[cryptome] Re: Verizon is a rogue provider

  • From: John Young <jya@xxxxxxxxxxxx>
  • To: cryptome@xxxxxxxxxxxxx
  • Date: Wed, 28 Aug 2013 11:01:18 -0400

We have received a number of complaints about Verizon
IP addresses intruding on SM accounts and other fora.
Might be spoofs or bare-assed intimidation operations
now that Verizon and others have been outed.

It could be helpful to counterspy by logging intrusions
and intercepts, compiling and publishing them to help
educate the public on the viral spying disease spread.

If lacking your own platform Crytome will publish compilations
with or without attribution. If sent to Cryptome be sure to
cloak carefully, even if that is as silly as internet empowerment
against authority.



At 08:37 AM 8/28/2013, you wrote:

<http://electrospaces.blogspot.com/2013/08/nsa-has-also-arrangements-with-foreign.html>Cooperating with GCHQ is also Verizon Business (codenamed DACRON). GCHQ has clandestine agreements with Verizon, described in one document as "intercept partner", in order to give the agency access to their network of undersea cables.

But it seems not to be just the access which is provided. We have received reliable information that Verizon is now also targeting human rights and peace as well as environmental activist groups by intercepting their mails of certain lists sent to subscribers who are e-mail account holders @verizon.net and tags the senders as spammers. Such intercepts and false tagging has been termed illegal by a ruling by the Highest Court of the European Council, but as US-American company Verizon appears to give a damn and even blocks then the complaints communications with Verizon by bluntly stating: ".... that e-mail from your IP address will not be allowed access to the Verizon Online e-mail domain due to one or more of the following reasons: Your IP has been blocked because of spam issues or because your ISP indicates that it is dynamically assigned."

Subscribed account holders @verizon.net could only be informed and warned about this abuse applied by Verizon by using a disguised sender, different static IP and going through a different route, but then that e-mail might again be intercepted, since the content is sent unencrypted.

Does anyone on the cryptome-list have further insights on Verizon? Suggestions are required and kindly requested on how activist groups shall handle such intercepts and blocks by VERIZON.

Other related posts: