Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?



Why I’m Not (very) Worried about PRISM

The NSA is tapping into our digital lives, monitoring voice calls, emails, social media, and who-knows-what-else. It’s for national security, say those on the side of the NSA; it has stopped terrorist plots already and will stop more.

The NSA is tapping into our digital lives, monitoring voice calls, emails, social media, and who-knows-what-else. It’s for national security, say those on the side of the NSA; it has stopped terrorist plots already and will stop more. It’s a heinous breach of privacy, say those on the opposing team; it is nothing less than a blatant intrusion of our personal lives, a digital version of breaking and entering and rifling through our closets, looking for skeletons.

I say, “meh.”

Government Surveillance

The reason isn’t because my closet lacks skeletons, or because I’m blinded by absolute patriotism and faith in the morality of my government. It’s because I understand, and try to live by, one of the best pieces of advice I’ve ever received on the topic of privacy: “assume that everything you do and say is being watched and heard, always.” It’s a fundamental principle of cyber security and Internet privacy, but it is advice that was given to me in grade school by my first grade teacher, after I had said something mean about a fellow student that was overheard. Then, I’d hurt someone’s feelings unintentionally. Now, the consequences of leaving a trail could be more severe. Then, there was no such thing as the Internet, or social media. Now, it’s almost impossible to avoid leaving an indelible digital trail of everything that you do and say.

The benefits of following this advice is that it fosters safe(r) digital behavior. If you have a secret, don’t email, text, tweet or even talk about it unless you are confident that you can’t be overheard. Is that document confidential? Then use TrueCrypt or something similar and jiggle your mouse like mad before emailing it to your colleague, or even your most trusted friend (random mouse movements are used to create entropic crypto seeds).

This advice also breeds a cautious paranoia, and that’s why I’m not shocked or outraged by the recent leaks of government spying. I’ve always assumed that the government was spying. The hackers certainly have been — they’ve been trying to steal my credit cards, passwords, and other details of my digital life for decades now. If I absolutely don’t want something to be stolen, I simply shouldn’t inter it into the digital landscape. Period.

We still buy thing online with credit cards, and we still connect our bank accounts directly to various third party agencies to automatically pay bills and direct deposit our paychecks. We do it because we’re relatively confident that we’ll be okay, and if a breach does occur, the breached institution will most likely help to solve the problem.

The irony is that, for most of us this is a risk/reward decision that we make and that convenience almost always wins; but for the bad guys it’s a decision that will most likely be made in favor of privacy. So the lesson is being learned, just not by the right team. The average citizen will continue to show their cards at the poker table and then complain about cheating, while the bad guys will smile with an ace up their sleeve.

Advertisement. Scroll to continue reading.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...


The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.


Many in the United States see TikTok, the highly popular video-sharing app owned by Beijing-based ByteDance, as a threat to national security.The following is...


Spanish Court agreed to extradite Joseph James O’Connor to he U.S., who allegedly took part in the July 2020 hacking of Twitter accounts of...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.


US government reminds the public that a reward of up to $10 million is offered for information on cybercriminals, including members of the Hive...