Warning Lights Are “Blinking Red Again”... Just Like Before 9/11
by 4Patriots
On Aug 27, 2018The fact is threats against America — from Russia and other countries — are increasing. Even worse, there is evidence that an attack like this could cripple us for quite some time. Today, our friends from 4Patriots break down what you need to know about a potential cyberattack.
An article in Cybersecurity, Global Threats
Spies Are Infiltrating the U.S…. But Not Where You Think
by Jason Hanson
On Aug 23, 2018Spies are infiltrating the United States, but not where you think… Here’s what that means for you and your privacy.
An article in Technology, Cybersecurity, Global Threats
17-Year-Old Hacks Midterm
by Owen Sullivan
On Aug 23, 2018River O’Connor is 17 years old. And he just hacked a U.S. election.
An article in Cybersecurity
STOP! Read This Before Plugging Anything Into Your Computer
by Jason Hanson
On Jul 26, 2018The countries that use USB devices to spy aren’t just targeting other spies. They’re also targeting average citizens like you and me. So here are a few basic precautions you should take when using USB devices — both at home and abroad.
An article in Privacy, Cybersecurity
Three Cybersecurity Tips From a White Hat Hacker
by Jason Hanson
On Jul 9, 2018Frankly, there is no better person to share the secrets of hackers than one of them. Here are the top three suggestions from a white hat hacker to help you protect your personal information online.
An article in Privacy, Cybersecurity
Stealth Searching: Three Ways to Erase Your Digital Fingerprint
by Jason Hanson
On Jun 28, 2018Who really cares what websites you visit? Everyone who can make money off of your personal data, that’s who. Here are three simple steps to help you protect your information by erasing your digital fingerprint.
An article in Privacy, Cybersecurity
Your DNA Can and Will Be Used Against You
by Jason Hanson
On Jun 19, 2018In this week’s batch of must-read articles, we’ll delve into the debate over our right to genetic privacy, you’ll discover where the drought is this week, plus learn how to eliminate over 20 different garden-variety insects — and more.
An article in Privacy, Sustainable Living, Preparedness, Cybersecurity
Give the Gift of Self-Defense
by Jason Hanson
On Jun 9, 2018In this week’s mailbag, I’ll reveal my No. 1 self-defense weapon that’s perfect for the whole family. One of my readers even gave one to his daughter. You’ll also discover how to get that meddlesome browser Chrome off all your devices, the easiest way to avoid being a victim of identity theft and more.
An article in Preparedness, Cybersecurity
What Would You Do If You a Hacker Threatened Your Family?
by Jason Hanson
On May 24, 2018Angela Ricketts was sitting in her Colorado home reading a book when she received the unimaginable. A Facebook message from someone she didn’t know threatening to harm her family.
An article in Cybersecurity, Personal Protection
Stay off the Grid in Small Town America
by Jason Hanson
On May 19, 2018In this week’s mailbag, find out how to stay off the grid without leaving the country, why you can’t trust hotel safes and the best way to maintain your search privacy on the internet with multiple layers of security.
An article in Privacy, Preparedness, Cybersecurity, Off-Grid Survival
On Dec. 2, 2015, Syed Rizwan Farook and Tashfeen Malik, a married couple, carried out a mass shooting and an attempted bombing at a San Bernardino County Department of Public Health training event.
This attack, which was also a Christmas party, took place in a rented banquet room at the Inland Regional Center. About 80 employees witnessed the carnage that day. When it was over, 14 people had been killed and another 22 injured.
Approximately four hours after the shooting, the couple was killed by police following a vehicle pursuit and shootout with local law enforcement.
According to the FBI, the couple were homegrown violent extremists without any ties to any foreign terrorist cell or network. They had become radicalized by information they found on the internet.
Encrypted Evidence
One of the pieces of evidence the FBI collected from searching the couple’s Redlands townhouse was an iPhone 5C that belonged to one of the shooters. The phone was not only password protected but set up so that after 10 incorrect password attempts, the phone would essentially self-destruct — erasing everything on the device.
The FBI failed to crack the passcode on the iPhone, which they needed to review any communications relevant to the investigation of the shooting. So they turned it over to the National Security Agency. However, the NSA was also unable to break into the phone.
Then the FBI asked Apple to create a new operating system that would override certain security features. Apple refused, citing a desire to protect the integrity of their encryption from the security risks inherent in creating a back door.
On March 28, 2016 — the day before a court showdown between the U.S. government and Apple — the FBI announced they had obtained the help of a third party to successfully crack the passcode on the iPhone. Once the FBI was able to access the information they wanted, the court case was withdrawn.
Problem solved, right? Wrong.
This left many unanswered questions regarding the government’s authority to forcibly access information on someone’s personal device — even in an ongoing criminal investigation.
The Potential Price of Privacy
Clearly, the debate about whether the government has the right to access encrypted data on personal devices is not going away anytime soon. Government agencies (like the FBI) claim their actions are necessary to thwart terrorism, while tech companies (including Apple) maintain this practice raises serious privacy concerns.
The FBI reports that in 2017 they were locked out of 7,775 devices involved in various investigations. Recently, “U.S. Deputy Attorney General Rod Rosenstein made the strongest argument that ‘warrant-proof’ encryption hobbles law enforcement’s ability to protect the public and solve crimes,” writes Tom Spring at Threatpost.
The thing is most tech companies create encryption that even they themselves cannot access. For example, according to Apple CEO Tim Cook, his company cannot access messages sent and received on its iMessage service. Which means if the tech company that created the software can’t even access the requested information, what good would a warrant do?
Now, what if access to a smartphone was needed to stop a terrorist plot and no one had a way to crack the encryption? Hundreds of innocent lives might be in danger.
On the other hand, what if the government had some type of software key that gave them access to encrypted devices? It would only be a matter of time before hackers figured out a way to steal or replicate it.
Plus, foreign governments would want to use the same access method to protect their countries. Eventually, this would defeat the entire purpose of using encryption.
Ways to Defend Your Data
There is no question we live in an era of government surveillance. If you are concerned about protecting your privacy from the government or hackers, you should always use encryption on your smartphone and other electronic devices.
The best way to do this is by downloading and installing a virtual private network (VPN). Many VPNs can be run on multiple devices. If you use a VPN, make sure it’s installed on all your devices, including your computer, tablet and smartphone — basically any device that connects to a network.
The VPN I recommend (which I also use) is TunnelBear. You can browse with confidence on up to five devices. Best of all, TunnelBear does not log any customer activity — so you don’t have to worry about ANYONE tracking your internet usage.
Another step you should take to protect your information along with running a VPN is use encrypted messaging services. Here are two apps you should check out:
1. Wickr — This app was one of the first to offer end-to-end encryption as well as self-destructing messages. Wickr contains multiple layers of encryption and is built on the industry standard calculations for security. Best of all, Wickr is free in the App Store.
2. WhatsApp — This is the most popular messaging app on the market, with over a billion users. WhatsApp not only provides similar encryption to Wickr but also uses secret keys to verify the authentication of messages. This app is also free in the App Store.
The U.S. government will continue to see an increase in the number of devices they are unable to access on demand as people push back with regard to their privacy. It’s only a matter of time before we reach a breaking point and new laws are created to address this issue. But for now, I recommend using every available method to protect your personal privacy.
One last thing I should mention: Perhaps the easiest thing you can do to avoid this issue altogether is to use an old flip phone instead of a smartphone — like I do.
Stay safe,
Jason Hanson