EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

11.12.13

New Evidence of Criminality in Spying Agencies, Going as Far as Exploiting FOSS Sites to Spread Malware

Posted in Action, Deception, Free/Libre Software at 6:53 am by Dr. Roy Schestowitz

John McLusky illustration
An illustration of James Bond by artist John McLusky for the Daily Express newspaper.

Summary: The job of spooks in the US and the UK is anything but sexy and professional, new leaks continue to reveal

Bombshells regarding the NSA and its British offshoot GCHQ just can’t help coming. There is so much dirty laundry and Snowden et al. bring it out by the bucketload (to be attributed to Snowden). Techrights might have an exclusive story of its own pretty soon. We are still trying to ascertain/verify the facts in a case involving Arizona’s corrupt authorities (we asked for court documents to support the claims and to potentially publish). If the claims are true, then not only the NSA and FBI inject malware into people’s computers (e.g. CIPAV) but local authorities too are trying to do this, completely against the law. They spy without warrants, crack computers, and also pass new laws as means of revenge against people whom they are desperate to prosecute (but can’t). It sounds like a movie plot, but it sure seems to be real.

The big story in the news this week is that Slashdot got used by GCHQ to inject malware. This is criminal. When one is hijacking, infecting and distributing malware it is a serious crime — well, typically a crime when done by entities not connected to the government. The NSA-subsidised operations base known as GCHQ sure is damaging the British software industry [1] and the British “information commissioner” sure misses the point [2]; the real issue here is the illegal spying, not those who expose the illegal spying (whistleblowing/reporting). The British press which covers this the most is promoting Darkmail right now [3] and the ‘British Snowden’ explains to us how serious a problem we are dealing with [4]. Over 80% of US citizens are not satisfied with NSA oversight [5]. The NSA basically collects everything quite indiscriminately [6] and even phones that are switched off (powered off) are believed to be tracked by the NSA [7]. Services that require one’s real identity to use are getting more aggressive [8], the surveillance is being used for an expanding number of purposes (drug enforcement, taxes, etc.) [9], and even NIST turns out to be somewhat of a fraud with fake (moles-based) peer review [10].

Finally, for those who don’t know, Microsoft allegedly puts Windows back doors for the NSA [11]. What we know for sure is that Microsoft does tell the NSA how to remotely crack Windows PCs. Microsoft and the NSA are in bed together, so anyone who values his/her privacy should avoid everything from Microsoft and Microsoft-owned companies like Facebook. Now is a good time to move to Free/libre software. It’s never too late.

Related/contextual items from the news:

  1. GCHQ data snooping has “destroyed trust in British tech”

    GCHQ’s online surveillance has destroyed trust in British technology companies and irrevocably damaged the nation’s information security industry, according to a cryptography expert.

  2. Information commissioner voices fears over scale of NSA surveillance

    Liberty’s director, Shami Chakrabarti, asked about the impact of the Snowden revelations on the security services’ attempts to tackle terrorism, said: “I’m sure it creates challenges and irritations [but] any challenges are probably overblown. The serious bad boys know all about the technological possibilities.”

    Chakrabarti said Snowden had revealed “not just blanket surveillance and intrusion of privacy [but] that we got taken for mugs.

    “There was a big debate in this country about a snooper’s charter. That bill was dropped and now we find out they were doing this stuff anyway. That is not just a breach of privacy it is a fundamental breach of the rule of law, contempt for people, parliament and contempt of the law.

  3. Darkmail opens: New email encryption standard aims to keep government agencies out

    Silent Circle and Lavabit hope to respond to Snowden leaks with service stopping ‘state snoopers’ accessing email metadata

  4. The spies are called to account

    As the Snowden-related dis­clos­ures con­tinue to flow, each new one refut­ing the last dis­sem­bling state­ments of the des­per­ate spies, dip­lo­mats around the world must be curs­ing the over­ween­ing ambi­tions of the NSA and it vassals.

    Amer­ican ambas­sad­ors are being summoned from their for­ti­fied embassies to account for US mal­feas­ance in coun­try after coun­try: Brazil, Spain, France and, of course, Germany.

    In this last coun­try there has been scan­dal after scan­dal: first the hoover­ing up of bil­lions of private com­mu­nic­a­tions; the rev­el­a­tion that the Ger­man intel­li­gence agency, the BND, had been an enthu­si­astic part­ner of the NSA in devel­op­ing the XKey­Score pro­gramme and more; then, des­pite this, humi­li­at­ingly to learn that Ger­many is only con­sidered a 3rd Party intel­li­gence part­ner by the Yanks — put­ting them on a par with coun­tries like Iran, China and Russia.

  5. Less Than 20% Of Americans Believe That There’s Adequate Oversight Of The NSA

    One of the key responses from the NSA and its defenders to all of these Snowden leaks is that there is “rigorous oversight” of the NSA by the courts and Congress. Of course, that talking point has been debunked thoroughly, but NSA defenders keep trotting it out. It appears that the public is not buying it. At all. A recent poll from YouGov found that only 17% of people believe that Congress provides “adequate oversight” on the spying of Americans. A marginally better 20% (though, within the 4.6% margin of error, so meaningless difference really) felt that Congress provides adequate oversight of the NSA when it comes to collecting data on foreigners. Basically, that part of the NSA story just isn’t particularly believable in light of everything that’s come out. Oh, and people are paying attention to the news. A full 87% had heard something about the spying on foreign countries — with only 14% thinking that such a program has helped US interests abroad.

  6. Dan Geer Explains the Government Surveillance Mentality
  7. Samsung, Nokia say they don’t know how to track a powered-down phone

    Privacy International still awaits answers from Apple, BlackBerry, and others.

  8. Your Face and Name Will Appear in Google Ads Starting Today
  9. NSA’s Vast Surveillance Powers Extend Far Beyond Counterterrorism, Despite Misleading Government Claims
  10. Post-NSA Revelations, NIST Opens Review of All Crypto Standards
  11. Chrome Clamps Down, Bitcoin Vulnerability & More…

    Back when the Eric Snowden brouhaha first began, we said that this was going to have serious repercussions on the tech sector here in the United States, especially after it became evident that Microsoft was actively working with the spooks by allegedly designing back doors into their operating system and keeping federal intelligence agents informed about unpatched security holes that could be used against foreign governments and “terrorist,” which now days seems to be everyone who doesn’t work for the NSA, FBI or CIA.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

A Single Comment

  1. Needs Sunlight said,

    November 12, 2013 at 8:16 am

    Gravatar

    These injection MITM attacks only work on Web 2.0 sites. Secure sites, which work with javascript disabled, can’t do anything to a non-Windows machine if javascript is disabled. With all these revelations or confirmations, it almost looks like insecurity is a motivating factor in the spread of Web 2.0.

    SSL MITM is a related problem, but it is the javascript which is the real enabler to mischief.

What Else is New


  1. Links 28/3/2020: Wine 5.5 Released, EasyPup 2.2.14, WordPress 5.4 RC5 and End of Truthdig

    Links for the day



  2. IRC Proceedings: Friday, March 27, 2020

    IRC logs for Friday, March 27, 2020



  3. The Fall of the UPC - Part VIII: Team UPC Celebrates Death, Not Life

    Team UPC plays psychological games now; it is trying to twist or spin its defeat as good news and something to be almost celebrated; it is really as illogical (and pathetic) as that sounds



  4. Links 27/3/2020: GNU/Linux Versus COVID-19 and Release of GNU Guile 3.0.2

    Links for the day



  5. When Your 'Business' is Just 'Patent Portfolio'

    Hoarding loads of patents may seem impressive, but eating them to survive is impossible if not impermissible



  6. LOT Network is a One-Man (Millionaire's) Operation and Why This Should Alarm You

    The ugly story of Open Invention Network (OIN) and LOT; today we take a closer look at LOT and highlight a pattern of 'cross-pollination' (people in both OIN and LOT, even at the same time)



  7. Faking Production With Fake Patents on Software

    The EPO with its illegal guidelines (in violation of the EPC) can carry on churning out millions of fake patents that European courts would only waste time on and small companies be blackmailed with (they cannot afford legal battles)



  8. With the Unified Patent Court (UPC) Out of the Way Focus Will Return to EPO Corruption

    Expect the European Patent Office (EPO) to receive more negative attention now that the ’cause’ of UPC is lost and there’s no point pretending things are rosy



  9. IRC Proceedings: Thursday, March 26, 2020

    IRC logs for Thursday, March 26, 2020



  10. Links 27/3/2020: qBittorrent 4.2.2, Krita 4.2.9, pfSense 2.4, Bodhi Linux 5

    Links for the day



  11. IRC Proceedings: Wednesday, March 25, 2020

    IRC logs for Wednesday, March 25, 2020



  12. Still Work in Progress: Getting Those 2,851 Pages of Police Report About Arrest for Pedophilia in Home of Bill Gates

    It’s extremely difficult to get those police records, which were requested exactly one day before the media started attacking Richard Stallman (associating him with pedophiles based on a deliberate distortion)



  13. Links 26/3/2020: Plasma Bigscreen, New Kubernetes, Fedora's New Identity and Bodhi Linux 5.1.0

    Links for the day



  14. Guest Article: Window Managers, Github and Software Disobedience

    "Walking away from monopolies is the essence of freedom"



  15. Links 25/3/2020: LLVM 10.0.0 and UCS 4.4-4 Released, WordPress 5.4 RC4

    Links for the day



  16. 'Team UPC' Last Week

    The looks on Team UPC's faces 5 days ago (before and after the 9:30AM announcement)



  17. The Fall of the UPC - Part VII: Lies and Revisionism About the Reasons for the UPC's Ultimate Demise (to Leave the Door Open for More Failed Attempts)

    The media was lying in a hurry, in a coordinated effort to distort the meaning of the FCC's decision or belittle the impact of this decision; Techrights will carefully watch and respond to these lies



  18. IRC Proceedings: Tuesday, March 24, 2020

    IRC logs for Tuesday, March 24, 2020



  19. Linux Foundation Became Anti-Linux, Run by Microsoft People to Serve Microsoft's Agenda

    Microsoft is taking over the bodies of healthy projects, infecting the hosts in order for them to become slaves of the proprietary parasite; there's still no (known) cure, but we're familiar with the symptoms



  20. Microsoft Continues to Attack and Steal From the Open Source/Free Software Communities

    Microsoft cannot be trusted and there's no "new Microsoft," as another fairly new story serves to show



  21. Targeted Attack Leveraging FSF Servers

    Targeted by a determined and persist perpetrator, I've received over 20,000 E-mails. And the weapon of choice was the FSF's infrastructure, remotely misused against yours truly.



  22. If We Weren't Silencing Founders, Critics and People We Just Don't Like

    "In the long run, history is rarely very kind to tyrants, especially the ones who did little more than lie to people and demand things that served no real purpose."



  23. The Fall of the UPC - Part VI: Drowning in Material

    We're starting to see few good reports on the subject of UPC being rejected by the constitutional court of Germany; we also have a rapidly-growing 'buffer' of rather blatant examples of disinformation (which we'll tackle as best we can)



  24. FFII: EU Software Patent Court Stopped by Constitutional Court, Patent Industry Will Try Again

    The third attempt to validate software patents in Europe via a central patent court (UPC) has been stopped by the German Constitutional Court. The Unified Patent Court (UPC) would have given the keys of the kingdoms to the patent industry, and the last word over software patentability. FFII predict that the patent industry will continue to push for an UPC v2.0.



  25. Links 24/3/2020: Alpine 3.11.5, MythTV 31.0 and Tails 4.4.1

    Links for the day



  26. IRC Proceedings: Monday, March 23, 2020

    IRC logs for Monday, March 23, 2020



  27. Links 23/3/2020: Linux 5.6 RC7, Audacious 4.0, and Git 2.26 Released

    Links for the day



  28. The Fall of the UPC - Part V: Pretending That Opponents of the Unitary Patent Simply Don't Exist

    It's difficult if not totally impossible to find articles from impartial journalists -- let alone from actual scientists -- about the failure of the Unitary Patent and UPC Agreement (UPCA)



  29. The Fall of the UPC - Part IV: IP Kat Became Just a Team UPC Megaphone

    Willem Hoyng (Drafting Committee of the UPC's Rules of Procedure) is 'writing' IP Kat right now; has the blog turned into the very thing it fought to expose?



  30. The Fall of the UPC - Part III: Pure Comedy From Watchtroll and Its UPC Lobbyists From Managing IP

    Two megaphones of European Patent Office (EPO) management and boosters of Team Battistelli, namely Managing IP and Watchtroll, want us to think that UPC is merely “delayed” and that acts of overt corruption can be described as “passed unanimously by the Second Chamber of the Bundestag”


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts