But given the revelations spilling out into the media recently, there hardly seems a single aspect of daily life that isn't somehow subject to spying or surveillance by someone.
Experts say there are steps anyone can take to improve privacy, but they only go so far.
Using anonymity services and encryption "simply make it harder, but not impossible," said Ashkan Soltani, an independent privacy and security researcher. "Someone can always find you -- just depends on how motivated they are."
Emails sent across the web are like postcards. In some cases, they're readable by anyone standing between you and its recipient. That can include your webmail company, your Internet service provider and whoever is tapped into the fiber optic cable passing your message around the globe - not to mention a parallel set of observers on the recipient's side of the world.
Experts recommend encryption, which scrambles messages in transit, so they're unreadable to anyone trying to intercept them. Techniques vary, but a popular one is called PGP, short for "Pretty Good Privacy." PGP is effective enough that the U.S. government tried to block its export in the mid-1990s, arguing that it was so powerful it should be classed as a weapon.
Like emails, your travels around the Internet can easily be tracked by anyone standing between you and the site you're trying to reach. TOR, short for "The Onion Router," helps make your traffic anonymous by bouncing it through a network of routers before spitting it back out on the other side. Each trip through a router provides another layer of protection, thus the onion reference.
Originally developed by the US military, TOR is believed to work pretty well if you want to hide your traffic from, let's say, eavesdropping by your local Internet service provider. And criminals' use of TOR has so frustrated Japanese police that experts there recently recommended restricting its use. But it's worth noting that TOR may be ineffective against governments equipped with the powers of global surveillance.
Your everyday cellphone has all kinds of privacy problems. In Britain, cellphone safety was so poor that crooked journalists made a cottage industry out of eavesdropping on their victims' voicemails. In general, proprietary software, lousy encryption, hard-to-delete data and other security issues make a cellphone a bad bet for storing information you'd rather not share.
An even bigger issue is that cellphones almost always follow their owners around, carefully logging the location of every call, something which could effectively give governments a daily digest of your everyday life. Security researcher Jacob Appelbaum has described cellphones as tracking devices that also happen to make phone calls. If you're not happy with the idea of an intelligence agency following your footsteps across town, leave the phone at home.
Your everyday cellphone has all kinds of privacy problems. In Britain, cellphone safety was so poor that crooked journalists made a cottage industry out of eavesdropping on their victims' voicemails. In general, proprietary software, lousy encryption, hard-to-delete data and other security issues make a cellphone a bad bet for storing information you'd rather not share.
An even bigger issue is that cellphones almost always follow their owners around, carefully logging the location of every call, something which could effectively give governments a daily digest of your everyday life. Security researcher Jacob Appelbaum has described cellphones as tracking devices that also happen to make phone calls. If you're not happy with the idea of an intelligence agency following your footsteps across town, leave the phone at home.
Former officials don't appear to contradict him. Ex-NSA chief Michael Hayden described it as "commuting to where the information is stored and extracting the information from the adversaries' network." In a recent interview with Bloomberg Businessweek, he boasted that "we are the best at doing it. Period."
Malicious software used by hackers can be extremely hard to spot. But installing an antivirus program, avoiding attachments, frequently changing passwords, dodging suspicious websites, creating a firewall, and always making sure your software is up to date is a good start.
If Funk’s arrest were a single incident, it still would be of concern. But, according to a website set up to track arrests of journalists in recent years who were reporting on the Occupy movement, in the year ending in September 2012, “more than 90 journalists have been arrested in 12 cities around the United States while covering Occupy protests and civil unrest.” Add in a sizeable number of arrests in recent years of photographers for taking pictures at the scene of police actions and traffic incidents and there’s more reason to worry.
The rights to assemble, peaceably petition the government for change and to raise one’s voice in doing so, are all protected freedoms under the First Amendment — along with the right of a free press to gather and report the news without government sanction or disruption.
If police are arresting demonstrators for what they say and do out of legitimate concerns for public safety or for trespassing or such, having an independent news media there to accurately observe and report is a plus for officials and for our society. Ignoring that produces a double negative: doubt over the unreported motives and actions of police and other officials, as well as the trampling of First Amendment rights.
Mickey Osterreicher, general counsel for the National Press Photographers Association, said he deals with such arrest issues involving photojournalists “every day, all across the nation.” He works with police departments to educate officers on the rights of journalists — and the public — to take photos. He said catch and release police actions have no legal foundation, and that the increase in arrests may stem from a “perfect storm” of more cell phone cameras, and easier distribution and more visibility because of the Web.
Certainly, there are times when situations are chaotic and police must act to protect public safety. In such instances, it may be impossible to sort out the protester from the person reporting on the protest. But in Funk’s case, for example, there was no chaos and he visibly — with ID on and notebook in hand — was working as a reporter.
Click on their website www.smartcardfactory.com for more information.
No comments:
Post a Comment