Smart SpendingSmart Spending

How to keep your info private, even from the NSA

Thwarting the efforts of a billion-dollar supersecret government spy agency -- or anyone who wants access to your personal information -- is not that difficult.

By MSN Money Partner Jun 11, 2013 5:47PM

This post comes from Dan Schointuch from partner site Money Talks News. 

MSN Money PartnerWith the recent revelations that the NSA and other agencies have been tapping into corporate streams of data that can provide them with massive amounts of private information about U.S. citizens, now is a good time to start thinking about how best to keep your private information private.

User name field on computer screen © William Andrew, PhotographerNot a big deal, you say? Well, whether you're concerned about the government digging through your personal data or not, you should be concerned about protecting your privacy. According to the Department of Justice's most recent National Crime Victimization Survey, "In 2010, 7% of households in the United States, or about 8.6 million households, had at least one member age 12 or older who experienced one or more types of identity theft victimization." That's almost one in 10, with 76% of them experiencing direct financial loss as a result.

Imagine that statistic was for bank robberies or home break-ins. If one in 10 Americans had their bank accounts emptied or their home broken into, we'd all be living in fear. And yet, that's happening every year to our personal information. Making that information harder for someone else to obtain is Step One in preventing identity theft.

And not all identity theft is of the "crime" variety. There's a famous quote that I'm paraphrasing: "If you're using a website and you can't figure out what they're selling, you're what they're selling."

Many corporations make a living off of selling or processing your personal habits and preferences for marketers, retailers and government agencies, practically without your knowledge. Since you're not being paid for this information, and (unless you speak legalese and love spending your afternoons reading "Terms and Conditions") you're not aware that it's being taken and used in this fashion, I'd consider it "theft." But since the government has yet to agree with me, the best way to prevent yourself being used in this fashion is to get a little more serious about your privacy.

In this article, we'll focus on the things the NSA has reportedly been looking at. It's reasonable to assume that if you can stop them from taking a peek at your private information, you'll have stopped hackers and others, too. Fortunately, thwarting the efforts of a billion-dollar super-secret government spy agency is not that difficult. You just need to know which services to turn to.

It's important to note that everything in this article is public knowledge. If you're worried about terrorists reading it and figuring out how to thwart our government's best efforts at finding them, don't be. The terrorists already know this stuff. You, however, might not.

1. Your phone

If you're looking to keep SMS messages secure and you have an iPhone, there's a free app called Wickr that can help. The app uses end-to-end encryption without storing the keys for decryption on its servers. What that means is that when you send a message to someone else using Wickr, nothing you say can be read by anyone at Wickr. Because of that, there's no stream of plain text messages going back and forth that the NSA or anyone else can siphon.

To make voice calls, the easiest option is Silent Circle, but you're going to have to pay for the privilege -- $20 to $29 per month to call other Silent Circle users, with an optional add-on to safeguard calls to everyone else. Joining Silent Circle also gets you secure chat, email and video calling.

If you're an Android user, you have a few more options than iPhone users do. For text messages, there's Gibberbot. Like Wickr, Gibberbot is free and promises more secure messaging.

And for calls, check out RedPhone. When calling someone who also has RedPhone, everything you say is encrypted, making it much more difficult for someone to listen in. Plus, it's free and uses your data connection, not your cellular voice. So not only will your calls be secure, you won't have to pay for the minutes either.

More Android apps to check out:

2. Your Dropbox

According to documents released by The Guardian and The Washington Post, Dropbox is "coming soon" to the NSA's spy program. If that were to happen, documents, tax records or other private information in your Dropbox folder could be subject to government monitoring. Add to that Dropbox suffering security breaches in the past, and they're just not safe enough for me. The solution? SpiderOak.

SpiderOak is just like Dropbox -- there's a folder, you put stuff in it, that folder syncs between computers and devices -- but with one important difference: good encryption. Everything you put in your SpiderOak Hive (that's what they call their syncing folder) is first encrypted on your computer using your password, then sent to the SpiderOak servers.

This means that even SpiderOak can't read your data without your password; it looks like gibberish. So if someone (the NSA, a foreign government, or a hacker in Latvia) manages to get into SpiderOak's servers, they won't be able to see what you've stored there without breaking one of the world's most advanced encryption algorithms (one the NSA trusts to secure its own data).

But SpiderOak can also back up any file or folder on your computer, sync any file or folder on your computer, and share any file or folder on your computer. This makes it a great one-stop-shop for all your syncing, sharing and backup needs.

There's a free plan that offers 2 GB of data, plenty for storing tax returns, scans of important documents, photos, small videos, and other data that you would prefer was stored securely. If you need more space, they offer it for a fee. Prices are almost identical to Dropbox, starting at $10 for 100 GB.

3. Your social network

Unfortunately, there's no good option here. You join social networks because you want to share things with others, or connect with people you know and see what they're sharing. Typically, this includes things that you might use as password reset reminders on other sites: a pet's name, your mother's name, high school you attended, favorite sports team, etc. That means that if a hacker or the NSA can gain access to your social media profile (either directly with your password, or indirectly by pretending to be someone you know and friending you), they can probably find enough information to gain access to your accounts on other sites, as well.

While there are a few start-up social networks that offer more advanced encryption of your data, they're complicated to install, and even more difficult to get everyone you know using them, too. For now, the best option is to assume that anything you post on Facebook, Google+, Twitter, Pinterest, etc., will eventually be read by everyone in the world. That way, it won't matter much if someone gets access to your data, be that a government agency, a jilted ex-girlfriend, or simply a prospective or current employer.

To share more securely, use something like SpiderOak or a secure messaging program to share directly with those you trust.

4. Your credit cards

Yes, the NSA is probably looking at credit card transactions, too. So how do you get around exposing your purchase history? "I already know this; the answer is to use cash," you're probably thinking. But how do you shop online without using a credit card?

The answer, sort of, is Bitcoin. It's a virtual currency (you give or receive Bitcoins, which are worth something in dollars), but if used correctly, it can provide almost complete anonymity when shopping online. And since you're not typing your credit card information into a site that may or may not keep that data secure, there’s no risk that your account will be stolen by someone hacking the site.

The only catch is that there aren't a lot of places that accept Bitcoins. In fact, you'd be hard-pressed to find ones that do. But if the currency takes off, it could become the "cash" of the Internet.

A more doable option? Buy prepaid gift cards from Visa, MasterCard or American Express with cash. Then use those to shop online. You'll probably have to pay a few dollars extra when buying the card, but afterward you’ll be able to shop anywhere those cards are accepted without having the purchase data and your identification forwarded to a government agency. If the site where you used the card is ever hacked, you've got nothing to worry; by that time you'll probably have already used the balance on the card and moved on to one with a different number.

5. Your Web history

Everything you search for on Google, and a good deal of your browsing activity, can also be snooped on by the NSA, according to news reports. The problem is your IP address. It's the sequence of numbers that identifies your computer on the Internet, and can be traced back to you through your ISP (Internet service provider).

The answer? A virtual private network, or VPN. A VPN will sit between you and the websites you visit, encrypting and relaying information back and forth. So when you do a search on Google, the IP address Google records as having performed the search is that of the VPN, not you. Find a good VPN, one that's easy to use, with a good price, limited or no logging of your activity and fast speed, and you'll be much harder to track online. Just make sure you sign out of your Google, Facebook, and Twitter accounts before connecting to the VPN, or use your Web browser's private mode.

Here's a list of VPNs to consider. If you just want me to pick one for you, check out They have software that makes them especially easy to use, can be set up on your computer, tablet or smartphone, have servers all over the world that you can connect to, and cost $10 for unlimited use (and it's even cheaper if you pay for a year in advance).

Bonus: Some VPNs accept Bitcoin as payment, making for the ultimate in anonymous Web browsing. Not even the VPN has to know who you are.

While using a VPN at home is something you might consider to protect your privacy from the NSA, using a VPN at a public Wi-Fi hot spot or hotel network should be mandatory. Often, those networks are unsecured and almost everything you do can be "sniffed" out of the air by someone else connected to the same network. A VPN would protect you.

6. Your everything else

While I've tried to hit all the major areas you might want to protect, this is by no means a comprehensive list of everything you can do to keep your private information safe and secure. Entire websites could be devoted to the topic.

Websites like Security In-A-Box. They'll teach you everything from creating good passwords and protecting your computer from hackers to remaining anonymous online and bypassing censorship. And it's free. If you're interested in protecting your data in this brave new world, I encourage you to check it out.


More on Money Talks News

Jun 11, 2013 11:41PM

With the government and corporations giving every American a colonoscopy at every given moment, all I know is that if I had a Time Machine I'd jump in and push the damn button for was much more simpler then.


Peace to all~

Jun 11, 2013 9:57PM
When will you learn we can not read the articles if we can not find a way to close the advertising.  
Jun 12, 2013 8:41AM
This is a dumb format as I cannot read the copy through the ad that invades the article.  Stupid, Stupid, Stupid.
Jun 12, 2013 10:27AM

Privacy has long ago gone the way of the dinosaur.

Jun 13, 2013 2:08PM

Other than the computer I'm typing this on, I try to keep my life simple and uncomplicated. Items 1, 2, and 3 don't apply to me, as my phone is a '60s rotary dial phone in my kitchen, I don't know what a dropbox folder is, and I've never had anything to do with social networking. (occasional replies to MSN articles is as close as I get)

I agree with Prometheus about 1967. (even though I wasn't even born then) I still try to lead a less stressful life as well. I find not owning a cell phone helps a lot. No facebook, no twitter, no hashtags, no in-car apps, etc. to worry about.

I have experienced attempted identity theft once, as someone in Canada once pirated my credit card info while the wife and I were visiting. The link to the 'Security-In-A-Box' site seems interesting, at least the part about computers, so at least I was able to get something out of this article.

Jun 12, 2013 9:56PM
how did people not know this it was always been  public knowledge ,I read of this before while in school  what's the problem its confirmed, watch 24 with Jack Bower they are actually capable of doing those things
Jun 20, 2013 6:53AM
Quit doing business with companies that freely share information. I haven't bought anything from Amazon in almost 2 years. Same with about every Internet company. I pay with cash, as I am anonymous and they have no way to tie me into any sales or ads.
Jun 20, 2013 9:15AM
As there is more and more pressure to use 'cloud' services, remember that 'cloud' is a synonym for 'someone else has your data'.  If they don't have your data, it is far more difficult for them to manipulate, or mine, your data.
Jun 20, 2013 11:25AM
the original patrioat act was to trac terrorist out of the country not millions of innocent americans, 4th amendment abuse going on here.  i have nothing to hide, however, i still would like a little privacy.
Jun 20, 2013 6:31AM

if they want to know they will find a way to find out  the key is to make it worthless for them to try

in other words you dont have anything they can steal like at all.

Jun 12, 2013 10:09AM
What I did to read the article:  Hightlight the text like you're going to copy it.  The highlighting shows through the ads and makes the it visible.
Jun 12, 2013 9:20AM
While I'm glad that the NSA's completely legal actions are now going under scrutiny, this stuff has been legal for the last decade. This has been quietly going on for the last ten years and I think the hype about all this is just a way to fill in a slow news season.
Jun 20, 2013 10:10AM

Beware of the "Cookie Monster". Those small "Cookie" files that contains information stored on your computer and communicates with Lord knows who on the outside (my computer had over 1000 Cookie files in Internet Explorer "Cookie" folder.

I simply do not allow cookies to be stored on my computer. And since some websites do require "Cookies" to view or navigate the site, I delete and now have my browser schedule deleting Cookies after leaving the site.

Otherwise use common sense and be careful. When I use my computer (and especially a public computer), I keep in the back of my mind that doing business on the computer; nothing is secret anymore.

Jun 20, 2013 10:08AM
Just another circumstance, if considered, will add to the possibility of a heart attack.   I'm a septuagenarian and have managed so far; besides, corporations and banks have our customer info and sell or share it.
Aug 14, 2013 10:56AM
We produce feature film (cinema) movies and have to fight piracy on a daily basis. We DON'T trust Google, Google drive and DropBox anymore for storing and sending our footage and masters to post-production houses and film festivals. 

As an answer to the people requesting for a "one button" solution and others that are looking for a easy solution without the need for special "geek" qualities - such as ourselves -, i'd suggest to look into the software we currently use, which is Provost CYPHR. It is a "one-click" solution for creating single-file strong encrypted archives that can be distributed over insecure networks or services. It works a bit (when opened) like an e-mail reader with text and file attachments. There are a few more professional products, but this one was the one we liked best, regarding price and reputation of the developer. 

I've written a blog about our quest for smarting out the pirates ;-) at  

CYPHR can be found here:  


Martin Beek
Jun 20, 2013 11:01AM

Both JFK and Robert Kennedy hated J. Edgar Hoover, who was head of the FBI at the time.  They were going to force him to retire when Hoover requested a meeting with them.


Hoover showed JFK a manila folder with "dirty pictures" in it; they came from his secret files.  JFK said, "What are you going to do with this Edgar?"


Hoover said, "That depends on you Mr. President".  Hoover died in office, nine  years later.

Jun 12, 2013 8:43AM

"If you're using a website and you can't figure out what they're selling.."


It's obvious to me this article is selling a false sense of security.


Jun 20, 2013 9:43AM
if you have nothing to hide then whats the problem!
Jun 11, 2013 11:20PM
Please help us to maintain a healthy and vibrant community by reporting any illegal or inappropriate behavior. If you believe a message violates theCode of Conductplease use this form to notify the moderators. They will investigate your report and take appropriate action. If necessary, they report all illegal activity to the proper authorities.
100 character limit
Are you sure you want to delete this comment?


Copyright © 2014 Microsoft. All rights reserved.

Fundamental company data and historical chart data provided by Morningstar Inc. Real-time index quotes and delayed quotes supplied by Morningstar Inc. Quotes delayed by up to 15 minutes, except where indicated otherwise. Fund summary, fund performance and dividend data provided by Morningstar Inc. Analyst recommendations provided by Zacks Investment Research. StockScouter data provided by Verus Analytics. IPO data provided by Hoover's Inc. Index membership data provided by Morningstar Inc.


Smart Spending brings you the best money-saving tips from MSN Money and the rest of the Web. Join the conversation on Facebook and follow us on Twitter.