{"id":196020,"date":"2010-01-18T12:22:00","date_gmt":"2010-01-18T17:22:00","guid":{"rendered":"http:\/\/techdirt.com\/articles\/20100118\/0115587785.shtml"},"modified":"2010-01-18T12:22:00","modified_gmt":"2010-01-18T17:22:00","slug":"china-google-hack-shows-security-gaps-or-issues-in-online-surveillance-apps","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/196020","title":{"rendered":"China Google Hack Shows Security Gaps&#8230; Or Issues In Online Surveillance Apps?"},"content":{"rendered":"<p>Google&#8217;s decision to <a href=\"http:\/\/www.techdirt.com\/articles\/20100112\/2020157718.shtml\">change<\/a> how it deals with China was supposedly precipitated by a hack attack on its computer system that was apparently most likely instigated by the Chinese government.  While many are discussing how this shows the level of <a href=\"http:\/\/www.nytimes.com\/2010\/01\/18\/technology\/internet\/18defend.html?src=twt&#038;twt=nytimestech\" >computer-based espionage &#8212; corporate and national &#8212; going on these days<\/a>, a more interesting take comes from Julian Sanchez, who notes that the <i>real issue<\/i> isn&#8217;t so much about hacking into computers, but about <a href=\"http:\/\/www.cato-at-liberty.org\/2010\/01\/13\/surveillance-secruity-and-the-google-breach\/\" >the official &#8220;surveillance&#8221; apps that companies now use<\/a> to placate law enforcement.  That&#8217;s because what was hacked at Google was its <a href=\"http:\/\/www.macworld.co.uk\/digitallifestyle\/news\/index.cfm?newsid=28293\" >surveillance app<\/a> that it uses to help deal with law enforcement requests.  As Sanchez notes:<\/p>\n<blockquote><p><i><br \/>\nThe irony here is that, while we&#8217;re accustomed to talking about the tension between privacy and security&#8211;to the point where it sometimes seems like people think greater invasion of privacy ipso facto yields greater security&#8211;one of the most serious and least discussed problems with built-in surveillance is the security risk it creates.<br \/>\n<\/i><\/p><\/blockquote>\n<p>Indeed, we were just discussing how <a href=\"http:\/\/www.techdirt.com\/articles\/20100108\/0305177669.shtml\">more surveillance can make us less safe<\/a> by creating a bigger backlog, but Sanchez is pointing out that it&#8217;s even worse than that.  More surveillance can make us less safe because it can more easily expose data that should have been deleted.  Creating surveillance databases creates a huge opportunity for attack.  Remember those telco databases we were talking about that <a href=\"http:\/\/www.techdirt.com\/articles\/20091201\/1305527152.shtml\">make it easy<\/a> for law enforcement officials (hopefully with a warrant) to track your location by GPS?  You have to imagine those make a nice target for hacking as well&#8230;  And that&#8217;s true of any such surveillance database.  While they&#8217;re supposed to help keep us &#8220;safer,&#8221; they also put a ton of valuable info in a single place &#8212; which makes them attractive targets for those who wish to make us less safe.<\/p>\n<p><a href=\"http:\/\/techdirt.com\/articles\/20100118\/0115587785.shtml\">Permalink<\/a> | <a href=\"http:\/\/techdirt.com\/articles\/20100118\/0115587785.shtml#comments\">Comments<\/a> | <a href=\"http:\/\/techdirt.com\/article.php?sid=20100118\/0115587785&#038;op=sharethis\">Email This Story<\/a><br \/>\n <br clear=\"both\" style=\"clear: both;\"\/><br \/>\n<br clear=\"both\" style=\"clear: both;\"\/><br \/>\n<a href=\"http:\/\/ads.pheedo.com\/click.phdo?s=5b4359efcce2b360957ab12ac4734924&#038;p=1\"><img decoding=\"async\" alt=\"\" style=\"border: 0;\" border=\"0\" src=\"http:\/\/ads.pheedo.com\/img.phdo?s=5b4359efcce2b360957ab12ac4734924&#038;p=1\"\/><\/a><br \/>\n<img loading=\"lazy\" decoding=\"async\" alt=\"\" height=\"0\" width=\"0\" border=\"0\" style=\"display:none\" src=\"http:\/\/a.rfihub.com\/eus.gif?eui=2225\"\/><\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.techdirt.com\/~ff\/techdirt\/feed?a=ncFrWfI69MU:Ot-sc_h8XSw:D7DqB2pKExk\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/techdirt\/feed?i=ncFrWfI69MU:Ot-sc_h8XSw:D7DqB2pKExk\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.techdirt.com\/~ff\/techdirt\/feed?a=ncFrWfI69MU:Ot-sc_h8XSw:c-S6u7MTCTE\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/techdirt\/feed?d=c-S6u7MTCTE\" border=\"0\"><\/img><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/techdirt\/feed\/~4\/ncFrWfI69MU\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google&#8217;s decision to change how it deals with China was supposedly precipitated by a hack attack on its computer system that was apparently most likely instigated by the Chinese government. While many are discussing how this shows the level of computer-based espionage &#8212; corporate and national &#8212; going on these days, a more interesting take [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-196020","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/196020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=196020"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/196020\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=196020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=196020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=196020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}