Thursday 18 September 2014

Strangers keeping tabs on South African Internet tabs

In the light of ample incidents of online hacking all over the world in the past year, Stellenbosch University Computer and Information Science expert, Christo Goosen says ordinary South African Internet users are fish in the nets of governmental, enterprise and criminal online surveillance.

Systems which watch mislead and attack Internet users "usually can't think like humans to identify particular targets", Goosen explains.

"Just think of fishing with a net. It cannot catch the specific fish the fisherman favors. It catches all the fish in the area."

Goosen refers to a streaming video by the online security company Norse DarkMatter, to illustrate why all people should be concerned about their Internet security. The video visually maps a small percentage of the online attacks, as they happen, across the world.


In the video coloured rays, representing various online attacks, beam from the country they are launched into the area they are aimed at. Every second manifold attacks light up the world map.

 

Norse DarkMatter use less than 1% of their collected data to create a daily 
visualisation on their website of a small percentage of live 
online attacks across the globe.

The Carnegie Mellon University's Software Engineering Institute's website explains that hackers often want control of everyday users’ computers, because it “gives them the ability to hide their true location as they launch attacks, often against high-profile computer systems such as government or financial systems”.

 

"Even if you have a computer connected to the Internet only to play the latest games or to send email to friends and family, your computer may be a target. Intruders may be able to watch all your actions on the computer, or cause damage to your computer by reformatting your hard drive or changing your data."

 

The Institute explains that hackers exploit loopholes in your computer’s software, employ viruses or use the often default public access settings of software applications, like chat programs, to gain access to your computer.

 

This year, LinkedIn, a professional social network, used by more than 2,2 million South Africans by 2013’s year-end, made confidential user information vulnerable to hackers with their advertising tactics, leaking many private email addresses.

 

A year ago thousands of thousands of South Africans' credit card details were stolen from fast food restaurants databases, like KFC.

 

Stellenbosch University System Administrator, Hilton Gibson, explained in a recent lecture on Internet security, at the university, why the Internet is a platform for information insecurity.

"The internet was never designed to be secure," he says.

"It was designed for the American military for military computers to talk to each other without fuss - without passwords and security," Gibson explains.

Goosen's tips to try avoid unwanted surveillance
- In South Africa, every time we buy a simcard, we sign a document named RICA (Regulation of Interception of Communications and Provision of Communication-Related Information Act). Rica enables the government to keep tabs on our communication, if they see it necessary.
- Be wary of any operating systems (like windows and mac), or services (like Dropbox, iCloud, Google, Facebook and Amazon) that originate from America. The American government and the NSA (National Security Agency) have legal access to information on American systems and services, under specific circumstances. It's almost impossible to avoid all these programs, so just be aware of the information you store on them.
- Watch out for services where your information is stored on a company server (like at your work). According to some countries' legislation and the company's usage policies, this information can be classified as the company's property. Check out your work contract - it is quite common for companies to keep an eye on your communication and Internet usage, at work. Your use of work facilities and work Internet is usually subject to their rules.
- Use open-source information, services, software or operating systems. The fact that the information is open to the public usually means the rights of the users are prioritised above that of the company. It also usually means users can review the available information.
- Make use of the privacy settings on web pages and services. Facebook is a good example of a service that gives users a good deal of power over their privacy.
- Don't put information on the Internet that you wouldn't give to a stranger on the street.
- Use encryption. Encryption hides the information of messages between the sender and the receiver.
- Use software like Tor. Tor is a system which encrypts your information and hides the sender and the recipient’s address while information moves across the Internet.
- Consider using Tails Linus. Tails Linux is an operating system, automatically used by Tor, for any communication via the Internet. Tails Linux should preferably be put on a flashdrive. It need not be installed on your computer to function. Tails doesn't store your computer information and once you remove the flashdrive, no one will be able see such records.
- Never click or download things you don't know the content of or trust the origin of.


No comments:

Post a Comment