EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

10.08.13

Privacy and Security in the Age of Criminal Activity Perpetrated by the NSA, CIA, and FBI

Posted in GNU/Linux, Security, Windows at 2:44 am by Dr. Roy Schestowitz

Michael Hastings

Michael Hastings became an “Enemy of the State” when he criticised the CIA/Pentagon

Summary: The importance of one’s privacy and personal security when lawlessness prevails, especially in the realms of shady agencies that are unaccountable and state-protected

LAST night I watched “Enemy of the State” together with my wife because it deals with the NSA, even 15 years ago (a lot of it is still very relevant). A great deal of the film may be hogwash (unrealistic scenarios and impossibilities, like one satellite hovering over the same point), but surveillance and bugging is something that the producers got quite right. Based on some statements [1], the US government wants less transparency for the NSA (no surprise there), perhaps because transparency helps reveal the government’w complicity in violation of the law which it’s supposed to defend. Here in Europe, the European Parliament, which was bugged by the NSA, is now learning from former spies. European developers sure developed an interest in privacy [3] because it’s becoming an important selling point for GNU/Linux and Free software.

“he NSA spies even on US allies, which really says a lot about the value of privacy in the digital age. It’s all about control.”The FBI turns out to have engaged in criminal activities like spreading malware in order to carry out surveillance again [4] (we gave more examples even years ago) and following suspicions and reports that the FBI harassed a journalist’s family while he (Michael Hastings) was preparing a report about the CIA and shortly before he died in a fiery car crash (his car was controlled by a microchip) we now learn about the risks of cyber attacks on cars, with whole a consortium being formed to deal with this issue [5]. Meanwhile, details surface about the NSA’s cyber attacks programme [6,7] (the NSA is a cyber criminal, in essence doing exactly what criminals do) and a former NSA CIO ridicules the security of systems all over the place [8] while new flaws in Windows emerge [9] which continue to remain unpatched.

What we can learn from all this is simple. The US government — through the secret agencies it harbours — is actively engaging in criminal activities such as cyber attacks. This shouldn’t come as too much of a surprise, but we should be prepared for the possibility of such attacks by making informed software choices (e.g. cars that are not driven by proprietary software, operating systems that are not proprietary, access restrictions and so forth).

40 years ago the CIA helped crush democracy in Chile, putting a tyrant in place and protecting his militant henchmen [10]. This is one example among many where not only the lives of individuals got compromised and even ended because of criminal activity from secret agencies; even the sovereignty of entire nations could be compromised. The NSA spies even on US allies, which really says a lot about the value of privacy in the digital age. It’s all about control. To achieve these spying capabilities, systems are being broken into, so it’s not about social engineering. The only route to security is inherently hardened systems. GNU/Linux is one notable option.

Related/contextual items from the news:

  1. U.S. gov’t argues tech companies should not be allowed to report data request figures

    The U.S. government doesn’t want Microsoft, Google, Yahoo, and other major technology companies to disclose figures on how many requests it makes for user data.

  2. LIBE whistleblower hearing at the European Parliament

    This week I was invited to give a state­ment to the LIBE Com­mit­tee at the European Par­lia­ment about whis­tleblow­ing and the NSA mass sur­veil­lance scandal.

  3. Videos about the Freedombox project – for inspiration and learning
  4. FBI Admits It Controlled Tor Servers Behind Mass Malware Attack

    It wasn’t ever seriously in doubt, but the FBI yesterday acknowledged that it secretly took control of Freedom Hosting last July, days before the servers of the largest provider of ultra-anonymous hosting were found to be serving custom malware designed to identify visitors.

  5. Consortium plans to protect cars from cyber attacks

    As vehicles become increasingly dependent on embedded computers for functions such as engine timing, acceleration, braking, and in-vehicle infotainment (IVI), the risk of cyber attacks on cars is growing dramatically. With this in mind, Southwest Research Institute has formed the Automotive Consortium for Embedded Security (ACES), which will have an informal initial meeting on Oct. 23.

  6. How the NSA Thinks About Secrecy and Risk

    As I report in The Guardian today, the NSA has secret servers on the Internet that hack into other computers, codename FOXACID. These servers provide an excellent demonstration of how the NSA approaches risk management, and exposes flaws in how the agency thinks about the secrecy of its own programs.

  7. The NSA is Making Us All Less Safe

    Every casual Internet user, whether they know it or not, uses encryption daily. It’s the “s” in https and the little lock you see in your browser—signifying a secure connection—when you purchase something online, when you’re at your bank’s website or accessing your webmail, financial records, and medical records. Cryptography security is also essential in the computers in our cars, airplanes, houses and pockets.

  8. Former NSA CIO slams Fortune 100 companies’ security

    “It’s about looking at all the types of data you have got, assembling pictures and understanding what is happening and what has to stop.”

  9. Microsoft IE Zero-Day Flaw Exposure Widens

    There is still no official patch from Microsoft as weaponized exploits for Internet Explorer begin to appear, but there is a simple step that enterprise users can take to mitigate the risk.

  10. Chile shuts luxury jail for Pinochet henchmen
Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Links 27/1/2015: Plasma 5.2, Dell Precision With GNU/Linux

    Links for the day



  2. Microsoft's Media Attack on Free Software and GNU/Linux

    Brainwash war is still being waged by Microsoft and its friends to convince people that Windows is universally dominant and that Microsoft is now part of the Free software world



  3. Microsoft Accounting Practices After Fire Again, After Previous Abuses and Book-Cooking

    After the infamous IRS brawl comes another confrontation between Microsoft and the SEC, which is unhappy with Microsoft for seemingly cooking the books again



  4. Links 26/1/2015: Debian 8.0 “Jessie” RC1, Linux Kernel 3.19 RC6

    Links for the day



  5. Links 25/1/2015: Android Wear 5.0, Tizen in Bangladesh

    Links for the day



  6. IRC Proceedings: January 11th, 2015 – January 24th, 2015

    Many IRC logs



  7. Links 24/1/2015: Zenwalk Linux Reviewed, Netrunner 14.1 Released

    Links for the day



  8. The Latest 'Microsoft is Open Source' Propaganda a Parade of Lies

    Microsoft myth makers continue their assault on what is objectively true and try to tell the public that Microsoft is a friend of "Open Source"



  9. Apple -- Like Microsoft -- Not Interested in the Security of Its Operating Systems

    Apple neglected to patch known security flaws in Mac OS X for no less than three months and only did something about that vector of intrusion when the public found out about it



  10. As Battistelli Breaks the Rules and Topić Silences Staff, New European Parliament Petition for Tackling the EPO's Abuses is Needed

    The neglected (by EPO) Article 4a of the European Patent Convention (EPC) and the European Parliament petition/complaint against the EPO's crooked management



  11. Links 23/1/2015: Red Hat on IBM Power, Meizu Leaks With Ubuntu

    Links for the day



  12. Links 23/1/2015: Plasma 5.2, Manjaro 0.9-pre1

    Links for the day



  13. Microsoft is Dying Due to Free Software, Tries to Infect GNU/Linux With .NET and to Infect Moodle in Schools With Microsoft Office and OOXML Lock-in

    'Free' drugs (a proprietary software analogy) the new strategy of Microsoft in its latest battle against Free software, especially in schools where choice is a rarity (if not an impossibility), with the premeditated intention of forming dependency/addiction among young people



  14. Microsoft Symptoms of a Dying Company: More Boosters Depart, Back Doors Revealed, Microsoft's Outlook Cracked

    Bad news for Microsoft shortly before the marketing extravaganza served to cover much of it up



  15. The Collapse of European Patent Office Management Culminates With Resignations

    No blood is spilled, but even the management of the EPO is falling apart as the Director of Internal Communication is said to have just resigned



  16. New LCA Talk: Open Invention Network's Deb Nicholson on Software Patents and Patent Trolls

    Deb Nicholson's LCA talk is now publicly accessible



  17. Links 22/1/2015: GNU/Linux Sysadmin Opportunities, TraceFS Introduced

    Links for the day



  18. Links 21/1/2015: Andrew Tridgell, Torvalds Being Baited

    Links for the day



  19. Vesna Stilin Renews Her Fight for Justice in Željko Topić Case (EPO VP)

    Željko Topić's abuses continue to cloud the legitimacy of the European Patent Office, in which he is a Vice-President



  20. Failure of the EPO Can Derail the Trojan Horse of Software Patents and Patent Trolls

    Dazzled by his endless pursuit of infinite money and power, Battistelli pushes for expansion of patent scope (geographically too), but he won't have it without a challenge



  21. Links 20/1/2015: Linux 3.19 RC5, 30 Years of FSF

    Links for the day



  22. Translations of Member of the European Parliament Complaining About European Patent Office (EPO)

    French, German, Dutch, and English translations of the article from Dennis De Jong



  23. Microsoft, the Back Doors Company, is Gradually Dying and Trying to Embrace the Competition

    The world is leaving Microsoft's common carrier (Windows) behind, so Microsoft, which is shrinking, tries to conquer Free software and GNU/Linux



  24. Battistelli's Latest Propaganda War Tries to Convince EPO Staff That Željko Topić's Many Criminal Charges Don't Exist

    Battistelli's right-hand man, Željko Topić, is now facing real danger of prosecution and possibly arrest in his home country, so Battistelli rushes to defend this thug's reputation



  25. Links 18/1/2015: Sailfish OS RoadMap, ownCloud Turns 5

    Links for the day



  26. Strategy of Litigation With Patents Has Collapsed Since SCOTUS Ruling in Alice v. CLS Bank

    The latest figures from Lex Machina show a massive decrease (-18%) in patent litigation last month; lawyers look for ways to spin the data in their favour



  27. Patent Lawyers Can't Help Rewriting Alice v. CLS Bank History

    The league of patent lawyers -- people who profit at the expense of software producers -- keeps brainwashing the public about the patentability of software (both the rationale and the potential)



  28. Myths and Hype About Patents

    Distortion of history and fabricated reports about patents in the corporate media leave many people confused and ultimately unable to make rational judgment



  29. Large Corporations, Including Microsoft Allies, Call for Abolition of Software Patents

    The calls for ending all patents on software are getting louder and patents as a whole are de-emphasised as a business strategy



  30. Links 17/1/2015: Lennart Poettering in Headlines, Mageia 5 Beta 2

    Links for the day


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts