion in dollar equivalent. The military budget is one (!!!) unit of the U.S. Department of defense ¾ is equal to military budget of the whole country. All of the US military budget for 2015 amounted to $596 billion.

The CIA is engaged in creation of intelligence, fifth column, special operations, surveillance, abduction, torture those who disagree with the regime of Washington, the assassinations of political leaders.

The main task electronic intelligence, as you may have guessed, is espionage. Spying with the help of modern methods of information transfer.

The hysteria around the game Pokemon Go artificially inflated. About this you can read on habré articles entitled “Who is behind PR-campaign Pokemon Go?” and “Pokemon Go: let’s not get hysterical, let us examine viral PR campaign to promote this app. ver 2.0”. The author of article convincingly proves on the examples of custom publications that the same media, cooperating with a PR Agency David Jones (not to be confused with Davy Jones!) since the launch of the game lead the global PR company, creating hysteria in the community.

It should be noted that David Jones – Advisor to Zuckerberg to monetise Facebook with 2013. And Facebook is actively cooperating with the NSA for a long time (if not the inception).

In General, as you know, this virus reached our kreaklov and smote their brains. In this post, let’s not argue over the fact if it is cool when grown men running around in the real world to get some “favors” in the virtual. Let’s leave the moral and ethical issues of the pandemic out of the discussion.

Many experts in the field of information security has warned that the games has access to a large number of user data — address book, contents of his mailbox GMail, its coordinates and the camera device.

It is clear that conventional creakle-igroman have nothing to hide from the NSA. It is that, with a bunch of other pokemonov to turn the herd, and after that to use (rally, attack, etc.). However, if passion for this game wakes up, say, the employee of the defensive enterprise — it takes on an entirely different connotation.

If you have ever been interested in the history of intelligence and the confrontation between the KGB and the CIA, you know that the main goal of American spies is military secrets. Thus, the intelligence network of the CIA has often been reduced to penetration one way or the other on production, enterprises of the defense complex and the subsequent “leak” classified information in the hands of a geopolitical opponent. It’s like industrial espionage in the business, but the game is big.

Today in the field of military intelligence, the NSA obvious problems — the proof of this is completely unexpected for the Pentagon demonstration of new types of weapons of the Russian army during anti-terrorist operations on the territory of Syria.

And now, attention, fresh news:

Two members of one of the largest defense predpriiatiiakh region lost their jobs because of the enthusiasm the games during working hours. About it the newspaper “AIF-Kama region,” said a source at the company.

In the process of catching pokemon the specified employees at the plant, they were detained by the security service. After that, employees were asked to write a letter of resignation.

The newspaper did not specify what company it happened. From the Perm defensive enterprises well-known “proton-PM”, which produces rocket engines for space rockets, “Motovilikha plants”, producing artillery pieces and multiple rocket launchers, “Perm motor plant” and “aircraft engine”, which specializiruetsya in the production of aircraft engines, gas turbines, etc.

CNews

Do you think pokemon needed to catch, just so were on the territory of plant defense?

I think that in the right case, these virtual creatures place “where necessary”, the creators of the game company Niantics Labs, released under the wing of Google, the Creator of which was closely associated with the CIA and received funding from tsrushnogo Fund In-Q-Tel.

But I don’t think that the footage from smart phones of these two affected the “brain pokemon” poor fellows, can be especially interesting for NSA and the CIA.

In my opinion, is extremely important to another. How are these guys went online to play Pokemon Go? If using a local wireless network (assuming there is one at a defense plant), then they would be immediately exposed to the external IP address of the enterprise. When you know the network address of the enterprise, penetration into the network is much faster.

Another option. If the plant two employees running around with their smartphones, so other employees could use smartphones in the workplace. Smartphones have definitely had the Internet access (necessary for game) — it means no one is “suppressed” mobile network inside the building.

Since almost all smartphones today are running iOS (Apple) or Android (Google), then to calculate all other employees according to the obtained coordinate business if not used, then a couple of minutes. Further, it is possible for any interaction between the smartphone and the computer connected to the local network (for example, that the external Internet inside the enterprise is not), can infect all computers in network, collect all the necessary information (the latest technical development of defense — drawings, plans, presentations, etc.), and the next time you connect the smartphone to the computer (for example, for recharging or file transfer) is to merge all the necessary information and send it to the NSA via the mobile network.

I brought a couple of scenarios. In fact, these can be a great many.

The mere pojavlenie virtual monsters on the territory of the defense enterprise proves that the fears of experts was not in vain, this is not “conspiracy theory”, but a real struggle on the geopolitical map of the world.

How many such employees of the defense darting in search of pokémon by their businesses? Only their is no one caught. I think that soon we will be able to read such news.

Check Also

Video games and musical theatre: 2023’s most unlikely crossover?

There has been a remarkable intersection between video games and musical performance this year, from …