Big Brother is watching. No kidding. And the warning is coming from none other than Google, which says government spies may be spying on you. Some believe the Google announcement may be related to the recent discovery of the data-mining virus named Flame. In a June 3 New York Times article, Andrew Kramer and Nicole Perlroth write:
When Eugene Kaspersky, the founder of Europes largest antivirus company, discovered the Flame virus that is afflicting computers in Iran and the Middle East, he recognized it as a technologically sophisticated virus that only a government could create.
He also recognized that the virus, which he compares to the Stuxnet virus built by programmers employed by the United States and Israel, adds weight to his warnings of the grave dangers posed by governments that manufacture and release viruses on the internet.
Cyberweapons are the most dangerous innovation of this century, he told a gathering of technology company executives… While the United States and Israel are using the weapons to slow the nuclear bomb-making abilities of Iran, they could also be used to disrupt power grids and financial systems or even wreak havoc with military defenses.
Mr. Kaspersky claims he was called in to investigate the new virus on behalf of the International Tele-communication Union, an agency of the United Nations. The virus was allegedly erasing files on computers belonging to the Iranian oil ministry.
What makes the Flame virus a major potential concern for common citizens of the world is the fact that its the first virus found with the ability to spread wirelessly by attaching itself to Bluetooth-enabled devices.
Once there, it can not only trace and steal information stored on those devices; according to Kramer and Perlroth the program also contains a microbe command that can activate any microphone within the device, record whatever is going on at the timepresumably whether youre actually using the device or notand transmit audio files back to the attacker. This, clearly, has huge privacy implications were it to be deployed against civilian populations.
New Revelations about the Links Between Flame and Stuxnet
While cybersecurity experts initially claimed there were no links between the earlier Stuxnet worm and the Flame virus, a recent article on The Verge now reports that the two are undoubtedly related
. Joshua Kopstein writes:
[I]n examining an earlier version of Stuxnet, the labs researchers now find that they were wrong: a previously overlooked module within the virus is now providing the missing link between the two pieces of malware. The module in question… matches very closely with a module used by an early version Flame. It was actually so similar, that it made our automatic system classify it as Stuxnet, wrote Alexander Gostev… indicating that the module was likely the seed of both viruses. We think its actually possible to talk about a Flame platform, and that this particular module was created based on its source code.
The new evidence suggests that Stuxnet and Flame are two sides of the same coin, with the former built for sabotage and the latter for surveillance. But researchers also say that the Flame platform pre-dated Stuxnet and its sister,Duqu, and was likely built in the Summer of 2008.
InformationWeek Security recently offered the following advice:… Microsoft has been working quickly to patch the certificate bug exploited by Flame. Notably, Microsoft released an update Friday [June 8] for Windows Server Update Services (WSUS) 3.0 Service Pack 2 (SP2), which according to the release notes strengthens the WSUS communication channels … [by] trusting only files that are issued by the Microsoft Update certification authority.
Microsoft is also set to issue an update Tuesdayas part of its monthly Patch Tuesdaythat will further update all supported versions of Windows to block Flame. Security experts are recommending that all users install the update as soon as possible, since attackers will likely attempt to use the certificate vulnerability before it becomes widely patched. Apply the certificate patch released a week ago today if you havent done so already, said SANS Institute chief research officer Johannes B. Ullrich in a blog post. This way, no patch signed by the bad certificate should be accepted tomorrow. Patch Tuesday is one of the best dates to launch such an attack, as you do expect patches anyway.
When installing the update, however, do so preferably only if using a trusted environment. Avoid patches while on the road. Apply them in your home [or] work network whenever possible, said Ullrich. This doesnt eliminate the chance of a man in the middle (MitM) attack, but it reduces the likelihood.
For users who must update while on the road, perhaps because they travel frequently, always use a VPN connection back to the corporate network, said Ullrich, since hotel networks can be malware and attack hotbeds. Hotel networks and public hotspots frequently use badly configured HTTP proxies that can be compromised and many users expect bad SSL certificatesbecause of ongoing MitM attacks, he said.
Spy Central: UtahIn related news, Wired Magazine recently reported that the US government is building a massive spy center, right in the heart of Mormon country, in Bluffdale, Utahso massive, in fact, that once finished, the facility will be five times larger than the US Capitol.
According to Wired Magazine:
Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the worlds communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013.
Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trailsparking receipts, travel itineraries, bookstore purchases, and other digital pocket litter. It is, in some measure, the realization of the total information awareness program created during the first term of the Bush administrationan effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans privacy.
But this is more than just a data center, says one senior intelligence official who until recently was involved with the program. The mammoth Bluffdale center will have another important and far more secret role that until now has gone unrevealed. It is also critical, he says, for breaking codes.
And code-breaking is crucial, because much of the data that the center will handlefinancial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, confidential personal communicationswill be heavily encrypted. According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US.
