Tag Archives: technology

Control and Censorship

I am a simple person. I use an iPad, and I use it in a standard way. I synch, I play, I read, I listen! (Yes, I know such a selfish user I am). So when I read about the jailbreak issue I was actually surprised. Most of us never bothered with 3rd party software or other solutions. Yet, overall I do understand that some people might want to. I also do not see the issue for Apple or others to intervene. Some valid reasons might exist, and some might want this to develop their dreams, all valid reasons why a jailbreak system might be needed.

So the issue I read about today was that a game (Deus Ex) would not function on a jailbroken system. This might have been a simple issue with compatibility. No, this was not the case, as it was stated in the article the non-functionality was intentional. The person gets the message “We are sorry but you can’t fire on jailbroken devices.” So it is not just a bug but an intentional act to ‘sift out‘ certain users.

This does not make sense to me. So a person wanting the freedom to do certain things is now punished? I think it is high time that both Apple and Enix have some explaining to do. (Source: http://au.gamespot.com/news/deus-ex-the-fall-disables-firing-on-jailbroken-devices-6411343) the reader should especially accept the idea that there is a group of ‘legally jailbroken devices’ and they are in the same predicament.

It seems that the IT field is changing. This field is now more and more about personal data collection, discriminating groups and limiting the freedom of choice. At least, that is how I see it. But is this true?

When we see the jailbroken system then the following had occurred. The IOS has been modified. When we look at Apple support we see the following at http://support.apple.com/kb/ht3743. This is fair enough. It is nothing short of a person disassembling a television, then wanting it fixed under warrantee. So, I cannot fault apple for not fixing it. Yet the software gave us another issue. This is intentional intervention against those who ‘altered’ their system.

There are two sides to these events. On one side, I can understand why a system might be jailbroken. The immediate reason is that I was in the past the victim of Apple’s short-sightedness and their own party line flaws. It actually costed me thousands of dollars, so at that point, I feel that I am justified when I state ‘Apple Get Fu$#d!‘ (In regards to the lost $$$$).

The first part is the one some might remember from the PlayStation and PlayStation 2. Because some people were unacceptably greed driven, they forced many in a place where they decided what we were allowed to have and when. In the early days, games would appear in US and Japan almost a year early. To circumvent this, a ‘mod chip’ was available and as such people could order their games on Amazon in the US. Not only were the games up to a year early, in addition these games were 40%-65% cheaper, which was a massive benefit for many. Weirdly enough, the first reason was to many gamers more important than the price issue, but they happily took that benefit on board.

The second part of the ‘mod chip’ was alas less noble. It allowed people to copy original games and they would work on any modified system. For the most on the PlayStation 1, yet it had a large following in the PlayStation 2 as well. In my mind the second part was mainly due because of greed driven marketing, to exploit every person, wherever they lived to the fullest. The same was evident in the DVD market, however, there was a valid issue that Asian copyright violation was so strong that something needed to be done, yet overall the events seemed to have made little difference.

Are these dangers the same for jailbroken systems?

Because of the term ‘legally jailbroken devices’, I wonder what those were. The answer was found at the core of all hardware knowledge, a magazine called wired (at http://www.wired.com/threatlevel/2010/07/feds-ok-iphone-jailbreaking/). This is the interesting crux! This verdict came out in 2010. So the fact that Enix had been adding a certain ‘limit’ could be read as intentional discrimination.

In the end, the quote I personally cannot disagree with Natalie Kerris said Apple won’t change its policy that voids iPhone warranties if a phone has been jail broken. “It can violate the warranty and cause the iPhone to become unstable and not work reliable”, this is fair enough, and should a jail broken system be used to play games people did not pay for, then this would be a violation, yet that was not the case in the game Deux Ex ‘the Fall’.

There is a new side to all this. Even though no longer an issue (likely only temporarily), the Xbox One with their need to connect, the Apple with jail breaking and all kinds of likely issues the PS4 will have (because even though we do not know at present, they will have their own issues), we are looking at new developments involving Digital Rights Management (DRM), deployment on the cloud via UltraViolet and the Keychest system. You the users are about to get hit by levels of user-based licensing and limitations unlike any w have ever experienced. More important, users are likely to get hit a lot harder on user license agreements then companies have ever faced over the last 15 years. In my view 99% of the population will press an ‘I agree‘ button and have no clue what they agreed to. The fact that the users who signed the apple user license and then ‘jailbroke’ their system should be ample proof of that.

Leave a comment

Filed under Gaming, IT, Law

Smear campaign vs Blame campaign

Another day, another NSA/GCHQ article! I must admit that the thread, not threat of privacy is getting a little too biased. I must admit that slapping the government comes over slightly cheap at this point (for the reason that too many articles out there are more and more based on speculation and less on actual facts). It is also the time I think that Mr John Naughton (the Guardian / Observer) should add a little more balance in his very valid opinions. As his profiles states “John Naughton is professor of the public understanding of technology at the Open University“. So the man knows his stuff (and reading his articles makes that clear), and let me be upfront that even though his pieces are definitely opinionated at times, he has not stated anything false or in error (as far as I can tell).

What does bother me to a little extent is that in his article “To the internet giants, you’re not a customer. You’re just another user” (at: http://www.guardian.co.uk/technology/2013/jun/09/internet-giants-just-another-customer) he states when relating to Gmail and Yahoo mail “You do however ‘pay’ in a different currency, namely your personal data.

This is the issue I have as well. Especially when comparing to the article “The NSA/GCHQ metadata reassurances are breathtakingly cynical“, where he states “the metadata is what the spooks want for the simple reason that it’s machine-readable and therefore searchable” (at: http://www.guardian.co.uk/technology/2013/jul/07/nsa-gchq-metadata-reassurances). This is correct, and it is preferred for automated systems, as it takes one person his/her entire career to get through 1 hour of non-spam e-mail for one area of London. So any chance of getting anything useful needs massive levels of automation. So it seems acceptable to be a marketing outlet (the consequence of a free service), yet the group trying to keep you alive gets tarred, feathered, drawn and quartered for doing their jobs.

I am at times slightly amazed that these security measures are such an issue for the UK population. Let us not forget that the UK had decades of issues as they needed to overcome the ‘difference of opinion’ the UK government had with the IRA. As such they have had plenty of reasons to be cautious, compared the limited amount of events the US went through.

I still remember the 1993 bombing of Liverpool street station. I also remember attending the ECTS (Electronic Consumer Trade Show) 5 months later and that area was still an indescribable mess. So the UK population clearly know the dangers of terrorism.

So is this truly about privacy or fear? Not the fear of being attacked, but the fear others have if someone read the messages they send/receive (and I am not even talking about the actual criminal ones that get mailed).

Consider that there is another attack (anywhere in London) and it was not stopped, because privacy laws stopped the intelligence community. Then what? How long until the press, who is all so up in arms on privacy comes with the text ‘why did the Intelligence community not do more?‘ whilst at the same time making people expectant that in Facebook, Google+, Gmail and Yahoo mail your data can be sold on, your details on parade like a debutante to all eligible data sources who would want to have a go at you. Seems a little short sighted doesn’t it?

I am all for privacy, I truly am! However, data being private does not mean that I am not willing to assist the government in keeping the nation safe. And the argument that ‘I’ was not guilty, so there was no reason, does not hold water here. Knowing who is innocent (read safe) is as important as those who raise flags. A raised XML flag does not make you guilty, 5 raised flags do not make you guilty. Especially when this is about automatic parsing of information (read Meta data). When we look at on how these service giants deal with privacy is actually less important than the fact that their international size allows these people to avoid taxes a lot better than Ebenezer Scrooge ever could. So people are up in arms on what governments know, yet these fat cat collecting corporations paying 0.1% tax in this day and age of economic hardship is an acceptable act? I wonder whether people have their priorities straight.

In that regard it is also interesting to read the Benjamin Franklin Quote “They who can give up essential liberty to obtain a little temporary safety deserve neither“. So many are often so easy to hide behind this quote, when siting issues on privacy, yet in those days of Franklin, they thought of war as a gentleman’s game. You know the time of clean Red uniforms. Stand up straight! Moobs forward! Aim! Fire!
Those people, if they ever saw the Vietnam War in their dreams, would wake up screaming.

In this same way we should regard data collecting a la von Clausewitz “Many intelligence reports in war are contradictory; even more are false, and most are uncertain” in that light, the survivor had superior information, which means it is another form of war altogether. Our protectors must get it right all the time; a terrorist, only needs to succeed once. The quote and the premise is the issue we face today and history never properly prepared us for what we now face. I think that under these conditions I prefer the quote “War is such a dangerous business that mistakes that come from kindness are the very worst.” This one is true and also most appropriate. If Privacy is seen as a human right (which it is) and it is a driving force in humanity, then we could see the danger that our Humanity gives strength to the Terrorist (this is of course false), however, in the light of fighting terrorism it does hold a truthful foundation. This brings me to an interesting question I recently saw! “What if the right to privacy depends upon the existence of surveillance and an acknowledgement that some of it, at least, is legitimate?” This is not my question, this was voiced in a discussion paper called “Navigating the Data verse privacy, Technology, Human Rights“, which was published by the International council on Human Rights Policy and can be found at (http://www.ichrp.org/files/reports/64/132_report_en.pdf). It is well worth reading.

The question in my mind is that if we see the news as valid. Is the press on a smear campaign against the Governments? Even though I singled out John Naughton, does not mean that I call him that. His work is amongst the most interesting to read and his writing is pretty compelling, and even though I feel I cannot agree with him at times, he puts down his points clearly and precise. The reason I cannot agree is again the fact that we are expected to be marketed by those offering ‘free’ services, but must oppose those who are out to keep us safe. It seems a very topsy turvy approach from us on keeping ourselves safe.

That makes me think, this could actually be a new Gilbert and Sullivan (read with the tune of ‘A wandering minstrel’ from the Mikado)

A surfing seeker I…
A man of links and searchings
of Mails, Pics and Profiles,
and selling you on my Facebook,
my friend list is so long,
through every like and linking,
and to your e-mail sending
I mine all data for cash!
I mine all data for cash!

So are we giving up essential liberties? I feel we do not, data mining is today’s efficient way of approaching the ‘right’ population, yet this is also a danger! Not of freedom, but of choice. As these companies focus on the options that embrace the bulk of people, the outside innovation will reach us less and less likely. Is that not giving up liberties? As we become part of mass media only, the small innovator will no longer reach us? Who thought of that part of the equation? Actually, John Noughton did raise it in some way in his article “Technology is a double-edged sword” in December 2012. Even though he focusses on Evangelists and Luddites, the outcome is similar. We can look at a coin from either side, but one coin is only complete with both sides.

Consider that the police and intelligence communities are the ‘other’ side (the evangelists), then most people (the Luddites) have a point no less fair, but we must accept that if the people get their way, once things go wrong we have no right to invoke a blame campaign, for the simple reason that with the freedom of choice comes the responsibility of consequence.

A combination of views often forgotten!

Leave a comment

Filed under IT, Media, Politics

Classes of Classification

I was about to do that horizontal thing (sleeping, in case you wondered), where one is in a natural state and loudly snores like the local sawmill! I was actually looking forward to that event. It is almost 00:30, so I need to get up in about 5 hours. However, Sky News stopped that idea pretty quick.

The reason is that the news just showed me a part involving Edward Snowden and more information he ‘leaked’. In this case it was all about spying on the EU diplomatic mission and how that was ‘strictly confidential‘, roughly 0.0324 seconds later I was more than wide awake and started this blog.

So what are the issues? Well three come to mind, but the third one is for a little later down this story.

So the first issue is the classification. No matter, whether the documents were from the CIA, NSA or Alphabet Soup Incorporated. There are levels of classification. Confidential is a lower level. Apart from the issue that there is an issue that the diplomatic integrity of an ally was ‘transgressed’ upon, is there actually any reason why such information would not be Secret or higher? I would even think that this would be Top Secret level information and as such that information remains with a small (read extremely small) group.

Let’s take a look at this ‘Strictly confidential’. I do not have the rules that the NSA applies, but I was able to get the protocol from a World Bank document as to how this is treated. They might be kids play compared to the NSA, but you will get the idea (and I have to start somewhere).

Information and documents that are deemed to be of a highly sensitive nature or to be inadequately protected by the CONFIDENTIAL classification shall be classified as STRICTLY CONFIDENTIAL and access to them shall be restricted solely to persons with a specific need to know. The staffs of the Institutions shall establish a control and tracking system for documents classified as STRICTLY CONFIDENTIAL, including the maintenance of control logs. Documents classified as STRICTLY CONFIDENTIAL shall be:
(i) marked with such classification on each page;
(ii) kept under lock and key or given equivalent protection when not in use;
(iii) in the case of physical documents, transmitted by an inner sealed envelope indicating the classification marking and an outer envelope indicating no classification, or, in the case of documents in electronic form, transmitted by encrypted or password-secured files.

So if we consider the digital version, and consider that most intelligence organisations use Security Enhanced Unix servers, then just accessing these documents without others knowing this is pretty much a ‘no no’. EVEN if he had access, there would be a log, and as such there is also a mention if that document was copied in any way. It is not impossible to get a hold of this, but with each document, his chance of getting caught grows quicker and quicker. He did not get caught, not for many megabytes of duplication.

So, whether these events were true or not, there is now an issue. Not with external trust, but from my point of view with internal trust. If he remained undetected, then several alphabet groups have IT issues of an unprecedented level. Could this even be remotely true?

The second issue is that like any Intelligence organisation like the GCHQ for example, most people are assigned certain areas. The fact that Edward Snowden had such a wide access is more than questionable. The fact that the press seems to just take whatever he serves up with a certain air that whatever Edward Snowden claims is true should also be looked at. In my view it does not. Especially when we consider that he is stuck in some Russian airport terminal awaiting the option to ‘escape’ to Ecuador. You see, his access raises too many flags. It does not matter whether he is the IT guy. The NSA has dozens upon dozens of them, and as such, the fact that he was able to syphon off such a wide area of information (and get it out of the building) seems to be an issue that no one is too investigative about.

What is this all about? That is the question we should be asking. All these events do not add up. This is not some FBI leak (no attack on the FBI). This is a group that was referred to for a long time as ‘No Such Agency‘. The fact that he passed all kinds of interviews befroe the job (on psychological probing levels far above most can imagine), a man who ‘just’ walked away with the kitchen sink and a USB drive loaded with tagged documents. It does not add up in my book.

Now we get to the third issue.

If some amount of this data would be rock solid, then the US has an intelligence community that is leaky as a sieve.

1. A disillusioned intelligence operator gets a job at a department even more hush hush then the CIA and the psychological interview does not raise flags considering the conditions he left the CIA?
2. That person gets access to information on several levels and from several branches and no one is the wiser. More important no flags on these secure servers are tripped?
3. This person gets the goods into Hong Kong, then casually flies into Russia and now is waiting for his flight to Ecuador, whilst at the same time US extradition groups (according to Hong Kong media) drop the ball in getting a hold of Edward Snowden?

Is no one suspicious on what is going on? I for one see reason to distrust several sources at present.

Looking back, Julian Assange got access to his documents though military channels. There have been less than positive issues with the lack of Common Cyber Sense in several military areas. The fact that those events happened outside of the US and under military field conditions where certain security measures are hard to uphold is understandable. That does not make it right, but the circumstances were pretty unique. The fact that someone walks out of places like the NSA or GCHQ with a USB filled with all levels of information is an entirely different matter.

If we accept this article by Sky News as true http://news.sky.com/story/1109739/snowden-spying-claims-us-bugged-eu-offices, then we could be in for a rough ride.

In the end, reality is that spying goes on at all times on many levels (as stated by Mr Reardon on Sky News UK). Mi-5 tries to keep an eye on what the CIA does in the UK, the FBI keeps tabs on MI-6 in the US and none of them care what happens in Australia. Works for me!

So the fact that the CIA is keeping tabs on the EU makes perfect sense, especially with all those new states getting added. However, bugging the hell out of all these buildings is not that productive overall (as there are other sources to these kinds of information). So is the reality that there were just 2-3 bugs (the German Spiegel was aware of one of them) and some document Edward Snowden had just adds loads more?
What Intel does he have that is actually reliable? Are we being run by some wannabe laying it on thick hoping for a nice fat pay check? I wonder what happens now that Russia and China both lack interest (and Ecuador is not that appealing if one lives there without money). So what of Edward Snowden? Sky had another article on that. http://news.sky.com/story/1109235/whistleblower-snowden-may-return-to-the-us. In this article the father is afraid his son is being manipulated by different parties. Even by WikiLeaks. He might return to US if certain conditions are met.

Conditions? For a traitor? And next they claim that all politicians are straight shooters too!
Well, for those who believe that, I have a bridge to sell you, GREAT view on the Tower of London!

Leave a comment

Filed under IT, Media, Military