News / Science & Technology

Basic Steps Help Protect Personal Information From Hacking

Basic Steps Help Protect Personal Information From Hackingi
X
June 20, 2013 2:28 PM
The recent disclosure of extensive U.S. surveillance of phone and Internet communications has raised many technical questions, including how it is possible to sift through the mountains of data. It turns out that the government was collecting only so-called 'metadata.' VOA’s George Putic explains.
Basic Steps Help Protect Personal Information From Hacking
George Putic
The recent disclosure of extensive U.S. surveillance of phone and Internet communications has raised many technical questions, including how it is possible to sift through the mountains of data. It turns out that the government was collecting only so-called "metadata."

U.S. government officials say the surveillance covered only metadata - the patterns of the phone calls and internet messages - not the substance of the communications.

According to reports, a majority of e-mail messages sent during a specific time period was intercepted and the metadata stored for possible later analysis.

Bill Supernor, the chief technology officer with Internet security firm KoolSpan, said metadata can provide valuable information for intelligence services.

“Metadata is the generic term used to describe information that describes information. So the metadata of an email may be who was it sent to, who it was from, the date, what size the message is. Many emails were passed through a number of POPs [Post Office Protocol]. A number of different email relay stations and that kind of information may be regarded to be metadata,” said Supernor.

Supernor said that storing metadata requires considerably less space than storing the content of those messages, and is much easier to index and catalogue. But its usefulness is limited.

Phone conversations also carry metadata, including which cell tower the phones used, when a call started and ended, and the position of the caller right down to the city block. Those bits of information can help police and intelligence agencies track criminals and terrorists.

Internet messages also can help hackers, however, who may be after financial and other personal data.

“The best thing you can do to defend yourself is pick random passwords, so nothing that involves your cats or dogs or car, or the names of any of these things - your address, your family, any of the kinds of things that appear in social media. It’s such a weapon in the hand of the bad guys,” said Supernor.

In the case of cell phones, Supernor said never use them to send valuable information such as Social Security or personal identification numbers, or credit card numbers.

”SMS is something I would not use for exchanging secure information. That transport is just not a safe transport to use for that kind of information,” he said.

Bill Supernor said the Internet is not a secure means of communication and strongly advises encryption of messages containing sensitive information. This is especially true for commercial companies and organizations that want to make sure that the private information they share stays behind an impenetrable screen.

You May Like

Tunnel Bombs Highlight Savagery of Aleppo Fight

Rebels have used tunneling tactic near government buildings, command posts or supply routes to set off explosives; they detonated their largest bomb this week under Syria's intelligence headquarters More

Sierra Leone Launches New Initiative to Stop Ebola Spread

Government hopes Infection and Prevention Control Units, IPC, will help protect patients and healthcare workers More

UN Official: Fight Against Terrorism Must Not Violate Human Rights

UN High Commissioner for Human Rights says efforts by states to combat terrorism are resulting in large scale rights violations against the very citizens they claim to defend More

This forum has been closed.
Comments
     
There are no comments in this forum. Be first and add one

Featured Videos

Your JavaScript is turned off or you have an old version of Adobe's Flash Player. Get the latest Flash player.
Video Claims to Show Shia Forces in Iraq Executing Sunni Boyi
X
Jeff Seldin
March 05, 2015 2:36 AM
A graphic mobile phone video is spreading on the Internet, claiming to show Iraqi forces or Shia militia executing a handcuffed Sunni boy. Experts have yet to verify the video, but already Islamic State followers are publicizing it across social media, playing on deep-rooted sectarian fears. VOA’s Jeff Seldin reports.
Video

Video Video Claims to Show Shia Forces in Iraq Executing Sunni Boy

A graphic mobile phone video is spreading on the Internet, claiming to show Iraqi forces or Shia militia executing a handcuffed Sunni boy. Experts have yet to verify the video, but already Islamic State followers are publicizing it across social media, playing on deep-rooted sectarian fears. VOA’s Jeff Seldin reports.
Video

Video Ukrainian Authorities Struggle to Secure a Divided Mariupol

Since last month's cease-fire went into effect, shelling around the port city of Mariupol has decreased, but it is thought pro-Russian separatists remain poised to attack. For the city’s authorities, a major challenge is gaining the trust of residents, while at the same time rooting out informants who are passing sensitive information to the rebels. Patrick Wells reports for VOA.
Video

Video Volunteer Gauge-Watchers Help Fine-Tune Weather Science

An observation system called CoCoRaHS is working to improve weather science, thanks to thousands of volunteers across the country who measure precipitation in their own backyards, then share their data through the Internet. VOA's Shelley Schlender reports.
Video

Video NASA Spacecraft Approaches a Dwarf Planet

NASA’s Dawn spacecraft will make history on Friday, March 6, when it becomes the first man-made object to orbit a dwarf planet named Ceres. It is located in the asteroid belt between Mars and Jupiter, almost 500 million kilometers from Earth. Among other objectives, Dawn will try to examine two mysterious bright white spots detected on the planet’s surface. VOA’s George Putic has more.
Video

Video Young Muslims Radicalized Online

Young Muslims are being radicalized ‘in their bedrooms’ through direct contact with Islamic State or ISIL fighters via the Internet, according to terror experts. There are growing concerns that authorities and Internet providers are not doing enough to counter online extremism - which analysts say is spread by a prolific network of online supporters around the world. Henry Ridgwell reports from London.
Video

Video African Americans Recall 1960's Fight For Voting Rights

U.S. President Barack Obama and thousands of people will gather in the small southern U.S. city of Selma, Alabama, Saturday, March 7th to commemorate the 50th anniversary of a historic voting rights march that became known as “Bloody Sunday." VOA’s Chris Simkins traveled to Alabama and introduces us to some of the foot soldiers of the voting rights struggles of the 1960’s.
Video

Video Positive Messaging Transforms Ethiopia's Image

Ethiopia was once known for famine and droughts. Now, headlines more often point to its fast-growing economy and its emergence as a regional peacemaker. How has Addis Ababa changed the narrative? VOA's Marthe van der Wolf reports.
Video

Video Cyber War Rages Between Iran, US

A newly published report indicates Iran and the United States have increased their cyber attacks on each other, even as their top diplomats are working toward an agreement to guarantee Iran does not develop a nuclear weapon and to free Iran from international sanctions. The development is part of a growing global trend. VOA’s Al Pessin reports from London.
Video

Video Answers Elude Families of MH370 Passengers

For the families on board Malaysia Airlines flight MH370, an airline official’s statement nearly one year ago that the plane had lost contact with air traffic control at 2:40 AM is the only thing that remains confirmed. William Ide reports.

All About America

Circumventing Censorship

An Internet Primer for Healthy Web Habits

As surveillance and censoring technologies advance, so, too, do new tools for your computer or mobile device that help protect your privacy and break through Internet censorship.
More