28 Nov 2012

Keeping a Secret is Hard to Do

0 Comment

During the Cold War, spies used to use contrivances like dead drops and microdots to hide their nefarious activities. While such old school techniques are a little out of date by today’s standards, current events have revealed that keeping secrets in the information age is still hard to do.

Recently publicized security breaches and hacking events have managed to disrupt business as usual at such businesses as Sony, GoDaddy, and Citibank, just to name a few. While large companies are capable of closing the breach in a relatively short period of time as well as mitigating any collateral damage, where does this leave small businesses and individuals?

A recent article in the NY Times points out that, “What people don’t realize is that hacking and spying went mainstream a decade ago,” said Dan Kaminsky, an Internet security researcher. “They think hacking is some difficult thing. Meanwhile, everyone is reading everyone else’s emails — girlfriends are reading boyfriends’, bosses are reading employees’ — because it’s just so easy to do.”

Whether you are a government operative, a business owner or just the man or woman on the street, you need to protect your privacy. If you don’t secure your communications and your computers, you are just asking to be hacked. This means that your emails, voice mails, financial records, and other proprietary information could soon become public knowledge, or worse. (The June 2011 hacking incident at Citibank compromised more than 200,000 accounts.)

“Understanding the threat is always the most difficult part of security technology,” said Matthew Blaze, an associate professor of computer and information science at the University of Pennsylvania, as well as a security and cryptography specialist.

Forewarned is forearmed. In today’s technology-driven world, it takes tech to make or break tech. The problem is that for every firewall, antivirus program, and anti-malware software on the market, there are groups, clubs, and governments who are bent on cracking them.

When even governments can’t produce a foolproof system to protect their most sensitive information, where do you suppose that leaves everyone else? Below are five steps you can take to protect your privacy from prying eyes and ears:

  • Isolation – While this sounds like the easiest to do in principle, it is also the toughest to enforce. If a hacker can’t gain access to a system due to the fact that it is isolated from the Internet, you would think that this would be a foolproof way of protecting data. And you’d be wrong. As long as people have the ability to access the system, then it can be cracked, as the Iranian government found out to their chagrin when their system was breached by the Stuxnet virus that was introduced when a technician plugged a flash drive into a port.
  • Use encryption – If they can’t read your data, they can’t exploit your data. This is probably one of the best and least used methods of protecting sensitive information. There are both hardware and software-based encryption systems available to the public. What’s great about encryption is that in the event that someone does breach your firewall, all they will come away with is gibberish.
  • Mask your IP address – If they can’t find you, they can’t target you. There are a number of ways of masking your IP address that will give you an advantage over snoopers and hackers.
  • Set a self-destruct timer – While Google and Yahoo keep such records as IP addresses, emails, and even web searches for 18 months or more, there are ways to get around these problems as well. Email services like 10-Minute Mail allow users to send a message and then the address self-destructs ten minutes later. For web surfing, you need to change your proxy setting in order to hide your IP Address.
  • Cone of Silence – Just like brute force isolation, this is another nearly foolproof way to protect your secrets…shut up! That’s right, if you don’t record it, email it, or transmit it, then the bad guys can’t find it. Of course, in our wired world, keeping information close to the vest is something that many people have trouble doing.

When it comes to securing your secrets, Jaye Andone and Ed Meskel are experts. Their company SCIF Global Technologies is in the business of designing and manufacturing Sensitive Compartmented Information Facilities worldwide.

[top]
About the Author


Jaye Andone is president and CEO of SCIF Global Technologies. Jaye will most likely be your first point of contact to lead you through the process from concept to procurement of your facility. Request a Quote or give her a call: 904-524-0911

Leave a Reply

Your email address will not be published. Required fields are marked *