The upshot, according to this official: Everybodys a target; everybody with communication is a target.[Emphasis mine]
That about says it all. And for those of you still under the mistaken belief that the US government does not have the authority to spy on its citizens, consider the following:
… [The NSA] has undergone the largest building boom in its history, including installing secret electronic monitoring rooms in major US telecom facilities. Controlled by the NSA, these highly secured spaces are where the agency taps into the US communications networks, a practice that came to light during the Bush years but was never acknowledged by the agency. The broad outlines of the so-called warrantless-wiretapping program have long been exposed…
In the wake of the programs exposure, Congress passed the FISA Amendments Act of 2008, which largely made the practices legal. Telecoms that had agreed to participate in the illegal activity were granted immunity from prosecution and lawsuits. What wasnt revealed until now, however, was the enormity of this ongoing domestic spying program.
For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail…
As chief and one of the two cofounders of the agencys Signals Intelligence Automation Research Center, [William] Binney and his team designed much of the infrastructure thats still likely used to intercept international and foreign communications. He explains that the agency could have installed its tapping gear at the nations cable landing stationsthe more than two dozen sites on the periphery of the US where fiber-optic cables come ashore.
If it had taken that route, the NSA would have been able to limit its eavesdropping to just international communications, which at the time was all that was allowed under US law.
Instead it chose to put the wiretapping rooms at key junction points throughout the country… thus gaining access to not just international communications but also to most of the domestic traffic flowing through the US. The network of intercept stations goes far beyond the single room in an AT&T building in San Francisco exposed by a whistle-blower in 2006. I think theres 10 to 20 of them, Binney says… The eavesdropping on Americans doesnt stop at the telecom switches. To capture satellite communications in and out of the US, the agency also monitors AT&Ts powerful earth stations…
… Binney suggested a system for monitoring peoples communications according to how closely they are connected to an initial target. The further away from the targetsay youre just an acquaintance of a friend of the targetthe less the surveillance. But the agency rejected the idea, and, given the massive new storage facility in Utah, Binney suspects that it now simply collects everything…
To learn more, I highly recommend reading the featured Wired article in its entirety. Its a fascinating read, but it will not likely make you sleep better at night. The full article is available on their website and is free to view.
Google Also in the Privacy News
Beginning the first week of June, Google will warn you every time it picks up activity on your computer account that looks suspiciously like someone trying to monitor your computer activities. Google wont say how it figured out that state-sponsored attackers may be attempting to compromise your account or computer. But its promised to let you know if it thinks Big Brother is tuned in to what youre doing.
As recently reported on the New York Times blog, the warning will pop up at the top of your Gmail inbox, Google home page, or Chrome browser, stating:
Warning: We believe state-sponsored attackers may be attempting to compromise your account or computer.
According to a Google blog post by Eric Grosse, VP of Security Engineering at Google:
If you see this warning it does not necessarily mean that your account has been hijacked. It just means that we believe you may be a target, of phishing or malware for example, and that you should take immediate steps to secure your account.
Here are some things you should do immediately: create a unique password that has a good mix of capital and lowercase letters, as well punctuation marks and numbers; enable 2-step verification as additional security; and update your browser, operating system, plugins, and document editors.
Attackers often send links to fake sign-in pages to try to steal your password, so be careful about where you sign in to Google and look for https://accounts.google.com/ in your browser bar. These warnings are not being shown because Googles internal systems have been compromised or because of a particular attack.
The Next Big War Zone = the Internet
Unless youve been living under a rock this past year, youve surely heard about the repeated attempts to restrict your online freedom and grant government near limitless control over the internet and its content.
It began in January with the introduction of two proposed laws in US Congress: the Stop Online Piracy Act (SOPA), and the Protect IP Act (PIPA). While sold as laws to address online copyright infringement, most of which allegedly arise from outside the US, both laws contained measures capable of severely restricting online freedom of speech and harm web sites and online communities of all kinds, including this one. After tens of millions of people rose up in various protests, both online and by hitting the pavement, both bills were indefinitely postponed.
Many have warned, however, that the bills are not dead and are likely to return.
It didnt take long for the next round. In April, the Cyber Intelligence Sharing and Protection Act (CISPA) was brought forth, and quickly became described by opponents as an even greater threat to internet freedom than SOPA and PIPA. I wont go into any detailed discussion on these bills here, but simply want to bring your attention to the fact that bills such as these three, while dressed up as laws that will protect you and save you money, are poorly guised attempts to gut privacy laws and open the door for a totalitarian takeover of the internet and its content.
Campaign for Liberty is continuing its fight to stop another government intrusion, warning that this coming December, the United Nations will also be meeting to compile even more recommendations for international internet regulations.
While it may seem hopeless at times, I urge you to take an active role anytime the opportunity presents itself to take a stand. I personally believe internet freedom and health freedom go hand in hand these days, as a majority of people get a majority of their health information from freely available web sites such as mine.
Right now, you can sign the Campaign for Liberty Protect Internet Freedom Mandate.
If Squelching In formation Freedom Doesn t Work, Whats Next?The draconian advancements in surveillance do not end with the erection of a massive spy central and ever-increasing attacks on internet freedom. We also have some 63 drone launch sites within the US, and the US military has admitted it now has drone technology in the form of tiny mechanical insects, equipped with cameras, microphones, and DNA sampling capabilities.
Besides that, theres an ever-expanding arsenal of so-called active denial weaponsdirected energy weapons that can scatter or incapacitate those in its path, by a variety of means. Such weapons are already being used domestically by various law enforcement agencies for crowd control. Then there are more sinister signs of readiness for domestic combat. In April, news reports began circulating questioning the Department of Homeland Securitys rationale for purchasing 450 million rounds of hollow point bullets
A report by RT News reads:
The department has yet to discuss why they are ordering such a massive bevy of bullets for an agency that has limited need domestically for doing harm, but they say they expect to continue receiving shipments from the manufacturer for the next five years, during which they plan to blow through enough ammunition to execute more people than there are in the entire United States.
… the choice and quantity of its hollow point order raises a lot of questions about future plans for the DHS… On their website, the contractor claims that the ammunition is specifically designed so that it can pass through a variety of obstructions and offers optimum penetration for terminal performance. Or, in other words, this is the kind of bullet designed to stop any object dead in its tracks and, if emptied into the hands of the DHS a few hundred million times, just might do as much.
… As the DHS gains more and more ground in fighting terrorism domestically, the US at the same time has turned the tables to make its definition of terrorist way less narrow. With any American blogger or free thinking on the fringe of what the government can go after under H.R. 347, or the National Defense Authorization Act that allows for the indefinite detention of US citizens without charge, the DHS could just be blasting through whats left of its budget to make sure that its roster of agents across the country can get in their target practice over the next few years.
Without Online Freedom, You Cannot Exercise Health Freedom
Some of you may at this point wonder why I report on an issue such as this, so let me make this point clear. Access to health information could easily be deemed a threat to national welfareespecially when web sites such as this one publish information that contradicts the official government stance. Examples such as advising women against national mammography screening standards, or raising concerns about vaccine safety, or questioning conventional cancer treatments could all be considered a threat to an extremely profitable status quo.
In such a scenario, they could simply shut WorldTruth.TV, and others like us, down; leaving you with no truth-telling, corruption-exposing, alternative voices other than the officially sponsored viewpoint. And it should be quite clear by now that the government-sanctioned stance on most issues relating to health and diet are primarily dictated by powerful lobbying groups furthering financially-driven industry agendas that have absolutely nothing to do with optimizing health and longevity.
Dont Be FooledInternet Security Bills are Likely Nothing of the Sort
Interestingly enough, CISPA is promoted primarily as a cyber security bill, which brings us full circle back to where this article started. Recall, the Flame virus has surveillance capabilities that far surpass previous viruses and worms that may collect or destroy data. In fact, its capability to transfer to Bluetooth-enabled gadgets and secretly activate microphones renders it perfect for spying on anyone and everyone, anywhere, at any time… which is exactly the plan, if you believe the information detailed in the featured Wired Magazine article above.
Its interesting to note the rationale used when trying sell us this bill. According to an April 26 report in the International Business Times:
Co-sponsor Rep. Dutch Ruppersberger, D-Md., says CISPA provides essential tools for repelling online security threats: Without important, immediate changes to American cyber security policy, I believe our country will continue to be at risk for a catastrophic attack on our nations vital networks, networks that power our homes, provide our clean water or maintain the other critical services we use every day.
Sounds like he was talking about an eventuality just like the Flame virus, or the older Stuxnet worm, for that matterboth of which, incidentally, appear to have targeted Iranian oil- and nuclear facilities, and neither of which has been officially traced back to any country or agency, despite our already overwhelming security apparatusjust over a month before Flame was discovered by a Russian antivirus company which, by the way, currently employs the virus hunter who discovered Stuxnet in 2010.
Ill leave the meaning of such coincidences for you to ponder. But suffice it to say, it does not bode well if a law like CISPA is enacted that allows companies and governments to share information collected online, especially when combined with a massive data-mining virus that can skip around from one wireless piece of technology to another, from computers to cell phones to iPads, gathering data on every single social network contact every single person has, and audio files on every single conversation any one might have at any point in time. Especially now that we will shortly have the facility to store and process all that data.
In closing, I will simply urge you to take efforts at curbing online freedom and extending the governments reach seriously, and whenever such efforts are launched, take action to help preserve your right to health freedom, which is closely tied to the right to online freedom of speech.