|
|
|
|||||||||||||||||||
MCFD’s Advantages in SurveillanceError processing SSI fileMCFD enjoys the following advantages in surveillance:
Government Surveillance Programs on e-mail Communications
Nowadays, e-mails are so popular that they constitute a good portion of all communications in our society. Many Canadians think it is safe to communicate by e-mails. Government will respect privacy of its citizens. Court orders are required before their e-mails are monitored. In MCFD's world of "child protection", this is not quite true. You are dealing with a ministry who is able to get the medical records of all your family members without your knowledge under the pretext of "child protection". In the worst case scenario, it is safe to contend that MCFD is able to intercept e-mails and phone communications. This prompts us to add this new section on this page. Please contact us if you need suggestions of how to minimize the risk of e-mail interception. When you are using an e-mail server without encryption, the connection between your computer and the server is open to internet connection eavesdropping. That means that intruders (more commonly known as hackers in this context) will be able to read the traffic (including e-mail attachment) that you send to the e-mail website. They can break into e-mail servers and steal large amounts of user data to fish for useful information. This is especially important if you are using your computer on a public or office network, or if you are using a wireless connection that is not encrypted. In some countries, government sponsored projects have been set up to collect massive amounts of data from the Internet, including emails, and store them away for future analysis. This data collection is done without any search warrant, court order, or subpoena. One example of such a program was the FBI's Carnivore project. E-mail communications without encryption are broadly open to government surveillance, identity thieves and hackers. ![]() No system is completely "unhackable". Anyone who tells you otherwise is being disingenuous. However, some systems are harder to hack than others. In most e-mail systems, once a hacker gains access to the server upon which your email is stored, the e-mail can quickly be copied off the server and read. The most dangerous compromise is to capture your server access password. To do this, the intruder (hacker) would have to gain control over the software of our system, alter it, and remain undetected until the next time you sign in to steal your password. That would be a much more difficult task than simply getting in, copying data, and leaving. E-mail forgery E-mail forgery is when someone sent an e-mail that looks like it comes from any email address. There is no guarantee that an e-mail that looks like it comes from an address of someone you know is actually from that person. Digital signature can help by proving that the e-mail actually came from the true owner of an e-mail account. E-mail Risk Matrix An attacker is an intruder trying to access your email without your consent and knowledge. No system is bullet-proof. If you believe that you are under MCFD surveillance, it is wise to keep all your thoughts to yourself and do not communicate in any way unless it is absolutely necessary. The following table gives a risk analysis of intrusion in an unencrypted e-mail. It also indicates how risk is mitigated by using encrypted e-mail.
![]()
(back to MCFD Surveillance main page)
[This page was created on 13 March 2010, last revised 24 March 2015.] |