The collapse of the internet and other things to look forward to in 2014

bomb crash

It's inevitable that at this time of year tech companies and analysts like to try to grab headlines with their predictions for the coming 12 months. Security specialist Kaspersky Lab is no exception, and guaranteed to make waves is its forecast of the collapse of the internet as we know it.

This, it says, will be driven by pressure to break the web up into national segments. So far this has only applied to counties like China with its Great Firewall, but other nations including Russia have planned legislation to prohibit the use of foreign services. In November, Germany announced that all communications between the German authorities would be fully locked within the country. Brazil too has announced its plans to build an alternative internet channel so as not to use the one that goes through Florida.

Continue reading

Surprise, surprise! Federal judge says NSA's mass surveillance is legal

nsa

The NSA's indiscriminate collection of telephone data has been ruled as legal by a federal judge in New York. Judge William Pauley ruled that the National Security Agency's activities do not violate the constitution. Just last week, another federal judge suggested that the collection of phone records was likely to violate the US constitution and a White House review panel has already recommended that President Obama stops the NSA in its tracks.

The American Civil Liberties Union (ACLU) had brought a case to court challenging the NSA program, but Judge Pauley's ruling put an end to this. It looks like there could be something of a battle ahead, and the latest ruling opens up the possibility that the matter will be settled by the US Supreme Court. Referring to the fourth amendment, Judge Pauley said that whether it "protects bulk telephony metadata is ultimately a question of reasonableness."

Continue reading

Edward Snowden calls for an end to spying in Christmas address to the UK

070990-nsa-whistleblower-edward-snowden

At this time of year in the UK it is traditional for the Queen to record a message to the nation. Broadcast on TV at 3pm just as everyone is recovering from Christmas lunch, she looks back over the year in a speech which usually has a reflective tone. In recent years there have been numerous alternatives to the Queen's speech, with broadcaster Channel 4 giving a platform to the funny, the controversial, the meaningful and the strange. Whilst not necessarily anti-monarchy, it is a broadcast that is certainly non-monarchist, and frequently of a more left-wing bent. This year, Edward Snowden used it as a mouthpiece.

The 30-year-old former NSA worker who blew the cover off the secret surveillance that is being carried out on web users all over the world. He is currently living in Russia where he sought asylum having fled from the US earlier in the year after threats of espionage charges. The two minute long address makes reference to the book 1984, with Snowden saying that George Orwell had forewarned us of such dangers but said that the spying techniques described in the classic work were nothing compared to what actually exists now.

Continue reading

RSA takes one for the team, but which team?

RSA_EMC

Edward Snowden says (according to Reuters) that RSA Security accepted $10 million from the National Security Agency in exchange for installing (or allowing to have installed) a secret backdoor so the NSA could decrypt messages as it pleased. Hell no says RSA (a division of storage vendor EMC), stating in very strong terms that this was not at all the case. But then in a second day look at the RSA/EMC statement bloggers began to see the company as dissembling, their firm defense as really more of a non-denial denial. So what’s the truth here and what’s the lesson?

For the truth I reached deep into the bowels of elliptic cryptography to an old friend who was one of the technology’s inventors.

Continue reading

The continued existence of The Pirate Bay provides comfort in troubled internet times

revolution

The other day I chronicled the strange journey of The Pirate Bay, a BitTorrent site that is notorious for finding less-than-legal software, movies, TV shows, music…you name it. Sure, it’s wrong to steal content, no matter how you justify it -- people deserve to be paid for their work. After all, I don’t work for free, I fully expect to be compensated for my efforts. I have a wife and kids to provide for. I would guess you also do not labor for free.

However, that piece about the many domains the service has recently occupied, combined with something my colleague Mark Wilson brought up about the ridiculous porn filtering in the UK, got me thinking.

Continue reading

Some thoughts on how a Grinch stole Target’s Christmas

target

There was a time when "activist investor" Carl Icahn actually owned and ran businesses, one of which was TransWorld Airlines (TWA), eventually sold to American Airlines. In an attempt to cut costs, TWA under Icahn outsourced reservation service to a call center built in a prison with prisoners on the phone. When you called to book travel you were giving your credit card number to a felon and telling him when you’d be away from home. Smart move, Carl, and very akin to what may have caused the post-Thanksgiving theft of 40 million credit card numbers from Target, the U.S. discount retailer.

Target used to do its IT all in the USA, then to save costs they moved IT to a subsidiary in India. Care to guess where the Target data breach came from? I’m guessing India. I’m also guessing that there will never be any arrests in the case.

Continue reading

Take control of your privacy in Windows 8.1

privacy-do-not-disturb

Privacy has been a hot topic throughout 2013 and it’s always worth taking a little time to make sure you’re not accidentally sharing more information with the world than you might want to. Microsoft’s tiled operating system comes with some handy privacy controls baked in that you should definitely take a look at if you haven’t already.

