Search

band annie's Weblog

I have a parallel blog in French at http://anniebannie.net

Tag

privacy

Security Researcher Christopher Soghoian on How to Use a Cellphone Without Being Spied On

INTRODUCTION HERE

CLICK ON IMAGE FOR PART TWO

Chris-Soghoian-ACLU-Cell-Phones-3

On the other hand, there are now a number of apps and Internet-based services that you can run on your smartphone that will give you much, much more secure communications. So, Apple has built iMessage into its iPhone product for several years. If you have an iPhone and you’re sending a text message to someone else who has an iPhone, this is used by default. Those messages are encrypted in a strong way. They’re sent via Apple’s system, and it’s very, very difficult for governments to intercept those. If you’re using WhatsApp, which is a service now owned by Facebook and used by hundreds of millions of people around the world, if you’re using WhatsApp on Android, it’s encrypted, again, in a very strong way. And if you have an Android or iPhone, you can download third-party apps, the best of which are called Signal for iOS and TextSecure, T-E-X-T Secure, from Android. These are best-of-breed free applications made by top security researchers, and actually subsidized by the State Department and by the U.S. taxpayer. You can download these tools today. You can make encrypted telephone calls. You can send encrypted text messages. You can really up your game and protect your communications.

To be clear, if you are a target of a law enforcement or intelligence agency and they really care about you, they can hack into your phone, and these tools won’t stop that. But you can make it much more difficult. You can make it so that they have to work really hard. And, you know, it’s unfortunate that the phone companies, that AT&T and Verizon haven’t warned their customers. They should be telling the public. They haven’t. But we can do things right now to make wiretapping much more difficult and much more expensive.
…..
CHRISTOPHER SOGHOIAN: So, if you have an Apple device, you could download—so FaceTime is already installed in your iPhone. It’s built by Apple. It’s built into the iPhone. If you make a FaceTime audio or video call from your iPhone to someone else’s iPhone or iPad, it’s encrypted with very strong technology, and it will be very, very difficult for a government to intercept. If you have an—if you don’t want to use an Apple encryption product, there’s a fantastic app in the app store called Signal, S-I-G-N-A-L. It’s free. It’s open source. It’s very, very good. That makes encrypted telephone calls anywhere in the world for free. Even if you’re not worried about security, it’s actually a way of saving money on your phone bill. And then if you’re using Android, there’s a great app by the same people who do Signal called RedPhone, R-E-D-P-H-O-N-E. Again, it’s free. It’s supported by the U.S. government. So you’re paying for it anyway; you might as well use it. And that will also let you make free encrypted telephone calls. These tools work, and they make—they make wiretapping much more expensive, which is what we want. We want governments to have to focus their resources on the people that really matter, the real threats, but they shouldn’t be able to spy on everyone at low cost.

Advertisements

Hacktivism and its price

CLICK ON IMAGE

barrett brown

TRANSCRIPT /

Journalist Barrett Brown spent his 300th day behind bars this week on a range of charges filed after he used information obtained by the hacker group Anonymous to report on the operations of private intelligence firms. Brown faces 17 charges ranging from threatening an FBI agent to credit card fraud for posting a link online to a document that contained stolen credit card data. But according to his supporters, Brown is being unfairly targeted for daring to investigate the highly secretive world of private intelligence and military contractors. Using information Anonymous took from the firm HBGary Federal, Brown helped discover a secret plan to tarnish the reputations of WikiLeaks and journalist Glenn Greenwald of The Guardian. Brown similarly analyzed and wrote about the millions of internal company emails from Stratfor Global Intelligence that were leaked in 2011. We speak to Peter Ludlow, professor of philosophy at Northwestern University, whose article “The Strange Case of Barrett Brown” recently appeared in The Nation. “Considering that the person who carried out the actual Stratfor hack had several priors and is facing a maximum of 10 years, the inescapable conclusion is that the problem is not with the hack itself but with Brown’s journalism,” Ludlow argues. He adds that the case against Brown could suggest criminality “to even link to something or share a link with someone.”
Transcript

This is a rush transcript. Copy may not be in its final form. FOR FULL TRANSCRIPT CLICK HERE

also on DN :

Details continue to emerge on U.S. surveillance of the global Internet. The Washington Post reports the National Security Agency’s PRISM program mining the servers of major Internet companies like Google and Facebook has run in parallel with a separate operation called “Upstream.” Through Upstream, the NSA taps directly into the fiber-optic cables that carry the vast majority of global Internet traffic. The United States has ensured access by sending a group of federal officials dubbed “Team Telecom” to reach agreements with global telecom providers. A 2003 agreement with the Asia-based Global Crossing imposed “an internal corporate cell” of Americans to make sure surveillance requests were approved. Global Crossing was also forced to establish a U.S.-based “Network Operations Center” where U.S. agents could show up with just 30 minutes’ notice.  The United States has used the Federal Communications Commission as leverage to hold up the approval of cable licenses sought by foreign firms.

The tech giant Google has confirmed the National Security Agency furnished some of the code installed in its new Android phone. The NSA says the code is intended to enhance security against hackers and marketers, but will not confirm whether it also aids the agency’s PRISM program monitoring the global Internet.

Create a free website or blog at WordPress.com.

Up ↑