Expert warns about the consequences of transferring geographical data and payment information to security forces

No time to read?
Get a summary

The adoption of a decision by the Federal Security Service (FSB) on the transfer of geographical data and user payment information by Internet companies to law enforcement authorities may lead to the growth of the penetration market in the dark web. Igor Bederov, head of the information and analytical research department of T.Hunter, told socialbites.ca.

The decision of the FSB is addressed to the owners of Internet sites and services included in the register of organizers of information dissemination (ORI). ARI includes social networks, instant messengers, forums and other services listed in the special register of Roskomnadzor. The FSB believes that storing geospatial data and payment information and transmitting them to law enforcement agencies will increase the efficiency of operational search operations. In turn, Igor Bederov fears that the FSB’s new obligation could lead to a corresponding increase in the fracking market.

“I do not rule out the emergence of a galaxy of corrupt law enforcement officers who will sell citizens’ geodata and payment information to third parties on the dark web or in forums on Telegram. The phone number punching market now works on the same principle, only the data is not received from ORI, but from telecom operators,” Bederov said.

According to Bederov, payment information obtained in this way can be used for targeted fraud against wealthy individuals in order to steal funds. In turn, geolocation information would be useful to attackers for surveillance purposes.

“I assume that if this information is systematically leaked, shadow services will emerge to track people in almost real time,” the expert added.

In general, according to Bederov, the transfer of the listed categories of data is useful and necessary information for the bodies of the Ministry of Internal Affairs and intelligence services. This application is already available in many countries.

“For example, in the United States, this data is not only transmitted, but also automatically copied on the servers of the National Security Agency, where it is carefully analyzed,” he explained.

previous search showedhow often photos and login information from smartphones are stolen during repairs.

No time to read?
Get a summary
Previous Article

How to clean an iron with surprisingly effective home hacks?

Next Article

Scientist talked about a discovery that may receive a Nobel Prize in the future