The Unification Epicenter of True Lightworkers
How to shield all your electronic communications from the NSA
Tuesday, June 25, 2013 by: J. D. Heyes
(NaturalNews) In the wake of recent revelations that the National Security Agency (NSA) and other government snoops are monitoring the electronic communications of U.S. citizens, millions of us wanted to know what, if anything, we could do to protect our email, cell phone conversations, chat sessions from Big Brother in the future.
Now, granted, the technological capabilities of the NSA are massive. And, as was revealed in subsequent news reports following the initial revelations about the NSA, tech companies and Internet Service Providers are in cahoots with the government, so they're not going to protect you. Further, the Fourth Amendment appears to mean nothing to the Obama Aadministration.
What's a poor, hapless citizen to do? First off, take a deep breath and read on. There are things you can do.
'Pretty Good Privacy'
Per Slate:
Not every communication can be tracked and eavesdropped on by the government, however, and there are ways to reduce the chances of being snooped on. First, instead of browsing the Internet in a way that reveals your IP address, you can mask your identity by using an anonymizing tool like Tor (https://www.torproject.org) or by connecting to the Web using a Virtual Private Network (https://www.torproject.org). Additionally, you can avoid Google search by using an alternative like Ixquick (https://ixquick.com/eng/), which has solid privacy credentials and says it does not log any IP addresses or search terms or share information with third parties.
Want to send protected email? You can do that as well. If you happen to be using a commercial email provider like Google, Yahoo! or another service identified as having been co-opted by PRISM, the NSA's snoop program, you can certainly slow down the agency by sending and receiving emails encrypted with PGP (Pretty Good Privacy), which has been around for years, or a free alternative, GPG (http://www.gnupg.org/). Both of these products can be used to encrypt and decrypt email messages - unless, however, you have Trojan spyware installed on your machine.
"Novice computer users learning how to use PGP or GPG may find it a daunting prospect at first, but there are plenty of tutorials online for both Mac and Windows users that can help guide you through the process," says Slate
If you happen to be a journalist and you are working with confidential sources or an attorney seeking to protect attorney-client conversations - or if you just require security communications - learning how to use either of these protective programs will be a must in the near- and long-term.
Organizations or firms could go even further and stop using a third-party service and instead set up their own email server, "helping ensure no secret court orders can be filed to gain covert access to confidential files," Slate reports. Private documents can be stored online, if necessary, and kept shielded using Cloudfogger (http://www.cloudfogger.com/en/) in conjunction with Dropbox.
Instant messaging and phone or video chats can be better protected if you avoid using Microsoft and Google-based services such as Skype and Gchat and instead adopt more secure forms of communication. Those include Jitsi (https://jitsi.org/), which can be utilized for peer-to-peer calls video calls that are encrypted.
Set-up takes some time but it'll be worth it
For encrypted instant message chats you could try an "off the record" plugin like Pidgin (http://www.pidgin.im/) for Windows users and Adium (http://adium.im/) for Mac machines.
For instant messaging and online phone or video chats, you can avoid Microsoft and Google services like Skype and Gchat by adopting more secure alternatives. Jitsi can be used for peer-to-peer encrypted video calls, and for encrypted instant message chats you can try using an "off the record" plugin with Pidgin for Windows users or Adium for Mac.
"Like using PGP encryption, both Pidgin and Adium can take a little bit of work to set up - but there are tutorials to help ease the pain, like this (www.encrypteverything.ca) for setting up Adium and this (https://securityinabox.org/en/pidgin_securechat) tutorial for Pidgin," Slate notes.
Technology advances have made it nearly effortless for governments to spy on citizens. While this practice is common in other countries, the U.S. Constitution, under the Fourth Amendment, absolutely prohibits the kind of blanket surveillance being conducted by the NSA. That the agency received permission to do so from the FISA court - which conducts its business in secret - is not the same thing as having the authority to do so. If that were the case federal courts could grant any number of federal agencies permission to violate every single provision of the Constitution.
That said, it is highly unlikely those responsible for ordering the NSA to spy on American citizens are going to be reprimanded, so the best thing you can do in the meantime is protect your electronic communications as best as you can.
Sources for this article include:
Learn more: http://www.naturalnews.com/040935_NSA_Fourth_Amendment_email_encryp...
Tags:
Saturday, November 12, 2011 How To Erase Your Digital Footprint by Jeffrey A. Lambert via beforeitsnews
Think about all the things you’ve used your Internet for in the past 24 hours. You’ve probably checked your email, updated your Facebook status, paid some bills through online banking, read up on the latest news, and took the time before bed to video chat with a far-flung childhood friend. Even after logging out and turning off your computer, the information you’ve just accessed or created continues to wander the great plains of the World Wide Web. This information that we leave behind about ourselves on a daily basis is known as our digital footprint.
Like stepping in wet concrete, these trails we unwittingly leave behind can be tough to erase. With the rise of identity theft, corporate tracking, and the ability of “Big Brother” to access our private data, it is more important than ever for Internet users to be aware of how past and future data can be erased and controlled more effectively.
How Big is My Footprint? To truly understand just how big your digital footprint is, there are several tools available that can be easily accessed and added to your computer for constant monitoring and control. Google is one of the most commonly accused mediums for collecting our data, and rightfully so. That ad that just popped up on your GMail page for cookbooks does indeed have something to do with your search for a killer Spam recipe for last Sunday’s tailgate party.
On a daily basis Google pings your browser for information about browsing history, allowing the search giant to improve their search algorithms and target advertising. Interested in seeing just how often this is happening? Download the free software offering Google Alarm, created by F.A.T. Labs, which is available for both Firefox and Chrome browsers. This add-on will notify you each time you are sending data to Google. Just make sure you disable the sound option for this. I jumped out of my chair the first time the (very loud) alarm went off, and kept going off almost every time I visited a new site. Unless you have a serious love for air horns or are trying to induce a heart attack don’t forget to do this!
Another way to measure your digital footprint is to see how much advertising companies have been allowed to track your browsing habits. “But I never gave any companies permission to know about sites I visit” you insist. The sad reality is that simply visiting certain sites allows advertising companies to place what are known as “tracking cookies” on your computer. Cookies are small chunks of data created by web servers that are delivered through a web browser and stored on your computer. They allow websites that you often frequent to keep track of your online patterns and preferences, creating a personalized experience. Leading the fight to raise awareness and provide solutions to this issue is the Network Advertising Initiative, a coalition of cooperative of online marketing and analytics companies committed to “building consumer awareness and establishing responsible business and data management practices and standards.” According to the NAI, “Most of the advertising online today is provided by 3rd party ad networks. These networks use tools such as cookies to track your Web preferences and usage patterns in order to tailor advertising content to your interests. What you may not realize is that information gathered at one website may be used to direct ad content at another site.” To combat this, the NAI has created a service that scans your computer to identify those member companies that have placed an advertising cookie file on your computer. The results from running this simple diagnostic can be eye-opening about how much your internet habits are being monitored.
Another method of obtaining a simple estimate about your digital footprint is by using the Digital Footprint Calculator, provided as a service from the EMC Corporation. The software download, which is available for both Windows and Mac, measures user input about the frequency of emails, photo and video uploads, phone usage, web browsing, and where in the world you live. After submitting your estimates, the calculator will provide you with an actual file size of your presence on the Internet. The software also ironically provides an option of creating a ticker widget to share your results on a web page, thus expanding your footprint in the process. Looking for a quick way to determining digital shoe size? Write down every site on the Internet you have created a user account for. Sound impossible? For most of us, we have cast such a wide personal net across the web, that it is insurmountable to go back and accurately pinpoint where we’ve left information about ourselves. Attempting to complete this exercise may bring on the realization that caging the Internet beast that is your personal information is next to impossible, and for the most part, it is. Fortunately, there are organizations and free software offerings that can help you bring your data monster into submission.
Erasing Your Digital Footprint Now that you’ve had the chance to measure just how big your footprint is, what steps can be taken to try and erase it? Let’s start with cookies. A simple way to ensure safe browsing without a trail is to make sure you are cleaning out your cache of cookies on your computer. Accessing the preferences option in any browser and clicking the “delete cookies” option can easily do this. A word of warning though: those users who enjoy auto-login and personal customization and personalization of sites you frequent will be deleted.
If you would like a more thorough method of cleaning up cookies, as well as Internet history and other tracking tools, there are free options available. A popular software offering (and a MaximumPC favorite) for Windows users is CCleaner. CCleaner, which is available as a free download or pay version (if you want technical support included), cleans all Internet history, cookies, auto-complete forms, and index files from your computer. Supported browsers include IE, Firefox, Chrome, Opera and Safari. Another option to clean cookies on your computer, particularly flash cookies, is a freeware program called Flash Cookie Cleaner. Flash cookies are simply cookies created by Adobe Flash plug-ins on websites that perform the same snooping tasks as regular cookies. Flash Cookie Cleaner works to eliminate these files, but also contains options to save cookies to sites you trust and wish to keep information on. Another easy way to erase your digital footprint is to make sure you are deleting accounts to websites you no longer frequent. Sites can often employ difficult account cancellation practices, which can discourage users from going through the trouble. Smashing Magazine writer Cameron Chapman has compiled an excellent article on how to delete your account from popular websites. This can be one of the quickest ways to erase your personal data, making it unavailable to be used by one company or sold to another. Still have your Friendster, MySpace, or Bebo account active? That data is still available for others to see!
Erasing personal information that has already been made public on the web should be the next step in your clean-out process. Do a basic search of your name on sites such as Spoke, Intelius and WhitePages to pull up what the rest of the world sees about you. From there, it becomes a tedious (but worthwhile) process of filling out online forms and making phone calls with these services to limit or remove your personal information from company databases. For more information on public data companies to check and how to remove your information from them, check out this article from Gizmodo writer Kelly Hodgkins. If drastic measures are needed to erase your information, companies are ready and waiting to “wash out” your digital footprint: for a price. Reputation.com offers a suite of paid services to protect, promote, and defend their customers’ personal data online. Their tagline? “Scammers, stalkers and identity thieves prey on private data. Equally harmful are things we call negative content — a bad review of your business, a nasty comment on Facebook, an article about something from your past that’s simply irrelevant now — that could damage your personal life or your livelihood. We can help.” If an absolute face lift or dramatic reduction of your online information is needed, pay services such as this may be your quickest way to a smaller digital shoe size.
http://www.davidicke.com/headlines, Sunday, 13 November 2011 09:39
|
© 2026 Created by Besimi.
Powered by
Please check your browser settings or contact your system administrator.