This feature won’t stop the NSA spying on you, but it can prevent apps from accessing personal details like your name, photo, location and account info, and prevent them from using your PC or tablet's camera and microphone without your knowledge.

Continue reading

Gallows humor for the NSA privacy debate

williamsessions

It’s hard to believe sometimes, but I began writing my columns -- in print back then -- during the Reagan Administration. It was 1987 and the crisis du jour was called Iran-Contra, remember it? Colonel Oliver North got a radio career out of breaking federal law. The FBI director back then was William Sessions, generally called Judge Sessions because he had been a federal judge. I interviewed Sessions in 1990 about the possibility that American citizens might have their privacy rights violated by an upcoming electronic surveillance law. "What would keep an FBI agent from tapping his girlfriend’s telephone?" I asked, since it would shortly be possible to do so from the agent’s desk.

"It would never happen", Sessions said.

Continue reading

Tech giants' surveillance reform rally is disingenuous and self-serving

Businessman Suit Fingers Crossed Swear

I'll be brief, because I'm seven days now with the flu and don't feel much like writing. But today's "open letter" for global government surveillance reform demands rebuke.

I'm all for curbing government snooping, but what about corporations collecting information? Tech Giant's -- AOL, Apple, Facebook, Google, LinkedIn, Microsoft, Twitter, and Yahoo -- reform rally is disingenuous and self-serving. These same companies collect mountains of personal information for profit. So, what? It's okay for them to snoop, but not governments?

Continue reading

Darik’s Boot and Nuke lets you securely wipe all your PC’s hard drives

dban200-175

When you sell or scrap a PC it’s important to consider your data security. The hard drive will almost certainly have contained confidential information at some point -- user names, passwords, financial details -- and even it seems empty now, it’s worth making sure that none of this can ever be recovered.

Darik’s Boot and Nuke is an open-source tool which offers one possible solution. Burn its ISO image to disc, use this to boot your PC, and it’ll securely wipe your hard drive with the minimum of hassle.

Continue reading

FTC charges Android flashlight developer with leaving users in the dark about data usage

Flashlight

The permissions screen that pops up during the installation of an Android app has become the new EULA. Very few people bother to read through what is on screen before clicking through and going ahead with the installation -- you could be signing your life away for all you know!

Apps will let you know if they make use of your location, have access to your contacts, could send messages on your behalf and numerous other things. But in the case of Brightest Flashlight Free it turned out that the app was not only sharing users' location and device ID information with third party advertisers, but it was doing so secretly.

Continue reading

TunnelBear offers an easier way to stay anonymous online

tunnelbear

VPN software can be great for browsing anonymously, bypassing trackers, perhaps avoiding some web censorship. But it can also be awkward to set up, tricky to use, with all kinds of potential pitfalls and issues to consider.

TunnelBear is, fortunately, a little different. It’s a solid and reliable VPN service with all the functionality you need (and more, probably), but smart design means it also keeps any of the usual hassles to an absolute minimum.

Continue reading

F-Secure Key: a password manager for iOS, Android, Windows, Mac

F-Secure-Key-200-175

Helsinki-based security company F-Secure has released Key, a password manager for iOS, Android, Windows and Mac.

The program has similar features to many competitors. You can enter your login details for multiple URLs; a secure password generator helps you generate new credentials, and your AES-encrypted database is protected by a single master password.

Continue reading

Symantec predicts we’ll start taking our privacy more seriously in 2014

crystall ball

About this time of year Symantec starts gazing into the company crystal ball and making predictions on what the future holds -- security wise -- for us all. The 2014 list is very short, just four items, but it’s an interesting selection nonetheless.

Given that 2013 put our lack of privacy front and center with stories of PRISM, NSA spying and numerous hacks, it’s no surprise that for the first prediction, Symantec thinks that people will finally begin taking active steps to keep their information private in 2014.

Continue reading

Q&A with secure communications service Perzo

Cloud Security Communications

The need for more secure communication services has certainly spiked in the wake of the NSA spying revelations, with providers placing a higher emphasis on keeping their users' personal and work information safe from unwanted access. After all, those users expect (and demand) them to do so. As a result, it is not out of the ordinary to see the word "secure" being used as one of the many buzzwords that describe such services nowadays. The question is whether the presentation matches the behind-the-scenes reality.

Among the slew of services that promise secure communications is Perzo, which launched as a beta in late-August 2013. Perzo was founded by David Gurle, who is best known for his former roles as head of the Windows Messenger development and general manager and vice president of Skype for Business in the early 2000s. The service piqued my attention, and I chatted with the man to find out what sort of features and security options Perzo can bring to the table as a newcomer in the "secure communications application" market.

Continue reading

Load More Articles