You Are Not In Safe Hands

With every additional reduction in personal freedoms or intrusive piece of surveillance or data collection legislation the citizen’s concerns are salved by the oft used mantra that the data is in “good hands” and will be treated with the respect required and used only for the purposes outlined.

AirGap Anonymity Collective

The way sensitive information was handled by Hillary Clinton and her staffers at Foggy Bottom during her tenure as Secretary of State is indicative of the lack of respect shown by even uber-senior government officials to data collected by governments by legal and illegal means.

With every additional reduction in personal freedoms or intrusive piece of surveillance or data collection legislation the citizen’s concerns are salved by the oft used mantra that the data is in “good hands” and will be treated with the respect required and used only for the purposes outlined.

How hard it is to accept those type of assurances from state actors in the normal course of events is obvious with even a cursory knowledge of the antics of the NSA and GCHQ under the PRISM, XKeyscore and Tempora surveillance programs.

How much harder it is when juxtaposed with the reckless abandon with which senior state department officials…

View original post 552 more words

Advertisements

Am I Being Surveilled?

US and UK intelligence agencies after the Gemalto hack in 2010 and 2011 have the ability, with the stolen encryption keys, to monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt.

AirGap Anonymity Collective

When someone asks that question do they mean that they are worried about rootkits, backdoors, trojans, worms, spyware, keystroke logging; are they concerned that someone has clocked their PGP private key; do they suspect LE have a warrant to eavesdrop their voice comms; or do they fret about the integrity of SIM card encryption and the Gemalto hack? Do they fuck.

No, they don’t worry about these things because they don’t know about these things, they don’t care to spend the time understanding the threats or pay for the solutions and I don’t blame them. And that simple reality assures the continued happiness and abundant joy of the hacking for profit (LE, governments, economic imperialism) community.

If a concerned citizen is an above ordinary John Q then they follow a few simplistic tips they read after a quick Google and subsequently consider themselves bullet-proof and smart. If they are a small business…

View original post 1,375 more words

Good Tor Behaviours

Good #Tor Behaviours https://airgapanonymitycollective.wordpress.com/2016/03/26/good-tor-behaviours/ #TSCM #Anonymity #correlation #surveillance #discipline #infosec #security #hacker

AirGap Anonymity Collective

Using Tor does not ensure your anonymity, there are many many ways that you can be de-anonymised. You will always leave footprints. If you do leave a footprint in error then your job is to try to make them “65 million year old hard to find fossilised dinosaur” footprints and not “freshly pressed custom-made initialled Nike” footprints.

There are all sorts of “novel attack vectors” that can be used to identify Tor users. Developing a counter-surveillance and anonymity mindset while following disciplined behavioural habits combined with the correct installation and isolation of your Tor presence will avoid 99% of the ways that Tor users have their identities exposed.

Try to eliminate the most blatantly obvious technical and non-technical behaviours that will compromise the integrity of your anonymous identity online. Use Tor consistently:

  1. Don’t use Tor at home, in your hotel room, at your favourite coffee house;
  2. Watch out for & monitor for DNS leaks

View original post 108 more words

Anonymizing Your Identity Draws the Attention of Who?

The point is this – if you intend to use VPN / Proxy services then get ready to re-authenticate many of the services that you regularly use as a registered customer.

AirGap Anonymity Collective

Some companies that you have a registered relationship with, who detect your use of VPN / Proxy Services –  will impose another authentication process on you – which is highly inconvenient, in some cases downright intrusive and often requires you to submit much more personal information than you were required to provide when you originally registered with the service.

The point is this – if you intend to use VPN / Proxy services then get ready to re-authenticate many of the services that you regularly use as a registered customer.

Appropriate Protection 

Very few people want or need Tor, Tails, PGP, Whonix or the host of other helpful TSCM tools to confuse that NSA bogey man or the spook in the corner who is stalking you because of your political views 🙂 – most people just want their traffic protected and avoid having their passwords and emails hacked while…

View original post 1,129 more words

Just Another Dent in Your Privacy

The wholesale and undemocratic removal of personal freedoms and erosions of privacy without consultation also includes a plan to gain access to data from Viber, Skype, Whatsapp and other providers that allow IP based phone calls.

The EU’s Justice and Home Affairs Committee held an extraordinary meeting in Brussels this week. They did as they normally do – made a bunch of decisions that affect your privacy – without consulting you – their normal MO.

The Irish Justice Minister – some middle aged woman with about as much awareness of the basis of global jihadism as the average infant – stated that she was finalising a “statutory instrument” which will provide the legal basis through which Irish-based airlines and ferry companies will provide the UK authorities with API data (Advance Passenger Information).

From then on all passengers entering the Common Travel Area in the EU will have their data shared amongst what is being called “the appropriate law enforcement and immigration authorities” before they start their journey. As usual the definition of “appropriate” is code for just about anybody they feel like sharing it with – without oversight.

European Ministers said they were also preparing to share information from national criminal databases with each other. Seems like national data protection legislation was also unilaterally abolished at this “meeting”.

The wholesale and undemocratic removal of personal freedoms and erosions of privacy without consultation also includes a plan to gain access to data from Viber, Skype, Whatsapp and other providers that allow IP based phone calls.

In a final measure we can look forward to our data being shared with upstanding nations such as Turkey in an effort to “step up counter-terrorism efforts”. Other human rights luminaries who will have access to this info includes representatives from North Africa, the Middle East and the Western Balkans.

The 180 Day Email Rule

Emails that are older than 180 days are considered abandoned and that makes them subject to search without a warrant.

Have you heard of the 1986 Electronic Communications Act? Probably not.

The law was passed by Congress many years before the vast majority of people were online. The main take out from the legislation is this:

Emails that are older than 180 days are considered abandoned and that makes them subject to search without a warrant. 

That’s a little intrusive. And a totally ridiculous definition of abandoned. A secret 181 days ago is still a secret today. A private matter 181 days ago is still a private matter today.

The process for one of the alphabet agencies to access your “abandoned” emails is that they need only ask your Internet service provider for the messages.

A bill seeking to extend Fourth Amendment privacy protections for personal papers to digital files and repeal the 1986 law has repeatedly failed to make progress since being proposed in 2012.

See more on the debate here from Philip Wegmann the congressional correspondent for The Daily Signal.

 

EU Suspends Reason & Rules for Terrorist Turkey

The EU has abandoned Europe. They have no interest in maintaining European culture and identity. The EU / UN / US policy makers will insist on opening the door to more and more extremists.

Redacted for edits and revisions and will re-post at a later date.

REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED REDACTED

END.