Categories: Intelligence

Rim, Nokia and Apple. Monitoring, interferences and violated privacy

What I want to discuss today is the interference of governments in what should be the private business and what are the consequences of an attitude so invasive. The news of this hour is that Nokia, RIM and Apple have provided to the Indian government, particularly its militia, a backdoor that provides the ability to control each mobile device.
Also at this time we learned that for similar reasons, Symantec has published the source code view of some of its products, source code, which had provided the Indian government to comply with an agreement.
There are many topics to be discussed, the use of backdoors for purposes of spying and surveillance, by the way in which governments impose their own policies, the risks faced by businesses due to interference.

A few hours ago I received a message on Twitter announcing that what had happened. There were found some Indian Military internal documents that refer to a project called RINOA SUR, where the world RINOA stay for RIM, NOkia and Apple. The project is related to a platform used to spy on the USCC—the US-China Economic and Security Review Commission. Following the images related to the main part of the documents from published on the web site Terminalx.org

 

The documents contain portions of emails sent by members of the USCC regarding the successfully usage of the RINOA SUR, and the Indian Navy has shown interest in the same. The documents suggest that RIM, NOKIA and Apple were required to providing backdoor access.

The scenario is that of technological India, a country that is experiencing a time of great political and social contradictions. A Nation in constant grow that is particularly distinguished for the cyber strategy, little attention to the privacy of its citizens. Monitoring systems, actions of censorship are the main themes at the center of a heated debate.
However, the situation is no different from many other countries. The story is the same, private companies to have contract provide support for surveillance and monitoring operations required by governments.

It had already happened in the recent past when hackers claim that german officials have a backdoor trojan for spying on Skype, and don’t forget the case of Carrier IQ, an hugly history that has been hidden to fast, maybe because the small company there was a Government commitment.

The risks are many, the interference of governments, the excessive attention paid in the name of security monitoring can easily spill over into censorship with possible serious repercussions. At stake there are the human rights that monitoring technologies contribute to violate. Assange was a prophet in this, and its portal SpyFile reminds us how utopian is the privacy concept in this digital age.

At risk are not citizens but also the same companies, infact in order to grab contracts and procurement they shake dangerous relationships with governments. This means that the same companies are increasingly targets of hackers and hacktivist groups that might, as happened, expose secrets and patents. A disaster for those who live and earn technology.

Security or privacy, a dilemma, a choice which sooner or later every government must do. Working accepting the blackmail of the government or leave the market, an obvious choice for companies at a time of global economic crisis.

Pierluigi Paganini

References

https://twitter.com/#!/csoghoian/status/155524871009468416

http://cryptome.org/2012/01/tancs/0022.htm

 

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

North Korea-linked APT groups target South Korean defense contractors

The National Police Agency in South Korea warns that North Korea-linked threat actors are targeting…

3 hours ago

U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity

The U.S. Department of State imposed visa restrictions on 13 individuals allegedly linked to the…

14 hours ago

A cyber attack paralyzed operations at Synlab Italia

A cyber attack has been disrupting operations at Synlab Italia, a leading provider of medical…

15 hours ago

Russia-linked APT28 used post-compromise tool GooseEgg to exploit CVE-2022-38028 Windows flaw

Russia-linked APT28 group used a previously unknown tool, dubbed GooseEgg, to exploit Windows Print Spooler…

1 day ago

Hackers threaten to leak a copy of the World-Check database used to assess potential risks associated with entities

A financially motivated group named GhostR claims the theft of a sensitive database from World-Check…

1 day ago

Windows DOS-to-NT flaws exploited to achieve unprivileged rootkit-like capabilities

Researcher demonstrated how to exploit vulnerabilities in the Windows DOS-to-NT path conversion process to achieve…

1 day ago

This website uses cookies.