Privacy and Security of 5G

Internet Privacy and Security Risks Rising

The internet and social media have provided unimaginable convenience, however, the price may be privacy, security as well as democracy. The more we are connected, the greater the risks. Regulation unfortunately is a very late afterthought with many barriers and loopholes preventing meaningful oversight. There is much denial about the true risks of high tech. Instead of enabling our society it is disrupting, distorting and disabling it.

New York Times Reports Wireless Carriers Violated Federal Law by Selling Data

On Feb 1, 2020, the New York Times reported  that the FCC plans to take action over the unauthorized sale of user wireless phone data, allowing customers to be tracked.  U.S. Senator Ron Wyden said he was, “eager to see whether the FCC will truly hold wireless companies accountable, or let them off with a slap on the wrist.”

Reuters reported a similar story on May 18, 2018, FCC investigating website flaw that exposed mobile phone locations. The report stated “A security researcher said earlier this week that data from LocationSmart, a California-based tech firm, could have been used to track AT&T Inc (T.N), Verizon Communications Inc (VZ.N), Sprint Corp (S.N) and T-Mobile US (TMUS.O) mobile consumers within a few hundred yards of their location and without their consent.”  Senator Ron Wyden noted then that a , “hacker could have used this site to know when you were in your house so they would know when to rob it. A predator could have tracked your child’s cell phone to know when they were alone.”

The AP News reported, a Missouri sheriff pleads guilty to cellphone tracking charges, after he used the cellphones of a judge and other law enforcement officers to track their whereabouts. He used a company called Securus Technologies Inc., which was providing law enforcement services to the sheriff’s department. The New York Times noted the same company could track you.

 

The European Union General Data Protection Regulation (GDPR)

GDPR regulation-3246979_1280

The European Union GDPR is the most comprehensive data protection regulation in the world. This was approved by the European Parliament April 2016.

Its objectives are to

  • Harmonize data privacy laws across Europe,
  • Protect and empower all EU citizens data privacy
  • Reshape the way organizations across the region approach data privacy

The United States has no such regulation.

California Privacy Law Helpful but Not Strong Enough

The California Consumer Privacy is the first major internet privacy law in the United States but the battle to get this passed left some casualties, including the bill itself.  Mary Stone Ross who was instrumental in drafting the legislation write in her article, I helped draft California’s new privacy law. Here’s why it doesn’t go far enough, that it was watered down, largely toothless and still under attack by industry.

“Zucked: Waking Up to the Facebook Catastrophe”.

One of the leaders in bringing the issue of internet manipulation forward is Roger McNamee, who discusses the history of Silicon Valley in his new book “Zucked: Waking Up to the Facebook Catastrophe”.  He describes how the development of  this technological wonderland appears to be taking us down a rabbit hole that keeps us addicted, distracted and exposed to threats of privacy and democracy. In an Oct 23, 2019  interview  on Democracy Now, he highlights the downsides to Big Tech that were not foreseen.

Zucked: Early Facebook Investor Roger McNamee on How the Company Became a Threat to Democracy. 

Early tech investor Roger McNamee  describes his new insights about the high tech industry on Democracy Now.

The Great Hack

The true workings of Cambridge Analytica and its role in the 2016 election are becoming more transparent with a new documentary, The Great Hack.  Democracy Now interviewed former Cambridge Analytica employee and whistleblower Brittany Kaiser as well as the producers of The Great Hack, who clearly present the Orwellian nature of the current internet and wireless communications industry.

The Great Hack Official Trailer

The Great Hack uncovers the dark world of data exploitation through the compelling personal journeys of players on different sides of the explosive Cambridge Analytica/Facebook data scandal.

 

Democracy Now Interviews Brittany Kaiser, Cambridge Analytica Whistleblower

An interview with Brittany Kaiser, the Cambridge Analytica whistleblower featured in “The Great Hack” and author of “Targeted: The Cambridge Analytica Whistleblower’s Inside Story of How Big Data, Trump, and Facebook Broke Democracy and How It Can Happen Again”.

The Disinformation Machine

Journalists from Investigate Europe have created this short video, The Disinformation Machine, about Facebook’s involvement in elections.

Investigate Europe highlights how bots spread fake news and hate speech on the internet by acting as real people. Social media platforms amplify the fake messages with click bait headlines, spinning these viral.  Ultimately no one knows how or what news is filtered. These large internet media platforms (Google, Facebook and Twitter),  have turned into gatekeepers of information, true “Ministries of Truth”.

They have also created a short video on the 5G  Mass Experiment: Big Promises, Unknown Risks. 

 

5G High Security Risk

In an article by Harvard Kennedy School lecturer Bruce Schneier, China Isn’t the Only Problem With 5G, the author notes that while there have been improvements in in 5G with encryption, authentication, integrity protection, privacy, and network availability, this is not enough. 5G Geopolitics is complicated and not getting any simpler.

Why 5G is inherently insecure

  • 5G is too complex and actually increases points of vulnerability with so many devices connected to the internet. 11 design weaknesses of 5G have been identified.
  • 5G depends on 4G – thus 5G will inherit the old vulnerabilities
  • 5G security measures are optional – similar to 4G- with development, cost, time to market prioritized over security – an afterthought
  • Law Enforcement Needs these Backdoor Openings – U.S. Intelligence Agencies like the NSA as well as law enforcement depend on inadvertent insecurities for their own data collection

Mr Schneier ends on a concerning note, “The technology will quickly become critical national infrastructure, and security problems will become life-threatening. Both criminal attacks and government cyber-operations will become more common and more damaging. Eventually, Washington will have do so something. That something will be difficult and expensive—let’s hope it won’t also be too late.”

He has also authored Click Here to Kill Everybody: Security and Survival in a Hyper-connected World.

 ACLU Attorney DiscussesSecurity Risks of 5G  and The Internet of Things

ACLU Attorney in Houston, Texas warning that 5G Smart Grid Could be a “Wolf in Sheep’s clothing”.

 

News Articles

%d bloggers like this: