Enhance Your Privacy with These 5 Smartphone Practices from the NSA
When was the last time you powered off your smartphone? Is your Bluetooth always turned on? Do you charge your device using any available USB port?
If you find yourself answering yes to any of these, the National Security Agency (NSA) warns that you may be compromising your privacy. The NSA is focused on intercepting and gathering communications from various channels, including satellites and mobile devices.
Let’s explore five smartphone habits suggested by the NSA that you should consider adopting.
1. Restart Your Phone Weekly
This is a simple yet effective step. Power off your phone, wait for 10 seconds, then turn it back on. This can help thwart zero-click exploits, where hackers gain access to your device merely by sending a specific signal.
Keep in mind: Restarting your phone won’t help if it has been infected with other types of malware. In such cases, a comprehensive factory reset will be necessary.
2. Turn Off Bluetooth When Not in Use
Bluetooth operates like Wi-Fi and cellular systems but is designed for simpler tasks over shorter distances. It doesn’t require a cellular signal or internet connection, and it won’t use data. However, like all connections, it can be vulnerable to threats.
Hackers and scammers must be within close proximity to exploit Bluetooth and take control of your phone, but in most public places, you’re likely near strangers.
The NSA recommends: Switch off Bluetooth when it’s not needed. This action will also conserve battery life.
◾ For iPhones, navigate to Settings > Bluetooth to disable it. You can also swipe down from the upper right corner to access the Control Center and tap the Bluetooth icon.
◾ For Android devices, go to Settings > Connected Devices > Connection Preferences > Bluetooth and turn it off. (Note: The exact steps may differ depending on your specific phone model. If these instructions don’t fit, search for Bluetooth in the settings.)
Activating airplane mode will also deactivate Bluetooth and Wi-Fi among other functions, but you’ll miss out on calls and texts.
3. Avoid Public USB Ports
In locations like airports or cafes, hackers can exploit USB ports to inject malware or steal information. Although actual cases of juice jacking are uncommon in the United States, the threat remains. If a kiosk provides standard power outlets where you can use your own charger, you’re safer.
It’s advisable to steer clear of all USB ports, especially when traveling abroad. USB protocols are universal, enabling foreign hackers to target ports in hotels or rentals to siphon your data, whether or not you are using a kiosk.
Increasingly, public kiosks offer wireless charging stations, which do not transmit data directly to your device, rendering them safer.
If you’re in dire need of a charge, you can use USB connections securely with the right cable. Keep a charge-only cable on hand for travel; these are inexpensive and compact and allow only for charging, not data transfer.
4. Steer Clear of Public Wi-Fi
Public Wi-Fi networks can be hotspots for cyber snoopers. They are accessible by anyone, rendering all connected devices vulnerable, whether they are smartphones, laptops, or tablets.
Just because a public Wi-Fi option pops up doesn’t guarantee its legitimacy. If you’re in a coffee shop or hotel, ask staff for the specific name of their internet connection. Scammers often create fake networks named “Coffee Shop” or “Hotel Guest” to trick you into connecting to them instead of the actual network.
A useful rule to remember: If a network requires you to log in with a username and password, only access such sites through your private network. If you must use sensitive sites on a public network, ensure you have a VPN enabled.
5. Shield Your Microphone and Camera
The NSA suggests using a case that blocks your microphone and covers your camera when not