Computer Security And Privacy

 

 

You need to understand that you and the computer you’re using right now has a specific digital fingerprint. The information included in that fingerprint includes many things from the make of processor your computer uses, to the printer connected to it. Individually, these things might not be enough to absolutely connect you to the computer.

For example, many people in the world who use the same make and model computer as you. However, the number of people who use the same computer, same processor, and same hard drive is significantly less. When you add enough variables such as the model of your mouse and keyboard, or the web browser or other software you use, it becomes easy to distinguish your computer from all the others. When you do something on a computer that connects you to it, like order something engraved with your name from Amazon, the metadata stored by the government has a link between you and your computer.

 

With this in mind, it’s important to realize that the advice I’m recommending can only go so far. You might install military level encryption on your mobile phone or device (one of my recommendations lets you do just that), but if you order a pizza delivered to your house, you’re leaving a digital trail. There are plenty of tools to help you be safely outside the watchful eye of Big Brother.

 

You no longer need a desktop computer for computing power. Therefore, I recommend you only use laptop computers because they are so much easier to control, move, hide, or bring with you. I’m not even going to discuss desktop computers that are fixed in their location, hardwired to a printer, and too big or awkward for you to move, hide, or securely lock away.

 

The precautions in this chapter for laptops, applies to all computers, tablets, smart TV’s, or other smart electronics that access the Internet.

 

You can take all the precautions there are but should never be lulled into thinking the data on your laptop is secure. While I will discuss the Internet, email, and encryption, the safest approach is a laptop that’s never connected to anything outside itself and only used by one person. I realize that is not realistic in today’s world so please read on

 

Let’s assume you have some files or folders you wish to keep private. These files might be personal letters, business secrets, the manuscript for your latest book, a confidential list of names and addresses, photos, etc.

 

 

Here are some scenarios showing how access to private files happens:

 

A burglar breaks into your home and steals your laptop then sells it to a fence, who sells it to … Who knows! Anyone with your laptop can access your private stuff.

 

Law enforcement gets a search warrant based on a false complaint against you and seizes your laptop. You may never be arrested, or the charges dropped, or much later, you are found innocent. Nevertheless, they will have accessed your laptop, cloned the hard drive to keep even if your laptop is ordered returned to you. They will access your private files, folders, and emails using specialized software. Fingerprint readers, eye scanners, etc., are not going to protect your private stuff. However, encryption CAN protect your private files.

 

A Private Investigator who parks his van down the street or a snoopy neighbor can watch the “Van Eck” emissions from your screen. They will legally see everything that appears on your screen.

 

A Federal Agency targets you for questionable reasons and does not have the real evidence to get a search warrant. Instead, they do a Sneak & Peak entry into your home and will check or clone the hard drive on your laptop. Before leaving, they will install a keylogger on your laptop, which records every keystroke you make, including passwords. Probably, bugs will be left on your phone and elsewhere. You will never be wise to this invasion.

 

An untrustworthy spouse, girlfriend, relative, neighborhood snoop, local bad person, or a private investigator, installs a keylogger on your laptop during a birthday party for your child.

 

A family member, a neighbors teenaged child, or your best friend, decides it is OK to invade your personal files.

 

There are many more scenarios where your private computer stuff could fall into the wrong hands.

 

 

RECOMMENDED UMBRELLA PROTECTION

 

Protect Your Location And Your Name:

 

Disappear as a person and live under the cover of your protected Business Name and Business Identity. If nobody except select people you trust knows your Given Name or where your home is, then law enforcement, federal agencies, private investigators, snoopy people in general, and untrusted people, cannot find your home. None of them will be able to confiscate, steal, alter, or add to your laptop computer because they don’t know where you live. Your phone, Internet connection, utilities, cable TV, etc., will all be in a protected Business Names not traceable to you personally. The home itself, rather owned or rented, will be under a protected Businesses Name. You won’t function as a person or under your Given Name. You will instead be a respected, successful, private, and protected Business Owner.

 

 

Do You Need file encryption software?

 

Most people assume encryption is beyond a normal human’s realm, too much trouble, or too costly. Those assumptions are all false. There is Freeware that after a short setup of creating a new storage locker, accessing files and folders is easy. There is no noticeable slowdown when accessing your data. You can even take all your files with you by transferring your locker to an encrypted USB pen drive that can be used on any computer without the original software.

 

Private information can be embarrassing if released to the public, therefore the word “private”. In addition, losing personal information to the wrong person (stolen laptop), could result in identity theft. That would be worrisome and stressful, none of it necessary because it’s possible to protect your sensitive data.

 

Data encryption means you’ve essentially shredded it. No one can read it. With computing power, we can “unshred” our data back to its original state. We can use, revise, add to it, and shred again. You can do it as many times as you like. Unlike paper, your shredded data can’t be pieced together, at least not without knowing the proper key or password.

 

NOTE ON ENCRYPTION PASSWORDS:  If you encrypt files with a password, understand that computer forensic experts use password-cracking programs that can find any real word in any language. DO NOT store your passwords in your wallet, purse, or on an index card taped to the bottom of a desk drawer.

 

Be careful about password-hint alternatives on Web sites. Make sure the hint is not a giveaway to anyone who knows you well. For example, if the question is about your pet’s name, use a different name and memorize it. Never use a real word by itself. Instead, use a KEY PHRASE where you type the first letter of each word, followed by a word at the end. Eight digits should be your minimum and twelve is better.

 

KEY PHRASE PASSWORD EXAMPLE:  The phrase “I Love To Eat Red Fruit At Night” translates to “ilterfan.” Next, capitalize the second letter or the fifth. We now have iLterfan. Add a four-digit number, perhaps some keyboard pattern such as “7410” to arrive at “iLterfan7410”.

 

Memorize your Key Phrase Password.

 

There are many encryption software programs out there and you can spend some serious coin. However, to take my advice for a superior and Freeware encryption product, click below to checkout TRUECRYPT:

 

http://www.truecrypt.org/downloads

 

 

What About Internet Security?

 

For peace of mind whenever you access the Internet, and regardless if you're at home, at work, or on the run, how do you make the Internet private? Can you remove viruses, malware, and ad-trackers? Can you encrypt your Internet traffic? The short answer is “YES” and if you would care to take my recommendation for a superior and Freeware Internet solution, checkout SPOTFLUX by clicking below:

 

http://www.spotflux.com/

 

 

You of course want to run antivirus software and you should avoid or delete any free trial that may have come with your laptop. The paid antivirus providers such as Norton or MacAfee will invade and eventually slow down or take over your computer … I’m not kidding!

 

Run a free antivirus / antimalware software such as AVG, Avast, or Malwarebytes. Don’t pay for the upgraded versions of these as that is not needed. You should only run one antivirus / antimalware program or there will be conflicts that can cause severe problems on your computer. You should only download software from a secure website such as CNET. My personal favorite is Malwarebytes. Click below for more information:

 

MalewareBytes

 

 

Run a free Antispyware program such as Spybot - Search and Destroy … This program can seek and destroy malicious spyware on your computer:

 

Spybot - Search & Destroy

 

 

NEW LAPTOP NOTE:  When you purchase a new laptop, the manufacturer will have loaded it with all kinds of free software and free trials. This is commonly referred to as “bloatware”. The manufacturer is able to sell you the computer at a reduced price because software providers pay the manufacturers to load their software on new computers. All of this bloatware will invade and slow down your computer until it becomes too slow to use. Have you ever noticed that a new computer is never again as fast as the first time you used it and it gets slower over time. Bloatware is part of the problem.

 

NEW LAPTOP RECOMMENDATION:  I recommend you take a new laptop and have a clean install of your operating system and software done without all the bloatware … Before you even use it!

 

Please keep in mind that computer security is a rapidly changing field. Therefore, any software recommendations I’ve given, might not be good choices as time goes by. Check for better software online every few months to see what the latest developments are for software protection against the latest types of threats.

 

 

LAPTOP SECURITY LEVELS - IN DESCENDING ORDER

 

Level One Laptop:

 

A laptop used by yourself and never shared with anyone else (even your spouse and children). This laptop is NEVER connected to the Internet and has wireless connections disabled. Of course, it is NEVER used for email. You bought the laptop under a protected Business Name and paid for it anonymously with a protected Business Debit Card or preferably Paid Cash. There is no association of this laptop with you personally or even to your business.

 

You should “password protect” this computer to prevent casual intrusion (any sharp computer person worth his salt can get around this). Protection against forgetting a password could be to use a KEY PHRASE PASSWORD (above). Another choice is a laptop with fingerprint reader or devices found at the link below. While convenient, these are expensive choices. These readers convert your print into a unique digital string that becomes your password. Just don’t lose that important finger!

 

http://www.digitalpersona.com/Fingerprint-Biometrics/Fingerprint-Readers/Fingerprint-Readers/

 

All of your personal and important files and folders used on your Level One Laptop are kept separate. You keep them on an encrypted Primary USB Pen Drive secured with a memorized KEY PHRASE PASSWORD (above). You keep your Primary USB Pen Drive on your person or safely secured. You do this with the freeware TRUECRYPT (link below) or similar encryption software.

 

http://www.truecrypt.org/downloads

 

Lock this “most important laptop” away when not using, bring out only as needed, and lock it away again.

 

Your Primary USB Pen Drive is locked away in a different location from your Primary Level One Laptop or kept on your person.

 

This computer will be available and function, no matter what may come. Preferably, it will be a newer model from a reputable maker. I recommend you install a Solid State Drive (SSD), which is far less prone to failure because there are no moving parts. A SSD consumes less power, and helps your laptop run cooler, which extends life expectancy. The price of SSD’s has come down to reasonable price levels in the past year as they have become more commonly used. Regardless, a primary use and a backup laptop is desirable so read on …

 

 

Level Two Laptop:

 

A “clean laptop” used for Internet, primary use, and travel away from home. Nearly a million laptops are stolen each year so it is sensible to take special precautions when you travel or commute. Many laptops are lost by accident by leaving them in a restaurant or a taxi. Many disappear from hotel rooms, or when the owner sets the laptop down for “just a moment”. Laptops vanish at the far end of airport scanning machines, or with luggage if you don’t carry it with you aboard your plane.

 

RECOMMENDATION:  I suggest getting a compact and lightweight laptop for your Level Two and “clean” laptop. This way, you can always keep your svelte laptop with you rather than having to leave it unattended in a hotel room or elsewhere. You might get along without a second laptop if you never or rarely travel, or you could follow the Alternate Recommendation below.

 

I prefer a BIG 17 inch power laptop for home use. When I need computing power on the go, I take along a 13.3 inch clean laptop that is only 2.5 pounds. This laptop still has a full-size keyboard, and is a trim 1/2 inch thick … I’m seriously “in lust” with that gadget!

 

ALTERNATE RECOMMENDATIONS:  An alternative to a clean laptop for travel could be a tablet. The 7-inch tablets are substantially under a pound! This can be just fine as long as you don’t need to do much typing that would want a keyboard. You could get a Bluetooth wireless keyboard to carry with your tablet.

 

I usually carry a Kindle Fire HD 8.9 that only weighs 1.25 pounds (hidden away in my “old fashioned” Day-Timer). If I need more computing power, then I take my featherweight clean laptop. Sometimes, I take both. I’m seriously “in lust” with both gadgets. They are both useful to me for different reasons. At home for my daily use Level Two Laptop, I prefer a BIG 17” laptop that weighs about 8 pounds (bigger screens are easier on older eyes).

 

ULTIMATE RECOMMENDATIONIf you can afford it, for maximum benefits, DO BOTH as I have. Get a compact and lightweight laptop to take with you and a tablet too. Heck, you can get a “convertible laptop”, that’s BOTH.

 

 

Level Three Laptop or Desktop:

 

Any other computer that’s as unprotected as most people’s computers are! Don’t continue to use that unprotected or unsafe computer, or the day may come when you regret it!

 

Get rid of all desktop computers and destroy the hard drives beyond recovery. Any old hammer will do to smash the drive into small pieces, toss the hard drive into a hot fire, or wipe it with a powerful magnet.

 

If you wish to keep a Desktop computer at home, perhaps for a bigger screen, or because you can’t afford another laptop, then secure it too. Turn that Desktop machine into a Level Two machine as noted in Level Two Laptop … Above.

 

Turn any other laptop you own into a Backup Level One or Backup Level Two Laptop:

 

Other laptops you own should preferably become a Backup Level One or Backup Level Two Laptop if you prefer. You do this by destroying the old hard drive and replacing it with a new hard drive and a fresh install of your software. Keep a Backup Level One Laptop securely locked away in a different location from your Primary Level One Laptop. You can share the Encrypted USB Pen Drive you keep in yet another secure location.

 

Don’t even think about recycling this laptop into a Level One or Level Two device unless you destroy and replace the hard drive. This is because reformatting a hard drive will NOT overwrite files or erase files that are Still There! If you turn a laptop into a Backup Level Two by replacing the hard drive, then you can leave it out to use and have as a second DECOY. You could also hide it away if you like. Ideally, each family member should have his or her own Level Two laptop that nobody else uses.

 

 

Backup USB Pen Drive:

 

While USB Pen Drives have no moving parts, and models from reputable makers are reliable, no electronic device is immune to failure, mechanical damage, or the human failures of “lost” or “misplaced”.

 

 

Backup Cloud Storage:

 

Another place where you can store information is online and have it available to any computer anywhere in the world with Internet access, is a “Cloud Drive” or “Cloud Storage”. This is a rapidly expanding arena and there are many providers including Microsoft, Google, Amazon, and the list goes on. There are even some free Cloud Storage options. One advantage of Cloud Storage is that you don’t have to physically hide or secure a Pen Drive or other storage device … Your files are hidden by the Cloud Storage provider. Amazon.com gives you 5 gigabytes of storage just for having an Amazon account. I received an addition 20 gigabytes of storage from Amazon when I purchased a Kindle device. Amazon wants you to store your books, music, magazines, etc. with them. This type of storage is convenient but inherently insecure and your files are not in your possession once they are stored “in the cloud’. One way to make this type of storage secure is to use a provider that provides encryption of your files but that can be expensive. The inexpensive option is to use TRUECRYPT encryption freeware to encrypt your Cloud Drive like recommended for a secure pen drive. I recommended TRUECRYPT earlier, and you can use this software to protect your Primary and Backup USB Pen Drives. Encrypted Cloud Storage could even become your primary storage. Pen Drives would then be utilized for backup storage in case something happens to your Primary Cloud Storage.

 

Here’s the link for TRUECRYPT (again):

 

http://www.truecrypt.org/downloads

 

 

STRONG RECOMMENDATION:  Do a backup of your Encrypted Primary USB Pen Drive or encrypted cloud drive at frequency intervals that make sense for your use of your personal and private files. Back these files up to another Encrypted Pen Drive, perhaps a third, or to secondary encrypted Cloud Storage. Store your Backup Encrypted USB Pen Drives in a different location from the Primary. If important stuff is on there, consider getting a fireproof lockbox or safe for hidden storage. You could keep your Backup in a Safety Deposit Box, or some other off-premises and secure location.

 

 

Family Laptops, Student Laptops, Shared Laptops, Etc.:

 

I’m against it! Get a separate Level Two laptop for each family member. This removes the temptation to use someone else’s laptop. You would not want someone using yours … Would you? You don’t share laptops because everyone is entitled to his or her privacy. You will never have the issue of figuring out who caused a computer problem on a shared computer … with only one user for each computer, it is easy to assign blame. Encryption can guarantee individual privacy, even between family members. If money restricts this separation, then a shared computer could have separate encryption for each family member or each could have his or her own encrypted USB pen drive.

 

 

YOUR INTERNET SERVICE PROVIDER:  When you sign-up for Internet service, your personal security and privacy can be compromised. At the government’s request, an Internet Service Provider (ISP) must provide, without advance notice to you, the following information about your account:

 

1.  The name given, and the address where bills are sent

 

2.  Records of all Internet sessions, including session dates, times, and duration

 

3.  The telephone number given and other account identifying number(s), such as any Internet or Network addresses assigned

 

4.  The source of payments, including any credit card or bank account numbers

 

5.  The content of and other records about your electronic mail messages, including attachments

 

Can you get by with a False Name or a Protected Business Name, a Protected P O Box address, and pay the bills by money order or payment from a Protected Bank Account?

 

Yes … but if the government ever decides to go after you, the ISP will be forced to give up the source of your Internet connection … your service address! An over-the-air ISP can make you more anonymous because. Using someone else’s Internet connection via WIFI is another possibility.

 

I live on a boat and can use the Marina’s Internet via WIFI so it is NOT traceable to my boat or me. I’ve used an over-the-air ISP that was two miles from my actual location. I currently have Comcast internet but in a protected Business Name so it is not traceable to me personally.

 

RECOMMENDATION:  Use a Protected Business Name, Protected Business Address, and pay online, by Check or Debit Card from a Protected Business Account in the Protected Business Name. All legal, as you will just be a respectable businessperson doing business as any business would. As long as you are not wanted by a government agency, you should be fine

 

 

INTERNET EMAIL SCAMS:

 

Internet scams happen all the time (I get one or three each month).

 

Here’s an example:

 

1.  You receive an unsolicited email containing a link to a seemingly innocent site such as a great place to buy products at a huge discount.

 

2.  If you click on the link, a file transfer from a site in Nigeria is opened in the background. Files with child pornography are secretly downloaded to your computer. Perhaps the scammers use a malicious Java application that uses reverse tunneling to bypass your firewall.

 

3.  A couple of days later, you receive an email threat. It accuses you of downloading child pornography and tells you how to find these illegal porn files on your computer. You are directed to provide a valid credit card name, expiration date, and billing address for protection from future occurrences, or the evidence will be presented to law enforcement or your employer.

 

 

Other scams, involve you winning an obscure lottery overseas, your email address being randomly selected for a prize. They want you to open a link or click on a link to provide your contact information. You are directed to send your information to a return email address so you can collect your prize or winnings. You can usually Google such scams to discover there have been victims and there will usually be alerts about the scams.

 

STRONG RECOMMENDATION:  Never! … Ever! … Open an incoming attachment or click on a link in an unsolicited email from an unknown source. Only open or click if it is from someone you know and you are expecting it.

 

 

Here is a website that discusses the top 10 Internet email scams:

 

The Top 10 Internet/Email Scams