What people don’t get about FBI vs. Apple – the NSA, CIA, Government already have back doors
If FBI gets it’s way with it’s paid of judges, over Apples strong stance to add another #backdoor to their services, some news media says the next step is the Government invading your home devices, TV, home phone, anything connected to the internet.
What nobody get’s is that the Government already has a backdoor to your home TV, Computer, Tablet, #Apple device.
The only thing that differs here is, they are making it public knowledge, instead of hiding behind the shadows of leaked documents from spy and leakers like Edward Snowden.
Microsoft handed the NSA access #10 years ago along with Apple , Google is the only big tech company fighting each request for information.
Although the NSA, CIA, FBI already have backdoors, to information, it does not have all the backdoors, unless your iPhone or Microsoft phone is already on their list and they are monitoring the data, so in the case against the #FBI vs APPLE it’s about gaining data they are not already tracking
The details of the FBI case vs. Apple are the facts that the FBI already had all the suspects communications records, and backups of them before the crime took place. The phone they have recovered, is not the phone that the terrorists destroyed but a work phone which was not being monitored.
So according the Intercept, (note that not all the Intercepts articles are truth, but a large percentage of them are, so we will note this information. According to the Intercept, it is not just about the criminals, but it is about watching every person that has an Apple device, (iPhone, iPad, MacBook, iTv etc).
So if the US succeeds in in efforts to create a Hilter like society, which most people are already under, see info below, then it allows other products in the World to sell secure devices.
Let’s look at what the government already has access to.
Every device you can connect to the internet. Through several programs, especially Prism (search this site) and x-keyScore, but also wire tapping, as the former NSA/CIA Director Hayden admitted during Bush’s presidency, he wiretapped every American that had access to the Internet, but not only Americans, every world leader and then some more. Search site for Merkel. Also cited : http://www.thelocal.de/20160223/nsa-eavesdropped-on-merkels-intimate-conversations
Since 2008 Snowden admits, he was one that was looking into innocent American’s webcam’s and even saved bedroom shots. https://t.co/HCTQNA8cYg
GCHQ (the UK’s spy service) tracks everyone in the World that it can, through online Radio, porn, Facebook and web user’s online identities.
Search this site for more information, on how the Government has been spying on innocent Citizens of the United States
Here some common things the Government spies on you
Reading your cloud storage files
Reading your emails
Recording all your photos with GPS metadata
Listening to you through a lamp
Tracking your purchases via shopping cams and registers
Tracking your medical history
Monitoring your Facebook posts, and activity
Analyzing your movie watching habits
Profiling your online purchases
Tracking your use of searches online
Watching you from Satellite or Drones
Tracking your location via car or cell phone
Monitoring your financial transactions
Using Traffic cams to read, and scan your license plate
Sidewalk and public cams
Your cellphone cam and microphone
Your laptop / PC webcam and microphone
Public transportation cams
Credit cards and loyalty cards
And 100 more..
More reading below:
Here are some of the organizations that are spying on you, and some of the simple steps you can take to protect yourself and your information.
Who’s spying on us?
Few organizations have caught as much of the spotlight as the National Security Agency (NSA). But even outside of the States, many governments have their own version of the NSA.
The most prominent ones are:
UK’s Government Communications Headquarters (GCHQ)
Communications Security Establishment Canada (CSEC)
Australian Signals Directorate (ASD)
New Zealand’s Government Communications Security Bureau (GCSB)
Together with the NSA, they form the Five Eyes alliance. These government organizations regularly collaborate on spy programs with silly code names, but their work is no laughing matter.
The government can call upon technology companies to learn about you. Although technology companies wouldn’t want to rat out their own customers, they may simply have no choice. Yahoo CEO Marissa Mayer saidexecutives faced jail if they revealed government secrets. Google has even made a petition for greater transparency.
So technology companies are forced to work with the government. Yahoohas complied with government requests for information.
Technology companies know quite a bit about you
Google snuck code into advertisements that would install tracking cookiesinto users’ devices without their knowledge. Through Android, Google knowsnearly every Wi-Fi password in the world.
Both Apple and Google track your phone’s movements with location-based services. Google scans your emails in order to serve you more relevant advertisements. Apple stores your iMessages. Dropbox reads your files.
As if jail wasn’t compelling enough, the government is also rumored to spy on technology companies.
“It’s really outrageous that the National Security Agency was looking between the Google data centers, if that’s true,” said Google’s Executive Chairman Eric Schmidt to the Wall Street Journal. “The steps that the organization was willing to do without good judgment to pursue its mission and potentially violate people’s privacy, it’s not OK.”
Even if you have nothing to hide, you have the right to your privacy. Here’s how you can protect your data from prying eyes.
How can you protect ourselves from people spying on you?
Credit: Rena Schild / Shutterstock.com
Before we proceed, it’s important to hammer this point home: there is no protection or system that is completely, 100 percent guaranteed, safe from hackers. Given enough time and money, an experienced hacker can hack into any system. (There are people attempting to create a system that can’t be hacked for 100 years.)
Surveillance organizations and technology companies have both time and money. That means yes, they could hack into your computer if they were specifically targeting you. However, it’s unlikely they’d dedicate their resources to zero in on the average citizen. It would cost them too much time and money if they scaled that up across the board.
Imagine if every citizen made it more difficult (and therefore expensive) for these organizations to spy on them. It would become more expensive for these programs to keep an eye on everyone. That would make it more difficult for them to keep a close eye on the majority of people.
A simple, but fundamental, step to privacy is to encrypt your data. Whether it’s the government or some hacker spying on you, encryption makes your information way harder to read.
Encryption codes the information that’s transferred between you and the website you’re visiting. Any prying eyes (e.g., the government, hackers, etc.) have to put more time and energy into decoding the encrypted information before they can read it.
The next time you use your Web browser, have a look at the URL bar. You can tell your communication with a website is encrypted when there’s a green padlock and an “https://” preceding the website address.
Although many sites support HTTPS, some of them may not enable it by default (keeping you on an unencrypted http:// connection). Use a plugin likeHTTPS Everywhere to ensure you connect via HTTPS as often as possible.
Some padlocks also feature a company’s name beside it (like PayPal, Inc.). That means the company has an extended verification certificate, which provides the strongest encryption level available (and requires more rigorous testing and validation).
You can add an extra layer of encryption to your data by browsing through a Virtual Private Network (VPN). “The first thing I’d recommend to the average person on the street is whenever you’re out in the public…use a VPN service,” says former “Most Wanted Hacker” Kevin Mitnick in an interview.
“It takes your data and puts it in an encrypted envelope so people can’t really intercept it and spy on that.”
Also, put your data in the hands of technology companies that encrypt it. Edward Snowden, for example, recommends using SpiderOak instead ofDropbox (or at least protect your Dropbox folders with Truecrypt). You could use DuckDuckGo instead of Google. (If you miss Google’s powerful search algorithm, just use the !g function in DuckDuckGo.) Chat with OTR instead of Skype.
There are tons of alternatives that likely protect your data better than the software you’re using.
Have a look at this privacy pack put together by Reset the Net. Keep your eyes peeled for technology that uses end-to-end encryption. End-to-end encryption ensures that your data only gets decrypted once it’s opened by the recipient, meaning that the technology companies wouldn’t be able to read the data in transit even if they were forced to pass it along to the government. You know it’s probably effective as the FBI and Department of Justice want companies to ease off end-to-end encryption.
How do the pros protect their information?
It’s tough to find people that protect their privacy well as they don’t tend to advertise themselves online. There are certain experts like journalists and security specialists that work with sensitive information.
As such, they’ve set up systems to protect their information as much as possible. You can use their methods to set up a more secure system of your own.
The NSA can’t read the information on your computer if you’ve never been connected to the Internet. If you have extremely sensitive information, consider investing in a computer that’s never touched the Internet (known as an “airgap”).
Columnist Bruce Schneier writes at The Guardian:
Since I started working with the Snowden documents, I bought a new computer that has never been connected to the Internet. If I want to transfer a file, I encrypt the file on the secure computer and walk it over to my Internet computer, using a USB stick. To decrypt something, I reverse the process. This might not be bulletproof, but it’s pretty good.
If you plan to use an airgap, you might also want to remove any network chips, bluetooth chips, or even microphones and webcams from your new computer before using it.
Along a similar vein, you could also use an operating system that’s bootable from a USB drive, and browse incognito. Tails is an operating system which forgets your activities after you unplug. Journalists working with Edward Snowden relied on it for secure communication.
“Privacy and encryption work, but it’s too easy to make a mistake that exposes you,” writes journalist Barton Gellman. “Tails puts the essential tools in one place, with a design that makes it hard to screw them up. I could not have talked to Edward Snowden without this kind of protection. I wish I’d had it years ago.”
Tails allows you to use GPG encryption when you are emailing and/or OTR encryption while instant messaging, with little setup required. These types of encryption come recommended by CDT’s senior staff technologist, Joe Hall.
GPG and PGP encryption are standards that allow you to encrypt and decrypt files and emails using a public/private keypair. (Here’s an intro to how PGP and cryptography work.)
Tails also allows journalists to work on sensitive documents, edit audio and video, and store all their files in an encrypted format. Additionally, Tails routes your web connections through the Tor network by default. The Tin Hat explains Tor pretty simply:
Tor offers a great degree of anonymity and privacy by encrypting your Internet connection and sending it through three servers placed around the globe.
In case you’re curious to learn more, we’d suggest going deeper into how journalists and security specialists handle sensitive information. For example, learn from this article how Edward Snowden leaked his information to the world. (Here’s another one.)
If you have some sensitive information that you want to share with the press, use an encrypted service like SecureDrop.
Start with the basics
There’s a lot of information in this piece. Don’t drive yourself crazy with paranoia. Just remember that it all starts with making your information a bit more difficult to read through encryption. Use software that has end-to-end encryption built-in. VPNs are a simple solution that quickly ensure your information is at least a bit more challenging to read.
If you ever do want to turn your privacy up a notch, encrypt emails with crypto technology and use airgaps and encryption-focused operating systems.
Even if you have nothing to hide, you have the right to privacy. It’s your responsibility to protect it while you still can.
#27 Edward Snowden Quotes About U.S. Government Spying That Should Send A Chill Up Your Spine
By Michael Snyder, on June 10th, 2013
Would you be willing to give up what Edward Snowden has given up? He has given up his high paying job, his home, his girlfriend, his family, his future and his freedom just to expose the monolithic spy machinery that the U.S. government has been secretly building to the world. He says that he does not want to live in a world where there isn’t any privacy. He says that he does not want to live in a world where everything that he says and does is recorded. Thanks to Snowden, we now know that the U.S. government has been spying on us to a degree that most people would have never even dared to imagine. Up until now, the general public has known very little about the U.S. government spy grid that knows almost everything about us. But making this information public is going to cost Edward Snowden everything. Essentially, his previous life is now totally over. And if the U.S. government gets their hands on him, he will be very fortunate if he only has to spend the next several decades rotting in some horrible prison somewhere. There is a reason why government whistleblowers are so rare. And most Americans are so apathetic that they wouldn’t even give up watching their favorite television show for a single evening to do something good for society. Most Americans never even try to make a difference because they do not believe that it will benefit them personally. Meanwhile, our society continues to fall apart all around us. Hopefully the great sacrifice that Edward Snowden has made will not be in vain. Hopefully people will carefully consider what he has tried to share with the world. The following are 27 quotes from Edward Snowden about U.S. government spying that should send a chill up your spine…
#1 “The majority of people in developed countries spend at least some time interacting with the Internet, and Governments are abusing that necessity in secret to extend their powers beyond what is necessary and appropriate.”
#2 “…I believe that at this point in history, the greatest danger to our freedom and way of life comes from the reasonable fear of omniscient State powers kept in check by nothing more than policy documents.”
#3 “The government has granted itself power it is not entitled to. There is no public oversight. The result is people like myself have the latitude to go further than they are allowed to.”
#4 “…I can’t in good conscience allow the US government to destroy privacy, internet freedom and basic liberties for people around the world with this massive surveillance machine they’re secretly building.”
#5 “The NSA has built an infrastructure that allows it to intercept almost everything.”
#6 “With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your e-mails or your wife’s phone, all I have to do is use intercepts. I can get your e-mails, passwords, phone records, credit cards.”
#7 “Any analyst at any time can target anyone. Any selector, anywhere… I, sitting at my desk, certainly had the authorities to wiretap anyone, from you or your accountant, to a federal judge, to even the President…”
#8 “To do that, the NSA specifically targets the communications of everyone. It ingests them by default. It collects them in its system and it filters them and it analyzes them and it measures them and it stores them for periods of time simply because that’s the easiest, most efficient and most valuable way to achieve these ends. So while they may be intending to target someone associated with a foreign government, or someone that they suspect of terrorism, they are collecting YOUR communications to do so.”
#9 “I believe that when [senator Ron] Wyden and [senator Mark] Udall asked about the scale of this, they [the NSA] said it did not have the tools to provide an answer. We do have the tools and I have maps showing where people have been scrutinized most. We collect more digital communications from America than we do from the Russians.”
10 “…they are intent on making every conversation and every form of behavior in the world known to them.”
#11 “Even if you’re not doing anything wrong, you’re being watched and recorded. …it’s getting to the point where you don’t have to have done anything wrong, you simply have to eventually fall under suspicion from somebody, even by a wrong call, and then they can use this system to go back in time and scrutinize every decision you’ve ever made, every friend you’ve ever discussed something with, and attack you on that basis, to sort of derive suspicion from an innocent life.”
#12 “Allowing the U.S. government to intimidate its people with threats of retaliation for revealing wrongdoing is contrary to the public interest.”
#13 “Everyone everywhere now understands how bad things have gotten — and they’re talking about it. They have the power to decide for themselves whether they are willing to sacrifice their privacy to the surveillance state.”
#14 “I do not want to live in a world where everything I do and say is recorded. That is not something I am willing to support or live under.”
#15 “I don’t want to live in a world where there’s no privacy, and therefore no room for intellectual exploration and creativity.”
#16 “I have no intention of hiding who I am because I know I have done nothing wrong.”
#17 “I had been looking for leaders, but I realized that leadership is about being the first to act.”
#18 “There are more important things than money. If I were motivated by money, I could have sold these documents to any number of countries and gotten very rich.”
#19 “The great fear that I have regarding the outcome for America of these disclosures is that nothing will change. [People] won’t be willing to take the risks necessary to stand up and fight to change things… And in the months ahead, the years ahead, it’s only going to get worse. [The NSA will] say that… because of the crisis, the dangers that we face in the world, some new and unpredicted threat, we need more authority, we need more power, and there will be nothing the people can do at that point to oppose it. And it will be turnkey tyranny.”
#20 “I will be satisfied if the federation of secret law, unequal pardon and irresistible executive powers that rule the world that I love are revealed even for an instant.”
#21 “You can’t come up against the world’s most powerful intelligence agencies and not accept the risk.”
#22 “I know the media likes to personalize political debates, and I know the government will demonize me.”
#23 “We have got a CIA station just up the road – the consulate here in Hong Kong – and I am sure they are going to be busy for the next week. And that is a concern I will live with for the rest of my life, however long that happens to be.”
#24 “I understand that I will be made to suffer for my actions, and that the return of this information to the public marks my end.”
#25 “There’s no saving me.”
#26 “The only thing I fear is the harmful effects on my family, who I won’t be able to help any more. That’s what keeps me up at night.”
27 “I do not expect to see home again.”
Would you make the same choice that Edward Snowden made? Most Americans would not. One CNN reporter says that he really admires Snowden because he has tried to get insiders to come forward with details about government spying for years, but none of them were ever willing to…
As a digital technology writer, I have had more than one former student and colleague tell me about digital switchers they have serviced through which calls and data are diverted to government servers or the big data algorithms they’ve written to be used on our e-mails by intelligence agencies. I always begged them to write about it or to let me do so while protecting their identities. They refused to come forward and believed my efforts to shield them would be futile. “I don’t want to lose my security clearance. Or my freedom,” one told me.
And if the U.S. government has anything to say about it, Snowden is most definitely going to pay for what he has done. In fact, according to the Daily Beast, a directorate known as “the Q Group” is already hunting Snowden down…
The people who began chasing Snowden work for the Associate Directorate for Security and Counterintelligence, according to former U.S. intelligence officers who spoke on condition of anonymity. The directorate, sometimes known as “the Q Group,” is continuing to track Snowden now that he’s outed himself as The Guardian’s source, according to the intelligence officers.
If Snowden is not already under the protection of some foreign government (such as China), it will just be a matter of time before U.S. government agents get him.
And how will they treat him once they find him? Well, one reporter overheard a group of U.S. intelligence officials talking about how Edward Snowden should be “disappeared”. The following is from a Daily Mail article that was posted on Monday…
A group of intelligence officials were overheard yesterday discussing how the National Security Agency worker who leaked sensitive documents to a reporter last week should be ‘disappeared.’
Foreign policy analyst and editor at large of The Atlantic, Steve Clemons, tweeted about the ‘disturbing’ conversation after listening in to four men who were sitting near him as he waited for a flight at Washington’s Dulles airport.
‘In Dulles UAL lounge listening to 4 US intel officials saying loudly leaker & reporter on NSA stuff should be disappeared recorded a bit,’ he tweeted at 8:42 a.m. on Saturday.
According to Clemons, the men had been attending an event hosted by the Intelligence and National Security Alliance.
As an American, I am deeply disturbed that the U.S. government is embarrassing itself in front of the rest of the world like this.
The fact that we are collecting trillions of pieces of information on people all over the planet is a massive embarrassment and the fact that our politicians are defending this practice now that it has been exposed is a massive embarrassment.
If the U.S. government continues to act like a Big Brother police state, then the rest of the world will eventually conclude that is exactly what we are. At that point we become the “bad guy” and we lose all credibility with the rest of the planet.
Edward Snowden Believes FBI Using Acid and Lasers To Hack The IPhone For Information
Edward Snowden, Google, WhatsApp Join Apple in Fighting FBI
Bill Gates Sides With FBI In Apple Spat
FBI could hack San Bernardino terrorist’s iPhone using acid and lasers
These Are The Tech Companies Supporting Apple Against The FBI
Facebook, Twitter stand with Apple on decision to not hack iPhone to aid FBI in San Bernardino probe