The Insecurity Industry

Guest Post by Edward Snowden

The greatest danger to national security has become the companies that claim to protect it

1.

The first thing I do when I get a new phone is take it apart. I don’t do this to satisfy a tinkerer’s urge, or out of political principle, but simply because it is unsafe to operate. Fixing the hardware, which is to say surgically removing the two or three tiny microphones hidden inside, is only the first step of an arduous process, and yet even after days of these DIY security improvements, my smartphone will remain the most dangerous item I possess.

The microphones inside my actual phone, prepped for surgery

Prior to this week’s Pegasus Project, a global reporting effort by major newspapers to expose the fatal consequences of the NSO Group—the new private-sector face of an out-of-control Insecurity Industry—most smartphone manufacturers along with much of the world press collectively rolled their eyes at me whenever I publicly identified a fresh-out-of-the-box iPhone as a potentially lethal threat.

Despite years of reporting that implicated the NSO Group’s for-profit hacking of phones in the deaths and detentions of journalists and human rights defenders; despite years of reporting that smartphone operating systems were riddled with catastrophic security flaws (a circumstance aggravated by their code having been written in aging programming languages that have long been regarded as unsafe); and despite years of reporting that even when everything works as intended, the mobile ecosystem is a dystopian hellscape of end-user monitoring and outright end-user manipulation, it is still hard for many people to accept that something that feels good may not in fact be good. Over the last eight years I’ve often felt like someone trying to convince their one friend who refuses to grow up to quit smoking and cut back on the booze—meanwhile, the magazine ads still say “Nine of Ten Doctors Smoke iPhones!” and “Unsecured Mobile Browsing is Refreshing!”

In my infinite optimism, however, I can’t help but regard the arrival of the Pegasus Project as a turning-point—a well-researched, exhaustively-sourced, and frankly crazy-making story about a “winged” “Trojan Horse” infection named “Pegasus” that basically turns the phone in your pocket into an all-powerful tracking device that can be turned on or off, remotely, unbeknownst to you, the pocket’s owner.

Here is how the Washington Post describes

In short, the phone in your hand exists in a state of perpetual insecurity, open to infection by anyone willing to put money in the hand of this new Insecurity Industry. The entirety of this Industry’s business involves cooking up new kinds of infections that will bypass the very latest digital vaccines—AKA security updates—and then selling them to countries that occupy the red-hot intersection of a Venn Diagram between “desperately craves the tools of oppression” and “sorely lacks the sophistication to produce them domestically.”

An Industry like this, whose sole purpose is the production of vulnerability, should be dismantled.


2.

Even if we woke up tomorrow and the NSO Group and all of its private-sector ilk had been wiped out by the eruption of a particularly public-minded volcano, it wouldn’t change the fact that we’re in the midst of the greatest crisis of computer security in computer history. The people creating the software behind every device of any significance—the people who help to make Apple, Google, Microsoft, an amalgamation of miserly chipmakers who want to sell things, not fix things, and the well-intentioned Linux developers who want to fix things, not sell things—are all happy to write code in programming languages that we know are unsafe, because, well, that’s what they’ve always done, and modernization requires a significant effort, not to mention significant expenditures. The vast majority of vulnerabilities that are later discovered and exploited by the Insecurity Industry are introduced, for technical reasons related to how a computer keeps track of what it’s supposed to be doing, at the exact time the code is written, which makes choosing a safer language a crucial protection… and yet it’s one that few ever undertake.

Google said 70% of serious bugs in its Chrome Browser are related to memory safety. These can be reduced by using safer programming languages.

If you want to see change, you need to incentivize change. For example, if you want to see Microsoft have a heart attack, talk about the idea of defining legal liability for bad code in a commercial product. If you want to give Facebook nightmares, talk about the idea of making it legally liable for any and all leaks of our personal records that a jury can be persuaded were unnecessarily collected. Imagine how quickly Mark Zuckerberg would start smashing the delete key.

Where there is no liability, there is no accountability… and this brings us to the State.


