Preparing for the Revolution
by Kurt
Amesbury, J.D.
As our civil rights continue their slide down
the razor blade of unconstitutional Federal excess, it appears ever more likely
that there will come a day when, if we cherish our freedom, we will be compelled
to take up arms and kill our Federal masters.
Shocked? Appalled?
Good. I don't want to have to do that either.
But as Churchill said,
"...if you will not fight for the right
when you can easily win without bloodshed, if you will not fight when your
victory will be sure and not so costly, you may come to the moment when you
will have to fight with all the odds against you and only a precarious chance
for survival. There may be a worse case. You may have to fight when there is
no chance of victory, because it is better to perish than to live as
slaves."
The choice is clear. You can buy freedom
cheaply now, or later find it impossible to buy at any price. Assuming you are
interested in protecting your freedom, albeit, at the lowest possible personal
cost to yourself, there are some very simple things you can do to slow the
erosion of your rights. Here's the first:
Use encryption in your e-mail
communications.
One of the most underutilized tools we have to
combat Federal invasion of our lives is text encryption. You should use it
wherever possible.
You've probably heard of Carnivore,
the FBI's tool for grabbing all the e-mail that moves through a server? You
don't have to be the target of an FBI probe. Your e-mail is probably being read
and filtered anyway. But Carnivore has a little trouble with encrypted files.
The filtering process is primarily a matter of matching words. Carnivore can't
filter what it cannot read.
Does that mean your encrypted files cannot be
read? Not at all.
Encryption is a numbers game. There has yet to
be an encryption method that cannot be broken. What differentiates the strength
of an encryption algorithm is the effort necessary to break the message
and read its contents. Remember the simple substitution ciphers you probably
used as kids? Substitute an 'A' for a 'B' and so on? The amount of effort to
break that kind of cipher is relatively minimal. In fact, many newspapers offer
those types of "encrypted" messages as brain teasers akin to crossword
puzzles. Today's dual-key public encryption algorithms are a far cry from those
elementary ciphers, but decryption by the government of an individual message is
not a question of "if" -- it's a question of "when."
So, if the government, with all its
super-computers can break the encryption and read my mail any time it wants,
what good does it do to encrypt?
Encryption is a numbers game.
If you are the only one using encryption, there
is virtually no benefit to using it. While a plain text file might take the Feds
only a few thousandths of a second to process on a fast computer, the same file encrypted
would take days or weeks to read. Breaking the encryption is a numbers game.
Remember?
So imagine that instead of just one person
encrypting their e-mail, you are able to persuade a few of your friends to
follow suit. If it takes the government a day or two per message to
decrypt the e-mails, it has a problem on its hands. And the more e-mail the Feds
have to sort through, the bigger the problem. Let's say that a Carnivore unit
can process 100,000 plain text e-mails a day. If just 10% of those e-mails are
encrypted, "daily" processing becomes over 20,000 years of computer
time.
Of course, computers will get faster, and the
Feds can always put more computers on the problem. By putting 10,000 computers
on the case, they can shorten the processing time to a little over two years,
and if the computers are 10 times faster, they might be able to read all the
e-mails in as little as 2-3 months.
But in the meantime, they've accumulated
another 2-3 months worth of e-mail
Encryption is a numbers game.
How important is it to have surveillance-free
communications? You decide. If you wanted to control someone, how much would it
help you to be able to read their e-mail?
Will this impair the FBI's ability to fight
crime? Not at all. If the FBI suspects an individual of a crime, they can still
easily break his encrypted messages. But if a large portion of e-mail through a
server is encrypted, what they cannot do is spy on people at random by reading
all of their e-mail.
So if you really want to jam up Federal
surveillance of your Internet communications, get yourself a copy of PGP
(Pretty Good Privacy - it's free for personal use!), and start sending bowling
league stats, weather observations, love letters and shooting tips to everyone
you know! Obviously, heavily encrypted cake recipes aren't the sort of thing the
Feds will be hoping to find when they troll through your e-mail. But that's
their problem, isn't it?
By the way, my public key is below. Once you
get PGP, cut and paste will
get you started.
If you are among the group of patriots who
wants to slow down and reverse the Federal government's encroachment on your
freedom, but aren't ready to start shooting (isn't that all of us, really?), get
PGP and send me a note today!
Keep your powder dry!
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGPfreeware 7.0.3 for non-commercial use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 JGLLuHjWyEqOkB/v+Ag7Udf94mG1eBK4GW65aUPSUIZFqnafhoo4KYz8K/0W+ofZ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 MGHOfMlm/xX5u/2RXscBqtNbno2gpXI61Brwv0YAWCvl9Ij9WE5J280gtJ3kkQc2
azNsOA1FHQ98iLMcfFstjvbzySPAQ/ClWxiNjrtVjLhdONM0/XwXV0OjHRhs3jMh LLUq/zzhsSlAGBGNfISnCnLWhsQDGcgHKXrKlQzZlp+r0ApQmwJG0wg9ZqRdQZ+c
fL2JSyIZJrqrol7DVekyCzsAAgIIANwUElVbTjXntGCg0rpARb6gxMZABvgkRLD2
bmTt1ODxo7LZUWfyHWPqhlJKjgHY5S8it1/DtnQ7a8g4+JjiV/E9Bodux5ZOSv5w
MxPLKxYQIqpb0N44CUwVAZhMV7QhYIYsgDGT+4Mo7+ZiSpZscvcJ/hLhog8pAJbH
iltlgSMIpRFkAiq1VK6iVVlgWEqa2V2yR8mdATKoU9TUz7iyC1rrpI739sXtZe3B
+6nLQN+SH7G3TXhgmr6I7Eo0MSXYuS41MuMSyf1hbB1or8bcfPTBtCn3alUl8mj+
t9tgYqbpNqZbyioN9tmsQpdxytV1np7S9tpHUdXk8RcbeLjtl62JAFIEGBECABIF
AjresXYFCQHlKAAFGwwAAAAACgkQ9KBB9Fyi9CUNwwCfakr8m0njEwXF2dDTCodb
tp51uvAAoIa2v54AkUKGmOsZk4ObCZ0I2dS3 =D/1S -----END PGP PUBLIC KEY BLOCK-----