Bonum Certa Men Certa

Privacy and Security in the Age of Criminal Activity Perpetrated by the NSA, CIA, and FBI

Michael Hastings
Michael Hastings became an "Enemy of the State" when he criticised the CIA/Pentagon



Summary: The importance of one's privacy and personal security when lawlessness prevails, especially in the realms of shady agencies that are unaccountable and state-protected

LAST night I watched "Enemy of the State" together with my wife because it deals with the NSA, even 15 years ago (a lot of it is still very relevant). A great deal of the film may be hogwash (unrealistic scenarios and impossibilities, like one satellite hovering over the same point), but surveillance and bugging is something that the producers got quite right. Based on some statements [1], the US government wants less transparency for the NSA (no surprise there), perhaps because transparency helps reveal the government'w complicity in violation of the law which it's supposed to defend. Here in Europe, the European Parliament, which was bugged by the NSA, is now learning from former spies. European developers sure developed an interest in privacy [3] because it's becoming an important selling point for GNU/Linux and Free software.



"he NSA spies even on US allies, which really says a lot about the value of privacy in the digital age. It's all about control."The FBI turns out to have engaged in criminal activities like spreading malware in order to carry out surveillance again [4] (we gave more examples even years ago) and following suspicions and reports that the FBI harassed a journalist's family while he (Michael Hastings) was preparing a report about the CIA and shortly before he died in a fiery car crash (his car was controlled by a microchip) we now learn about the risks of cyber attacks on cars, with whole a consortium being formed to deal with this issue [5]. Meanwhile, details surface about the NSA's cyber attacks programme [6,7] (the NSA is a cyber criminal, in essence doing exactly what criminals do) and a former NSA CIO ridicules the security of systems all over the place [8] while new flaws in Windows emerge [9] which continue to remain unpatched.

What we can learn from all this is simple. The US government -- through the secret agencies it harbours -- is actively engaging in criminal activities such as cyber attacks. This shouldn't come as too much of a surprise, but we should be prepared for the possibility of such attacks by making informed software choices (e.g. cars that are not driven by proprietary software, operating systems that are not proprietary, access restrictions and so forth).

40 years ago the CIA helped crush democracy in Chile, putting a tyrant in place and protecting his militant henchmen [10]. This is one example among many where not only the lives of individuals got compromised and even ended because of criminal activity from secret agencies; even the sovereignty of entire nations could be compromised. The NSA spies even on US allies, which really says a lot about the value of privacy in the digital age. It's all about control. To achieve these spying capabilities, systems are being broken into, so it's not about social engineering. The only route to security is inherently hardened systems. GNU/Linux is one notable option.

Related/contextual items from the news:



  1. U.S. gov't argues tech companies should not be allowed to report data request figures
    The U.S. government doesn't want Microsoft, Google, Yahoo, and other major technology companies to disclose figures on how many requests it makes for user data.


  2. LIBE whistleblower hearing at the European Parliament
    This week I was invited to give a state€­ment to the LIBE Com€­mit€­tee at the European Par€­lia€­ment about whis€­tleblow€­ing and the NSA mass sur€­veil€­lance scandal.


  3. Videos about the Freedombox project - for inspiration and learning


  4. FBI Admits It Controlled Tor Servers Behind Mass Malware Attack
    It wasn’t ever seriously in doubt, but the FBI yesterday acknowledged that it secretly took control of Freedom Hosting last July, days before the servers of the largest provider of ultra-anonymous hosting were found to be serving custom malware designed to identify visitors.


  5. Consortium plans to protect cars from cyber attacks
    As vehicles become increasingly dependent on embedded computers for functions such as engine timing, acceleration, braking, and in-vehicle infotainment (IVI), the risk of cyber attacks on cars is growing dramatically. With this in mind, Southwest Research Institute has formed the Automotive Consortium for Embedded Security (ACES), which will have an informal initial meeting on Oct. 23.


  6. How the NSA Thinks About Secrecy and Risk
    As I report in The Guardian today, the NSA has secret servers on the Internet that hack into other computers, codename FOXACID. These servers provide an excellent demonstration of how the NSA approaches risk management, and exposes flaws in how the agency thinks about the secrecy of its own programs.


  7. The NSA is Making Us All Less Safe
    Every casual Internet user, whether they know it or not, uses encryption daily. It’s the “s” in https and the little lock you see in your browser—signifying a secure connection—when you purchase something online, when you’re at your bank’s website or accessing your webmail, financial records, and medical records. Cryptography security is also essential in the computers in our cars, airplanes, houses and pockets.


  8. Former NSA CIO slams Fortune 100 companies' security
    “It's about looking at all the types of data you have got, assembling pictures and understanding what is happening and what has to stop.”


  9. Microsoft IE Zero-Day Flaw Exposure Widens
    There is still no official patch from Microsoft as weaponized exploits for Internet Explorer begin to appear, but there is a simple step that enterprise users can take to mitigate the risk.


  10. Chile shuts luxury jail for Pinochet henchmen


Recent Techrights' Posts

Sounds Like IBM is Preparing for Mass Layoffs/Redundancies in Red Hat, Albeit in "PIP" (Performance Improvement Plan) or "Relocation" Clothing
This isn't the "old" IBM; they're applying pressure by confusion and humiliation
Gemini Links 17/04/2025: Role of Language and Back to Mutt for E-mail
Links for the day
 
Links 19/04/2025: "Infantilization at Big Tech" and LLM Slop Abused in Defiance of Workplace Rules/Policies
Links for the day
Gemini Links 19/04/2025: Palm Addiction and Real Experts
Links for the day
Egypt is Controlled by Google, Not Microsoft
Moving from Microsoft to Google is not the answer
Microsofters Say They Cannot Find a Job (That They Want) Because of Techrights, But Techrights Merely Reported on Their Behaviour
Quit pointing the finger at people who are recipients of abuse or merely mention the abuse
Free Software and Standards - Not Marketing Blitz - Needed Amid Growing Severity of Dependency on Hostile Suppliers (or Another Country's Sovereignty)
ZenDiS can be described as the "Center for Digital Sovereignty of Public Administration"
When It Comes to the Web, Google is Evil and It Destroys the Web's Integrity With LLM Slop
Even academia, which is meant to keep standards high, is being lured into LLM slop
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, April 18, 2025
IRC logs for Friday, April 18, 2025
Links 18/04/2025: "Fentanylware (TikTok) Exodus Continues", Chinese Weapons Allegedly in Russia Already
Links for the day
Gemini Links 18/04/2025: Price of Games and State of Tinylog
Links for the day
"Sayonara" (さよなら), Microsoft
Windows had fallen below iOS in some countries
Links 18/04/2025: Layoffs at Microsoft Infosys and Qt Becoming Increasingly Proprietary (Plus Slop)
Links for the day
Google News is Dying
treating MElon's algorithmic/biased site as a source of verified news
Microsoft's Attack Dogs Have Failed. Now What?
It would be utterly foolish to assume that Microsoft has any intention of changing
All Your "Github Projects" Will be Gone One Day (Just Like Skype)
If you have code you wish to share and keep, then start learning how to do so on your own
To Understand Who's Truly Controlling You Follow the Trail of Censorship (or Self-Censorship)
Do not let media steal and steer the narrative; CoCs are not about "social justice", they're about corporate domination
Fedora Already Lost Its Soul Under IBM
Fedora used to be very strict compared to many other distros and it had attracted very bright volunteers
Microsoft is Still Attacking GNU/Linux and the Net
Microsoft bribed the government using money that did not even exist
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, April 17, 2025
IRC logs for Thursday, April 17, 2025
Gemini Links 18/04/2025: Pinephone Pro and Linux is too Easy
Links for the day
Links 17/04/2025: Calling Whistleblowers at Microsoft, Slop Doing More Harm Everywhere
Links for the day
Links 17/04/2025: Russian Bot Farms Infect TikTok (Which US Government and SCOTUS Decided to Block January 19), US Hardware Stocks Crash Due to Tariffs
Links for the day
Gemini Links 17/04/2025: Sticking to Free Software, Smolnet, and Counting the Reals
Links for the day
Open Source Initiative (OSI) Privacy Fiasco in Detail: In Conclusion and Enforcement Action Proceeds Against OSI at the California Privacy Protection Agency (CPPA)
There's too much to cover in one single part
When You Fail to Filter Your Clients You End Up SLAPPing Reporters on Behalf of Bad People From Microsoft in Another Continent
“American Psycho”
Links 17/04/2025: LayoffBot and Tesla Cheats Buyers
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Wednesday, April 16, 2025
IRC logs for Wednesday, April 16, 2025