Privacy and social networks simply do not go hand in hand. Does it really have to be this way? Well, it depends on you. At this dark hour for our privacy, it would be nice to remind ourselves of a timeless classic in this field. According to the NSA golden rule, if you have nothing to hide, you have nothing to worry about.
As simple and as complicated as that. On the other side, here is one more goldie just for you. There is no such a thing as privacy on social networks. The man, who invented the Facebook, said that. If you want to keep something a secret absolutely and permanently, you have no other choice than to keep silent.
So, what are we supposed to do? Use the social networks to suit you the best. However, do not forget that everything and anything on these networks come at a certain price. It is up to you, whether or not a certain social network will become a social spider’s web for you. Maybe you are a spider itself.
Yet, you just do not know it. Either way, it is the social networks’ way or the highway. We have a choice, to use them or find some other way of communicating and making new friends. Is this a true choice, in the first place? Or, you can create a new social network of your own. Maybe you can change the world.
As soon as you launch a political, military or an economic crisis, you can rest assured that an avalanche of speculation will inevitably follow. This is exactly what happened with the crisis in Ukraine. On the other side, the NATO and EU were dead worried about the Russian cyber answer in this matter.
This is how the iSight has published its findings about one of the most notorious Russian hacker group called the Sandworm Team. According to some serious rumors this group was directly supported and lead by the Russian secret agencies. There activities were focused primarily on the NATO, EU and Ukraine related structures.
On the other side, there were quite a few interesting information about these cyber shadow warriors from Russia definitely worth mentioning. These SF fans were able to exploit the security flaws in the Windows itself for their actions, which is an interesting thing to witness. So far, we have had the different roles.
Allegedly, the Western secret agencies such as the CIA or NSA were exploiting Windows bugs for spying on the Russian government officials. It seems that someone was quite capable of turning the Windows itself against its countrymen. The secret cyber war has already begun. All what we can see are only the consequences.
This year’s NATO summit passed under the blinding spotlights of the recent events in Ukraine. No wonder so many things associated with this organization went below the radars of our attention almost unnoticed. Yes, cyber boys and girls the NATO had enough time to discuss cyber security, as well.
Are you surprised or intrigued? Or both? The NATO Industry Cyber Partnership (NICP) has obviously decided to thoroughly change some things about its cyber security measures and structure itself. Well, when it comes to this one, we have two important questions to ask. Can you dare to make a wild guess?
The first one is naturally to examine the motivation for this “sudden” and surprising acknowledgment of cyber security’s importance. What went wrong? Or, maybe the NATO prepares itself for something huge. Russia or China, for example? The second question is definitely more important.
Why it has to be a private sector to handle these sensitive things on behalf of the NATO? What is happening with the top government agencies in this field? Should we be worried or flattered? Is this some kind of a recognition for a quality work or an indication of some new waves in the restless cyber sea?
DO you work in some of the government agencies such as the DEA or the FBI? Do you know what is the ICREACH? OK. Time for some explaining. This is one more of the Snowden’s lessons about the NSA. The ICREACH stands for the Intelligence Community Reach. What in the world is that?
Well, let us put it in this way. This is the NSA Internet, or to be even more precise a specific form of a social networks for secret agents. As soon as you access this network you get an immediate overview of literally billions and billions of extremely sensitive data. How convenient it is indeed. Impressed?
Or, stressed? So, the next time you want to experience the full scale privacy breach, use the NSA’s ICREACH. Nevertheless, the things are a little bit serious in this matter. Therefore, we will leave poems for some other occasion. If other agencies can access the NSA forbidden data kingdom, how about hackers?
Although, the NSA has locked the door and made the key copies for the limited number of users, who can guarantee us that there is no skilled locksmith with dishonest intentions on his mind. Someone, for example, who is listening this story first hand from the most famous whistleblower in history. You know who is that, don’t you?
So, what do you think about this picture? This a nice looking Greenpeace and a bunch of other similar organizations and activists balloon, which is floating over the NSA’s data facilities in Bluffdale, Utah. Why? Well, to draw our attention with the simple sign: The NSA – Illegal Spying Bellow.
How can they do such a thing? Is it illegal? The NSA can call a couple of fighter jets to blow it away from the sky. Yet, here it flies, making itself to be an outstanding object for making fantastic pictures. Can this one change something or is it going to end up its purpose in annoying the NSA guys?
Well, this is hard to say for certain. The main thing is that we are talking and thinking about what the NSA is doing to and with us. And, hopefully something good will come out of it. So, this can easily turn out to be a balloon of hope. However, we should hold our horses with this one and be realistic.
It takes more than one balloon to teach some discipline the guys in the black suits from the NSA. And yet, there is a strong hope that the public pressure can be strong enough to really turn the tide one day. Until then, we will launch balloons, write letters, make movies, and something new you come up with.
The busy little bees from the Gamma Group has come up with an intriguing report. They have used something called the FinSpy to test the malware resistance strength of Android, IOS, BlackBerry, and some older versions of Windows Phone. The results? Well, they are both interesting and controversial.
It seems that the FinSpy was able to do its dirty work on all of these except the IOS. To be honest, even iPhone could not resist the true force of its malware dark side. However, this malware was able to penetrate iPhone’s only when it was in a so-called jailbreak mode. Intriguing enough, isn’t it?
On the other side, we do not want you to get the wrong impression that with an iPhone is nothing to worry about. The SpyFin is the legitimate cyber weapon used by the government agencies. Every iPhone has an open secret backdoor, which is more than enough to keep you restless about your privacy.
Our word of advice is, do not trust to results published by numerous surveys. Do not even trust your own smartphone. As a matter of fact, you should follow the golden NSA rule. If you have nothing to hide, then you have nothing to worry about. It’s really that simple. For your own good, do not be stubborn about this one. Will you?
When you see Edward Snowden how firmly he holds the US flag close to his heart on the latest Wired Magazine cover, then you think or say or feel what exactly? For the US citizens and government this is an obvious case of bitter joke or inappropriate sense of humor. For the rest of us he will be a symbol.
Or, maybe a tragic figure who used a time machine to get to us from the ancient Greece. One thing is more than certain in this case. There are no chances for this one to become a win-win situation for him. We are very likely to witness a loose-and-then-loose-again situation for Edward Snowden.
Was it worth it? All these troubles and all this pain. This is a question only he knows an answer to. We have been awakened from a fake dream of flawless IT security and privacy, and there is no way back. The similar thing happened to Neo in The Matrix. Edward did not even ask us to choose between the red and blue pill.
He made a choice in our name. Eventually, he will also suffer consequences in our name. We will make a movie about him. Create a foundation with an annual reward carrying his name. What is there for him personally? Does he wish for a time machine while he reads the Wired Magazine at the Moscow airport?
Here is a tricky one. When you read something like this, you usually end up with a huge question mark on your face. It seems that the FBI has been using spying programs in order to collect information about users on several websites and forums with the alleged pedophile content.
This is how we get to the point that unjustified means are being used for the justified cause. You do not have to be a rocket scientist to probably know by now that the Internet has become the most popular hideaway place and sharing mean for all kinds of cyber pedophiles. The FBI is definitely not an exception in this case.
However, the use of unauthorized or even prohibited methods in fighting some of the most troubling forms of crime is a little bit problematic. We can argue as long as we like. Pro et contra argumentation between the two parties with the opposite points of view will probably confuse you even more.
We are not saying that some of the pedophiles with a criminal record should be granted with an opportunity to sue the FBI. On the other side, the FBI and similar agencies should not be discouraged in their rightful efforts. Some acceptable modus has to be introduced. But how? We are not quite sure about?
We got ourselves an additional chapter in the bloody book of Ukraine crisis. This time the Russian government demands the source codes from the leading IT companies, which wish to do business on the Russian soil. So far, only the Microsoft showed the unreserved readiness to cooperate.
On the other side, Apple and SAP are having some second thoughts about it. The Russian government is deadly worried about the spying threat. It seems that in all software made in the USA they see the NSA and CIA signature. So, what is the response of the US based companies in this matter?
It seems that Apple and SAP are not willing to cooperate. The Russians were so kind to remind them of Microsoft’s flawless cooperation over the last couple of years. This is a nice test for US companies to evaluate how important is their business in Russia. Something similar Google has been experiencing in China.
It all comes down to numbers, eventually. If you want to play a game of profit in the certain country, you have no other choice than to embrace the local rules more or less willingly. In the Russian case a fragile balance between the economy and politics has to be achieved this way or another.
t is not too late, for all of you who are reading this post to think twice before write or send an email in the future. Unfortunately, all we needed was one federal judge to say emails are the legitimate evidence target. The police can treat them in the same way as they are already doing with our hard drives.
Just imagine a situation where someone knocks at your door informing you that there is a warrant, which allows him to keep and examine your emails. All what you have written or received in your inbox can be used against you as the legitimate evidence at the court of law. How do you feel about this one?
Without any exaggeration we can say that we are completely surrounded. First, our smartphones, and now emails. The federal government obviously has an intention to turn all elements associated with our privacy into bulletproof evidences. What is next? Do you dare to guess?
What are we supposed to do? To buy old typing machines just like Germans are doing after the recent spying controversy? To use pigeons messengers? Seriously? When we will have a courage to say enough is enough? Maybe, they will use these posts as the evidence in the near future? Who knows?