Regarding the recent revelations about the once-secretive and massive telecommunication data collection by the United States (PRISM) shouldn’t you ask how to get out from under it? All of the regular media outlets seem to be collectively reporting on the outrage, the need for whistle-blowers and the now infamous/famous Edward Snowden. Please see the attached video on Edward Snowden from Grab Media, today, Monday, June 10, 2013. This latest wrinkle in the need to protect personal data has been reported in years past.
The blog “Homeland Currency Security” reported on “Vanish” personal data protection technology back in 2009 (as well as ScienceDaily.com). The original Vanish data destruction technology was developed by the team at the University of Washington Networking Systems Research Center: Roxana Geambasu, Amit Levy (no link available), Yoshi Kohno, Hank Levy and Arvind Krishnamurthy. The original Vanish PDF paper (retrieved June 10, 2013) reports on the insertion of a source code with a self destruct date on your data and/or document. These are referred to as VDOs: “Vanishing Data Objects”.
One of the technologies that made the VDO possible was DHTs: Distributed Hash Tables – which were created in the development of P2P (peer-to-peer) sharing technologies like Napster. The most recent iteration of the self-destructing Vanish technology appears in a 2011 PDF paper. The new technology is referred to as Cascade and creates entire “self-destructing data systems“. The technology document refers to “Data Harvesting Attacks” and may suggest applicability to governmental eavesdropping on internet-shared data. If you are successful in downloading the original Vanish Source Code – you might test it out with trusted friends before trusting the technology yourself.
What about “phreaking” your phone call tracks? Local phone companies take a dim view on this practice and the practice may be barely legal – if at all. Another legal notion leaps to mind – in theory – using data surveillance may suggest the copying of your data. If your data is copied – intentionally, by anyone – that could be a copyright violation. But good luck suing or prosecuting the government on that unless you have assistance from David Boeis or some big-time attorneys. These have been just a few suggestions for “opting out” of the NSA PRISM surveillance program – some of which may require legal review!