Britain & The USA Have Been Spying On Their Friends

Britain was last caught reading foreign diplomats emails during the 2009 G20, but that's hardly the first time a government has snooped on its allies. At that particular G20 meeting, the British spy agency GCHQ set up fake Internet cafes for delegates to use so as to log their keystrokes, broke into their BlackBerries and kept round-the-clock records of phone calls during the summit. 

Meanwhile, various American agencies monitored the phone calls of former Russian president and current prime minister.

The surveillance of private communication dates from long ago. Discovering traces of intelligence operations that occurred two thousand years ago, which even then were meant to be secret, is not impossible and the intelligence business is as old as civilisation itself.

Once the steps in the process have been identified, they can be traced in almost any civilisation that left historical records. 

In the days preceding modern forms of technical collection, whereby sound recording devices, hidden cameras, and satellites gather data, people were the only means commanders and political leaders had to collect the vital information they needed to survive the plots of their enemies. Before bugging devices, there were eavesdroppers behind curtains, and the toga and dagger might indeed have been symbols for the way the Romans carried out their domestic and foreign policy objectives.

Spying on your allies has long been a staple of international diplomacy, dating back to the first embassies established by 16th century Italian city-states, where cryptanalysts would slice open the wax seals of intercepted, coded messages with hot knives before deciphering them. Before the advent of email, modern spy agencies had to break codes hidden within telegraphs in order to read them. In at least once case in the early 20th century, the US government used surveillance and code cracking to score a major diplomatic victory against Japan.

  • As revealed by Edward Snowden, the US National Security Agency (NSA) was illegally collecting the telephone records of tens of millions of Americans. The NSA tapped directly into the servers of nine internet firms, including Facebook, Google, Microsoft and Yahoo, to track online communication.
  • Britain’s GCHQ and US Intelligence spy on Internet communications. The UK spy agency was tapping fibre-optic cables that carry global communications and sharing vast amounts of data. The GCHQ operation, codenamed Tempora, had been operating for eighteen months and GCHQ was able to boast a massive  collection of data, tapping into 200 fibre-optic cables to give it the ability to monitor up to 600 million communications every day.

WikiLeaks claim have seen documents that confirm the Central Intelligence Agency hacks smartphones, computers and connected TVs to spy on American citizens and others around the world.  The techniques disclosed in these documents are highly targeted and the vast majority of ordinary citizens are outside the scope this type of surveillance.

For average citizens starting to think about how to keep their communications out of reach of Big Brother, here are some of the ways to lock down devices and keep government entities, advertisers and corporations out of your daily lives.

  • To avoid surveillance, by governments or others users, you should switch to more secure apps for messaging, like Signal, which is free for download. The app is designed to avoid surveillance, allowing users to send encryption-protected information to others who also use the app and collects and stores very little data about users. 
  • WhatsApp, for example, is also encrypted but it does store metadata - the information about who you are messaging and where, and is owned by Facebook whi have recently changed their privay policy to share user data with other companies that it owns.
  • Similarly, iMessage is encrypted by default, but Apple stores metadata on user conversations for up to 30 days and can hand the information over to law enforcement with a warrant. Messaging on iPhone is also only encrypted between two iPhone users, so texting Android users will revert messages to unencrypted SMS. Apple has had a well-reported dispute with law US enforcement over equipping devices with so-called “back doors” to enable them to access user information. 

No method is 100% secure, as the CIA has been able to access phones directly, bypassing encryption. This means they could install keyloggers or other surveillance tools directly onto user devices, intercepting communication at the source. The documents released by WikiLeaks allege that the CIA built hacking tools that could remotely control devices including iPads, iPhones, Android devices and computers, hacking the camera and microphone to secretly record video and sound. 

A very simple and inexpensive way to put a stop to this is to simply cover the camera with electrical tape or a Post-it Note. 

Even without the government looking over our shoulders, social media makes it easy to give away a lot of privacy on our own, posting vacation photos and other personal details. Going completely dark on social media, deleting Facebook and Instagram accounts and moving to a cabin in the woods to avoid tracking, may be too extreme for the average consumer. These companies want to know everything you do online, whether it’s when you post to social media, or what subject you’re reading about on Wikipedia. 

As tracking techniques get more advanced each year, so do the methods to thwart such attempts. There are literally dozens of browser extensions built to help protect users from tracking. But while it’s generally known by most people that our online activities, where and what we browse, are being tracked in some way, not many people realise that companies have been using a sneaky hidden trick for decades that allows them to snoop on your email activity. They do this through a snooping trick called a tracking pixel. This email tracking device allows a company to see when and where you’ve opened an email they’ve sent you, how long it took for you to read it, and how often you’ve returned to read the email again.  

In Britain, the key legal safeguards to protect private citizens from being spied no by their own government are the 1994 Intelligence Services Act and the 2000 Regulation of Investigatory Powers Act (RIPA). Today these laws have been completely overtaken new digital systems and software.  Only if you have nothing to hide does the average citizen have nothing to fear.

Fast Company:    Historynet:   The Atlantic:   Open Democracy:   HistoryandPolicy:    Marketwatch:     BBC

You Might Also Read:

The Age Of Surveillance Capitalism Dawns:

 

« EU & NATO Agree To Confront The Chinese Cyber Threat
AI Reveals Iran’s Nuclear Weapons Factory »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Truth Technologies Inc (TTI)

Truth Technologies Inc (TTI)

TTI is a premier provider of worldwide anti-money laundering, anti-fraud, customer identification, and compliance products and services.

US Cyber Command (USCYBERCOM)

US Cyber Command (USCYBERCOM)

USCYBERCOM conducts activities to ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

NESEC

NESEC

NESEC is a specialist in information security consulting services and solutions.

Cyberbit

Cyberbit

Cyberbit empowers cybersecurity teams to be fully prepared with a product portfolio ready to detect and respond effectively across both IT and OT networks.

iFluids Engineering

iFluids Engineering

iFluids Engineering is a leading engineering consulting and risk management firm providing a full range of services including Cyber Security for Industrial Control Systems.

Veritas Technologies

Veritas Technologies

Veritas provide industry-leading solutions that cover all platforms with backup and recovery, business continuity, software-defined storage and information governance.

Cytellix

Cytellix

Cytellix is an industry-standards-based, managed cybersecurity service provider, specializing in proactive behavioral analytics and situational awareness of an organization’s cyber posture.

Kasada

Kasada

Kasada provides bot detection and mitigation for enterprise web applications. Stop the bots before they reach your site and web applications.

Cyber Range Solutions (CRS)

Cyber Range Solutions (CRS)

CRS provides cyber security training and improve security team performance by providing a hyper realistic, virtual training environment.

Eventus Security

Eventus Security

Eventus, are a team of highly skilled professionals who are committed to deliver excellence in next generation cyber security services and customized solutions for your enterprise.

Security Risk Advisors (SRA)

Security Risk Advisors (SRA)

Security Risk Advisors deliver cybersecurity services to leading companies in the Financial Services, Healthcare, Pharmaceuticals, Technology and Retail industries.

Cyber Security Global

Cyber Security Global

Cyber Security Global is a leader in electronic security, consultancy, technology, cybersecurity solutions, training, and specialized products.

Vernetzen

Vernetzen

Vernetzen is an industrial network and cybersecurity innovator focused on delivering practical solutions to connect and secure industry across the globe.

Nightwing

Nightwing

Nightwing is the intelligence services company that continually redefines the edge of the possible to keep advancing our national security interests.

KTrust

KTrust

KTrust provides Continuous Threat Exposure Management for Kubernetes environments.

Reco AI

Reco AI

Reco is an identity-centric SaaS security solution that empowers organizations with full visibility into every app, identity, and their actions to control risk in their SaaS ecosystem.