The Right for Privacy in a World Where Everything is Shared

hackingteam_1-100594937-orig.jpg

 

The latest revelations about “Hacking Team” (an Italian offensive-cyber company), its products (snooping SW for every type of digital communication, from email to whatsapp) and it its clientele (mostly dark regimes) seems to shock everyone. Lets’ look at the facts and see how truly shocking this is:

Governments want to have the capacity to spy on their citizens- nothing new here. since the dawn of time the ruler’s no. intelligence priority was to spy not on his enemy from abroad but on his enemies from within (opposition, subversive elements).

Governments can now do this in a scale that was incomprehensible before: they can pretty much collect and store every piece of digital communication they can get there sniffers on.

Governments can analyze and understand the information like never before- The East-German Statsi was notorious for eavesdropping on large segments of the population. They were so obsessed with this that the accumulated so much recorded material that they were never able to listen or dissect it. Fast forward 30 years- machines do it almost instantly today, identifying key phrases, mapping links between seemingly unconnected people and are rapidly gaining in machine intelligence. But….

  • We share everything online- are locations, friends, images and desires
  • We wear mobile tracking devices with us most times
  • We are now loving the idea of having a wearable tracking devices, which we will never take off and will transmit not only our location but our vital signs
  • We disregard any common sense when it comes to online safety (using same password for all our social media accounts for example).

So why are we surprised? We are simply making it easier for any nation state (be it our own or an adversary) to collect information about us. What’s the solution? We’ll, if you don’t want anyone to access a piece of information (sensitive correspondence, nude selfies) please refrain from posting it anywhere online. Otherwise- consider everything you’ve ever posted as “free for all” (regardless of privacy settings). If you still consider sharing after all this- don’t act surprised…  


Yotam Gutman is Director Product Marketing at Cytegichttp://owntrepreneurship.com/
 

« NATO missile system hacked remotely by ‘foreign source’
The Focus on Terror has Distorted the Debate on Encryption »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DriveLock

DriveLock

Our security solution is designed to prevent external attacks, which are evermore sophisticated as well as monitor, document and even prevent internal incidents.

Swiss Cyber Storm

Swiss Cyber Storm

Swiss Cyber Storm is a non profit organization hosting the international Swiss Cyber Storm Conference and running the Swiss part of the European Cyber Security Challenges.

National Cyber Security Centre (NCSC) - Ireland

National Cyber Security Centre (NCSC) - Ireland

The National Cyber Security Centre (NCSC) is the operational side of the Department of Communications in regard to network and information security in the Republic of Ireland.

Inter-American Cooperation Portal on Cyber-Crime

Inter-American Cooperation Portal on Cyber-Crime

The Inter-American Cooperation Portal on Cyber-Crime was created to facilitate and streamline cooperation and information exchange among government experts from OAS member states.

Assac Networks

Assac Networks

Assac Networks ShieldIT is an app that completely protects any BYOD smartphone from both tapping and hacking.

Innovent Recycling

Innovent Recycling

Innovent Recycling provides a secure IT recycling & data destruction service to all types of organizations across the UK.

ITRecycla

ITRecycla

ITRecycla are specialists in the protection of sensitive computer data by data destruction, re-marketing of reusable computer equipment, computer recycling and disposing of electronic e-waste.

CNS Group

CNS Group

CNS Group provides industry leading cyber security though managed security services, penetration testing, consulting and compliance.

Titan Labs

Titan Labs

Titan Labs is a Cyber Security Consultancy that provides advice and technical expertise to government, international finance and telecommunications providers.

BT Security

BT Security

BT provides telecommunications and network infrastructure services to keep businesses around the world connected and secure.

Advantex Network Solutions

Advantex Network Solutions

Advantex Network Solutions are a leading provider in Mitel, IT Solutions, Networking, and iP surveillance.

Cloudsec Asia

Cloudsec Asia

Cloudsec Asia is Thailand's top-ranked cybersecurity consultant company. We offers security services to ensure that all your IT assets are reliable, accessible, and secure.

Aravo Solutions

Aravo Solutions

Your Extended Enterprise is full of hidden risks – Aravo makes them visible, measurable, and manageable.

Trackd

Trackd

At trackd, we’re re-imaging vulnerability remediation for the benefit of the entire cyber security community. Automating Vulnerability Remediation without the Fear of Disruption.

Finite State

Finite State

Finite State enables product security teams to protect the devices we rely on every day through market-leading software threat, vulnerability, and risk management.

Symbiotic Security

Symbiotic Security

Symbiotic Security revolutionizes code security by integrating an AI-driven security coach directly within developers' IDEs.