Wednesday, August 24, 2011

The Big Brother State






This Video can be found at: http://bigbrotherstate.com/

Also on my DVD "Cop Out"

Technology is making the world a smaller place everyday. We are told things are getting easier, we now have a device for nearly every human need. All the while we are becoming less and less aware of how these devices of wonderment function, and the impact they produce. Those who refuse to adapt and learn are forced into the roles of blind consumers, incapable of critical thought. Cyberspace and mass transfer and storage of information through the tubes of the interwebs is a untamed frontier still in its infancy. Created though cultural needs, now it is a major component in the exchange and development of culture.

So how how is the cyberwar to be fought?

Anonymously      

First, a quick fix that lets one hide in plain sight, well at least to anyone trying to look at with anything other than their own two eyes...                       

  

I remember coming across this article a few years back: http://hac kkedgadgets.com/2008/02/21/ir-leds-used-to-defeat-security-cameras/           

That's right it only takes a battery, some LEDs, and a bit of soldering to mask ones self from the all seeing eye. Plus they dont cost much to make, meaning that they would make the perfect gift to any of your friends who worry about "Them" listening in. I suspect it these small devices were to become a popular mask worn by those who dont like being watched then it wouldnt take long for laws to come about that would restrict the use of such objects, or perhaps more broadly against trying to mask ones identity from digital scrutiny.

Next to secure ones Identity in the digital realm.  For this we will use Vidalia, Tor, and a proxy (Privoxy, Polipo, ect.)       

For in depth information on how this system works I recommend visiting the Tor Project

Heres  vid for installing/ running it on windows:



Now this kid does an ok job but you can tell he doesnt really know what he's talking about. This is why you really need to check out the Tor Project. Make sure you have your proxy configured and running with Tor at all times. Both Privoxy and Polipo are full of functionality but are not the most user friendly, that goes double for Privoxy. Be sure to run the test on the Tor Project site to see if you are indeed masked by Tor. Now you are just about as close to anonymous as you can get, free to go where you please without reprimand. But... there's a few things you should know before going off the deep end of the deep web.

There exists a database of everything you have ever done, it contains your innermost fears and your wildest dreams. It knows your credit card number, your social security number, phone number, your passwords, your work schedule and where you live. It isnt housed in a government funded lab, it isn't hidden away with free masons or extraterrestrial reptilians, its not even a data mining operation that will sell your secretes for pennies on the dollar. No, this database is maintained by one very dedicated little person spends so much time maintaining their collection of facts that they are almost always willing to give it away for free with out a second thought... That person is you.

Kevin McNick, hacker icon and social engineer extraordinaire once said 
                                    "Theres no patch for human stupidity" 
In other words no mater how secure you make a system so long as there is a human element involved somewhere in the chain, they will always be the weakest link.

A term you would do good to familiarize yourself with: Security Culture  
For online security culture visit: http://security.resist.ca/

Here is a good zine for IRL Security Culture:
http://zinelibrary.info/security-culture-handbook-activists

-In short always be conscious of the information you share with others both face to face as well as over digital mediums.

-Set up disposable "dummy" email accounts when you are not sure about giving out your real information.

-When using Tor assume an "alter ego" in other words, never access any site with your IRL personal information.

-The most secure form of communication is between people in a public place

-People can be fooled much easier than computers

-The frontline is everywhere

My next posts on this topic will cover some basics of Open Source Computing and The Deep Web.

No comments:

Post a Comment