News / Science & Technology

How To Shield From Internet Snooping

Computer screen shows a password attack in progress at computer security training program in Northfield, Vermont.
Computer screen shows a password attack in progress at computer security training program in Northfield, Vermont.
George Putic
When news broke about U.S. government agencies collecting metadata about its citizens’ Internet and phone communications, many were surprised by its scope.  The surveillance covered a vast number of Internet messages and phone calls.  The government did not deny the action but pointed out that the collected data contained, not the substance of the communication, but the so-called metadata.

Although many suspected that U.S. intelligence agencies were collecting data about suspicious messages and calls, it was assumed that the actions were covered by court orders and aimed at specific targets.  But reports say, during a specific time period, practically all e-mail messages were intercepted and their metadata stored for possible later analysis.

Government agencies claim that they collect only metadata and not the content of intercepted messages.  But KoolSpan Chief Technology Officer Bill Supernor says metadata holds very valuable information for the intelligence services.

“Metadata is the generic term used to describe information that describes information.  So the metadata of an e-mail may be who was it sent to, who it was from, the date, what size the message is," said Supernor.  "Many e-mails were passed through a number of POPs [Post Office Protocol].  A number of different e-mail relay stations and that kind of information may be regarded to be metadata.”

Why is communication over the Internet not private?  If computers each have their own addresses, how can e-mail be read by someone else?

Supernor says to understand this we have to go to the beginnings of the Internet.

“When the Internet was first designed and envisioned, it was envisioned as a system for open communication between people at different universities," said Supernor.  "And over time it grew into a system for sharing information between defense related organizations."

So at first, security was not the primary concern because nobody thought the Internet would be used for private communication among people, companies and government officials.  Security was added later, he says, almost as an afterthought.

Another problem, says Supernor, stems from the networked nature of the Internet.

“Networks imply lines of communication connected at hubs or endpoints," he said.  "And any one of those hubs or endpoints can be a point at which information could be pulled off and snooped upon or intercepted by both friendly and unfriendly parties.”

Supernor adds that storing metadata requires considerably less space than storing the content of the messages.  He says metadata is much easier to index and catalogue, but only so much can be done with that information.

Reports indicate U.S. intelligence agencies also collected metadata of phone conversations, with information about originators and receivers of calls, duration of calls and possibly even the types of phones used.  Supernor says that in the case of cellular, it can show which cell tower the phones used at the time a call was placed, received, and the time the call ended on either phone.

“The metadata can contain some pretty interesting information in terms of the physical location," said Supernor.  "And if anybody ever used some of the mapping applications on the smartphone, with the GPS turned off, that’s a lot of information that’s available to know about, right down to the city block where a person was located.”

Intelligence agencies are presumably after terrorists and criminals.  But what about other hackers who may be after financial and other personal data?

Supernor advises “the best thing you can do to defend yourself is pick random passwords, so nothing that involves your cats or dogs or car, or the names of any of these things - your address, your family, any of the kinds of things that appear in social media.  It’s such a weapon in the hand of the bad guys.”

In the case of cell phones or smartphones, Supernor says one should especially guard valuable information such as Social Security numbers and credit card numbers.

”SMS is something I would not use for exchanging secure information," he said.  "That transport is just not a safe transport to use for that kind of information.”

Bill Supernor says that the Internet is not a secure means of communication and strongly advises encryption of messages containing sensitive information.  This is especially true for commercial companies and organizations that want to make sure that the private information they share stays behind an impenetrable screen.

You May Like

Diplomats Work to Extend Israeli-Palestinian Cease-Fire

US Secretary of State John Kerry, diplomats from France, Britain, Germany, Italy, Turkey and Qatar gathered in Paris Saturday to discuss crisis More

Photogallery US Defense Department Warns of Arms to Eastern Ukraine

‘Imminent’ delivery of Russian rocket launcher poses threat to civilians, US says More

Video Researchers: Africa Genetically Modified Crops Held Back by Scaremongering

GM crops offer best hope of increasing productivity and coping with climate change in Africa, according to co-author of Chatham House report More

This forum has been closed.
Comments
     
There are no comments in this forum. Be first and add one

Featured Videos

Your JavaScript is turned off or you have an old version of Adobe's Flash Player. Get the latest Flash player.
Astronauts Train in Underwater Labi
X
George Putic
July 25, 2014 7:25 PM
In the world’s only underwater laboratory, four U.S. astronauts train for a planned visit to an asteroid. The lab - called Aquarius- is located five kilometers off Key Largo, in southern Florida. Living in close quarters and making excursions only into the surrounding ocean, they try to simulate the daily routine of a crew that will someday travel to collect samples of a rock orbiting far away from earth. VOA’s George Putic has more.
Video

Video Astronauts Train in Underwater Lab

In the world’s only underwater laboratory, four U.S. astronauts train for a planned visit to an asteroid. The lab - called Aquarius- is located five kilometers off Key Largo, in southern Florida. Living in close quarters and making excursions only into the surrounding ocean, they try to simulate the daily routine of a crew that will someday travel to collect samples of a rock orbiting far away from earth. VOA’s George Putic has more.
Video

Video Not Even Monks Spared From Thailand’s Junta-Backed Morality Push

With Thailand’s military government firmly in control after May’s bloodless coup, authorities are carrying out plans they say are aimed at restoring discipline, morality and patriotism to all Thais. The measures include a crackdown on illegal gambling, education reforms to promote students’ moral development, and a new 24-hour phone hotline for citizens to report misbehaving monks. Steve Sandford reports from Bangkok.
Video

Video Virtual Program Teaches Farming Skills

In a fast-changing world beset by unpredictable climate conditions, farmers cannot afford to ignore new technology. Researchers in Australia are developing an online virtual world program to share information about climate change and more sustainable farming techniques for sugar cane growers. As VOA's Zlatica Hoke reports, the idea is to create a wider support network for farmers.
Video

Video Airline Expert: Missile will Show Signature on Debris

The debris field from Malaysia Airlines Flight 17 is spread over a 21-kilometer radius in eastern Ukraine. It is expected to take investigators months to sort through the airplane pieces to learn about the missile that brought down the jetliner and who fired it. VOAs Carolyn Presutti explains how this work will be done.
Video

Video Treatment for Childhood Epilepsy Heats up Medical Marijuana Debate

In the United States, marijuana is classed as an illegal drug by the federal government. But nearly half the states have legalized it, to some degree. Proponents say some strains of marijuana might have exceptional health benefits, for treating pain or inflammation in chronic conditions such as cancer, multiple sclerosis and epilepsy. Shelley Schlender reports on a strain of medical marijuana developed in Colorado that is reputed to reduce seizures in childhood epilepsy
Video

Video Airbus Adds Metal 3D Printed Parts to New Jets

By the end of this year, European aircraft manufacturing consortium Airbus plans to deliver the first of its new, extra-wide-body passenger jets, the A350-XWB. Among other technological innovations, the new plane will also incorporate metal parts made in a 3-D printer. VOA's George Putic has more.
Video

Video AIDS Conference Welcomes Exciting Developments in HIV Treatment, Prevention

Significant strides have been made in recent years toward the treatment and prevention of HIV, the virus that causes AIDS. This year, at the International AIDS Conference, the AIDS community welcomed progress on a new pill that may prevent transmission of the deadly virus. VOA’s Anita Powell reports from Melbourne, Australia.
Video

Video IAEA: Iran Turns its Enriched Uranium Into Less Harmful Form

Iran has converted its stockpiles of enriched uranium into a less dangerous form that is more difficult to use for nuclear weapons, according to the United Nations’ Atomic Energy Agency. The move complies with an interim deal reached with Western powers on Iran's nuclear program last year, in exchange for easing of sanctions. Henry Ridgwell reports for VOA from London.

AppleAndroid