How to shield all your electronic communications from the NSA

Tuesday, June 25, 2013 by: J. D. Heyes

(NaturalNews) In the wake of recent revelations that the National Security Agency (NSA) and other government snoops are monitoring the electronic communications of U.S. citizens, millions of us wanted to know what, if anything, we could do to protect our email, cell phone conversations, chat sessions from Big Brother in the future.

Now, granted, the technological capabilities of the NSA are massive. And, as was revealed in subsequent news reports following the initial revelations about the NSA, tech companies and Internet Service Providers are in cahoots with the government, so they're not going to protect you. Further, the Fourth Amendment appears to mean nothing to the Obama Aadministration.

What's a poor, hapless citizen to do? First off, take a deep breath and read on. There are things you can do.

'Pretty Good Privacy'

Per Slate:

Not every communication can be tracked and eavesdropped on by the government, however, and there are ways to reduce the chances of being snooped on. First, instead of browsing the Internet in a way that reveals your IP address, you can mask your identity by using an anonymizing tool like Tor (https://www.torproject.org) or by connecting to the Web using a Virtual Private Network (https://www.torproject.org). Additionally, you can avoid Google search by using an alternative like Ixquick (https://ixquick.com/eng/), which has solid privacy credentials and says it does not log any IP addresses or search terms or share information with third parties.

Want to send protected email? You can do that as well. If you happen to be using a commercial emailprovider like Google, Yahoo! or another service identified as having been co-opted by PRISM, the NSA's snoop program, you can certainly slow down the agency by sending and receiving emails encrypted with PGP (Pretty Good Privacy), which has been around for years, or a free alternative, GPG (http://www.gnupg.org/). Both of these products can be used to encrypt and decrypt email messages - unless, however, you have Trojan spyware installed on your machine.

"Novice computer users learning how to use PGP or GPG may find it a daunting prospect at first, but there are plenty of tutorials online for both Mac and Windows users that can help guide you through the process," says Slate

If you happen to be a journalist and you are working with confidential sources or an attorney seeking to protect attorney-client conversations - or if you just require security communications - learning how touse either of these protective programs will be a must in the near- and long-term.

Organizations or firms could go even further and stop using a third-party service and instead set up their own email server, "helping ensure no secret court orders can be filed to gain covert access to confidential files," Slate reports. Private documents can be stored online, if necessary, and kept shielded using Cloudfogger (http://www.cloudfogger.com/en/) in conjunction with Dropbox.

Instant messaging and phone or video chats can be better protected if you avoid using Microsoft and Google-based services such as Skype and Gchat and instead adopt more secure forms of communication. Those include Jitsi (https://jitsi.org/), which can be utilized for peer-to-peer calls video calls that are encrypted.

Set-up takes some time but it'll be worth it

For encrypted instant message chats you could try an "off the record" plugin like Pidgin (http://www.pidgin.im/) for Windows users and Adium (http://adium.im/) for Mac machines.

For instant messaging and online phone or video chats, you can avoid Microsoft and Google services like Skype and Gchat by adopting more secure alternatives. Jitsi can be used for peer-to-peer encrypted video calls, and for encrypted instant message chats you can try using an "off the record" plugin with Pidgin for Windows users or Adium for Mac.

"Like using PGP encryption, both Pidgin and Adium can take a little bit of work to set up - but there are tutorials to help ease the pain, like this (www.encrypteverything.ca) for setting up Adium and this (https://securityinabox.org/en/pidgin_securechat) tutorial for Pidgin," Slate notes.

Technology advances have made it nearly effortless for governments to spy on citizens. While this practice is common in other countries, the U.S. Constitution, under the Fourth Amendment, absolutely prohibits the kind of blanket surveillance being conducted by the NSA. That the agency receivedpermission to do so from the FISA court - which conducts its business in secret - is not the same thing as having the authority to do so. If that were the case federal courts could grant any number of federal agencies permission to violate every single provision of the Constitution.

