Showing posts with label privacy. Show all posts
Showing posts with label privacy. Show all posts

NSA = Not So Adept: Hackers Loot Brash Stash Of NSA Exploits & Data

Who watches the watchers?  Apparently, now it’s…well, everybody with a computer.  A massive hack against the NSA has revealed a treasure trove of previously-private exploits and other data, and it doesn’t make our “security agency” look very secure at all…


If the future won't let us have space-war, we'll have cyberspace-war.
(Image courtesy techworm.com.)

Blowing Up The Burners: New Bill To Make Anonymous Cell Phones Illegal?

Chances are, as a modern human being, you own at least one cell phone that you guard with a vigilance that many bodyguards would envy.  It's as important as your wallet or keys, and maybe more so due to its irreplaceability.  But what about the cell phones that are used specifically for their disposable nature?  Should they be illegal just because sometimes you have business to handle that you don't want interacting with the rest of your real life?

Burner phones:  will they be burned at the legal stake for their perceived sins?
(Image courtesy survivethewild.net.)

The Witness Of Fitness: Health Apps Want Your Hot Body (Of Data)

Do you have a smartphone, smartwatch, or otherwise e-enabled device that you use to keep track of your health and fitness habits?  That's good, in the sense that you care enough about yourself to hopefully not totally devolve into a donut-demolishing dumpster.  It's bad, however, that all of your fitness data might not just be kept solely between you and your get-buff gadgetry.

"Sweet, I just beat my best 5K time!
But what's with all these ads to join the army?"
(Image courtesy lifefitness.com.)

Ingrained In The Brain: New "Brainprints" Security Metric Proven 100% Accurate

We've all seen a spy movie where someone's fingerprint-scan is needed to access an important area, and they end up forced to scan in at gunpoint, or simply having their finger lopped off to fulfill the invaders' needs.  And even retinal scans could possibly be faked with the right medical information and digital technology.  However, the latest security is key is stashed somewhere very safe:  inside your skull.

When your brain is your password, is your cap the Caps Lock?
(Image courtesy techcresendo.com.)


Eagles Vs. Drones: Fight In Flight

It's no secret that drones are becoming more and more ubiquitous, both from a law-enforcement perspective as well as hobbyists and aerial Peeping Toms.  But what can you do when a drone is infringing on your airspace and you don't think firing weapons or fireworks at it is a safe and/or sane option?  One word:  birds.

Uncle Sam must be very conflicted about this match-up.
(Image courtesy howstuffworks.com.)

X Marks The Spotted: Windows 10 Is Watching You

As citizens of the cyber-community, we've unfortunately become conditioned to seeing ads that are eerily targeted to things we say, emails that appear from long-forgotten websites, and other evidence of deep data gathering made manifest for use of moneymaking.  Now, with the launch of Windows 10 becoming a necessity for some users, Microsoft seems to have pulled out even more stops to speed up their spying...

Seriously, what ISN'T spying on us these days?
(Image courtesy hackread.com.)

Nothing to Hide: Privacy and Surveillance in New York City

"If you have nothing to hide, you have nothing to be afraid of." This is perhaps the most well known slogan of anti-privacy advocates and would-be totalitarians the world over. At one and the same time, this simple statement both criminalizes the practice of privacy while excusing some of the most heinous attacks on the rights and liberties of individuals by governments and corporations.

Of course, the notion that "if you have nothing to hide, you have nothing to be afraid of" is absurd on its face, at least in any society that is predicated upon the civilizational principle separating the public and private spheres. Perhaps the simplest way to undermine this dangerous idea is to ask some rather simple questions of those who espouse it. For example: What is your name? What is your Social Security Number? What is your bank account number? What is the password to your main email account?

Recently, we decided to head out onto the streets of New York City with actor and comedian Adrian Sexton to ask folks if they agreed with the statement "if you have nothing to hide, you have nothing to be afraid of." And if they answered in the affirmative, we then asked them to provide us with rather sensitive information. Some of the replies were rather surprising. Check it out below:

Who Would Jesus Watch? New Facial Recognition Software Tracks Church Attendance

Oh, god.  As if it weren't "bad" enough in the eyes of The Most High that your lapsed morals caused you to skip church on Sunday to be a brunch-munching heathen or false-idolater football fan, now you've also been caught...by computer.


The lord doesn't always work in mysterious ways...sometimes it's just computers and cameras.
(Image courtesy hackingchristianity.net.)

Spy vs. mSpy: Tracking-App Company Reveals Blackmail Attempt

With so many adults willing to give up their privacy in the name of security, it's no surprise that they'd levy that same treatment (with the same unwarranted sneakiness) onto their own children.  Amusingly enough, one firm that provides such products has now been hit by blackmailers.

Stalk your kids while sipping your coffee!  Except sometimes, it's not so simple...
(Image courtesy whiterosereader.org.)

Federal Appeals Court Rules NSA Wiretapping Illegal; NSA Turns Up The Volume, Puts Hands Over Ears, Says "La La La"

Of course, all privacy-prone American citizens have known this for some time:  the NSA's phone-call compendium is unnecessary, unaffiliated with capturing ANY terrorists EVER, and is overall downright creepy.  Thankfully, today, a federal appeals court ruled it illegal.

They listen to everything, but this is the only thing they need to hear.
(Image courtesy alan.com.)

We See What You Did There: Edward Snowden Given Human Rights Award By Sweden

While the United States remains steadfast in putting Edward Snowden in the "whistleblower spy" archive of history, other nations consider his efforts a laudable fight against the subtle tyranny of the surveillance state.  This week in Sweden, Snowden was awarded the Right Livelihood award, a humanitarian recognition of his work to free Americans (and others) from the zoo of Big Brother's surveillance amusement.

And we, in good conscience, shouldn't let them.
(Image courtesy garymvasey.files.com.)

According to the Guardian UK, Snowden was not physically able to attend the ceremony, as he considered it a threat to his safety (he is wanted on charges under the Espionage Act in the United States, whose notorious record of "renditions" would have rightly worried Snowden.)  However, he spoke with the committee via teleconference from Moscow, where he is currently living in exile.  In a show of solidarity for Mr. Snowden's deplorably alienated circumstances, none of his family members would accept the award in his absence, noting only that someday Snowden himself should be able to do so.

Informed and angry.  He's not wrong.
(Image courtesy reddit.com.)

The award jury noted that Snowden was being commended “for his courage and skill in revealing the unprecedented extent of state surveillance violating basic democratic processes and constitutional rights."

No one cares you have nothing to hide.  Something can be used against you.
(Image courtesy car-memes.com.)

President Barack Obama, who did not comment on Snowden's award, had previously campaigned with a strong intent to protect American whistleblowers.


They spelled Obama's name wrong, but everything else about this is sadly correct.
(Image courtesy csnbbs.com.)



This Message Will Self-Destruct: CIA and Homeland Security Seek To Officially Destroy Thousands Of Emails

When you delete your emails, it's likely just to remove clutter, liberating your inbox from constant coupons, ads, e-pleas, etc.  But when the CIA and Homeland Security want to delete emails, considerably more eyebrows are raised.

According to engadget.com, two of our most totally-not-shady Big Brother organizations want to delete all of their emails that are seven years or older, as well as the emails of all CIA employees who have been retired for 3 years.  A plan of action was shown to the National Records and Archives Administration (NARA) that indicated this intent, with only 22 top officials' correspondence to survive the digital culling.

History now seems to be written by the digital winners.
(Image courtesy news.yahoo.com.)

For two organizations who thrive on intelligence (one where it's in the very title of the company), this seems like a bad idea.  Numerous senators, including Dianne Fenstien (D-CA), are actively opposing this plan, fearing the expunging of evidence.

The motion was made by the CIA as part of an effort to help streamline its email collection for better management, a mission that NARA had asked of all government agencies to figure out a plan for.  Homeland Security's excuse was that it would free up valuable server space ($50 a terabyte per month) and that deletion could also possibly thwart the intended intelligence-gathering of Einstein, their government-website traffic-tracker.

They can stash endless info on regular citizens, but heaven forbid their own emails get retained.
(Artwork by Will Varner / Image courtesy twistedsifter.com.)

While this would be a win for private privacy, the overarching scope of government intel is something that people don't want to be able to simply vanish like so many extraordinary renditions before it.

Lee Tien of the Electronic Frontier Foundation told Gizmodo, "It's kind of sad. I want to applaud the government for choosing to discard unnecessary data about people. But we have good reason to question the government's reasons because of what we've learned about what we've NOT been told."

If you think the government shouldn't be doing the modern equivalent of shredding countless files and burning the confetti, you can tell NARA right here.

Uh...thanks but no thanks.
(Image courtesy reanimatedresidue.wordpress.com.)

Pew Report: 90% Of Americans Feel They've "Lost Control" Over Data Privacy

It's no secret that most civilian information in the United States is not secret.  But just how bad has the encroachment on our privacy gotten?  In a new Pew Research Center report, it seems that the cognitive dissonance of the American Dream is frustrating, but still not something people feel ready to fix...even though it is more critical now than ever to stop the erosion from the invasion.

It's not just a feeling.  It's their first move.
(Image courtesy mb.com.ph.)

The Washington Post reports that a recent study indicated Americans were very aware of the "privacy dystopia" they were living in, with 61% stating that they "would like to do more" to protect their online information.  Over 90% were aware that they had "lost control" over how private organizations were able to obtain and utilize their personal information.

Unfortunately, 55% were admittedly willing to trade personal information for free services online, which doesn't seem to be in line with most peoples' stated desires for privacy (yes, it DOES require sacrifice of some things, unfortunately, but perhaps someday with effort, that could be changed.  Cognizance of this is the first step to correcting it.)

Whatever this is, it isn't worth your security.
(Image courtesy news.softpedia.com.)

Other data from the report included some interesting findings:

-60% reported that revealing data to companies over the internet did not significantly improve their online experience

-88% did not trust advertisers the majority of the time

-82% did not trust the government all or most of the time

-Only 24% felt they could be easily anonymous online

-Perhaps most importantly, over 60% disagreed or strongly disagreed with the statement "it is a good thing for society if people believe that someone is keeping an eye on the things that they do online."

Cell phones, land lines, and social media site security were also assessed, but the overall results were clear:  the snooping needs to stop.  And until we cease squandering our own operational security or surrendering our data for the benefit of fleeting internet fun, this is going to be difficult to change.  It is no longer enough to disagree with privacy-violating practices - consumers and citizens must make the powers that be stop shamelessly snooping and selling our security.  Big Brother has become a bully, and it's time to fight back.

More technological shutters must be closed to block a variety of prying eyes.
(Image courtesy nypost.com.)

Fall's Hot New Look: Antisurveillance "Dazzle" Camouflage

Camouflage takes many forms, some in plain sight, some you've maybe never even spotted (by design.)  In today's world of ever-encroaching surveillance, one can't be too careful around cameras, both overt and hidden.  If you're trying to keep your face out of the electronic archives, one way to dodge the documentation is to use some good old-fashioned dazzle camouflage. 


In WWI, battleships were painted like hipsters (shipsters?) to confuse enemies.

Based on the premise of actual military warpaint used on planes and boats, CV Dazzle is a new means to break lines of vision while simultaneously breaking your monotonous old look.  According to the CV Dazzle website, "Since facial-recognition algorithms rely on the identification and spatial relationship of key facial features, like symmetry and tonal contours, one can block detection by creating an “anti-face."  Avant-garde, Surrealist, and cubist designs all contribute to the various elements of CV Dazzle.  



Arts AND sciences!
(Image courtesy cvdazzle.com.)

Some ideas for your new radar-revolting look could include:

-Long, facially-obscuring bangs in a variety of lengths and colors

-Facepaint including large "pixel"-style blocks 

-makeup that contrasts with your skin tone and doesn't enhance specific features

-obscuring the nose bridge (a key indicator in facial recognition software)

-obscuring the size and shape of the head

-covering or altering the perceived appearance of the eyes (size, shape, color)

-developing an overall asymmetrical facial presentation

The CV website offers styling templates and a host of look ideas to ponder, if you need to take your anti-surveillance look to the next level.  Would a mask also work?  Sure, but you might look cooler with blue bangs.

Of course, if you're not inclined to wear facepaint or weird bangs, you can always just anonymize your face in photos with the Face Dazzler app.  It'll take you right out the running for all the "tags" you don't need to be found in.  Privacy never looked so pretty!



Dazzle camouflage still works in modern times, as shown by this Dazzle-inspired yacht painted by Jeff Koons.  Yes, that is a real boat.


Steal Your Face: The FBI Is Storing Your Dimensions, Fearing Criminal Intentions

If you value your privacy, you may want to stock up on extra Halloween masks this season. The FBI has recently announced its state-of-the-art new facial recognition system, and it is creepier than any macabre mask a citizen can don.

According to gizmodo.com, six years of development and a billion dollars of taxpayer money have led to this biometric facial recognition software system. If you're getting a visa, going to prison, or otherwise being photographed by any grabby arm of the government, your identifying facial dimensions are sure going in there. It's called the Next Generation Identification program, and you are getting forced into this future.

But why stop at the shape of your skull and surrounding tissues? They did spend a BILLION of your dollars, after all! Scars, tattoos, fingerprints and other major identifying characteristics will also be included in your (totally safe and secure, we're sure) recognition profile. This shared database, known as the Interstate Photo System, is only going to get more insidious as ubiquitous surveillance camera resolutions improve.

The FBI, of course, loves their new toy. They were proud to report, "Since phase one was deployed in February 2011, the NGI system has introduced enhanced automated fingerprint and latent search capabilities, mobile fingerprint identification, and electronic image storage, all while adding enhanced processing speed and automation for electronic exchange of fingerprints to more than 18,000 law enforcement agencies and other authorized criminal justice partners 24 hours a day, 365 days a year."

It wouldn't be surprising if ninja-style outfits of obscurity became fashionable in the next few years...

So by FBI logic, the best masks are now the ones with no facial characteristics whatsoever.

Going Dark: New Email Technology To Easily Encrypt Everything

The unabashed abuse of privacy on the global scale is one of the most troubling invasions of our time. Now, one programmer is advocating a new paradigm of electronic communications that is simple and effective: "Dark Mail" that encrypts every email, every time.

Ladar Levison created the popular and secure email service Lavabit, which made news when he shut down the service entirely rather than cede to the goverment's demands that he surrender his security keys (which would have effectively undermined the entirety of the operation's purpose.) This happened hot on the heels of the Edward Snowden leaks, and since then no seriously secure single service has stepped forward to fill the gap. Now, as popularmechanics.com reports, Levison still wants to keep you covered.

In an interview posted today, Levison stated that everyone should be under the assumption that their electronic communications are being monitored at all times. This creepy but cruelly accurate statement is one that has yet to sink in for modern society, even though it means that everything from their (possibly "dangerous" and defamatory) private opinions to naked pictures are subject to scrutiny. He argues that the complexity of the e-communication infrastructure, coupled with the ease of cracking "endpoint security" (one's personal computer or device) makes things difficult for the average privacy-prone person. He has created "Dark Mail", a new encryption idea, to aid in spreading the powers of privacy.

As Levison explained:

"Dark Mail is really an effort to turn the world’s email dark—to make email encryption ubiquitous, universal, and automatic. The simplest explanation of what we’re doing is that we’re rewriting the protocols of email—the standard rules computers use for delivering email messages—so that messages are encrypted before they leave your computer and can’t be decrypted until they’ve reached the recipient’s computer. And because this is built into the system, there’s no cognitive burden. Grandma could use this—you don’t need to understand encryption or why it’s important. If someone can use email today, they will be able to use Dark Mail tomorrow."

Levison went on to elucidate that Dark Mail is not an email service, rather, it is a technology than any provider could implement. Expounding on PGP (Pretty Good Privacy) software, Dark Mail implements asymmetric cryptography techniques that use a public key (given to anyone who would like to send an automatically-message to a specific recipient) and a private key (theoretically, only the viewer of the message) to keep communications secure. Layers of anti-metadata technology to shake electronic position trackers are also in the works.

Levison went on to reference Phil Zimmerman, PGP's creator, and his lengthy police investigation and legal battle stemming from the creation of an encryption so strong that it was at first considered a munition (although the charges were eventually dropped.) On paper (and e-documents), there are laws that are in place to allow us this level of privacy.

Even if you feel you're doing nothing wrong, how do you know what those who would malign you are using against your favor? Why become a target just because you might be seeking knowledge that someone else deems illicit? Keep your privacy and your freedom close at hand, for both are valuable enough to be stolen.

If George W. Bush's personal oil painted nudies can be e-heisted, your info doesn't stand a chance. 

Custom Camouflage: Octopus-Inspired Technology Will Help You Blend In...Or Not

I'M SO FANCYYY...
In some social settings, have you ever just wanted to blend into the walls and disappear? Maybe this will soon be possible thanks to new changeable camouflage technology being developed at the University of Illinois. 

As the BBC reports, a thin grid of 1-mm cells is controlled by a temperature-sensitive colored dye that is able to adapt to its environment. Derived from observations of creatures like octopi and cuttlefish, who are able to easily change colors to disguise themselves in the ocean to avoid predators and attract prey, the technology based itself in part on the idea of the animals' layered skin. In the grid, the bottom layer uses photosensors to reflect the desired pattern to actuators in the middle layer, which then control the colored pigment in the top level to change color at precisely 47 degrees Celsius. Similarly, an octopus would have these actuators embedded in its muscle flesh to control their color-changing outer skin.

Though the work is being accomplished in America (led by senior author Professor John Roberts), the word of this project has jumped the pond and gathered attention. Professor Anne Neville, the Royal Academy of Engineering Chair in Emerging Technologies at the University of Leeds, called Professor Roberts' work "very innovative and very interesting," as well as noting it was operating at a "very high standard."

The technology is not fully developed yet, and some hindrances still exist. The dye is currently only working in black and white, but will eventually take on other hues as the technology develops. Another issue is a power source for the camo, which is currently fueled externally, but could likely benefit from an element of solar cells.

The project is based off of information gleaned from "a collaboration between experts in biology, materials, computing and electrical engineering," according to Professor Roberts, but has wide potential for architectural, military, and even fashion applications. One day, you could use the hues to make your shirt any color you wanted, or really stand out in a room by reflecting its most stark colors, like a real-life Paint eyedropper feature for fashion.

Or, for those who still treasure their privacy in the face of ever-encroaching surveillance, you could just practice vanishing...


Homeland Security has no idea who this guy is.














Cryptography vs. Cryptanalysis: Black Hat Talk on Hacking Tor Pulled from Conference

Historians of cryptology often describe the development of the discipline of "secret writing" in terms of a dialectic between cryptography and cryptanalysis, that is, between code makers and code breakers.  Cryptographers seek to create ever more indecipherable encryption schemes and cryptanalysts seek to break them.  An article on the cancellation of a Black Hat conference talk on the Tor privacy service from Reuters provides us with an interesting glimpse of how this tension is currently playing out among hackers and security researchers within the US government.  From Reuters, on the cancelled talk:

A highly anticipated talk on how to identify users of the Internet privacy service Tor was withdrawn from the upcoming Black Hat security conference, a spokeswoman for the event said on Monday.

The talk was canceled at the request of attorneys for Carnegie Mellon University in Pittsburgh, where the speakers work as researchers, the spokeswoman, Meredith Corley, told Reuters . . . a Carnegie Mellon attorney informed Black Hat that one of the speakers could not give the Tor talk because the materials he would discuss have not been approved for public release by the university or the Software Engineering Institute (SEI). . . .

Its abstract, titled "You don't have to be the NSA to Break Tor: De-Anonymizing Users on a Budget," had attracted attention within the security and privacy communities. The abstract had been published on Black Hat's website but has since been removed.
While the media often identify Tor as the preferred browser of child pornographers, criminal cartels and terrorist groups they often fail to note that it was actually originally developed by US government researchers. Or perhaps their implication is that the US government naturally falls under one of those umbrella terms? Whatever the case may be in that regard, the Reuters article hints at the state of the arms race between US government cryptographers and cryptanalysts. Another excerpt:
The U.S. government funded the creation and much of the operation of Tor as a communications tool for dissidents in repressive countries. But Tor has frustrated the U.S. National Security Agency for years, according to documents released by former agency contractor Edward Snowden.
That revelation has helped increase adoption by those seeking privacy for political reasons, as well as criminals, researchers say. 
Some criminal suspects on Tor have been unmasked by the U.S. Federal Bureau of Investigation and other law enforcement or intelligence agencies using a variety of techniques, including tampering with software often used alongside Tor.

Check out the EFF for more information on Tor.