3.

State-sponsored hacking has become such a regular competition that it should have its own Olympic category in Tokyo. Each country denounces the others’ efforts as a crime, while refusing to admit culpability for its own infractions. How, then, can we claim to be surprised when Jamaica shows up with its own bobsled team? Or when a private company calling itself “Jamaica” shows up and claims the same right to “cool runnings” as a nation-state?

If hacking is not illegal when we do it, then it will not be illegal when they do it—and “they” is increasingly becoming the private sector. It’s a basic principle of capitalism: it’s just business. If everyone else is doing it, why not me?

This is the superficially logical reasoning that has produced pretty much every proliferation problem in the history of arms control, and the same mutually assured destruction implied by a nuclear conflict is all-but guaranteed in a digital one, due to the network’s interconnectivity, and homogeneity.

Recall our earlier topic of the NSO Group’s Pegasus, which especially but not exclusively targets iPhones. While iPhones are more private by default and, occasionally, better-engineered from a security perspective than Google’s Android operating system, they also constitute a monoculture: if you find a way to infect one of them, you can (probably) infect all of them, a problem exacerbated by Apple’s black-box refusal to permit customers to make any meaningful modifications to the way iOS devices operate. When you combine this monoculture and black-boxing with Apple’s nearly universal popularity among the global elite, the reasons for the NSO Group’s iPhone fixation become apparent.

Governments must come to understand that permitting—much less subsidizing—the existence of the NSO Group and its malevolent peers does not serve their interests, regardless of where the client, or the client-state, is situated along the authoritarian axis: the last President of the United States spent all of his time in office when he wasn’t playing golf tweeting from an iPhone, and I would wager that half of the most senior officials and their associates in every other country were reading those tweets on their iPhones (maybe on the golf course).

Whether we like it or not, adversaries and allies share a common environment, and with each passing day, we become increasingly dependent on devices that run a common code.

The idea that the great powers of our era—America, China, Russia, even Israel—are interested in, say, Azerbaijian attaining strategic parity in intelligence-gathering is, of course, profoundly mistaken. These governments have simply failed to grasp the threat, because the capability-gap hasn’t vanished—yet.


4.

In technology as in public health, to protect anyone, we must protect everyone. The first step in this direction—at least the first digital step—must be to ban the commercial trade in intrusion software. We do not permit a market in biological infections-as-a-service, and the same must be true for digital infections. Eliminating the profit motive reduces the risks of proliferation while protecting progress, leaving room for publicly-minded research and inherently governmental work.

While removing intrusion software from the commercial market doesn’t also take it away from states, it does ensure that reckless drug dealers and sex-criminal Hollywood producers who can dig a few million out of their couch cushions won’t be able to infect any or every iPhone on the planet, endangering the latte-class’ shiny slabs of status.

Such a moratorium, however, is mere triage: it only buys us time. Following a ban, the next step is liability. It is crucial to understand that neither the scale of the NSO Group’s business, nor the consequences it has inflicted on global society, would have been possible without access to global capital from amoral firms like Novalpina Capital (Europe) and Francisco Partners (US). The slogan is simple: if companies are not divested, the owners should be arrested. The exclusive product of this industry is intentional, foreseeable harm, and these companies are witting accomplices. Further, when, a business is discovered to be engaging in such activities at the direction of a state, liability should move beyond more pedestrian civil and criminal codes to invoke a coordinated international response.

Diplomacy by other means

5.

Imagine you’re the Washington Post’s Editorial Board (first you’ll have to get rid of your spine). Imagine having your columnist murdered and responding with a whispered appeal to the architects of that murder that next time they should just fill out a bit more paperwork. Frankly, the Post’s response to the NSO scandal is so embarrassingly weak that it is a scandal in itself: how many of their writers need to die for them to be persuaded that process is not a substitute for prohibition?

Saudi Arabia, using “Pegasus,” hacked the phones of Jamal Khashoggi’s ex-wife, and of his fiancée, and used the information gleaned to prepare for his monstrous killing and its subsequent cover-up.

But Khashoggi is merely the most prominent of Pegasus’ victims — due to the cold-blooded and grisly nature of his murder. The NSO Group’s “product” (read: “criminal service”) has been used to spy on countless other journalists, judges, and even teachers. On opposition candidates, and on targets’ spouses and children, their doctors, their lawyers, and even their priests. This is what people who think a ban is “too extreme” always miss: this Industry sells the opportunity to gun down reporters you don’t like at the car wash.

If we don’t do anything to stop the sale of this technology, it’s not just going to be 50,000 targets: It’s going to be 50 million targets, and it’s going to happen much more quickly than any of us expect.

This will be the future: a world of people too busy playing with their phones to even notice that someone else controls them.

-----------------------------------------------------
It is my sincere desire to provide readers of this site with the best unbiased information available, and a forum where it can be discussed openly, as our Founders intended. But it is not easy nor inexpensive to do so, especially when those who wish to prevent us from making the truth known, attack us without mercy on all fronts on a daily basis. So each time you visit the site, I would ask that you consider the value that you receive and have received from The Burning Platform and the community of which you are a vital part. I can't do it all alone, and I need your help and support to keep it alive. Please consider contributing an amount commensurate to the value that you receive from this site and community, or even by becoming a sustaining supporter through periodic contributions. [Burning Platform LLC - PO Box 1520 Kulpsville, PA 19443] or Paypal

-----------------------------------------------------
To donate via Stripe, click here.
-----------------------------------------------------
Use promo code ILMF2, and save up to 66% on all MyPillow purchases. (The Burning Platform benefits when you use this promo code.)
Click to visit the TBP Store for Great TBP Merchandise
Subscribe
Notify of
guest
25 Comments
Bilco
Bilco
July 29, 2021 8:24 am

Simple fix……Don’t own a cell phone. Oh, the humanity!!!! How did I ever live all of my life without one. The fixes are so easy for those that use their brains. Simply don’t use what you disagree with. No cell,no google,no social media. Use cash,and avoid their debt slavery. It has worked for me.

Georges S
Georges S
  Bilco
July 29, 2021 9:06 am

Because you sincerely think your landline is protecting you? Just asking!

Anonymous
Anonymous
  Georges S
July 29, 2021 11:59 am

It depends from whom you want to be protected.
From the NSA? No.
From other ‘parties’? Probably.

anthony aaron
anthony aaron
  Anonymous
July 29, 2021 4:41 pm

Don’t forget — in the lead up to 9/11 (actually in the lead up to Y2K), various israeli spy firms were involved in all sorts of our ‘security’ projects … insinuating themselves (and their code) into countless IC projects (including NSA) where data was often simultaneously received not only by NSA, but by the israeli firms and government who planted their code to transmit that data).

Once again … whenever someone is going to suffer … there’s a member of the ‘small hat’ brigade making money off it … 

Mygirl....maybe
Mygirl....maybe
  Bilco
July 29, 2021 11:26 am

Get a flip phone and only use it to talk. Pull the battery if more security is wanted and leave it when you don’t want to be tracked. Drive an older car.

The intrusion into privacy is so pervasive that it is unavoidable unless you join the ranks of the homeless. I shop online and after one search for, say, blue jeans, I’m inundated with reams of ads for blue jeans. How do they know I’m interested in blue jeans? Take a wild guess…..

Stucky
Stucky
  Mygirl....maybe
July 29, 2021 11:48 am

Holy shit, Mygirl.

Now I understand why I keep getting ads for 38-DDD bras.

One lousy fucken porn search 13 years ago … jeebus.

Mygirl....maybe
Mygirl....maybe
  Stucky
July 29, 2021 12:46 pm

Only one search?
comment image

'Reality' Doug
'Reality' Doug
  Mygirl....maybe
July 29, 2021 7:03 pm

MyGirl, you’re welcome to stay a spell. Nice work.

Ken31
Ken31
  Mygirl....maybe
July 29, 2021 8:08 pm

That doesn’t look ergonomic.

anthony aaron
anthony aaron
  Mygirl....maybe
July 29, 2021 4:42 pm

Turn off all the cookies in your browser and block all tracking … that’s a small start, but it’s better than none.

As for ‘smart’ or other cell phones — use them for phone service and camera … all else is opening up to trouble.

Hunter's crack pipe
Hunter's crack pipe
  Mygirl....maybe
July 29, 2021 5:18 pm

My wife and I tested something the other day. We both have those Steve Jobs devices, unfortunately, soon in my case to get a Pinephone64; but we put her phone in a Dutch oven and I tried to call it. Didn’t ring on her end, nor show that someone tried to call. 🤔

Thaisleeze
Thaisleeze
July 29, 2021 8:28 am

My Nokia 2G is still going strong.

Georges S
Georges S
  Thaisleeze
July 29, 2021 9:06 am

I just bought two old Nokia on ebay and sold my android (in which I never gave personal info).

Steve
Steve
  Thaisleeze
July 29, 2021 10:31 am

Isn’t that the one that includes a pair of carrier pigeons? 🙂

anthony aaron
anthony aaron
  Thaisleeze
July 29, 2021 4:43 pm

How is that possible … when even lowly TracFone has abandoned 3G?

Sionnach Liath
Sionnach Liath
July 29, 2021 8:33 am

” We do not permit a market in biological infections-as-a-service, and the same must be true for digital infections.”

Unfortunately, we do. They are called “vaccines.”

anthony aaron
anthony aaron
  Sionnach Liath
July 29, 2021 4:44 pm

‘vaccines’ … as opposed to treatments that work …

TrickleUpPolitics
TrickleUpPolitics
July 29, 2021 8:41 am

You know, I was reading along until I got to his gratuitous slam of President Trump claiming that when he wasn’t golfing he was tweeting. I am sick of this kind of defamatory comment so I stopped reading the rest of what he had to say. His bias with that comment infects, yes Snowden, infects, the rest of what you have to say with bias. Bye, bye. Stuff it.

Stucky
Stucky
  TrickleUpPolitics
July 29, 2021 8:50 am

” I was reading along until I got to his gratuitous slam of President Trump …”

WHOOP! WHOOP! Red alert! RED ALERT! Danger, Will Robinson, DANGER! Warp core breach imminent. Launch all shuttle-craft from the escape pods!! WHOOP! WHOOP.! Trump Derangement Syndrome protocols being initiated! Abandon ship!
.
.
.
.
j/k

Stuart
Stuart
  TrickleUpPolitics
July 29, 2021 11:24 am

He was just using Trump as one example. He did this because Trump was more or less famous for it, so we could relate. He didn’t “slam” anybody and he certainly didn’t “defame” him. Grow up.

GNL
GNL
July 29, 2021 10:20 am

Guest post by Edward Snowden? Does this mean he is in contact with admin?

Mygirl....maybe
Mygirl....maybe
  GNL
July 29, 2021 11:31 am

Snowden is controlled opposition.
comment image

m
m
  Mygirl....maybe
July 29, 2021 1:05 pm

Just as Putin and Xi are.

Anonymous
Anonymous
July 29, 2021 11:56 am

Pegasus can collect emails, call records, social media posts, user passwords, contact lists, pictures, videos, sound recordings, and browsing histories.

While I find it interesting that they left ‘location data’ off the list; I can’t help but figure this is merely a problem for Apple and Google, as they’re the companies that have had the ability to collect all of this almost the whole time that “smart” phones have been around. This isn’t about some infringement of the privacy of the end-user; that’s already been GIVEN away. This is about someone able to snake saleable data out from under Google’s and Apple’s noses.

Yahsure
Yahsure
July 29, 2021 1:01 pm

I never have been a phone guy, often leaving it at home. Maybe I will just leave it in my truck and just call people back that I actually want to communicate with.