Stopping The CIA From Spying On You

National Security Agency

Is a United States Government an intelligence agency responsible for global monitoring, collection, decoding, translation and analysis of information and data for foreign intelligence and counterintelligence purposes – a discipline known as Signals intelligence. In other words, what ever you do on the internet, say or text over the phone is actually copied to their mass databases where they scrutinize, drink whine and have laughs about peoples personal lives. There is no level of freedom nor self security in someone else actually digging out your personal data without your consent.
Electronic Communications Privacy Act of 1986 (ECPA) was enacted by the United States Congress to extend government restrictions on wire taps from telephone calls to include transmissions of electronic data by computer (18 U.S.C. § 2510 et seq.), added new provisions prohibiting access to stored electronic communications, i.e., the Stored Communications Act (SCA, 18 U.S.C. § 2701 et seq.), and added so-called pen/trap provisions that permit the tracing of telephone communications (18 U.S.C. § 3121 et seq.).

ECPA was an amendment to Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (the Wiretap Statute), which was primarily designed to prevent unauthorized government access to private electronic communications. The ECPA has been amended by the Communications Assistance for Law Enforcement Act (CALEA) of 1994, the USA PATRIOT Act (2001), the USA PATRIOT reauthorization acts (2006), and the FISA Amendments Act (2008).[1

Blocking The NSA

1. Install a Firewall
Firewalls have been used for a very long time to block unscrupulous persons from accessing network infrastructure and eventually computers storing data, that they have no authorization to access. The information stored on you computer solely belongs to you and no one else. The information that is in transit, text messages, emails, internet searches can easily be intercepted, manipulated and stored elsewhere other than the intended recipient and internet search engines. Installing a firewall will help you to fight some unauthorized access to your computer information.
Firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic based on a set of applied rules configured by the user or default settings chosen that are pre-configured in the software. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted.
Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions.

Firewall Visual

A. Hardware firewalls can be purchased as a stand-alone product but more recently hardware firewalls are typically found in broadband routers, and should be considered an important part of your system and network set-up, especially for anyone on a broadband connection. Hardware firewalls can be effective with little or no configuration, and they can protect every machine on a local network. Most hardware firewalls will have a minimum of four network ports to connect other computers.
A hardware firewall uses packet filtering to examine the header of a packet to determine its source and destination. This information is compared to a set of predefined or user-created rules that determine whether the packet is to be forwarded or dropped.

B. Software Firewalls. or individual home users, the most popular firewall choice is a software firewall. Software firewalls are installed on your computer (like any software) and you can customize it; allowing you some control over its function and protection features. A software firewall will protect your computer from outside attempts to control or gain access your computer, and, depending on your choice of software firewall, it could also provide protection against the most common Trojan programs or e-mail worms. Many software firewalls have user defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your system. Additionally, software firewalls may also incorporate privacy controls, web filtering and more. The downside to software firewalls is that they will only protect the computer they are installed on, not a network, so each computer will need to have a software firewall installed on it.

2. Encrypt Your Data

Data Encryption is the translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher.
Windows has a built in encryption software called bit-locker. You can use Bit-locker Drive Encryption to help protect your files on an entire drive. Bit Locker can help block hackers from accessing the system files they rely on to discover your password, or from accessing your drive by physically removing it from your PC and installing it in a different one. You can still sign in to Windows and use your files as you normally would.

How to Enable Windows Bitlocker

Windows Bit-locker Encryption is a built in encryption module in windows which allows you to encrypt and protect your files from the eyes of the spies!
Click Start, click Control Panel, click System and Security, and then clickBitLocker Drive Encryption

Click-Start-Select Control Panel

Select-System and Security

Enable Bitlocker Drive Encryption

Select Turn on Bitlocker

Click Turn On BitLocker for the operating system drive. BitLocker will scan your computer to make sure that it meets the BitLocker system requirements. If your computer meets the requirements, BitLocker will inform you of the next steps that need to be taken to turn on BitLocker, such as drive preparation, turning on the TPM, and encrypting the drive.
If you have a single partition for your operating system drive, BitLocker will prepare the drive by shrinking the operating system drive and creating a new system partition to use for system files that are required to start or recover the operating system and that cannot be encrypted. This drive will not have a drive letter to help prevent the storing of data files on this drive inadvertently. After the drive is prepared, the computer must be restarted.

Recovery Key
If you have forgotten the Encryption password, you are in a very bad situation. You will not be able to access your data without the security key, (password) so during encryption, a Recovery key is generated which should be printed in case the above situation occurs.

3. Never use Free WiFi

There is nothing free in this life, anything that is considered free comes at a cost. There are thousands of free wireless fidelity (WiFi) networks that have been popped up all over the city. Many persons hop on for a free surf either to check on their social network life or even to transact “secure” business. Here is why you shouldn’t use free WiFi
  • They have no legal burden if something should happen to your data.
  • They have no obligation to provide any form of security for your device.
  • You don’t know who really control or own these free wireless networks.
  • There are unscrupulous people who create free hotspot using their wireless device solely to capture peoples personal data.
  • Some of these WiFi are owned by the Government

4. Seldom Use Internet Cafe

Always use your home pc to do any form of login and password entry. Never enter any form of password or login on internet cafe’s computer. You are not the administrator of these computers so you therefore have no control over it. Many spy software have been found on these machines.

Parting Notes
The Safety of your information is up to you my friend, your data belongs to you and no one else. Any unauthorized access to gaining your personal information by Governmental forces is illegal. Protect your computer, protect your identity, protect your data and protect yourself.