EP035

EP035 – Legal Wiretapping
Music provided by: Denis Kreynin https://soundcloud.com/denis-kreynin

News recap section:
The 2015 Verizon Data Breach Investigations Report (DBIR) is out and it has some good information to present to IT management like:

  • 99.9% (I misstated as 93% in the podcast) of the vulnerabilities exploited were over a year old.
  • There’s a rush to get exploits working within 2 weeks of a patch being announced
  • Android malware, although it does exist, isn’t what’s getting organizations compromised. It’s mostly Trojan horses too.

Microsoft offering free upgrades to windows 10 from everything above XP, even pirated versions (kind of)
Andoid adoption rate very much lags behind Apple’s
Main topic for this episode:
The book called The Code Book by Simon Singh speaks about how Signals Intelligence has always been a very important part of governments (see cabinet noir for more information). The USofA started to get access to this in modern telephony with things like The echelon program and what went on in room 641A, increasing Signals Intelligence capabilities over its own citizens.
The monitoring of other countries information going over the border into the United States was dramatically increased with the post September 11th attack act of congress titled Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (USA PATRIOT Act) passed into law October 26 2001. Of the many statements within the USA PATRIOT Act, it is Section 215 that was interpreted to allow warrant-less collection of all telephony metadata on its citizens.

Still take some action against C-51, get your voice heard https://stopc51.ca/

John Oliver interview with Edward Snowden and covers things like USA patriot act, Section 215, the leaks by Edward Snowden, and how to make privacy pertinent to people (which is what we in information security should be doing to influence actions).

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.