New Internationalist

How to fight PRISM

eye in laptop screen
Surveillance has been operating above the law Mike Licht, under a CC License

Thursday 6 June, the day the PRISM story broke, was a good day to be a cryptographer. The sudden prospect of mass, unwarranted surveillance delivered an electric shock to thousands who were now looking for ways to protect their privacy online. At Cryptocat, we saw nearly 5,000 new individuals starting to use our free encrypted chat software. Other privacy and encryption services saw a rise of as much as 3,000 per cent in new users.

People increasingly want to believe that technology has the answers, and the PRISM scandal only made this want more desperate. While giving a recent interview to Al Jazeera, I was met with a combative interviewer who insisted that I, as a privacy software developer, focus on how privacy software can fight PRISM. But the mass surveillance the world is facing at the hands of the NSA (US National Security Agency) is not something that can be treated with the help of a handful of open software projects. Like all epidemics, the solution lies with preventing it before the outbreak, and not relying on nimble, narrowly-targeted medicine after the disaster has occurred. This prevention can only be at the hands of political, legal, and civil discourse.

Just as it is tempting for privacy-seekers to believe that the solution against PRISM is as easy as downloading an app, it is also tempting for privacy technologists to ride on the wave of new demand for privacy. But this is not a technological problem — it’s a social, political issue that stems from the permission given to intelligence apparatuses to rise above the law. It’s a fallaciously upheld threat to a healthy international democratic mindset.

When I say that this surveillance is an international problem, I do so under the premise that we increasingly belong in a world where our workforce has been raised with the internet having the monopoly over the proliferation of culture and communication. It is in this world that we are seeing the NSA asking lawmakers to give immunity to private entities should they inadvertently break the law in order to satisfy the NSA’s surveillance requests, effectively and literally putting surveillance above the law. The NSA, which has also long argued using a so-called distinction between domestic and foreign surveillance, has seen this distinction completely lose its legitimacy in front of the revelations surrounding the PRISM program. In today’s strongly globalized world, this surveillance, free from discernment, affects everyone, be they American, Canadian or Egyptian. The centralization of Internet capital within the US aids this: it means that your private data is fair game when you use the services of any of the companies established there, such as Facebook, Google or Skype, no matter your location.

These secret programs enjoy strong co-operation from Silicon Valley. Skype, which in 2008 boasted that its strong privacy architecture prevents it from handing data to law enforcement, formed the secretive Project Chess program in 2009 which was tasked with doing just that. Apple, which still holds that it maintains customer privacy at all costs, has been implicated in more than one government surveillance and law enforcement request program. It is only now, post-PRISM, and years after these programs have been enacted, that we see these revelations discussed in the Guardian, Washington Post, New York Times and other big press. But privacy technologists and encryption software developers have long known that this kind of surveillance is likely to exist.

The argument for national security does not have to come accompanied with the violation of the privacy rights of the entire global community. It doesn’t have to come with the undermining of democratic and legislative values. But this is exactly what is happening: surveillance interests have been allowed to operate above the law and the spirit of democratic discourse. The resulting problems are far too serious to be addressed with the use of privacy tools and software, which can at most act as shims. The problem is rather more human, political and ultimately historical.

Comments on How to fight PRISM

Leave your comment


  • Maximum characters allowed: 5000
  • Simple HTML allowed: bold, italic, and links

Registration is quick and easy. Plus you won’t have to re-type the blurry words to comment!
Register | Login

  1. #1 ciderpunx 21 Jun 13

    Great piece, for which thanks. I agree wholeheartedly that we need political resistence to the stasi-like mass surveillence programmes that our governments are running. You can bet it will not just be the NSA who do this. It is worth noting the various groups that are already organizing politically against initiatives like PRISM. EFF in the states and the open rights group in the UK are particularly effective.

    Its also worth countering the inevitable PR spin that these sort of privacy invasions are necessary to prevent terrorism (whatever that means). States know full well that any competent terrorist would not go near gmail, facebook et al for their communication needs. The people being watched are precisely not the people in whom the NSA are supposed to be interested.

  2. #2 MichaelSchuchardt 27 Jun 13


    I wrote a little program for text encryption! (FREE)

    Please try and share with your friends!

  3. #3 ciderpunx 27 Jun 13


    Well done for writing some code. But you need to release the source code and open it to peer review if you want anyone to take it seriously.

    I'd strongly recommend not using encryption software that hasn't been reviewed by cryptographers and by the security community.

  4. #4 Fred Wiliams 05 Jul 13

    Don't use an encryption toll provided by an anonymous person on a comment page! It's a trap for the simple minded.
    I have to say I don't like the story. The title suggests that it's going to provide us with tactics and strategy for protecting ourselves from PRISM and yet after having read it, I am not closer than I was. I though of the phrase ZIC, for ’Zero Information Content.’
    First, don't use M$ Window$, and I'd stay away from Apple's computers as well. Get a good Linux and read the security ’HowTos’ Encrypt email wherever you can, even for trivial comments. It will overload their decryption efforts systematically. Sometimes generate random characters and then encrypt them. It's a great distraction for the spooks and works towards a full employment policy in the secret service. (;-))
    Familiarise yourselves with the Tor Network and a DVD operating system called ’Tails.’ That helps for web browsing, but it's slow.
    Nothing is 100 % safe, but every Window$ security update includes a back door for the NSA, so if you're using Window$ everything on your computer is an open book to the government and whatever corporations have paid M$ a fee for the service. There is no point encrypting when they can key log everything you type and they can access your code keys as easily as you can yourself.

Subscribe to Comments for this articleArticle Comment Feed RSS 2.0

Guidelines: Please be respectful of others when posting your reply.

About the author

Nadim Kobeissi serves as Special Advisor at the New America Foundation’s Open Internet Tools Project. He is the lead developer for Cryptocat, an open source, accessible encrypted chat platform.

Read more by Nadim Kobeissi

Get our free fortnightly eNews


Videos from visionOntv’s globalviews channel.

Related articles

Popular tags

All tags

New Internationalist Blogs

New Internationalist hosts several different blogs, from the Editor's Blog to the Majority World Blog, the Gaza Blog to the Books Blog

New Internationalist Blogs