American Congressman Called for Investigation into Phone SurveillanceAdded: Wednesday, April 20th, 2016
Category: Recent Headlines Involving File Sharing > Ridiculous Criminal Trials
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, www.extratorrent.cc, 2016
One of the US congressmen was hacked when the intruders tried to demonstrate that someone’s phone number is all they need to record the calls, texts and location. He then called for an oversight committee investigation into this phone vulnerability.
It was recently revealed that the security flaws within the SS7 system, which brokers connections, billing and transfers messages between phone networks, provide remote access to mobile phone data in any place in the world regardless of the security of the mobile device, using just a phone number.
The Californian congressman Ted Lieu points out that the applications for this flaw are virtually limitless: for example, hackers can monitor individual targets to foreign entities that carry out economic espionage on US firms to nation states monitoring American government officials.
By the way, criminal won’t have access to encrypted messaging services like WhatsApp, but SMS messages and calls made through the mobile phone network can be listened in to, read and recorded. Moreover, the location of the mobile device can be tracked via the mobile network’s location services that do not depend on GPS or other location technologies on the device.
The US congressman claims that the security flaw has serious ramifications not only for individual privacy, but also for the general innovation, competitiveness and national security of the country. In fact, this vulnerability may render many innovations in digital security including multi-factor authentication through text messages just useless.
In the meantime, the hackers who demonstrated the attack in 2014, and again for 60 Minutes, revealed that the law enforcement and security services, including the NSA, were perfectly aware of the flaws and used them to spy on targets using just their phone number. Since the flaws originate from the mobile phone network infrastructure, smartphone users can do nothing to protect themselves other than switching off their phone.
Wednesday, April 20th, 2016
|Those systems have monitoring built into them even without the flaws. Governments use end-to-end encryption and aren't chartered to protect privacy of citizens. April 15 was tax day. I hope you paid all your taxes so this practice can continue.|
|The only people worried about "Mah privacy!" are paranoid crazy people and people doing wrong shit.|
|@2 and also people smart enough to recognize that privacy is of PARAMOUNT importance for society, especially when the people are being manipulated with manufactured terrorists and events.|
|Some quotes for your brain, I hope it improves|
Edward Snowden: "Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say" 
Daniel J. Solove stated in an article for the The Chronicle of Higher Education that he opposes the argument; he stated that a government can leak information about a person and cause damage to that person, or use information about a person to deny access to services even if a person did not actually engage in wrongdoing, and that a government can cause damage to one's personal life through making errors. Solove wrote "When engaged directly, the nothing-to-hide argument can ensnare, for it forces the debate to focus on its narrow understanding of privacy. But when confronted with the plurality of privacy problems implicated by government data collection and use beyond surveillance and disclosure, the nothing-to-hide argument, in the end, has nothing to say."
Danah Boyd, a social media researcher, opposes the argument. She said that even though "[p]eople often feel immune from state surveillance because they’ve done nothing wrong" an entity or group can distort a person's image and harm one's reputation, or guilt by association can be used to defame a person.
Adam D. Moore, author of Privacy Rights: Moral and Legal Foundations, argued "it is the view that rights are resistant to cost/benefit or consequentialist sort of arguments. Here we are rejecting the view that privacy interests are the sorts of things that can be traded for security." He also stated that surveillance can disproportionately affect certain groups in society based on appearance, ethnicity, and religion. Moore maintains that there are at least three other problems with the "nothing to hide" argument. First, if individuals have privacy rights, then invoking "nothing to hide" is irrelevant. Privacy, understood as a right to control access to and uses of spaces, locations, and personal information, means that it is the right holder who determines access. To drive this point home Moore offers the following case. "Imagine upon exiting your house one day you find a person searching through your trash painstakingly putting the shredded notes and documents back together. In response to your stunned silence he proclaims 'you don’t have anything to worry about – there is no reason to hide is there?'"  Second, individuals may wish to hide embarrassing behavior or conduct not accepted by the dominant culture. "Consider someone’s sexual or medical history. Imagine someone visiting a library to learn about alternative lifestyles not accepted by the majority."  Finally, Moore argues that "nothing to hide," if taken seriously, could be used against government agents, politicians, and CEO's. This is to turn the “nothing to hide” argument on its head. Moore argues that the NSA agent, politician, police chief, and CEO have nothing to hide so they should embrace total transparency like the rest of us. "But they don’t and when given the technological tools to watch, the politician, police chief, or CEO are almost always convinced that watching others is a good thing." 
Bruce Schneier, a computer security expert and cryptographer, expressed opposition, citing Cardinal Richelieu's statement "If one would give me six lines written by the hand of the most honest man, I would find something in them to have him hanged", referring to how a state government can find aspects in a person's life in order to prosecute or blackmail that individual. Schneier also argued "Too many wrongly characterize the debate as "security versus privacy." The real choice is liberty versus control."
Emilio Mordini, philosopher and psychoanalyst, argued that the "nothing to hide" argument is inherently paradoxical. People do not need to have "something to hide" in order to hide "something". What is relevant is not what is hidden, rather the experience that there is a intimate area, which could be hidden, whose access could be restricted. Psychologically speaking, we become individuals through the discovery that we could hide something to others.
Julian Assange states: "There is no killer answer yet. Jacob Appelbaum (@ioerror) has a clever response, asking people who say this to then hand him their phone unlocked and pull down their pants. My version of that is to say, 'well, you're so boring then we shouldn't be talking to you, and neither should anyone else', but philosophically, the real answer is this: Mass surveillance is a mass structural change. When society goes bad, it's going to take you with it, even if you are the blandest person on earth."
|Snowden's alright, he's fighting the good fight and I have no problem with the dude. Everyone else you are citing, they are not. They all have a monetary reason to tell you that noise because it's how they sucker you into paying them money. They all get paid from telling you that you need more security.|
|And here's just one quote for you.|
“Privacy is the place where we do bad things. In order to have a free and open society, you must treat privacy as the demon."
Paul McMullan, Journalist.
|why is this site mirrored here lol|
|Utter BS, stop turning privacy into a commercial product, it is a natural right, there is no need for anyone to lose their privacy, just because the government have you running scared of terrorists you cowardly fool, stand the hell up for you rights and the rights of your children. While we lose our privacy do you see the upper class losing theirs? Or does it just increase? Rationolize that one you drone.|
You can give away your own privacy and that of your children if you want like a good little obedient pawn because your scared of fake terrorists and lack the ability to think your way out of a paper bag.
Powerful people using manufactured terrorists and events to manipulate you into giving away your rights you cowardly fool just hand them right over, rationalization left and right, go rationalize it your grandkids one day in the future because you disgust me.
|Well Faceless, everything you are saying just proves you are one of the crazy paranoid people I was talking about in my initial comment. My point is proven. Have a good day, sir.|
|Amen! Faceless, all these years we are conditioned to fear everything from a|
very young age. In my lifetime; Russians, Chinese, Terrorists ect..
So we allow our Governments to take away our freedoms one at a time.
Cerebus, why are you on a pirate torrent site? Do you use a VPN? LOL
|Good day to you too Cerberus, gather the family around and explain to them how plausible and normal and perfectly acceptable it is for aluminium to slice through re-enforced steel (911) oh wait what's that? They already know? Well done, you haven't failed them at all.|
Not only that Faithwyn but people are conditioned NOT to think and to FEAR thinking for themselves if it goes against the official story.
Oh and cereb care to explain how aluminium goes through steel? Care to attempt to find the answer? The NON answer? Just tell me PLEASE I NEED TO KNOW HOW THE MAGICAL EVENT HAPPENED cereb you cann't keep such a mystical secret to yourself! No? nothing? OK lets pretend that's possible then just to make you feel averagely competent. There There.
|Well Faithwyn, mostly, I come into the comments to troll people. How am I doing? Lol!|
|Why a politician guys? Why do they want to pick a politician to monkey around with. People get shot for intelligence gathering for another country on politicians.|
|So none of what you said was even real? Wow...|
You can have the last comment if you want, I won't respond anymore.
|Lol! Thanks Faceless.|
|Ok, i have to ask. What happened on 911 faceless? This should be good...|
|I assume a UFO crashed and knocked them down.||
Most Popular Stories