News / Science & Technology

How To Shield From Internet Snooping

Computer screen shows a password attack in progress at computer security training program in Northfield, Vermont.
Computer screen shows a password attack in progress at computer security training program in Northfield, Vermont.
George Putic
When news broke about U.S. government agencies collecting metadata about its citizens’ Internet and phone communications, many were surprised by its scope.  The surveillance covered a vast number of Internet messages and phone calls.  The government did not deny the action but pointed out that the collected data contained, not the substance of the communication, but the so-called metadata.

Although many suspected that U.S. intelligence agencies were collecting data about suspicious messages and calls, it was assumed that the actions were covered by court orders and aimed at specific targets.  But reports say, during a specific time period, practically all e-mail messages were intercepted and their metadata stored for possible later analysis.

Government agencies claim that they collect only metadata and not the content of intercepted messages.  But KoolSpan Chief Technology Officer Bill Supernor says metadata holds very valuable information for the intelligence services.

“Metadata is the generic term used to describe information that describes information.  So the metadata of an e-mail may be who was it sent to, who it was from, the date, what size the message is," said Supernor.  "Many e-mails were passed through a number of POPs [Post Office Protocol].  A number of different e-mail relay stations and that kind of information may be regarded to be metadata.”

Why is communication over the Internet not private?  If computers each have their own addresses, how can e-mail be read by someone else?

Supernor says to understand this we have to go to the beginnings of the Internet.

“When the Internet was first designed and envisioned, it was envisioned as a system for open communication between people at different universities," said Supernor.  "And over time it grew into a system for sharing information between defense related organizations."

So at first, security was not the primary concern because nobody thought the Internet would be used for private communication among people, companies and government officials.  Security was added later, he says, almost as an afterthought.

Another problem, says Supernor, stems from the networked nature of the Internet.

“Networks imply lines of communication connected at hubs or endpoints," he said.  "And any one of those hubs or endpoints can be a point at which information could be pulled off and snooped upon or intercepted by both friendly and unfriendly parties.”

Supernor adds that storing metadata requires considerably less space than storing the content of the messages.  He says metadata is much easier to index and catalogue, but only so much can be done with that information.

Reports indicate U.S. intelligence agencies also collected metadata of phone conversations, with information about originators and receivers of calls, duration of calls and possibly even the types of phones used.  Supernor says that in the case of cellular, it can show which cell tower the phones used at the time a call was placed, received, and the time the call ended on either phone.

“The metadata can contain some pretty interesting information in terms of the physical location," said Supernor.  "And if anybody ever used some of the mapping applications on the smartphone, with the GPS turned off, that’s a lot of information that’s available to know about, right down to the city block where a person was located.”

Intelligence agencies are presumably after terrorists and criminals.  But what about other hackers who may be after financial and other personal data?

Supernor advises “the best thing you can do to defend yourself is pick random passwords, so nothing that involves your cats or dogs or car, or the names of any of these things - your address, your family, any of the kinds of things that appear in social media.  It’s such a weapon in the hand of the bad guys.”

In the case of cell phones or smartphones, Supernor says one should especially guard valuable information such as Social Security numbers and credit card numbers.

”SMS is something I would not use for exchanging secure information," he said.  "That transport is just not a safe transport to use for that kind of information.”

Bill Supernor says that the Internet is not a secure means of communication and strongly advises encryption of messages containing sensitive information.  This is especially true for commercial companies and organizations that want to make sure that the private information they share stays behind an impenetrable screen.

You May Like

Video Afghan Refugees Complain of Harassment in Pakistan

Afghan officials and human rights organizations assert that Pakistani authorities are using deadly attack at school in Peshawar as pretext to push out Afghan refugees More

At Boston Bombing Hearing, Sides Spar Over Boat

At final pre-trial hearing, lawyers for suspect Dzhokhar Tsarnaev, prosecutors disagree on whether vessel where he hid from police can be shown to jurors More

Iran Judiciary 'Picks' Lawyer for Detained WP Reporter

Masoud Shafii has been attempting to secure official recognition as Rezaian’s attorney, but is not allowed to see his client in prison More

This forum has been closed.
Comments
     
There are no comments in this forum. Be first and add one

Featured Videos

Your JavaScript is turned off or you have an old version of Adobe's Flash Player. Get the latest Flash player.
US Supreme Court Hears Hijab Discrimination Casei
X
Katherine Gypson
February 25, 2015 11:30 PM
The U.S. Supreme Court has heard opening arguments in a workplace religious discrimination case that examines whether a clothing store can refuse to hire a young woman for wearing the headscarf she says is a symbol of her Muslim faith. Katherine Gypson reports from the Supreme Court.
Video

Video US Supreme Court Hears Hijab Discrimination Case

The U.S. Supreme Court has heard opening arguments in a workplace religious discrimination case that examines whether a clothing store can refuse to hire a young woman for wearing the headscarf she says is a symbol of her Muslim faith. Katherine Gypson reports from the Supreme Court.
Video

Video Falling Gas Prices Hurt Nascent Illinois Hydraulic Fracturing Industry

Falling oil prices are helping consumers purchase cheaper petroleum at the pump. But that’s made hydraulic fracturing or “fracking” less economically viable for the companies in the United States invested in the process. VOA’s Kane Farabaugh reports on one Midwestern town that was hoping to change its fortunes by cashing in on the next big U.S. oil boom.
Video

Video Fighting in Sudan's South Kordofan Fuels Mass Displacement

Heavy fighting in Sudan's South Kordofan state is causing hundreds of thousands to flee into uncertain conditions. Local aid organizations estimate as many as 400,000 civilians have been internally displaced since the conflict began more than three years ago, while another 250,000 have fled across the border to refugee camps in South Sudan. VOA's Adam Bailes reports.
Video

Video Lao Dam Project Runs Into Opposition

A Lao dam project on a section of the Mekong River is drawing opposition from local fishermen, international environmental groups and neighboring countries. VOA's Say Mony visited the region to investigate the concerns. Colin Lovett narrates.
Video

Video A Filmmaker Discovers Her Biracial Identity in "Little White Lie

Lacey Schwartz grew up in an upper middle-class Jewish family, in a town in upstate New York where almost everyone she knew was white. She assumed that she was, as well. Her recent documentary, Little White Lie, tells the story of how she uncovered the secret of her true racial background. VOA’s Carolyn Weaver has more on the film.
Video

Video Deep Under Antarctic Ice Sheet, Life!

With the end of summer in the Southern hemisphere, the Antarctic research season is over. Scientists from Northern Illinois University are back in their laboratory after a 3-month expedition on the Ross Ice Shelf, the world’s largest floating ice sheet. As VOA’s Rosanne Skirble reports, they hope to find clues to explain the dynamics of the rapidly melting ice and its impact on sea level rise.
Video

Video US-Cuba Normalization Talks Resume Friday

Negotiations aimed at normalizing diplomatic relations between the U.S. and Cuba resume Friday. On the table: lifting a half-century trade embargo and easing banking and travel restrictions. There's opposition in Congress, but some analysts say there may be sufficient political and economic incentives in both nations for a potential breakthrough this year. VOA's Mil Arcega reports.
Video

Video Pakistan's Deadline For SIM Registration Has Cellphone Users Scrambling

Pakistani cell phone users have until midnight Thursday to register their SIM cards, or their service will be cut off. While some privacy experts worry about government intrusion, many Pakistanis are just worried about keeping their phone lines open. VOA Deewa reporter Arshad Muhmand has more from Peshawar.
Video

Video Myanmar Warns Factory Workers to End Strikes

Outside Myanmar's main city Yangon, thousands of workers walked off their jobs earlier this month demanding a doubling of their wages, pay raises after a year and input from labor unions on industrial regulations. Since Friday, the standoff has grown more tense as police moved in to disrupt the sit-ins, resulting in clashes that injured people from both sides. VOA correspondent Steve Herman visited industrial zones which have become a focus of Myanmar's fledgling workers rights movement.
Video

Video Oscar Winners Do More Than Thank the Academy

The Academy Awards presentation is Hollywood’s night to reward the best movies from the previous year. It’s typically a lot of glitter, a lot of thank you’s, a lot of speeches. But many of this year’s speeches carried messages beyond the thank you's. VOA’s Carolyn Presutti takes a look.

All About America

Circumventing Censorship

An Internet Primer for Healthy Web Habits

As surveillance and censoring technologies advance, so, too, do new tools for your computer or mobile device that help protect your privacy and break through Internet censorship.
More