Deadly Cyber Games


One South Korean intelligence officer committed a suicide as a result of the unprecedented cyber spy scandal, which has deeply disturbed this country. It turns out that South Korea was importing some software “solutions” from Italy, which are supposed to be used against the North Korea.

With all due respect, the North Korean IT infrastructure is rather a modest one. Therefore, you really do not have to bother yourself with the state of the art spy technology in this field. In addition, someone among South Korean intelligence officers has figured out that this thing can be used in the home field.

This is how, we have ended up with one of the biggest cyber scandals in the recent South Korean IT history. Someone has been spying on his or her own fellow citizens. The pressure was so strong that one man took his own life, rather than to be a part of this scandal.

So, what is the moral of this sad story? One thing obviously comes without saying. Cyber actions derived from the virtual world can have the serious real life consequences. You just cannot play with other people’s privacy with no consequences, this way or another. RIP you poor man.

Web Camera – Real Trouble


Do you put something over your web camera? Do not be shy. You are among your friends. According to the findings of the Kaspersky Lab one in five persons does it on a regular basis. On the other hand, in China, one in two people does not forget to disable his or her web camera in such a way. Why?

Well, it is quite simple. No one likes to be watched. We all appreciate our privacy. Especially when we sit in front our computers in the comfort of our homes. Some of us do not like to wear too much clothes in such situations. Some of us have tons of notes next to their computers. Is this enough for you?

However, you should be fully aware that there is no absolute protection in this matter. Although, your web camera may be neutralized, its microphone still works and records with no troubles. In addition, your pictures or videos you make with a web camera can be intercepted, as well.

Here is a simpler solution. Buy yourself a laptop or tablet with no web camera. How about the guys, who are disabling their smartphone cameras? Our privacy related fears and paranoia makes us to apply primitive and inefficient safety measures. Someone is watching you while you read this post.

Spying On A Spy?


So, what do you think about this picture? This a nice looking Greenpeace and a bunch of other similar organizations and activists balloon, which is floating over the NSA’s data facilities in Bluffdale, Utah. Why? Well, to draw our attention with the simple sign: The NSA – Illegal Spying Bellow.

How can they do such a thing? Is it illegal? The NSA can call a couple of fighter jets to blow it away from the sky. Yet, here it flies, making itself to be an outstanding object for making fantastic pictures. Can this one change something or is it going to end up its purpose in annoying the NSA guys?

Well, this is hard to say for certain. The main thing is that we are talking and thinking about what the NSA is doing to and with us. And, hopefully something good will come out of it. So, this can easily turn out to be a balloon of hope. However, we should hold our horses with this one and be realistic.

It takes more than one balloon to teach some discipline the guys in the black suits from the NSA. And yet, there is a strong hope that the public pressure can be strong enough to really turn the tide one day. Until then, we will launch balloons, write letters, make movies, and something new you come up with.

You Can Hide, But You’ll Be Recognized


Do you recall how the updated FBI facial recognition technology was under the tremendous pressure and criticism as being extremely expensive and insufficiently efficient? It was even compared to the one used by Facebook. The most popular social network in the world apparently much bigger database in this matter.

For what is worth, the FBI was able to close the 15 years old case, thanks to this facial recognition technology. One notorious child abuser was caught in Nepal against all odds. This amazing story really makes you think seriously about the potential implications of the latest technologies.

On the other hand, we just got one more confirmation of an old and simple IT security rule. There are no bad technologies or apps, only good or bad people who use them this way or another. This is definitely something worth remembering and repeating as many times as possible.

Just imagine what we could do, if we were to use available apps and technologies for some other things rather than spying and advertising. Would not that be something to wish for? Until then, these kinds of events will be treated as lonely and positive incidents. Unfortunately.