The Right for Privacy in a World Where Everything is Shared

hackingteam_1-100594937-orig.jpg

 

The latest revelations about “Hacking Team” (an Italian offensive-cyber company), its products (snooping SW for every type of digital communication, from email to whatsapp) and it its clientele (mostly dark regimes) seems to shock everyone. Lets’ look at the facts and see how truly shocking this is:

Governments want to have the capacity to spy on their citizens- nothing new here. since the dawn of time the ruler’s no. intelligence priority was to spy not on his enemy from abroad but on his enemies from within (opposition, subversive elements).

Governments can now do this in a scale that was incomprehensible before: they can pretty much collect and store every piece of digital communication they can get there sniffers on.

Governments can analyze and understand the information like never before- The East-German Statsi was notorious for eavesdropping on large segments of the population. They were so obsessed with this that the accumulated so much recorded material that they were never able to listen or dissect it. Fast forward 30 years- machines do it almost instantly today, identifying key phrases, mapping links between seemingly unconnected people and are rapidly gaining in machine intelligence. But….

  • We share everything online- are locations, friends, images and desires
  • We wear mobile tracking devices with us most times
  • We are now loving the idea of having a wearable tracking devices, which we will never take off and will transmit not only our location but our vital signs
  • We disregard any common sense when it comes to online safety (using same password for all our social media accounts for example).

So why are we surprised? We are simply making it easier for any nation state (be it our own or an adversary) to collect information about us. What’s the solution? We’ll, if you don’t want anyone to access a piece of information (sensitive correspondence, nude selfies) please refrain from posting it anywhere online. Otherwise- consider everything you’ve ever posted as “free for all” (regardless of privacy settings). If you still consider sharing after all this- don’t act surprised…  


Yotam Gutman is Director Product Marketing at Cytegichttp://owntrepreneurship.com/
 

« NATO missile system hacked remotely by ‘foreign source’
The Focus on Terror has Distorted the Debate on Encryption »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ECSC Group

ECSC Group

ECSC is a full-service information security provider, specialising in 24/7/365 security breach detection and Artificial Intelligence (AI).

SmartCyber

SmartCyber

SmartCyber is a company specializing in custom IT projects and Cybersecurity.

Accredia

Accredia

Accredia is the national accreditation body for Italy. The directory of members provides details of organisations offering certification services for ISO 27001.

aDolus Technology

aDolus Technology

aDolus delivers a robust solution for safeguarding against counterfeit or malicious software and firmware in mission-critical systems.

CUJO AI

CUJO AI

CUJO AI is the global leader in the development and application of artificial intelligence to improve the security, control and privacy of connected devices in homes and businesses.

TM One

TM One

TM One is the enterprise and public sector business solutions arm of Telekom Malaysia Berhad (TM) Group.

Cloud Box Technologies

Cloud Box Technologies

Cloud Box Technologies is one of the premier IT Infrastructure Solution providers in the Middle East.

Fasken

Fasken

Fasken is one of the largest business law firms in Canada and a recognized leader in privacy and cybersecurity law.

Diligent

Diligent

Diligent's SaaS GRC platform gives leaders a connected view of governance, risk, compliance and ESG across their organization.

CornerStone

CornerStone

CornerStone is an award winning, independent risk, cyber and security consulting firm providing a range of Risk Management, Security Design and Implementation Management Services.

Avalor

Avalor

Avalor are on a mission to help security teams make faster, more accurate decisions by making sense of their data. With Avalor you can bring in data from anywhere, normalize it and analyze it.

Health Sector Cybersecurity Coordination Center (HC3)

Health Sector Cybersecurity Coordination Center (HC3)

HC3 was created by the US Department of Health and Human Services to aid in the protection of vital, controlled, healthcare-related information.

LEPHISH

LEPHISH

LePhish is a French cybersecurity solution specializing in automated phishing campaigns.

Interpres Security

Interpres Security

Interpres Security operationalizes TTP-based threat intelligence and automates continuous exposure monitoring to help CISOs and security practitioners reduce threat exposure.

HardTarget

HardTarget

HardTarget is a cutting-edge cyber training company serving HWN (High-Net-Worth) Families and their trusted Advisors.

DOT Security

DOT Security

DOT Security provides advanced security services for businesses of all sizes.