Keep and Bear Arms
Home Members Login/Join About Us News/Editorials Archives Take Action Your Voice Web Services Free Email
You are 1 of 1456 active visitors Thursday, April 25, 2019
Main Email List:

State Email Lists:
Click Here
Join/Renew Online
Join/Renew by Mail
Make a Donation
Magazine Subscriptions
KABA Memorial Fund
Advertise Here
Use KABA Free Email




Keep and Bear Arms - Vote In Our Polls
Do you support Michael Bloomberg's efforts to shred the Second Amendment?

Current results
Earlier poll results
1222 people voted



» U.S. Gun Laws
» AmeriPAC
» NoInternetTax
» Gun Show On The Net
» 2nd Amendment Show
» SEMPER FIrearms
» Colt Collectors Assoc.
» Personal Defense Solutions




News & Editorials

Preparing for the Revolution

by Kurt Amesbury, J.D.

As our civil rights continue their slide down the razor blade of unconstitutional Federal excess, it appears ever more likely that there will come a day when, if we cherish our freedom, we will be compelled to take up arms and kill our Federal masters.

Shocked? Appalled?

Good. I don't want to have to do that either. But as Churchill said,

"...if you will not fight for the right when you can easily win without bloodshed, if you will not fight when your victory will be sure and not so costly, you may come to the moment when you will have to fight with all the odds against you and only a precarious chance for survival. There may be a worse case. You may have to fight when there is no chance of victory, because it is better to perish than to live as slaves."

The choice is clear. You can buy freedom cheaply now, or later find it impossible to buy at any price. Assuming you are interested in protecting your freedom, albeit, at the lowest possible personal cost to yourself, there are some very simple things you can do to slow the erosion of your rights. Here's the first:

Use encryption in your e-mail communications.

One of the most underutilized tools we have to combat Federal invasion of our lives is text encryption. You should use it wherever possible.

You've probably heard of Carnivore, the FBI's tool for grabbing all the e-mail that moves through a server? You don't have to be the target of an FBI probe. Your e-mail is probably being read and filtered anyway. But Carnivore has a little trouble with encrypted files. The filtering process is primarily a matter of matching words. Carnivore can't filter what it cannot read.

Does that mean your encrypted files cannot be read? Not at all.

Encryption is a numbers game. There has yet to be an encryption method that cannot be broken. What differentiates the strength of an encryption algorithm is the effort necessary to break the message and read its contents. Remember the simple substitution ciphers you probably used as kids? Substitute an 'A' for a 'B' and so on? The amount of effort to break that kind of cipher is relatively minimal. In fact, many newspapers offer those types of "encrypted" messages as brain teasers akin to crossword puzzles. Today's dual-key public encryption algorithms are a far cry from those elementary ciphers, but decryption by the government of an individual message is not a question of "if" -- it's a question of "when."

So, if the government, with all its super-computers can break the encryption and read my mail any time it wants, what good does it do to encrypt?

Encryption is a numbers game.

If you are the only one using encryption, there is virtually no benefit to using it. While a plain text file might take the Feds only a few thousandths of a second to process on a fast computer, the same file encrypted would take days or weeks to read. Breaking the encryption is a numbers game. Remember?

So imagine that instead of just one person encrypting their e-mail, you are able to persuade a few of your friends to follow suit. If it takes the government a day or two per message to decrypt the e-mails, it has a problem on its hands. And the more e-mail the Feds have to sort through, the bigger the problem. Let's say that a Carnivore unit can process 100,000 plain text e-mails a day. If just 10% of those e-mails are encrypted, "daily" processing becomes over 20,000 years of computer time.

Of course, computers will get faster, and the Feds can always put more computers on the problem. By putting 10,000 computers on the case, they can shorten the processing time to a little over two years, and if the computers are 10 times faster, they might be able to read all the e-mails in as little as 2-3 months.

But in the meantime, they've accumulated another 2-3 months worth of e-mail

Encryption is a numbers game.

How important is it to have surveillance-free communications? You decide. If you wanted to control someone, how much would it help you to be able to read their e-mail?

Will this impair the FBI's ability to fight crime? Not at all. If the FBI suspects an individual of a crime, they can still easily break his encrypted messages. But if a large portion of e-mail through a server is encrypted, what they cannot do is spy on people at random by reading all of their e-mail.

So if you really want to jam up Federal surveillance of your Internet communications, get yourself a copy of PGP (Pretty Good Privacy - it's free for personal use!), and start sending bowling league stats, weather observations, love letters and shooting tips to everyone you know! Obviously, heavily encrypted cake recipes aren't the sort of thing the Feds will be hoping to find when they troll through your e-mail. But that's their problem, isn't it?

By the way, my public key is below. Once you get PGP, cut and paste will get you started.

If you are among the group of patriots who wants to slow down and reverse the Federal government's encroachment on your freedom, but aren't ready to start shooting (isn't that all of us, really?), get PGP and send me a note today!

Keep your powder dry!

Version: PGPfreeware 7.0.3 for non-commercial use

mQGiBDreqgARBAD5ytHhcvMnqfSBFCvgPdX5fouPre+AIMZUR/hHGiVu2LUgqRWq ulr+AIMai0TgbfKIvjduVhy7PwaXG/Xoc7ZsZgCMb9qVprQkIqYclu0F5KfPrHj0 1TL1WKyih/vH9lIN9WFNWEeGzIq96DerXf1VOGAYIGyywM8ZaVekDpGvUwCg/6Td ajLgRKoxog8SfEOSXeQaCgEEANwjd/gtuJd8Oi78EKLBqKYBK9Q+tfYxPs9cdaT5 Ylhj2WiyavkKKJ0IlQCCCTjkJLYL/V+AHFky7HXL8F4cgkT6f5ZiLhSqrlXOnfaB sRxX2dd1TTKWlYsW0Hry2gAcuCQfHfM2h8OdyUHoW1/PngzQg7VgLMWN8EZ0YzRx cX3zBADHMcHCuLjFel9RJhj7UPKUywmDutnDmKnFKSJFNu7cOqJ2gQ3xkcwHQ/8X JYBfMzil4QQH11au/zVLjQ0484Vl1re0dcOxOMPe1QJ15kPlAvVGMBWSsjFM7a3+ OHIBIcDo9aV1ghgbGQigG7AVSU4gbmZAUNdkfm7ZIOnpsAPujLQVS3VydCA8a3Vy dEBvdG93bi5jb20+iQBYBBARAgAYBQI63qoACAsDCQgHAgEKAhkBBRsDAAAAAAoJ EPSgQfRcovQljXkAn00j8k1fK3dNuXScPIoeKDTQwex6AJ93e1U9I39pHjK7u3mH A/8mK5IVOrkCDQQ63qoAEAgA9kJXtwh/CBdyorrWqULzBej5UxE5T7bxbrlLOCDa AadWoxTpj0BV89AHxstDqZSt90xkhkn4DIO9ZekX1KHTUPj1WV/cdlJPPT2N286Z 4VeSWc39uK50T8X8dryDxUcwYc58yWb/Ffm7/ZFexwGq01uejaClcjrUGvC/RgBY K+X0iP1YTknbzSC0neSRBzZrM2w4DUUdD3yIsxx8Wy2O9vPJI8BD8KVbGI2Ou1WM uF040zT9fBdXQ6MdGGzeMyEstSr/POGxKUAYEY18hKcKctaGxAMZyAcpesqVDNmW n6vQClCbAkbTCD1mpF1Bn5x8vYlLIhkmuquiXsNV6TILOwACAggA63b5qUNkKsFx JGLLuHjWyEqOkB/v+Ag7Udf94mG1eBK4GW65aUPSUIZFqnafhoo4KYz8K/0W+ofZ PBFp3QKiZmHFC2hEY7bvH+BCw07pnI76N+MIDE0CDZ7pmtzEcn0L6kTh9Ins23gu ROAgykWzZuhQ4I0xdeyz95CBVs87b0ZW8JzMUYolNWILxMVZIIHF3Q4efzytZ/cr LLcIwDCes1RLmE53/jfR2tMNfEpzDVhwKmH3aeLJLFV3r/6KD83aR0jtp6c+/KNm kpu52Ec/2caBAiXkZXHzM2wG48vF2UWQx4nEio5D1HZ2J1VHd2+ClfRQ5Gy8Hxd6 KUbJBVBRCokATAQYEQIADAUCOt6qAAUbDAAAAAAKCRD0oEH0XKL0JaT+AKDSSnHo QYLLMcQahCi2vSPL4cC9SgCgugb+uaTq1MUtnftn3gYNO5sdYrC5Ag0EOt5iwBAI APZCV7cIfwgXcqK61qlC8wXo+VMROU+28W65Szgg2gGnVqMU6Y9AVfPQB8bLQ6mU rfdMZIZJ+AyDvWXpF9Sh01D49Vlf3HZSTz09jdvOmeFXklnN/biudE/F/Ha8g8VH MGHOfMlm/xX5u/2RXscBqtNbno2gpXI61Brwv0YAWCvl9Ij9WE5J280gtJ3kkQc2 azNsOA1FHQ98iLMcfFstjvbzySPAQ/ClWxiNjrtVjLhdONM0/XwXV0OjHRhs3jMh LLUq/zzhsSlAGBGNfISnCnLWhsQDGcgHKXrKlQzZlp+r0ApQmwJG0wg9ZqRdQZ+c fL2JSyIZJrqrol7DVekyCzsAAgIIANwUElVbTjXntGCg0rpARb6gxMZABvgkRLD2 bmTt1ODxo7LZUWfyHWPqhlJKjgHY5S8it1/DtnQ7a8g4+JjiV/E9Bodux5ZOSv5w MxPLKxYQIqpb0N44CUwVAZhMV7QhYIYsgDGT+4Mo7+ZiSpZscvcJ/hLhog8pAJbH iltlgSMIpRFkAiq1VK6iVVlgWEqa2V2yR8mdATKoU9TUz7iyC1rrpI739sXtZe3B +6nLQN+SH7G3TXhgmr6I7Eo0MSXYuS41MuMSyf1hbB1or8bcfPTBtCn3alUl8mj+ t9tgYqbpNqZbyioN9tmsQpdxytV1np7S9tpHUdXk8RcbeLjtl62JAFIEGBECABIF AjresXYFCQHlKAAFGwwAAAAACgkQ9KBB9Fyi9CUNwwCfakr8m0njEwXF2dDTCodb tp51uvAAoIa2v54AkUKGmOsZk4ObCZ0I2dS3 =D/1S -----END PGP PUBLIC KEY BLOCK-----

Print This Page
Mail To A Friend
I heartily accept the motto, "That government is best which governs least." HENRY DAVID THOREAU

COPYRIGHT POLICY: The posting of copyrighted articles and other content, in whole or in part, is not allowed here. We have made an effort to educate our users about this policy and we are extremely serious about this. Users who are caught violating this rule will be warned and/or banned.
If you are the owner of content that you believe has been posted on this site without your permission, please contact our webmaster by following this link. Please include with your message: (1) the particulars of the infringement, including a description of the content, (2) a link to that content here and (3) information concerning where the content in question was originally posted/published. We will address your complaint as quickly as possible. Thank you.

NOTICE:  The information contained in this site is not to be considered as legal advice. In no way are Keep And Bear Arms .com or any of its agents responsible for the actions of our members or site visitors. Also, because this web site is a Free Speech Zone, opinions, ideas, beliefs, suggestions, practices and concepts throughout this site may or may not represent those of Keep And Bear Arms .com. All rights reserved. Articles that are original to this site may be redistributed provided they are left intact and a link to is given. Click here for Contact Information for representatives of is the leading provider of Public Key Infrastructure (PKI) and digital certificate solutions used by enterprises, Web sites, and consumers to conduct secure communications and transactions over the Internet and private networks., Inc. © 1999-2019, All Rights Reserved. Privacy Policy