Ten Steps You Can Take Right Now Against Internet Surveillance

Ten Steps You Can Take Right Now Against Internet Surveillance

https://www.eff.org/deeplinks/2013/10/ten-steps-against-surveillance

One of the trends we've seen is how, as the word of the NSA's spying has spread, more and more ordinary people want to know how (or if) they can defend themselves from surveillance online. But where to start?

The bad news is: if you're being personally targeted by a powerful intelligence agency like the NSA, it's very, very difficult to defend yourself. The good news, if you can call it that, is that much of what the NSA is doing is mass surveillance on everybody. With a few small steps, you can make that kind of surveillance a lot more difficult and expensive, both against you individually, and more generally against everyone.

Here are ten steps you can take to make your own devices secure. This isn't a complete list, and it won't make you completely safe from spying. But every step you take will make you a little bit safer than average. And it will make your attackers, whether they're the NSA or a local criminal, have to work that much harder.

  • Use end-to-end encryption. We know the NSA has been working to undermine encryption, but experts like Bruce Schneier who have seen the NSA documents feel that encryption is still "your friend". And your best friends remain open source systems that don't share your secret key with others, are open to examination by security experts, and encrypt data all the way from one end of a conversation to the other: from your device to the person you're chatting with. The easiest tool that achieves this end-to-end encryption is off-the-record (OTR) messaging, which gives instant messaging clients end-to-end encryption capabilities (and you can use it over existing services, such as Google Hangout and Facebook chat). Install it on your own computers, and get your friends to install it too. When you've done that, look into PGP–it's tricky to use, but used well it'll stop your email from being an open book to snoopers. (OTR isn't the same as Google Chat's option to "Go off the record"; you'll need extra software to get end-to-end encryption.)
  • Encrypt as much communications as you can. Even if you can't do end-to-end, you can still encrypt a lot of your Internet traffic. If you use EFF's HTTPS Everywhere browser addon for Chrome or Firefox, you can maximise the amount of web data you protect by forcing websites to encrypt webpages whenever possible. Use a virtual private network (VPN) when you're on a network you don't trust, like a cybercafe.
  • Encrypt your hard drive. The latest version of Windows, Macs, iOS and Android all have ways to encrypt your local storage. Turn it on. Without it, anyone with a few minutes physical access to your computer, tablet or smartphone can copy its contents, even if they don't have your password.
  • Strong passwords, kept safe. Passwords these days have to be ridiculously long to be safe against crackers. That includes the password to email accounts, and passwords to unlock devices, and passwords to web services. If it's bad to re-use passwords, and bad to use short passwords, how can you remember them all? Use a password manager. Even write down your passwords and keeping them in your wallet is safer than re-using the same short memorable password -- at least you'll know when your wallet is stolen. You can create a memorable strong master password using a random word system like that described at diceware.com.
  • Use Tor. "Tor Stinks", this slide leaked from GCHQ says. That shows much the intelligence services are worried about it. Tor is an the open source program that protects your anonymity online by shuffling your data through a global network of volunteer servers. If you install and use Tor, you can hide your origins from corporate and mass surveillance. You'll also be showing that Tor is used by everyone, not just the "terrorists" that GCHQ claims.
  • Turn on two-factor (or two-step) authentication. Google and Gmail has it; Twitter has it; Dropbox has it. Two factor authentication, where you type a password and a regularly changed confirmation number, helps protect you from attacks on web and cloud services. When available, turn it on for the services you use. If it's not available, tell the company you want it.
  • Don't click on attachments. The easiest ways to get intrusive malware onto your computer is through your email, or through compromised websites. Browsers are getting better at protecting you from the worst of the web, but files sent by email or downloaded from the Net can still take complete control of your computer. Get your friends to send you information in text; when they send you a file, double-check it's really from them.
  • Keep software updated, and use anti-virus software. The NSA may be attempting to compromise Internet companies (and we're still waiting to see whether anti-virus companies deliberately ignore government malware), but on the balance, it's still better to have the companies trying to fix your software than have attackers be able to exploit old bugs.
  • Keep extra secret information extra secure. Think about the data you have, and take extra steps to encrypt and conceal your most private data. You can use TrueCrypt to separately encrypt a USB flash drive. You might even want to keep your most private data on a cheap netbook, kept offline and only used for the purposes of reading or editing documents.
  • Be an ally. If you understand and care enough to have read this far, we need your help. To really challenge the surveillance state, you need to teach others what you've learned, and explain to them why it's important. Install OTR, Tor and other software for worried colleagues, and teach your friends how to use them. Explain to them the impact of the NSA revelations. Ask them to sign up to Stop Watching Us and other campaigns against bulk spying. Run a Tor node, or hold a cryptoparty. They need to stop watching us; and we need to start making it much harder for them to get away with it.
  • At Home With Glenn Greenwald

    At Home With Glenn Greenwald

    http://motherboard.vice.com/read/meet-glenn-greenwald?trk_source=features1

    http://youtu.be/hoCPdLh_FiQ

    Before the Snowden revelations, the journalist Glenn Greenwald lived in Brazil with his husband, David Miranda, because American law didn't recognize their marriage. After the Defense of Marriage Act was struck down last June—the same month that Greenwald began publishing his reporting on Edward Snowden's revelations about the NSA—the couple faced a new reason not to relocate back to New York.

    "The UK and US governments hate the journalism that we're doing," he told VICE at his home near Rio de Janeiro, regarding Miranda's 11-hour detention and questioning by authorities at an airport in London in July. He was held under an anti-terror law, which was "a way of saying look at what it is we can do to people who defy us if we choose."

    In that injustice, however, Greenwald found a silver lining. "At the time that it happened, I was angry, I felt helpless, I was furious they would target someone peripheral to these events, instead of me or Laura or the other journalists with whom we've been working," he said. "But at the same time I found it incredibly emboldening. They showed their true face to the world, or to me, about how abusive they are when it comes to the exercise of their power. And that made me know just how compelling it was to continue to bring transparency to what it is that they're doing. And it showed how they can't be trusted to exercise power without transparency and accountability."

    Greenwald's new media venture, First Look Media, backed by eBay founder Pierre Omidyar, carries with it the anti-establishment ethos that has marked his journey from lawyer to op-ed columnist to reporter for places like Salon and the Guardian. Amidst criticism of Omidyar and eBay, particularly over their record in defending privacy and press freedoms, Greenwald has insisted that First Look and its journalists, like Laura Poitras, Jeremy Scahill and Bruce Schneier, will have editorial independence to pursue stories about surveillance and other controversial topics. And it promises a new model for supporting independent journalism, with an organizational structure that combines a for-profit news technology company with a news non-profit.

    "Over time I realized that you can only make an impact on any single political issue if you start understanding and confronting and ultimately subverting the patterns of how media institutions function," said Greenwald. "Once I really started engaging with media institutions, it was a gradual process by which I started understanding how journalism functions but also doing the kind of journalism that I thought was needed."

    Greenwald doesn't want to call the US government a "tyranny," but he doesn't hesitate to say that with its surveillance power, it has the hallmarks of one. His concern for privacy, conversely, is rooted in his interest in human liberty.

    "As psychological studies show, as all kinds of social science demonstrates, when you know you're being watched, you make choices that you believe that the judgment of society demands that you make," he said. "It's only when you can behave and choose and explore without judgmental eyes being cast upon you, that's really the realm where dissent and creativity and exploration exclusively reside."

    "So there are all kinds of political dangers to having privacy eroded, but there also really significant harms on the human and individual and personal level," he continued. "And there aren't many people articulating its value or defending it from erosion, so I perceived this need of defense of this value that I consider to be most important."

    The NSA Has Impersonated Facebook To Spread Malware

    The NSA Has Impersonated Facebook To Spread Malware

    Best find something else to do with your time other than FarmVille...

    NSA-Book?

    http://gizmodo.com/the-nsa-sometimes-masquerades-as-a-facebook-server-1542109879

    So the NSA is spying on you. You've known that for quite some time now. What you might not know much about is exactly how they're doing, and a new report from Ryan Gallagher and Glenn Greenwald offers up some pretty grizzly details about the agency's worldwide, automated malware network.

    Did you know, for instance, that the NSA pretends to be Facebook sometimes? As Gallagher and Greenwald report, "In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target's computer and exfiltrate files from a hard drive." That's a little extra worrisome when you consider the fact that Facebook has Like buttons spread across the entire internet, giving the NSA that many more chances for its malware to burrow into your hard drive.

    This effort and the others described in the report are lead by the NSA's elite Tailored Access Operations (TAO) unit. We've heard about this unit before. Last year, Der Spiegel published an exposée on TAO, which one Gizmodo writer described as a "premier ninja hacking squad." The new report has some new details, including some on the specific tools the NSA uses to spy on you and your friends… and potential terrorists, too:

    An implant plug-in named CAPTIVATEDAUDIENCE, for example, is used to take over a targeted computer's microphone and record conversations taking place near the device. Another, GUMFISH, can covertly take over a computer's webcam and snap photographs. FOGGYBOTTOM records logs of Internet browsing histories and collects login details and passwords used to access websites and email accounts. GROK is used to log keystrokes. And SALVAGERABBIT exfiltrates data from removable flash drives that connect to an infected computer.

    So again, we knew that the NSA could tap into your computer's microphone. We also knew that the agency could access your camera and your log in details. The keystroke-logging thing actually sounds new, but nothing is surprising any more. The really alarming thing is just how detailed and well thought out this whole malware infection project has been. Didn't it cross anyones mind that masquerading as a Facebook server might be a bad idea?

    There are no bad ideas at the NSA. Or so it seems. [The Intercept]

    Update: It looks like Mark Zuckerberg noticed the news about the NSA pretending to be Facebook servers because hejust posted a rare note on his profile. The Facebook founder more or less scolds the government for screwing up the internet and humblebrags a little bit:

    I've called President Obama to express my frustration over the damage the government is creating for all of our future. Unfortunately, it seems like it will take a very long time for true full reform.

    Edward Snowden: ‘The NSA set fire to the internet. You are the firefighters’

    Edward Snowden: 'The NSA set fire to the internet. You are the firefighters'

    Snowden tells a packed audience that SXSW’s technologists are the people who can fix the deficiencies in the internet to protect standards

    http://www.theguardian.com/technology/2014/mar/11/edward-snowden-sxsw-nsa-internet

    Edward Snowden speaks via Google Hangouts at SxSW in Austin, Texas

    Edward Snowden chose to make his first public appearance since his spectacular ex-filtration of thousands of secret NSA documents to an audience of technology people at the annual SXSW Interactive festival in Austin, Texas on Monday.

    It’s been a decade since I last spoke at SXSW, and the past 10 years have seen the conference swell an unbelievable (and at times, unmanageable) size, spilling out into the conference rooms of nearby hotels and venues. The exact cause of this spectacular growth is hard to put your on. In part, it may just be an instance of the network-effect phenomenon that has caused other counter-culture/tech events like Comic-Con and Burning Man to grow to bursting – but it’s clear that many of the bright young geeks in attendance are here because they’re chasing the legendary SXSW break-out effect that is credited with bringing Airbnb, Twitter and Foursquare to global prominence.

    Everybody would like to talk to Snowden, from politicians (he provided a testimony to an EU committee examining mass surveillance last week) to book agents (he is a crisp and engaging writer with a flair for writing that is memorable without being showy) to movie people. But Snowden chose to talk to nerds.

    Snowden was beamed into the packed ballroom – as well as several satellite rooms and as many as a million viewers on a livestream – by means of a Google Hangout video-chat, his image and voice thoroughly glitched-out by a journey through seven proxies. He appeared as a jittery, semi-frozen Max Headroom bust against a chromakeyed background of the First Amendment, his voice an inconsistent gargle.

    This was not an easy technical feat. Washington Post journalist Barton Gellman and I were Snowden’s opening act, and there was a lot of nervous backstage joking before we went on as ACLU technologist Christopher Soghoian wrestled with the Snowden link. Soghoian and the ACLU’s Ben Wizner took the stage after Gellman and I stepped down, vamping for a few minutes while the bugs were ironed out, and then Snowden appeared, to thunderous applause.

    Snowden quickly explained why he’d opted to speak to this audience: SXSW’s technologists were “the people who can really fix” the deficiencies in the internet and its applications “to enforce our rights and protect standards, even though Congress hasn’t gotten to the point of doing that.” Spies have treated the internet as “an adversarial global freefire scenario, and we need to protect people against it. The NSA has advanced policies that erode Fourth Amendment protections through the proactive seizure of communications. This demands a policy response, but we need a technical response from makers. The NSA is setting fire to the future of the internet and you guys are the firefighters.”

    And we were off.

    Serious security tools are notoriously hard to use

    The mainstream debate over internet surveillance has focused on privacy breaches. At last, the privacy advocates who’ve spent decades trying to get internet users exercised about their privacy, Snowden’s revelations have prompted 86% of American internet users to take a step toward protecting their privacy. Alas, almost everything that a nontechnical person might do to make his internet experience more private will be useless.

    That’s because all the serious security tools are notoriously hard to use. Snowden and Soghoian called on toolmakers to make their products “secure out of the box.” They both emphasised the need to make the security features of common internet technologies easier, with Snowden singling out Moxie Marlinspike’s startup Whisper for praise for its work in improving the user experience and user interface for cryptographic tools.

    But as Soghoian pointed out, the majority of internet users will not download a program to replace the defaults that come with their devices, nor will they change the default configurations of those apps. However, when internet giants can be convinced to switch on cryptographic protection for the link to their users’ browsers, millions can benefit without ever having to take any action. And if the giants can’t be convinced, they can be shamed – as Yahoo was when Barton Gellman and Ashkan Soltani splashed the news of their laxness on the front page of the Washington Post last October, resulting, finally, in the company going to more secure defaults in January 2014.

    Soghoian pointed out that everyone had something to worry about when it came to mass surveillance: “The government has collected a massive database of everyone’s private communications: everyone who’s called abortion clinic, everyone who’s called Alcoholics Anonymous, everyone who’s called a gay bookstore. Many Americans don’t want this stored. Whatever your politics, you know that your call to a church or gun store is not the government’s business. The person who sits in the Oval Office changes every few years and the person who sits there next may not be someone who you like.”

    But privacy is only the surface of the NSA leaks. For cryptographers and many civil libertarians, the real worry is the integrity of the internet itself. All three speakers railed against the NSA’s programme of sabotaging security standards as well as the security of networks and networked devices.

    Snowden described the unique recklessness of an American intelligence agency undermining internet security. “Our country’s economic success is based on our intellectual property – our ability to create, share, communicate and compete. Since 9/11, former NSA director Michael Hayden and current NSA director Keith Alexander have elevated offense at the expense of defense of our communications. They’ve eroded protection of our communications at the expense of defense of our communications.

    “This is a problem because America has more to lose than anyone else when every attack can succeed. When you’re the country whose vault is more full than anyone else’s in the world it doesn’t make sense to attack all day without defending. It doesn’t make sense to weaken standards on vaults worldwide to create a back door that anyone can walk into. This weakens our national security and everyone else’s because we all rely on the same standards.

    “Without security, we have nothing. Our economy can’t succeed.”

    Soghoian made sure that the commercial implications of this were not lost on the entrepreneurial types in the audience, those who’d come to SXSW hoping to win the tech lottery. “Google, Yahoo and other internet companies want to sit between the conversations you have with your friends and add value. They want to mine your information, tell you about restaurants and suggest things that help you. That business model is incompatible with your security, with your having a secure, end-to-end connection to your friends.

    “The irony of the fact that we’re using Google Hangouts to talk to Edward Snowden isn’t lost on me. End-to-end secure video conferencing tools aren’t polished. They’re not good enough to bounce traffic through seven proxies. In many cases, you have to choose between tools that are easy, reliable and polished and tools that are secure, but hard to use.

    “Big companies have hundreds of developers to put on to user interface design. That’s not try of companies that are optimised for security. Those tend to be made by geeks, for geeks. But small developers can play a role. The next Twitter or WhatsApp should be both encrypted end-to-end and usable.

    “Remember, adding security is easier for new companies than it is for the big incumbents. The big guys can’t deliver security to their users, because they’re hampered by their business-models. You can tell customers that if they give you $5 a month for encrypted communications, no one will be able to watch them. Many people will be willing to pay for that.”

    But end-to-end security isn’t just good for privacy: it’s also a way of nudging spies and police toward proportionate surveillance. Snowden pointed out that suspects who use end-to-end security aren’t immune to spying, but they can only be surveilled through targeted, intensive attacks against their computers and phones. The expense of these attacks ensure that spies target people specifically in a way that is “more constitutional and more overseen,” since each event will be more visible to judges and oversight committees.

    “Mass surveillance isn’t effective,” Snowden said. “We spied on everyone and found it didn’t work.” But contractors like Snowden’s former employer Booz Allen found mass surveillance contracts to be so lucrative that they lobbied for its continuation. As a result, surveillance resources were deployed without regard to real threats, meaning that specific, repeated warnings about Umar Farouk Abdulmutallab (the underwear bomber) and the Tsarnaev brothers (the Boston Marathon bombers) fell through the cracks.
    ‘We had an oversight model that could have worked’

    Web inventor Tim Berners-Lee had the honour of asking the first question, asking Snowden how he’d change the web to make it more accountable, given the reality that spies will always try to collect information.

    Snowden acknowledged that this was a complex problem, with lots of moving parts, made more complex by the secret nature of spy agencies. Still: “We had an oversight model that could have worked” – meaning the Congressional and judicial oversight systems for the NSA – “But the overseers weren’t interested in oversight – the Senate and House intelligence committees championed surveillance. James Clapper lied, and the congressmen who knew he’d lied allowed Americans to believe he’d told the truth.”

    He went on to condemn the secret Foreign Intelligence Service Act Court, “a secret rubber-stamp court” to approve spying warrants. He said that the court was secret because the government had an interest in not tipping off suspects, but that a court shouldn’t interpret the constitution with only the NSA’s lawyers present to present arguments. He called for public advocates, “trusted public figures, civil rights champions to advocate for us. To tell us, these guys are lying to you. Otherwise how can we vote? Without information we can’t consent.”

    For the remainder of the questions and remarks, Snowden and his co-panelists returned to technical questions, emphasising the fact that technology is the first line of defense for internet users.

    Snowden reminded the technologists in the room that “Crypto works. It’s not an arcane black art. It is a basic protection, the Defense Against the Dark Arts for the digital world. We must implement it, actively research it,” going on to ask the audience to take on “a moral, philosophical and technical commitment to enforce and defend our liberties.”

    Soghoian contrasted the importance of cryptography with the risk that internet users were exposed to by the NSA and GCHQ’s programmes of security sabotage. He was withering on the subject the NSA’s undermining of the US National Institute for Standards in Technology’s cryptography projects, saying it had “radicalised mild-mannered cryptographers. Consumers don’t choose their cryptographic algorithms, the people who choose them are the cryptographers. Those people are
    really pissed and they should be mad.

    “But they can make a difference. It’s a good sign that they’re mad. The tools that come out in a year or two will be more secure, because the tech community feels it was lied to.”

    Snowden addressed the global audience, reiterating that the US has more to lose form being hacked, but “every citizen, every country has something to lose form unwarranted, unjustified surveillance of our private lives. If we don’t resolve these issues, if the NSA isn’t restrained, every government will treat their actions as a green light to do the same.

    “Governments have stopped talking about the ‘public interest’ and started talking about the ‘national interest’. When these diverge, something is wrong.

    “Would I do this again? Absolutely yes. No matter what happens to me. I took an oath to support and defend constitution and I saw it was being violated on a mass scale. The interpretation of constitution had been changed in secret from ‘no unreasonable search and seizure’ to ‘any seizure is fine, just don’t search it.’ That’s something the public had the right to know.”

    Snowden’s video feed winked out to a standing ovation.

    FOX’s Eric Bolling Blasts NSA Spying on us But Can’t figure out where Malaysia Flight MH370" is – Video


    FOX #39;s Eric Bolling Blasts NSA Spying on us But Can #39;t figure out where Malaysia Flight MH370" is
    Eric Bolling Blasts NSA Spying on us But Can #39;t figure out where Malaysia Flight MH370" is The Five | Fox News The Five | Fox News The Five | Fox News Malaysi...

    By: Adorlee Sylvain

    The rest is here:
    FOX's Eric Bolling Blasts NSA Spying on us But Can't figure out where Malaysia Flight MH370" is - Video

    Wikipedia, Facebook slam NSA spying

    Published: Friday, 14 Mar 2014 | 9:39 AM ET

    By: CNBC.com with Reuters

    NSA spying shows government 'out of control': Wikipedia

    Jimmy Wales, founder of Wikipedia, says the revelations of spying by the U.S. National Security Agency is a "huge scandal" and the government is "out of control".

    Wikipedia founder Jimmy Wales slammed the U.S. government over its electronic surveillance methods, branding them "out of control", after reports that Facebook boss Mark Zuckerberg had called President Barack Obama to express his concerns.

    Wales said he was "glad" that Zuckerberg was putting pressure on the Obama administration to stop its "unconstitutional" spying techniques.

    "The governmentshould be here to empower us and to protect our rightsbut in fact, the recent revelations have shown a government that's completely out of control, lying to Congress, doing things that are blatantly unconstitutional," Wales told CNBC in a TV interview.

    "I think it's a huge scandal."

    (Read more: Facebook's Zuckerberg says US spying hurt users' trust)

    Noah Berger | Bloomberg | Getty Images

    Continued here:
    Wikipedia, Facebook slam NSA spying

    Zuckerberg Complains to Obama About NSA Spying

    In speaking with Obama, Zuckerberg said he shared "my frustration over the damage the government is creating."

    Facebook chief Mark Zuckerberg today said he called President Obama to express his frustration over government spying, but does not believe the feds will make any meaningful changes in the near future.

    "The U.S. government should be the champion for the Internet, not a threat," Zuckerberg wrote in a Facebook post. "They need to be much more transparent about what they're doing, or otherwise people will believe the worst."

    In speaking with Obama, Zuckerberg said he shared "my frustration over the damage the government is creating for all of our future. Unfortunately, it seems like it will take a very long time for true full reform."

    Obama has pledged to make changes to U.S. surveillance programs, particularly as it relates to the collection of phone metadata, but like most things in Washington, it's slow-going.

    "At Facebook we spend a lot of our energy making our services and the whole Internet safer and more secure," Zuckerberg said today. But "when our engineers work tirelessly to improve security, we imagine we're protecting you against criminals, not our own government."

    Zuckerberg's post comes shortly after former NSA contractor Edward Snowden, who leaked details of NSA surveillance programs to the press last year, appeared remotely at the SXSW conference in Austin. There, he encouraged the tech community to develop secure tools that would make such spying more difficult, since developers would likely have more luck thwarting spies than Congress.

    Zuckerberg had a similar message today. "Together, we can build a space that is greater and a more important part of the world than anything we have today, but is also safe and secure," he wrote. "I'm committed to seeing this happen, and you can count on Facebook to do our part."

    The Facebook chief was similarly critical of the NSA back in September, when he said that the government "blew it" when it came to communicating with the public about its spy programs.

    The latest revelation from leaked NSA documents, meanwhile, is that the agency has been hijacking botnets for spying purposes, according to Reuters.

    See the rest here:
    Zuckerberg Complains to Obama About NSA Spying