How to shield all your electronic communications from the NSA

Tuesday, June 25, 2013 by: J. D. Heyes

(NaturalNews) In the wake of recent revelations that the National Security Agency (NSA) and other government snoops are monitoring the electronic communications of U.S. citizens, millions of us wanted to know what, if anything, we could do to protect our email, cell phone conversations, chat sessions from Big Brother in the future.

Now, granted, the technological capabilities of the NSA are massive. And, as was revealed in subsequent news reports following the initial revelations about the NSA, tech companies and Internet Service Providers are in cahoots with the government, so they're not going to protect you. Further, the Fourth Amendment appears to mean nothing to the Obama Aadministration.

What's a poor, hapless citizen to do? First off, take a deep breath and read on. There are things you can do.

'Pretty Good Privacy'

Per Slate:

Not every communication can be tracked and eavesdropped on by the government, however, and there are ways to reduce the chances of being snooped on. First, instead of browsing the Internet in a way that reveals your IP address, you can mask your identity by using an anonymizing tool like Tor (https://www.torproject.org) or by connecting to the Web using a Virtual Private Network (https://www.torproject.org). Additionally, you can avoid Google search by using an alternative like Ixquick (https://ixquick.com/eng/), which has solid privacy credentials and says it does not log any IP addresses or search terms or share information with third parties.

Want to send protected email? You can do that as well. If you happen to be using a commercial emailprovider like Google, Yahoo! or another service identified as having been co-opted by PRISM, the NSA's snoop program, you can certainly slow down the agency by sending and receiving emails encrypted with PGP (Pretty Good Privacy), which has been around for years, or a free alternative, GPG (http://www.gnupg.org/). Both of these products can be used to encrypt and decrypt email messages - unless, however, you have Trojan spyware installed on your machine.

"Novice computer users learning how to use PGP or GPG may find it a daunting prospect at first, but there are plenty of tutorials online for both Mac and Windows users that can help guide you through the process," says Slate

If you happen to be a journalist and you are working with confidential sources or an attorney seeking to protect attorney-client conversations - or if you just require security communications - learning how touse either of these protective programs will be a must in the near- and long-term.

Organizations or firms could go even further and stop using a third-party service and instead set up their own email server, "helping ensure no secret court orders can be filed to gain covert access to confidential files," Slate reports. Private documents can be stored online, if necessary, and kept shielded using Cloudfogger (http://www.cloudfogger.com/en/) in conjunction with Dropbox.

Instant messaging and phone or video chats can be better protected if you avoid using Microsoft and Google-based services such as Skype and Gchat and instead adopt more secure forms of communication. Those include Jitsi (https://jitsi.org/), which can be utilized for peer-to-peer calls video calls that are encrypted.

Set-up takes some time but it'll be worth it

For encrypted instant message chats you could try an "off the record" plugin like Pidgin (http://www.pidgin.im/) for Windows users and Adium (http://adium.im/) for Mac machines.

For instant messaging and online phone or video chats, you can avoid Microsoft and Google services like Skype and Gchat by adopting more secure alternatives. Jitsi can be used for peer-to-peer encrypted video calls, and for encrypted instant message chats you can try using an "off the record" plugin with Pidgin for Windows users or Adium for Mac.

"Like using PGP encryption, both Pidgin and Adium can take a little bit of work to set up - but there are tutorials to help ease the pain, like this (www.encrypteverything.ca) for setting up Adium and this (https://securityinabox.org/en/pidgin_securechat) tutorial for Pidgin," Slate notes.

Technology advances have made it nearly effortless for governments to spy on citizens. While this practice is common in other countries, the U.S. Constitution, under the Fourth Amendment, absolutely prohibits the kind of blanket surveillance being conducted by the NSA. That the agency receivedpermission to do so from the FISA court - which conducts its business in secret - is not the same thing as having the authority to do so. If that were the case federal courts could grant any number of federal agencies permission to violate every single provision of the Constitution.

That said, it is highly unlikely those responsible for ordering the NSA to spy on American citizens are going to be reprimanded, so the best thing you can do in the meantime is protect your electronic communications as best as you can.

Sources for this article include:

http://www.slate.com

https://www.torproject.org

https://ixquick.com/eng/



Learn more: http://www.naturalnews.com/040935_NSA_Fourth_Amendment_email_encryp...

Views: 405

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

Comment by Wolf on June 29, 2013 at 10:50am
I have to say that I totally believe in the tin foil rescue. If "they" say it is hog wash then it must work. We live in bizarro land; land of backwards.
Comment by truth on June 27, 2013 at 11:08pm

I use tin foil

Comment by Central Scrutinizer on June 27, 2013 at 11:17am

 photo thI-Agree.gif

Comment by TheLasersShadow on June 27, 2013 at 11:10am

It's much easier than all that just use a VPN for 100% of your traffic. Then for the added security end to end use those programs listed. vpnbook.com is free.

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega posted blog posts
yesterday
tjdavis posted a photo
Tuesday
james will posted blog posts
Tuesday
Less Prone favorited Sandy's video
Tuesday
Doc Vega's 5 blog posts were featured
Tuesday
tjdavis's 4 blog posts were featured
Tuesday
Doc Vega posted a blog post

What was the Significance of the F-94 C and What role in History?

 It’s July 19, 1952 over White House forbidden airspace and Captain William Patterson observes…See More
Sunday
tjdavis posted a video

FLUORIDEGATE: An American Tragedy. a film by Dr. David Kennedy

FLUORIDEGATE: An American Tragedy, is a feature documentary that reveals the tragedy of how government, industry and trade associations protect and promote a...
Sunday
Doc Vega posted a blog post

Rendezvous With The Unknown

Rendezvous With the Unknown Chapter I It was about 9:00 am when I received a text on my phone from…See More
Saturday
cheeki kea replied to cheeki kea's discussion Tartaria
"ah ha - a Tartarian cuisine component lurks inside good old Tartar Sauce. Who would have thought.…"
Saturday
tjdavis posted a blog post
Dec 19
Doc Vega posted a blog post

Shadows in the Wind

If you think that life is but a game you can winYou’re just a shadow in the windConveniently…See More
Dec 19
Doc Vega posted a blog post
Dec 18
tjdavis posted a photo
Dec 17
james will is now a member of 12160 Social Network
Dec 17
Burbia replied to cheeki kea's discussion Tartaria
Dec 17
Burbia posted a video

Mossad: we create a pretend world, we are a global production company... the world is our stage

60 Minutes interviews alleged Mossad agent"we create a pretend world, we are a global production company......the world is our stage."_______________________...
Dec 17
Doc Vega posted a blog post

The Alvin II Encounter: Was There A Living Dinosaur Involved?

The year is 1965 in the Caribbean islands at a 5-thousand-foot depth in the dark Atlantic waters.…See More
Dec 16
Doc Vega posted blog posts
Dec 15
rlionhearted_3 posted photos
Dec 15

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted