By Dr. Mercola

Big Brother is watching. No kidding. And the warning is coming from none other than Google, which says government spies may be spying on you. Some believe the Google announcement may be related  to the recent discovery of the data-mining virus named "Flame." In a June 3 New York Times article, Andrew Kramer and Nicole Perlroth write1:

"When Eugene Kaspersky, the founder of Europe's largest antivirus company, discovered the Flame virus that is afflicting computers in Iran and the Middle East, he recognized it as a technologically sophisticated virus that only a government could create.

He also recognized that the virus, which he compares to the Stuxnet virus built by programmers employed by the United States and Israel, adds weight to his warnings of the grave dangers posed by governments that manufacture and release viruses on the internet.

"Cyberweapons are the most dangerous innovation of this century," he told a gathering of technology company executives... While the United States and Israel are using the weapons to slow the nuclear bomb-making abilities of Iran, they could also be used to disrupt power grids and financial systems or even wreak havoc with military defenses."

Mr. Kaspersky claims he was called in to investigate the new virus on behalf of the International Telecommunication Union, an agency of the United Nations. The virus was allegedly erasing files on computers belonging to the Iranian oil ministry.

What makes the Flame virus a major potential concern for common citizens of the world is the fact that it's the first virus found with the ability to spread wirelessly by attaching itself to Bluetooth-enabled devices.

Once there, it can not only trace and steal information stored on those devices; according to Kramer and Perlroth the program also contains a "microbe" command that can activate any microphone within the device, record whatever is going on at the time—presumably whether you're actually using the device or not—and transmit audio files back to the attacker. This, clearly, has huge privacy implications were it to be deployed against civilian populations.

New Revelations about the Links Between Flame and Stuxnet

While cybersecurity experts initially claimed there were no links between the earlier Stuxnet worm and the Flame virus, a recent article on The Verge now reports that the two are undoubtedly related2. Joshua Kopstein writes:

"[I]n examining an earlier version of Stuxnet, the lab's researchers now find that they were wrong: a previously overlooked module within the virus is now providing the "missing link" between the two pieces of malware. The module in question... matches very closely with a module used by an early version Flame. "It was actually so similar, that it made our automatic system classify it as Stuxnet," wrote Alexander Gostev... indicating that the module was likely the seed of both viruses. "We think it's actually possible to talk about a 'Flame' platform, and that this particular module was created based on its source code."

The new evidence suggests that Stuxnet and Flame are two sides of the same coin, with the former built for sabotage and the latter for surveillance. But researchers also say that the Flame platform pre-dated Stuxnet and its sister, Duqu, and was likely built in the Summer of 2008."

InformationWeek Security recently offered the following advice3:"... Microsoft has been working quickly to patch the certificate bug exploited by Flame. Notably, Microsoft released an update Friday [June 8] for Windows Server Update Services (WSUS) 3.0 Service Pack 2 (SP2), which according to the release notes "strengthens the WSUS communication channels ... [by] trusting only files that are issued by the Microsoft Update certification authority."

Microsoft is also set to issue an update Tuesday--as part of its monthly Patch Tuesday--that will further update all supported versions of Windows to block Flame. Security experts are recommending that all users install the update as soon as possible, since attackers will likely attempt to use the certificate vulnerability before it becomes widely patched. "Apply the certificate patch released a week ago today if you haven't done so already," said SANS Institute chief research officer Johannes B. Ullrich in a blog post. "This way, no patch signed by the bad certificate should be accepted tomorrow. Patch Tuesday is one of the best dates to launch such an attack, as you do expect patches anyway."

When installing the update, however, do so preferably only if using a trusted environment. "Avoid patches while 'on the road.' Apply them in your home [or] work network whenever possible," said Ullrich. "This doesn't eliminate the chance of a 'man in the middle' (MitM) attack, but it reduces the likelihood."

For users who must update while on the road, perhaps because they travel frequently, always use a VPN connection back to the corporate network, said Ullrich, since hotel networks can be malware and attack hotbeds. "Hotel networks and public hotspots frequently use badly configured HTTP proxies that can be compromised and many users expect bad SSL certificates--because of ongoing MitM attacks," he said."

Spy Central: Utah

In related news, Wired Magazine recently reported that the US government is building a massive spy center, right in the heart of Mormon country, in Bluffdale, Utah4--so massive, in fact, that once finished, the facility will be five times larger than the US Capitol.

According to Wired Magazine:

"Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world's communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013.

Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital "pocket litter." It is, in some measure, the realization of the "total information awareness" program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans' privacy.

But "this is more than just a data center," says one senior intelligence official who until recently was involved with the program. The mammoth Bluffdale center will have another important and far more secret role that until now has gone unrevealed. It is also critical, he says, for breaking codes.

And code-breaking is crucial, because much of the data that the center will handle—financial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, confidential personal communications—will be heavily encrypted. According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US.

The upshot, according to this official: "Everybody's a target; everybody with communication is a target."[Emphasis mine]

That about says it all. And for those of you still under the mistaken belief that the US government does not have the authority to spy on its citizens, consider the following:

"... [The NSA] has undergone the largest building boom in its history, including installing secret electronic monitoring rooms in major US telecom facilities. Controlled by the NSA, these highly secured spaces are where the agency taps into the US communications networks, a practice that came to light during the Bush years but was never acknowledged by the agency. The broad outlines of the so-called warrantless-wiretapping program have long been exposed...

In the wake of the program's exposure, Congress passed the FISA Amendments Act of 2008, which largely made the practices legal. Telecoms that had agreed to participate in the illegal activity were granted immunity from prosecution and lawsuits. What wasn't revealed until now, however, was the enormity of this ongoing domestic spying program.

For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail...

As chief and one of the two cofounders of the agency's Signals Intelligence Automation Research Center, [William] Binney and his team designed much of the infrastructure that's still likely used to intercept international and foreign communications. He explains that the agency could have installed its tapping gear at the nation's cable landing stations—the more than two dozen sites on the periphery of the US where fiber-optic cables come ashore.

If it had taken that route, the NSA would have been able to limit its eavesdropping to just international communications, which at the time was all that was allowed under US law.

Instead it chose to put the wiretapping rooms at key junction points throughout the country... thus gaining access to not just international communications but also to most of the domestic traffic flowing through the US. The network of intercept stations goes far beyond the single room in an AT&T building in San Francisco exposed by a whistle-blower in 2006. "I think there's 10 to 20 of them," Binney says... The eavesdropping on Americans doesn't stop at the telecom switches. To capture satellite communications in and out of the US, the agency also monitors AT&T's powerful earth stations...

... Binney suggested a system for monitoring people's communications according to how closely they are connected to an initial target. The further away from the target—say you're just an acquaintance of a friend of the target—the less the surveillance. But the agency rejected the idea, and, given the massive new storage facility in Utah, Binney suspects that it now simply collects everything..."

To learn more, I highly recommend reading the featured Wired article5 in its entirety. It's a fascinating read, but it will not likely make you sleep better at night. The full article is available on their website and is free to view. 

Google Also in the Privacy News

Beginning the first week of June, Google will warn you every time it picks up activity on your computer account that looks suspiciously like someone trying to monitor your computer activities. Google won't say how it figured out that state-sponsored attackers may be attempting to compromise your account or computer. But it's promised to let you know if it thinks Big Brother is tuned in to what you're doing.

As recently reported on the New York Times' blog6, the warning will pop up at the top of your Gmail inbox, Google home page, or Chrome browser, stating:

"Warning: We believe state-sponsored attackers may be attempting to compromise your account or computer."

According to a Google blog post by Eric Grosse, VP of Security Engineering at Google7:

"If you see this warning it does not necessarily mean that your account has been hijacked. It just means that we believe you may be a target, of phishing or malware for example, and that you should take immediate steps to secure your account.

Here are some things you should do immediately: create a unique password that has a good mix of capital and lowercase letters, as well punctuation marks and numbers; enable 2-step verification as additional security; and update your browser, operating system, plugins, and document editors.

Attackers often send links to fake sign-in pages to try to steal your password, so be careful about where you sign in to Google and look for https://accounts.google.com/ in your browser bar. These warnings are not being shown because Google's internal systems have been compromised or because of a particular attack."

The Next Big War Zone = the Internet

Unless you've been living under a rock this past year, you've surely heard about the repeated attempts to restrict your online freedom and grant government near limitless control over the internet and its content.

