CyberSecurity at Sochi and at Home

by | Nov 23, 2015 | Uncategorized

Several news articles have referred to Russian surveillance at the just-concluded Sochi Olympics as “Prism on Steroids.” Surely they jest. Prism, the NSA’s widely cast surveillance net, is practically the definition of (cybersurveillance) steroids. One big difference would be which of the monitored give their consent to be monitored. Here in the USA where we are, in theory, governed by consent, we are surveilled secretly, whereas in Russia, there seems to be little effort at hiding government surveillance.

The Federal Security Service of the Russian Federation (FSB), the successor to the widely-feared KGB, had deep-packet inspection filters installed by every telephone company, wireless carrier, and Internet service provider that serves Sochi. The system can track sensitive phrases and intercept any data and voice traffic in and out of Sochi.

The NSA only has free reign with that kind of data going to or coming from outside the USA or from individuals who originated outside the USA, but only metadata for domestic users who only communicate domestically with domestics. Unless FISA has okayed it. Which has approved 99.97% of all surveillance requests made of it. Considering that the Olympics is an international event with thousands of international athletes and travelers, it would seem that most of the communications traffic at an American Olympics could expect about the same level of privacy as we saw at Sochi.

So, what’s a person who wants their communications to stay private to do? We could do like Julia Angwin, author of “Dragnet Nation” and buy a burner phone with cash, try to have multiple uncrackable passwords, create a false identity, use a shielded wallet. You could use private browsing of websites, anonymizers, proxy servers, and stay off of social networks – and use encryption for your emails. Still, in many places, and certainly at Sochi, that data – encrypted and not – is still getting sucked into storage.

But the rest of us, who like our Internet communications, friendships, and purchases without too much effort, can still take some precautions. Update your operating system regularly. Install, use, and update anti-malware software. Don’t click on links in any emails – instead, go to the website of the company by typing it in manually through a browser. Don’t use your Social Security number as ID. If someone asks you for passwords or SS# over the phone, call them back at the company’s main phone line that you yourself look up. Make your online purchases with a low-limit credit card (not a debit card) that you keep just for that purpose. Be aware of social hacking efforts.

Use fairly unguessable passwords and don’t use the same one on every website https://burgessforensics.com/article_been_hacked.php – and make sure that you at least do not use anybody’s name, any dates, any dictionary words, or any easy patterns of letters or numbers.

Finally, while taking prudent steps will go a long way toward not having your life be an open book to every Tom, Dick & Hacker that comes along, an assumption that your communications are completely private is likely an inaccurate assumption. Perhaps cyber-protection will one day become bulletproof. On the other hand, some prominent thinkers, like David Brin in The Transparent Society, believe that the solution is in spying on the spies – surveilling the surveillers.

As for returning from your trip to Sochi, it would not be a bad idea to do a factory reset of the devices you took along with you. After you save your pictures!

Subscribe to our free and informative weekly forensics newsletter!

 

Related Posts

CSI Cases from Burgess Forensics #69 A Case of Hiphop Beef

The Stories are true; the names and places have been changed to protect the potentially guilty. It was almost closing time on Friday and my thoughts were turning to Barbequeing some of that mouth-watering Santa Maria tri-tip while my nose was turned to the scent of...

Email as a signed contract vs. fraudulent emails

Email as a signed contract vs. fraudulent emails We all send and receive email, but did you know that what you say in an email can be interpreted as a legal contract? And that sometimes, emails are fraudulent? Both are true. The Statute of Frauds Although email didn’t...

El Salvador Adopts BitCoin

El Salvador Adopts BitCoin copyright Steve Burgess, 2021 El Salvador just passed a law to make BitCoin (BTC) legal tender and is the first country to do so. It did something similar back in 2001, when it made the US Dollar the official currency, replacing the...

Keeping Your Bitcoin Safe

BitCoin. Everybody wants some. But what’s the best way to keep it safe once you’ve got it? And how to get it? First things first – you get BitCoin (and Etherium, and DogeCoin) from a cryptocurrency exchange, like you would from a “regular” currency exchange to turn...

Cyberbullying and Covid-19: 2021 Update

California defines a cyberbully as anyone who sends any online communication to deliberately frighten, embarrass, harass, or otherwise target another. The Cyberbullying Research Center defines it as “willful and repeated harm inflicted through the use of computers,...

Cybersecurity & Covid-19: Vulnerability and What to Do About It

Cybersecurity & Covid-19: Vulnerability and What to Do About It Steve Burgess, 2020 As if we didn’t have enough to worry about. With so many of us working from home (close to 90% of American corporations are encouraging or requiring employees to do so) and having...

Indian Summer Lovin’ – Tech Tips For a Warm Autumn

by Natalie Miller, 2019 With Indian Summer temperatures rising, here are some tips to help you make sure your devices are ready to conquer these warm days of Fall like you are. Check Those Pockets! Taking a dip in the pool, going for a paddle in a kayak, and jumping...

Electronic Waste and Recycling – What Your Old Devices Can Say About You

by Natalie Miller, 2019 With new models of phones and computers being released every year, wanting the latest and greatest is never a bad thing, but what about your old devices? The truth is that old devices can still hold all of the data you put on them or that they...

The Case of The Client Who Wanted … to be Wanted

The Case of The Client Who Wanted … to be Wanted copyright Steve Burgess, 2018 It was nearly Christmas, but the morning sun was pouring in through the windows of my Central Coast office, casting shoe-shaped shadows on the West side of my desk. Perhaps I should have...

Burgess Forensics Newsletter Vol. 5 Issue 1: FitBit Fun Forensics & Foes 08.08.2018

  Fitbit, Fun, Forensics, and Foes Have you tracked your 10,000 steps today? Has anyone else tracked them? Fitness trackers are big business, helping people get and stay fit, and helping them share their progress with friends – and sometimes with strangers. The...

Pin It on Pinterest

Share This