EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

10.08.13

Privacy and Security in the Age of Criminal Activity Perpetrated by the NSA, CIA, and FBI

Posted in GNU/Linux, Security, Windows at 2:44 am by Dr. Roy Schestowitz

Michael Hastings

Michael Hastings became an “Enemy of the State” when he criticised the CIA/Pentagon

Summary: The importance of one’s privacy and personal security when lawlessness prevails, especially in the realms of shady agencies that are unaccountable and state-protected

LAST night I watched “Enemy of the State” together with my wife because it deals with the NSA, even 15 years ago (a lot of it is still very relevant). A great deal of the film may be hogwash (unrealistic scenarios and impossibilities, like one satellite hovering over the same point), but surveillance and bugging is something that the producers got quite right. Based on some statements [1], the US government wants less transparency for the NSA (no surprise there), perhaps because transparency helps reveal the government’w complicity in violation of the law which it’s supposed to defend. Here in Europe, the European Parliament, which was bugged by the NSA, is now learning from former spies. European developers sure developed an interest in privacy [3] because it’s becoming an important selling point for GNU/Linux and Free software.

“he NSA spies even on US allies, which really says a lot about the value of privacy in the digital age. It’s all about control.”The FBI turns out to have engaged in criminal activities like spreading malware in order to carry out surveillance again [4] (we gave more examples even years ago) and following suspicions and reports that the FBI harassed a journalist’s family while he (Michael Hastings) was preparing a report about the CIA and shortly before he died in a fiery car crash (his car was controlled by a microchip) we now learn about the risks of cyber attacks on cars, with whole a consortium being formed to deal with this issue [5]. Meanwhile, details surface about the NSA’s cyber attacks programme [6,7] (the NSA is a cyber criminal, in essence doing exactly what criminals do) and a former NSA CIO ridicules the security of systems all over the place [8] while new flaws in Windows emerge [9] which continue to remain unpatched.

What we can learn from all this is simple. The US government — through the secret agencies it harbours — is actively engaging in criminal activities such as cyber attacks. This shouldn’t come as too much of a surprise, but we should be prepared for the possibility of such attacks by making informed software choices (e.g. cars that are not driven by proprietary software, operating systems that are not proprietary, access restrictions and so forth).

40 years ago the CIA helped crush democracy in Chile, putting a tyrant in place and protecting his militant henchmen [10]. This is one example among many where not only the lives of individuals got compromised and even ended because of criminal activity from secret agencies; even the sovereignty of entire nations could be compromised. The NSA spies even on US allies, which really says a lot about the value of privacy in the digital age. It’s all about control. To achieve these spying capabilities, systems are being broken into, so it’s not about social engineering. The only route to security is inherently hardened systems. GNU/Linux is one notable option.

Related/contextual items from the news:

  1. U.S. gov’t argues tech companies should not be allowed to report data request figures

    The U.S. government doesn’t want Microsoft, Google, Yahoo, and other major technology companies to disclose figures on how many requests it makes for user data.

  2. LIBE whistleblower hearing at the European Parliament

    This week I was invited to give a state­ment to the LIBE Com­mit­tee at the European Par­lia­ment about whis­tleblow­ing and the NSA mass sur­veil­lance scandal.

  3. Videos about the Freedombox project – for inspiration and learning
  4. FBI Admits It Controlled Tor Servers Behind Mass Malware Attack

    It wasn’t ever seriously in doubt, but the FBI yesterday acknowledged that it secretly took control of Freedom Hosting last July, days before the servers of the largest provider of ultra-anonymous hosting were found to be serving custom malware designed to identify visitors.

  5. Consortium plans to protect cars from cyber attacks

    As vehicles become increasingly dependent on embedded computers for functions such as engine timing, acceleration, braking, and in-vehicle infotainment (IVI), the risk of cyber attacks on cars is growing dramatically. With this in mind, Southwest Research Institute has formed the Automotive Consortium for Embedded Security (ACES), which will have an informal initial meeting on Oct. 23.

  6. How the NSA Thinks About Secrecy and Risk

    As I report in The Guardian today, the NSA has secret servers on the Internet that hack into other computers, codename FOXACID. These servers provide an excellent demonstration of how the NSA approaches risk management, and exposes flaws in how the agency thinks about the secrecy of its own programs.

  7. The NSA is Making Us All Less Safe

    Every casual Internet user, whether they know it or not, uses encryption daily. It’s the “s” in https and the little lock you see in your browser—signifying a secure connection—when you purchase something online, when you’re at your bank’s website or accessing your webmail, financial records, and medical records. Cryptography security is also essential in the computers in our cars, airplanes, houses and pockets.

  8. Former NSA CIO slams Fortune 100 companies’ security

    “It’s about looking at all the types of data you have got, assembling pictures and understanding what is happening and what has to stop.”

  9. Microsoft IE Zero-Day Flaw Exposure Widens

    There is still no official patch from Microsoft as weaponized exploits for Internet Explorer begin to appear, but there is a simple step that enterprise users can take to mitigate the risk.

  10. Chile shuts luxury jail for Pinochet henchmen
Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Links 21/10/2014: Debian Fork Debate, New GNU IceCat

    Links for the day



  2. Criminal Microsoft is Censoring the Web and Breaks Laws to Do So; the Web Should Censor (Remove) Microsoft

    Microsoft is still breaking the Internet using completely bogus takedown requests (an abuse of DMCA) and why Microsoft Windows, which contains weaponised back doors (shared with the NSA), should be banned from the Internet, not just from the Web



  3. Microsoft 'Loving' GNU/Linux and Other Corporate Media Fiction

    Microsoft has bullied or cleverly bribed enough technology-centric media sites to have them characterise Microsoft as a friend of Free/Open Source software (FOSS) that also "loves Linux"



  4. India May be Taking Bill Gates to Court for Misusing His So-called 'Charity' to Conduct Clinical Trials Without Consent on Behalf of Companies He Invests in

    Bill Gates may finally be pulled into the courtroom again, having been identified for large-scale abuses that he commits in the name of profit (not "charity")



  5. The Problems With Legal Workarounds, Patent Scope, and Expansion of Patent Trolls to the East

    Patent trolls are in the news again and it's rather important, albeit for various different reasons, more relevant than the ones covered here in the past



  6. Links 20/10/2014: Cloudera and Red Hat, Debian 7.7, and Vivid Vervet

    Links for the day



  7. Links 20/10/2014: 10 Years Since First Ubuntu Release

    Links for the day



  8. How Patent Lawyers Analyze Alice v. CLS Bank

    Breaking down a patent lawyer's analysis of a Supreme Court's decision that seemingly invalidated hundreds of thousands of software patents



  9. Is It Google's Turn to Head the USPTO Corporation?

    The industry-led USPTO continues to be coordinated by some of its biggest clients, despite issues associated with conflicting interests



  10. The EPO's Public Relations Disaster Amid Distrust From Within (and EPO Communications Chief Leaves): Part VII

    Amid unrest and suspicion of misconduct in the EPO's management (ongoing for months if not years), Transparency International steps in, but the EPO's management completely ignores Transparency International, refusing to collaborate; the PR chief of the EPO is apparently being pushed out in the mean time



  11. Links 18/10/2014: Debian Plans for Init Systems, Tails 1.2

    Links for the day



  12. Links 18/10/2014: New ELive, Android Expansion

    Links for the day



  13. Another Fresh Blow to Software Patents (and With Them Patent Trolls)

    Another new development shows that more burden of proof is to be put on the litigant, thus discouraging the most infamous serial patent aggressors and reducing the incentive to settle with a payment out of court



  14. Links 16/10/2014: New Android, SSL 3.0 Flaw

    Links for the day



  15. How the Corporate Press Deceives and Sells Microsoft Agenda

    Various new examples of media propaganda that distorts or makes up the facts (bias/lies by omission/selection) and where this is all coming from



  16. Vista 10 is Still Vapourware, But We Already Know It Will Increase Surveillance on Its Users and Contain Malicious Back Doors

    The villainous company which makes insecure-by-design operating systems will continue to do so, but in the mean time the corporate press covers only bugs in FOSS, not back doors in proprietary software



  17. Links 15/10/2014: KDE Plasma 5.1 is Out, GOG Reaches 100-Title Mark

    Links for the day



  18. With .NET Foundation Affiliation Xamarin is Another Step Closer to Being Absorbed by Microsoft

    Xamarin is not even trying to pretend that separation exists between Microsoft and its work; yet another collaboration is announced



  19. The EPO's Protection Triangle of Battistelli, Kongstad, and Topić: Part VI

    Jesper Kongstad, Benoît Battistelli, and Zeljko Topić are uncomfortably close personally and professionally, so suspicions arise that nepotism and protectionism play a negative role that negatively affects the European public



  20. Corporate Media Confirms the Demise of Software Patents in the United States; Will India and Europe Follow?

    It has become increasingly official that software patents are being weakened in the United States' USPTO as well as the courts; will software leaders such as India and Europe stop trying to imitate the old USPTO?



  21. Links 14/10/2014: CAINE 6, New RHEL, Dronecode

    Links for the day



  22. Microsoft's Disdain for Women Steals the Show at a Women's Event

    Steve Ballmer's successor, Satya Nadella, is still too tactless to lie to the audience, having been given --through subversive means -- a platform at a conference that should have shunned Microsoft, a famously misogynistic company



  23. SCOTUS May Soon Put an End to the 'Copyrights on APIs' Question While Proprietary Giants Continue to Harass Android/Linux in Every Way Conceivable

    Google takes its fight over API freedom to the Supreme Court in the Unites States and it also takes that longstanding patent harassment from the Microsoft- and Apple-backed troll (Rockstar) out of East Texas



  24. Patent Lawsuits Almost Halved After SCOTUS Ruling on 'Abstract' Software Patents

    The barrier for acceptance of software patent applications is raised in the United States and patent lawsuits, many of which involve software these days, are down very sharply, based on new figures from Lex Machina



  25. Links 13/10/2014: ChromeOS and EXT, Debian Resists Systemd Domination

    Links for the day



  26. Links 12/10/2014: Blackphone Tablet, Sony's Firefox OS Port

    Links for the day



  27. Links 9/10/2014: Free Software in Germany, Lenovo Tablets With Android

    Links for the day



  28. Links 8/10/2014: A Lot of Linux+AMD News, New ROSA Desktop Is Out

    Links for the day



  29. Lawyers' Propaganda About Software Patents and a New AstroTurf Entity Called Innovation Alliance

    Patent propaganda and deception from patent lawyers (among other parasites such as patent trolls) continues to flood the Web, intersecting with reports that prove them totally wrong



  30. How Microsoft Handles Disasters: Grace Hopper Conference Has Been Infiltrated by "Microsoft Disaster Response"

    Free/Open Source software (FOSS) must be a disaster to Microsoft's bottom line because Microsoft is sending "Microsoft Disaster Response" to infiltrate and disrupt a conference about women in FOSS


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts