The Right for Privacy in a World Where Everything is Shared

hackingteam_1-100594937-orig.jpg

 

The latest revelations about “Hacking Team” (an Italian offensive-cyber company), its products (snooping SW for every type of digital communication, from email to whatsapp) and it its clientele (mostly dark regimes) seems to shock everyone. Lets’ look at the facts and see how truly shocking this is:

Governments want to have the capacity to spy on their citizens- nothing new here. since the dawn of time the ruler’s no. intelligence priority was to spy not on his enemy from abroad but on his enemies from within (opposition, subversive elements).

Governments can now do this in a scale that was incomprehensible before: they can pretty much collect and store every piece of digital communication they can get there sniffers on.

Governments can analyze and understand the information like never before- The East-German Statsi was notorious for eavesdropping on large segments of the population. They were so obsessed with this that the accumulated so much recorded material that they were never able to listen or dissect it. Fast forward 30 years- machines do it almost instantly today, identifying key phrases, mapping links between seemingly unconnected people and are rapidly gaining in machine intelligence. But….

  • We share everything online- are locations, friends, images and desires
  • We wear mobile tracking devices with us most times
  • We are now loving the idea of having a wearable tracking devices, which we will never take off and will transmit not only our location but our vital signs
  • We disregard any common sense when it comes to online safety (using same password for all our social media accounts for example).

So why are we surprised? We are simply making it easier for any nation state (be it our own or an adversary) to collect information about us. What’s the solution? We’ll, if you don’t want anyone to access a piece of information (sensitive correspondence, nude selfies) please refrain from posting it anywhere online. Otherwise- consider everything you’ve ever posted as “free for all” (regardless of privacy settings). If you still consider sharing after all this- don’t act surprised…  


Yotam Gutman is Director Product Marketing at Cytegichttp://owntrepreneurship.com/
 

« NATO missile system hacked remotely by ‘foreign source’
The Focus on Terror has Distorted the Debate on Encryption »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

AV Test

AV Test

The AV-TEST Institute is a leading international and independent service provider in the fields of anti-virus research and IT security.

Conscio Technologies

Conscio Technologies

Conscio Technologies is a specialist in IT security awareness. Our solutions allow you to easily manage innovative online IT awareness campaigns.

OPSWAT

OPSWAT

OPSWAT is a software company that provides solutions to secure and manage IT infrastructure.

VerifyMe

VerifyMe

VerifyMe is a global technology solutions company delivering brand protection offerings to mitigate counterfeiting, product diversion, and illicit trade.

Rafael

Rafael

Rafael has more than 15 years of proven experience in the cyber arena providing solutions for national security as well as commercial applications.

Sangfor Technologies

Sangfor Technologies

Sangfor is a global leader of IT infrastructure, security solutions, and cloud computing.

KLC Consulting

KLC Consulting

KLC Consulting offers information assurance / Security, IT Audit, and Information Technology products and services to government and Fortune 1000 companies.

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

SWEDAC is the national accreditation body for Sweden. The directory of members provides details of organisations offering certification services for ISO 27001.

CUJO AI

CUJO AI

CUJO AI is the global leader in the development and application of artificial intelligence to improve the security, control and privacy of connected devices in homes and businesses.

Open Systems

Open Systems

Open Systems is a Secure Access Service Edge (SASE) pioneer delivering a complete solution to network and security.

SterlingRisk Programs

SterlingRisk Programs

SterlingRisk’s Cyber practice brings experience working with a wide array of clients across a broad spectrum of industries.

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji) (formerly known as HLB Crosbie & Associates) is a well-established firm of accountants and business advisers in Fiji.

Probity

Probity

Probity Inc. is a certified software development and systems engineering company, providing support to federal government and national defense related clients.

Semgrep

Semgrep

Semgrep is a fast, open-source, static analysis tool for profoundly improving software security and reliability.

Espria

Espria

Espria is a leading independent managed service provider with expertise in Cloud, IT, Communications and Document Solutions.

Ofcom

Ofcom

Ofcom is the UK's communications regulator. We regulate the TV, radio and video on demand sectors, fixed line telecoms, mobiles, postal services, plus the airwaves over which wireless devices operate.