6 Tips for Protecting Your Communications From Prying Eyes
In an age of ubiquitous surveillance, there are still some things you can do to keep your communications private—and not all of it is high-tech.
6 Tips for Protecting Your Communications From Prying Eyes
By Julia Angwin / propublica.org
Jun 18, 2015

It's easy to feel hopeless about privacy these days.

In the post-Snowden era, we have learned that nearly every form of communication-from emails, phone calls, to text messages – can leave a digital trace that can and likely will be analyzed by commercial data-gatherers and governments.

Here are some ways to keep those communications private. While these tips were designed for journalists and confidential sources, they're just as useful for protecting any private communications, such as a conversation between family members, or a confidential business dealing.

Some tactics are more difficult than others, but the good news is that not all of them require technical skills. The key is to figure out your communication strategy. First, decide if you are trying to hide WHO you are talking to (metadata) or WHAT you are talking about (content), or BOTH.

In each case, there are both high-tech and low-tech ways to evade surveillance.

If you are trying to mask WHO you are talking to, consider three tactics that I call ACE — which stands for "Add Noise, Cloak or Evade."

A high-tech way to add noise online is to use Tor Web browser which bounces your Internet traffic around to a bunch of locations so that the website you arrive at doesn't know where you are coming from.

You could also add noise in a low-tech way. If, for instance, you are a journalist calling a source in the mayor's office, you could also call everyone in the office, too. That protects the source from being the only one with a record of a call with you. (However, you should talk for a short time and set up another means of communications to avoid creating a data trail of a long conversation).

  • Add noise means fuzzing the metadata by adding false connections or false content to the communications.

Another way to mask who you are talking to is to set up new accounts – whether it is email, instant messaging or a cellphone – using alternate identities.

For these disposable online accounts, it's best to use Tor when setting up a disposable email (instructions here) or instant messaging account (instructions here for Windowsand Mac) so that your location is not revealed during the setup and use of the account.

For disposable cellphones, also known as burner phones, the best practice is to buy them in cash in a location not close to your usual work and home (because your location is a very distinctive giveaway). Give one to your correspondent and set up a time in which you will each go to a location that is not on your usual route in order to make the call.

  • Cloak means using alternate identities.

This usually means meeting in person, and turning off your phones (or, even better, leaving your phone at home) so there is not a record of your phones being in the same place. The challenge is to avoid using digital forms of communication to arrange the in-person meeting.

  • Evade means avoiding metadata collection.

If you are trying to mask WHAT you are talking about, I suggest three strategies that I call HEM — which stands for "Hide, Encrypt or Mask." 

Hiding content can be as low-tech as hiding a USB stick in your pocket (as long as you are not going through a border or airline inspection).

Or it can be as high-tech as creating a hidden volume of encrypted content on your computer (a program called TrueCrypt offers this feature) that is not detectable to a person inspecting your computer.

  • Hide means hiding the existence of the content, by placing it in a secret compartment either physically or digitally.

Encryption scrambles your messages in ways that are extremely difficult for even the most powerful computers to break.

In the post-Snowden era, new encryption services seem to be sprouting every month. To sort out the best services, we ranked many of them last year in a joint project with the Electronic Frontier Foundation.

For encrypted communications to work, both parties must install the same software - whether it is the encrypted iPhone app Signal for text messages and voice, calls or the widely used GPG software for email encryption. (Instructions here for Mac and Windowsusers).

  • Encrypt means to make content unreadable to outsiders using cryptographic techniques.

Known as steganography, this is the art of hiding a message in plain sight. For example, a teenager may post a song lyric to her Facebook page, which conveys a certain meaning to her friends, but is impenetrable to her parents.

For this to work, both parties must agree on the meaning of their messages in advance - whether it is using code words or physical symbols - such as the famous flower pot on the balcony that "Deep Throat" apparently moved when he wanted to signal a request for a meeting with journalist Bob Woodward.

  • Mask means disguising the content as an innocuous other type of content.

Known as steganography, this is the art of hiding a message in plain sight. For example, a teenager may post a song lyric to her Facebook page, which conveys a certain meaning to her friends, but is impenetrable to her parents.

For this to work, both parties must agree on the meaning of their messages in advance - whether it is using code words or physical symbols - such as the famous flower pot on the balcony that "Deep Throat" apparently moved when he wanted to signal a request for a meeting with journalist Bob Woodward.


This is the latest in a series we've done about how to protect your privacy. This post is based on a tip sheet that I prepared for a panel discussion about how journalists can communicate securely with sources at the 2015 Investigative Reporters and Editors Conference


Julia Angwin is a senior reporter at ProPublica. From 2000 to 2013, she was a reporter at The Wall Street Journal, where she led a privacy investigative team that was a finalist for a Pulitzer Prize in Explanatory Reporting in 2011 and won a Gerald Loeb Award in 2010

0.0 ·
0

Support Films For Action

Films For Action empowers citizens with the information they need to help create a more just, sustainable, and democratic society.

We receive no government or corporate funding and rely on our supporters to keep us going. ​

Donate today

 

Join Team Transition

Create an account on Films For Action and join our growing community of people who want to change the world!

Add videos, articles and more. Rate member content. Our library is powered by you.

Trending Today
What If Everything You Knew About Disciplining Kids Was Wrong?
Katherine Reynolds Lewis4,737 views today ·
How Swedes and Norwegians Broke the Power of the ‘1 Percent’
George Lakey3,911 views today ·
Cultural Appropriation: Whose Culture Is It Anyway, and What About Hybridity?
Sonny Hallett2,466 views today ·
The Silencing of Dissent
Chris Hedges1,133 views today ·
Deliver Us From Venus and Mars: Why Aren’t We Free From Gender Stereotypes Yet?
Gavin Evans1,006 views today ·
This Facebook Comment About the UK Election Is Going Viral
Chris Renwick923 views today ·
Elder Explains the Origins of the First Nation Seven Teachings
11 min900 views today ·
Have You Heard of The Great Forgetting? It Happened 10,000 Years Ago & Completely Affects Your Life
Daniel Quinn844 views today ·
Don’t Be Scared About the End of Capitalism—Be Excited to Build What Comes Next
Jason Hickel and Martin Kirk838 views today ·
Load More
Join us on Facebook
6 Tips for Protecting Your Communications From Prying Eyes