By Carl Weiss
You see them at
intersections, on buildings and at the mall.
Casinos are chock full of them, as are banks, department stores and the
corner 7-11. At least one world-renown
author has written a book about a society beset by them and the current President of
the United States recently spoke about them when he said, "In the abstract, you
can complain about Big Brother and how this is a potential program run amok,
but when you actually look at the details, then I think we've struck the right
balance."
The
author I mentioned is George Orwell, who penned a novel about the very thing
that President Obama was talking about. Nineteen Eighty-Four was the novel that depicted a police state bent on tracking the movements
and thoughts of its citizens. The novel’s rallying cry was one of, "Big
Brother Is Watching You." This is
the very same Big Brother that the President called by name in one instance
only to shrug it off at the next.
Oh Brother!
Oh Brother!
While
the Commander in Chief was talking specifically about the exploits of the NSA, what
most people do not understand is that the spy agency is only the tip of a vast
surveillance iceberg that operates with impunity on a worldwide basis. Sometimes its product is being watched by
various federal, state or local government agencies. Sometimes it is perpetrated by big business. At other times it can be under the control of
everyone from snooping ex-husbands or wives, to nosy neighbors, prying
teenagers or criminal elements that intend on doing you harm.
The
fact of the matter is that it’s almost too easy to spy on the public these
days. Not only are surveillance cameras cheap to own and
operate, but they are now built into every laptop, tablet and Smartphone on the
market. Many automobiles come from the
factory with them already installed.
There are even industries built around installing them in and around
homes and offices. Since most of these
devices are Internet-enabled, this means that off-the-shelf software is all it
takes to hack into and take control of these cameras.
Eyes See You
Think
that sounds more than a little paranoid?
Tell that to Miss Teen USA Cassidy Wolf, who was blackmailed by a hacker
who used her laptop’s webcam to take nude photos of her without her
knowledge. The hacker used what’s known
in the industry as a remote administration tool (RAT) that is able to not only
remotely operate a victim’s webcam , but it can also disable the
little light that lets someone know that their webcam is on. (And to think that
not too long ago celebrities had only to worry about pushy paparazzi trying to
catch them in compromising situations.)
In September, the FBI arrested a 19-year-old man named Jared
Abrahams from Temecula, California, on charges that he hacked into the social
media accounts of several women, including Wolf, and took nude photographs of
them by remotely controlling their webcams. He then allegedly contacted the
victims and threatened to post the pictures on their social media profiles
unless they sent him more nude photos and videos or did what he demanded for
five minutes in Skype video chats. http://www.macworld.com/article/2081940/researchers-older-mac-webcams-can-spy-without-activating-warning-light.html
RATS
While
ratting has gotten much of the notoriety when it comes to using a target’s own
camera to spy on them, it is not the only way to break and enter
digitally. One of the easiest ways to
break into a computer is via email. Just
before Christmas 2013, staffers from the Electronic Frontier Foundation
(Dedicated to Defending Your Rights in the Digital World) received an email
purportedly inviting them to a conference in Asia hosted by Oxfam
International. The email directed EFF’s
staff to click on a pair of links that purportedly contained information
regarding the conference. When they
realized that the links were not hosted on Oxfam’s domain, but resided instead
on Google drive they smartly did not click on the link which in all likelihood
contained malware.
EFF has written extensively about
the worsening situation for bloggers in Vietnam, supporting campaigns to free
high-profile bloggers such as Le Quoc Quan and Dieu Cay, and criticizing the Vietnam’s
Internet censorship bill. Vietnam’s
Internet spying campaign dates back to at least March 2010, when engineers at
Google discovered malware
broadly targeting Vietnamese computer users. The infected machines were used to
spy on their owners as well as participating in DDoS attacks against dissident
websites.
Of
course the majority of the public are not on the blacklist of unfriendly
governments. So why should the average
Joe or Jane worry about their privacy being invaded by hackers? Because some hackers make a tidy living from
this kind of activity, that’s why. And
I’m not talking about sextortion here.
As
long as there have been homes and businesses there have been burglars. In the past, thieves had to risk being
detected while they cased a home or a neighborhood in search of targets of
opportunity. (This is why the
neighborhood watch was invented.) The
problem in the digital age is that thieves no longer have to prowl the
neighborhood to determine a victim’s patterns.
That’s because your home or business may become their unwitting
accomplice.
Instead of a Midnight Snack, Could Your Fridge Abet a Midnight Attack?
Instead of a Midnight Snack, Could Your Fridge Abet a Midnight Attack?
The
latest things to hit the market are smart appliances. Everything from smart lighting and
entertainment centers, to wireless security devices and the networks upon which
they operate are subject to being hacked.
As a rule, if you can use your Smartphone to set your home’s thermostat,
open your garage door or let you view your home when you are away, then so can
a thief. While “Smart Homes” are all the
rage, a number of people in the know consider them to be a major chink in your
home’s security armor.
Could hackers
gather information from smart lighting, entertainment, or security devices – or
the networks on which they communicate – to determine patterns of when you are
home, when you are likely to have company over, and when your house is empty?
Internet enabled appliances, which run operating systems like
Windows or Android, can be co-opted by hackers’ malicious code in the same way
your computer or phone can be hijacked. Once taken over by the hacker software,
the appliance is used to send spam (containing virus links, for example) or to
mount denial-of-service attacks. A hacker who had co-opted multiple
Internet-equipped refrigerators and garage door openers could use their
combined power to inundate an Internet target with email or other malicious
activity.
Read more at http://www.wnd.com/2014/01/is-your-fridge-sending-malicious-emails/#1fRkHMH7DX8YpXIC.99
Read more at http://www.wnd.com/2014/01/is-your-fridge-sending-malicious-emails/#1fRkHMH7DX8YpXIC.99
So
does the prospect of your fridge spying on you weird you out? Then just wait until you hear what the
government has in store for your car.
Called Vehicle-to-Vehicle Technology, or V2V, it is being touted as a
way of making driving safer by enabling vehicles to communicate with one
another in real time. This means the
addition of such things as motion detectors, radio beacons and, you guessed it,
cameras that are designed to help drivers avoid collisions by either warning
them audibly or forcibly taking control of the vehicle to avoid a
crash. Anyone who has seen Minority
Report knows what else this technology could be used to accomplish.)
Transportation Secretary Anthony Foxx said the Obama
administration decided to announce its intention to require the technology in
new vehicles in order to "send a strong signal to the (automotive
industry) that we believe the wave of the future is vehicle-to-vehicle
technology."
Read more: http://www.abc15.com/dpp/news/national/v2v-technology-us-unveils-plan-for-cars-of-the-future#ixzz2sJcamcLp
Shop Til You Drop?
Read more: http://www.abc15.com/dpp/news/national/v2v-technology-us-unveils-plan-for-cars-of-the-future#ixzz2sJcamcLp
Shop Til You Drop?
This is on top of
all the automated surveillance systems already being used in shopping malls and big box stores.
Not only do shopping center eyes in the sky watch for shoplifters and observe
employees, but they can also be equipped with face recognition software, or be
programmed to observe and track shoppers as they window shop and make
purchases. More disturbing still is the fact that coming to a mall near you is
a new technology that will allow store owners to tailor ads displayed in
strategically placed kiosks that match a shoppers demographics.
Shoppers
at the new International Finance Center Mall in Seoul can find their way around
the four-story complex by approaching one of 26 information kiosks. When they
do, they also are being watched. Just above each kiosk's LCD touch screen sit
two cameras and a motion detector. As a visitor is recorded, facial-identity
software estimates the person's gender and age.
The system's makers, two companies from South Korea's SK Holdings Co. conglomerate, plan
to allow advertisers to tailor interactive ads on the kiosk by those
attributes.
So
to sum it up, when it comes to who’s watching you in the digital age, a better question is, "Who isn't watching?" I mean, you can’t
take a walk, you can’t go shopping, you can’t take a drive and you can’t stay
home without being observed, categorized and computed. Or, to put it bluntly, when it
comes to eye spies, it turns out that George Orwell was an optimist.
When he
isn’t hiding under his desk, Carl Weiss is cohost of the BlogTalk Radio and
YouTube video series Working the Web to Win.
It's a very wired world!
ReplyDeleteSomebody is always watching you. Like the traffic lights that can nab you for traffic violations.
ReplyDeleteA better question is, "Who isn't watching you?"
ReplyDelete