Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Eastbound

"I think we drove them nuts posting every know word in the list."

Nope...I'm sure that a list of several of the keywords or phrases gets instantly culled out as an obvious attempt at taunting the system.

The list above will never be tagged for scrutiny by an actual flesh and blood agent.

To play this game add just one word from the list to an ordinary text like an email....but be aware that such a stunt WILL get you noticed...best not play this game.

To really get attention add the word to data sent via the TOR anonymous router system.... TOR is not totally secure but the snoops will get really curious if you post keywords there.

Foreign governments regularly run operations where data is highly encrypted and then placed on the net as a questionable communication...if the US takes action based on the phony data they know the cipher has been compromised. This is how various actors or governments know what level of encryption is safe to use.


46 posted on 04/07/2006 9:01:58 PM PDT by Bobalu (This is not the tag line you are looking for.....move along (waves hand))
[ Post Reply | Private Reply | To 32 | View Replies ]


To: Bobalu; Eastbound; calljack

OMG ...

Lookie what I found ...

New Toy!!

This is Fantastic ...

Echelon's Trigger Words Generator:
http://www.bugbrother.com/echelon/spookwordsgenerator.html

Click on the button in order to generate a randomized text
made of the 'trigger words' supposed to activate Echelon.

Simon Davies, director of Privacy International, warns that the list of 1,700 suspicious "trigger words" will not outsmart the global surveillance system : "The Echelon system works on a very sophisticated system of word relationships, rather than strictly on keywords. Powerful artificial intelligence software is used to judge the relationship between words, and analyse strings of words." Davies advises sending a whole series of original keyword transmissions through email, rather than relying on someone else's template."

Sample:

From: president@whitehouse.gov
To: foia@hq.nasa.gov
Subj: BENKOLI SERRI (TOP SECRET - Iran)

Nikolai Patrushev, head of Federal'naya Sluzhba Bezopasnosti (FSB), told Korean Central Intelligence Agency (KCIA) about Djibouti frenchelon station : a most wanted person sent TsSR (NIS Tsienntral'naya Sloujba Razviedki)`s encryption products & snake oil backdoors to Mujahedin-e Khalq Organization (MEK or MKO) !

Ask 21st Space Wing`s contact of Wal-Mart Stores money laundering Dpt via http://www.asio.gov.au/ for Ref. COCOT, NACSINSCT, SCIF, FLiR, JIC, bce, Lacrosse, Flashbangs, HRT, IRA, EODG, DIA.

------

why do I do these things? This can only lead to trouble ;-)


57 posted on 04/07/2006 10:29:09 PM PDT by SubGeniusX
[ Post Reply | Private Reply | To 46 | View Replies ]

To: Bobalu
Nope...I'm sure that a list of several of the keywords or phrases gets instantly culled out as an obvious attempt at taunting the system. The list above will never be tagged for scrutiny by an actual flesh and blood agent.

O.K.  From now on, all my seditious email will contain a list of keywords that large, thus ensuring that it won't be scrutinized.

A lot of the issues that surround the posting of these types of lists has been pretty thoroughly discussed on the Cypherpunk mailing list amonst other places. Many folks who study and occasionally work with spooks would tell you that it's not so much content as traffic analysis (who is talking to who) that is checked for on a routine basis. Combine some sophisticated traffic analysis with some keyword sifting, and you can sift out an incredible amount from the garbage you're not interested in. I'd love to see some of the analysis tools that the NSA and similar agencies have come up with. I'll bet there are some interesting stories there.

59 posted on 04/07/2006 10:42:55 PM PDT by zeugma (Anybody who says XP is more secure than OS X or Linux has been licking toads.)
[ Post Reply | Private Reply | To 46 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson