Five eyes?

donbass

New Member
Jan 8, 2026
33
7
13
Because of the 911 attacks on the u.s. and cybercrime, how has massive surveillance been implemented throughout the world from Afghanistan to zimbabwe? Cia, fbi, NSA, ect…? Is big brother only visual contact? How is everyone under surveillance across the world?
 
You’re a bit confusing movies with reality.

After 9/11, governments expanded their powers to collect data, mostly through telecom companies and internet infrastructure. That means metadata, traffic routing, and patterns detection. Not agents staring at everyone through cameras.
There is no single global control room run by CIA, FBI, NSA. Each country runs its own system. Most surveillance is automated and triggered by flags. If you are not relevant to national security or crime, you are not personally watched.
 
You’re a bit confusing movies with reality.

After 9/11, governments expanded their powers to collect data, mostly through telecom companies and internet infrastructure. That means metadata, traffic routing, and patterns detection. Not agents staring at everyone through cameras.
There is no single global control room run by CIA, FBI, NSA. Each country runs its own system. Most surveillance is automated and triggered by flags. If you are not relevant to national security or crime, you are not personally watched.
What would or might trigger red flags as far as cybercrime in your opinion?
 
What would or might trigger red flags as far as cybercrime in your opinion?
Usually patterns and specific behavior, like:
  • repeated contact with known criminal infrastructure, such as servers already flagged for malware, ransomware, fraud, child exploitation etc
  • large abnormal financial flows
  • ties with sanctioned wallets or mixing services already under investigation
  • coordinated login activity across multiple compromised accounts
  • traffic that matches known attack tools, exploit kits, or command and control protocols
  • access attempts to protected systems, government databases, critical infrastructure networks
  • communications with entities already under investigation
 
Usually patterns and specific behavior, like:
  • repeated contact with known criminal infrastructure, such as servers already flagged for malware, ransomware, fraud, child exploitation etc
  • large abnormal financial flows
  • ties with sanctioned wallets or mixing services already under investigation
  • coordinated login activity across multiple compromised accounts
  • traffic that matches known attack tools, exploit kits, or command and control protocols
  • access attempts to protected systems, government databases, critical infrastructure networks
  • communications with entities already under investigation
Is it nsa alone or international cooperation?
 
LEAs from all over the world cooperate regularly
But someone told me that only the u.s. has satellites in outer space that can take pictures in any given part of the world if need be it. Like google maps they can know who to look for by visual contact and facial recognition to start the manhunt for the hackers... what do you think?
 
But someone told me that only the u.s. has satellites in outer space that can take pictures in any given part of the world if need be it. Like google maps they can know who to look for by visual contact and facial recognition to start the manhunt for the hackers... what do you think?
they also have drones and spies etc. But don't worry, they will not point the satellite to take picture of you naked in your garden.
 
if they want, they can listen and watch you through all the appliances you have in your house, even if switched off.
If you were a threat, you would be on the CIA weekly kill list and probably already dead.
But how? Spies, ect... is it a really long list? Again, what youve told me up to a certain point doesnt surprise me...
 

JohnnyDoe.is is an uncensored discussion forum
focused on free speech,
independent thinking, and controversial ideas.
Everyone is responsible for their own words.

Quick Navigation

User Menu