3 Ways To Avoid NSA Detection On The Internet

Internet privacyOff the Grid News – by Daniel Jennings

We unfortunately live in the age of surveillance, when agencies like the  NSA and FBI push and cross the boundaries of unconstitutional actions.

This means that everybody needs to take steps to protect their data and. Obviously, there is no such thing as total protection, and a determined individual or organization with a lot of time and money on their hands can break any security if they want.  

But you can make your data and communications so hard to access on the Internet that it will deter the bad guys. The harder it is to access your information, the more likely hackers, spies and other cyber pests will go elsewhere.

Protect Your Data

The best way to deter these interlopers is by putting up several layers of protection, the cyber equivalent of a multi-layered defense. Here are some Internet defenses that work:

1. Encryption. Here’s a quote from somebody who knows a lot about cyber security and how to get around it: ex-NSA hacker Edward Snowden: “Encryption works. Properly implemented, crypto systems are on one of the few things you can rely upon.” Encryption simply means scrambling information so it’s hard to decode. Governments have been doing it for well over a century and the good news is that there are encryption software programs anybody can take advantage of. They include:

  • Tor Browsers which let users send encrypted data on PCs and laptops, Android devices or iPhones.
  • Red Phone which lets you send encrypted voice communications between two Android phones. Both users have to deploy the app to get the protection.
  • Text Secure which lets you send encrypted text communications over Android phones.
  • PGP or Pretty Good Privacy — a commercial product available from a company called Symantec. It isn’t perfect but it will protect you from amateur hackers and most criminals. There are also some free open-sourced variations of this product available including one for Windows.
  • There are also encrypted mail services such as Hushmail.com and Silent Circle. The problem is that these organizations can be forced to divulge data to the FBI or NSA through court orders. A similar service called Lavabit was forced to shut down because it refused to give the FBI access to Edward Snowden’s email account.
  • Experts believe that the best method is to use two or three encrypted services. A system calledSTARTLS is hard to track. All the information on services that use these is encrypted.
  • Some more alternatives are coming. The governments of nations like Germany and Brazil are talking about setting up encrypted email services for their citizens, and in the future it might be possible for Americans to take advantage of those. There are also foreign email systems such as NEOMAILBOX which is based in neutral Switzerland. The Swiss have a long history of protecting privacy including that of American citizens.

2. Use HTTPS as much as possible. While many websites you surf use “HTTP,” the alternative HTTPS – used by such websites as banks and financial institutions – encrypts the data, making it much harder to hack. Use a browser plug-in called HTTPS Everywhere to help.

3. Avoid services from companies known to cooperate with the NSA and FBI. This includes Google GmailHotmail, Twitter, AOL, Yahoo, Skype, Apple and other large American technology companies.

This White Paper from the Press Freedom Foundation provides more advanced information. It mentions some of the techniques that journalists like Glenn Greenwald use to protect their data. In today’s world everybody is going to have to follow some of these steps to protect their privacy.

Meanwhile, computer programmer John McAfee says he plans on releasing a $100 anti-NSA device called “D-Central” that will protect citizens from detection. Off The Grid News will monitor its release date.


8 thoughts on “3 Ways To Avoid NSA Detection On The Internet

    1. I really do not think that it can be done either #1. Just like phones, and those GPS`s on cars and cell phones, etc..

      1. I’ll agree with both of you. The Matrix is what it is. Besides, I don’t have the expendable money it takes to change things around from the set up I have. Unless of course … I find a way to leave the country.
        . . .

  1. PGP got a pretty good shot in the arm when it was revealed that a alleged paedophile who encrypted his laptop harddrive with it who was put in prison for contempt for refusing to give his password, that the FBI and NSA spent 5 years plus to little avail and the drive remained locked, can’t remember the source but it did pop up on WRH a few times updating it.

    But what of now with Symantec owning PGP? Symantec does work with governments, are they to be trusted when they could potentially offer a private bypass key to the dark side? All the locks in the world are never going to be secure if someone can be given a master key that opens all.

    What other people forget too is that all this stuff is totally useless thanks to the Windows identifier that no one thinks about, they run about in Tor and this and that but as soon as they surface, a simple query identifies your machine through this simple key, if you are going to go underground on the net, don’t use Windows whatsoever whether to connect, surf or otherwise, use a Linux or other free language and close all the hatches on it.

    What is proving the bane of them, the dark side is the cheap tablets and phones, all the will in the world to know what you are doing is negated if they cannot link you to a machine, a location, an account, its going to be pretty hard to tell who you are sitting in a McD’s free wifi zone, on your bought over the counter for cash $35 tablet and it is this very thing that proves the lies being used because the criminals and dodgy people out there use this already, it is you and I the law abiding citizens that are targetted because we participate, the criminals step outside of the network and so we spend billions to persecute ourselves.

  2. Hack away, NSA. You won’t find my name, or any other identifying information anywhere in this computer.

    Use one computer for internet access, and keep it empty.

Join the Conversation

Your email address will not be published. Required fields are marked *