Read

User menu

Search form

Learn to Safeguard Internet Privacy Like You're 007

Learn to Safeguard Internet Privacy Like You're 007
Wed, 10/24/2012 - by Conrad Jaeger

When a Manhattan court ruled last month that Twitter must hand over tweets from Occupy activist Malcolm Harris following a protest on Brooklyn Bridge, it set a precedent that on-line communications are no longer our own property and can easily be used against us by law enforcement.

Perhaps Malcolm and others should have taken some elementary precautions.

Obviously, you don’t have to sign up with Twitter using your real name or with an email address that links back to you. There are plenty of free email options out there from companies that won’t sell on your data. You can also muddy things further by conjuring up an entirely new persona for yourself with a fake identity generator.

If you do want to stand on a public landmark and tweet, you had best mask your smartphone first. Luckily, there are apps for both Android and Apple devices that divert all communications through a hidden network, masking both identity and location, and providing anonymous access to Twitter and Facebook as well as instant messaging and secure email.

If things turn nasty and local ISPs deny access, these apps still connect to social networks and websites blocked by the State even when law enforcement cannot.

But don’t stop there. When it comes to communicating with fellow activists, you might as well go all James Bond; and there are a lot of free spy tools on the Internet.

With PrivNote, you can send messages that self-destruct once read. Or you could hide a secret message inside something so fundamentally boring that no one will bother to look deeper.

At SpamMimic, you can enter a short message and have it regurgitated as mind-numbing spamtext that you send out to your friends. They just paste the spam back into a box on the site and out comes the message.

To be extra smart, send out your spam via a re-mailer such as AnonyMouse, where you can compose an email and have all the delivery codes stripped away and new ones added along the journey. When the email arrives at its destination, there is no way that it can traced back to you.

If you want to send a longer message, you will need to encrypt it and a PGP Key is the best way to do that. There are various ways of setting up a PGP Key for smartphones and other devices; some free, like iGolder.

Basically, you need to generate two keys – a public key which you give to anyone wanting to send you encrypted data and a private key that you keep to yourself. The sender uses your public key to encrypt the data and then sends it to you. When you receive the data, you unscramble it with your private key. Top mathematicians guarantee the system 100 percent secure; just don’t lose your key.

To really make things really difficult for even the most determined adversary, you can hide your encrypted message inside an innocuous-looking digital photo or music track. This is cryptography’s dark cousin, steganography from the Greek meaning secret writing. Think invisible ink.

These days you can hide almost any kind of digital file by embedding it inside another digital file, such as a .jpg, .bmp or mp3. You can use it for all manner of covert communication. WikiLeaks-type documents can be embedded inside a photo, short videos can be transmitted secretly inside a music file, and messages can be passed on by a digital ‘drop box’ held on a photo within a webpage.

Counter-technology isn’t very good and there is little to give the game away unless the file is unexpectedly large. Just looking at the image or trying to open it with a steganalysis program will not show that the image contains any hidden data.

But perhaps the simplest way to communicate secretly is to open a free email account and then give the address and log-in details to the other members of your group. Messages are then written but saved as drafts and never sent. The draft messages are then accessed by those with the password. This way the emails are never actually transmitted so cannot be intercepted. You can even use the account as a personal bulletin board with all members posting on different topics.

The case of Malcolm Harris shows us how we need to tighten security. There is no reason to play ball and allow our human rights to be infringed. We can easily slip from the grasp of those who would monitor and control us. We might even claim the liberty that the Internet originally promised.

But, if it seems that Internet freedom is at a low ebb right now, just wait until the Utah Data Center comes on-stream next year when absolutely everything you say or do on-line will be logged and analyzed and used to profile you the way they did in the movie "Minority Report."

Scary times ahead. You are going to need some serious security.

Conrad Jaeger is the author of "Deep Web Secrecy and Security" published by Deep Web Guides and available as an interactive e-book for $10.37 on Amazon.

Sign Up

Article Tabs

youth climate strike, climate protests, climate walkouts, strike for climate, Greta Thunberg, global youth protests

The global Youth Climate Strike will have its official coming out party this Friday, March 15, when tens of thousands of young people worldwide skip school to protest climate inaction.

In this week's special episode, we sit down with two women from Colombia to hear about the violence and oppression that they face, and the connection to US foreign policy and corporate malfeasance. Meanwhile, the Colombian president sets his sights on Venezuela

Brexit, Brexit failure, Irish border, Theresa May, UK borders, Leave campaign, second Brexit referendum

On Tuesday, U.K. Parliament rejected – by a whopping total of 149 votes – Prime Minister Theresa May's last-minute compromise plan with the E.U. on the proposed deal, possibly spelling the end of Brexit.

Amazon cloud storage, Rekognition, Amazon Web Services, facial recognition software, face collection, surveillance state, surveillance tools, FBI monitoring, dragnet

The potential abuse of this software for surveillance and data harvesting purposes is so troubling that some of Amazon’s shareholders have pleaded with the company to forgo selling its facial recognition technology to the government.

Timbro Authoritarian Populism Index, European parliamentary elections, European Parliament, Europe's rightward shift, right-wing parties, extreme right views, right-wing populism, populist parties

Right-wing authoritarian parties have grown at least 33% compared to 2018, with at least 26% of voters supporting them across the European Union, according to the latest findings.

billionaires, abolish billionaires, extreme wealth, wealth inequality, income inequality, tax the rich, wealth redistribution, wealth tax

America’s billionaires have suddenly realized they just may be facing an existential crisis: A good chunk of the American people, they now understand, would rather billionaires not exist.

youth climate strike, climate protests, climate walkouts, strike for climate, Greta Thunberg, global youth protests

The global Youth Climate Strike will have its official coming out party this Friday, March 15, when tens of thousands of young people worldwide skip school to protest climate inaction.

The top five countries most affected by threats were all found to be in south-east Asia. Malaysia was the most affected, followed by Brunei and Singapore. Photograph: Romeo Gacad/AFP/Getty Images

Scientists say that nearly a quarter of the animals they assessed globally were affected by threats across more than 90% of their distribution.

In this week's special episode, we sit down with two women from Colombia to hear about the violence and oppression that they face, and the connection to US foreign policy and corporate malfeasance. Meanwhile, the Colombian president sets his sights on Venezuela

Brexit, Brexit failure, Irish border, Theresa May, UK borders, Leave campaign, second Brexit referendum

On Tuesday, U.K. Parliament rejected – by a whopping total of 149 votes – Prime Minister Theresa May's last-minute compromise plan with the E.U. on the proposed deal, possibly spelling the end of Brexit.

young voters, lower voter age, voter access

Oregon may become the first state to lower the voting age to include youth in all local and statewide elections.

Posted 6 days 12 hours ago

In this week's special episode, we sit down with two women from Colombia to hear about the violence and oppression that they face, and the connection to US foreign policy and corporate malfeasance. Meanwhile, the Colombian president sets his sights on Venezuela

Posted 5 days 53 min ago
Photo illustration: Soohee Cho/The Intercept, Getty Images

The previously unreported Project Maven contract could be a boon for Anduril Industries, which wants to remake the defense contracting industry by incorporating the latest innovations of Silicon Valley into warfighting technology.

Posted 5 days 20 hours ago
Timbro Authoritarian Populism Index, European parliamentary elections, European Parliament, Europe's rightward shift, right-wing parties, extreme right views, right-wing populism, populist parties

Right-wing authoritarian parties have grown at least 33% compared to 2018, with at least 26% of voters supporting them across the European Union, according to the latest findings.

Posted 6 days 12 hours ago
Amazon cloud storage, Rekognition, Amazon Web Services, facial recognition software, face collection, surveillance state, surveillance tools, FBI monitoring, dragnet

The potential abuse of this software for surveillance and data harvesting purposes is so troubling that some of Amazon’s shareholders have pleaded with the company to forgo selling its facial recognition technology to the government.

Posted 5 days 20 hours ago
Brexit, Brexit failure, Irish border, Theresa May, UK borders, Leave campaign, second Brexit referendum

On Tuesday, U.K. Parliament rejected – by a whopping total of 149 votes – Prime Minister Theresa May's last-minute compromise plan with the E.U. on the proposed deal, possibly spelling the end of Brexit.

In this week's special episode, we sit down with two women from Colombia to hear about the violence and oppression that they face, and the connection to US foreign policy and corporate malfeasance. Meanwhile, the Colombian president sets his sights on Venezuela

youth climate strike, climate protests, climate walkouts, strike for climate, Greta Thunberg, global youth protests

The global Youth Climate Strike will have its official coming out party this Friday, March 15, when tens of thousands of young people worldwide skip school to protest climate inaction.

The top five countries most affected by threats were all found to be in south-east Asia. Malaysia was the most affected, followed by Brunei and Singapore. Photograph: Romeo Gacad/AFP/Getty Images

Scientists say that nearly a quarter of the animals they assessed globally were affected by threats across more than 90% of their distribution.

Facebook, Google, Amazon, Big Tech, breaking up monopolies, antitrust laws, Big Tech breakup, Elizabeth Warren, presidential candidate

The presidential candidate's new plan to break up the world’s biggest tech firms provides the rarest sign that someone seeking power wants to use that power to weaken Silicon Valley.