The surveillance society is here, and what you can do to protect yourself

The surveillance society is here, and what you can do to protect yourself

We live in a far less private world than we ever have. Want to know who is watching all your steps? Everyone.

January 30, 2018, 23:43
http://theduran.com/welcome-to-the-surveillance-society/









George Orwell’s 1984 featured a dystopian England, and indeed, a world, of three superstates that all ran according to the same principles.  Eternal war, eternal ignorance, and eternal subservience, whether realized or not.  BIG BROTHER IS WATCHING YOU was this book’s addition to the American lexicon for many, many people.

The means of surveillance were certainly in keeping with the author’s current knowledge of technology, for the television had just been developed, through wireless radio and microphone / recording systems were well developed.  It was easy for Orwell in 1948 to envision a surveillance society based on the media of his time, alone.

What he did not bet on was that it would not take an expressly socialist government, nor even a Communist one to create this sort of surveillance state.

How about using social media instead?  How about using the apps that are mainly toys for the smartphone user?  How about using a globally popular platform and asking for the permissions to be surveilled in plain sight, and in plain English?

Couldn’t possibly be true, could it?  We are a free people, and the right to privacy is ours, isn’t it?

Sure it is.  But have you ever seen these before?

  

These are the permissions screens for Google Play when one installs a new app on their Android device.  If you read carefully, you can see that these apps are asking for access to various functions on your phone.  But think:

  • Does it make sense for Spotify to have access to your Device ID, and your phone call information?
  • Does it make sense for Move to iOS to have access to your Short Messages (SMS) – I mean the texts that reside on your phone, itself?
  • Does it make sense for Facebook to have access to your contacts?
  • And the information about the permission READ_PHONE_STATE: Look at the details.  Did you know that some apps can do what this says – to access the phone features on your device, to determine phone number and device ID and to know who you are calling when you call them?

“I have a funny feeling that I am being watched.”

It looks like this saying has a lot of truth behind it in our smartphone and device-filled world.  While some permissions listed here DO make sense, there are rather significant questions about others.

Usually we do not consider these permission screens when we download an app, because we want to play the game or listen to the music.  Google Play offers an astounding array of services for no monetary cost, but they do get something out of the transaction.  Information.  Personal information. And we have seen and heard evidence that this ability to silently monitor what we do gives companies, individuals and maybe even governments – the ability to watch and listen, and maybe even influence our actions.

One story was that someone was in a meeting with friends, talking about travel destinations, and the person talked a lot about interest in visiting Thailand.  They did not remember ever using their device to investigate the possibility of going there, but within a couple days of the conversation, a message popped up on their device with a travel offer to Thailand.  Coincidence?  Maybe.

Or, maybe not. A similar story was reported by an Instagram user, shown at this link.

According to Andrey Meshkov, CTO and Founder of AdGuard, in his blog piece here, many apps available through Google Play have very poor compliance with what is also itself a very poorly defined security and privacy structure that is presently characteristic of Android.  (iOS is far better on privacy matters currently, due to comparatively limited capabilities within iOS – Android is far more sophisticated)

Now, to be sure, in legalese, Google does insist that privacy and security requirements exist and... and on their page they specifically do say what apps are not allowed to do:

Your in-app disclosure:

  • Must be within the app itself, not only in the Play listing or a website;
  • Must be displayed in the normal usage of the app and not require the user to navigate into a menu or settings;
  • Must describe the type of data being collected;
  • Must explain how the data will be used;
  • Cannot only be placed in a privacy policy or terms of service; and
  • Cannot be included with other disclosures unrelated to personal or sensitive data collection.

Your app’s request for consent:

  • Must present the consent dialog in a clear and unambiguous way;
  • Must require affirmative user action (e.g. tap to accept, tick a check-box, a verbal command, etc.) in order to accept;
  • Must not begin personal or sensitive data collection prior to obtaining affirmative consent;
  • Must not consider navigation away from the disclosure (including tapping away or pressing the back or home button) as consent; and
  • Must not utilize auto-dismissing or expiring messages.

However, there is a great deal of evidence to suggest that this is not well-enforced, and that in fact, a great deal of personal information collection does take place, including actual SMS messages, phone call records, photo and video collecting, even audio recording, as well as IMSI, and IMEI information, and device location.

A deeper look at IMSI and IMEI – what are these?

The IMSI and IMEI are of great importance because these numbers are unique identifiers.  The IMSI (International Mobile Subscriber Identity) is the unique identification of every SIM card in existence.  It is generally 15 digits long, and contains two prefix headers and a subscriber ID.  It looks like this:

For an AT&T Subscriber,

IMSI: 310150123456789

MCC (Mobile Country Code) 310 USA

MNC (Mobile Network Code) 150  AT&T Mobility

MSIN (Mobile Subscription Identifcation Number) 123456789

This differs from the MSISDN, which is what we commonly refer to as the Phone Number.  MSISDN’s can be changed easily, and in fact this is offered as a service to end-users by any and all cellular carriers.  But IMSI numbers are unique and difficult to change without access to the core network of a given cellular provider.

The IMEI is the International Mobile Equipment Identity, and this number is unique to the phone or device itself.  It is also possible to change, but special tools are required, and it is designed with the intent to not be changed.

Together the IMSI and IMEI equal… you!  As cell and satellite networks constantly track any mobile device with these numbers, this means that unless you are in a place with no cell or satellite coverage, you are being tracked.  And that little “location” tag in the permissions can be exploited by anyone who wants to read that information.  The fact that the cell network keeps track of your location is basically good, especially if you are in an emergency.  However, badly or maliciously written apps can take advantage of this in very unwanted ways.

Adguard conducted a test.  They devised a test app for Android that basically didn’t do anything.  However, that app was easily able to silently acquire:

  • Email addresses
  • IMEI
  • All your contacts
  • All your SMS messages
  • and the app was capable of gathering more information if programmed to do so.

And, it could send all that data wherever desired.

Andrey Meshkov admits that this is not necessarily or constantly used for illegal or hostile intent.  But he does point out that both Google Play and Android privacy protections are extremely poorly handled, and this could lead to unsavory folks getting access to your personal life, including text messages and knowledge of who you call.

This incidentally provides some background into the American investigation into the alleged collusion of Russian agencies with the Trump campaign.  While no evidence of such collusion exists, there have been quite astounding revelations about the internal collusion of the FBI and other intelligence agencies and “deep state” activity within the American Federal government, all purposed to take down Donald Trump or block him at every turn.

The recent news pieces regarding the 50,000 text messages sent between two romantically involved FBI agents that probably denigrated Trump in their pillow talk are examples of this sort of technology being used to track and observe what people say and do and think.

Meshkov advises anyone wanting to preserve their privacy to do these actions:

  1. Do not install apps from developers you don’t trust.
  2. Examine the apps’ permissions very carefully. After all, why would a wallpaper app or a selfies editor need to get access to your accounts information?

And of course, their own product, Adguard offers some control over this activity.  While this is not an advertisement for their company, discovering and dealing with these situations is what they do.  So, they further advise that if you are one of their users, use their filtering log to examine the apps’ network activity.

It is very interesting when Life imitates Art.

Views: 83

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Burbia posted a blog post

Is the Timing of Alex Jones and Charlie Sheen Connected?

Alex Jones is sperging out.Charlie Sheen is coming out of the closet.Is this why Alex Jones is…See More
yesterday
Doc Vega posted a blog post

Buying the Last haunted House on the Left (A partial autobiography)

Note to the reader, there are events here that are true and some that are fictional.Chapter IIt was…See More
Friday
Doc Vega posted a blog post

In Memory of Those Who Served

 Bullets flew and ricochetedI was on that hill todayMy Company commander got blown awayI was on…See More
Thursday
Doc Vega posted blog posts
Tuesday
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"cheeki kea I was wrong Emperor Penguins are big and powerful but still alive but this,  A size…"
Tuesday
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"Cheeki kea here's another that they say there have been modern sightings of!  The name of…"
Tuesday
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"cheeki kea, did you ever hear of the giant Imperial Penguins? They were about 6 feet tall and could…"
Tuesday
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"cheeki kea I do not think these giant two legged birds would need to have a bad attitude as long as…"
Tuesday
Olivia Brooks updated their profile
Tuesday
John Miller was featured
Tuesday
tjdavis's 2 blog posts were featured
Tuesday
Zfort Group's blog post was featured
Tuesday
Doc Vega's 6 blog posts were featured
Tuesday
Burbia commented on tjdavis's video
Thumbnail

“What’s His Motive?” - Inside The Mind of George Soros

"Trump calls for George Soros and son to face federal…"
Tuesday
Burbia commented on tjdavis's photo
Tuesday
Profile IconSeeta Sathe and Olivia Brooks joined 12160 Social Network
Tuesday
tjdavis posted a video

Mossad, Terrifying CIA Technology, Blackwater & The Most Secret CIA Unit | John Kiriakou

John Kiriakou served 15 years in the CIA as a Case Officer (Spy) and as CIA's Head of Counterterrorism Operations in Pakistan where he lead the raid that cap...
Sep 1
tjdavis posted a photo
Sep 1
tjdavis posted a video

A Critique of the Tavistock Institute - The Mother Of All Conspiracy Theories

An examination of the Tavistock Institute, a theory which seeks to explain how Western societies have been brainwashed by a cabal of social scientists and th...
Aug 31
tjdavis posted a video

“What’s His Motive?” - Inside The Mind of George Soros

In this short clip, Patrick Bet-David, Sebastian Gorka Adam Sosnick, and Tom Ellsworth George Soros and what motivates him to do the things he does. FaceTime...
Aug 27

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted