HAPPY PLANET- SECURITY
The future belongs to those who believe in the beauty of their dreams.
  Cosmos of Happiness
  >Happy Planet
  - Happiness
  - Science
  - Mind Technology
  - Meta Physics
  - Dream
  - Meditation
  - Intuition
  - Philosophy
  - Psychology
  - Creativity
  - Telepathy
  - Great Scientists
  - Dream Dictionary
  - Miscellaneous
  - Games
  - Links
     
  >Special Features
  - Intelligence
  - Security
  - Tutorial
   
  >Powered by 
   

 

 

  Welcome to Happy Planet - Security Section  
 

"Deep in the sea are riches beyond compare.
But if you seek safety, it is on the shore."

Why is it REALLY important to protect your privacy and computer?

Why should we get ourselves stuff like PGP or not leave ANY tracks about our activities?

Because, my friend, besides what mr. Gates says, Internet isn’t a child’s play. Enormous amount of data is already being collected by internet service providers, email providers, religious cults, marketing experts, intelligence agency’s, etc. Cookies are the most infamous “features” that can be used to track you and build a profile from you, but there are plenty of others as well. And that data they collect isn’t going to "vanish" anywhere. Governments and companies chance overnight, but technology, information and files remain. Think about the cruel fact that you might not get some job you apply for just because you have spend too much time in www.playboy.com or because you have send few emails to your friends that say:"xxxxxx is bastard!". Or because you have by an accident surfed into www-site that contains illegal or dangerous information. Or because someone has used your internet userID and password and done that ! Even today employers sometimes check their "rookies" internet image. Why ? Because they can easily built up a profile from you that way and because its perfectly legal! Here in Finland, some internet activity’s are protected and compared to the "phone privacy", but in most countries, there’s no law that sayes:"Thou can not follow ones internet activity nor sell that information to third parties". And since information is worth $$$, just guess how many people earn their incomes from that ?

One good proof about this is SPAM. SPAM is junkmail, advertises that you can get to you email account. I have gotten SPAM before I learned to protect my internet activities. Then I also changed my email address, and off went the SPAM. As far as I’m a aware of, EVERYONE I know, gets SPAM and curses it to hell, because they don’t (want to) know how they can prevent SPAM. However, its simple: take care on your privacy !

Besides what goes on in the internet, your privacy and even safety, can be violated pretty easily if your computer gets attacked physically. Someone, for example, steals your computer or breaks into your house. Not to mention if you have a laptop computer, then your computers physical safety is in severe risk. Your documents can be read by anyone who gets an access to your computer, your emails can be read, your passwords and login information can be stolen and used without your knowledge, and documents that you have deleted earlier can easily be recovered and read. Not to mention that your computer can be installed with Trojan horse programs that monitor your computer usage and steal your passwords! Computers and operating systems themselves provide no security or very limited security, and only if you know how to use them properly. Would you like that your personal files and emails would be read by some criminal or psycho that broke in to your house or stole your laptop computer? Would your company like the idea that documents related to your work are read from your machine? I bet not. If you are a reporter or journalist, then these issues can be a matter of life and death to you, depending upon what information does the villain or hostile government get their hands into.

Also remember, that Windows and many programs in Windows OS environment, create logfiles and history information about your activities. Most of them are pretty harmless, except that they take out your harddrive space, but there are some which you should think about. Your TEMP-folder, for example, can contain almost anything. It can have copies of documents you have deleted, programs you have installed or uninstalled, log files from various programs, etc. If you are using normal settings, you Internet browser is almost a gold mine: it stores information about the sites you have visited for weeks, in theory, forever! So, anyone getting into your computer, one way or the other, can easily see what did you see in the net and when. Programs also contain information about what files they have last opened. Also, remember, that deleting a file doesn’t erase it…when you delete a file, Windows simply marks those clusters as “unused” so that something MAY be written to them in the future. Using a simple, freely available undelete tool, most of them can be recovered even months after! You need to overwrite the files if you don’t want them to be recovered by anyone.


Besides privacy and physical security, what else is on the line here? Why should I be worried?

In short, a lot! Besides “normal” criminals, there are plenty of hackers, crackers and lurkers out there to get YOU. Why you? Because you are easier target than I am. They try to find the easiest target they can, and believe me, they will find it. The question is, will it be you or the guy next door...Until he patches he’s system and the hacker either moves to an other target or gives up because its become too complicated and hard to attach someone.

So what can they do to you? Well, they can hack into you or your companies computer and steal precious information (industrial espionage) or personal information like emails and documents you store on your computer. They can use your computer to launch attacks against other computers, and YOU will get the blame for it. Usually the targets are companies and websites, perhaps the company you are working in, and they are using you and your computer to get them. Either for money, fame or revenge. One example about this is DoS or DDoS attacks (Distributed Denial of Service attack). In DoS, the hacker gets he’s hands on computer by planting a Trojan horse program, and then uses that computers connection and resources to flood some specific target, like a particular www-page so it cant be used at all and has to be shut down. You can read more about DoS attacks in the net, Im not going to go to the specifics here, but the point is, that your computer can be used to commit crimes without your knowledge if you don’t know how to protect yourself! Also, hackers use computers to launch SPAM, store pirated software or just mess them around for their own amusement. There are also cases where some perverts use their victims computer as a tool to get her/him in person or via net….or just terrorise her/him. And NO, children are NOT safe from these perverts either, on the contrary, children are the easiest targets for hackers and perverts to attack.

When you surf in the internet, you can be attacked as well. Hacker might plant an Active-X component or Javascript on the www-page and trick you to run it, in fact, if you have default settings, it might be done in the backround without you knowing anything about it! It can just crash your computer or browser, or exploit some security hole in your system and do…well, almost anything. No, I’m not joking here! Active-X component can format your harddrive, they can do ANYTHING what the creator of them wants them to do. Here you can find more information about Active-X and Java: http://www.cs.princeton.edu/sip/java-vs-activex.html If you want examples, then go to my next page (Are you in danger? etc.)

Also, in many xxx-rated sites they offer you to download file that they say “will let you to see all xxx-pics and videos”…they are usually dialers, and when you launch them, they can make your modem (if you have one that is) to call somewhere like Brazil....on to some very high-cost xxx-phone service. You credit card information can also be stolen and used for hackers own amusement and you have to clean up the entire mess and perhaps even pay a part of he’s “shopping”. Also, if someone is just being naughty to you, they might lock you out from your own email service by capturing and chancing your passwords. Or send email under your name to your friends, boss, anyone.

But I have nothing to hide! If someone really wants to hack me, go ahead!

Now, most people who refuse to listen to common sense and protect their privacy and security, say something like:"I don’t have anything to hide. If someone wants to do that or that, I don’t really care." Now, this kind of comment is very easy to crush:"Would you like me to read your personal mail (both email and regular mail)? Would you like me to read your personal files on your computer? Would you like me to give your home address and phone number to hundreds of commercial enterprises for marketing purposes, and for every crazy people I see on the street? Or how about it, would you like me to mess around in your house, steal, break or just pillage it?" Nobody would say yes to those questions. The problem, however, is that people simply don’t realize the fact, that in the age of computers, your email IS as good as your regular mail, your IP-address IS your home address, and basically the only thing that protects you is YOUR own actions. There’s no international police force operating in the internet. There are no international courts where you can easily sue a cracker. Welcome to the digital age.

These are just some examples about what not only can be done, but what is done on daily basis. There is very good chance that if you don’t pay attention and know how to protect your privacy and security, some hacker or cracker or psycho might get your computer under he’s control. Usually things don’t get that far and there are plenty of easy targets in the net, so you might be lucky enough not to get abused or hacked. But don’t count on it. Protect yourself, because nobody else will!

Also something to think about

Ever heard of system called: Echelon ? It is global spying network created by (as so far is known) USA, UK, Australia, New Zealand and Canada. It not only scans all international communication lines (using 120 satellites, microwave listening stations and an adapted submarine) but also analyses and stores usenet messages. All of this is done transparently and automatically (bits are easy to handle). There is no certainty that how long has this network being active, but it was "compromised" couple years ago.

"NSA (National Security Agency of USA) has also intercepted confidential company communications and given them to favored competitors. Thomson S.A., located in Paris, and Airbus Industrie, based in Blagnac Cedex, France, are said to have lost contracts as a result of information passed to rivals. The U.S. government misled states in the EU and [Organization for Economic Cooperation and Development] about the true intention of its policy," the report (http://jya.com/ic2000.zip) adds… European Union has considered that Echelon is severe threat to safety and privacy in the EU region and has suggested that strong encryption from “open sources” should be used to counter it. “Open source”, because NSA has planted several backdoors to encryption systems around the world. More information about EU and Echelon can be found in here and here.

Remember, that Echelon doest just spy on companies. It spyes everyone. Everything that moves in bit-format. Just think about it: Big Brother IS watching. Every email you send, every message you post, every page you visit…they will know about it! Scary. Horrible. And, reality. Again, welcome to the digital age!

Also, I STRONLY suggest you read these two document about NSA and Echelon. The first one is about NSA infiltrating to cryptosystems and companies around the world and being able for the last 40years to intercept and decrypt and read ALL diplomatic communications from over 120 countries because of NSA build-in backdoor to cryptosystems! Second gives more details about Echelon project.

http://mediafilter.org/caq/cryptogate/
http://mediafilter.org/caq/echelon/

Spooky, eh? Then think about THIS:

TEMPEST stands for Transient Electromagnetic Pulse Standard.
Its electromagnetic radiation "leaking" from every electronic equipment. Including your desktop PC... We are used to think that spying is something that you do with hidden cameras, microphones or sneaking into someone’s office. Well, maybe we should start to think otherwise. Snooping information from your computer is basicly speaking much, much more easier.

TEMPEST attacks are most easily done by analyzing the electromagnetic radiation from your monitor (usually). With kind a phased array antenna & few electronical components it is possible to "see" what you see in your computer screen...But as an exception that it can be done from across the street and there’s absolutely no way you can know whether or not you are targeted by TEMPEST. This makes it very powerful way to do some serious espionage.

- Markus Jansson

 
     
  Back to Security>>  
 
           
   
 
Copyright © Happy Planet. All rights reserved. webmaster
 
1