Saturday, August 22, 2015
Monday, August 10, 2015
Apple, FBI Battle Over Privacy Rules
Apple Incorporated recently said it was increasingsecurity settings on its latest operating system for the company’s wireless devices. Apple said its newencryption rules are designed to protect users fromsearch and seizure of their iPhones.
But the changes are of concern to federal investigatorsin the United States. The Federal Bureau ofInvestigation and high-tech companies are nowdebating over how much personal information lawenforcement agencies can demand to see.
James Comey is the head of the Bureau, better knownas the FBI. He recently spoke about Apple’s new rulesduring a visit to the Brookings Institute in Washington. He and other FBI officials say the rules will hurt lawenforcement by putting important evidence off-limits tofederal investigators.
Apple released the latest operating system for iPhones and iPads last month. At the time, the company included a security change that it said would largelystop police agencies from opening the devices without the owner’spermission. The earlier operating system enabled Apple to unlock its productsif police or federal investigators provided a court order.
The maker of the Android operating system, Google, quickly followed Apple’sexample. The Android system is used on many wireless devices.
The change came only a few months after the U.S. Supreme Court ruled intwo cases. The court declared mobile phones to be what it called “a digitalrecord of nearly every aspect” of users’ lives. The rulings largely set thedevices off limits to police except in only the rarest cases.
Privacy and civil rights activists liked the new security rules.
But Mr. Comey criticized the changed security settings as “harmful” to lawenforcement. He said, “there will come a day where it will matter a great dealto innocent people that we in law enforcement can’t access certain types ofdata or information, even with legal authorization.”
But one encryption security expert says the argument between the two sidesis largely meaningless. Alain Ghiai is chief executive officer of DigitalSafe, asecure data service based in Switzerland. He says that the FBI can alreadyget the information it wants because of the USA Patriot Act. The U.S.Congress passed the law in 2001. It was extended in 2011.
Mr. Ghiai says the government can use the Patriot Act to force your Internetservice provider to supply e-mails or other electronic records. He says it iseasy for a government lawyer to get the information without a user’sknowledge or permission.
Mr. Ghiai notes that the new Apple and Google encryption policies make itdifficult for police to break open a suspect’s phone. But he says nearlyeverything on that phone will have, at some point, been sent through anInternet or mobile phone service. He says the Patriot Act gives federal lawenforcement nearly unlimited access to those data sets – all under the coverof secrecy.
FBI Director Comey knows that some people worry about the security andprivacy of their information.
In his words, “some believe that the FBI has these phenomenal capabilities toaccess any information at any time—that we can get what we want, when wewant it, by flipping some sort of switch.” “It may be true in the movies or onTV. It is simply not the case in real life,” he says.
But technology is changing far faster than the laws governing surveillance. The new encryption rules, he said, run the risk of letting criminals go free.
Mr. Ghiai agrees that the federal government should have some ability to seeencrypted information on mobile devices. But he warns that measures like thePatriot Act already give the federal government access to any information that has ever been stored or shared.
Nine Ways to Protect Yourself from Hackers Online
An increase in cyber-attacks and identity theft make the Internet seem like ascary place these days.
The hacking of Sony Pictures led the news for some time. The U.S. StateDepartment public email system was shut down. Even the White House was a target of cyber-attack.
Last week, there were reports of a billion dollar theft from European banks andsecret viruses on millions of computer systems across Russia, China, India,Iran and elsewhere. This raises a question:
How can individuals protect or make it more difficult for hackers to accesstheir information?
Here are nine tips that can help you protect against cyber-attacks:
1. Make your password harder to hack
Hard passwords include upper and lower case letters, numbers and specialcharacters. They should be at least eight characters in length. They shouldalso not spell out words easy for hackers to find, like your pet’s name or thename of a family member.
2. Change your password regularly
A very common mistake made by users is to create one hard password, butthen never change it. Remembering a long list of complicated passwords canbe difficult. But no password is unbreakable. Hackers are better able hackmultiple accounts if those accounts all have the same password. A passwordmanagement service, like Dashlane or PasswordBox, can help you keeptrack of hard passwords. These services permit users to easily store andsecure their passwords.
3. Clear your browser history
This goes for all the devices you use in a day – your home computer, yourwork computer, or your friend’s iPad. Internet browsers like Firefox or Chromekeep track of where you’ve been and what you’ve done online. They keeprecords of every site you visited. Information about what you sent from orsaved on your computer can be kept for days or weeks. It is very easy foranyone who sees that information to steal a detailed record of your onlineactivities.
4. Do not use free Wi-Fi
An increasing number of public places now offer free wireless access to theInternet. Often, a user does not need a password to connect to these wirelessnetworks. These services might be useful, but they’re also an easy way forhackers to access everything on your device. Unless you really need it, it isbest not to use it.
5. Use HTTPS
HTTPS is officially known as “hyper-text transfer protocol secure.” It is similarto HTTP, which is used to enter Internet addresses. HTTPS adds an extralayer of security and encryption while online. Communications betweenusers and sites that support HTTPS are encrypted. The information is alsoauthenticated. That means that HTTPS can determine whether or not awebsite is real.
6. Watch what you click
One of the most popular and successful ways hackers infect your computeris through a technique called phishing. Phishing occurs when someoneopens an email attachment that looks real. But the attachment is actually avirus that immediately infects the user’s computer. If someone sends you afile or a website you did not ask for, it is best to not click on it.
7. Try not to use public computers
For many people, not using a public computer can be difficult. Those without acomputer or Internet access at home often use Internet cafes to get online.However, the more different people use a computer, the more likely a virushas infected it.
8. Use anti-virus protection
There are many anti-virus services available for users. They can offer manydifferent types of computer protection. Some anti-virus services are evenfree. They are a great way to have a professional help keep users one stepahead of hackers.
9. Be careful while using thumb drive
Thumb drives, also known as flash drives, are small and easy storagedevices to use across different computers. They are a popular device thatpeople use to exchange files and documents. They can also spread viruseseasily across computers and networks.
Digital Solution Helps Shield Online Activists
Chris Doten knows how dangerous conditions can be for democracy activists and journalists working underhostile governments. He is the head of digitaltechnology programs at the National DemocraticInstitute, a non-governmental organization that supportsopenness in government. He helps news reporters anddemocracy activists protect their privacy fromgovernment spying while online.
“We do work in relatively closed societies,” Mr. Dotensaid. “There are a lot of dangers, and we always try totake a thoughtful look at the risks that we’re incurringfor the people we’re working with.”
Those risks often include government raids, computerseizure, theft of private data and the identification ofsupporters and private email communications. Theseinvasions can lead to arrest, expulsion from a countryor worse. But Chris Doten said there’s a technologicalsolution that is helping people around the world protecttheir online activities.
It is called The Amnesic Incognito Live System or “Tails.” In computer terms, a “live system” is a stand-alone operating system that runs directly off a DVD or,increasingly, a USB memory stick. A live system usesonly on a computer’s RAM. None of the operatingsystem files are saved anywhere.
Once downloaded to a portable disk drive or USB,users simply connect Tails to any computer and run it.When taken out of the computer, the live system leaves no evidence of everbeing used on the computer.
Chris Doten says Tails comes with additional security applications thatusers can easily access.
“There’s also a multi-protocol chat client that can speak to Facebook, GoogleChat, and others called Pidgin" he added.
A growing number of journalists and rights groups are using Tails.
The non-profit group Reporters Without Borders works in support of freedomof the press. It has suggested Tails for journalists who need to protect theirsources. Activists in Tibet use Tails to securely document human-rightsabuses there by the Chinese government. And groups working to fightviolence within families are now using Tails to report abuse and protectvictims' identities.
But the same system that helps protect human rights activists can be used byhackers, criminals or terrorists to hide their identity and activities online.
Mr. Doten said the real concern should be how often Internet activists,journalists and others are targeted online and then punished for their activities.
“I’m frankly shocked at the state of digital security among U.S. journalists,” hesaid. “People who have real dangers that they’ve seen externally andinternally at times.”
“The fact that newsrooms around the country – even the big ones – are notinvesting more in this I think is a real crime."
Subscribe to:
Posts (Atom)