The Internet is stalking you. It is useful but it can become your worst enemy. As you now know, governments and corporations around the world expend vast resources and expense to spy upon your Internet use, phone conversations, email, GPS location and much more. Almost every facet of our daily lives are being scrutinized. Thousands of identity thieves, hackers, and criminal organizations are watching your Internet activity and installing malware on your Internet devices. You need my writing!
The Internet is Infected! The Ultimate Cyber Security Guide for Small Business and Home Computing!
If you find the information on this blog valuable you will find my upcoming three volume cyber security books infinitely more so! Visit my website at http://thatcybersecurityguy.com. My 8 years of research and 900 written pages are about much more than just cyber security as my writing presents valuable small business and general home computer knowledge. Visit me on Twitter @ThatCyberSecGuy. See the ACLU video "Invasion of the Data Snatchers" at YouTube to understand why you need my books and PDF files on the infected Internet.
Friday, February 26, 2016
In interview after interview everyone is missing the point behind Apple's battle with the FBI
Folk's, I'm growing very tired of listening to radio and TV interviews that are all missing the point behind Apple's battle with the FBI. It is certainly about privacy but that is just the Tip of the Iceberg. Here is something for you to think about as NPR and others only put lipstick on the FBI pig!
About 10 to 12 years ago the government passed legislation to ensure that customers private, personal, and financial information, which is collected and manipulated by corporations, is to remain as secure as possible under penalty of prosecution.
Apple, in direct response to that concept, created an operating system that explicitly complies with the heart and soul of that mandate. As a result, Apple, itself, cannot even access that data on the person's device, a phone.
The government has now mandated that Apple violate that principle by writing code against that security which, after it is written, has no reasonable guarantee that such code would remain under the control of responsible users. The case in point is Edward Snowden, who the NSA thought would not violate the secrecy of the NSAs violation of data gathering without due process.
If the government (NSA) cannot protect its own dirty secrets (The Atom bomb, the Hydrogen bomb and so on), how will the government (FBI) protect the code they had the courts mandate to be written? How is Apple going to protect itself from prosecution when that release ultimately happens? Catch 22.
Even if Apple is not ever prosecuted does every United States citizen want to surrender all the data they store on their smartphones to the Russian mafia or the Chinese syndicates? This last sentence is something you won't hear any radio or TV interview mention!
Thursday, February 18, 2016
Apple fights an unprecedented battle! The U.S. government threatens what is left of the security and privacy of every U.S. Citizen!
Taken from my book:
On July 11, 2014 in an interview with the Guardian, William Binney, a 30-year veteran of the intelligence community stated the following as fact; "At least 80% of all audio calls, not just metadata, are recorded and stored in the US… At least 80% of fiber-optic cables globally go via the US… This is no accident and allows the US to view all communication coming in... The NSA lies about what it stores… The ultimate goal of the NSA is total population control…" William Binney resigned from the NSA on October 31, 2001 because he was disgusted by Washington's move towards mass surveillance. The difference between Binney and Snowden was his high rank and that he did not take any documents as proof with him. From that time forward, he has been an outspoken critic of the NSA's unnecessary mass surveillance stating, "it's better than anything that the KGB, the Stasi, or the Gestapo and SS ever had!" He likes to mock the NSA by pointing out such things as how the NSA's mass gathering of data did not stop 9/11, missed Russia's intervention in Ukraine, the Islamic States' take-over of Iraq and has stopped zero terror attacks inside the US. Because of his vocal criticism he has been persecuted with investigations, had his home raided by the FBI who also took his computer and backup disks, had his security clearance revoked, which forced him to close a profitable $300,000 a year business and spend $7,000 on legal fees. In his Guardian interview he laid down the gauntlet by saying, "There are no other views for the judges to consider. There have been at least 15-20 trillion constitutional violations for US domestic audiences and you can double that globally. I call people who are covering up NSA crimes traitors." Binney expressed publically on CBN in July 2014 that the ultimate goal of the NSA is total population control. He also stated that Internal Revenue Service has "direct access" to the NSA's domestic spying data and was likely using it to target the tea party. (See: http://www.theguardian.com/commentisfree/2014/jul/11/the-ultimate-goal-of-the-nsa-is-total-population-control, http://www.cbn.com/cbnnews/us/2014/August/Whistleblower-NSA-Goal-Is-Total-Population-Control)
- GnuPG - The core; this is the actual encryption tool.
- Kleopatra - A certificate manager for OpenPGP and X.509 (S/MIME) and common crypto dialogs. (See: http://docs.kde.org/stable/en/kdepim/kleopatra/kleopatra.pdf)
- GPA - An alternative certificate manager for OpenPGP and X.509 (S/MIME).
- GpGOL - A plugin for Microsoft Outlook 2003/2007/2010/2013 (email encryption).
- GpgEX - A plugin for Microsoft Explorer (file encryption).
- Claws Mail - A complete email application with crypto support.
- Gpg4win Compendium - The documentation (for beginner and advanced users), available in English and German.
You have it within your power to turn back these draconian invasions into our privacy. Support Apple in their fight for your privacy. Encryption is simply a method of encoding information that makes it more difficult for someone to view if our files or messages are intercepted. Mankind has been employing, developing and using encryption for thousands of years, and it is time we all do so safely when using our infected Internet. Encryption seems like a lost art to the common person, but it need not be. This skill is mandatory to develop to be able to survive in today’s digital world. If you want to keep the data that you exchange with your business partners or family secure, it is essential that you master this skill.