News / Science & Technology

How To Shield From Internet Snooping

Computer screen shows a password attack in progress at computer security training program in Northfield, Vermont.
Computer screen shows a password attack in progress at computer security training program in Northfield, Vermont.
George Putic
When news broke about U.S. government agencies collecting metadata about its citizens’ Internet and phone communications, many were surprised by its scope.  The surveillance covered a vast number of Internet messages and phone calls.  The government did not deny the action but pointed out that the collected data contained, not the substance of the communication, but the so-called metadata.

Although many suspected that U.S. intelligence agencies were collecting data about suspicious messages and calls, it was assumed that the actions were covered by court orders and aimed at specific targets.  But reports say, during a specific time period, practically all e-mail messages were intercepted and their metadata stored for possible later analysis.

Government agencies claim that they collect only metadata and not the content of intercepted messages.  But KoolSpan Chief Technology Officer Bill Supernor says metadata holds very valuable information for the intelligence services.

“Metadata is the generic term used to describe information that describes information.  So the metadata of an e-mail may be who was it sent to, who it was from, the date, what size the message is," said Supernor.  "Many e-mails were passed through a number of POPs [Post Office Protocol].  A number of different e-mail relay stations and that kind of information may be regarded to be metadata.”

Why is communication over the Internet not private?  If computers each have their own addresses, how can e-mail be read by someone else?

Supernor says to understand this we have to go to the beginnings of the Internet.

“When the Internet was first designed and envisioned, it was envisioned as a system for open communication between people at different universities," said Supernor.  "And over time it grew into a system for sharing information between defense related organizations."

So at first, security was not the primary concern because nobody thought the Internet would be used for private communication among people, companies and government officials.  Security was added later, he says, almost as an afterthought.

Another problem, says Supernor, stems from the networked nature of the Internet.

“Networks imply lines of communication connected at hubs or endpoints," he said.  "And any one of those hubs or endpoints can be a point at which information could be pulled off and snooped upon or intercepted by both friendly and unfriendly parties.”

Supernor adds that storing metadata requires considerably less space than storing the content of the messages.  He says metadata is much easier to index and catalogue, but only so much can be done with that information.

Reports indicate U.S. intelligence agencies also collected metadata of phone conversations, with information about originators and receivers of calls, duration of calls and possibly even the types of phones used.  Supernor says that in the case of cellular, it can show which cell tower the phones used at the time a call was placed, received, and the time the call ended on either phone.

“The metadata can contain some pretty interesting information in terms of the physical location," said Supernor.  "And if anybody ever used some of the mapping applications on the smartphone, with the GPS turned off, that’s a lot of information that’s available to know about, right down to the city block where a person was located.”

Intelligence agencies are presumably after terrorists and criminals.  But what about other hackers who may be after financial and other personal data?

Supernor advises “the best thing you can do to defend yourself is pick random passwords, so nothing that involves your cats or dogs or car, or the names of any of these things - your address, your family, any of the kinds of things that appear in social media.  It’s such a weapon in the hand of the bad guys.”

In the case of cell phones or smartphones, Supernor says one should especially guard valuable information such as Social Security numbers and credit card numbers.

”SMS is something I would not use for exchanging secure information," he said.  "That transport is just not a safe transport to use for that kind of information.”

Bill Supernor says that the Internet is not a secure means of communication and strongly advises encryption of messages containing sensitive information.  This is especially true for commercial companies and organizations that want to make sure that the private information they share stays behind an impenetrable screen.

You May Like

French Refugee Drama Wins Cannes Top Prize

Dheepan is about a group of Sri Lankan refugees who pretend to be a family in order to flee their war-torn country for a housing project in France More

Photogallery Crisis in Macedonia Requires Meaningful and Swift Measures

The international community has called on Macedonian leadership to take concrete measures in support of democracy in order to exit the crisis More

Activists: IS Executes 217 Civilians, Soldiers Near Palmyra

British-based Syrian Observatory for Human Rights on Sunday said the victims include nurses, women, children and Syrian government fighters More

This forum has been closed.
Comments
     
There are no comments in this forum. Be first and add one

Featured Videos

Your JavaScript is turned off or you have an old version of Adobe's Flash Player. Get the latest Flash player.
Turkey's Main Opposition Party Hopes for Election Breakthroughi
X
May 22, 2015 10:23 AM
Turkey’s main opposition Republican People’s Party has sought an image change ahead of the June 7 general election. The move comes after suffering successive defeats at the hands of the Islamist-rooted AK Party, which has portrayed it as hostile to religion. Dorian Jones reports from the western city of Izmir.
Video

Video Turkey's Main Opposition Party Hopes for Election Breakthrough

Turkey’s main opposition Republican People’s Party has sought an image change ahead of the June 7 general election. The move comes after suffering successive defeats at the hands of the Islamist-rooted AK Party, which has portrayed it as hostile to religion. Dorian Jones reports from the western city of Izmir.
Video

Video Europe Follows US Lead in Tackling ‘Conflict Minerals’

Metals mined from conflict zones in places like the Democratic Republic of Congo are often sold by warlords to buy weapons. This week European lawmakers voted to force manufacturers to prove that their supply chains are not inadvertently fueling conflicts and human rights abuses. Henry Ridgwell reports from London.
Video

Video Class Tackles Questions of Race, Discrimination

Unrest in some U.S. cities is more than just a trending news item at Ladue Middle School in St. Louis, Missouri. As VOA’s Kane Farabaugh reports, it’s a focus of a multicultural studies class engaging students in wide-ranging discussions about racial tensions and police aggression.
Video

Video Mind-Controlled Prosthetics Are Getting Closer

Scientists and engineers are making substantial advances towards the ultimate goal in prosthetics – creation of limbs that can be controlled by the wearer’s mind. Thanks to sophisticated sensors capable of picking up the brain’s signals, an amputee in Iceland is literally bringing us one step closer to that goal. VOA’s George Putic reports.
Video

Video Afghan Economy Sinks As Foreign Troops Depart

As international troops prepare to leave Afghanistan, and many foreign aid groups follow, Afghans are grappling with how the exodus will affect the country's fragile economy. Ayesha Tanzeem reports from the Afghan capital, Kabul.
Video

Video Poverty, Ignorance Force Underage Girls Into Marriage

The recent marriage of a 17-year old Chechen girl to a local police chief who was 30 years older and already had a wife caused an outcry in Russia and beyond. The bride was reportedly forced to marry and her parents were intimidated into giving their consent. The union spotlighted yet again the plight of many underage girls in developing countries. Zlatica Hoke reports poverty, ignorance and fear are behind the practice, especially in Asia and Africa.
Video

Video South Korea Marks Gwangju Uprising Anniversary

South Korea this week marked the 35th anniversary of a protest that turned deadly. The Gwangju Uprising is credited with starting the country’s democratic revolution after it was violently quelled by South Korea’s former military rulers. But as Jason Strother reports, some observers worry that democracy has recently been eroded.
Video

Video California’s Water System Not Created To Handle Current Drought

The drought in California is moving into its fourth year. While the state's governor is mandating a reduction in urban water use, most of the water used in California is for agriculture. But both city dwellers and farmers are feeling the impact of the drought. Some experts say the state’s water system was not created to handle long periods of drought. Elizabeth Lee reports from Ventura County, an agricultural region just northwest of Los Angeles.
Video

Video How to Clone a Mammoth: The Science of De-Extinction

An international team of scientists has sequenced the complete genome of the woolly mammoth. Led by the Swedish Museum of Natural History in Stockholm, the work opens the door to recreate the huge herbivore, which last roamed the Earth 4,000 years ago. VOA’s Rosanne Skirble considers the science of de-extinction and its place on the planet
Video

Video Blind Boy Defines His Life with Music

Cole Moran was born blind. He also has cognitive delays and other birth defects. He has to learn everything by ear. Nevertheless, the 12-year-old has had an insatiable love for music since he was born. VOA’s June Soh introduces us to the young phenomenal harmonica player.

VOA Blogs