#RSS Podcasts E-BUSINESS | TECHNOLOGY | CRM | LINUX | ECTNEWS.COM Welcome Guest | Sign In TechNewsWorld.com [260x40-tnw.gif] Search ____________________ Privacy * Computing + Applications + Data Management + Hardware o Chips o Personal Computers o Servers + Operating Systems * Internet + Internet of Things + Online Entertainment + Search Tech + Social Networking + Web Apps * IT + Developers + IT Leadership + Network Management * Mobile Tech + Mobile Apps + Smartphones + Tablets + Wearable Tech + Wireless Networking * Reviews * Security + Cybersecurity + Hacking + Malware + Privacy * Technology + Audio/Video + Emerging Tech o Virtual Reality + Gaming + Home Tech + How-To + Photography + Science o Health o Space + Tech Buzz + Tech Law + Transportation * Tech Blog * Reader Services + Account Management + Discussion + News Alerts + Newsletters + Reader Surveys + RSS / XML Headline Feeds + Search ECT News Network + + ECT News Network Map o CRM Buyer Site Map o E-Commerce Times Site Map o LinuxInsider Site Map o TechNewsWorld Site Map * | * Software Buyers Guide January 22, 2016 01:14:37 PM PST TechNewsWorld > Security > Privacy | Next Article in Privacy Government Surveillance: What to Do, What to Do? By Richard Adhikari Apr 21, 2015 10:36 AM PT The CIA has been trying to hack into iOS for years. British and American agencies reportedly have collaborated to create a map of the Internet and Web users. The United States National Security Agency has, together with the UK's GCHQ, reportedly stolen SIM card encryption keys from Gemalto. The FBI is frothing at the mouth over Google's and Apple's encryption of their mobile OSes. Vulnerabilities in Signaling System 7 telephony protocols let third parties eavesdrop on cellphone calls and intercept text messages, despite encryption. Government Surveillance: What to Do, What to Do? Law enforcement agencies in several states in the U.S. are using Stingray devices to scoop up data from everyone's cellphones within range, and reportedly are using private funds to purchase the devices. And, for the third time, the U.S. government is trying to revive CISPA, the Cyber Intelligence Sharing and Protection Act. The latest version of the bill, filed in January, would give the NSA more access to Americans' data and create a data-sharing program between the Department of Homeland Security, the Director of National Intelligence and the Secretary of Defense, without any external accountability and with exemption from the Freedom of Information Act. Meanwhile, Google is fighting a proposed amendment to Rule 41 of the U.S. Criminal Code that might allow the U.S. to hack into computers abroad, GCHQ has used fake LinkedIn pages to target telecom engineers, and the NSA has forced U.S. high-tech companies to include back doors in their hardware and software. President Obama has insisted -- not quite truthfully, it turns out -- that the U.S. government is not conducting surveillance on Americans. Despite trumpeting the president's strong support of privacy, the White House has just come out in support of the renewed CISPA bill. "Hacking is like a gun or any other dangerous tool," said Jonathan Sander, strategy and research officer for Stealthbits Technologies. "People who use it will argue that it's the intention and the results that matter ethically. The difference is that murder is a well understood evil, and stealing information is still morally vague," he told TechNewsWorld. The Dungeons of Despair Billions of dollars are being spent on cybersecurity, but why even bother? If there's a back door, some intrepid hacker will find it sooner or later and leap in. "The greatest security threat isn't wearing a hoodie and armed with a laptop and Metasploit," said Ken Westin, senior security analyst at Tripwire. "They wear suits and are armed with secrecy and legal loopholes," he told TechNewsWorld. The real problem is that government surveillance "appears to be done illegally with little oversight or transparency," Westin continued. "As governments pass laws to crack down on criminal hackers, we are learning that they in many respects are hypocrites. The law needs to provide citizens protection both from criminal hackers as well as our own governments." Espionage and cyberware are impacting businesses around the world because "they get caught in the middle, with foreign nations