How Snowden changed everything

airship.png

On May 20, 2013, Edward Snowden flew to Hong Kong to meet with journalists.
   Just short of a year before, President Obama denied that the NSA was spying on all of us.

  Up until that point the idea of mass domestic surveillance was still the stuff of conspiracy theories and the government could get away with official denials.
No matter what your personal opinion of Snowden, he changed all that.

  Here is the Daily Show take on NSA lies.
   I would like to present a list of government lies that they have been caught in regarding the NSA spying.

#1) “… NSA takes significant care to prevent any abuses and that there is a substantial oversight system in place,” Sen. Dianne Feinstein (D-California), said August 23.

Oops!

 “I am reviewing each of these incidents in detail,” Dianne Feinstein, a California Democrat and chairman of the Senate intelligence panel, said in a statement, after the NSA confirmed to Bloomberg News yesterday that some analysts deliberately ignored restrictions on their authority to spy on Americans.

#2) “The ongoing national dialogue is not about your performance. The NSA/CSS work force has executed its national security responsibilities with equal and full respect for civil liberties and privacy.”
 - NSA chief Keith Alexander, June 25

Oops!

 The NSA promptly violated those rules — “since the earliest days” of the program’s 2006 inception — carrying out thousands of inquiries on phone numbers without any of the court-ordered screening designed to protect Americans from illegal government surveillance.
   The violations continued for three years, until they were uncovered by an internal review, and the NSA found itself fighting to keep the spy program alive.

#3 “The government cannot target anyone under the court-approved procedures for this program unless there is an appropriate and documented foreign intelligence purpose for the acquisition, such as for the prevention of terrorism, hostile cyber activities or nuclear proliferation.”
  - Attorney General Eric Holder, June 15
#3 Part 2 “Now part of the reason they’re not abused is because they’re — these checks are in place, and those abuses would be against the law and would be against the orders of the FISC.”
  - President Obama, August 5

Oops!

 “Indeed, the record before this court establishes that NSA’s acquisition of internet transactions likely results in NSA acquiring annually tens of thousands of wholly domestic communications, and tens of thousands of non-target communications of persons who have little or no relationship to the target but who are protected under the Fourth Amendment.”

#4 From the March 12, 2013 testimony:
Sen. Ron Wyden (D-Oregon): “So what I wanted to see is if you could give me a yes or no answer to the question: Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?”
Clapper: “No, sir.”

#5 “We know of at least 50 threats that have been averted because of this information not just in the United States, but, in some cases, threats here in Germany, So lives have been saved.”
  - President Obama, June
#5 Part 2 “Fifty-four times this and the other program stopped and thwarted terrorist attacks both here and in Europe—saving real lives. This isn’t a game. This is real.”
 - Representative Mike Rogers, July

Oops!

 An analysis of 225 terrorism cases inside the United States since the Sept. 11, 2001, attacks has concluded that the bulk collection of phone records by the National Security Agency “has had no discernible impact on preventing acts of terrorism.”
   The study, to be released Monday, corroborates the findings of a White House-appointed review group, which said last month that the NSA counterterrorism program “was not essential to preventing attacks” and that much of the evidence it did turn up “could readily have been obtained in a timely manner using conventional [court] orders.”

And then Snowden happened

Edward Snowden received another human rights award in Berlin. He was awarded a human rights award from Sweden earlier.
   However, none of those awards show the effect Snowden has had on the world like this survey.

 An international survey of Internet users has found that more than 39% have taken steps to protect their online privacy and security as a result of spying revelations by one-time NSA employee Edward Snowden.

Guardian Edward Snowden revelations have had limited effect on privacy
 NY Times Americans Relatively Sanguine About Online Privacy, Study Says
ARS Most people have heard of Snowden, few have changed habits as a result
The Hill Many concerned over online privacy, but few acting for security
International Business Times Edward Snowden Revelations Not Having Much Impact on Internet Users

  You would think from reading those headlines that no one but a few "civil rights nuts" care about mass domestic spying. Bruce Schneier exposes just how ridiculous those headlines are.

 He's having an enormous impact. I ran the actual numbers country by country, combining data on Internet penetration with data from this survey. Multiplying everything out, I calculate that 706 million people have changed their behavior on the Internet because of what the NSA and GCHQ are doing.
  Note that the countries in this survey only cover 4.7 billion out of a total 7 billion world population. Taking the conservative estimates that 20% of the remaining population uses the Internet, 40% of them have heard of Snowden, and 25% of those have done something about it, that's an additional 46 million people around the world.

 When have you ever heard of 3/4 of a Billion people changing their habits on anything short of an ebola pandemic?
   The news media is laughably complicit here.

It was revealed that a senior executive at the NSA argued that the NSA's mass domestic spying program was not justified.

 Dissenters within the National Security Agency, led by a senior agency executive, warned in 2009 that the program to secretly collect American phone records wasn't providing enough intelligence to justify the backlash it would cause if revealed, current and former intelligence officials say.
  But after an internal debate that has not been previously reported, NSA leaders, White House officials and key lawmakers opted to continue the collection and storage of American calling records, a domestic surveillance program without parallel in the agency's recent history.

In other words, it was a political decision, not one based on the best intelligence practices.
 Instead the NSA targeted domestic political activists with no ties or connections to terrorist groups. You know, exactly like the pro-fourth Amendment groups said they were doing.
   In fact, of the countless records the NSA holds 9 out of 10 were not NSA targets, and around half of them are Americans.

  And that was just the start.

 In the first half-year of his leaks, the public learned about the NSA’s monitoring of citizens’ phone calls and email, and routine spying on allied foreign governments and companies. Later details emerged about GCHQ’s bulk collection of Yahoo webcam chats, the NSA’s mass storage of phone conversations and metadata in target countries, NSA facial recognition databases that pull images from cable taps and border crossings, and even automated NSA programs that have the ability to infect millions of systems worldwide with spying software — something the agency itself called “industrial-scale exploitation.”

Here's how the public attitude toward Snowden has changed:

Newsweek

 The survey found that 55 percent of respondents think Snowden did the right thing in exposing PRISM, the mass data-mining program, while another 29 percent believe he was in the wrong, and 16 percent endorse neither statement. Of Snowden’s supporters, 80 percent said he exposed constitutional violations.

Fox News

  The poll asks voters to set aside how they feel about Snowden and his crime, and simply consider whether they are glad the information was made public.  By a 68-25 percent margin, voters say yes, they are glad to know how these programs affect Americans like them.

Most Republicans (69 percent), independents (68 percent) and Democrats (68 percent) are pleased to be aware of the NSA’s activities.  Among those part of the tea party movement, 75 percent are glad.

NSA-Apologist_Bingo.jpg
Kill the messenger

The defenders of the status quo have a simple formula for whistleblowers: destroy the messenger.
   Snowden is a hypocrite.
  Snowden is a whiner.
  Snowden is a grandiose narcissist.
  Snowden is like George Zimmerman.
  Snowden has no integrity.
  Snowden can't be trusted.

   And that was just for starters.
After that the really Big Guns came out.

   Dick Cheney declared last year that Edward Snowden was a traitor.
  So did former Defense Secretary Robert Gates, and former National Security Agency and CIA head Michael Hayden.

A new independent investigation has revealed that terrorist jihadist groups were unimpressed by Snowden's revelations.

The analysis by Flashpoint Global Partners, a private security firm, examined the frequency of releases and updates of encryption software by jihadi groups and mentions of encryption in jihadi social media forums to assess the impact of Snowden’s information. It found no correlation in either measure to Snowden’s leaks about the NSA’s surveillance techniques, which became public beginning June 5, 2013...
   “Nothing has changed about the encryption methodologies that they use,” he said. “It’s difficult to reconcile with the claim that they have dramatically improved their encryption technology since Snowden.”

This reports directly contradicts claims by politicians and talking heads in the media that claim that Snowden's leaks have damaged our security by alerting terrorist groups that were somehow unaware they were being spied upon.

 Speaking on “Meet the Press”on Jan. 19, Rep. Mike Rogers (R.-Michigan), chair of the House Intelligence Committee, said the Snowden leaks led al Qaeda to change its tactics. “[Y]ou have to remember, al Qaeda has changed the way they communicate based on this,” said Rogers. “That puts our soldiers at risk in the field. That’s a real dangerous consequence.”
   Nicholas Rasmussen, deputy director of the National Counterterrorism Center, testified last week before the Senate Homeland Security Committee that, as a result of leaks by Snowden and others, “Terrorists now understand the scope and scale of Western collection capabilities, and they’re changing the way they communicate. They’re adopting encryption technologies. They’re shifting accounts, or avoiding altogether the use of electronic communications, all of which frustrate our counterterrorism efforts.”

 Director of National Intelligence, and Famous Liar, James Clapper, echoed many of these same claims just yesterday.

 Edward Snowden’s national security leaks have created a “perfect storm” degrading the intelligence community’s capabilities, Director of National Intelligence James Clapper said Thursday.

 Snowden's critics have engaged in the most extreme hyperbole. Accusing him of aiding the rise of ISIS and assisting the Russian occupation of Crimea.

  The new independent report says there is no evidence that this is true, and that the jihadists were well aware of the importance of encryption because they were already being spied upon.

What Snowden probably didn't take into account was all the money involved.
Spying on the public shouldn't be profitable, but it is.

 The National Security Agency (NSA), which develops surveillance tools that are both dazzling and terrifying, has been making money on the side by licensing its technology to private businesses for more than two decades.
    It's called the Technology Transfer Program (TTP), under which the NSA declassifies some of its technologies that it developed for previous operations, patents them, and, if they're swayed by an American company's business plan and nondisclosure agreements, rents them out.
   The TTP itself isn't classified, though 2014 is the first year they've published a formal catalog. (Yes, there's a catalog.) Nor is it unique to the NSA. The Department of Defense (DoD), which includes the NSA under its umbrella, has a number of branches with similar programs.

 It's not that some of the technologies aren't useful and can even in some cases benefit the nation or the public. The problem is that the industry has a natural tendency toward abuses.
   Do we really want an agency with a history of constitutional and civil rights abuses to be fiscally self-sufficient?

  The profits from domestic spying go beyond just the NSA.

About 70 percent of the national intelligence budgets are spent on the private sector, as much as $6 Billion a year just for the NSA.

 One of NSA’s most important contractors may be Narus, a subsidiary of Boeing that makes a key telecommunications software that allows government agencies and corporations to monitor huge amounts of data flowing over fiber-optic cables. According to Bill Binney, one of four NSA whistle-blowers who’ve been warning about NSA’s immense powers, one Narus device can analyze 1,250,000 1,000-character emails every second. That comes to over 100 billion emails a day...
  Another major presence at NSA’s Business Park is SAIC. Like Booz, it stands like a private colossus across the whole intelligence industry. Of its 42,000 employees, more than 20,000 hold U.S. government security clearances, making it one of the largest private intelligence services in the world.

 In the world of Washington, companies that live off of taxpayer contracts are also some of the largest political compaign contributors.

The Forever War on Some Terror has now expanded to included ISIS. While most of this war will be fought with bombs being dropped, the NSA will also be gaining a new revenue source.

 A massive, $7.2 billion Army intelligence contract signed just 10 days ago underscores the central role to be played by the National Security Agency and its army of private contractors in the unfolding air war being carried out by the United States and its Gulf States allies against the Islamic State in Iraq and Syria.
  “Army INSCOM supports NSA very heavily,” Tony Shaffer, a former Army intelligence officer, who worked at the command from 1991 to 1995, told Salon. While he was stationed in Afghanistan after the 9/11 attacks, Shaffer said, “Every mission I ran outside the wire was pretty much supported by INSCOM, which is NSA’s ground collector.”

 

  It isn't just the agency itself. It's also the executives that works there. For instance, former head of the NSA and U.S. Cyber Command and Famous Liar Keith Alexander has started his own security consulting firm.

 To capitalize on his recent departure from military intelligence—Alexander retired in March following months of revelations by NSA whistleblower Edward Snowden—the general is offering his security expertise to the banking industry for the fire sale price of $600,000 per month after first asking for $1 million. There are threats everywhere, Alexander warns, and “It would be devastating if one of our major banks was hit, because they’re so interconnected.”
   That may be, but Rep. Alan Grayson (D-Florida) is suspicious that Alexander has anything useful to offer at that price—unless, that is, he’s peddling national security secrets.

What you can do to protect yourself

During any online debate regarding the NSA mass domestic spying, someone will likely declare that you can't defend yourself from the government, and that the only solution is to simply self-censor (aka the "I don't have anything to hide" defense).
   Well that simply isn't true.

 In nine cases in 2013, state police were unable to break the encryption used by criminal suspects they were investigating, according to an annual report on law enforcement eavesdropping released by the U.S. court system on Wednesday. That’s more than twice as many cases as in 2012, when police said that they’d been stymied by crypto in four cases—and that was the first year they’d ever reported encryption preventing them from successfully surveilling a criminal suspect. Before then, the number stood at zero.

Before someone comes out and says, "This is bad because bad guys are getting away with something," remember that America's intelligence agencies like to spy on human rights groups and environmentalists, just to name a few.

  In fact, people that are concerned with their privacy, people who are most likely to use encryption, are some of those being targeted for that reason.

There is a lot of contradictory information about what works and what doesn't work when it comes to protecting your privacy on the internet. Fortunately there is a source of information that can be trusted.
Der SPIEGEL recently analyzed Snowden's leaked NSA documents and this is what they found.

Make no mistake - the NSA considers encryption as a threat. One internal NSA document says, "Did you know that ubiquitous encryption on the Internet is a major threat to NSA's ability to prosecute digital-network intelligence (DNI) traffic or defeat adversary malware?"
Monitoring a document's path is considered "trivial." Recording Facebook chats is a "minor" task. Nevertheless there are several technologies that are difficult or impossible for the NSA to crack.

What works

Tor: This appears to be the only proven way of maintaining anonymity on the internet.

 Tor, otherwise known as The Onion Router, is free and open source software that allows users to surf the web through a network of more than 6,000 linked volunteer computers. The software automatically encrypts data in a way that ensures that no single computer in the network has all of a user's information. For surveillance experts, it becomes very difficult to trace the whereabouts of a person who visits a particular website or to attack a specific person while they are using Tor to surf the Web.

Truecrypt: If you are afraid of a spy agency (or hackers) ever getting ahold of your computer, it appears that you can indeed make it crack-proof.

 The NSA also has "major" problems with Truecrypt, a program for encrypting files on computers.

Off-the-Record (OTR):

 A protocol called Off-the-Record (OTR) for encrypting instant messaging in an end-to-end encryption process also seems to cause the NSA major problems...Transcripts of intercepted chats using OTR encryption handed over to the intelligence agency by a partner in Prism -- an NSA program that accesses data from at least nine American internet companies such as Google, Facebook and Apple -- show that the NSA's efforts appear to have been thwarted in these cases: "No decrypt available for this OTR message."

ZRTP: I've been meaning to try out Signal.

 ZRTP, which is used to securely encrypt conversations and text chats on mobile phones, is used in free and open source programs like RedPhone and Signal. "It's satisfying to know that the NSA considers encrypted communication from our apps to be truly opaque," says RedPhone developer Moxie Marlinspike.

Pretty Good Privacy(PGP): It's amazing that after all these years, GnuPGP is still rock-solid encryption.

 PGP is more than 20 years old, but apparently it remains too robust for the NSA spies to crack. "No decrypt available for this PGP encrypted message," a further document viewed by SPIEGEL states of emails the NSA obtained from Yahoo...One document shows that the Five Eyes intelligence services sometimes use PGP themselves.

Share
up
0 users have voted.

Comments

This essay is a compilation of six diaries from TOP, all of which I just deleted.

BTW, what are the chances of C99P moving up to an https login?

up
0 users have voted.

up
0 users have voted.

"The justness of individual land right is not justifiable to those to whom the land by right of first claim collectively belonged"

you'll need to get an SSL Certificate. That can then be installed and required of all Port 80 connections on WHM.

up
0 users have voted.

Snowden was very courageous, and it is remarkable that he survived the flight into Russia, and his time hiding at the airport (when they voided his passport). He is a true patriot and whistleblower that deserves to be pardoned, and given a hero's welcome in this Country.

But......I am not convinced that he (or any other whistleblower) has changed that much. Obama was finally forced to publicly admit that NSA spying had gone too far, but in terms of policy not much has changed in what they can still do today.

As long as the U.S. Media is controlled by the CIA, and by the crooked Establishment, more public outrage will continue to be directed at the truth tellers and peace-makers, then it ever will be at the actual crimes and corruption and tyranny done by the U.S. Warfare State.

To me the biggest problem in our Country is the U.S. Media. This is what has people believing that just a "lone gunman" removed (peace promoting) Kennedy from the Presidency, that Bush was elected President, that the 9/11 destruction was done by muslim 'hijackers' who couldn't even fly planes (some of whom were found to be still alive), that Iraq had WMDs, that Hugo Chavez is a "Hitler", etc. .. and that it is perfectly normal to for our Country be in a state of Perpetual Global Warfare all over the planet -- and spend Trillions of dollars (that we don't even have) to do it -- while our own Country becomes hopelessly Bankrupt.

We need to have more whistleblowers who call out the U.S. Media on their complicity with this high corruption, high treason, mass insanity, and the selling out of our sovereignty and our Industrial base by the (Global) Oligarchy.

This is also why a Trump Presidency might actually alter the landscape here. He'll call them out. He'll upset the apple cart.

But if Hillary Clinton wins, we'll all be spied on like never before, and there will be no more Wikileaks ....

up
0 users have voted.

Thanks so very much for this!

In case anyone's interested, I'm just listening to the first bit of this 2 & 1/2 hour video before trying for some sleep:

https://www.youtube.com/watch?v=3owk7vEEOvs

NSA Whistleblower William Binney: The Future of FREEDOM

TragedyandHopeMag

Published on 28 Jan 2015

A 36-year veteran of America’s Intelligence Community, William Binney resigned from his position as Director for Global Communications Intelligence (COMINT) at the National Security Agency (NSA) and blew the whistle, after discovering that his efforts to protect the privacy and security of Americans were being undermined by those above him in the chain of command.

The NSA data-monitoring program which Binney and his team had developed -- codenamed ThinThread -- was being aimed not at foreign targets as intended, but at Americans (codenamed as Stellar Wind); destroying privacy here and around the world. Binney voices his call to action for the billions of individuals whose rights are currently being violated.

William Binney speaks out in this feature-length interview with Tragedy and Hope's Richard Grove, focused on the topic of the ever-growing Surveillance State in America.

On January 22, 2015: (Berlin, Germany) – The Government Accountability Project (GAP) is proud to announce that retired NSA Technical Director and GAP client, William "Bill" Binney, will accept the Sam Adams Associates for Integrity in Intelligence Award today in Berlin, Germany. The award is presented annually by the Sam Adams Associates for Integrity in Intelligence (SAAII) to a professional who has taken a strong stand for ethics and integrity. http://whistleblower.org/press/nsa-wh...

And just noticed a reference to Binney in the side comments, in another thread.

up
0 users have voted.

Psychopathy is not a political position, whether labeled 'conservatism', 'centrism' or 'left'.

A tin labeled 'coffee' may be a can of worms or pathology identified by a lack of empathy/willingness to harm others to achieve personal desires.

Many of us had gotten lax about internet use; I hope that will change thanks to your presentation here.

"Everyday in every way, Obama looks worse & worse"

up
0 users have voted.

"The justness of individual land right is not justifiable to those to whom the land by right of first claim collectively belonged"

Unless you can't imagine a single possibility of calling, emailing, or texting something in the future that you wouldn't want intelligence/law enforcement/hackers to read, then we all need to put encryption in our online lives.
Because if you wait until you actually need it, it's already too late.

up
0 users have voted.

of their supercomputers.

up
0 users have voted.
dervish's picture

can just lie to Congress and to the people with absolute impunity. That fact renders Congressional oversight completely meaningless.

up
0 users have voted.

"Obama promised transparency, but Assange is the one who brought it."

BTW, what are the chances of C99P moving up to an https login?

I'll look into it.

up
0 users have voted.

If you shop around, you can get an annually-renewable cert for about $100 +/-. (Then again, being a bit lazy when it comes to this type of thing, as far as my own servers are concerned, I tend to go with "name brands" [GeoTrust, etc.]; but, I'd venture to guess, if you spend some time looking into this, you'll probably find something suitable for significantly less than that, if not free.)

up
0 users have voted.

"Freedom is something that dies unless it's used." --Hunter S. Thompson

but I'm pretty sure a SSL Certificate is included with our VPS package. I'm pretty busy today, I'll have to give them a call which usually entails being put on hold for X amount of time.

I'm also thinking about enabling Cloudflare.

up
0 users have voted.

Thanks JtC

up
0 users have voted.

If I'm not mistaken, GeoTrust was bought out by Symantec, but they still use the GeoTrust(TM) brand.

up
0 users have voted.

"Freedom is something that dies unless it's used." --Hunter S. Thompson

From wikipedia entry on GeoTrust

GeoTrust is a large digital certificate provider. The GeoTrust brand is now owned by Symantec as part of its $1.28 billion acquisition of Verisign's security business in 2010.

History[edit]

The pre-2001 GeoTrust was focused on the B to B exchange market which never materialized. GeoTrust became one of the few startup dotcom companies able to restart in a new direction and to achieve a successful outcome. With GeoTrust's history, several individuals had the title of co-founder. There are founders of the old GeoTrust which started in 1999 and founders of the restarted company in 2001. These may be viewed as two distinct companies with the same name in completely different businesses.[1]

GeoTrust was a restarted company in 2001 that acquired the security business of Equifax. The Equifax business was the basis of its fast growth. The founders of the restarted company were CEO Neal Creighton, CTO Chris Bailey and Principal Engineer Kefeng Chen. Having no previous fund raising experience Creighton, Bailey and Chen used an existing (almost bankrupt) company as the vehicle to acquire the business they had started at Equifax. The buyout of the Equifax certificate business was inexpensive given the final exit price in 2006.[2]

VeriSign acquired GeoTrust on 5 September 2006 for $125 million in cash. The main investor was St. Paul Venture Capital/VesBridge. ACG/ Mass High tech named VeriSign's acquisition of GeoTrust as the sell side deal of the year for 2006.[3]
Symantec acquired the GeoTrust brand in 2010 as part of its $1.28 billion acquisition of VeriSign's security business.

up
0 users have voted.
k9disc's picture

The current glut of info is terrible for looking for needles in haystacks, as the haystack is too big.

But it's terrific for looking for hay on individual needles.

This system is about control over approved messages and over "civil" society. All was fine until Snowden came out and said barbarian things that made society's masters look bad.

This ubiquitous data collection works great with the retroactive permission that the five eyes provides the FISA.

I have been resisting encryption, as I think it's a red flag that I'd not like to trigger. Perhaps I should rethink that.

up
0 users have voted.

“Tactics without strategy is the noise before defeat.” ~ Sun Tzu

Think of it this way;

when it comes to any law enforcement agency (local police, FBI, intelligence agencies, IRS, etc.) who do they generally go after first - the wealthy and protected? or the poor and unprotected?

So when it comes to encryption, who do you think they will target first - the stuff that's hard to crack? or the easy stuff?

up
0 users have voted.
Cant Stop the Macedonian Signal's picture

"If you use Tor, you're obviously guilty of SOMETHING."

If I'm understanding k9 correctly, that's the worry: using encryption=calling attention to oneself.

not saying I've come down on one side or the other of this question, cause I haven't

up
0 users have voted.

"More for Gore or the son of a drug lord--None of the above, fuck it, cut the cord."
--Zack de la Rocha

"I tell you I'll have nothing to do with the place...The roof of that hall is made of bones."
-- Fiver

Yahoo, Google, even Facebook have gone to encryption by default.
If encryption is a red flag, then much of the data on the internet is a red flag.

up
0 users have voted.
Hawkfish's picture

It's amazing what you can figure out from just who knows who...

up
0 users have voted.

We can’t save the world by playing by the rules, because the rules have to be changed.
- Greta Thunberg

Cant Stop the Macedonian Signal's picture

bigotry and guilt-by-association, of course metadata would be your favorite kind of data-mining.

up
0 users have voted.

"More for Gore or the son of a drug lord--None of the above, fuck it, cut the cord."
--Zack de la Rocha

"I tell you I'll have nothing to do with the place...The roof of that hall is made of bones."
-- Fiver

sojourns's picture

Just so you know. The TOR browser which I use often and so does the gov't isn't bullet proof. Exit nodes can be spotted. Also, True Crypt, a great encryption program has not been supported for a couple of years. The creators claiming that there are vulnerabilities, which is bull. It is hard to find but I have a copy of True Crypt 7a.exe for Windows some where in my archives if anyone wants a copy.

Gmail is encrypted from end to end, so they say but who can trust a company that is a member of ALEC? GMX mail offers an email encryption tool.

up
0 users have voted.

"I can't understand why people are frightened of new ideas. I'm frightened of the old ones."
John Cage

Which is a long time.
So it's more like guidelines than a roadmap.

up
0 users have voted.
Shockwave's picture

The longer the key the longer the time to defeat.

And then there is steganography.

Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video.

Great post gjohnsit.

up
0 users have voted.

The political revolution continues

sojourns's picture

After you set up your dummy text file or encrypt your entire drive if you like, you make your pass phrase and then roll the mouse around over an area of the screen and it lengthens the key. The longer you do it the longer the key. You can also elect to use a key file such as an mp3. That's great unless you lose the file.

up
0 users have voted.

"I can't understand why people are frightened of new ideas. I'm frightened of the old ones."
John Cage

GreatLakeSailor's picture

and got this at: http://truecrypt.sourceforge.net/

WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues

This page exists only to help migrate existing data encrypted by TrueCrypt.

The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows XP. Windows 8/7/Vista and later offer integrated support for encrypted disks and virtual disk images. Such integrated support is also available on other platforms (click here for more information). You should migrate any data encrypted by TrueCrypt to encrypted disks or virtual disk images supported on your platform.

up
0 users have voted.

Compensated Spokes Model for Big Poor.

We were looking at Veracrypt, after the TrueCrypt debacle. I looked quite good. The biggest problem, of course, is they're all server processing pigs.

up
0 users have voted.

"Freedom is something that dies unless it's used." --Hunter S. Thompson

Mica Lee has written about this topic several times. Here is a recent article.

I don't see myself going to encrypted email, but here are some easier tips. I put section headings in bold and added a couple of sentences on some of them

I did not put the title of the article in until the end because I didn't want to have people throw up before even looking at what follows

Some tips

Use a strong password

Do not use a weak password

Use a unique password for each application

Last year, when I asked National Security Agency whistleblower Edward Snowden what ordinary people could do to improve their computer security, one of the first pieces of advice he gave was to use two-factor authentication. If Podesta had enabled it on his Gmail account, you probably wouldn’t be reading his email today.

Do it right this second

Google handles all of the email for hillaryclinton.com

Watch out for phishers

Encrypt your email

All of the previous tips are aimed at keeping your email account secure. But even if you follow all of the security best practices, it’s still possible that your email could get compromised. For example:

Alternately, use an encrypted messaging app instead of email

Don’t listen to the wrong people

DEAR CLINTON TEAM: WE NOTICED YOU MIGHT NEED SOME EMAIL SECURITY TIPS

up
0 users have voted.

link

One of the reforms designed to rein in the surveillance authorities of the National Security Agency has perhaps inadvertently solved a technical problem for the spy outfit and granted it potential access to much more data than before, a former top official told ABC News.

Before the signing of the USA Freedom Act in June 2015, one of the NSA's most controversial programs was the mass collection of telephonic metadata from millions of Americans — the information about calls, including the telephone numbers involved, the time and the duration but not the calls' content — under a broad interpretation of the Patriot Act's Section 215. From this large "haystack," as officials have called it, NSA analysts could get approval to run queries on specific numbers purportedly linked to international terrorism investigations.

up
0 users have voted.

Nothing I will ever be able to post can compare to this. I may never start another thread again.

I don't care if it is four posts strung together. It's incredible. THANK YOU.

But....did Snowden change everything? Snowden proved to us that the Fourth Amendment had been written out of the Constitution. In response, a relatively few (Americans) held a couple of relatively poorly attended demonstrations, a healthy number encrypted and then...?

Bill of Rights, anyone? Anyone? Anyone?

Meanwhile, in response, Obama and DiFi (fronting for Obama) tried to write Freedom of the Press out of the Constitution, too, by pretending government has some sort of lawful right to spy on journalists to try to figure out who their sources are and to define who or what is a "Publisher."

I mean, here's this relatively young guy who does something he knows will cost him his life as he knew it maybe for the rest of his life and....? Not his fault. It's ours.

up
0 users have voted.

TPTB want you to believe that they can and have the ability to do this:

... the Fourth Amendment had been written out of the Constitution...

but they have/are only purchased traitors to their oaths to uphold the US Constitution and who are in contravention of the most basic principles of US law.

Criminals getting away with crime cannot legally alter Constitutional law by ignoring/contravening it, and those abusing the guaranteed rights of the people are criminals whether charged and held to account yet or not.

We cannot accept their framing, as they wish us to do, to passively accept these crimes as 'done deals' therefore 'necessarily' left to stand, as though any bank robber running loose is then entitled to his haul by getting away with it at the time and therefore to become ever more rich and powerful through 'accepted' theft and violence by the lucky escapee.

Instead, the criminal acts must be recognized, protested and treated as such.

Change must come through the torch-flames and pitchforks at the bottom, before a real hell on Earth is finalized and life perishes from the world.

up
0 users have voted.

Psychopathy is not a political position, whether labeled 'conservatism', 'centrism' or 'left'.

A tin labeled 'coffee' may be a can of worms or pathology identified by a lack of empathy/willingness to harm others to achieve personal desires.

I learned one thing already today. I'm pretty ignorant when it comes to this stuff. I keep my passwords long and change them often but this appears to not be near enough to protect my banking and a small online business I have. So if I start using encryption what do you all recommend? Is this how the "lifeLock" company works, on encryption? (the guy that had his identity stolen BTW). Does this slowdown your computer or to put it simply, is it a pain in the ass to set up and use? I know a bigger pain in the ass would be to have my identity ripped off.

up
0 users have voted.
Granma's picture

The guy that started that company stole identities. And I've read people saying (maybe here) that they paid for that, had their identity stolen, and the company was no help at all. I think it may be mostly a scam to get you to hand over $20 a month to Lifelock.

up
0 users have voted.

that I do. I think I would rather throw my 2nd hand laptop in the garbage than try and figure out all the above. I am very grateful for you who have taken the time to educate us on the hazards our government, and those favored by government, has placed on our use of the internet, but...

up
0 users have voted.

"The justness of individual land right is not justifiable to those to whom the land by right of first claim collectively belonged"

Thanks, duckpin, I don't feel so alone now, although I must confess to knowing less than nothing about computers and coding...

up
0 users have voted.

Psychopathy is not a political position, whether labeled 'conservatism', 'centrism' or 'left'.

A tin labeled 'coffee' may be a can of worms or pathology identified by a lack of empathy/willingness to harm others to achieve personal desires.

Granma's picture

You can use strong passwords and different ones for different sites. That will be a good start and it is better than nothing. Later on, perhaps there will be another simple thing you want to do.

We are all in different places both in our need for security, and our ability to cope with technical stuff. When the list is long, there is something for many users, from elementary to advanced. But everyone starts at the beginning with one small change. If you don't need/want to do any more than that, that is okay. You have still increased your security/privacy level.

And I'm not going to do all those things either, because I can't. I'll do the ones I can, one at a time and not worry about it.

up
0 users have voted.