That said, it is highly unlikely those responsible for ordering the NSA to spy on American citizens are going to be reprimanded, so the best thing you can do in the meantime is protect your electronic communications as best as you can.

Sources for this article include:

http://www.slate.com

https://www.torproject.org

https://ixquick.com/eng/



Learn more: http://www.naturalnews.com/040935_NSA_Fourth_Amendment_email_encryp...

Views: 403

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

Comment by Wolf on June 29, 2013 at 10:50am
I have to say that I totally believe in the tin foil rescue. If "they" say it is hog wash then it must work. We live in bizarro land; land of backwards.
Comment by truth on June 27, 2013 at 11:08pm

I use tin foil

Comment by Central Scrutinizer on June 27, 2013 at 11:17am

 photo thI-Agree.gif

Comment by TheLasersShadow on June 27, 2013 at 11:10am

It's much easier than all that just use a VPN for 100% of your traffic. Then for the added security end to end use those programs listed. vpnbook.com is free.

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Burbia commented on Burbia's video
Thumbnail

CHARLIE KIRK WAS CNP! JOSH REEVES 9-11-25

"I don't follow as much with Josh Reeves than I use to. He seems to be a documentary producing…"
11 hours ago
Burbia posted a video

CHARLIE KIRK WAS CNP! JOSH REEVES 9-11-25

DONATE-paypal-dayglow76@yahoo.comCashapp-reevesradioVenmo-Josh-Reeves-61FILMS AND AUDIOBOOKS DOWNLOAD STORE-https://store.payloadz.com/results/242828-josh-re...
11 hours ago
Doc Vega posted blog posts
14 hours ago
tjdavis posted a video

CHARLIE KIRK VIDEO THAT KEEPS GETTING REMOVED OFF OF SEVERAL PLATFORMS

I had not planned to share this publicly, but I believe Advar, who spoke with Charlie Kirk while I was very ill, would have wanted me to. After my interview ...
yesterday
pohonemas33 team commented on Chris of the family Masters's photo
Thumbnail

Gold-Coast-Message

"untuk bermain slot, kamu cukup kunjungi situs kacang99 pasti langsung gacor"
yesterday
Doc Vega posted blog posts
yesterday
Burbia posted a blog post

Former President Trump?

When was this article written? It is attributed to Victor Davis Hanson. He is a Fellow at Hoover…See More
Tuesday
Doc Vega posted a blog post

Don’t Go Hunting For Bigfoot

It is October 19, 2019 at 5:46 AM. This will be the last time any visual evidence of Mark is seen…See More
Monday
tjdavis posted a video

Most Corrupt Series: Elizabeth Warren | Forgotten History

Elizabeth Warren has built her reputation as a "reformer", but her political career has also drawn sharp criticism. Questions have been raised about her fina...
Sep 19
Doc Vega commented on Doc Vega's blog post Ashrams and Moonies Perfect Case for Mind Control
"less prone, Thanks for your support Buddy! "
Sep 18
Doc Vega posted a photo

main-thumb-ti-6724328-100-cnsgqkrgkrhyeyyerazynmuwoplecnbx

When will they put Trump on Mt. Rushmore?
Sep 18
Doc Vega's 4 blog posts were featured
Sep 18
Burbia's blog post was featured

Charlie Kirk Assassination

September 10th 2025 in Utah Turning Point USA CEO has been assassinated. Coincidentally,  answering…See More
Sep 18
Charles Magus's blog post was featured

FURTHER PROOF OF WALK-INS! Prisoners of the Dulce Base by Sherry Shriner

There is a real connection between the Cabal and what is happening at this Undergroung…See More
Sep 18
Less Prone favorited Doc Vega's blog post Ashrams and Moonies Perfect Case for Mind Control
Sep 18
Less Prone commented on tjdavis's blog post Sentient World Simulation
"Cannot open the link"
Sep 18
Tina Sullivan is now a member of 12160 Social Network
Sep 18
Doc Vega posted blog posts
Sep 17
Sandy posted a video

We’re cooked

We’re cooked
Sep 17
Sandy posted a photo
Sep 17

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted