How to shield all your electronic communications from the NSA

Tuesday, June 25, 2013 by: J. D. Heyes

(NaturalNews) In the wake of recent revelations that the National Security Agency (NSA) and other government snoops are monitoring the electronic communications of U.S. citizens, millions of us wanted to know what, if anything, we could do to protect our email, cell phone conversations, chat sessions from Big Brother in the future.

Now, granted, the technological capabilities of the NSA are massive. And, as was revealed in subsequent news reports following the initial revelations about the NSA, tech companies and Internet Service Providers are in cahoots with the government, so they're not going to protect you. Further, the Fourth Amendment appears to mean nothing to the Obama Aadministration.

What's a poor, hapless citizen to do? First off, take a deep breath and read on. There are things you can do.

'Pretty Good Privacy'

Per Slate:

Not every communication can be tracked and eavesdropped on by the government, however, and there are ways to reduce the chances of being snooped on. First, instead of browsing the Internet in a way that reveals your IP address, you can mask your identity by using an anonymizing tool like Tor (https://www.torproject.org) or by connecting to the Web using a Virtual Private Network (https://www.torproject.org). Additionally, you can avoid Google search by using an alternative like Ixquick (https://ixquick.com/eng/), which has solid privacy credentials and says it does not log any IP addresses or search terms or share information with third parties.

Want to send protected email? You can do that as well. If you happen to be using a commercial emailprovider like Google, Yahoo! or another service identified as having been co-opted by PRISM, the NSA's snoop program, you can certainly slow down the agency by sending and receiving emails encrypted with PGP (Pretty Good Privacy), which has been around for years, or a free alternative, GPG (http://www.gnupg.org/). Both of these products can be used to encrypt and decrypt email messages - unless, however, you have Trojan spyware installed on your machine.

"Novice computer users learning how to use PGP or GPG may find it a daunting prospect at first, but there are plenty of tutorials online for both Mac and Windows users that can help guide you through the process," says Slate

If you happen to be a journalist and you are working with confidential sources or an attorney seeking to protect attorney-client conversations - or if you just require security communications - learning how touse either of these protective programs will be a must in the near- and long-term.

Organizations or firms could go even further and stop using a third-party service and instead set up their own email server, "helping ensure no secret court orders can be filed to gain covert access to confidential files," Slate reports. Private documents can be stored online, if necessary, and kept shielded using Cloudfogger (http://www.cloudfogger.com/en/) in conjunction with Dropbox.

Instant messaging and phone or video chats can be better protected if you avoid using Microsoft and Google-based services such as Skype and Gchat and instead adopt more secure forms of communication. Those include Jitsi (https://jitsi.org/), which can be utilized for peer-to-peer calls video calls that are encrypted.

Set-up takes some time but it'll be worth it

For encrypted instant message chats you could try an "off the record" plugin like Pidgin (http://www.pidgin.im/) for Windows users and Adium (http://adium.im/) for Mac machines.

For instant messaging and online phone or video chats, you can avoid Microsoft and Google services like Skype and Gchat by adopting more secure alternatives. Jitsi can be used for peer-to-peer encrypted video calls, and for encrypted instant message chats you can try using an "off the record" plugin with Pidgin for Windows users or Adium for Mac.

"Like using PGP encryption, both Pidgin and Adium can take a little bit of work to set up - but there are tutorials to help ease the pain, like this (www.encrypteverything.ca) for setting up Adium and this (https://securityinabox.org/en/pidgin_securechat) tutorial for Pidgin," Slate notes.

Technology advances have made it nearly effortless for governments to spy on citizens. While this practice is common in other countries, the U.S. Constitution, under the Fourth Amendment, absolutely prohibits the kind of blanket surveillance being conducted by the NSA. That the agency receivedpermission to do so from the FISA court - which conducts its business in secret - is not the same thing as having the authority to do so. If that were the case federal courts could grant any number of federal agencies permission to violate every single provision of the Constitution.

That said, it is highly unlikely those responsible for ordering the NSA to spy on American citizens are going to be reprimanded, so the best thing you can do in the meantime is protect your electronic communications as best as you can.

Sources for this article include:

http://www.slate.com

https://www.torproject.org

https://ixquick.com/eng/



Learn more: http://www.naturalnews.com/040935_NSA_Fourth_Amendment_email_encryp...

Views: 248

Tags: 4th, amendment, nsa

Comment by TheLasersShadow on June 27, 2013 at 11:10am

It's much easier than all that just use a VPN for 100% of your traffic. Then for the added security end to end use those programs listed. vpnbook.com is free.

Comment by HwΩΩd♪ on June 27, 2013 at 11:17am

 photo thI-Agree.gif

Comment by truth on June 27, 2013 at 11:08pm

I use tin foil

Comment by Wolf on June 29, 2013 at 10:50am
I have to say that I totally believe in the tin foil rescue. If "they" say it is hog wash then it must work. We live in bizarro land; land of backwards.

Comment

You need to be a member of 12160 to add comments!

Join 12160

Please remember this website is supported by your donations...

12160 NEWS new management/admin info

Putin to Western elites: Play-time is over / The builders of the New World Order have failed

Outrage - Israeli Cartoonist Compares Netanyahu to 9/11 Hijackers - Plane Piloted By NUTTY in to Tower

Why We’re Poorer: Inflation And Deflation Are Now Globalized

Saudi Arabia's "Oil-Weapon" Hits Europe - Iran

China's shadow banking sector growing rapidly, third largest in world: FSB

VIDEO: Inside The Shanghai International Gold Exchange Vaults

German Bank Hits Savers with Negative Interest Rate

Elderly couple fined $80K, raided by Marathon County SWAT because of pallets in their yard

LEAKED VIDEO: Cop Pulls Out His Penis and Begins Masturbating on High School Campus

Maryland Teen Tased By Police 5 Times While In Hospital Dies of ‘Natural Causes’

GOV CLEARS GOV OF WRONG DOING - Ferguson shooting probe of possible grand jury leak wasn't exactly in-depth

Massive Non-Citizen Voting Uncovered in Maryland

50,000 Missing Georgia Voter-Registration Applications? Nothing to See Here

90 Pounds of Cocaine Found on Cargo Ship Owned by Senate Majority Leader Mitch McConnell’s Father-in-Law

Milton Hall being shot at 46 times by police in the US

Report an Issue

Forum

Ten Most Wanted

Started by mystery in Current News/Events. Last reply by Ra 1 hour ago. 4 Replies

© 2014   Created by truth.

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2014 - all rights reserved. unless otherwise noted
var _gaq = _gaq || []; _gaq.push(['_setAccount', 'UA-48719234-1']); _gaq.push(['_trackPageview']); (function() { var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.google-analytics.com/ga.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s); })();