trying to penetrate their front door and our own governments trying to install and find weaknesses in the back door," Westin observed. The CIA: Tiger or Kitty Cat? Don't be too concerned about the CIA, suggested Brett Fernicola, CISO at Stealthbits. The agency "is one of the biggest leeches and script kiddies to date. Most of what they know infosec-wise was stolen or taken from hackers or legitimate research groups," he told TechNewsWorld. Nevertheless, "the NSA, CIA, Chinese security agencies and many others polluting the security of ecosystems [through hacking] is really bad for trust and for security," warned Eric Cowperthwaite, VP of advanced security and strategy at Core Security. Creating systems that are inherently insecure "is going to destroy trust in operating systems, software, applications and devices," he told TechNewsWorld. The e-commerce ecosystem, in particular, is fundamentally based on trust, Cowperthwaite pointed out. "What happens when the average consumer no longer trusts that the systems they use daily are trustworthy? How will CISOs secure systems when they don't know what's been polluted by government agencies?" A Side Helping of Ethics, Please It's not so much that intelligence agencies spy on people. After all, that's their job, contended Derek Bambauer, professor of law at the University of Arizona's James E. Rogers College of Law. The question is whether their operations are sanctioned by law. The Obama administration has "increasingly sought and used FISA orders" to conduct surveillance of U.S. persons on the grounds of national security, Bambauer told TechNewsWorld. U.S. persons "might" have some Fourth Amendment claims against surveillance, he said, "but the Supreme Court has been very careful never to address this issue, and I don't expect it to do so." Mass surveillance is not unnecessarily unlawful, but it's "best described as being in conflict with individuals' perceptions of ethics and privacy," commented Philip Lieberman, president of Lieberman Software. "The purpose of a government is the protection of its citizens and the promotion of their welfare," he told TechNewsWorld. Technical security measures "are not restraining surveillance, because the NSA and GCHQ are compromising them," pointed out Gregory Nojeim, senior counsel for the Center for Democracy & Technology. That "cries out for a strengthening of the extremely weak standards under which surveillance is conducted," he told TechNewsWorld. What Can Be Done "One of the best ways to secure user data is to not collect it in the first place," Tripwire's Westin said. "The second is to encrypt it and ensure the keys stay safe." In the long run, though, hacking and surveillance will become a way of life, and the old saw about not putting anything online you don't want someone else to know might be the only safe course. [end-enn.gif] __________________________________________________________________ [Richard Adhikari.jpg] Richard Adhikari has written about high-tech for leading industry publications since the 1990s and wonders where it's all leading to. Will implanted RFID chips in humans be the Mark of the Beast? Will nanotech solve our coming food crisis? Does Sturgeon's Law still hold true? You can connect with Richard on Google+. __________________________________________________________________ [ccc-button.png] Get Permission to License or Reproduce this Article Print Email Reprints More by Richard Adhikari Facebook Twitter LinkedIn Google+ [navicon-stumbleupon_32x32.png] RSS [icon_mostpop_14x14roundcorner.png] Most Popular [icon_newsletter_16x12.png] Newsletters [icon_alert_14x14.png] News Alerts How do you rate YouTube vs. TV content? (*) TV is better -- YouTube's content doesn't compare. ( ) YouTube hands down -- it's original, while TV is stale. ( ) There's no comparison -- it's an apple vs. an orange. ( ) I watch and like plenty of both. ( ) With so many content choices, there's still very little that's good. ( ) I'm not tuned into either -- there are better things to do with my time! (BUTTON) Vote or See Results E-Commerce Times Consumer Advocates Push FCC on Broadband Privacy Rules Apple Stats Reflect Slow Slog Toward Diversification ESPN Boss Sees Significant Role for Sling TV Microsoft Cloud Rains Free Services on Nonprofits The Year of Connected and Self-Driving Cars Digital Ad