The Down Range Forum
Member Section => Down Range Cafe => Topic started by: twyacht on May 28, 2012, 07:19:44 AM
-
I guess looking at the list (at link),.....we are probably considered a threat to Homeland Security by now.... ::)
http://www.dailymail.co.uk/news/article-2150281/REVEALED-Hundreds-words-avoid-using-online-dont-want-government-spying-you.html?ICO=most_read_module
snip.
Revealed: Hundreds of words to avoid using online if you don't want the government spying on you (and they include 'pork', 'cloud' and 'Mexico')
Department of Homeland Security forced to release list following freedom of information request
Agency insists it only looks for evidence of genuine threats to the U.S. and not for signs of general dissent
By Daniel Miller
PUBLISHED: 04:32 EST, 26 May 2012 | UPDATED: 12:46 EST, 26 May 2012
Comments (174)
The Department of Homeland Security has been forced to release a list of keywords and phrases it uses to monitor social networking sites and online media for signs of terrorist or other threats against the U.S.
The intriguing the list includes obvious choices such as 'attack', 'Al Qaeda', 'terrorism' and 'dirty bomb' alongside dozens of seemingly innocent words like 'pork', 'cloud', 'team' and 'Mexico'.
Released under a freedom of information request, the information sheds new light on how government analysts are instructed to patrol the internet searching for domestic and external threats.
The words are included in the department's 2011 'Analyst's Desktop Binder' used by workers at their National Operations Center which instructs workers to identify 'media reports that reflect adversely on DHS and response activities'.
Department chiefs were forced to release the manual following a House hearing over documents obtained through a Freedom of Information Act lawsuit which revealed how analysts monitor social networks and media organisations for comments that 'reflect adversely' on the government.
However they insisted the practice was aimed not at policing the internet for disparaging remarks about the government and signs of general dissent, but to provide awareness of any potential threats.
*****
We are so doomed.....
-
As bad as this may seem, it's nothing compared to other 'Signals Intelligence' systems that have been "watching" us for years. Do a little googling for things like 'Echelon', 'Stellar Wind', 'Carnivore', and 'NarusInsight'. After reading about this stuff you may decide to unplug the computer forever.
Just remember... "they" profile everyone's search behavior. ;D
P.S.
I mysteriously lost my Internet connection twice while trying to post this.
-
Here's a little something to help you sleep easier tonight...
-
I think my tag line is going to get a lot bigger.
-
Just a quick scan, but I didn't see "low yield thermonuclear device" on the list. How lacking.
-
Just a quick scan, but I didn't see "low yield thermonuclear device" on the list. How lacking.
It's spelled thermonucular you silly boy!
Ask anybody....
:D
-
P.S.
I mysteriously lost my Internet connection twice while trying to post this.
Yup..
-
It's been common knowledge for at least 30 years that the NSA records/monitors every electronic emanation on the planet.
What do you think half of those "military" satellites do ?
Echelon, Carnivore, etc, are just :search engines" that help them sort useful stuff out of all the texting, and high School girls talking about who's cute and who's a bitch, today.
The only "private" forms of communication are snail mail, (because of all the crap the CIA took in the 60's) and face to face.
NOTHING else is protected.
-
I think we should start using random number generators (actually a greeking generator - "greeking" being a word used when a mock-up layout for a poster or print ad is being developed for nonsensical text used to fill the spaces until the real text was written).
Then we start sending this "encrypted" information back and forth. If enough people did it it might drive them crazy trying to decrepit it.
-
We ought to start a thread where we use the words in completely innocent ways Such as;
My cat took the initiative and made an attack on and assassinated a whole nest of mice that were looting my grain stores and were a threat to my domestic security. He did not take them hostage. He wiped out the gangs leader first and then there were many deaths. I was not into shooting them so no shots fired.
;D
-
All commercial encryption soft ware has to be submitted for Gov approval before it can be sold in the US.
They install a "back door".
Read the article below by Claire Wolfe from "Back Woods Home".
http://www.backwoodshome.com/columns/wolfe040215.html
The Hardyville
Beginners Guide
to Encrypt**n
(Quick! Easy! Ticks off tyrants! Do it now!)
By Claire Wolfe
In a place where a hard drive means the road home was icy and RAM is a boy sheep, you wouldn't expect to find a lot of experts in e-mail encryption.
Well, you won't. Find experts, that is. In Hardyville.
What you will find is a lot of ordinary, privacy-minded folk who took an hour or so to download, install, and learn to use e-mail encryption programs. These folks are NOT supergeeks. Just ordinary working people who understand it's worthwhile to keep their e-mails from being casually ECHELONed or Carnivored by other-peoples'-business minders.
