Tag Archives: NSA

More and more often, a fresh batch of compromising emails threatens to torpedo a reputation, whether it’s Chris Christie staffers coordinating political retaliation, the swirl of exchanges that sparked the Petraeus scandal, or the embarrassing and costly boasting of former Goldman Sachs trader Fabrice “Fabulous Fab” Tourre.

These are some of the most egregious examples of the havoc that can ensue, but the risks of errant mails aren’t limited to top government offices and Wall Street skyscrapers. Nor are the dangers they pose anything new. Half of computer users “have accidentally sent a sensitive email to the wrong person” and “70 percent of businesses are concerned about sensitive material falling into the wrong hands as a result of data leakage via email.” Before you click that send button again, let’s take a look at what we’re up against, as well as some ways we can protect ourselves.

Data Leaks

One of the first things to keep in mind is that email isn’t as private as you might think, especially at work. “Even if your employer doesn’t have an email policy, it still probably has the legal right to read employee email messages sent using its equipment and network,” says attorney and author Lisa Guerin. Emails are often exposed in the course of investigations and trials. They can also be stolen by hackers, such as the recently-jailed Guccifer, whose exploits included posting paintings by George W. Bush, or Christopher Chaney, who’s serving time for hacking the email accounts of stars like Scarlett Johansson and Christina Aguilera. Then there are the major email providers, which often reserve the right to snoop on you in their privacy policies, and the NSA, which can probably intercept your messages.

 Gone But Not Necessarily Completely

It’s also important to remember that, even though an email may be long gone from your inbox, that doesn’t mean it’s vanished completely. Those who’ve had their private messages go viral can attest to that. “E-mail, Twitter, texting and the rest all intuitively feel like short fuse ephemeral communications—a quick word in passing, if you will,” explains former British intelligence officer John Bassett in an article on India’s NDTV.com. “Yet as soon as we push the send button, these communications take on an enduring digital permanence that means that in effect they never quite go away.”

 
 

Recent revelations about the NSA’s social media mining and analytic system have attracted much controversy. Many people don’t realize that a growing number of private companies use many of the same methods and have similar capabilities.

Such companies sell information to clients ranging from law enforcement and security companies to human resources departments and corporate intelligence firms. So it is critical to give some thought to strategies for managing your social media and other online activity. That is, if you are concerned with that activity (and your contacts) being collected, analyzed and possibly provided in reports to current or prospective employers, clients, partners and others.

Online investigative firms offer services ranging from basic social media screening, identification and verification to more extensive analysis and investigation, encompassing public records reports, deep Internet searches, social network mapping, activity monitoring, and resume vetting. On a broader scale, data from social media accounts and other online sources are also frequently scraped by automated bots, then aggregated and published by websites such as Intelius.com and USSearch.com.

Protecting your privacy

One way to protect your personal information is to stay off of social media entirely, or to limit your presence to a single trusted platform like LinkedIn. You can minimize the information that data mining companies obtain, while gaining greater control over what you do and don’t want to make available online.

Such a simple solution will work for some, but if abstaining from social media isn’t a viable option, a deliberate and cautious approach to managing your online image is necessary. Develop an appropriate strategy for managing your presence across all the platforms that you use.

Given the “new generation of programs that ‘revolutionize’ data collection and analysis” that are described by the New York Times, it’s also important to take a close look at what you may be revealing on social media in less obvious ways, such as through your network of connections, location metadata, and anything else that could be combined with public records and other available information to glean details about you. These pieces of data may seem obscure or inconsequential on their own, but with the advanced capabilities of the NSA and many private intelligence firms, you may be sharing more than you ever intended.