Four Ways to Escape the NSA Dragnet
By Nick Pearson / yesmagazine.org

Start by switching to an alternative search engine, using an alias on Facebook, and supporting allied nonprofits.

The PRISM scandal confirmed our worst fears when it comes to state-level surveillance of the Internet, with the revelation that the NSA has created "backdoors" into major online services such as Google, Facebook, and Yahoo. These backdoors allegedly give intelligence agencies around the world access to user emails, Facebook posts, search queries, web history, and more, with little or no judicial oversight. For many, PRISM represents a violation of the 4th Amendment and is a sign that the government is heading down an increasingly totalitarian route when it comes to Internet surveillance.

Using a false Facebook name is common in parts of Europe.

But while the debate over PRISM continues to rage, the question remains: What can you do to take better control of your personal information and reclaim your online privacy? Staying completely anonymous online is incredibly difficult, but there are numerous tools and best practices you can use to gain a large degree of control over who has access to your personal data.

Remember, a lot of this stuff will mean sacrificing convenience for privacy, so some of these suggestions may take a bit of time and effort. In the end, you have to find the balance that works best for you.

1. Use a search engine that respects your privacy

With the two biggest search engines—Google and Bing—caught up in the PRISM scandal, how can you avoid search queries ending up on the NSA's servers? There are two main ways. First, you can still use Google and Bing without logging into your account, which means your searches won't be linked to your account. However, your queries will still be tracked via cookies, which are small files that get stored on your browser when you access a website. Cookies are typically used by Google to track your search habits and deliver personalized search results and advertisements.

The second option is to forget Google and use a privacy-orientated search engine. DuckDuckGo is probably the most popular. It doesn't store search information, doesn't use cookies, and doesn't personalize search results. Another alternative is the privacy-focused StartPage search engine, which uses Google search results but strips all identifying information from your query and submits it anonymously.

Of course, if these alternatives become very popular, then it's reasonable to assume the NSA will be interested in monitoring them also.

2. Set boundaries for Facebook

Facebook has become an important part of our social lives and has become the de facto platform to upload pictures, join online groups, and share personal information. But Facebook retains records of user activity for commercial use, and also provides data to the NSA, according to documents leaked by former security contractor Edward Snowden.

If you're worried about the security of your information stored with Facebook, the easiest solution is to deactivate your account. But if this is too extreme, then focus on limiting the amount of personal information made available to potential snoopers. In short, don't submit any information you're not comfortable sharing with the world.

Due to the supposed existence of "Dark Profiles" (which allegedly track and store data on Internet users who aren't even on Facebook), some believe the best way to minimize the impact of Facebook on your privacy is to supply the platform with false information, rather than deactivating your profile. At a basic level, this can mean simply changing your name (using a false Facebook name is common in parts of Europe), and can extend to supplying false information about your location and the things you "Like."

Facebook also uses cookies and other tracking tools to monitor what websites you visit in order to serve you relevant ads and shares data with a number of applications and websites via the Facebook Platform. To avoid this, you can use a browser extension such as Facebook Disconnect, which blocks the flow of information from third-party sites to Facebook's servers, along with a cookie blocker for your browser such as Ghostery, which tells you exactly which advertising companies are tracking your activity.

3. Pick a privacy-conscious email provider

Finding web-based alternatives to Gmail, Yahoo Mail, and Hotmail is thankfully easier than finding alternatives to social networks. Some of the more notable privacy-orientated email platforms include RiseUp, GuerillaMail, Rediff and HushMail (although HushMail has faced some controversy in the past). Just remember that if you email someone with a Gmail, Hotmail, or Yahoo address, then that email will end up on those companies' servers and will be subject to privacy risks there.

The other option is to encrypt your emails using a tool such as Pretty Good Privacy or GNU Privacy Guard. Encryption is an effective way to secure the contents of your emails. But it can be slightly complicated to set up and whoever receives your encrypted emails will need to use software to decrypt the contents. For more about email encryption, take a look at this guide by the Electronic Frontier Foundation.

3. Protect your IP address

An Internet Protocol address, or IP address, is an identifier assigned to a device such as a laptop or smartphone that's connected to a network of devices that uses the Internet Protocol for communication (i.e., "the Internet"). Any website or service you connect to will usually be able to see your IP address. This will tell them roughly where in the world you are located.

Some people who are serious about online privacy will combine a VPN with TOR, creating multiple layers of protection.

Your Internet Service Provider, or ISP, also tracks your IP address, which is linked to your account and therefore your home address. By tracking the IP address, your provider will typically know what websites you've connected to and when you connected to them. It will also know when you've sent emails and who received them. This information is what we usually call "metadata." In Europe it is currently mandatory for all ISPs to store this information on their customers. In the United States, things are more complicated. There are no mandatory data retention laws for ISPs. But—as this document revealed a couple of years ago—most ISPs in the U.S. voluntarily retain customer metadata anyway, in order to help law enforcement. But there are a few services you can use to enhance the security of this information.

One of the most popular ways to protect your IP address is The Onion Router, or TOR, a free-to-use anonymization tool. TOR works by rerouting your Internet traffic via different "nodes" set up all over the world. This masks your IP address and makes it appear as if you're accessing the Internet from a different location. TOR is generally considered very secure. However, it does have some vulnerabilities, as traffic can be monitored at exit nodes, which anyone (including the NSA) can do. Also, your Internet speed will take a hit.

After TOR, a commercial Virtual Private Network, or VPN, is probably the most popular way to shield your IP address (full disclosure: I work for the VPN company IVPN). A commercial VPN company sets up its own servers in different locations across the world and lets customers reroute their traffic via these servers, so it appears that their traffic is coming from a different location.

There are lots of VPN companies out there and many of them—especially the bigger ones—do not offer a genuine privacy service, because they log metadata in the same way an ISP does. But there are also plenty of VPNs that take privacy seriously. The main benefit of a commercial VPN over TOR is that you can expect much faster connections. The main drawback is that you have to trust that the VPN company is actually protecting your privacy. Some people who are serious about online privacy will combine a VPN with TOR, creating multiple layers of protection.

 

4. Support online activism

If you care about protecting online freedoms and privacy, you may find organizations that work on these issues worth supporting. As shown by the successful protests against SOPA, ACTA, and CISPA—acts that would have limited Internet freedoms—online activism can sway the opinion of legislators who often have little understanding of how the Internet works.

For more information on online privacy check out the Electronic Frontier Foundation, the Open Rights Group, EPIC and the ACLU.

 


 

Nick Pearson is the founder and CEO of IVPN. He has 15 years experience in information security with experience across telecommunications and government sectors.

3.5 ·
1
What's Next
Trending Today
Dakota Access Pipeline Permit Denied
Nika Knight · 5,128 views today · 'For the first time in Native American history, they heard our voices.'
90 Inspiring and Visionary Films That Will Change How You See the World in Profound Ways
Tim Hjersted · 4,131 views today · The world today is in crisis. Everybody knows that. But what is driving this crisis? It's a story, a story that is destroying the world. It's a story about our relationship to...
93 Documentaries to Expand Your Consciousness
Films For Action · 3,544 views today · There are over 800 documentaries now cataloged in our library of social change films. That's probably way too many for any mortal to ever watch in a lifetime, let alone a few...
Why Are Media Outlets Still Citing Discredited 'Fake News' Blacklist?
Adam Johnson · 3,262 views today · The Washington Post (11/24/16) last week published a front-page blockbuster that quickly went viral: Russia-promoted “fake news” had infiltrated the newsfeeds of 213 million...
How Romanticism Ruined Love
5 min · 1,997 views today · The set of ideas we can call Romanticism is responsible for making our relationships extremely difficult. We shouldn’t give up on love; we should just recognize that it’s more...
The Orwellian War on Skepticism
Robert Parry · 1,876 views today · Official Washington’s rush into an Orwellian future is well underway as political and media bigwigs move to silence Internet voices of independence and dissent, reports Robert...
Projext X: Using Leaked Documents to Reveal the NSA's New York Spy Hub, Hidden in Plain Sight
10 min · 1,859 views today · A top-secret handbook takes viewers on an undercover journey to Titanpointe, the site of a hidden partnership. Narrated by Rami Malek and Michelle Williams, and based on...
Today I Rise: This Beautiful Short Film Is Like a Love Poem For Your Heart and Soul
4 min · 1,746 views today · "The world is missing what I am ready to give: My Wisdom, My Sweetness, My Love and My hunger for Peace." "Where are you? Where are you, little girl with broken wings but full...
Where Do You Draw the Line? (2016)
60 min · 1,529 views today · Why is the Ecuadorian government proposing to extract oil in an area frequently classified by ecologists as one of the most bio-diverse rainforest regions left intact on earth?...
Twelve Things To Remember After The US Election, From Front Line Organizers
Bill Quigley · 1,376 views today · When you find yourself in a suddenly darkened room, what do you do?   Some rush blindly to where they think the door might be.  Others stand still, let their eyes get...
John Lennon's "Imagine," Made Into a Comic Strip
John Lennon. Art by Pablo Stanley · 1,019 views today · This is easily the best comic strip ever made.  Pabl
Law Professor's Epic Response to Black Lives Matter Shirt Complaint
Social Design Notes · 946 views today · A first year law school student wrote a complaint about her professor having worn a Black Lives Matter T-shirt during class. The professor’s response is priceless. Scans of...
Lifting the Veil:  Obama and the Failure of Capitalist Democracy (2011)
114 min · 927 views today · This film explores the historical role of the Democratic Party as the "graveyard of social movements", the massive influence of corporate finance in elections, the absurd...
The Fight for Clean Water (#NoDAPL)
2 min · 877 views today · Clean water or Corporate profits? What’s more important? #NoDAPL Energy Transfer Partners: (214) 981-0700 U.S. Army Corps Of Engineers: (202) 761-0010; (202)...
United Natures: a United Nations of all Species (2013)
103 min · 707 views today · United Natures explores the Rights of Mother Earth, Environmental Philosophy, Wisdom, Spirituality and the potential for a Neo-indigenous future for humanity. Directed and...
How Mindfulness Empowers Us
2 min · 696 views today · Many traditions speak of the opposing forces within us, vying for our attention. Native American stories speak of two wolves, the angry wolf and the loving wolf, who both live...
Social Media Echo Chambers: Here's How Most of Us are Living in One
2 min · 673 views today · Americans are blocking out the friends and news sites that won't confirm their views.
This Short Film Plays Out Like an Epic Movie That Will Shake Your Soul - But the Movie Is Real, and We are The Actors
6 min · 530 views today · For next year, we need a resolution capable of confronting the crisis we face, and making a future worth fighting for. This short film looks back on the crisis and confusion...
What Makes Call-Out Culture So Toxic
Asam Ahmad · 483 views today · Call-out culture refers to the tendency among progressives, radicals, activists, and community organizers to publicly name instances or patterns of oppressive behaviour and...
Dreaming Beyond Capitalism: a Culture Without Fear
Martin Winiecki · 424 views today · In the 1990s an unusual encounter took place in the Ecuadorian Amazon. In plant rituals, shamans of the Achuar, a tribe living in pristine forest that had never been in touch...
Load More
Like us on Facebook?
Four Ways to Escape the NSA Dragnet