Merely by passing through your ISP or swooping around through the ether, your e-mail messages can be read by anybody with the technology to grab them. The FBI now requires ISPs to make their systems "snoop ready." If the feds are after some bad guy who uses your ISP, they'll simply scoop up everybody's mail. Every customer of that ISP becomes a target for investigation. That's Carnivore. ECHELON is worse than that because it scoops up just about every electronic communication, everywhere in the world and scans for "suspicious" keywords.
If you say the movie you saw last night was a "bomb," they may tag you. If you write that your boss has an "explosive" temper ... watch out. The snoopoids will catch you talking about your favorite firearms, the trade secrets of your business, your belief that some eejit politician "ought to be taken out and shot," and your romantic weekend plans. Somebody might even snag your secret recipe for chocolate coconut macaroons.
We all need to put a stop to this nonsense, geek and non-geek alike. And we can -- easily.
That's why The Hardy County Committee On Making Life Miserable for Tyrants has produced The Hardyville Beginners Guide to Encrypt**n. Because e-mail privacy isn't just for geeks. It's for anybody with good sense.
Have you got just one spare hour? Do yourself a favor. If you don't already encrypt e-mail, print out this column -- right now -- and install and start using PGP.
What's PGP?
PGP stands for Pretty Good Privacy. It's the most common public-key encryption system. Don't be spooked by all the geek speak you may have read. The main thing to know is that PGP is not hard to use.
When you install PGP, you'll automatically create a secret key for your own use and a public key to share with others. The secret key lets you encrypt messages to friends and decrypt messages they send to you. You distribute your public key to others, so they can encrypt messages to you.
The First Thing You Need: A Friend
The first thing you need is another person to exchange encrypted messages with. If you don't already know someone who uses encryption, go to The Claire Files forums, where Debra the web mom has opened up a new PGP section especially for you to come in and ask encryption questions. Several people have already volunteered to be PGP coaches and exchange test messages with you.
Once you're ready to exchange messages in privacy, one of those volunteers, Chris, will even reveal the secret of his (or is it her?) tattoo.
The Second Thing You Need: A Free Copy Of PGP
These instructions are for Windows users (you guys with other operating systems are used to figuring things out for yourself).
1. Go to this site. (Go ahead; we'll wait.)
2. Choose Windows 95/98/NT. Select that option even if you have Windows XP!
3. Choose PGP version 6.5.8. (Yes, there's a reason you probably don't want later versions. See the note at the bottom of this article.)
4. Then click "Download PGP 6.5.8." (Don't choose the source code or the command line versions.). A page comes up that lets you download from a variety of sites. Most of them are in Europe. Don't worry about it. Just pick one. The download will take anywhere from one minute to 45 minutes, depending on the speed of your connection.
This will place a file called PGPFW658Win32.zip on your computer. Save that file in any temporary directory you wish.
Installing PGP
If the Download Dialog box remained open after the download was completed, just click "Open" to unzip the file. If the Download Dialog box closed, no problem. Go to the directory where you stored the download and doubleclick on the file.
To do this you must have the WinZip utility. The free evaluation version of WinZip works fine and might have come pre-installed on your computer.
From the moment you click to unzip, Windows' wizard will guide you smoothly through the installation process. Just use all the default choices the wizard presents.
Creating Your Keys
During installation, you'll be asked to create your own public and secret encryption keys and choose a passphrase. The PGP progam itself will "wizard" you through the process of key creation. Again, just use the default choices. The only exception might be when the program asks what size key you want. If you have a typical, fast, modern computer, choose the biggest key.
Remember, the secret key and the passphrase are yours and yours alone. The public key you'll give to people to enable them to encrypt messages to you.
The one big trick -- and it's not difficult, just tricky -- is to create a passphrase that's nearly impossible for anyone else to guess, but easy for you to remember. You'll find some good ideas about password creation in this discussion thread. Don't get lazy and use your birth date or your dog's name. An unguessable passphrase is extremely important.
Never, ever share that passphrase with anybody. Memorize it. Don't even write it down.
Now, get a friend to e-mail you their public key. If you don't have a PGP-ready friend, remember those volunteers who're waiting to help.
Using PGP
Different mail programs -- Outlook, Outlook Express, and Eudora, for instance -- all handle PGP slightly differently. What we'll describe here is a mostly-universal method that works in Windows. Once you get going, you might find even easier ways of handling PGP through your mail reader.
1. Click on the Start menu, then Programs, then PGP. You'll see a menu of options. Choose PGP Keys. This will show you all the public keys that you currently have access to, plus your own private key. You need to import your friend's key into this list.
2A. If your friend sent you his key as an attachment (usually called "public_key.asc" or something similar), save that attachment as a file. You'll probably want to change the name to something like "Bills_key.asc" or "Jennifers_key.asc."
2B. If your friend pasted his key directly into an e-mail, you'll see a bunch of gobbledegook when you open that message. Copy all that gobbledegook, starting with
-----BEGIN PGP PUBLIC KEY BLOCK-----
and ending with
-----END PGP PUBLIC KEY BLOCK-----
and paste it into Notepad. Choose FILE - SAVE AS and save the key file to wherever it's convenient.
3. Now, go back to your PGP key list. Choose KEYS -- IMPORT -- and select the key file that you saved. Voila! It's imported. You can now encrypt email using for that key.
4. But wait! Your friend also needs your key before he can answer your message. Go back to your key list. Find your name. Right-click on it and choose Export. The file name will be your name followed by ".asc." (Make sure you don't select the checkmark that says "Include Private Key(s)" -- all they need is the default public key.) Click save. Now send your friend that key. He can import it into his key list.
5. Next time you open up Microsoft Outlook or Outlook Express, click on "Tools." You'll find PGP there and can choose your user options. (Most of the pre-selected options are good -- especially the one that asks if you want to encrypt all messages to yourself, as well as to the recipient; if you don't encrypt to yourself, you'll never even be able to read your own messages after they're encrypted!)
6. To compose an e-mail in PGP, create a new message as you normally would. You'll notice, though, that along your toolbar is a new icon for "Encrypt (PGP)." (This is in Outlook Express; other programs will have something similar.) Compose your message, click that icon, then click to send your message. Your key list will pop up. From the top box, you can select the name of the person(s) you want to encrypt the message for. PGP might already have selected the key for you, if it found a key with an e-mail address that matched the one you're sending to. Selected keys are moved into the bottom box.
7. Once you've chosen the recipients' keys, PGP will ask you for your passphrase. Give it, click ... and you're done!
More Good Stuff
You can do other things with PGP -- like electronically sign documents or encrypt your document files. There are some security refinements you should also look into at some point (for instance, ways of verifying that your friend's key really does belong to your friend). But that can wait. You're already started.
Some people end up like Miss Fitz, the Hardyville schoolmarm, who tried a non-PGP encryption method a while back and now blushes, "I didn't really figure out how to work it, and I didn't have anyone to send messages back and forth with...and then I misplaced the scrap of paper that I'd written my complicated random password on. I wouldn't make a good secret agent..."
But with an hour to begin and a little persistence, we can all be "secret agents" in our own little way. Or rather, counteragents, protecting our private data from snoops and spies.
Just exchange keys with more and more friends ... and help more newbies take the leap to PGP. And pretty soon ... it'll be a movement. The supersnoops of the world will be tearing their hair out because your cookie recipes -- and everything else you say -- is now enclosed in a nice, private envelope instead of being figuratively written on the back of a postcard for all the world to read.
NOTE ON LATER VERSIONS OF PGP: Version 6.5.8, which you installed here, is freeware. It should be fully functional on your computer with no license fees or registration required. Versions 8.0 and later are deliberately crippled. They'll encrypt files, but won't interface with Outlook, Outlook Express, or Eudora unless you pay a $50 licence fee. Although 8.0 is the first version specifically designed to work with Windows XP, my resident tech expert, Debra Ricketts, says 6.5.8. works fine with XP. She also warns that installing any 7.X version of PGP on Windows XP could result in major problems that might cause you to have to re-install your operating system. So beware.
Thanks once again to the members of The Claire Files forums for help and advice
-
And what makes anyone think PGP hasn't been compromised?
No I think you inundated the ether with so much garbage that it bogs down the search engines.
Alf
Ac maturis eebu nudnc, fuysce volyutpat egestas mooetus seod dhbui phasedellus, ukct vdeel iejxn gredavida veicula tort[or, lecctus turgpis vitae fringilla. Felis turpis, morbi nibh leo facilisis eget consequat, turpis velit. Legiko si93t lib48ero. Ae26t accumsn ticidunt, edlit volutnpat accumsan e69u vi7verra ea vselit. Ut fusce susctipit eu attack fermentum vestibsulum. Amcwt eddjou. Dondec turpis justo ac porta blandeit, at nmec fringilla sed amet, mohl;estie amet nulla. Pede tsuspendisse maecenas tincidunt, iacdulis ullamdcorper am[et susdcipit diaim, dudinis laoreet rkutrum sed. At leo vecnenatis tellus quis, placeratt vitae leo ultrices id, nunc nunc tempor ganegs crdas a44c ladcus shiit. Sit libedro, eetet pharertra puraesent, nonuxmmy swcelerisque iwmperdiet grtavidta. Vselit ae4nean vitdae. Aliqudam pellendhatesque pudrus, et6leo bheatae hyme'naeos condimentum a eros pulvinar, oqrci ligulaa ac vel suscipit, ptulvinar feldis nec.
-
there is another one alled Tor Protect Anonomyity on line that is simpler than the PCP thingy. I haven't downloaded yet, but there is no encryption involved, they bounce your message around through a volunteer network. Just a thought.
-
Just in case this thread has garnered the attention of government agencies yet.
Alf
Procedural system integral fragmentation, transponder recursive proxy prompt logistically logarithmic transmission, deviation analog n-tier.
Controller cache reflective boolean silicon, arrray system. Procedural prototype infrared reducer femtosecond sequential. Development, reflective gigabyte sampling ethernet anomoly potentiometer logistically bridgeware procedural. Connectivity floating-point coordinated phaselock led data reducer indeterminate log fragmentation messaging capacitance scalar harmonic. Deviation femtosecond anomoly software, indeterminate potentiometer software. Led analog with, deviation coordinated, silicon prompt, data backbone disk audio normalizing scan integral bridgeware. Services disk scan or video phase overflow scalar developer coordinated.
Or procedural ethernet software data sequential. Extended converter hyperlinked hyperlinked, for sequential, echo digital anomoly proxy floating-point messaging cable, inversion log. Proxy feedback reducer services, logarithmic port element, disk. Analog proxy plasma supporting, distributed gigabyte.
Or in techno-speak:
101101000 A^2+B^2 {#-#} IVirq10 HS700 !(AB(X)) 00XX0X //--, aR.$, XX0X Init(). $##.##, END(0X000241) ADSP-219x %00!/#, A^2+B^2 HS700 (0x017fff) AX0X01, KERNAL 100100HX KERNAL AX0X01 (0.0). 94u {#-#} xref %0X0% 11101 !(X-Y)+1 {#-#} 101101000 --// (0.0). Ivirq10 94u, (0x017fff), 0001000H 101101000 TYPE(PM-RAM) 100100HX length[X]-ipSwitch [n]INPUT /00#. Ax0x01 else-if E-.001 TYPE(RPG) //-- THX1138 XX0X. 94u function() 100100HX --// SPF-30, function() AX0X01 xref aR.$ 00XX0X KERNAL. 94u, aR.$, (0.0) THX1138 {2$T@ else-if END(0X000241) 100100HX HS700 %00!/#. Kernal, function() {#-#}, else-if TYPE(RPG) 00XX0X length[X]-ipSwitch IVirq10.
(0.0), TYPE(RPG) 94u 6^1.01E /00# @#0XX01. {2$t@ %00!/# 1001001 101101000 [n]INPUT %00!/# {#-#} {#-#}, START(0x000242) A^2+B^2. @#0xx01 00XX0X 10111 ADODB Init() data2 [n]INPUT 100100HX. D0x012 (0.0) END(0X000241) xref, 100100HX THX1138 //--.
%0x0% xref &0,0, 00XX0X @#0XX01 length[X]-ipSwitch 101101000 (0x017fff), data2 length[X]-ipSwitch, data2 SPF-30 10111 else-if XX0X. Adodb {2$T@ /00# 1001001 IVirq10 !(AB(X)) END(0X000241) length[X]-ipSwitch END(0X000241), E-.001. Type(rpg) A^2+B^2 D0X012, ADSP-219x, HS700 100100HX A^2+B^2 $##.## TYPE(PM-RAM) [n]INPUT 11101 94u. Hs700 @#0XX01 94u %0X0% length[X]-ipSwitch aR.$, 10111 {#-#} END(0X000241) --// aR.$ aR.$.
Or in more common language:
Gimmie drive mule jiggly, neighbor's reckon, salesmen rattler driveway. Rottgut shiney, fancy java, plumb out watchin' buy. Whiskey heap me is drive hoosegow got, her spell, everlastin' his fit. Tools dogs jezebel bull mashed rat. Hogtied drunk hillbilly caught, round-up rat if. Panhandle watchin' sittin' everlastin' greasy, neighbor's whoopin', rightly, a boxcar hardware cooked.
Hoosegow, wagon barefoot hollarin' heffer wild skedaddled. Jail naw, panhandle good hee-haw yippie tax-collectors good weren't that. Ya huntin' rightly shack catfight spell dirt fishin' lament hardware jezebel hobo.
Drinkin' jug hogjowls uncle commencin' fricaseed, tin panhandle road cabin fish. Bootleg y'all boobtube gimmie feud, barn.
Wonder what I just said?