The world’s largest Internet companies and thousands of average Internet users are trying to hide their private information from government snooping.
The goal is to set up technological barriers to the National Security Agency’s sweeping surveillance programs. Rather than waiting for Congress to rein in the agency, many people want to take privacy into their own hands.
But the truth is, efforts to improve online encryption and security can’t totally thwart the NSA.
Joseph Lorenzo Hall, the chief technologist for the Center for Democracy and Technology, said the idea of becoming “NSA-proof” is “just silly.”
“If they want it, they can get it,” he said of the NSA’s expert spies. The agency can hack or bypass many security measures if it is determined enough, Hall said.
And it doesn’t matter how heavily encrypted an email is in transit if the NSA just forces the email provider to turn the message over. While the NSA collects some of its data by surreptitiously tapping into communications, much of the surveillance is done through court orders to Internet and phone companies.
Christopher Soghoian, the principal technologist for the American Civil Liberties Union, said tech companies such as Google could hamstring the NSA if they just stopped collecting so much information about their users. If a company doesn’t have information on a person, there’s nothing to turn over to the government.
Of course, that’s not likely to happen any time soon. Google and other companies depend on collecting detailed data about their users for targeted advertising.
“At the end of the day, you can only expect so much from an advertising company,” Soghoian said. “Until we start paying for these services, they’re only going to go so far.”
While it’s impossible to totally escape the NSA, making the agency’s job harder could be enough to avoid the dragnet surveillance. Government analysts aren’t likely to invest the time and resources to crack encrypted messages unless they really think there could be a connection to terrorism.
Hall recommended that people use a browser plug-in such as HTTPS Everywhere, which ensures that users have a secure online connection when possible. He added that it’s particularly difficult for the NSA to track the online activity of people using Tor, a software that reroutes traffic to hide its source.
Major tech companies were shocked to learn last year that the NSA was tapping into the connections between their overseas data centers and siphoning off data. In the wake of the leaks, Google, Microsoft, Yahoo, and Facebook have all taken steps to encrypt their data-center connections.
Google has always tried to encrypt its emails in transit, but that’s only effective if both the sender and the receiver support encryption. Recently, Google has started to publish statistics about which providers support encryption in a bid to pressure more companies to step up their security.
Emails that are encrypted in transit aren’t as secure as ones that have total end-to-end encryption. Even Google can’t read the contents of emails that are totally encrypted. But end-to-end encryption tools such as PGP are complicated and inconvenient to use. Google will soon launch its own end-to-end encryption extension to try to make the process simpler, but the option will still be realistic only for the most dedicated privacy advocates.
According to Soghoian, the No. 1 thing people can do to better protect their privacy is to refrain from using phones for any sensitive conversations.
“Telephone communications are just not secure,” he said, adding that people are better off relying on Internet voice services such as Skype and FaceTime. He also warned that stored communications like email are risky because the NSA can go back and get messages even years after they’re sent.
Hall recommended that people leave their phones at home or wrap them in aluminum foil when they’re not using them. He acknowledged that before the Snowden leaks, recommending that people wrap their phones in foil would have sounded crazy.
“The NSA is giving the tinfoil-hat brigade a run for its money today,” he said.
What We're Following See More »
In a unanimous decision, "the Supreme Court on Tuesday said it violates insider-trading laws for a corporate officer to make a “gift” of insider information to a relative, a decision that makes it easier for those who police Wall Street to bring prosecutions."
House Speaker Paul Ryan has decreed that House members "won’t receive their committee assignments until January — after they cast a public vote on the House floor for speaker. "The move has sparked behind-the-scenes grumbling from a handful of Ryan critics, who say the delay allows him and the Speaker-aligned Steering Committee to dole out committee assignments based on political loyalty rather than merit or expertise." The roll call to elect the speaker is set for Jan. 3, the first vote of the new Congress.
House Majority Leader Kevin McCarthy told reporters on Monday that the government funding bill will be released on Tuesday. The bill is the last piece of legislation Congress needs to pass before leaving for the year and is expected to fund the government through the spring. The exact time date the bill would fund the government through is unclear, though it is expected to be in April or May.
As has been rumored for a week, Donald Trump will nominate Ben Carson, his former rival, to lead the Department of Housing and Urban Development. In a statement, Trump said, "We have talked at length about my urban renewal agenda and our message of economic revival, very much including our inner cities. Ben shares my optimism about the future of our country and is part of ensuring that this is a Presidency representing all Americans. He is a tough competitor and never gives up."