Privacy Blog

“By continuing the process of inflation, governments can confiscate secretly and unobserved an important part of the wealth of their citizens.” – John Maynard Keynes, writing about the effects of a seemingly small amount of inflation every year.

Telephone Security

NSA says Searches of Americans’ Data without a Warrant Spiked in 2017

Do you feel like someone is spying on you? Your hunch might be correct. An article by Zack Whittaker in the ZDnet web site says, “The agency collected a staggering 534 million domestic phone records last year, up threefold on the year earlier.” The article also states, “According to the figures [released on Friday], 7,512 Americans had their calls and messages searched without a warrant, up by 42 percent on […]

Continue Reading →

Perhaps the Most Secure “Burner Phone” of All?

Politicians, business executives, movie stars, professional athletes, and anyone else concerned with their personal privacy might want to have a second cell phone in addition to their primary phone. The second cell phone often is called a “burner phone.” It can be used to hide sensitive information from news reporters, overseas hackers, government agencies, business competitors, law enforcement personnel, Border Patrol, or from a curious spouse! See my earlier article, […]

Continue Reading →

Michael Cohen had 16 Cell Phones Seized by the FBI

I’m jealous! Security experts often advise politicians, business executives, movie stars, professional athletes, and others to always have a second cell phone in addition to their primary phone. The second phone, sometimes called “a burner phone,” should receive little use. The owner is advised to use it only when he or she might want to hide something from law enforcement personnel or Border Patrol or perhaps is in danger of […]

Continue Reading →

Without Encryption, It’s So Easy for Anyone to Eavesdrop on Your Phone Calls

An interesting article by Dennis Peng can be found in the Ooma Blog. The article talks mostly about hackers and governments listening to your cell phone and wired telephone calls. Amongst other things, the article states, “There is a backdoor built into every cell phone call. It can be accessed by intelligence agencies, hackers, or anyone with your telephone number.” As to old-fashioned wired telephones, Peng writes, “Every day, collection […]

Continue Reading →

How to Fight Mass Surveillance even though Congress just Reauthorized It

Bruce Schneier is a security technologist and a lecturer at the Kennedy School of Government at Harvard University. He is also the Chief Technical Officer at IBM Resilient, a fellow at Harvard’s Berkman Center, and a board member of EFF. Indeed, he is one of the leading experts in the field of computer security. He recently published an article in The Washington Post that describes the problems and the risks […]

Continue Reading →

Why Do You Have Two Telephone Numbers? Use an Amazon Echo Instead.

According to a recently published U.S. Health Department report at http://bit.ly/2icwvuw, 50.8 percent of American homes don’t have a landline telephone. Instead, the residents use a cellphone as their only phone or use a computerized VoIP phone or other, alternative telephone device. The number of landlines in homes has declined in recent years and apparently will continue to fall. There’s simply no need to have both an old-fashioned wired home […]

Continue Reading →

Volunteers Around the World Build Surveillance-Free Cellular Network Called ‘Sopranica’

Most people in the United States—and increasingly, around the world—carry the most sophisticated surveillance devices ever created in their pockets day in and day out. Although smartphones have enabled governments and corporations to track our movements and monitor our conversations with unprecedented ease, these devices are also an incredibly useful personal tool and have become an indispensable part of modern life. Sopranica is a do-it-yourself grass roots project to create […]

Continue Reading →