By Carl Weiss
Like him or loathe him, Edward Snowden let the cat out of the bag when he revealed that the NSA was using digital surveillance including phone and internet monitoring of millions of Americans. While some people label him a traitor, others including Rep. Justin Amash (R-Mich.) call him a whistleblower. The Michigan Republican himself admitted that were it not for Snowden’s revelations, Congress as well as the public was in the dark as to the breadth and scope of the NSA’s nefarious activities.
|English: Congressman Justin Amash (Photo credit: Wikipedia)|
“Without his doing what he did, members of Congress would not have really known about [those
programs],” Amash said. “Members of Congress were not really aware on the whole about what these programs were being used for and the extent to which they were being used. Members of the intelligence committee were told, but rank-and-file members really didn’t have the information.” http://rt.com/usa/amash-snowden-whistleblower-congress-068/
While this revelation comes as something of a surprise to the public at large, what is even more shocking is the fact that the NSA isn’t the only government agency known to be digging up dirt on Americans. A recent newsfeed has revealed that a DEA surveillance unit known as the Special Operations Division has been passing information gleaned from its own wiretaps, informants and metadata to the FBI and Homeland Security, among others. Like the NSA, the DEA has been cutting corners by illegally sharing information that is has nothing to do with potential terrorist threats.
In a recent article by Reuters entitled, “SecretiveDEA Surveillance Unit Makes NSA Look Like Happy
Hour,” investigative Journalists John Shiffman and Kristina Cooke discovered that the DEA blatantly instructed other agencies to cover up where they received their information.
One federal agent from a different agency who worked with the Special Operations Division told Reuters, "You'd be told only, ‘Be at a certain truck stop at a certain time and look for a certain vehicle.' And so we'd alert the state police to find an excuse to stop that vehicle, and then have a drug dog search it."
The question that every American should be asking is not “What other agencies are busy eroding our freedom?” What they really should be asking is, “Who is watching the watchers.” It certainly isn’t Congress or the White House. Just as important if not more so should be the proviso, “If the government isn’t going to protect my privacy, what can I do about it?”
This is a question that has a number of possible solutions. In the first place, don’t make it so darned easy for every peeping G-Man to glean your personal information. Below are several measures that every citizen can employ with ease.
1. Open a Private Session in Chrome or Firefox – If you are logged into Google literally every keystroke is
monitored and stored by Google. Want to give Google the shake? Simply click on the Customize and Control button at the far right on Chrome that looks like three diminutive orange bars stacked one atop the other. The third option from the top reads, “New incognito window.” By clicking on this, or by hitting Control+Shift+N, Chrome will pop up a new tab, along with the following:
You've gone incognito. Pages you view in this window won't appear in your browser history or search history, and they won't leave other traces, like cookies, on your computer after you close all open incognito windows. Any files you download or bookmarks you create will be preserved, however.
Going incognito doesn't affect the behavior of other people, servers, or software. Be wary of:
Going incognito doesn't affect the behavior of other people, servers, or software. Be wary of:
- Websites that collect or share information about you
- Internet service providers or employers that track the pages you visit
- Malicious software that tracks your keystrokes in exchange for free smileys
- Surveillance by secret agents
- People standing behind you
Learn more about incognito browsing.
Because Google Chrome does not control how extensions handle your personal data, all extensions have been disabled for incognito windows. You can reenable them individually in the extensions manager.
|Google Chrome (Photo credit: thms.nl)|
2. On the same Customize and Control button a little further down is an option that is labeled “History.” Hitting this option brings up all your latest web browsing along with a button that reads, “Clear Browsing Data.” By hitting this button, you will also clear your download history, delete cookies along with other plug-in data and empty the cache. You should do this on at least a weekly if not daily basis if you want to erase your online footprints and flush out any cookie-based adware. Cookies by and of themselves are not malicious by nature. They are merely text files that can be used to store and share information.
In a search of webopedia.com, a blog entitled, “Do Cookies Compromise Security?,” states that,
do not act maliciously on computer systems. They are merely text files that can be deleted at any time - they are not nor are they programs. cannot be used to spread and they cannot access your hard drive. This does not mean that cookies are not relevant to a user's privacy and anonymity on the Internet. cannot read your hard drive to find out information about you; however, any personal information that you give to a Web site, including credit card information, will most likely be stored in a cookie unless you have turned off the cookie feature in your browser. In only this way are cookies a threat to privacy. The will only contain information that you freely provide to a Web site.
3. Antimalware Programs – No matter the platform or operating system all computers, including Smartphones are vulnerable to viruses and malware. While malware is designed for a number of purposes,
|ad-aware_07 (Photo credit: b1ue5ky)|
including identity theft, corporate espionage, spamming, creating unwanted popup ads or other malicious designs, the best way to stop cyber thieves from robbing you blind is to stop them before they walk through the door. This is what antimalware programs are all about. While there are a number of highly touted antimalware creators out there, all of them share one vital trait: They are all designed to block malicious software from entering your system in the first place. They also need to be updatable since malware continually evolves. If your antimalware package has expired and you have neither renewed nor updated it in more than a month, then you are leaving the door wide open to malware. Worst of all is the fact that there a number of ways that your system can be breached, including the following:
How Malware Gets On Your Computer
Malware, spyware, and other junk software makes it onto your computer for a number of reasons:
· You installed something you really shouldn’t have, from an untrustworthy source. Often these include screensavers, toolbars, or torrents that you didn’t scan for viruses.
· You didn’t pay attention when installing a “reputable” application that bundles “optional” crapware.
· You’ve already managed to get yourself infected, and the malware installs even more malware.
· You aren’t using a quality Anti-Virus or Anti-Spyware application.
· You’ve using Apps on your Smartphone or Tablet that’s are not protected with antivirus/malware software and you’re computer is being back door hacked through shared files.
· You’re letting your kids run amuck on your computer system by not teaching them proper computer safe usage and what to avoid?
4. Encryption – While encryption software that is able to withstand NSA snooping is readily available, hardly anyone uses it. Moreover, it’s nothing new. Even as far back as 1995, the government knew that it was possible for the average citizen to add encryption software to any computer system.
“The ability of just about everybody to encrypt their messages is rapidly outrunning our ability to decode them,” a U.S. intelligence official in 1995. By the end of the Clinton administration, the government conceded that the Internet had made it impossible to control the spread of strong cryptographic software. But more than a decade later, the cypherpunks seem to have lost the war.
Better still, the same encryption algorithms that can keep prying government agencies at bay would certainly prove deterrent enough to thwart cyberthieves. While they might be able to hack into your system, if they didn’t possess the decryption key al they would come away with was a bunch of nonsense. With everyone clamoring for privacy, why hasn’t encryption come bundled into every computer, tablet and Smartphone on the planet?
One of the reasons that encryption systems have not received widespread use is due to the fact that anyone you wished to email or text would also need the decryption key in order to read your message. Other wildly popular email and messaging systems would also be affected.
Take Gmail, for example. “If you wanted to prevent government snooping, you’d have to prevent Google’s servers from having a copy of the text of your messages,” Halderman says. “But that would make it much harder for Google to provide features like search over your messages.” Filtering spam also becomes difficult. And end-to-end encryption would also make it difficult for Google to make money on the service, since it couldn’t use the content of messages to target ads.
A similar point applies to Facebook. The company doesn’t just transmit information from one user to
|Image via CrunchBase|
another. It automatically resizes users’ photos and allows them to “tag” themselves and their friends. Facebook filters the avalanche of posts generated by your friends to display the ones you are most likely to find the most interesting. And it indexes the information users post to make it searchable. http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/14/nsa-proof-encryption-exists-why-doesnt-anyone-use-it/
5. Use better usernames and passwords. This might seem like a small item but many usernames and passwords are easy to guess. Especially if you have hacking software to help you crack the code. Make your user name longer and unique. Also make sure your passwords are at least 10 characters long and include upper and lower case letters, at least one number and at least one special character. This type of password is many times more difficult to crack than the 8 digit all letter ones that most people use.
The bottom line when it comes to security, the American public needs to decide which is more important, privacy or convenience. Because in this wired world of ours, you can’t have it both ways.
Carl Weiss is president of W Squared Media Group, a company that specializes in digital marketing. You can hear Carl every Tuesday at 4 pm on Working the Web to Win.