Welcome to ECCIE, become a part of the fastest growing adult community. Take a minute & sign up!

Welcome to ECCIE - Sign up today!

Become a part of one of the fastest growing adult communities online. We have something for you, whether you’re a male member seeking out new friends or a new lady on the scene looking to take advantage of our many opportunities to network, make new friends, or connect with people. Join today & take part in lively discussions, take advantage of all the great features that attract hundreds of new daily members!

Go Premium

Go Back   ECCIE Worldwide > General Interest > The Political Forum
test
The Political Forum Discuss anything related to politics in this forum. World politics, US Politics, State and Local.

Most Favorited Images
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
Most Liked Images
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
Top Reviewers
cockalatte 646
MoneyManMatt 490
Still Looking 399
samcruz 399
Jon Bon 396
Harley Diablo 377
honest_abe 362
DFW_Ladies_Man 313
Chung Tran 288
lupegarland 287
nicemusic 285
You&Me 281
Starscream66 279
George Spelvin 265
sharkman29 255
Top Posters
DallasRain70795
biomed163285
Yssup Rider61006
gman4453295
LexusLover51038
offshoredrilling48665
WTF48267
pyramider46370
bambino42682
CryptKicker37220
The_Waco_Kid37077
Mokoa36496
Chung Tran36100
Still Looking35944
Mojojo33117

Reply
 
Thread Tools
Old 06-15-2013, 12:17 AM   #1
CuteOldGuy
Valued Poster
 
CuteOldGuy's Avatar
 
Join Date: May 20, 2010
Location: Wichita
Posts: 28,730
Encounters: 20
Default How to Keep Your Government from Spying on You, Or at least make it more difficult.

Practical advice you can use. It won't be perfect, or 100%, but at least make them work for it.

“Does the [National Security Agency] collect any type of data at all on millions or hundreds of millions of Americans?” Sen. Ron Wyden (D-Ore.) asked James Clapper, the director of national intelligence, during a Senate Intelligence Committee hearing in March. Clapper replied, “No sir...not wittingly.”

We now know that was a bald-faced lie. Or as Clapper nicely parsed it later, it was the “least untruthful” statement. The NSA has been collecting telephone and telecommunications data from tens of millions of Americans for years now.

The idea is that this data is collected but no federal spook actually looks at it unless additional information—say, a letter from Russia warning about a couple of Chechens living Boston—prompts them to winnow the data seeking connections that might indicate a person is up to no good. But it hasn't worked out that way. Christopher Soghoian, a policy analyst at the American Civil Liberties Union, likens the situation to having someone tell you that he wants to put a video camera in your bedroom but will not actually look at the stored video unless something bad happens later.

The NSA was able to obtain all that personal information about American citizens because the dominant Internet business model is to exchange free services for personal information that enables targeted advertising. When I interviewed Soghoian, he suggested that the free market has delivered us into a world that is insecure by default. But when I pointed out that Verizon and the other telephone companies are highly regulated semi-monopolies, Soghoian agreed, noting that the phone companies are subject to more regulation that Internet companies like Google or Facebook. That gives the government more opportunities for punishing them should they be recalcitrant when it comes to government demands. Soghoian added that the telephone industry has been practicing surveillance for 100 years already.

Seeking information on the nuts and bolts of technical steps that citizens might take to shield themselves from electronic snooping by the government, I talked with Mark Wuergler, a senior security researcher at the cybersecurity firm Immunity, Inc. “I have bad news for the average citizen,” Wuergler told me: In order to avoid monitoring by the government, citizens need to have control over their own hardware, networks, and servers and use encryption ubiquitously. He’s pretty certain that currently available methods for trying to maintain data privacy and security are so clunky and complicated that most Americans will simply not bother trying to use them. “It boils down to less convenient more secure; more convenient less secure,” Wuergler said. “You just need to assume that your data is being watched.”

Assuming that your data is being watched, what might you do to hide it?

First, consider not putting so much stuff out there in the first place. Wuergler devised a program he calls Stalker that can siphon off nearly all of your digital information to put together an amazingly complete portrait of your life and pretty much find out where you are at all times. Use Facebook if you must, but realize you’re making it easy for the government to track and find you when they choose to do so.

A second step toward increased privacy is to use a browser search engine like DuckDuckGo, which does not collect the sort of information—say, your IP address—that can identify you with your Internet searches. Thus, if the government bangs on their doors to find out what you’ve been up to, DuckDuckGo has nothing to hand over. I have decided to make DuckDuckGo my default for general browsing searching, turning to Google only for items such as breaking news and scholarly articles. (Presumably, the NSA would be able to tap into my searches on DuckDuckGo in real time.)

Third, TOR offers free software and a network of relays that can shield your location from prying eyes. TOR operates by bouncing your emails and files around the Internet through encrypted relays. Anyone intercepting your message once it exits a TOR relay cannot trace it back to your computer and your physical location. TOR is used by dissidents and journalists around the world. On the downside, in my experience it operates more slowly than, say, Google.

Fourth, there is encryption. An intriguing one-stop encryption solution is Silent Circle. Developed by Phil Zimmerman, the inventor of the Pretty Good Privacy encryption system, Silent Circle enables users to encrypt their text messages, video, and phone calls, as well as their emails. Zimmerman and his colleagues claim that they, or anyone else, cannot decrypt our messages across their network, period. As Wuergler warned, this security doesn’t come free. Silent Circle charges $10 per month for its encryption services.

You might consider encrypting the data stored on your computer using the free encryption software offered by TrueCrypt. If you keep data in the cloud, you might use SpiderOak, which bills itself as a “zero-knowledge” company. That means it does not have any way to decrypt the data you store with it. However, SpiderOak will provide personally identifiable information about users to law enforcement if required to do so by law. The company offers two gigabytes of free storage for beginners.

With regard to encrypting data, you should keep in mind a recent case, United States v. Fricosu. Ramona Fricosu was accused of mortgage fraud. Asserting Fifth Amendment protections against self-incrimination, Fricosu refused to provide prosecutors with the password to her encrypted computer. A federal judge ordered her to provide the password or supply a decrypted hard drive to the police. She claimed to have forgotten the password, but her husband offered the police some plausible possibilities, one of which worked.

Now for some bad news. Telephone metadata of the sort the NSA acquired from Verizon is hard—read: impossible—to hide. As the ACLU’s Soghoian notes, you can’t violate the laws of physics: In order to connect your mobile phone, the phone company necessarily needs to know where you are located. Of course, you can avoid being tracked through your cell phone by removing its batteries (unless you have an iPhone), but once you slot it back in, there you are.

For lots more information on how to you might be able to baffle government monitoring agencies, check out the Electronic Frontier Foundation's Surveillance Self-Defense Web pages.

Wuergler is sanguine about NSA snooping. “To me personally, I think it’s an acceptable risk,” he told me. “I believe that it’s not being used on a mass basis against American citizens. At least I hope not.” I hope not, too. But in the meantime, I want to rely on something more than hope when it comes to reining in government power.


I personally use startpage.com as my default search engine. They don't keep track of any data, either. They are also coming out with a secure email server.

http://reason.com/archives/2013/06/1...nt-from-spying
CuteOldGuy is offline   Quote
Old 06-15-2013, 01:33 AM   #2
acp5762
Account Disabled
 
Join Date: Feb 8, 2011
Location: Louisiana
Posts: 3,979
Encounters: 4
Default

Well if they write ya a letter inquiring about anything, just reply back and invite them over for dinner. Just tell them you're having Liver. They won't show up and ya won't here from them again.
acp5762 is offline   Quote
Old 06-15-2013, 01:40 AM   #3
CJ7
Valued Poster
 
CJ7's Avatar
 
Join Date: Feb 9, 2010
Location: Here
Posts: 14,191
Default

just be yourself Jane

CJ7 is offline   Quote
Old 06-15-2013, 05:37 AM   #4
timpage
Account Disabled
 
Join Date: Apr 7, 2010
Location: Texas
Posts: 5,249
Default

Quote:
Originally Posted by CJ7 View Post
just be yourself Jane

OK, that's funny.
timpage is offline   Quote
Old 06-15-2013, 06:14 AM   #5
Yssup Rider
Valued Poster
 
Yssup Rider's Avatar
 
Join Date: Jan 3, 2010
Location: Clarksville
Posts: 61,006
Encounters: 67
Default

Quote:
Originally Posted by timpage View Post
OK, that's funny.
Yes sir!

BTW -- NICE avatar, Timmy!
Yssup Rider is offline   Quote
Old 06-15-2013, 06:35 AM   #6
Guest040616
Account Disabled
 
Join Date: Dec 23, 2009
Location: Central Texas
Posts: 15,047
Encounters: 8
Default

Quote:
Originally Posted by CJ7 View Post
just be yourself Jane

Why did Hanoi COG take off his pointy, tin foil hat?
Guest040616 is offline   Quote
Old 06-15-2013, 06:42 AM   #7
i'va biggen
Account Disabled
 
Join Date: Jan 20, 2011
Location: kansas
Posts: 28,773
Encounters: 17
Default

Quote:
Originally Posted by CJ7 View Post
just be yourself Jane




If you have nothing to hide why are you hiding?
Got a cell phone, on star, Garmin deal with Amazon, Google, yahoo got cookies? web site track you better watch Eccie they may be turning all your Anti American rants. This is a perfect pic of Hanoi bunkered up!!
i'va biggen is offline   Quote
Old 06-15-2013, 09:33 PM   #8
CuteOldGuy
Valued Poster
 
CuteOldGuy's Avatar
 
Join Date: May 20, 2010
Location: Wichita
Posts: 28,730
Encounters: 20
Default

Quote:
Originally Posted by CJ7 View Post
just be yourself Jane

Actually, that is not me. That guy is an idiot. Everyone knows you have to have the shiny side facing OUT to block the CIA secret rays. Duh.

CuteOldGuy is offline   Quote
Old 06-15-2013, 09:50 PM   #9
acp5762
Account Disabled
 
Join Date: Feb 8, 2011
Location: Louisiana
Posts: 3,979
Encounters: 4
Default

Quote:
Originally Posted by bigtex View Post
Why did Hanoi COG take off his pointy, tin foil hat?
The irony of it all is, it's the NSA and the FBI who wear the "Tin Foil Hat". With all this Phone Data gathering they must think everyone is a Terrorist or is potentially one. Their explanation of gathering phone numbers and examining locations and durations and patterns of calls to thwart the efforts of Terrorist sounds like a crock.
acp5762 is offline   Quote
Old 06-15-2013, 09:51 PM   #10
Yssup Rider
Valued Poster
 
Yssup Rider's Avatar
 
Join Date: Jan 3, 2010
Location: Clarksville
Posts: 61,006
Encounters: 67
Default

Why would you think that?
Yssup Rider is offline   Quote
Old 06-15-2013, 10:28 PM   #11
acp5762
Account Disabled
 
Join Date: Feb 8, 2011
Location: Louisiana
Posts: 3,979
Encounters: 4
Default

Quote:
Originally Posted by Yssup Rider View Post
Why would you think that?
Just think for a split second the number of calls being placed daily in this country. Now assuming the conversation itself isn't being monitored. What criteria is being implemented, to single out specific calls based on location, Duration, the numbers being called. Seems like a shot in the dark. They claim they have foiled some Terrorist activity. If that's true, I think luck was on their side more than their methods. Hopefully their luck doesn't run out.
acp5762 is offline   Quote
Old 06-15-2013, 10:52 PM   #12
CJ7
Valued Poster
 
CJ7's Avatar
 
Join Date: Feb 9, 2010
Location: Here
Posts: 14,191
Default

just a guess, but I'd say the criteria include keywords used by terrorist organizations, and more than likely language./dialect alerts


Honey can you stop and pick up a loaf of bread?

Sure thing baby.

probably never hits a trigger that sends an alert

who knows though, just a guess
CJ7 is offline   Quote
Old 06-15-2013, 11:47 PM   #13
acp5762
Account Disabled
 
Join Date: Feb 8, 2011
Location: Louisiana
Posts: 3,979
Encounters: 4
Default

Quote:
Originally Posted by CJ7 View Post
just a guess, but I'd say the criteria include keywords used by terrorist organizations, and more than likely language./dialect alerts


Honey can you stop and pick up a loaf of bread?

Sure thing baby.

probably never hits a trigger that sends an alert

who knows though, just a guess
Keywords would and could be useful. But they claim they aren't listening in on actual dialogue.
acp5762 is offline   Quote
Old 06-16-2013, 12:01 AM   #14
CJ7
Valued Poster
 
CJ7's Avatar
 
Join Date: Feb 9, 2010
Location: Here
Posts: 14,191
Default

Quote:
Originally Posted by acp5762 View Post
Keywords would and could be useful. But they claim they aren't listening in on actual dialogue.

lol ... that's funny... do you actually believe every call made is being listened to? somebody is one busy operator


try voice recognition softwear coupled with the keyword/language/dialect scenario
CJ7 is offline   Quote
Old 06-16-2013, 12:43 AM   #15
acp5762
Account Disabled
 
Join Date: Feb 8, 2011
Location: Louisiana
Posts: 3,979
Encounters: 4
Default

Quote:
Originally Posted by CJ7 View Post
lol ... that's funny... do you actually believe every call made is being listened to? somebody is one busy operator


try voice recognition softwear coupled with the keyword/language/dialect scenario
Hell no I don't think they are listening in on calls. They don't have enough man power for that. I worked for a company after I retired, that used a hand scan to access you entry into various areas. My palm was entered into a computer system that when my palm was placed on a scanner it read data and the door would unlatch granting me access. How would voice recognition work unless there is some sort of database? In other wards how does it lead them to a particular person.
acp5762 is offline   Quote
Reply



AMPReviews.net
Find Ladies
Hot Women

Powered by vBulletin®
Copyright © 2009 - 2016, ECCIE Worldwide, All Rights Reserved