EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

10.08.13

Privacy and Security in the Age of Criminal Activity Perpetrated by the NSA, CIA, and FBI

Posted in GNU/Linux, Security, Windows at 2:44 am by Dr. Roy Schestowitz

Michael Hastings

Michael Hastings became an “Enemy of the State” when he criticised the CIA/Pentagon

Summary: The importance of one’s privacy and personal security when lawlessness prevails, especially in the realms of shady agencies that are unaccountable and state-protected

LAST night I watched “Enemy of the State” together with my wife because it deals with the NSA, even 15 years ago (a lot of it is still very relevant). A great deal of the film may be hogwash (unrealistic scenarios and impossibilities, like one satellite hovering over the same point), but surveillance and bugging is something that the producers got quite right. Based on some statements [1], the US government wants less transparency for the NSA (no surprise there), perhaps because transparency helps reveal the government’w complicity in violation of the law which it’s supposed to defend. Here in Europe, the European Parliament, which was bugged by the NSA, is now learning from former spies. European developers sure developed an interest in privacy [3] because it’s becoming an important selling point for GNU/Linux and Free software.

“he NSA spies even on US allies, which really says a lot about the value of privacy in the digital age. It’s all about control.”The FBI turns out to have engaged in criminal activities like spreading malware in order to carry out surveillance again [4] (we gave more examples even years ago) and following suspicions and reports that the FBI harassed a journalist’s family while he (Michael Hastings) was preparing a report about the CIA and shortly before he died in a fiery car crash (his car was controlled by a microchip) we now learn about the risks of cyber attacks on cars, with whole a consortium being formed to deal with this issue [5]. Meanwhile, details surface about the NSA’s cyber attacks programme [6,7] (the NSA is a cyber criminal, in essence doing exactly what criminals do) and a former NSA CIO ridicules the security of systems all over the place [8] while new flaws in Windows emerge [9] which continue to remain unpatched.

What we can learn from all this is simple. The US government — through the secret agencies it harbours — is actively engaging in criminal activities such as cyber attacks. This shouldn’t come as too much of a surprise, but we should be prepared for the possibility of such attacks by making informed software choices (e.g. cars that are not driven by proprietary software, operating systems that are not proprietary, access restrictions and so forth).

40 years ago the CIA helped crush democracy in Chile, putting a tyrant in place and protecting his militant henchmen [10]. This is one example among many where not only the lives of individuals got compromised and even ended because of criminal activity from secret agencies; even the sovereignty of entire nations could be compromised. The NSA spies even on US allies, which really says a lot about the value of privacy in the digital age. It’s all about control. To achieve these spying capabilities, systems are being broken into, so it’s not about social engineering. The only route to security is inherently hardened systems. GNU/Linux is one notable option.

Related/contextual items from the news:

  1. U.S. gov’t argues tech companies should not be allowed to report data request figures

    The U.S. government doesn’t want Microsoft, Google, Yahoo, and other major technology companies to disclose figures on how many requests it makes for user data.

  2. LIBE whistleblower hearing at the European Parliament

    This week I was invited to give a state­ment to the LIBE Com­mit­tee at the European Par­lia­ment about whis­tleblow­ing and the NSA mass sur­veil­lance scandal.

  3. Videos about the Freedombox project – for inspiration and learning
  4. FBI Admits It Controlled Tor Servers Behind Mass Malware Attack

    It wasn’t ever seriously in doubt, but the FBI yesterday acknowledged that it secretly took control of Freedom Hosting last July, days before the servers of the largest provider of ultra-anonymous hosting were found to be serving custom malware designed to identify visitors.

  5. Consortium plans to protect cars from cyber attacks

    As vehicles become increasingly dependent on embedded computers for functions such as engine timing, acceleration, braking, and in-vehicle infotainment (IVI), the risk of cyber attacks on cars is growing dramatically. With this in mind, Southwest Research Institute has formed the Automotive Consortium for Embedded Security (ACES), which will have an informal initial meeting on Oct. 23.

  6. How the NSA Thinks About Secrecy and Risk

    As I report in The Guardian today, the NSA has secret servers on the Internet that hack into other computers, codename FOXACID. These servers provide an excellent demonstration of how the NSA approaches risk management, and exposes flaws in how the agency thinks about the secrecy of its own programs.

  7. The NSA is Making Us All Less Safe

    Every casual Internet user, whether they know it or not, uses encryption daily. It’s the “s” in https and the little lock you see in your browser—signifying a secure connection—when you purchase something online, when you’re at your bank’s website or accessing your webmail, financial records, and medical records. Cryptography security is also essential in the computers in our cars, airplanes, houses and pockets.

  8. Former NSA CIO slams Fortune 100 companies’ security

    “It’s about looking at all the types of data you have got, assembling pictures and understanding what is happening and what has to stop.”

  9. Microsoft IE Zero-Day Flaw Exposure Widens

    There is still no official patch from Microsoft as weaponized exploits for Internet Explorer begin to appear, but there is a simple step that enterprise users can take to mitigate the risk.

  10. Chile shuts luxury jail for Pinochet henchmen
Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Links 19/8/2019: Another Linux 5.3 RC, OpenSUSE's Richard Brown Steps Down, Slackware Creates Patreon Page, Qt 6 Initiated

    Links for the day



  2. Speaking Truth to Monopolies (or How to Write Guest Posts in Techrights)

    We need to have more articles tackling the passage of all power — especially when it comes to software — to few large monopolies that disregard human rights or actively participate in their abolishment in the digital realm



  3. Guarding and Rescuing the FSF Titanic: Free as in Speech

    "While a new breed of so-called anarchists campaign against expression that even the state allows, people are also foolishly overplaying the relevance of the state to free speech issues -- as if it's not a freedom issue when a project is increasingly thought-policed, because the thought-policing isn't on a state level."



  4. Toxic Culture at Microsoft

    Racism, intolerance, sexism and bullying are rampant at Microsoft; but Microsoft would rather deflect/divert/sidetrack to Google and so-called 'GAFA'



  5. Guarding and Rescuing the FSF Titanic: Introduction

    "The FSF isn't just threatened, it will hit a large iceberg in the future that changes it permanently."



  6. Linux Journal and Linux.com Should Have Been Kept Going

    There's apparently no good explanation for the effective shutdown of Linux Journal and Linux.com; London Trust Media Holdings (LTMH), owner of Linux Journal, saw numbers improving and the Linux Foundation, steward of Linux.com, is loaded with money



  7. 2019 Microsoft Glossary

    How Microsoft internally interprets words that it is saying to the public and to the press



  8. 2019 Surveillance Glossary

    Distortion of technical and nontechnical terms in this day and age of '1984'



  9. Openwashing Report: It's Getting Worse, Fast. Everything is Apparently 'Open' Now Even Though It's Actually Proprietary.

    The latest examples (this past week's) of openwashing in the media, ranging from 5G to surveillance



  10. GitHub is a Dagger Inside Free/Open Source Software (FOSS); This is Why Microsoft Bought It

    A year later it seems pretty evident that Microsoft doesn’t like FOSS but is merely trying to control it, e.g. by buying millions of FOSS projects/repositories at the platform level (the above is what the Linux Foundation‘s Jim Zemlin said to Microsoft at their event while antitrust regulators were still assessing the proposed takeover)



  11. Microsoft Grows Within and Eats You From the Inside

    Microsoft entryism and other subversive tactics continue to threaten and sometimes successfully undermine the competition; Microsoft is nowadays doing that to core projects in the Free/Open Source software world



  12. Links 18/8/2019: New KNOPPIX and Emmabuntus Released

    Links for the day



  13. Links 17/8/2019: Unigine 2.9 and Git 2.23

    Links for the day



  14. Computer-Generated Patent Applications Show That Patents and Innovations Are Very Different Things

    The 'cheapening' of the concept of 'inventor' (or 'invention') undermines the whole foundation/basis of the patent system and deep inside patent law firms know it



  15. Concerns About IBM's Commitment to OpenSource.com After the Fall of Linux.com and Linux Journal

    The Web site OpenSource.com is over two decades old; in its current form it's about a decade old and it contains plenty of good articles, but will IBM think so too and, if so, will investment in the site carry on?



  16. Electronic Frontier Foundation Makes a Mistake by Giving Award to Microsoft Surveillance Person

    At age 30 (almost) the Electronic Frontier Foundation still campaigns for privacy; so why does it grant awards to enemies of privacy?



  17. Caturdays and Sundays at Techrights Will Get Busier

    Our plan to spend the weekends writing more articles about Software Freedom; it seems like a high-priority issue



  18. Why Techrights Doesn't Do Social Control Media

    Being managed and censored by platform owners (sometimes their shareholders) isn’t an alluring proposition when a site challenges conformist norms and the status quo; Techrights belongs in a platform of its own



  19. Patent Prosecution Highways and Examination Highways Are Dooming the EPO

    Speed is not a measure of quality; but today's EPO is just trying to get as much money as possible, as fast as possible (before the whole thing implodes)



  20. Software Patents Won't Come Back Just Because They're (Re)Framed/Branded as "HEY HI" (AI)

    The pattern we've been observing in recent years is, patent applicants and law firms simply rewrite applications to make these seem patent-eligible on the surface (owing to deliberate deception) and patent offices facilitate these loopholes in order to fake 'growth'



  21. IP Kat Pays the Price for Being a Megaphone of Team UPC

    The typical or the usual suspects speak out about the so-called 'prospects' (with delusions of inevitability) of the Unified Patent Court Agreement, neglecting to account for their own longterm credibility



  22. Links 17/8/2019: Wine 4.14 is Out, Debian Celebrates 26 years

    Links for the day



  23. Nothing Says 'New' Microsoft Like Microsoft Component Firmware Update (More Hardware Lock-in)

    Vicious old Microsoft is still trying to make life very hard for GNU/Linux, especially in the OEM channel/s, but we're somehow supposed to think that "Microsoft loves Linux"



  24. Bill Gates and His Special Relationship With Jeffrey Epstein Still Stirring Speculations

    Love of the "children" has long been a controversial subject for Microsoft; can Bill Gates and his connections to Jeffrey Epstein unearth some unsavoury secrets?



  25. Links 16/8/2019: Kdevops and QEMU 4.1

    Links for the day



  26. The EPO's War on the Convention on the Grant of European Patents 2000 (EPC 2000), Not Just Brexit, Kills the Unitary Patent (UP/UPC) and Dooms Justice

    Team UPC continues to ignore the utter failures that have led to lawlessness at the EPO, attributing the demise of the Unified Patent Court (UPC) to Brexit alone and pretending that it's not even a problem



  27. Links 15/8/2019: GNOME's Birthday, LLVM 9.0 RC2

    Links for the day



  28. 'Foundation' Hype Spreads in China

    Nonprofits seem to have become more of a business loophole than a charitable endeavour; the problem is, this erodes confidence in legitimate Free software and good causes



  29. Links Are Not Endorsements

    If the only alternative is to say nothing and link to nothing, then we have a problem; a lot of people still assume that because someone links to something it therefore implies agreement and consent



  30. The Myth of 'Professionalism'

    Perception of professionalism, a vehicle or a motivation for making Linux more 'corporate-friendly' (i.e. owned by corporations), is a growing threat to Software Freedom inside Linux, as well as freedom of speech and many other things


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts