Smartphones are vulnerable to hacks when connected to a network—whether cellular or wi-fi. In the third and final episode of Phreaked Out, they examine three real-time phone hacks – man-in-the middle attacks, the Snoopy exploit and intercepting cellular call data using an IMSI catcher.
Category Archives: Videos
Fifth Amendment Right Against Self Incrimination
https://www.youtube.com/watch?v=6wXkI4t7nuc
The right against self-incrimination is spelled out in the Fifth Amendment to the U.S. Constitution and also extends to state and local jurisdictions. When someone exercises this right, we often say that they “plead the Fifth.” Continue reading Fifth Amendment Right Against Self Incrimination
Bram Bonné: Your Smartphone is Leaking Your Information
Bram Bonné is a PhD student in computer science at the Expertise Centre for Digital Media at Hasselt University, where he specializes in computer security and privacy. During his PhD, he developed an interest in privacy-sensitive information leaking from smartphones and laptops. Bonné summarizes the basic Wi-Fi technology hackers exploit for “man-in-the-middle” attacks. He explains how your personal information is available to anyone tracking Wi-Fi traffic and some steps you can take to make these type of attacks more difficult.
Matthew Green: Why the NSA is Breaking Our Encryption
Encryption dates back to the Founding Fathers and the Bill of Rights. Now, the United States National Security Agency is breaking and undermining core encryption technologies that power the Internet, saying it’s being done for our own protection from terrorists. But are we sacrificing our freedoms for fear? Matthew Green discusses the campaign waged by U.S. intelligence and law enforcement agencies to weaken commercial encryption standards to make our communications more accessible.
Matthew Green is an Assistant Research Professor of Computer Science at the Johns Hopkins University. His research focuses on computer security and cryptography, and particularly the way that cryptography can be used to promote individual privacy. His work includes techniques to securely access medical databases, enhance the anonymity of Bitcoin, and to analyze deployed security systems. Prior to joining the Johns Hopkins faculty he served as a Senior Technical Staff Member at AT&T Laboratories.
The Tor Project: Protecting Online Anonimity
Jacob Appelbaum introduces the Tor Project and the Tor Network – an anonymity network used to protect individual’s identities online. Tor is free software for enabling anonymous online communication. The name TOR is an acronym derived from the original software project name The Onion Router. Tor is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication, by keeping their Internet activities from being monitored. The core principle of of the Tor Project, called “onion routing”, was developed in the mid-1990s by United States Naval Research Laboratory employees, mathematician Paul Syverson and computer scientists Michael G. Reed and David Goldschlag, with the purpose of protecting U.S. intelligence communications online. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than six thousand relays to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes visits to Web sites, online posts, instant messages, and other communication forms. It is legally used by millions worldwide to circumvent censorship and to stay safe from online snooping.
Glenn Greenwald: Why Privacy Matters
Glenn Greenwald was one of the first reporters to see — and write about — the Edward Snowden files, with their revelations about the United States’ extensive surveillance of private citizens. In this searing talk, Greenwald makes the case for why you need to care about privacy, even if you’re “not doing anything you need to hide.”
Mass Surveillance: Implications on Privacy and Speech
This entertaining five minute video discusses the legality of the government’s current domestic mass surveillance program, making the case that it invades our privacy and places an unconstitutional chilling effect upon First Amendment speech and political association. Brought to you by Fight for the Future and Demand Progress.
Police Surveillance and Predictive Policing
Privacy today faces growing threats from a growing surveillance apparatus that is often justified in the name of crime prevention. This video short brought to you by AJ+ summarizes some of the highly intrusive technology which allows law enforcement to conduct targeted surveillance against individuals who are not suspected of engaging in any criminal activity. Numerous law enforcement agencies—including the Federal Bureau of Investigation, private security contractors and state and local police departments—intrude upon the private communications of innocent citizens, amass vast databases of who we call and when, and catalog “suspicious activities” based on the vaguest of standards. The government’s collection of this sensitive information is itself an invasion of privacy. But its use of this data is also rife with abuse as innocuous data is fed into bloated watchlists, with severe consequences upon individuals who do not even realize why they have been targeted. History has repeatedly shown that powerful, state surveillance tools are most often abused for political ends which disproportionately target political dissidents and disfavored minorities.
Greenwald Meets Bernstein: From Watergate to Snowden
Glenn Greenwald and Carl Bernstein discuss how NSA surveillance has affected contemporary investigative journalism with journalist, Fredrik Laurin, of Swedish Radio. Greenwald and Bernstien discuss the U.S. Government’s history of placing journalists, activists and whistleblowers under surveillance. Greenwald discusses how the Snowden revelations have affected the precautions investigative journalists must take to protect their sources (and themselves), as well as the current practice of prosecuting whistleblowers under the Obama administration. Bernstein explores how institutional secrecy has increased since Watergate and suggests that there is much less oversight of intelligence abuses than in the past.