Fraud Could Top $7 Billion in 2016 FTC Issues Regulatory Warning on Big Data Use Cook Slams Door on Backdoor Discussions CRM Buyer Cloud Research Demandware Teams With eBay on Omnichannel E-Commerce Solution The Top 20 CRM Blogs of 2015: Part 1 Vendor of the Future FordPass Aims to Engage Customers on Their Terms Taxpayer Advocate Blasts IRS' Planned Customer Service Revamp Loyalty and Engagement Amazon UK Lets Customers Pay in Installments ECT News Network on Twitter Tweets about "TechNewsWorld" LinuxInsider Snap-Happy Trojan Targets Linux Servers Zero-Day Flaw Puts Millions of Linux Machines, Android Devices at Risk Deepin Takes Linux to New Depths OpenSSH Flaw Could Leak Crypto Keys Dronecode Project Gets More Wind Beneath Its Wings Black Duck Intros Container Scanning Solus Project's Virtues Begin and End With Stability Hack Lets PS4 Run Linux SPONSOR SHOWCASE Marketers - Fill Your Sales Funnel Instantly [sales-funnel_60x60.jpg] Access millions of IT and business decision makers. Our full-service global marketing program delivers sales-ready leads. Learn more. CRM Software Buyer's Guide This free buyer's guide compares the best CRM software systems and allows you to request a price or demo for the system that best fits your needs. TechNewsWorld Headlines TechNewsWorld Facebook Opens Sports Stadium Brave Browser Promises to Defend Users' Privacy Chrome Browser to Blaze With Brotli GM Bug Program Gets Mixed Notices Child Laborers Mine for Cobalt Used in Tech Gadgets SpaceX Finds Silver Lining in Failed Sea Landing Ukraine Mounts Investigation of Kiev Airport Cyberattack Reading, Writing and Minecraft? Inside TechNewsWorld Applications * China Levels Antitrust Allegations Against Microsoft * Slack Energizes App Development With $80M Fund * Linux Mint Upgrade Sparkles Computing * Oculus VR Founder Laments Failure to Communicate on Pricing * Uber Settles With New York AG After 'Playing God' With Data * Iranian Cyberattack on American Dam Viewed As Rarity Data Management * MacKeeper Loses Control of User Data * Federal IT Opportunities: Steady Funding, Constant Challenges * Microsoft Hands Cloud Data Control to German Trustee Emerging Tech * Google's Self-Driving Cars Still Need Human Touch * Google Sharpens Its Virtual Reality Focus * Ford's Self-Driving Cars Brave Ice and Snow Exclusives * HP's Marten Mickos: Open Source Is Not a Business Model * Dan Allen and Sarah White: Documentation Dearth Dooms Open Source Projects * PredictionIO's Simon Chan on Machine Learning by Devs for Devs Hardware * Microsoft Prods Skylake Users to Take the Windows 10 Plunge * IDC: There's Hope on the PC Horizon * What the PC Industry Could Learn From the NRA Internet of Things * Sony Builds Smart Home Hub Into Ceiling Light * Samsung Places Fridge at Center of Smart Home * New Smart Cam Can Distinguish Between Cats, Cat Burglars and Cars IT Leadership * Apple Execs' Salaries Go Up as Stock Goes Down * Zuckerberg Resolves to Invent, Encourages Girls to Invent Too * Cook Rearranges Apple's Executive Suite Mobile Tech * WhatsApp Scraps Fee Model * Samsung Snaps Up Snapdragon 820 Chip Manufacturing Deal * Apple Loses Track of News App Traffic Science * Gadget Ogling: Baring Souls, Soaking Up Sound, and Tracking Babes * NASA Advances Mission to Protect Earth From Asteroids * Researchers May Have Licked Flaming Lithium-Ion Battery Problem Spotlight Features * In the Shadow of the Amazon Prime Juggernaut * The Future of Deliveries Will Be Driverless * Surprise Success: What to Do When Sales Go Through the Roof Tech Buzz * Time Warner Possibilities Put Glint in Apple's Eye * Behind the Scenes at CES * Gadget Ogling: Fitbit's Smartwatch, Super Home Movies, and Flying Machines Publications * E-Commerce Times * TechNewsWorld * LinuxInsider * CRM Buyer ECT News Network Newsletters * E-Commerce Minute * Tech News Flash * ECT News Network Weekly * Editor's Pick * Subscribe Reader Services * Account Management * Discussion * Linking Policy * Network Map * News Alerts * RSS / XML Feeds * Search ECT News Network Facebook Twitter LinkedIn Google+ [navicon-stumbleupon_20x20-gray.png] RSS Company Info * About * Advertising * Business Development * Careers * Contact * Permissions * Reprint Information Terms of Service | Privacy Policy | How To Advertise Copyright 1998-2016 ECT News Network, Inc. All Rights Reserved. Quantcast