Snowden-Gate!

Snowden-Gate!

We’re starting to know how the American public found out about the National Security Advisor collecting data?about our phones and Internet. A 29-year-old contractor and NSA system administrator named Edward Snowden is the center of this growing story.

Snowden, who was also a CIA agent, claimed to have leaked the report to the Washington Post and U.K.’s Guardian. ?Now, the NSA is panicking, wondering how Snowden got that kind of access to these secret documents and aired this info out to the world. He got a highly classified document from FISA. Authorities are working to build a case against him. They’re even looking into Snowden’s personal life. The media hounded his parents so much that his mom had to put something of a ‘Go Away’ sign on the door. It’s believed that more info will be released about the NSA and their cell phone and Internet listening activities.

One thing that isn’t going away is this case. Even Wiki Leaks founder Julian Assange called him a hero, and urged him to go to Latin America. The Feds are building a case against Snowden, but he’s in Hong Kong. Will he be extradited from HK or will he seek asylum there, or in a country like Iceland? And how do the American people feel about this? I read one poll where 56% of Americans feel phone and online tracking is an acceptable way to fight terrorism. Where do you stand? Do you think Snowden is a hero or villain?

What is PRISM?

What is PRISM?

Now that the cat’s out of the bag, I talked a little bit about PRISM and what I could mean. Now, the heat has been turned up so high government officials are talking about PRISM and clearing up misconceptions, or at least trying to.

They’re telling us what is not: some data?mining system. They don’t go around yanking data from servers.?They say PRISM is a computer system that ‘facilitates’ foreign intelligence collected from services providers. They insist it’s only done under court supervision. In fact, the US Director of National Intelligence James Clapper is so tired of the news reports he felt compelled to release an official statement?. What they’re basically saying is that PRISM does exist, but it’s being blown out of the proportion. Major computer companies, like Google?denied their part in any government data gathering program and deny any privacy infringement.

I’m glad someone in government is talking. I don’t think is because he wants too. The media and the people demand answers. The demand has been so great now they have no choice but to talk. Whether Mr. Clapper’s statement is accurate, that remains to be seen. But it’s a start. What more would you like to hear about PRISM?

Government&Internet vs. Privacy

Government&Internet vs. Privacy

The Pandora’s box is opening. Just days ago, we learned Verizon, under the federal government’s orders, have been gathering data without the consumer’s knowledge or permission. We then learned other major phone companies doing the same thing. Now, we learn online companies may?have dabbled in this for years.

According to the NY Times, government officials wanted Silicon Valley to make it easy to get data on consumers. In fact, companies like Google and Yahoo and other major online powerhouses were required to share data under the Foreign Intelligent Surveillance Act. All these companies denied giving the government full access to servers, but said they complied with federal orders to the best of their ability.

Then there’s the talk of PRISM. According to one whistleblower, they can watch your ideas as you type. I wouldn’t go that far, but PRISM is definitely worth learning about. At least online companies did put up a fight, only going so far. Twitter certainly didn’t make it easy. But I think we all need to be careful of what we post, even what we email. You never know who might be watching, literally. Earlier this week on karaoke, I sang Rockwell’s 1984 hit “Somebody’s Watching Me”. This song is more timely now than it was 29 years ago. Are we heading toward a new normal?

Verizon Gives Away Phone Records

Verizon Gives Away Phone Records

Are you a Verizon user? If so, and if you haven’t heard already, listen up. Verizon, under court order, was forced to give away countless telephone data to the National Security Agency.

This current administration required Verizon to turn in all calls, without the permission of Verizon users, on an ongoing daily basis, whether users were?suspected of doing anything wrong or not.?The Foreign Intelligence Surveillance Court gave the?order to the FBI on April 25.?Phone numbers, call locations, and call times were recorded and turned in. The content of calls were not. If that’s supposed to make me feel better, nice try. Of course, the NSA, FISA, FBI, or Verizon has nothing to say. It’s not known if Verizon is the only major phone company made to give such an order, but I doubt it.

This is just wrong on so many levels. First off, our US Constitution forbids anyone to be searched in this matter without a warrant. Does our Constitution mean anything anymore? If they’re recording our phone info, how much farther can and will they go? Will they round us up just because they say something we don’t like. It’s not paranoia, it’s happened before. Look at all the 20th century dictator regimes. Plus, the United States of America is supposed to be an open free society. How open and free is our society if I’m looking over my shoulder every time I pick up my cell phone, wondering who is listening and what if I say the wrong thing? Am I overreacting or looking at this the wrong way?

U.S. and China Tackle Hacking

U.S. and China Tackle Hacking

There’s been a lot of news about Chinese espionage and hacking into US institutions. It’s been a huge concern for our security. In July 2013, there will be talks between the two nations to ease tensions, tensions caused by Chinese hackers getting and selling corporate and government secrets, among other cybercrimes.

This summit will be held in Rancho Mirage, CA and will be attended by U.S. President Barack Obama and Chinese President Xi Jinping.?Officials warn us not to get our hopes up. This?isn’t expected to?stop Chinese hacking or espionage, but some regulations?need to be set.?According to one?official, ?”It is a serious issue that cannot simply be swatted away with talking points?. But recently, hackers have stolen information about fighter jets and pipelines. But the Chinese government insists it too is a victim.

I’m glad this summit is happening. China is the fastest growing economy in the world. In fact, I read China bought U.S. food company Smithfield Farms for billions of?dollars. So no one can deny how tight the US/China relationship is. Technology wise, many of our products and smartphones are made there, and many of the consumers are Chinese. Plus, issues that affect both countries will be addressed, like North Korea. But the main thing is finding a way to stop cyber attacks on both nations before they become devastating. Heaven forbid a cyber attack hit our electric grid, oil, or food supply, or other avenues we take for granted for our mere survival. What do you think of this summit and will it help curb the tide of cyber?espionage?

Is Android a Malware Machine?

Is Android a Malware Machine?

Over the past year or so, mobile malware has become an epidemic. Not only that, it’s getting more sophisticated, harder to diagnose and harder to eradicate. But it seems like Google?Androids are attracting malware like nobody’s business.

According to F-Secure labs, the number of threats have skyrocketed so far in 2013. But this year, Android’s malware percentage is?91 percent, up from 79% in 2012. That means of all the mobile device brands, Droids account for 91% of all malware issues. Meanwhile, none were found in Apple or Blackberry; the other nine percent were found in Symbian. Of the malware found in Android mobile, 3/4 of it was made to hack into financial info (debit and credit cards, bank accounts, 401Ks) and take people’s money.

But wait…there’s more. There are suppliers that sale malware to other scammers that specifically target Droids. They convince users to give permission to update data, like Adobe Flash. When the user is hooked, the malware or spyware intercepts and exploits the users banking habits. Why doesn’t Apple have this problem? Because there, 3rd parties can’t get permission to wreck stuff up. With Apple, apps are restricted to what personal info can be accessed. With Androids, anything goes.

In my writings, I try to be unbiased as possible. But it’s hard to be unbiased when reports like this come out. I’m not exactly saying not to buy Androids. But as a consumer, I’m thinking twice before getting my next smartphone. I don’t think I’ll support Droids until at least something is done about this malware issue, and what it can lead to. What can Android do to reduce this malware epidemic?

 

Computer Geeks Now Offers No-Contact Service
We offer two types of service: 1) Online remote 2) No-Contact at your Curb Service
X