[cryptome] Re: [cryptography] Help investigate cell phone snooping by police nationwide

  • From: Neal Lamb <nl1816a@xxxxxxxxxxxxx>
  • To: "cryptome@xxxxxxxxxxxxx" <cryptome@xxxxxxxxxxxxx>
  • Date: Mon, 9 Jun 2014 08:25:15 -0700 (PDT)

I get G A P, Daily Whistleblower News, now

http://www.climatesciencewatch.org/2014/06/08/recalling-a-climate-change-whistleblower-action-nine-years-ago-today/



On Monday, June 9, 2014 10:16 AM, Jeremy Compton <j.compton@xxxxxxxxxxx> wrote:
 


Well, thats interesting because if you watch his interview on NBC or was it 
MSNBC he paints a rather interesting view on this one.

To be quiet honest l dont really know what to make of this. Its a case of he 
said, she said routine :) How do we know what truly happened? We dont. Its kind 
of also like watching people playing table tennis, with one side saying this 
that and the other. :)

I was referring to the link below. Sorry my post has little to do with this one.

http://www.nakedcapitalism.com/2014/06/exclusive-report-nsa-whistleblower-snowden-never-access-juiciest-documents-far-damning.html?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+NakedCapitalism+%28naked+capitalism%29


Jeremy


________________________________
Date: Mon, 9 Jun 2014 08:07:26 -0700
From: nl1816a@xxxxxxxxxxxxx
Subject: [cryptome] Re: [cryptography] Help investigate cell phone snooping by  
police nationwide
To: cryptome@xxxxxxxxxxxxx


http://www.nakedcapitalism.com/2014/06/exclusive-report-nsa-whistleblower-snowden-never-access-juiciest-documents-far-damning.html?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+NakedCapitalism+%28naked+capitalism%29



On Monday, June 9, 2014 9:57 AM, John Young <jya@xxxxxxxxxxxx> wrote:
 


I have here a list of the most scurrilous practitioners of
"encryption works" culled from 3,000 years of work by the 
black-hearted magicians. Or get it from The Codebreakers," 
or from the usual suspect online bibliographies of cryptography, 
provided by "highly trustworthy" encryption workers of these 
noble lists of more lurkers than workers.

Many interpretations of "encryption works," besides
advocating
its public use. It works to falsely assure, it works to lure victims, it
works
to boost the industry, it works to keep cryptographers employed,
it works to conceal government, commerce and individual
perfidy. All these are regularly discussed in these cryptic mail
lists
along with related essential subterfuges, lies, cheating, shading, 
marketing, false confessions, vicious attacks and counterattacks,
deceptions, siphoning and corrupting mail lists, well, the list
is quite long and growing as long as stego noses.

Main reason to read these cryptic railings, enthusiasms and
digital stench of lurking snake oilers, is to pick up tips on
who's up and who's down, who's products and research to 
avoid, and who is spreading vile comsec diseases by contracts,
by legislation, by implants, backdoors, trap doors and brazen
front doors (top global corps and govs), by protection against 
the easiest protected and no protection against the hardest 
kept quiet for exploitation and handsome sales on black, 
white, grey and technicolor markets (the top corps and govs).

Hardly an industry group has benefited from the Internet as greatly
as the comsec and privacy protection workers of the world's 
greatest spying machine.

At 09:06 AM 6/9/2014, you wrote:


On 2014.06.08, at 16:47,
coderman
<coderman@xxxxxxxxx>
wrote:
>
>
>Or for that matter, Ed's
laughable assurance that "encryption
works."
>How paranoid can we get? Can you explain how this phrase is laughable? 
>
>While the link below, albeit two years old, seams to indicate that there
are no quantum computers capable of breaking my (our) encryption methods,
I seams to recall somewhere that there were 17 or so of these computers
in the world scattered in underground rooms at more than 200 below
freezing for those who could afford the price tag. You bet the Gov. of
the United States (via CIA I think RUMINT) has access to one. However, if
you are doing something serious enough to get your data tagged, tasked,
and processed through this kind of computer, it is no laughing matter.
The rest of us are not that important, nor are there the resources
available to process all of our traffic, much less the sum of our
data!
>
>http://security.stackexchange.com/questions/23085/are-there-really-functioning-quantum-computers
> 
>
>If you think encryption is a “laughable assurance” why would you even
subscribe to these emails?
>
>Regards,
>
>Mark 
>
>P.S. I say this tung in cheek … Please son’t tell me that they have
developed mind readers. "F*ck Man, nothing is safe anymore, and they
are ruining everything!” ;-)
>
>P.P.S To the original question about cell phones. If you have an iPhone
or something similar that you 1) can't remove the battery, 2) is too cost
prohibitive to remove the battery etc. you can remove the SIM card and
power the phone off. With the SIM card removed, you can rest assured that
only 200 or so people who have the knowledge to find your IMEI on the
grid and have access to the equipment to do that are probably out seeking
bigger fish. If that doesn’t give you the peace you need, then my advice
to you is whatever your are doing should be paying you enough to smash
that iPhone at anytime you want. :-)

Other related posts: