Making The Switch To Encrypted Emails

This past February a US judge ordered Microsoft, an American based tech company, to honor the search warrants of American law enforcement agencies requiring the company to hand over any/all data, emails and the like which the company stores on servers located overseas. The ruling came in direct contradiction to a previous ruling from a Federal Appeals Court in August of 2016, which upheld a US Circuit court ruling from July 2016, prohibiting the US Government from seizing data stored on servers located outside of US borders.

The principle behind this case is very simple to understand, does the United States Government have the right to demand foreign businesses located outside of the United States hand over their records to the United States Government if that company happens to do business with a US citizen? In other words, are foreign nations forced to abide by US law and comply with all US based legal requests? Well, according to the most recent ruling, as of February 2017, at least as far as US courts are concerned, the answer is “yes.

What Other “Authority” Does The US Government Have?

Let’s use the world’s most popular email service provider as a quick example – Gmail. Quite literally, everything you do on your Gmail account is accessible by Google at any given moment in time. After-all, you are using their service. If the US Government ever wants to see your account or any of the information on it, then all they have to do is pull up the file of a generic document, insert your name on top of it, print it out and just like that they magically have a “subpoena” to obtain all of your information from Google.

Despite how simple of a process this is, it is all groundbreaking stuff too. Believe it or not, it was not until May 2016 that the US government even needed to get a warrant or legal document of any kind to search through all of your personal emails. Don’t believe me?

Read More – Email Privacy Act of 2016: https://www.congress.gov/bill/114th-congress/house-bill/699

For you international folk out there, the news isn’t much better. You see, the US Government has its own private court known as a FISC court which, historically speaking, blindly grants “99.96%” of all warrant request brought in front of it – but who’s counting, right?

With that out of the way, all of the information above only goes to show how easy it is for the US Governments to go about obtaining all your data “legally.” But as I think we are all aware by now, agencies like the NSA or CIA do not necessarily care about US law and have the very real authority to act outside of it – #PatriotAct. To be fair, this does not necessarily mean that someone working for the US Government is literally watching/reading every single email you write every minute of the day, but they theoretically could be if/whenever they wanted to.

To that very point, early in 2016 Google came out with a press release addressing how “state-sponsored hackers” had breached over 1 million Gmail accounts over the course of that year. This was also not an isolated incident and it’s not just Google which has been targeted by these types of breaches. Literally hundreds of millions of Yahoo and Hotmail accounts have also been exposed over the years.

Read More – 3 Billion Yahoo User Accounts Hacked, Including 500 Million Email Addresses: http://money.cnn.com/2017/10/03/technology/business/yahoo-breach-3-billion-accounts/index.html

So far I have only addressed how easy it is for the US Government and/or law enforcement agencies to access all of your personal accounts/information, this does not even account for all of the non-Government organizations or hackers out there or oppressive regimes located in countries all over the world. In fact, I am willing to bet that at least 95% of all hackers worldwide are non-Government affiliated. Moreover, Hillary Clinton, the DNC, CIA, John Brennan and John Podesta should all serve as evidence for just how easy it can be for hackers to compromise anyone’s email account if they really want to – even some of the most powerful people in society.

Quite frankly, there is a reason why politicians and members of the Armed Forces are told never to use their own personal or private email accounts, because none of these services are properly protected or encrypted! While members of the Government and Armed Forces use their own private versions of encrypted email services which are NOT open or available to the public sector, thankfully, there are a number of free and paid email encryption services out there open to the general public.

For Example:

Mailfence

Mailfence is a relatively new company globally, but one which I have already placed at the top of all encrypted email service providers. Mailfence operates their servers out of Belgium, a country internationally renown for having some of the strongest and most resolute privacy laws in the world. Unlike the United States, every surveillance request or request for information inside Belgium, including on Mailfence’s servers, must be legally brought in front of a Belgium judge and proven in court as legitimate. In this way Belgium protects user data and business confidentiality in a way that no other country in the world does.

Sign Up/Create an Account Here: https://mailfence.com

ProtonMail

This email service provider offers free end to end encryption and hosts its servers in Switzerland, outside of US jurisdiction – theoretically. When signing up, at no point in time are you asked for any personal information and you do not need to attach any other emails account or phone numbers in order to register. This service also utilizes 2-factor authentication to log in, preventing hacking attempts. ProtonMail has also partnered with humanitarian organizations around the world, such as Amnesty International, in order to help fight back against Government surveillance and cyber censorship in developing countries around the world.

On a lighter note, if you are a fan of the Television drama “Mr. Robot” this is Elliot’s email provider of choice on the show.

Sign Up/Create an Account Here: https://protonmail.com/

Tutanota

This is another free encrypted email service that has become quite popular in recent times. In fact, earlier in 2016 Tutanota officially surpassed 1 million accounts – becoming the world’s largest encrypted email service provider. In 2017, Tutanota then went on to surpass 2 million accounts, furthering the countries rock solid reputation as an industry leader.

What makes Tutanota unique is that the company makes their source code “open source,” meaning that security researches investigate for themselves the level of encryption they are receiving. For all you n00bs out there, making your source code public record and still not having it hacked proves just how good the code really is.

Sign Up/Create an Account Here: https://tutanota.com/

Understanding The Weaponization of Modern Cyberspace & The ‘Secret World’ of International Corporate Espionage

This is a concept which needs some explaining, because no one has really ever taken the time to break it down – at least from what I have seen. What you need to understand is that we live in a unique time in world history, and we are all headed towards an equally unique and uncertain future.

What I mean to say is that the 21st century is an exceptionally prosperous time in human history, there is no mass global Wars, there’s no great plague, the majority of us all have running water, plumbing, electricity, refrigeration and the like, we have bikes, cars, automobiles and planes and the entire world can theoretically be accessible/connectable with the click of a button. Not only is the modern 21st century perhaps the single easiest and most peaceful time in human history, but the human race is now also interconnected in ways that prior generations could have never imagined possible.

With that established however, not all is right as rain. For example, over the course of the last several years the United States, Germany, NATO and the like have all gone on to officially declare “cyber space” and “the internet” as the 5th domain/relm of Warfare – joining more traditions domains of Warfare such land, sea, air and space.

Learn More – NATO’s Recognition of Cyberspace As New Domain of Warfare: https://apps.dtic.mil/dtic/tr/fulltext/u2/1029776.pdf

However, as humanity continues to grapple with its understanding and regulation of our new technologies, we are only just now beginning to see/realize the weaponizing of the internet, internet conglomerates and their infrastructure – and this phenomenon is slowly beginning to rear its ugly head across nearly every other aspect of society these days. For example, consider the following evidence.

Google & The Department of Defense

I start off with Google for a number of reasons, chief among them is the fact that they are the single largest and highest grossing firm on the net. As Google is an American business, what you should know is that the company has a number of active contracts with the United States Government – particularly the United States military industrial complex. If you would like an example, look no further than “Project Maven,” a joint military operation currently underway with the help of Google researchers, developers, staff and Artificial Intelligence algorithms – some of which have recently made international headlines.

It should therefore go without saying, but you can not have a contract with the United States military without your full loyalties belonging to them. For this very reason, this also means that enemies of the US Government, or any other international Government agency for that matter, cannot rely on or trust Google to ensure their full security, privacy or look out for their best interests – especially in regards to contentious geo-political issues/events. In other words, as an American-based business and active military contractor, Google is loyal to the US military and for better or worse, has become a de facto branch of/for it – even if no one actually admits this out loud.

Consequentially enough, this is also why Google has always been restricted by “The Great Firewall of China,” and has recently faced banishment from Russia entirely as recently as just a few weeks ago.

Microsoft, Encryption Back-doors & Government Espionage

Similar to Google, Microsoft is yet another American based business with deep running ties to the United States military industrial complex. For example, every computer owned by the US Army and US Cyber Command is now literally mandated to run exclusively on Microsoft Windows 10 software and Operating Systems.

https://twitter.com/MSinDOD/status/770962514406313986

Now, I want you to notice the dates of those two Tweets above – August 29th and 31st, 2016. I bring this up because just a few weeks prior to this, on August 10th 2016, the Kremlin came out with a press release announcing how it was their immediate intention to begin switching all government/military computing systems off Microsoft and on onto domestically produced software – directly because of Microsoft‘s deep running ties with the US Government and US military.

It wasn’t until just a few months after this, in November 2016, that the Kremlin literally called switching over all their software away from Microsofta matter of national security.” Going on to explain how the Kremlin now believes that “software developed by American companies, such as Microsoft, could hide back-doors and bugs that could help other nations spy on their plans.” Also going as far as to say “not replacing foreign IT would be equivalent to dismissing the army.

Read More – Russia’s Plan To Abandon Microsoft & Foreign Software 9/17/2016: https://news.softpedia.com/news/president-elect-donald-trump-can-t-stop-russia-s-war-against-american-software-510294.shtml

If you think this conundrum is unique to Russia, you are mistaken. Believe it or not, Microsoft has similarly been banned from all Government systems in China dating back to 2013. This is when the country first interrogated then political asylum seeker/NSA contractor Edward Snowden, whom revealed that the United States has been secretly using Microsoft to conduct espionage on the Chinese Government and its companies for decades. Not only this, but Microsoft‘s own search engine, Bing, was also banned in China as recently as January 2019 – for essentially all the same reasons.

ZTE & Corporate Espionage

Consequentially enough, this sets me up perfectly for my next bit – America’s banning of the Chinese-based telecommunications conglomerate known as Zhongxing Telecommunication Equipment – otherwise simply referred to as ZTE. Truth be told, I first learned of this news after attempting to go into an AT&T in store in downtown New York City for repairs on my phone, only to find out that AT&T refused to fix my screen because it was a ZTE product – based out of China. They informed me that it was no longer their policy to service and/or fix any Chinese based phone, and advised me to purchase a new American phone – to which I declined, and not respectfully.

Regardless, similar in many ways to to the complaints international Government agencies have been levying against American tech giants for years now, the US has now started levying against other international tech giants/conglomerates. It is just a shame that this information is generally not available or public knowledge to the average American hopelessly wandering around our society.

Kaspersky & US Election Hacking

Along the same lines, throughout the course of 2017, the US Department of Homeland Security (DHS) made it a top priority to ban Kaspersky Lab anti-virus and other software from all Government systems around the United States. This is because, upon investigation, the US Federal Bureau of Investigation had come to believe that US government employees and personnel were originally compromised via the Kaspersky Lab products they had installed on their devices, which granted the Russian based software conglomerate root access over all their systems. Put more directly, the US Government had come to believe that Kaspersky Lab roots were the whole reason that Russia was able to hack the 2016 Presidential election and US Government employees so easily in the months just before it – especially considering Russian laws requires Russian companies to make all of their data freely accessible to the Kremlin. These laws are also why Kasperky later moved all of their severs out of Russia and into Switzerland by 2018, even though the public damage to the company had already been done.

However, it must also be stated while there was never any cut and dry evidence released indicating that this was indeed the case, at least publicly, and there are still technically court cases ongoing surrounding these allegations, the US Governments ban of Kaspersky has been implemented nonetheless. As a result, Kaspersky has also faced similar bans throughout Europe.

I also don’t know what it says about me, but I just bought a new computer two weeks ago and the first thing I did was install Kaspersky Lab software on it. I also own a ZTE phone 😉.

Facebook & Psychological Warfare

The last two sections of this article are almost exclusive to Rogue Media Labs, at least I have not seen anyone else reporting on these issues outside of Russia. The first is the fact that Facebook has quite literally become a military weapon – and no, I am not talking about Russia’s use of fake news, fake advertisements or propaganda either. While yes, those were huge problems in their own right throughout 2015/2016, new developments as of 2018/2019 are far more troubling and grotesque. More specifically, I am talking about the US Governments use of Facebook as a means of waging so-called “Psychological Warfare” against our adversaries.

Learn More – Russia Bans Military Personnel from Using Social Media To Counter-Act US Sponsored Psych-Ops: https://roguemedia.co/2018/11/09/russia-bans-active-duty-military-personnel-from-sharing-on-social-media/

You may recall a 2017 statement by James Mattis in which he personally stated how, as a result of complacency and improper funding of the US Department of Defense (DoD) under the previous administration, the United States has now fallen behind the rest of the world in several realms of Warfare – such as cyberspace, ultimately allowing the US elections to be hacked in the first place. Regardless, in an effort to ‘catch back up with the rest of the world,’ not only has Trump begun heavily investing back in the US military industrial complex, but we as a nation have also begun experimenting with new, unconventional forms of Warfare. For the purposes of this particular article I would like to talk specifically about Psychological Warfare and our use of Psych-Ops, as well as how these operations can be and are already actively being carried out online – in some instances, exclusively through Facebook.

Read More – US Military Field Manual on Unconventional Warfare: https://roguemedia.co/wp-content/uploads/2019/03/US_Army_Field_Manual_Unconventional_Warfare_2008.pdf

If you were previously unaware, in November of 2018 the Kremlin signed a new piece of legislation into law officially banning all active duty military personnel from owning social media accounts or sharing across social platforms. This is because, at the time, according to the Kremlin itself, social platforms such as Facebook had begun being used to collect “analysis of the activities of the Russian military.” Explaining how “The data shared by the servicemen online is used to apply psychological and information pressure on Russia and its military as well as forming biased opinions on state policies of Russian authorities in society.” Not only this, but the US Government had also taken it a step further by using platforms like Facebook to wage psychological Warfare against Russian soldiers serving abroad in locations such as Syria and Africa.

For example, given that Facebook hosts its servers inside the United States, the US Government has started hijacking their platform in order to pretend to be friends or family members of Russian troops serving abroad. Not only does the US Government do this to organize psychological profiles on individual members of Russia’s military, but in some instances they also use Facebook accounts to cause Russian troops “distress” back home – by faking/fabricating conflicts, arguments or unfortunate circumstances with friends and family back in Russia.This was done to make Russian troops feel as though aspects of their lives were completely falling apart outside of their control back home, thus taking away pride/focus from their military efforts as they served abroad. It may have taken a few months to figure out, but the Kremlin did eventually catch on.

Despite however low down and “dirty” of a trick that is, this remains our current reality – at least under our new Commander In Chief Donald Trump as we continue to exploit American businesses internationally.

Twitter & Spying

I am proud to say that this last bit is exclusive to Rogue Media Labs, because it features research I have personally pieced together over recent months. They say that some of the worlds greatest discoveries were made by accident, and this last bit of news is no different.

The first bit of information I would like to share is something I have already shared a few months ago, which is the fact that Twitter is absolutely using their service to spy on its users. Not only can this be evidenced by the fact that every deleted Tweet attached to an owners account is secretly sent directly to Twitters internal servers, but also by the fact that I have personally caught the service recording one of my private messages with a famous hacker known as Nama Tikure. As previously reported, as I was physically typing it out on screen, a custom key logger built by yours truly accidentally caught Twitter bots clicking on my URL address literally 19 times in a 17 second time period. For some perspective on this, I never even pressed ‘enter’ onto the chat. Meaning that all of these clicks were recorded on my end, with all 19 IP Address ranges listed assigned exclusively to Twitter bots. In other words, I accidentally caught Twitter red hand trying to secretly record and log every last aspect of my private messages – and I am certain this isn’t or wasn’t an isolated incident.

Learn More- Twitter Caught Clandestinely Intercepting The Messages of Its Users: https://roguemedia.co/2019/01/15/twitter-bots-caught-clandestinely-logging-the-private-messages-of-their-users/

The second bit of research is something I accidentally discovered last night, completely unrelated to this article and also 100% accidentally. I could describe it in more detail, but this article is already long enough. So ironically, I instead direct you to the following Tweet…..

Wrapping Things Up

I’m almost embarrassed to admit it, but the whole reason I got riled up enough to write this article was the fact that, upon buying my computer, I was immediately offered 25 GB of free storage from DropBox. Sounds like an amazing deal – right? Who wouldn’t want to jump all over that – right? How generous and caring of a company Dropbox must be! Right?

Well, I’m sorry to 💩 on your parade, so to speak, but that just isn’t exactly the reality of the situation at hand here. I know it’s getting a bit redundant at this point, but the fact of the matter is that Dropbox is a subsidiary – an American subsidiary. Moreover, as the US Governments Supreme Court case with Microsoft proves, as an American company, the US Government has the right to any/all data owned by that company if the Government truly wants it.

See where I am going here? The reason why Dropbox is offering 25 GB of free space to anyone who wants it is so that ignorant sheeple, I mean citizens, will upload all of their data to it – so that the US Government can own all that data themselves. The worst part is the fact that Dropbox is subsidized to mislead you to do exactly this, which is also why they can afford to offer up some much free storage space to so many people for free. I know, yay Capitalism – right? 😏.

Exclusive: Understanding Recent Changes To Ghostbin’s Service & Servers

Internet users may or may not have noticed it at the time, but a couple of weeks ago Ghostbin servers were down globally for the better part of 48 hours. In addition to this, over the course of the last several days and weeks, Ghostbin‘s service has begun behaving in new and unexpected ways it never has before. For example, many recently uploaded paste-ings seem to be getting taken down almost as fast as they’ve been put up, and countless older postings have mysteriously started disappearing. Researching the incidents a little further, it appears as though the problem traces back to internal server/service updates currently being installed by Dustin Howett – Ghostbin’s original owner and founder.

In a statement posted to Twitter on December 28th 2018, roughly 3 days following a major service blackout effecting the website over the days leading up to Christmas, Dustin Howett explained how “Ghostbin will be shutting down, or changing drastically in scope, in February 2019. In the next few weeks, I’ll roll out a session archival feature and restrict all new pastes to a 48-hour expiration. There may be a period during which the service is available, but read-only.” This development was particularly interesting to note because back on December 25th 2018, in statements to Rogue Media Labs, Howett explained how the blackout effecting his service only lasted so long because he had run out of disk space for storage and that he “hated running” it – perhaps indicating that something like this was inevitably going to happen.

In further statements to Rogue Media Labs dated February 16th 2019, Howett went on to re-affirm how “I hate running Ghostbin.” Explaining that “ I spend hundreds of dollars a year and open myself up to significant legal risk to support a website that brings me no joy. Like: I started Ghostbin because I wanted there to be a place for iPhone jailbreak developers to share code with each other. That’s it. There isn’t an overarching goal related to fighting for freedom or openness of information or anything. I have to spend hours policing the content that goes up so the freakin’ sherrif’s department of some random city doesn’t subpoena me for some stupid nonsense.” Adding that “I’m not planning on selling the domain, though; at least not for a while.” Instead, Howett has begun rolling out/implementing all the changes listed above to begin mitigating or minimizing his future risks.

A Brief History

For those of you whom might be unfamiliar, Ghostbin was founded I believe sometime back in 2015 as side project while Howett was still in college, and the service took off right from the start – particularly amongst the Anonymous Hacker Collective. In fact, while I was a reporter working for AnonHQ News in the Spring of 2016 I remember conducting an interview with Howett, a conversation during which he explained how he had created the service as a side project of sorts, after essentially being un-impressed by other copy and paste services like it on the market. What has always made Ghostbin stand out from its competition is the fact that it looks bad-ass, offered no sign up page, featured no advertisements and its servers were never designed to log or record the IP Addresses of its visitors/posters. This also made the service 100% Anonymous, which is why it has always such a devout/cult following within various hacking circles.

Read More: About Ghostbin’s Founding: https://ghostbin.com/about

Presumably though, this is in all likelihood the same reason why Howett has now soured on his service, because it has essentially become a conduit for black hat hackers to perpetuate illegal acts. For obvious reasons, this is also something which can be troublesome, especially given the fact that Howett is now a leading industry professional/developer working for American tech giant Microsoft. I’d also have to imagine that continuously getting asked to take down certain postings by law enforcement officials and/or Government agencies and/or victims of cyber attacks can get pretty annoying, especially when you have full time commitments elsewhere.

As I’ve told Mr. Howett, I almost feel responsible in a way for the burden he now bears, because dating back to 2015 I’ve been encouraging members of Anonymous and international hackers alike to use Ghostbin for just about everything – something which has indubitably resulted in countless headaches for Howett over the years. So, considering that Howett has no ambitions to sell his domain, service or platform in the future, I would now like to begin using my platform to start advising people to make the switch away from Ghostbin and to other alternative copy and paste services. In other words, stop using Ghostbin for any/all illegally obtained information.

In the future, I advise any/all of my sources/contacts to begin posting leaks or releases through Hastebin. If you do not want to use Hastebin then simply make a new posting on Pastebin, download the text file and then upload said file to AnonFile. This will ensure that your data will always be safe and cant be taken down. If you would like to learn more about the value of copy and paste services, as well as a small list of some of the top alternatives to Ghostbin, I invite you to read the following article…

Learn More – Copy & Paste Services: https://roguesecuritylabs.ltd/copy-paste-services/

Online Training Platform TDS Technology Brasil Hacked, Data of 186 Account Holders Leaked Online

Earlier this morning, January 19th 2019, an Indonesian based hacker going by the name of “Al1ne3737” announced a hack of TDS Technologies in Brasil, leaking the account information of 186 customers – including their emails and passwords. While it is unknown how many of the accounts listed below are paid accounts, the website is almost exclusively used as a learning center – connecting students to paid online courses/tutorials covering various professional services/topics, such as webmaster training, CISCO Systems certification, Oracle training, various Microsoft Windows related certifications and much more. Theoretically then, the logins provided below could be used to pirate various courses on these subjects, as well as to gain access to the payment information provided by their customers.

While not much is known about Al1ne3737, what we do know is that they joined Twitter late in December 2019 and have been using the platform to post mirrors of various international website defaces ever since, though primarily over the course of the last week. Their release this morning is the first such leak posted to their online account. To confirm the legitimacy of the leaks, Rogue Media Labs attempted to make contact with the company via their built in web chat, but after waiting 15 minutes never received a reply back from representatives.

Alvo: hxxp://tdstecnologia.com.br/
Raw Leak: https://ghostbin.com/paste/wtefs
Login Page: hxxp://tdstecnologia.com.br/curso.php?id=40

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2019/01/wtefs-Ghostbin.pdf” title=”wtefs – Ghostbin”]

https://twitter.com/al1ne3737/status/1086534352165584897

Russia Aims To Create Backup To The World-Wide-Web, Create Its Own National Internet Infrastructure

Back in November 2016 I remember writing a story covering the Russian Federations decision to abandon all Microsoft products for Government use throughout the future. The decision was made on the heels of the now infamous FBI v Apple encryption case earlier that year, which set legal precedent allowing the US Government to compromise any and all electronic devices produced by US-based companies – mandating software backdoor’s to undermine encryption rights. At the time, Dmitry Perskov, a Kremlin spokesperson, described making the switch away from Microsoft as “a matter of National security.” Explaining how “it is believed that Microsoft products could be used to hide secret bugs or back-doors in their systems” that could be used to spy on its users. Considering that nearly all Government systems in Russia ran on Microsoft products at the time, this made swapping them out a top priority for Vladimir Putin and the Kremlin.

Russia was also not the first country to arrive at this conclusion. Dating back to 2014, following the release of leaked documents from former NSA contractor Edward Snowden, Microsoft products have been banned for Government use inside China just as well. Perhaps most importantly, at least for the purposes of this article, was Russia’s plan to go about replacing Microsoft products in the future by creating an entirely new system of computing based on Russian coding (software), hardware and product development. The goal was to essentially create an entirely new computer model sourced domestically, exclusively from Russian developers/programmers. This would ensure that no other country in the world would have access to their systems, or be able to replicate their design – creating truly unique systems specifically designed for the Russian Government.

I bring this up because earlier this week I came across a new bill being proposed in Russia, attempting to create an entirely new backup system to the global “World Wide Web.” In some ways, think of it much like creating a modern or 21st century version of Minitel, only exclusive to Russia.

Given the current state of both Cyber and Informational warfare being waged across the planet in 2018, Russian lawmakers fear that rival countries may one day soon attempt to cut off, limit or restrict Russia’s access to the World-Wide-Web. As a result, Russian lawmakers feel as though it is paramount to begin creating a back up or emergency plan of action should this ever occur.

With this in mind, as was reported by Russia Today on December 14th 2018, “Russian lawmakers have introduced legislation designed to reduce the country’s internet resources’ dependence on foreign infrastructure.” Explaining how “the main goal is to significantly decrease dependence of the Russian internet sector on foreign infrastructure by setting up national groundwork to keep Russia’s internet functional, even if servers abroad become unavailable for any reason.” Adding that, among other things, this will also entail “the creation of an entirely new system of national domain names.

We’re not creating our own internet. We’re just setting up a backup infrastructure. We’re duplicating it locally, so that our citizens would have access to the internet in case of any emergencyDuma deputy Andrey Lugovoy explained. To date the proposed initiative has been given full backing by Russia’s Ministry of Communications, though it remains unclear if/when the bill will eventually be passed into law. Moreover, according to Oleg Ivanov, deputy Minister of Communications, even if the bill was approved it would still “take several” years to build the necessary infrastructure to pull it off, and there is currently no “realistic time-frame” for how long this would take – merely indicating that this initiative is part of a much broader, long term vision for the country.

Lastly, the proposed bill calls for the entirety of Russia’s cyberspace to come under the centralized governance/command of Roscomnadzor – the countries top telecommunications watchdog. To make everything work, the legislation also proposes mandates on all Russian based Internet Service Providers (ISP’s), requiring them to set up equipment with the ability to detect and trace the source of any internet traffic as to better monitor and defend against cyber based attacks from abroad in the future.

Legislation Submitted to State Duma: http://sozd.duma.gov.ru/bill/608767-7

Full Text of Bill:

[pdf-embedder url=”https://roguemedia.co/wp-content/uploads/2018/12/138234916.pdf” title=”-138234916″]

Making The Switch To Encrypted Emails

This past February a US judge ordered Microsoft, an American based tech company, to honor the search warrants of American law enforcement agencies requiring the company to hand over any/all data, emails and the like which the company stores on servers located overseas. The ruling came in direct contradiction to a previous ruling from a Federal Appeals Court in August of 2016, which upheld a US Circuit court ruling from July 2016, prohibiting the US Government from seizing data stored on servers located outside of US borders.

The principle behind this case is very simple to understand, does the United States Government have the right to demand foreign businesses located outside of the United States hand over their records to the United States Government if that company happens to do business with a US citizen? In other words, are foreign nations forced to abide by US law and comply with all US based legal requests? Well, according to the most recent ruling, as of February 2017, at least as far as US courts are concerned, the answer is “yes.

What Other “Authority” Does The US Government Have?

Let’s use the world’s most popular email service provider as a quick example – Gmail. Quite literally, everything you do on your Gmail account is accessible by Google at any given moment in time. After-all, you are using their service. If the US Government ever wants to see your account or any of the information on it, then all they have to do is pull up the file of a generic document, insert your name on top of it, print it out and just like that they magically have a “subpoena” to obtain all of your information from Google.

Despite how simple of a process this is, it is all groundbreaking stuff too. Believe it or not, it was not until May 2016 that the US government even needed to get a warrant or legal document of any kind to search through all of your personal emails. Don’t believe me?

Read More – Email Privacy Act of 2016: https://www.congress.gov/bill/114th-congress/house-bill/699

For you international folk out there, the news isn’t much better. You see, the US Government has its own private court known as a FISC court which, historically speaking, blindly grants “99.96%” of all warrant request brought in front of it – but who’s counting, right?

With that out of the way, all of the information above only goes to show how easy it is for the US Governments to go about obtaining all your data “legally.” But as I think we are all aware by now, agencies like the NSA or CIA do not necessarily care about US law and have the very real authority to act outside of it – #PatriotAct. To be fair, this does not necessarily mean that someone working for the US Government is literally watching/reading every single email you write every minute of the day, but they theoretically could be if/whenever they wanted to.

To that very point, early in 2016 Google came out with a press release addressing how “state-sponsored hackers” had breached over 1 million Gmail accounts over the course of that year. This was also not an isolated incident and it’s not just Google which has been targeted by these types of breaches. Literally hundreds of millions of Yahoo and Hotmail accounts have also been exposed over the years.

Read More – 3 Billion Yahoo User Accounts Hacked, Including 500 Million Email Addresses: http://money.cnn.com/2017/10/03/technology/business/yahoo-breach-3-billion-accounts/index.html

So far I have only addressed how easy it is for the US Government and/or law enforcement agencies to access all of your personal accounts/information, this does not even account for all of the non-Government organizations or hackers out there or oppressive regimes located in countries all over the world. In fact, I am willing to bet that at least 95% of all hackers worldwide are non-Government affiliated. Moreover, Hillary Clinton, the DNC, CIA, John Brennan and John Podesta should all serve as evidence for just how easy it can be for hackers to compromise anyone’s email account if they really want to – even some of the most powerful people in society.

Quite frankly, there is a reason why politicians and members of the Armed Forces are told never to use their own personal or private email accounts, because none of these services are properly protected or encrypted! While members of the Government and Armed Forces use their own private versions of encrypted email services which are NOT open or available to the public sector, thankfully, there are a number of free and paid email encryption services out there open to the general public.

For Example:

Mailfence

Mailfence is a relatively new company globally, but one which I have already placed at the top of all encrypted email service providers. Mailfence operates their servers out of Belgium, a country internationally renown for having some of the strongest and most resolute privacy laws in the world. Unlike the United States, every surveillance request or request for information inside Belgium, including on Mailfence’s servers, must be legally brought in front of a Belgium judge and proven in court as legitimate. In this way Belgium protects user data and business confidentiality in a way that no other country in the world does.

Sign Up/Create an Account Here: https://mailfence.com

ProtonMail

This email service provider offers free end to end encryption and hosts its servers in Switzerland, outside of US jurisdiction – theoretically. When signing up, at no point in time are you asked for any personal information and you do not need to attach any other emails account or phone numbers in order to register. This service also utilizes 2-factor authentication to log in, preventing hacking attempts. ProtonMail has also partnered with humanitarian organizations around the world, such as Amnesty International, in order to help fight back against Government surveillance and cyber censorship in developing countries around the world.

On a lighter note, if you are a fan of the Television drama “Mr. Robot” this is Elliot’s email provider of choice on the show.

Sign Up/Create an Account Here: https://protonmail.com/

Tutanota

This is another free encrypted email service that has become quite popular in recent times. In fact, earlier in 2016 Tutanota officially surpassed 1 million accounts – becoming the world’s largest encrypted email service provider. In 2017, Tutanota then went on to surpass 2 million accounts, furthering the countries rock solid reputation as an industry leader.

What makes Tutanota unique is that the company makes their source code “open source,” meaning that security researches investigate for themselves the level of encryption they are receiving. For all you n00bs out there, making your source code public record and still not having it hacked proves just how good the code really is.

Sign Up/Create an Account Here: https://tutanota.com/