New NSA spying row. How governments can protect themselves.

On 30th May news broke about an NSA spying operation with Denmark accused of helping US spy on European officials.

The NSA is said to have accessed text messages and the phone conversations of a number of prominent individuals by tapping into Danish internet cables in co-operation with the FE.

The alleged set-up allowed the NSA to obtain data using the telephone numbers of politicians as search parameters, according to DR. The FE’s subsequent secret investigation into the affair was codenamed “Operation Dunhammer” and concluded in 2015.

DR interviewed nine sources, all of whom are said to have had access to classified information held by the FE.

Along with Mrs Merkel, then-German Foreign Minister Frank-Walter Steinmeier and the opposition leader at the time, Peer Steinbrück, are also said to have been targeted.

Similar allegations emerged in 2013.

Then, secrets leaked by US whistleblower Edward Snowden alleged tapping of the German chancellor’s phone by the NSA.

To protect themselves from such surveillance governments should use end-to-end encrypted communications for calls and messages. These systems should be based on a zero knowledge architecture where the service provider does not have access to the decryption keys. This ensures that even if there is a server breach, even from a state sponsored actor, the calls and message data are secure.

PRIVUS – Privacy First, Security Always

PRIVUS was created to deliver complete communication security and peace of mind, knowing you can collaborate and communicate with total security and absolute privacy. The privacy of our users, – including governments, businesses and individuals – drives us to design, build and deliver the world’s only Hypersecure communication and collaboration solutions. While other providers collect, store, sell or share their users’ data with third parties or official agencies, PRIVUS does not and never will. Our zero- trust architecture does not allow us access to users decryption keys, hence PRIVUS does not have access to our users’ encrypted communications data.