June 11, 2013
Protect yourself: Mobile and internet activity.Protect yourself: Mobile and internet activity. Photo: Michel O’Sullivan

If you have followed the startling revelations about the scope of the US government’s surveillance efforts, you may have thought you were reading about the end of privacy. But even when faced with the most ubiquitous of modern surveillance, there are ways to keep your communications away from prying eyes.

A new frontier of sweeping secret surveillance is not a conspiracy theory but a burgeoning reality.

First, instead of browsing the internet in a way that reveals your IP address, you can mask your identity by using an anonymising tool such as Tor or by connecting to the web using a Virtual Private Network, or VPN.

Additionally, you can avoid Google search by using an alternative such as Ixquick, which has solid privacy credentials and says it does not log any IP addresses or search terms or share information with third parties.

Advertisement

When it comes to sending emails, if you are using a commercial provider that has been linked to the PRISM spy initiative, you can throw a spanner in the NSA‘s works by learning how to send and receive encrypted emails. PGP or its free cousin GPG are considered the standard for email security, and these can be used to both encrypt and decrypt messages – meaning you can thwart surveillance unless you are unlucky enough to have Trojan spyware installed on your computer.

Novice computer users learning how to use PGP or GPG may find it daunting at first, but there are plenty of tutorials online for both Mac and Windows users that can help guide you through the process. For journalists working with confidential sources, attorneys seeking to ensure attorney-client privilege, or others whose work requires secure communications, learning how to use PGP or GPG is an absolute necessity. Organisations seeking to protect themselves from email grabs could go one step further: they could take more control of their messages by setting up their own email server instead of relying on a third-party service, helping ensure no secret court orders can be filed to gain covert access to confidential files. And if you need to store private documents online, you can use Cloudfogger in conjunction with Dropbox.

For instant messaging and online phone or video chats, you can avoid Microsoft and Google services such as Skype and G chat by adopting more secure alternatives. Jitsi can be used for peer-to-peer encrypted video calls, and for encrypted instant message chats you can try using an “off the record” plugin with Pidgin for Windows users or Adium for Mac. Like using PGP encryption, both Pidgin and Adium can take a little bit of work to set up – but there are tutorials to help ease the pain, such as this for setting up Adium and this tutorial for Pidgin.

As for phone calls, if you want to shield against eavesdropping or stop the NSA obtaining records of who you are calling and when, there are a few options. You could use an encryption app such as Silent Circle to make and receive encrypted calls and send encrypted texts and files, though your communications will be fully secure only if both parties to the call, text or file transfer are using the app. Other than Silent Circle, you could try RedPhone (Android and iOS) for making encrypted calls or TextSecure for sending encrypted texts.

A new frontier of sweeping secret surveillance is not a conspiracy theory but a burgeoning reality. But it is not an Orwellian dystopia – at least, not yet. Tools to circumvent government monitoring exist and are freely available. The onus is on us as individuals to learn how to use and adopt them.

Read more: http://www.smh.com.au/digital-life/consumer-security/how-to-shield-your-calls-and-internet-activity-from-government-surveillance-20130611-2o1bg.html#ixzz2VynaHfTa