Online Safety

Prevent or avoid being spied on by the Government

Prevent or avoid being spied on by the Government

Wikileaks, an international non-profit organization that publishes secret information, fired a fresh salvo. The website that apparently got access to secret documents of U.S. Central Intelligence Agency (CIA) disclosed ingenious hacking techniques employed by the CIA for hacking everything from computers, smartphones, and TVs to compromising Internet routers and computers of the users.

The objective of this move was to bring into light the CIA's global covert hacking program, its malware arsenal, and dozens of weaponized exploits that the agency uses for a wide range of U.S. and European company products like Microsoft's Windows platform (Including bypassing Windows Activation), Apple's iPhone, and Google's Android OS. These devices along with several others like Samsung TVs are turned into covert microphones or implements of espionage by secret cyber-tools of the CIA.

The report from Wikileaks laid bare the designs and capabilities of the U.S. intelligence community's closely guarded cyberweapons. This is likely to cause immediate damage to the CIA's efforts in collecting intelligence overseas and put additional restrictions on the U.S to carry out its missions on espionage.

There are also reports that the CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux, and more, such as EDB's “HIVE” and the related “Cutthroat” and “Swindle” tools. HIVE is described below.

HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows that are configured to communicate via HTTPS with the webserver of a cover domain. Every single operation utilizing these implants has a separate cover domain that resolves to an IP address, located at a commercial VPS (Virtual Private Server) provider.

The public-facing server forwards all incoming traffic via a VPN to a 'Blot' server that is capable of handling actual connection requests from clients. It is set up for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the 'Honeycomb' tool server that communicates with the implant. The Honeycomb tool server then receives exfiltrated information from the implant.

The good news for the users is all this does not mean an end of privacy. There are a few methods via which one can communicate over the web and the phone without revealing their identity to the CIA.

Prevent being spied on by CIA or Government

These are just some of the basic precautions one could. Obviously, these may not help if someone is hell-bent on monitoring you.

Read: How do I know if my Computer has been Hacked and what to do next.

How do you know if you are being spied on

There are some tell-tale signs that can let you know if someone is spying your phone or computer. Here are some of them:

Read: How to avoid being watched through your own Computer.

This article on how to protect yourself from NSA spying & snooping will give you additional tips that may help you protect yourself from government surveillance systems.

Besides being extremely unpleasant for invading privacy, tracking poses a genuine risk. This post will show you how to Opt-out of Data Tracking & Targetted ads on the Internet. Take care and stay safe!

How to reverse Mouse and Touchpads scrolling direction in Windows 10
Mouse and Touchpads not only make computing easy but more efficient and less time-consuming. We cannot imagine a life without these devices, but still...
How to change Mouse pointer and cursor size, color & scheme on Windows 10
The mouse pointer and cursor in Windows 10 are very important aspects of the operating system. This can be said for other operating systems as well, s...
Motoare de jocuri gratuite și open source pentru dezvoltarea jocurilor Linux
Acest articol va acoperi o listă de motoare de jocuri gratuite și open source care pot fi utilizate pentru dezvoltarea jocurilor 2D și 3D pe Linux. Ex...