Opinion The best device to reduce road deaths, suggested economist Gordon Tulloch, would be a large steel spike in the center of every car’s steering wheel. Focuses the mind.
The IT security equivalent is an “Assume This Device Is Tapped” sticker on every phone, tablet and computer. Absent that, the best we can do is pay attention when those with legal access to all our data abuse those powers and help themselves.
Last week, repeat offender, the FBI, served this important public service. It has been caught using its power to hoover up communications without a warrant, ostensibly to monitor foreign threats, to plunder the privacy of many thousands of US citizens whose revulsion at a brutal killing of a Black man by white cops marked them as activists.
This is nothing new. Search for “FBI abuse of powers” – replacing FBI with other state agencies to taste – and you’ll be scrolling for a year. It’s actually quite cheering that democracies still have safeguards to bring this stuff to light, and yet it keeps happening. If you live in a part of the world where such protection is diluted or absent, you won’t need telling how bad it can get.
Leaving aside the ethics, legality and politics, it’s important to make a practical evaluation of state agencies as advanced persistent threats in the communications stack. Spies are gonna spy. It’s also important to consider the whole threat matrix, and to identify the most effective way to minimize risk as an ordinary user. What can you do to protect against undue surveillance while keeping the utility of your devices?
The most interesting and important area is mobile. It’s where we have least control combined with most reliance, where our most personal day-to-day use is matche