It began in January with the introduction of two proposed laws in US Congress: the Stop Online Piracy Act (SOPA), and the Protect IP Act (PIPA). While "sold" as laws to address online copyright infringement, most of which allegedly arise from outside the US, both laws contained measures capable of severely restricting online freedom of speech and harm web sites and online communities of all kinds, including this one. After tens of millions of people rose up in various protests, both online and by hitting the pavement, both bills were "indefinitely postponed."

Many have warned, however, that the bills are not "dead" and are likely to return.

It didn't take long for the next round. In April, the Cyber Intelligence Sharing and Protection Act (CISPA) was brought forth, and quickly became described by opponents as an even greater threat to internet freedom than SOPA and PIPA. I won't go into any detailed discussion on these bills here, but simply want to bring your attention to the fact that bills such as these three, while dressed up as laws that will protect you and save you money, are poorly guised attempts to gut privacy laws and open the door for a totalitarian takeover of the internet and its content.

Campaign for Liberty8 is continuing its fight to stop another government intrusion, warning that this coming December, the United Nations will also be meeting to compile even more recommendations for international internet regulations.

While it may seem hopeless at times, I urge you to take an active role anytime the opportunity presents itself to take a stand. I personally believe internet freedom and health freedom go hand in hand these days, as a majority of people get a majority of their health information from freely available web sites such as mine.

Right now, you can sign the Campaign for Liberty Protect Internet Freedom Mandate.

Views: 328

Reply to This

Replies to This Discussion

Your point?

Big Brother has been around for decades. It's not gonna go away anytime soon.

Exactly.

Big Brother is already in your cell phone.  You ready to give that up?

If you're not going to give anything up, then Big Brother will still be with you in 100 other ways.  It's like trying to swat a fly in the middle of locust invasion and think you're making progress.

LOL

Nope, I'd just give it up.  I'm willing to do things like that.  Unlike some.

"THEY" want to control...

Seriously?  This sounds like conspiracy stuff.  Are THEY going to control libraries?  Are THEY going to control bookstores?  Writing?  People outside the country?  Hackers that aren't government workers?

You give way too much credit to an entity that can't keep its own secrets much less anyone elses.

No conspriracy theory it's a proven fact. And the discussion is about internet regulations dear. Not, other media.

 

Proven fact?  Are people being rounded up and placed in camps?  How many people did the government put on its payroll to do all this spying?  Oh, that's right next to none because the government is too busy trying to stay solvent in this economic crunch time.

Big Brother has been around many many years.  All this is nothing new.  The government has been wiretapping since before 9/11.  So unless you can point out some detriment considering the government cannot control any other media, I'd say this is all just 'sky is falling' chicken little conspiracy scare talk.

Big brother is us. Hpw manytimes have you been ina picture if oyu wanted to or not.Plus  I hear convos all the time on my internet when the wires get crossed. N biggie.

Signed your petition. Unlike some, I get it.

You say WOW , that's a proven fact. Read the article honey it has the facts inside. If you want somone(anyone) controling what you can and cannot see or research that's your choice. Just stand on the sidelines and let it happen. And as that's your free choice I have my free choice to do something to try to stop it. Now I got your point of view you can stop your childish arguing over it.

 

Yawn.  Please demonstrate where people have been restricted from getting information and studying that affects the entire nation.

 

You said it's a fact.  So  go ahead, name all these dangers where people have been restricted by the big bad government from getting information and studying what they want.

Remember, you have failed to address why bad things haven't happened even though we've informed you - FACT - that this sort of big brother thing has been going on for decades.

If you can't, and last I checked the Freedom of Information Act was still in force, it's just conspiracy nut stuff.

Aurelia, what browser do you use to view Pagan Space?

Chrome.  And when that crashes, sometimes Mozilla.

Big Brother is everywhere and probably on this site too.. a lot of people here tell all.. like who they are married to or not married to, their sexual preferences, how many kids they have, what kinds of meds they are on and for what ailment, how many pets you have.. etc.. all kinds of stuff...

RSS

© 2019 PaganSpace.net       Powered by

Badges | Privacy Policy  |  Report an Issue  |  Terms of Service