Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Privacy

Why I’m Not (very) Worried about PRISM

The NSA is tapping into our digital lives, monitoring voice calls, emails, social media, and who-knows-what-else. It’s for national security, say those on the side of the NSA; it has stopped terrorist plots already and will stop more.

The NSA is tapping into our digital lives, monitoring voice calls, emails, social media, and who-knows-what-else. It’s for national security, say those on the side of the NSA; it has stopped terrorist plots already and will stop more. It’s a heinous breach of privacy, say those on the opposing team; it is nothing less than a blatant intrusion of our personal lives, a digital version of breaking and entering and rifling through our closets, looking for skeletons.

I say, “meh.”

Government Surveillance

The reason isn’t because my closet lacks skeletons, or because I’m blinded by absolute patriotism and faith in the morality of my government. It’s because I understand, and try to live by, one of the best pieces of advice I’ve ever received on the topic of privacy: “assume that everything you do and say is being watched and heard, always.” It’s a fundamental principle of cyber security and Internet privacy, but it is advice that was given to me in grade school by my first grade teacher, after I had said something mean about a fellow student that was overheard. Then, I’d hurt someone’s feelings unintentionally. Now, the consequences of leaving a trail could be more severe. Then, there was no such thing as the Internet, or social media. Now, it’s almost impossible to avoid leaving an indelible digital trail of everything that you do and say.

The benefits of following this advice is that it fosters safe(r) digital behavior. If you have a secret, don’t email, text, tweet or even talk about it unless you are confident that you can’t be overheard. Is that document confidential? Then use TrueCrypt or something similar and jiggle your mouse like mad before emailing it to your colleague, or even your most trusted friend (random mouse movements are used to create entropic crypto seeds).

This advice also breeds a cautious paranoia, and that’s why I’m not shocked or outraged by the recent leaks of government spying. I’ve always assumed that the government was spying. The hackers certainly have been — they’ve been trying to steal my credit cards, passwords, and other details of my digital life for decades now. If I absolutely don’t want something to be stolen, I simply shouldn’t inter it into the digital landscape. Period.

We still buy thing online with credit cards, and we still connect our bank accounts directly to various third party agencies to automatically pay bills and direct deposit our paychecks. We do it because we’re relatively confident that we’ll be okay, and if a breach does occur, the breached institution will most likely help to solve the problem.

The irony is that, for most of us this is a risk/reward decision that we make and that convenience almost always wins; but for the bad guys it’s a decision that will most likely be made in favor of privacy. So the lesson is being learned, just not by the right team. The average citizen will continue to show their cards at the poker table and then complain about cheating, while the bad guys will smile with an ace up their sleeve.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Cybercrime

Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Ransomware

The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.

Privacy

Many in the United States see TikTok, the highly popular video-sharing app owned by Beijing-based ByteDance, as a threat to national security.The following is...

Privacy

Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...