Special to ZDNet.com
Friday, August 25, 2000
There has been much debate recently surrounding the FBI's latest snooping software, Carnivore.
Carnivore is a type of information-gathering software housed in a computer that can be connected to your ISP's servers. It mines all incoming and outgoing mail for information. It's like a wiretap that cuts through all the other phone noise except for the phone of the person under surveillance.
A wide net: The FBI intends to use the software to locate and monitor specific e-mail addresses for evidence of criminal activity. In the process of monitoring one account, Carnivore must sift through all available account information on a given server.
Because Carnivore must be hooked directly to an ISP's servers, the government essentially would have the ability to eavesdrop covertly on all digital communications by the ISP's customers.
As an advocate for personal privacy, I believe we have a fundamental right to protect our personal data and communications from unwanted third-party intruders.
This new technology raises many important Internet legal issues and privacy concerns. One such question is: "Can we, as individuals, maintain our right to privacy in cyberspace?"
The answer is yes. There are several secure e-mail and anonymous browsing options available in the marketplace that have the ability to keep intruders at bay. These products make the transfer of personal communication and information on the Internet as secure as transferring it via a heavily guarded armored car.
A good example is our own HushMail.Com, an easy-to-use, Web-based e-mail service that encrypts or scrambles a message guaranteeing that only the sender and the receiver are able to read it.
The service is free and makes a user's encrypted messages untouchable, so no ISP, employer, snoop or government can decode messages. Several other quality security products are also available on the market.
Technology to protect our e-mail from unwanted intruders such as Carnivore does exist. Most often, Internet security products are free of charge and accessible to all. In fact, technologies like Hush's are available for a wide variety of applications, not just e-mail.
Unfortunately, many people, even leaders in the field of technology, fail to take advantage of the tools that can so easily protect them. In a survey conducted by the Computer Security Institute, 64 percent of companies who responded said that they had experienced an e-mail security breach during the past 12 months. Respondents added that losses sustained from such security breaches ranged from $300,000 to $25 million. Had these companies been using a secure e-mail service, their e-mail would have been undecipherable.
I believe that we have an innate right to personal privacy, and with this freedom, a duty to act responsibly. The technology needed to ensure an individual's right to privacy on the Internet is available.
However, it is up to each individual to access it. My goal is to give people the tools they need to protect themselves so that, someday, debates about Internet privacy will be unnecessary.Jon Matonis, President and CEO of Hush Communications Corp., has more than 15 years' management experience in the areas of security and encryption technology, embedded software systems, international payment systems, and foreign exchange.