PDA

View Full Version : Jim Marrs : HOW TO PROTECT YOURSELF FROM THE NSA! // Post PRISM: Encrypted communications boom after NSA leaks



Cidersomerset
24th June 2013, 21:47
HOW TO PROTECT YOURSELF FROM THE NSA!

TX2gwZ6kh9M


Published on 11 Jun 2013


How to protect yourself from Prism, and other wiretaps
http://jimmarrs.com/
If you want to stay out of the ireful, omnipresent eye of the US and other
governments, Prism, and the extensive wiretaps that undoubtedly exist throughout
the world's internet and telephony networks, here are a few tips. Stop using social
networks. If it turns out that the US government has direct access to Facebook,
Microsoft, and Google's servers, you really should stop using their services. You can
try using another social network that's outside Prism's catchment area, but really
you're just delaying the inevitable. Surf using HTTPS. If you use Chrome or Firefox,
you should install the EFF's HTTPS Everywhere add-on. HTTPS is an encrypted form
of HTTP, the protocol that your browser uses to fetch web pages from remote
servers. HTTPS should prevent the NSA from intercepting your communications —
but, obviously, if the NSA/FBI already has access to the remote server you're
communicating with, HTTPS won't do you much good. Create an alternate identity,
then surf using a proxy/VPN. One of the best ways to prevent the government from
tracking you is to assume an alternate identity for all your communications — or at
least all of your digital communications — and then use a proxy or VPN to obscure
your physical location. Encrypt your phone calls, or use a burner phone. If you want
to make phone calls that can't be tracked back to you, our sister site PC Magazine
has compiled a big list of encrypted and burner phone services. Bear in mind that
some of these services might be nullified by a NSA backdoor, and voice analysis
could be used to link your calls back to your identity.

Ultimately, as you've probably surmised, it's almost impossible to keep your
identity and actions hidden from your government. The only real solution is to get
your government to stop snooping on you in the first place, but the chances of that
happening are close to nil. Really, we just have to pray that the government
doesn't use its powers for evil — and that it doesn't mess up and allow hackers into
its massive databases.

----------------------------------------------------------------------------------------------

Post PRISM: Encrypted communications boom after NSA leaks

JJY3EXVdyiM

Published on 24 Jun 2013


As governments use all powers at their disposal to pry into the lives of ordinary citizens
worldwide, people are trying to protect themselves - seeking out services that shield
their personal information. This has led to a veritable boom of digital encryption. RT's
Marina Portnaya has the details.

ghostrider
24th June 2013, 23:24
the only protection from the NSA is to leave the planet or destroy all satelites ... the beast is out of the cage ...

Referee
25th June 2013, 03:20
This is an utter fantasy they are years and years ahead and do not allow back doors except for themselves. Full on assault on social media is the only way!

Bill Ryan
25th June 2013, 04:18
-------

Here's the full source article (well worth reading):

http://extremetech.com/extreme/157777-how-nsas-prism-affects-you-and-how-to-protect-yourself-from-being-spied-on

Unless you have been living under a rock, you will have heard the news that the US government is apparently spying on almost every digital bit that passes through the nation’s optical fiber highways or is stored in data centers inside its borders. As we have discussed at some length, though, it isn’t entirely clear just how much of the data leaked by ex-CIA analyst Edward Snowden, the Guardian, or the Washington Post is true. With the newspapers refusing to release the full 41-slide Prism presentation, and companies such as Google swearing blind that the US government doesn’t have direct access to its servers, the situation is certainly a lot more complex than “the government has full, unfettered access to the servers and data centers of the USA’s largest internet companies.”

Where there’s smoke, though, there’s fire. While we can’t be certain of the extent of the US government’s spying on domestic and international citizens, it would be hopelessly naive to believe that no snooping occurs at all. For at least a decade, the telecoms and cryptography communities have presumed that the US’s internet and telephony backbones are being wiretapped by the US government. For many experts, Snowden’s leak of the Prism program did not come as a surprise. In fact, for some of the most cynical experts, the Prism leak actually came as a bit of a relief — it could’ve been a lot worse, you see. Either way, we’re faced with an unpleasant truth: the US government is engaged in large-scale data logging and mining, and whether you’re a citizen of the US or an international user who uses a US-based service, you would be wise to put a few protections in place to protect your privacy.

http://www.extremetech.com/wp-content/uploads/2013/06/PRISM-Collection-Details-640x353.jpg (http://www.extremetech.com/wp-content/uploads/2013/06/PRISM-Collection-Details.jpg)

How does Prism affect me?

According to Snowden’s leak, the Prism program has been operational for the last six years. Again, while we can’t be sure of the exact extent of the program without seeing the unreleased slides, it would appear that Prism gives the US government access to just about any data you might have residing on servers based in US data centers. This might sound scary, but ask yourself this: Has anything happened in the past six years that has made you think “damn, I feel so oppressed by the US government’s data collection measures”?

As far as the NSA and FBI are concerned, Prism, the Verizon wiretap (http://www.extremetech.com/extreme/157624-how-the-us-government-fbi-and-nsa-is-spying-on-almost-every-american), and probably hundreds of other sources of data, all serve just one purpose: Bolstering the security of the United States of America. The US intelligence community doesn’t actually care if you’re searching for porn, or how to grow your own weed; but it does care if you start searching for bomb recipes, and then posting photos of My First Nail Bomb on Facebook.

It’s also important to remember the difference between data logging and data mining. Yes, there’s a possibility that the US government is logging a lot of your data, but in the vast majority of cases that’s it — your data is logged, and then after a certain amount of time it’s deleted. If it turns out that you’re a terrorist, or some other threat to national security, all of your logged data suddenly becomes very valuable indeed — all of those innocuous phone calls and cryptic status updates could be used to track down you and your co-conspirators. It’s no good if the US government only starts logging data after a terrorist commits an atrocity.

A case for privacy

With that said, there are still lots of people that really detest the idea of Uncle Sam constantly looking over your shoulder with a dictaphone and video camera. Whenever any government (this doesn’t just happen in the US!) gets caught with its hand in the privacy jar, we’re always given two platitudes: If you haven’t done anything wrong, you have nothing to hide; and, Trust us, we’re the government, we have your best interests at heart.

The nothing-to-hide argument is, at best, a pathetically naive defense that owes most of its efficacy to our fear of extremism. Basically, the government is saying that only criminals want to hide data about themselves. Just by paraphrasing the nothing-to-hide argument, you begin to see the stupidity of this argument. We all have things we want to hide, from our loved ones, from our friends, from our communities, and from our government. If you went up to Barack Obama, or some other senior figure, and asked to see his personal email or credit card bill, what do you think their response would be? Without turning this into a conversation about privacy, which is a very complex topic indeed, suffice it to say that the nothing-to-hide argument is underpinned by a very, very narrow understanding of privacy. Think about this: What happens if a hacker breaks into the government’s database?

http://www.extremetech.com/wp-content/uploads/2013/06/boundless-heatmap-large-001-640x297.jpg (http://www.extremetech.com/wp-content/uploads/2013/06/boundless-heatmap-large-001.jpg)

Another secret program, Boundless Informant, tracks massive amounts of data gathered by US intelligence services. This heatmap shows it gathering over 3 billion pieces of data from the US in just one month.

How to protect yourself from Prism, and other wiretaps

If you want to stay out of the ireful, omnipresent eye of the US and other governments, Prism, and the extensive wiretaps that undoubtedly exist throughout the world’s internet and telephony networks, here are a few tips.


Stop using social networks. If it turns out that the US government has direct access to Facebook, Microsoft, and Google’s servers, you really should stop using their services. You can try using another social network that’s outside Prism’s catchment area, but really you’re just delaying the inevitable.
Surf using HTTPS. If you use Chrome or Firefox, you should install the EFF’s HTTPS Everywhere add-on (https://www.eff.org/https-everywhere). HTTPS is an encrypted form of HTTP, the protocol that your browser uses to fetch web pages from remote servers. HTTPS should prevent the NSA from intercepting your communications — but, obviously, if the NSA/FBI already has access to the remote server you’re communicating with, HTTPS won’t do you much good.
Create an alternate identity, then surf using a proxy/VPN. One of the best ways to prevent the government from tracking you is to assume an alternate identity for all your communications — or at least all of your digital communications — and then use a proxy or VPN to obscure your physical location (http://www.extremetech.com/computing/93106-escaping-the-firewall-with-an-ssh-tunnel-socks-proxy-and-putty).
Encrypt your phone calls, or use a burner phone. If you want to make phone calls that can’t be tracked back to you, our sister site PC Magazine has compiled a big list of encrypted and burner phone services (http://www.pcmag.com/article2/0,2817,2420131,00.asp). Bear in mind that some of these services might be nullified by a NSA backdoor, and voice analysis could be used to link your calls back to your identity.

Ultimately, as you’ve probably surmised, it’s almost impossible to keep your identity and actions hidden from your government. The only real solution is to get your government to stop snooping on you in the first place, but the chances of that happening are close to nil. Really, we just have to pray that the government doesn’t use its powers for evil — and that it doesn’t mess up and allow hackers into its massive databases.

GoodETxSG
25th June 2013, 07:56
;) Amen, Amen and Amen... to all posts... Great info. First Step is to educate yourself and know what you are up against. It is an incredible system to go up against. This video should get anyone up to speed quickly... I would make it a required viewing of your family etc before allowing them to begin to set out the ole digital foot print when you buy them the cool toys of today and kick them out the door to school...

aVSluJbVSDI

Maia Gabrial
25th June 2013, 16:29
IMO the best way to protect yourself is to put the govt, NSA, FBI, etc., on report. Let as many people know what they're doing.We have a system that is faster and better than any of the medias. It's called word of mouth. Stop backing off and hiding! Use every legal way possible against them. Eventually, people will begin to see the whole picture.
We're not the ones that need to back off. Without our funding and our approval, they'll be gone in no time. These agencies and it's mother corporation, US Inc. are completely in the wrong, and it's time to break them back down to where they're supposed to be! Look at ourselves as the adults facing bratty kids who need a big time spanking. To hell with a time out. They need a whupping!

Bill Ryan
25th June 2013, 22:34
:-------

Here's some more detailed and valuable information:

http://projectavalon.net/NSA_Black_Paper_Sovereign_Man.pdf

http://projectavalon.net/NSA_Black_Paper_Sovereign_Man.pdf

RunningDeer
25th June 2013, 23:10
:-------

Here's some more detailed and valuable information:

http://projectavalon.net/NSA_Black_Paper_Sovereign_Man.pdf

http://projectavalon.net/NSA_Black_Paper_Sovereign_Man.pdf

Hi Bill,


I'm not sure if it's my adobe software (need upgrade) or your file. Here’s a screen shot: 931 KB file. I tired to two browsers. Foxfire download to desktop, and Safari to open to another page. In both cases these messages pop up:

Foxfire - "There was an error opening this document. The file is damaged and could not be repaired."

Safari - "The file is damaged and could not be repaired. A9RQjKiQe.pdf"



http://i1262.photobucket.com/albums/ii610/WhiteCrowBlackDeer/NSA_zpsd0573980.png

EYES WIDE OPEN
26th June 2013, 09:35
I also cannot download it and get the repair message.

TargeT
26th June 2013, 13:35
All networks are set up the same, they function off similar topologies.

Lets use AT&T for example:
First you have your outside connection coming in somewhere (referred to as the Dmark) that connection is tied into the main equipment for the site which then distributes the connection out further, it's a hierarchical design.

So basically as you flow up the hierarchy traffic gets consolidated on fewer and fewer links and equipment until it's basically all aggregated into a very small (physically) area.

This is where the Nexus centers reside, all the traffic from the INTERNET gets routed through these nexus centers where one of two things likely happens, the data is probably just filtered for key words, however it may be routed to sites and stored for later access; I don't know for sure, I just know they exsist (via AT&T whistle blower testimony and actually visiting a nexus location in alaska, it was a "room" that no one had a key to with huge amounts of fiber routed into it, a tech there knew the basics of it but wasn't overly concerned).

So, everything is captured, not just through some providers like facebook and google (however those have built in tools to make the data more accessible and better formatted, to include trending software and other advanced algorithms). You can make it harder to access your data, but honestly "they" don't care, they are capturing everything, in mass and looking for trends, individual data isn't as important as the aggregate.

Remember, the internet started as a DARPA project; relax and enjoy the easy access to information, worrying about stuff like the NSA is pointless if you are using the internet what you do is captured, that's just how it's designed.


Keep calm and carry on!

Ron Mauer Sr
26th June 2013, 13:35
The free version of Nitro pdf reader (http://www.nitroreader.com/download/download.aspx) will open the file.

Kor
29th June 2013, 19:27
This thread had over one thousand views so far but not so many responses.

I wonder... those of you who have read it..


How many of you are willing to give up your Gmail account?

How many of you are willing to give up on using social network platforms such as face book?

How many of you are willing to switch from fancy and user friendly Skype, Dropbox, MS Windows...etc to an alternative?

How many of you, since reading this thread, made your PGP/GPG keys and downloaded Tor?



We "all" knew they are doing it. "Everyone" heard about echelon system from as far back as 1960. So this is nothing new. Should not be new to most.

But now with Edward Snowden bringing it out in the open - it is in your face.

Before everyone was just "talking about it" and now there is proof. Now it is official...a "higher authority" has publicly made it official.

If you have not been doing anything before, to ensure your privacy (while speculating each step you do is logged)...will you do anything now...since speculation has become a fact.


Is using email and IM encryption a cowards way out?

Do you have nothing to hide?

Do you just refuse to bother yourself with all of this, not to mention the "geek" stuff?

Do you feel like not wanting to give up benefits offered by your Gmail account and such?

AND

What will you do once the surveillance takes the next step? (this is "speculation")

Now you can write "George Bush can not finish a sentence correctly" and it gets logged, checked by a computer program and if there are too many "matches" it gets seen by a human eye which determines whether or not the further action should be taken.

The next step is when u write that, but...you get fined for it. They know who when and where. No problem sending a fine. Just like when u make a traffic violation.

The step after that is you being told what you can write and not, what you can say and not, what you can think and not.

And none of this is science fiction. Google knows more about you than most, yourself included. They can predict your next "shopping experience" and that is...well nothing compared to what can be gathered form your online activity.

RunningDeer
30th June 2013, 15:05
This thread had over one thousand views so far but not so many responses.

Hi Kor, welcome to Avalon. Your post may be rhetorical, but in case you are interested in a response, here goes...

Often, I’ll take actions on principle and not because of fear from the big bad wolf. It’s none of their damn business what my business is. It’s got to be a really, really slow day if they come snooping into my cave.

In reality, what’s done is done. Before I was aware, they already had a folder on me. Though, I regret using a debit card three days in a row to purchases Ben&Jerry’s.


This thread had over one thousand views so far but not so many responses.
One way to view this is...the number of views...is the response. Some folks are interested in the information, but don’t have the need to post.

Response to your questions:

How many of you are willing to give up your Gmail account? I don’t use Gmail for phone, but I do for YouTube account, without the social networking.

How many of you are willing to give up on using social network platforms such as face book? Yes, 2 1/2 years ago.

How many of you are willing to switch from fancy and user friendly Skype, Dropbox, MS Windows...etc to an alternative? I used Skype three times, the others - none. Besides, poor reception in my cave.

How many of you, since reading this thread, made your PGP/GPG keys and downloaded Tor? PGP/GPG (https://en.wikipedia.org/wiki/Pretty_Good_Privacy)
& Tor (http://en.wikipedia.org/wiki/Tor_(anonymity_network)) (anonymity network) - No, and no plan to. More and more layers of technology to cancel out technology that’s beyond where I want to expend my energy just to keep in par with the illusion that I am...

To the questions below, you are beginning to sound like an information gatherer. And people that live in caves have no door to answer. Nothing personal. Though, I will respond to your “geek” question. I’m geeky. No pens & pencils in my pocket. Cuz, I keep one velcro(ed) to my glasses.


Is using email and IM encryption a cowards way out?

Do you have nothing to hide?

Do you just refuse to bother yourself with all of this, not to mention the "geek" stuff?

Do you feel like not wanting to give up benefits offered by your Gmail account and such?
What will you do once the surveillance takes the next step? (this is "speculation")


It’s been nice visiting with you, Kor. :wave:

Peace,
Paula

PS If there are grammatical/spelling errors in this post, it's because the tape on my glasses is distracting me at the moment.


http://avalonlibrary.net/paula/Photoshop/geek_zps046585ee.JPG

Kor
1st July 2013, 11:04
Information gatherer? Me?

What a silly thing to say. There is absolutely no need in these times to even bother gathering information (for ill intent) in this way. There are much more efficient methods, some of which are the topic of this thread.

The point of my before post is more like....

Like when you take a person and explain to it everything about the "fundamental force" of tangible reality - money. You use officially and publicly available sources to back up your statements, you avoid any and all "too far out" conspiracy claims, you remain level headed and do not jump into the "jews control the world" mentality...etc

So to say, you successfully argument to someone using means they can understand and agree with, how the source of money and manipulation of financial statistics is putting a suffocating grip on all of us and how the so called regulators help them do it.

They (the ones being explained this), of sound mind, acknowledge to comprehend what was presented to them...take a few moments for themselves....afterwards they utter something in a variety of "just how it is i guess"...to then go on their way as before when they were oblivious to that information, not changing anything about it or themselves, not caring any more than they did before.


And this is what i think will also happen now...a bit of dust will be lifted due to the "cold war like scandals" with bugging EU offices and such...but that will soon be over, forgotten with the rest of things.

RunningDeer
1st July 2013, 12:19
Information gatherer? Me?

What a silly thing to say. There is absolutely no need in these times to even bother gathering information (for ill intent) in this way. There are much more efficient methods, some of which are the topic of this thread.

The point of my before post is more like....

Like when you take a person and explain to it everything about the "fundamental force" of tangible reality - money. You use officially and publicly available sources to back up your statements, you avoid any and all "too far out" conspiracy claims, you remain level headed and do not jump into the "jews control the world" mentality...etc

So to say, you successfully argument to someone using means they can understand and agree with, how the source of money and manipulation of financial statistics is putting a suffocating grip on all of us and how the so called regulators help them do it.

They (the ones being explained this), of sound mind, acknowledge to comprehend what was presented to them...take a few moments for themselves....afterwards they utter something in a variety of "just how it is i guess"...to then go on their way as before when they were oblivious to that information, not changing anything about it or themselves, not caring any more than they did before.


And this is what i think will also happen now...a bit of dust will be lifted due to the "cold war like scandals" with bugging EU offices and such...but that will soon be over, forgotten with the rest of things.

Well, looks like my attempt to say welcome and engage some of your questions backfired, Kor. I accept the risk I took to reach out in a style that doesn’t fit your personality type.

She sighs. She shakes her head, and says to herself, “Got pencils to sharpen.”