Read

Error message

Notice: Undefined index: base_url in include_once() (line 125 of /home3/occupyco/public_html/dev/sites/default/settings.php).

User menu

Search form

Learn to Safeguard Internet Privacy Like You're 007

Learn to Safeguard Internet Privacy Like You're 007
Wed, 10/24/2012 - by Conrad Jaeger

When a Manhattan court ruled last month that Twitter must hand over tweets from Occupy activist Malcolm Harris following a protest on Brooklyn Bridge, it set a precedent that on-line communications are no longer our own property and can easily be used against us by law enforcement.

Perhaps Malcolm and others should have taken some elementary precautions.

Obviously, you don’t have to sign up with Twitter using your real name or with an email address that links back to you. There are plenty of free email options out there from companies that won’t sell on your data. You can also muddy things further by conjuring up an entirely new persona for yourself with a fake identity generator.

If you do want to stand on a public landmark and tweet, you had best mask your smartphone first. Luckily, there are apps for both Android and Apple devices that divert all communications through a hidden network, masking both identity and location, and providing anonymous access to Twitter and Facebook as well as instant messaging and secure email.

If things turn nasty and local ISPs deny access, these apps still connect to social networks and websites blocked by the State even when law enforcement cannot.

But don’t stop there. When it comes to communicating with fellow activists, you might as well go all James Bond; and there are a lot of free spy tools on the Internet.

With PrivNote, you can send messages that self-destruct once read. Or you could hide a secret message inside something so fundamentally boring that no one will bother to look deeper.

At SpamMimic, you can enter a short message and have it regurgitated as mind-numbing spamtext that you send out to your friends. They just paste the spam back into a box on the site and out comes the message.

To be extra smart, send out your spam via a re-mailer such as AnonyMouse, where you can compose an email and have all the delivery codes stripped away and new ones added along the journey. When the email arrives at its destination, there is no way that it can traced back to you.

If you want to send a longer message, you will need to encrypt it and a PGP Key is the best way to do that. There are various ways of setting up a PGP Key for smartphones and other devices; some free, like iGolder.

Basically, you need to generate two keys – a public key which you give to anyone wanting to send you encrypted data and a private key that you keep to yourself. The sender uses your public key to encrypt the data and then sends it to you. When you receive the data, you unscramble it with your private key. Top mathematicians guarantee the system 100 percent secure; just don’t lose your key.

To really make things really difficult for even the most determined adversary, you can hide your encrypted message inside an innocuous-looking digital photo or music track. This is cryptography’s dark cousin, steganography from the Greek meaning secret writing. Think invisible ink.

These days you can hide almost any kind of digital file by embedding it inside another digital file, such as a .jpg, .bmp or mp3. You can use it for all manner of covert communication. WikiLeaks-type documents can be embedded inside a photo, short videos can be transmitted secretly inside a music file, and messages can be passed on by a digital ‘drop box’ held on a photo within a webpage.

Counter-technology isn’t very good and there is little to give the game away unless the file is unexpectedly large. Just looking at the image or trying to open it with a steganalysis program will not show that the image contains any hidden data.

But perhaps the simplest way to communicate secretly is to open a free email account and then give the address and log-in details to the other members of your group. Messages are then written but saved as drafts and never sent. The draft messages are then accessed by those with the password. This way the emails are never actually transmitted so cannot be intercepted. You can even use the account as a personal bulletin board with all members posting on different topics.

The case of Malcolm Harris shows us how we need to tighten security. There is no reason to play ball and allow our human rights to be infringed. We can easily slip from the grasp of those who would monitor and control us. We might even claim the liberty that the Internet originally promised.

But, if it seems that Internet freedom is at a low ebb right now, just wait until the Utah Data Center comes on-stream next year when absolutely everything you say or do on-line will be logged and analyzed and used to profile you the way they did in the movie "Minority Report."

Scary times ahead. You are going to need some serious security.

Conrad Jaeger is the author of "Deep Web Secrecy and Security" published by Deep Web Guides and available as an interactive e-book for $10.37 on Amazon.

3 WAYS TO SHOW YOUR SUPPORT

ONE-TIME DONATION

Just use the simple form below to make a single direct donation.

DONATE NOW

MONTHLY DONATION

Be a sustaining sponsor. Give a reacurring monthly donation at any level.

GET SOME MERCH!

Now you can wear your support too! From T-Shirts to tote bags.

SHOP TODAY

Sign Up

Article Tabs

prison reform, incarceration rates, private prisons, for-profit prisons, white supremacy, enslavement, climate justice, racial justice, Green New Deal

The year 2020 has caused many white people to realize we live in a racist system. The Green New Deal is about systemic change for all, and deconstructing racism must be front and central in this agenda.

coronavirus pandemic, Donald Trump, Boris Johnson, Jair Bolsonaro, COVID-19 deaths, downplaying coronavirus

By infecting three of the world’s most right-wing leaders, the coronavirus underscored not only the incompetence and irresponsibility of their governments – but the truth that their brand of populism doesn't keep people safe.

COVID-19, corporate bailouts, corporate welfare, corporate destruction

Corporations are not "too big to fail" and, when they commit crimes, they are not "too big to jail." As David Whyte writes in his new book, "Ecocide: Kill the Corporation Before It Kills Us," the moment is now to rein in out-of-control corporate power.

The world has lost an incredible thinker and doer. I have lost an amazing friend. A void exists where before it was filled with David's optimism, humour and joy.

Kevin Zeese speaks at a rally for Chelsea Manning. By Ellen Davidson.

Kevin fought to bring truth every day. We must not lose this struggle.

prison reform, incarceration rates, private prisons, for-profit prisons, white supremacy, enslavement, climate justice, racial justice, Green New Deal

The year 2020 has caused many white people to realize we live in a racist system. The Green New Deal is about systemic change for all, and deconstructing racism must be front and central in this agenda.

coronavirus pandemic, Donald Trump, Boris Johnson, Jair Bolsonaro, COVID-19 deaths, downplaying coronavirus

By infecting three of the world’s most right-wing leaders, the coronavirus underscored not only the incompetence and irresponsibility of their governments – but the truth that their brand of populism doesn't keep people safe.

COVID-19, corporate bailouts, corporate welfare, corporate destruction

Corporations are not "too big to fail" and, when they commit crimes, they are not "too big to jail." As David Whyte writes in his new book, "Ecocide: Kill the Corporation Before It Kills Us," the moment is now to rein in out-of-control corporate power.

The world has lost an incredible thinker and doer. I have lost an amazing friend. A void exists where before it was filled with David's optimism, humour and joy.

Kevin Zeese speaks at a rally for Chelsea Manning. By Ellen Davidson.

Kevin fought to bring truth every day. We must not lose this struggle.