How to shield all your electronic communications from the NSA

Tuesday, June 25, 2013 by: J. D. Heyes

(NaturalNews) In the wake of recent revelations that the National Security Agency (NSA) and other government snoops are monitoring the electronic communications of U.S. citizens, millions of us wanted to know what, if anything, we could do to protect our email, cell phone conversations, chat sessions from Big Brother in the future.

Now, granted, the technological capabilities of the NSA are massive. And, as was revealed in subsequent news reports following the initial revelations about the NSA, tech companies and Internet Service Providers are in cahoots with the government, so they're not going to protect you. Further, the Fourth Amendment appears to mean nothing to the Obama Aadministration.

What's a poor, hapless citizen to do? First off, take a deep breath and read on. There are things you can do.

'Pretty Good Privacy'

Per Slate:

Not every communication can be tracked and eavesdropped on by the government, however, and there are ways to reduce the chances of being snooped on. First, instead of browsing the Internet in a way that reveals your IP address, you can mask your identity by using an anonymizing tool like Tor (https://www.torproject.org) or by connecting to the Web using a Virtual Private Network (https://www.torproject.org). Additionally, you can avoid Google search by using an alternative like Ixquick (https://ixquick.com/eng/), which has solid privacy credentials and says it does not log any IP addresses or search terms or share information with third parties.

Want to send protected email? You can do that as well. If you happen to be using a commercial emailprovider like Google, Yahoo! or another service identified as having been co-opted by PRISM, the NSA's snoop program, you can certainly slow down the agency by sending and receiving emails encrypted with PGP (Pretty Good Privacy), which has been around for years, or a free alternative, GPG (http://www.gnupg.org/). Both of these products can be used to encrypt and decrypt email messages - unless, however, you have Trojan spyware installed on your machine.

"Novice computer users learning how to use PGP or GPG may find it a daunting prospect at first, but there are plenty of tutorials online for both Mac and Windows users that can help guide you through the process," says Slate

If you happen to be a journalist and you are working with confidential sources or an attorney seeking to protect attorney-client conversations - or if you just require security communications - learning how touse either of these protective programs will be a must in the near- and long-term.

Organizations or firms could go even further and stop using a third-party service and instead set up their own email server, "helping ensure no secret court orders can be filed to gain covert access to confidential files," Slate reports. Private documents can be stored online, if necessary, and kept shielded using Cloudfogger (http://www.cloudfogger.com/en/) in conjunction with Dropbox.

Instant messaging and phone or video chats can be better protected if you avoid using Microsoft and Google-based services such as Skype and Gchat and instead adopt more secure forms of communication. Those include Jitsi (https://jitsi.org/), which can be utilized for peer-to-peer calls video calls that are encrypted.

Set-up takes some time but it'll be worth it

For encrypted instant message chats you could try an "off the record" plugin like Pidgin (http://www.pidgin.im/) for Windows users and Adium (http://adium.im/) for Mac machines.

For instant messaging and online phone or video chats, you can avoid Microsoft and Google services like Skype and Gchat by adopting more secure alternatives. Jitsi can be used for peer-to-peer encrypted video calls, and for encrypted instant message chats you can try using an "off the record" plugin with Pidgin for Windows users or Adium for Mac.

"Like using PGP encryption, both Pidgin and Adium can take a little bit of work to set up - but there are tutorials to help ease the pain, like this (www.encrypteverything.ca) for setting up Adium and this (https://securityinabox.org/en/pidgin_securechat) tutorial for Pidgin," Slate notes.

Technology advances have made it nearly effortless for governments to spy on citizens. While this practice is common in other countries, the U.S. Constitution, under the Fourth Amendment, absolutely prohibits the kind of blanket surveillance being conducted by the NSA. That the agency receivedpermission to do so from the FISA court - which conducts its business in secret - is not the same thing as having the authority to do so. If that were the case federal courts could grant any number of federal agencies permission to violate every single provision of the Constitution.

That said, it is highly unlikely those responsible for ordering the NSA to spy on American citizens are going to be reprimanded, so the best thing you can do in the meantime is protect your electronic communications as best as you can.

Sources for this article include:

http://www.slate.com

https://www.torproject.org

https://ixquick.com/eng/



Learn more: http://www.naturalnews.com/040935_NSA_Fourth_Amendment_email_encryp...

Views: 398

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

Comment by Wolf on June 29, 2013 at 10:50am
I have to say that I totally believe in the tin foil rescue. If "they" say it is hog wash then it must work. We live in bizarro land; land of backwards.
Comment by truth on June 27, 2013 at 11:08pm

I use tin foil

Comment by Central Scrutinizer on June 27, 2013 at 11:17am

 photo thI-Agree.gif

Comment by TheLasersShadow on June 27, 2013 at 11:10am

It's much easier than all that just use a VPN for 100% of your traffic. Then for the added security end to end use those programs listed. vpnbook.com is free.

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

tjdavis posted a video

When Havoc Struck - Bel Air Fire 1961 - 1978 TV Series Glenn Ford

Here is the complete "Bel Air Fire" episode of the TV series "When Havoc Struck" from 1978. Includes intense footage and dramatic interviews from survivors o...
5 hours ago
Doc Vega posted a blog post

Living a Lie

Living a Lie She is like a pearl in the sands of the shorePerhaps a fantasy that could become moreA…See More
15 hours ago
Less Prone favorited tjdavis's photo
yesterday
Less Prone commented on tjdavis's photo
Thumbnail

Killbillys

"Could it be that B.G. is an AI controlled drone who seeks to advance the goals of the advanced AI…"
yesterday
cheeki kea commented on Sandy's photo
Thumbnail

FB_IMG_1737188817344

"It's as if it jumped the bush it had no appetite for and raced off to what it wanted to fuel…"
Monday
tjdavis posted photos
Monday
Burbia commented on Burbia's group The Comment Section is Closed
"Every comment here looks like they are all on the same page"
Monday
tjdavis posted blog posts
Monday
Less Prone commented on Parrhesia's photo
Thumbnail

Black Rock

"Black Rock, the sixth rock from the sun, is Saturn (Satan). Saturn has one day of the week,…"
Sunday
Less Prone favorited Doc Vega's photo
Sunday
Less Prone commented on tjdavis's video
Thumbnail

DARPA Avatar Project - A Sentient World Simulation

"Is artificial intelligence and its power consumption a driving force behind the need for more…"
Sunday
Doc Vega posted a photo
Sunday
Doc Vega posted blog posts
Saturday
Sandy posted a photo
Saturday
Sandy commented on tjdavis's video
Saturday
Sandy favorited tjdavis's video
Saturday
Sandy commented on tjdavis's video
Saturday
tjdavis's 2 blog posts were featured
Friday
Doc Vega's 4 blog posts were featured
Friday
FREEDOMROX's blog post was featured
Friday

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted