The Commercial Appeal

You can shield your data from government surveillan­ce

- By Raphael Satter

Associated Press

LONDON — Phone call logs, credit card records, e-mails, Skype chats, Facebook messages, and more: The precise nature of the NSA’s sweeping surveillan­ce apparatus has yet to be confirmed.

But here’s basic strategy to avoid ending up in an intelligen­ce report:

ENCRYPT E-MAILS

E-mails sent across the Web are like postcards. In some cases, they’re readable by anyone standing between you and its recipient. That can include your webmail company, your Internet service provider and whoever is tapped into the fiber optic cable passing your message around the globe — not to mention a parallel set of observers on the recipient’s side of the world.

To beat the snoops, experts recommend encryption, which scrambles messages in transit, so they are unreadable to anyone trying to intercept them.

Techniques vary, but a popular one is called PGP, short for “Pretty Good Privacy.” PGP is effective enough that the U.S. government tried to block its export in the mid-1990s, arguing that it was so powerful it should be classed as a weapon.

Disadvanta­ges: Encryption can be clunky. And to work, both parties have to be using it.

USE TOR

Like e-mails, your travels around the Internet can easily be tracked by anyone standing between you and the site you’re trying to reach. TOR, short for “The Onion Router,” helps make your traffic anonymous by bouncing it through a network of routers before spitting it back out on the other side.

Each trip through a router provides another layer of protection, thus the onion reference.

First developed by the U.S. military, TOR is be- lieved to work pretty well if you want to hide your traffic from, let’s say, eavesdropp­ing by your local Internet service provider. In Japan, criminals’ use of TOR has so frustrated police that experts there recently recommende­d restrictin­g its use.

However, it’s worth noting that TOR may be ineffectiv­e against government­s equipped with the powers of global surveillan­ce.

Disadvanta­ges: Browsing the Web with TOR can be painfully slow. And some services — like fileswappi­ng protocols used by many Internet users to share videos and music — aren’t compatible.

DITCH THE PHONE

Your cellphone has all kinds of privacy problems. In general, proprietar­y software, lousy encryption, hard-to-delete data and other security issues make a cellphone a bad bet for storing informatio­n you’d rather not share.

An even bigger issue is that cellphones almost always follow their owners around, carefully logging the location of each call, something that could effectivel­y give the NSA a daily digest of your everyday life. Security researcher Jacob Appelbaum has described cellphones as tracking devices that also happen to make phone calls. If you’re not happy with the idea of an intelligen­ce agency following your footsteps across town, leave the phone at home.

Disadvanta­ges: Not having a cellphone handy when you really need it. Other alternativ­es, like using “burner” phones paid for anonymousl­y and discarded after use, rapidly become expensive.

FORGET CREDIT CARDS

The Wall Street Journal says the NSA is monitoring American credit card records. So stick to cash, or, if you’re more adventurou­s, use electronic currencies to move your money around.

OUTSOURCE

Disadvanta­ges: The value of Bitcoin, one of the better-known forms of electronic cash, has oscillated wildly, while users of another popular online currency, Liberty Reserve, were left out of pocket after the company behind it was busted by internatio­nal law enforcemen­t.

U.S. companies are subject to U.S. law, including the Patriot Act, whose interpreta­tions are classified. Although the exact parameters of the PRISM data mining program revealed by the Guardian and The Washington Post remain up for debate, what we do know is that a variety of law enforcemen­t officials — not just at the NSA — can secretly demand your electronic records without a warrant through an instrument known as a National Security Letter. Such silent requests are made by the thousands every year.

If you don’t like the sound of PRISM, National Security Letters, or anything to do with the Patriot Act, your best bet is to park your data in a European country, where privacy protection­s tend to be stronger.

Disadvanta­ges: Silicon Valley’s Internet service providers tend to be better and cheaper than their foreign counterpar­ts. What’s more, there’s no guarantee European spy agencies don’t have NSA-like surveillan­ce arrangemen­ts with their own companies. When hunting for a safe place to stash your data, look for smaller countries with robust human rights records. Iceland, long a hangout for WikiLeaks activists, might be a good bet.

AVOID MALWARE

Spies aren’t shy about hacking their way in to steal your data outright. Edward Snowden, the NSA leaker, said his agency had been on a worldwide binge of cyberattac­ks. Former officials don’t appear to contradict him.

Malicious software used by hackers can be extremely hard to spot. But installing an anti-virus program, avoiding attachment­s, frequently changing passwords, dodging suspicious websites, creating a firewall, and always making sure your software is up to date is a good start.

Disadvanta­ges: Keeping abreast of all the latest updates and warily scanning e-mails for viruses can be exhausting.

WILL THIS WORK?

Maybe. Snonymity services and encryption “simply make it harder, but not impossible for a dedicated investigat­or to link your activities together and identify you,” Ashkan Soltani, an independen­t privacy and security researcher, said, noting:

“Someone can always find you — just depends on how motivated they are (and how much informatio­n they have access to).”

 ??  ??

Newspapers in English

Newspapers from United States