Posts Tagged ‘Fourth Amendment’

Privacy in the Modern Age, Part 5

Privacy In The Modern Age, Part 5   <– PDF

It sure is convenient in these modern times to have the internet available; there is so much more information than there was back in the days of the Encyclopedia at the local library.  But, take the bad with the good: there is also a lot of false and misleading garbage out there, too.  At least the cigar-chomping old guys who wrote the Encyclopedia had their work reviewed by competent experts, and if it was in the Encyclopedia, you can be sure that the authors and reviewers believed that their articles were true and correct at the time it was written.  The internet, on the other hand, is full of people who lie for a living.

There are a great many other issues to contend with regarding computers, the internet, and privacy.  If you use a Microsoft or Apple operating system, you cannot actually delete a file.  When you tell those operating systems to delete a file, all it does is delete the pointer to the first byte in the file, not the data itself.  That means that all your files are still there, and anyone who understands how the file system and pointer system can recover anything that you thought you had deleted, including all your financial and personal data.  The only remedy is to install special commercial software programs (Sdelete, ccleaner, or Eraser) that overwrite all disk space not actively being used (including the “deleted” files).  However, if you use a UNIX-based operating system, it will in fact entirely delete a file, and overwriting is not necessary.

There are other risks that can compromise your privacy entirely.  First, you do have control over what you download from the internet.  But you do not have any way to control, or even to know, what is being uploaded from your computer whether you are on the internet or not.  You, the PC user, are not provided with any tools that will allow you to see what is being sent from your PC without your express consent.

Second, we are all aware of the numerous “viruses” on the internet designed to shut your system down or encrypt your data until you pay a ransom to have it unlocked.

Third, the large tech companies are trying to convince you to store all your data on the “cloud”, which is (of course) advertised “for your convenience”.  They even tell you that all your data is encrypted.

Fourth, most internet search engines (especially google and bing) track all your internet searches and maintain a list of all the websites you have visited.

Here are some suggestions to mitigate these direct risks.  This is not foolproof, and it is only a first-order method; there are far stronger methods.

  1. Never store anything on the “cloud”. It may well be that your data is encrypted, but so what? What matters is who has the encryption key; and of course, no one is going to tell you what corporations or what government agencies have the keys.  You should not assume anything you place on the cloud is actually kept private.  Instead, use a separate external hard drive (a drive holding one terabyte now costs about $50), connected to your PC through one of the USB ports.
  2. Never store anything of value on your PC’s main hard drive. Store everything of any importance on the external drive only. Never store any financial records, personal data, pictures of yourself or your family, your driver’s license copy, or anything of relevance on the PC hard drive, only on the external drive.  The exception is that you can store individual documents on your PC hard drive only if they are encrypted. In addition, use thumb drives as backups to the external drive (since the external drive will fail at some point).
  3. Disconnect the external hard drive from your PC whenever you get on the internet. That way, if anything is being uploaded, only the things of no value can be uploaded without your knowledge.
  4. Use strong passwords of important documents; this utility is found on nearly all commercial software products (although you may have to access the non-helpful “help” to gain access to how it works. Your password should consist of at least 10 characters, and be a combination of letters, numbers, and symbols. Do not store the password anywhere on the PC; instead, write them down in a small notebook and put them in a secure place elsewhere in your home or office.
  5. Only use internet search engines that do not preserve a search history (such as DuckDuckGo, IXQuick, or StartPage). Do not use google or bing or any other ones that retain a search history.

 

Tags: ,
Posted in fourth amendment, Privacy | No Comments »

Privacy in the Modern Age, Part 4

Privacy In The ModernAge, Part 4   <– PDF

There are only two kinds of emails: professional and personal.

If you have a professional email account at your workplace, then everything stated in that email should be professional in tone, all business.  Your boss and others in your company have access to all of them, and if you put personal items into a workplace email or attach offensive pictures, then that is a problem you have created and should correct immediately.  Keep the workplace emails professional.  No one is going to get too concerned about occasional innocuous jokes about how computers don’t work, or why the soda machine eats your quarters.  But never mention any personal comments about other workers, or the boss, or company policy, unless your boss specifically directs you to do so.  Never put the company’s trade secrets in an email, unless directed by the company’s owner.  But if you are directed to put trade secrets in an email by some generic manager, make some excuse not to, and remind him that trade secrets are to be protected.

I have an email that I use for professional purposes.  Since I am an independent writer, I put things in my emails that are intended for public viewing, and I don’t much care what people think about them.  They are written specifically for public consumption.  But the normal workplace is very different: keep to the relevant subjects at hand that pertain to your work, and leave it at that.

Personal emails are a different thing altogether.  You will note that “hotmail”, “gmail”, and many others are given “free”, meaning that the provider pays the near-term direct costs, while you pay the long-term indirect costs.  When you delete an email from your “free” account, it may appear to be gone, but in fact all emails are retained permanently.  A clever enough hacker can obtain all your emails, current and deleted; and of course, the provider has access to them always.  Once again, we do not really know who has access to them or if the providers have agreements with marketing corporations or government agencies to provide copies of all emails for review.  The FBI has been using in-house software since the 1980’s (called OMNIVORE and CARNIVORE) to intercept emails and all internet traffic from a particular ISP.  It has now been replaced by a commercial code NARUSINSIGHT.  Supposedly, the software is designed to intercept only traffic between a certain individual against whom the FBI has secured a search warrant.  But in this age of mass electronic intercept and storage capabilities, it is reasonable to assume that all emails are searched for certain keywords that some government agency deems “offensive” or “threatening”. Remember: if a technology exists, it is first used against recognized national enemies, but the second use is against all citizens.   There is no way to know who has access to your emails, or for what purpose. At minimum, your emails are probably being scanned by corporations for the purpose of directing advertisements in your direction.  That is annoying but harmless; however it is common now for people to have their careers ruined for something they put in an email twenty years ago; and our current ruling elite seems fascinated and overjoyed at the power of intimidation and cancellation they now wield without consequence.

So what is the best you can do to preserve your privacy regarding personal emails?  Here are some simple rules:

a. Use end-to-end encryption if possible. But don’t rely entirely on encryption: someone somewhere has the means to either break the code or obtain the keys.

b. Never put anything in an email of any importance, such as full name, address, phone number, date and place of birth, Social Security Number, mother’s maiden name, names of relatives, places you have previously lived, banking information, or schools you attended. If this information is to be provided for some legitimate purpose (such as applying for a loan), make sure it is provided only on a secure website, not by email. Even better, send it by U. S. first-class mail.

c. Never attach pictures of yourself, your relatives or friends, or any that show your home, car, or street.  If you want to send pictures, have them printed and send them by U. S. first-class mail.

Tags: ,
Posted in Privacy | No Comments »

Privacy in the Modern Age, Part 3

Privacy In The Modern Age, Part 3  <– PDF

I was stopped at a stop light yesterday, and next to me, also stopped in the left-turn only lane, was a young lady in a sports car, looking down, clearly occupied with her phone.  She was the fourth car in line, and when the left-turn arrow turned green, the first three cars made the turn, but she just sat there, updating her Facebook [“The New AOL”] page or something much more important that paying attention in traffic.  Anyway, she happened to look up just as the arrow was turning yellow, so she accelerated from a dead stop and made the turn just as the arrow turned red.  Fortunately, there was no one behind her in line.

People now seem to be obsessed with whatever crap is on their phone, but that is not the worst of it.  The real problem is that people are now in the habit, a very bad habit, of storing important information on their “smart” phones.  Your “smart” phone represents a very high risk to your privacy.  First of all, it is likely that all “metadata” on all phone calls is being stored in some corporate or government database other than the phone provider.  “Metadata” is information on: a) your phone number; b) the other party’s phone number; c) both locations; d) time of day; and e) length of call.  It is collected automatically by the phone service providers (usually for billing purposes), but we do not know if that data is sold, to or whom it might be sold to, or what it is used for.  Marketing people can use metadata to target you for advertising, if the metadata determines that you call certain types of businesses.  The police can use it to determine if two people know each other.  Artificial intelligence algorithms are now in use that can use metadata in conjunction with public records to determine a person’s identity, even if they only know the phone numbers.  The data on the calls you make, and the calls made by your contacts, and the ones subsequently made by those parties will allow an algorithm can determine to what extent many different people are connected.

Second, text messages are eternal; they are stored by the phone provider and on your phone, along with any and all pictures.  I like to watch the true crime (“dumb criminal”) TV shows in which a woman kills her boyfriend’s wife, then texts him, “Yup, I done killed her dead, I stabbed her 14 times and threw the knife in the dumpster behind the 7-11.”  You should regard text messages as being the equivalent of a billboard next to the interstate highway.  They are never deleted by the phone provider, even If you delete them from your phone.

Third, if your “smart” phone has internet access, all the sites you visit and all your email messages are being stored by your provider, and also on your phone, same as on your computer.   If your “smart” phone can take pictures, each picture is time-tagged along with the location of the phone when the picture was taken.

Fourth, we do not know who has access to all this metadata, and worse than that, we do not know who is recording our phone calls.  What is the possibility that such data could actually be stored?  Most phone calls end up on a communication channel that use the T-1 standard developed in the early 1960’s.  T-1 is a digital stream at 1.544 Mb/s that can handle 24 calls at 64 kb/s each (plus some additional timing and frame synchronization overhead).  Since a byte is 8 bits, T-1 voice channels operate at 8 kB/s.  Let’s suppose you are on the phone for an hour a day.  An hour is 60 minutes, each consisting of 60 seconds, for a total of 3600 seconds per hour.  At 8 kB/s, an hour of recorded voice in digital format would require 28.8 MB of data storage.  If there are 320 million people in the U. S. and each is on the phone an hour a day (assuming both two channels are required to obtain both sides of the conversation), the total storage requirement would be 9.216E+09 MB per day, or 9.216E+15 bytes per day.  A terabyte (TB) is 1000 gigabytes (GB), and a GB is 1000 megabytes (MB).  A terabyte disk drive can be purchased for about $50 retail.  Therefore a TB is 1.0E+12, and thus 9216 one-TB drives would suffice to record in digital form all these phone calls.  Multiply by 365 to get the storage requirement for one year: 3.364 million one-TB drives.  It is not too hard to conceive of a data storage facility with this capacity, given the density of storage units.  Recording and storing is the easy part; it is the indexing and accessing that would present a more difficult problem.  But it doesn’t matter: the fact that it can be done means that you should assume that it will be done, or maybe is already being done.

So, anyone with inside connections, or a cooperative agreement between your phone provider and the government, or your phone provider and a paying corporation, means that sooner or later, anyone who wants the content of your conversations and text messages will be able to get them.  That is leaving aside the current capability of the police to obtain all this if they are granted a search warrant under probable cause.  We do not know if there are any “secret” probable cause standards that may apply.

Once again, there is no reason to assume that corporations or governments (especially foreign governments) are abiding by their advertised “privacy” policies. You do not have the means to force them to prove it.  You should assume they are not abiding by their stated privacy policies, and that any data they possess about you is at least being used for marketing purposes.

So, what can you do to improve your privacy position?  You cannot prevent your phone provider from collecting metadata; that is written into the contract. But you can do several other things:

  1. Get rid of your “smart” phone and go back to the dumbest phone you can find.
  2. Stop texting; if it’s not important enough to talk to someone about, it probably isn’t important enough to bother them with. Go back to having normal conversations like humans are meant to do.
  3. Use your dumb phone to make one or two wrong number calls each day; completely random.
  4. Even if your dumb phone has camera capability, do not take pictures with it. Buy a separate camera for pictures.
  5. If you must have a “smart” phone, use encryption.
  6. No matter what kind of phone you have, turn it off most of the time and use pre-arranged times to turn it on and call people.
  7. Go back to a house phone and minimize the use of mobile phones (if you can afford the extra charge).
  8. Ward off “junk” phone calls by answering them with greetings like “Alien Abduction Hotline”, “Bigfoot Sighting Information Center”, “Internal Revenue Service Audit Division”, “Lucifer’s Mortuary”; and “Ford Pinto Parts and Service”. You get the idea.
Tags: ,
Posted in Bill of Rights, fourth amendment, Privacy | No Comments »

Privacy in the Modern Age, Part 1

PrivacyInTheModernAge_1   <– PDF

Introduction

The Fourth Amendment to the U. S. Constitution reads:

“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

This particular Amendment was to ensure that one abuse, among others, that had been inflicted the colonists by the British government could not be repeated under the Constitution: the infamous ‘writ of assistance’.  The historian John Fiske [1] gives a summary:

“In 1761, it was decided to enforce the Navigation Act, and one of the revenue officers at Boston applied to the superior court for a “writ of assistance”, or general search warrant, to enable him to enter private houses and search for smuggled goods, but without specifying either houses or goods.  Such general warrants had been allowed by a statute of the bad reign of Charles II, and a statute of William III, in general terms, had been granted to revenue officers in America like powers to those they possessed in England.  But James Otis showed that the issue of such writs was contrary to the whole spirit of the British constitution.  To issue such universal warrants allowing the menials of the custom-house, on mere suspicion, and perhaps from motives of personal enmity, to invade the home of any citizen, without being held responsible for any rudeness they might commit there, – such he said, was ‘a kind of power, the exercise of which cost one king of England his head and another his throne;’ and he plainly declared that even an act of Parliament which should sanction so gross an infringement of the immemorial rights of Englishmen would be treated as null and void.”

James Otis was a Boston lawyer, and one of the principal proponents of independence in the 1760’s.  He was in declining mental health and suffered permanent injury in 1769 after being severely beaten by a British customs officer.  However, he was able to sneak out of his house and fought against the British in the Battle of Bunker Hill (17 Jun 1775), escaping afterwards back to his house.

The Fourth Amendment requires any agent of the government to apply for a warrant, to be sworn under oath before a judge, describing what is to be searched and what evidence they have already obtained that would justify such a search.  It has always been a feature of American justice, at least at the local level, with two exceptions: it never applied to slaves, and it did not apply to free black people in the South during the Jim Crow era (1890’s to about the 1940’s).  The Democratic Party was an advocate for slavery and later was responsible for Jim Crow.

But we now have three problems not contemplated by the authors of the Constitution.  First is the growth of electronic technology; secondly, the power of corporations that control the electronics technology; and third, the union of those corporations and the government.  At this point in our history, the average American, unless he practices good electronic security, has virtually no privacy at all.  The following essays will describe these risks, and what you, the average American, can do to protect your privacy in the digital environment that we now wallow in.

But before we get to details, let’s first establish how the Fourth Amendment should be interpreted, and by extension, how we should think of individual privacy.  To me it means different things in the three cases I’ve mentioned.  Toward the government alone (case 1) it means, “My affairs are none of your business unless you have prior evidence that justifies investigation.”  Toward corporations, and the cooperation between corporations and the government (cases 2 and 3) it means, “My affairs are none of your business.”

There is one cardinal rule that we should remember in regard to privacy in the electronic environment: if a violation of your privacy is possible, it is being done unless the government and corporations prove under oath that it is not.  Even then, take their claims with a grain of salt.

Reference

[1] John Fiske, John Fiske’s Historical Writings, NY: Houghton, Mifflin and Company, 1896, Vol. 10, p. 14.  It is the same as Fiske’s original The American Revolution, 1891, Vol. 1, p. 14.

Tags: ,
Posted in Bill of Rights, fourth amendment, government powers, U. S. Constitution, writ of assistance | No Comments »