

This makes any one on the globe easy to find and target. Even if the user is anonymous at first, adversary tools like Co-traveller will correlate devices that have a known subscriber such as other mobile devices, connected cars and IOT devices, revealing the individual’s true identity. Network identity: Whatever you do on the hardware or software level, regardless of encryption, every device ultimately has a unique set of identifiers linked to a physical person.In identifying the technical short comings in privacy, present academics and mobile industry representatives agreed on the following mayor short comings for both off the shelve as well as the industry’s most secure devices: On July 2018, ARMA Instruments participated in the industry panel at Internet Society France, in Paris. The incident is not isolated though, a vast amount of US politicians including its own president Trump accused the NSA of spying on their communication.ĭespite, it didn’t cause much disturbance in the worldwide collaboration with allied countries through the Five Eyes, Nine Eyes and Fourteen Eyes intelligence alliances. You do not need to be a terrorist as was exposed in July 2015 when the NSA admitted the decades of spying on German chancellor Angela Merkel. Its PRISM program and FASCIA (co-traveller) and Boundless Informant tools allow easy targeting, locating, monitoring and tapping into any specific individual that seems opportune, globally. In the Unites States, due to Julien Assanges’ Wikileaks and a diversity of whistleblowers like William Binney and Edward Snowden, the operations of the NSA have been well documented. The Chinese have their Big Intelligence program, operated by its Ministry of Public Security and the Russians the Roskomnadzor program with its Deep Package Inspection. The involvement of state sponsored agencies is not just limited to the US. Through Android, iOS, Whatsapp and Skype, to name but a few, they are represented in the vast majority of worldwide mobile communication, “Ultra Secure Smartphones” included. Their accomplices? Apple, Google, Facebook and Microsoft.

On June 2013 the NSA admitted monitoring the communication of US and global citizens on a massive scale through its PRISM program. Most notable is the chain of incidents involving the US National Security Agency (NSA).

More significantly followed up by the larger tech companies that are involved in severe breaches of privacy. In order to come up with a suitable solution to this epic problem we needed to acknowledge the different actors in this global theatre of cyberwar.Ĭommon cybercriminals are obviously a worldwide disaster. Exploiting ransomware, identity theft, hijacking smartphones for crypto mining to attacks on public infrastructure.
