Ok you now think I have been lying in 35 degree heat all day and have crossed a privacy tool with a local butcher. I can assure you I am not hallucinating and that purple leprechaun agrees with me, only kidding, it’s green. I am quite sane and am here to talk about a possible new proxy tool which could be a game changer for privacy conscious Individuals.
At the upcoming DefCon hacker conference in Las Vegas, a new tool by the name of ProxyHam is set to be unveiled, this device has been invented and developed by an individual by the name of Ben Caudill who aims to make it that little bit harder for network spies. This device is essentially a hardware proxy which is designed to use a radio frequency. By utilizing this form of connection, the device adds a physical layer of obfuscation to an internet user’s location
According to Google, obfuscation is defined as making something obscure which means your location is not transmitted over the Internet. This invention has been built for $200 dollars (£128) but the clever bit is still to come, the device connects wirelessly from a 900 megahertz antenna which is plugged into the Ethernet port of a PC, to a Raspberry Pi box which has been placed in a different location via a radio connection. This in turn means that any traceable location data is not from a person’s physical location, but from the ProxyHam box said individual has placed somewhere else.
This means that if the FBI come knocking or any other malevolent with power organization, they will think you live within a 2.5 mile radius of your actual address, and this means if you placed the box in Burger King, the fast food joint will be raided and not you. Here at eTeknix we are impartial and therefore would like to point out there are many other corrupt governments with which to be spied on and fast food joints with which to enlarge your liver.
At this stage these devices are still very much at the development and improvement stage, but if it can capture the mainstream, expect many boxes to pop up with confused officials staring at them to a town near you soon.
Senior MPs in the UK have called for agencies like the MI6, MI5 and GCHQ to use websites like Mumsnet to recruit spies. The remarks come as part of calls to increase the number of middle-aged women and mothers working in intelligence. The Intelligence and Security Committee made the conclusions in a report, that said females make up only 19% of those in Senior positions within the MI6, MI5 and GCHQ.
The thing that has turned heads though, is the fact that Mumsnet might be a place mothers could be recruited as spies. Will GCHQ really monitor the Mumsnet forums to find the next ‘M‘? Maybe. Justine Roberts, the CEO of Mumsnet didn’t directly respond to the suggestion, other than to say “I’m afraid I’m unable to comment as I have an urgent appointment with a rock in St. James’s Park.”
So, if you’re a kid, keep an eye on your mother if ever she’s on Mumsnet, she might just be protecting our borders from Russian spies.
It’s been reported that spies from both the UK and the US hacked into a SIM card company. The information, once again coming from Edward Snowden, details efforts to steal codes that allowed the spies to eavesdrop on communications between phones and cell towers.
The company in question, Gemalto, produces SIM cards in 85 countries and chances are your SIM card was made by them. The hack provided the codes required to decrypt pretty much any communications between mobile phones.
With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. – The Intercept
The hack is unprecedented as it meant that GCHQ and the NSA had essentially given themselves the ability to capture any mobile communications from the air. Gemalto says that they “take this publication very seriously”.
“We take this publication very seriously and will devote all resources necessary to fully investigate and understand the scope of such highly sophisticated techniques to try to obtain Sim card data,” – Gemalto