There is a tablet in my house that blinks whenever my roommate has a message. I know this because for some reason it’s my job to keep it charged for her. It has front and back cameras. The built-in microphone and speakers are capable of holding a conversation in English–probably other languages as well. With what we know now, I must assume that the NSA has the ability to activate the cameras and microphone to run silently in the background, bypassing the light that indicates when the camera is in use.
The same is true of the other computers in my home, but to a lesser degree.
The desktop I’m using to write this article doesn’t have a camera or a microphone. Nor does the old Dell laptop that gets used occasionally around the house. My other laptop, a newer Gateway, is equipped with a built-in camera and microphone, but I’ve never managed to get the microphone to work under Bodhi Linux. Not that I’ve tried very hard. I don’t Skype or anything, so a microphone is of very little use to me.
This is probably a good thing as it means the NSA can’t watch or listen to me as I use my desktop or Dell and they can’t eavesdrop when I’m on the Gateway. They can only steal my bank passwords, learn where I store data online and what social networking accounts are connected with me.
If you own a computer of any type that connects to the Internet, you too have to assume the NSA is collecting your data–watching you. They are turning your computer against you. It works for them now; it’s no longer your tool. This kind of takes the fun out of visiting Facebook, reading the news and, especially, sending emails.
Tommorrow, February 11th, is The Day We Fight Back. Along with at least 4,000 other sites, we’ll be running a big banner at the bottom of our pages from which U.S. residents can contact their local representative to urge them to enact legislation to stop the NSA’s unconstitutional spying. Those who reside outside the U.S. will be given a petition to sign which will be sent to representatives in their respective countries urging stronger Internet privacy regulations.
No matter how great our win however, it will be a hollow victory. We’re coming very close to living in a police state and the damage that’s already been done may take years to repair–if ever. No backing down by the spy agency or enacting of legislation by our governments will restore our assurance. Lines have been so thoroughly crossed that we can never be sure they won’t be crossed again. Promises and laws are both easily broken–especially by government agencies.
The free software people’s argument really look good right now. This would be the opinion, espoused by Richard Stallman and others, that all software should be totally free and include source code that is open for inspection as protection against spyware, secret back doors and the like.
Alas, even that bastion of computer freedom has been made suspect by the NSA.
As deep as the NSA has dug its tentacles into the likes of industry giants such as Microsoft, why would we assume they haven’t managed to get inside some of our favorite Linux distros and/or free software applications? I would be willing to bet they have. I have no evidence; I figure it’s a numbers game. Somewhere along the line, the NSA has to have been able to make the right threat or the right offer to get some developer to send our right to privacy to storage on a government server.
The only way to be sure that hasn’t happened would be to examine each and every line in a GNU/Linux distro, and then compile from that examined source code. With the Linux kernel alone having over fifteen million lines of code, this task would be impossible even for someone with the technical know-how to pull it off. For humans, time is not an infinite commodity.
I no longer feel like a free citizen. I no longer feel as if this country belongs to me, my friends or my little nieces and nephews. With good reason, I feel as if I’m being watched. I feel as if we’re all being watched.
At present we can find some shelter in the old axiom concerning safety and numbers. Collectively, all of our computer use is being channeled into a river of data that’s too immense for even the NSA to handle, meaning that nothing I write in an email is likely to bring me to the attention of our intelligence agencies. As I write these words, however, the IT guys and gals at the NSA are busy developing better systems for processing megadata more efficiently. Safety in numbers won’t last forever.
Even now, there’s no shelter for those who have already fallen under the suspicious eye of our intelligence folk. All of their data is already sitting on a server somewhere ready to be sifted through. None of us can stand that scrutiny. Every single one of us has written something somewhere, on Facebook or in a private email perhaps, that can be construed as proving us guilty of any crime the government can make up, especially thought crimes that are tied to patriotism. Remember, we’re supposed to love Big Brother.
I am frightened, both for my country and the world. What manner of men do things like these? To what lengths will they go? Who is there to rein them in?
Tommorrow is “The Day We Fight Back.” I expect we will win at least something from our efforts. Again, it will be a hollow victory. I will never again feel safe from the prying eyes of my government when online–no matter what assurances I am given. Remember, to the NSA, the CIA, the CSEC and GCHQ, we are each and every one of us potentially the next Osama bin Laden.
Meanwhile, every night my roommate brings me the Android tablet she received for Christmas. I dutifully plug it into the charger and leave it overnight on my desk. It’s dark in my room as I sleep and the front camera points up at the ceiling and the back camera is obscured by the top of my desk, so I’m safe from being watched. But the microphone works. Sometimes I wonder if the NSA has audio files of me snoring as I sleep. Do they count the number of times I get up and go to the bathroom each evening?
Maybe I should start talking to them as I lie in bed waiting for sleep to come.
Latest posts by Christine Hall (see all)
- New IoT Botnet, Attackers Target Tor, and More… - December 3, 2016
- What Malware Is on Your Router? - November 30, 2016
- Mickey Mouse Open Source, Close Call at WordPress, and More… - November 25, 2016