This page has been archived and commenting is disabled.

A Free, Quick and Easy Way to Protest Government Spying

George Washington's picture


While it’s obvious to everyone that the government is spying on virtually all of the digital communications of Americans – phone, email, Internet, credit card, etc. – the government is pretending that it only spies on foreigners and collecting our  metadata (which can actually tell a lot about us).

Indeed, the government is instructing Senate staffers to stick cover their eyes and pretend that the spying documents found all over the Internet don’t exist.

One free and easy way to protest mass surveillance, educate others, and yank Big Brother’s chain is simply to add a sentence to the end of your emails and web posts.

To give you the idea: you’ve seen the disclaimers at the end of emails from lawyers, investment advisers, and similar professionals.  You know, the ones that say stuff like “This is a confidential communication and can’t be used by anyone but the intended recipient”.  They put the same disclaimer at the end of every single email.

Why don’t we put our own disclaimer at the end of our emails and web comments, saying:

WARNING: The National Security Agency is likely recording and storing this communication as part of its unlawful spying programs on all Americans ... and people worldwide. The people who created the NSA spying program say that this communication - and any responses - can and will be used against the American people at any time in the future should folks in government decide to go after us for political reasons. And private information in digital communications may be given to big companies by the government.


Mass surveillance doesn't keep us safe, and even the top national security experts say that we don't need it. (They also say we should get a grip.)

This may help keep the issue alive even as the government desperately tries to sweep it under the rug.

Note: All modern browsers allow you to highlight, copy and then paste text with links in it into your email or web comment.  If you prefer, you can copy just the text and delete the links.


- advertisements -

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
Mon, 06/17/2013 - 19:07 | 3666250 hwertz
hwertz's picture

     I like it.  I shortened mine a bit.  Done and done.


WARNING: The National Security Agency is likely recording and storing this communication as part of it's unlawful and unconstitutional spying programs on all Americans and people worldwide.


Mon, 06/17/2013 - 09:09 | 3664530 PT
PT's picture

"We only collect your metadata."
"Yes, you do.  And I always pull out before I blow."

Mon, 06/17/2013 - 04:02 | 3664157 Trampy
Trampy's picture

use strong encryption like PGP if you don't want NSA reading your emails.  who knows, they might decide they need to decrypt them.  fuck em!

Mon, 06/17/2013 - 06:58 | 3664235 esum
esum's picture

Sorry amigo .... PGP has been cracked by the goodfellas at NSA....


Mon, 06/17/2013 - 06:16 | 3664210 Bendromeda Strain
Bendromeda Strain's picture

I took this image and converted it to rich text and append it to my emails. Creates QUITE a long block of characters, looks like spy code (booga booga). Hope they like converting it back  :-)

Mon, 06/17/2013 - 00:59 | 3664065 Bloodstock
Bloodstock's picture

And when the Revolution starts in America, who will supply arms to the "rebels?"

Mon, 06/17/2013 - 07:00 | 3664238 esum
esum's picture

the OATHKEEPERS in the military


Mon, 06/17/2013 - 05:47 | 3664189 snblitz
snblitz's picture


Sun, 06/16/2013 - 22:07 | 3663825 Angelo Misterioso
Angelo Misterioso's picture

There could be some upside to the budget here. How long until the IRS starts mining the data and wants to know why mr x has visited company y at 8am until 5pm everyday for the last year and yet never filed a W2...

Or maybe HSS can cross-reference all the credit card charges with the SKU's and determine that Joe Six-Pack of cigarettes does not really deserve a new lung transplant.

Or HSS could send me a email if I don't purchases enough fruits and vegetables. Or an email if I charge too much at fast food stores...a helpful text message maybe...

And we should certainly let the insurance companies have all this data so they can finally stop guessing with those actuarial tables. So I am addicted to sky diving and butter - is that a problem?!

So lots of good could come of this (I say with a lot of sarcasm)...

Sun, 06/16/2013 - 19:59 | 3663617 NickVegas
NickVegas's picture

Here is a point none of the slaves have focused on. There are credible reports that during the "manhunt" martial law exercise in Boston, that all internet and phone was shutoff for 20 minute periods. In others words, in addition to total information awareness, they also have a functional kill switch, and tested all their capabilities in one fell swoop. This has all the finger prints of the pentagon. They are all focused on things like command, control, and communications. Without a kill switch, how can you disrupt communications of a population that is to be "liberated".

Sun, 06/16/2013 - 23:05 | 3663924 otto skorzeny
otto skorzeny's picture

The county govt is holding ham radio operator get togethers and I am thinking that is just to find out/register who is capable of going outside controllable communication networks when they use the kill switch.

Mon, 06/17/2013 - 05:46 | 3664187 snblitz
snblitz's picture

Legal HAM radio operators are registered with the FCC and the database is public.

They also have to keep their home address up-to-date so their equipment can be seized in time of emergency.

Sun, 06/16/2013 - 19:59 | 3663616 bardot63
bardot63's picture

I received a questionnaire from the US Census Bureau.  Came in the mail Saturday. The envelope states "Your Reponse is Required by Law."  My response, required by law, will be:   I refuse to answer based on my Fifth Ammendment right guaranteed to me by the US Constitution.

The O administration finally found a Constitutional ammendment they like - the 5th one.  So, if it's good enough for that criminal from the IRS, it's good enuf for me.

Sun, 06/16/2013 - 18:46 | 3663466 mendigo
mendigo's picture

Good idea George but shorter and without the tirade and links and in wealwy small font.

I am a liar.
Everything I tell you is a lie.
I am lying to you now.

Sun, 06/16/2013 - 19:19 | 3663527 Bear
Bear's picture

I am a liar (just like my friends in Washington).
Everything I tell you is a lie (just like my friends on Wall Street).
I am lying to you now (just like my friends at Msn, Cbs, Abc, Cnn .... )

"let's be clear on this point, I'm telling you the truth" (about the lying)

Sun, 06/16/2013 - 20:26 | 3663665 mendigo
mendigo's picture

We prefer the lies I think.
The reality is such a bother.

Sun, 06/16/2013 - 18:04 | 3663372 eclectic syncretist
eclectic syncretist's picture

Just use cash for all purchases.  That would really screw the sneaky bastards up.

Sun, 06/16/2013 - 17:58 | 3663353 Lmo Mutton
Lmo Mutton's picture


That is all.



WARNING: The National Security Agency is likely recording and storing this communication as part of its unlawful spying programs on all Americans ... and people worldwide. The people who created the NSA spying program say that this communication - and any responses - can and will be used against the American people at any time in the future should folks in government decide to go after us for political reasons. And private information in digital communications may be given to big companies by the government.


Mass surveillance doesn't keep us safe, and even the top national security experts say that we don't need it. (They also say we should get a grip.)

Sun, 06/16/2013 - 22:58 | 3663911 bunnyswanson
bunnyswanson's picture

DISCLAIMER:  My inebriated state has rendered me incapable of rationale thought.  Because of my impaired judgment, I am not responsible for the content of any messages/comments/replies I compose on the internet. 


Replace inebriates with:  Medicated, drugged, senile, depressed, confused, ill-advised, misinformed, duressed as one sees fit.

Mon, 06/17/2013 - 09:03 | 3664512 PT
PT's picture

bunnyswanson re: disclaimer


Sun, 06/16/2013 - 15:17 | 3663078 mt paul
mt paul's picture

comment removed by CISPA

pending review by DHS

for archive storage by NSA....

Sun, 06/16/2013 - 11:46 | 3662632 dizzyfingers
dizzyfingers's picture


WARNING: The National Security Agency is likely recording and storing this communication as part of its unlawful spying programs on all Americans ... and people worldwide. The people who created the NSA spying program say that this communication - and any responses - can and will be used against the American people at any time in the future should folks in government decide to go after us for political reasons. And private information in digital communications may be given to big companies by the government.


Mass surveillance doesn't keep us safe, and even the top national security experts say that we don't need it. (They also say we should get a grip.)


Sun, 06/16/2013 - 14:35 | 3662993 ISEEIT
Sun, 06/16/2013 - 11:31 | 3662597 rustymason
rustymason's picture

There are books* that describe how marketers gather tons of data on their customers. They know so much and in such great detail that they can tell when a man is about to switch his habits and what those new habits might be, as well as be able to tell when a woman is about to get pregnant. They have also figured out how to keep this knowledge secret so that they don't spook the customers. And now we know that these businesses and the NSA have been swapping spit. Not to discourage anyone from implementing GW's suggestion above, but is an email warning signature like that going to have a significant effect?

* You might want to check out The Power of Habit by Charles Duhigg.

Mon, 06/17/2013 - 07:14 | 3664256 esum
esum's picture





Sun, 06/16/2013 - 11:17 | 3662573 Mi Naem
Mi Naem's picture

This is an excellent way

to get people to use every email they send to drive traffic to Washington's Blog for free. 

Good marketing. 

Mon, 06/17/2013 - 04:21 | 3664162 BeetleBailey
BeetleBailey's picture

Not GW's intent...


Good Job Georgie.....keep on with the fight brother.....

Sun, 06/16/2013 - 14:44 | 3663014 George Washington
George Washington's picture

So remove the links, but use the text ...

Sun, 06/16/2013 - 09:06 | 3662352 Dewey Cheatum Howe
Dewey Cheatum Howe's picture

The National Security Agency has acknowledged in a new classified briefing that it does not need court authorization to listen to domestic phone calls.

Call me stupid but isn't domestic spying specifically prohibited by their charter?............

Rep. Jerrold Nadler, a New York Democrat, disclosed this week that during a secret briefing to members of Congress, he was told that the contents of a phone call could be accessed "simply based on an analyst deciding that."

If the NSA wants "to listen to the phone," an analyst's decision is sufficient, without any other legal authorization required, Nadler said he learned. "I was rather startled," said Nadler, an attorney and congressman who serves on the House Judiciary committee.

Not only does this disclosure shed more light on how the NSA's formidable eavesdropping apparatus works domestically, it also suggests the Justice Department has secretly interpreted federal surveillance law to permit thousands of low-ranking analysts to eavesdrop on phone calls.

Because the same legal standards that apply to phone calls also apply to e-mail messages, text messages, and instant messages, Nadler's disclosure indicates the NSA analysts could also access the contents of Internet communications without going before a court and seeking approval.

The disclosure appears to confirm some of the allegations made by Edward Snowden, a former NSA infrastructure analyst who leaked classified documents to the Guardian. Snowden said in a video interview that, while not all NSA analysts had this ability, he could from Hawaii "wiretap anyone from you or your accountant to a federal judge to even the president."


The fallacy and no one will report it because the fucking news organizations don't have a fucking spine or are still co-opted and this is just controlled opposition is the whole legal underpinning for this and the PRISM program in general was ruled illegal and unconstitutional by FISC court back 2011. The Oreohouse there and the DOJ have the court opinion sealed so the programs could be continued without bringing them into line legally. The EFF is suing to get the opinion unsealed.

Sun, 06/16/2013 - 08:04 | 3662297 Lumberjack
Lumberjack's picture

"Indeed, the government is instructing Senate staffers to stick cover their eyes and pretend that the spying documents found all over the Internet don’t exist"


"If you see something, say nothing"

Sun, 06/16/2013 - 06:23 | 3662238 justamousesquared
justamousesquared's picture



HowardBeale you sir are a genius, we would like to present you with a free yacht. To claim your prize please come to 9800 Savage Rd  Fort Meade, MD 20755, United States. 

Bring your family too


Sat, 06/15/2013 - 23:02 | 3661897 LongBallsShortBrains
LongBallsShortBrains's picture

My taxes have to pay for this crap?

My personal photos and letters and effects being observed by total strangers to me, in the name of securing me? And I pay for it?

Yet the record of birth and records of education of the leader of the most transparent administration in the history of this country are off limits to me the taxpayer?




Sun, 06/16/2013 - 06:27 | 3662237 PT
PT's picture

Longballs re:  "My taxes pay for this ..."

There's only one solution here.  You're gonna have to put in a quote to intercept and spy on your own phone calls and internet use.  I'm sure you can spy on yourself cheaper than anyone else can, and doesn't the cheapest quote get the job?

P.S.  If the cheaper quote gets the job, wouldn't that be the companies hell-bent on stealing trade secrets from their competitors? 

Sun, 06/16/2013 - 15:23 | 3663090 Vuke
Vuke's picture

PT....Could be companies willing to sell the same info to foreign countries!

Sun, 06/16/2013 - 01:05 | 3662058 Dr. Sandi
Dr. Sandi's picture

Yeah, if we just had that information, everything else would turn out fine.

Sat, 06/15/2013 - 22:42 | 3661863 blindman
blindman's picture

Alex McMurray "When You Wish Upon a Star"

Sat, 06/15/2013 - 22:14 | 3661823 eddiebe
eddiebe's picture

Hey but look at all the jobs the NSA is creating. 

Sun, 06/16/2013 - 10:21 | 3662451 de3de8
de3de8's picture

And hence why no recession in MD.

Sat, 06/15/2013 - 21:33 | 3661759 flacorps
flacorps's picture

Surveillors should be "eighty-foured" ... a process requiring several large MMA types wearing steel-toed boots. Eighty-four them until they're eighty-sixed.

Sat, 06/15/2013 - 20:48 | 3661712 reepotomac
reepotomac's picture

Another free and easy way to protest government spying and all their other crap.

Sat, 06/15/2013 - 20:04 | 3661647 Kiwi Pete
Kiwi Pete's picture

Hey if any ZHers are looking for a job with the NSA you could do worse thsn go to their Facebook Careers page:


At the least you can be sure they're monitoring it :)

Sat, 06/15/2013 - 20:37 | 3661696 rubiconsolutions
rubiconsolutions's picture

I didn't see the "Loathe" them button. Did I miss something?

Sat, 06/15/2013 - 18:49 | 3661533 kurt
kurt's picture

Yes they caputure everything. An aside, before Photoshop, photographs were given much more credibility. Now virtually every photo is scritinized as "photoshopped" or not. Images are distrusted. Video is rapidly approaching the same level of un-real, reality: witness the improvement of special effects in the movies. Now we have all animated features approaching the undetectablity threashold. Audio, being much, much more compact, synthesis being much more advanced, we can now make anybody say anything...IN THEIR OWN VOICE.

Take now your typical ersats FBI sting or badly botched false flag psy-op, like, say, Boston Marathon. Take those guys, trying to build a case, the ones who stab and run over potential witnesses, cut their throats even. Give them unlimited samples of your voice, contextualized, edited and packaged to make a case, say, AGAINST YOU. Well, as you may have guessed by now. They don't need unlimited recordings of you. They just need enough sample data to "photoshop" what you said and when. But wait, they know all of this. It could never fly in front of a judge or jury. I know! Get rid of all that. They just need to convince each other and/or their superior that YOU ARE GUILTY... listen to this.

The suspect drew a gun and was killed. Now we all get overtime to process the scene. Yeah!

Sun, 06/16/2013 - 06:37 | 3662246 PT
PT's picture

Yes kurt, I can't imagine they'll try hard in the future.  You'll be declared a terrorist because you have stuff that they want to steal from you.  Evidence will be manufactured as required, if necessary (you've been declared a terrorist, remember).  And you must've obtained your assets illegally becoz they've deliberately made the whole damn "capitalist" system unprofitable.  Anyone who makes a profit must be a terrrrrist.

Sat, 06/15/2013 - 22:39 | 3661855 msmith9962
msmith9962's picture

Thats pretty damn scary.  I just watched the history of the world in 2 hours on H2.  Shit is totally out of control.  I wonder if early man were douche bags or if this is an evolutionary thing.

Sun, 06/16/2013 - 01:04 | 3662056 Dr. Sandi
Dr. Sandi's picture

There is no evidence of actual human DNA evolution for the past 50,000 years. And from what bits we have of history for the final few percent of that time frame, not much social evolution either.

Mon, 06/17/2013 - 05:59 | 3664196 Harry Dong
Harry Dong's picture

Tooth size began a gradual reduction during the Upper Paleolithic at the rate of roughly 1% per 2,000 years until the end of the Pleistocene about 10,000 years ago. Beginning about 10,000 years ago, the rate of reduction seems to have doubled to about 1% every 1,000 years. See Figure 3 .

Sat, 06/15/2013 - 18:38 | 3661509 HowardBeale
HowardBeale's picture

There is a more effective way to overwhelm the NSA, basically turning them into an extreme caricature of the bumbling fascist invaders they already are. Just append the following to every email you send, and you could even white font it so it isn't a nuissance to the recipients. Take random chunks out of it--starting and ending right in the middle of words--so as to deny them the ease of identifying it as spam, though, of course, if they did that, and someone expected them to do that, well, that email would probably be relatively secure. It's no win for them.

"Waihopai, INFOSEC, Information SecurityInformation Warfare, IW, IS, Priavacy, Information Terrorism, Assasinate, Terrorism Defensive Information, Obama, Defense Information WarfareOffensive InformationOffensive Information WarfareNational Information Infrastructure, InfoSec, Reno, Compsec, Computer Terrorism, Firewalls, Secure internet connections, ISS, Passwords, DefCon V, Hackers, Encryption, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBISecert Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, PEM, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, BZ, CANSLO, CBNRC, CIDA, JAVA, Active X, Compsec 97, LLC, DERA, Mavricks, Meta-hackers, ^?, Steve Case, Tools, Telex, Military Intelligence, Scully, Flame, Infowar, Bubba, Freeh, Archives, Sundevil, jack, Investigation, ISACA, NCSA, spook words, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, Lacrosse, Flashbangs, HRT, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, LABLINK, USACIL, USCG, NRC, ~, CDC, DOE, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, SGC, UNCPCJ, CFC, DREO, CDA, DRA, SHAPE, SACLANT, BECCA, DCJFTF, HALO, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, SAS, SBS, UDT, GOE, DOE, GEO, Masuda, Forte, AT, GIGN, Exon Shell, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, MYK, 747,777, 767, MI5, 737, MI6, 757, Kh-11, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, Duress, RAID, Psyops, grom, D-11, SERT, VIP, ARC, S.E.T. Team, MP5k, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, PSAC, PTT, RFI, SIGDASYS, TDM. SUKLO, SUSLO, TELINT, TEXTA. ELF, LF, MF, VHF, UHF, SHF, SASP, WANK, Colonel, domestic disruption, smuggle, 15kg, nitrate, Pretoria, M-14, enigma, Bletchley Park, Clandestine, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism SecurityRapid ReactionCorporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, High Security, Security Evaluation, Electronic Surveillance, MI-17, Counterterrorism, spies, eavesdropping, debugging, interception, COCOT, rhost, rhosts, SETA, Amherst, Broadside, Capricorn, Gamma, Gorizont, Guppy, Ionosphere, Mole, Keyhole, Kilderkin, Artichoke, Badger, Cornflower, Daisy, Egret, Iris, Hollyhock, Jasmine, Juile, Vinnell, B.D.M.,Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, Covert Video, Intiso, r00t, lock picking, Beyond Hope, csystems, passwd, 2600 Magazine, Competitor, EO, Chan, Alouette,executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh SecurityMacintosh Internet SecurityMacintosh FirewallsUnix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, sweeping, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, Cypherpunks, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, Pornstars, AVN, Playboy, Anonymous, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, counterintelligence, industrial espionage, PI, TSCI, industrial intelligence, H.N.P., Juiliett Class Submarine, Locks, loch, Ingram Mac-10, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Blowpipe, CCS, GSA, Kilo Class, squib, primacord, RSP, Becker, Nerd, fangs, Austin, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Wackenhutt, EO, Wackendude, mol, Hillal, GGL, CTU, botux, Virii, CCC, Blacklisted 411, Internet Underground, XS4ALL, Retinal Fetish, Fetish, Yobie, CTP, CATO, Phon-e, Chicago Posse, l0ck, spook keywords, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, press-release, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Digicash, zip, SWAT, Ortega, PPP, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, Middleman, KLM, Blackbird, plutonium, Texas, jihad, SDI, Uzi, Fort Meade, supercomputer, bullion, 3, Blackmednet, Propaganda, ABC, Satellite phones, Planet-1, cryptanalysis, nuclear, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, Dolch, secure shell, screws, Black-Ops, Area51, SABC, basement, data-haven, black-bag, TEMPSET, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, unclassified, utopia, orthodox, Alica, SHA, Global, gorilla, Bob, Pseudonyms, MITM, Gray Data, VLSI, mega, Leitrim, Yakima, Sugar Grove, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, Flintlock, cybercash, government, hate, speedbump, illuminati, president, freedom, cocaine, $, Roswell, ESN, COS, E.T., credit card, b9, fraud, assasinate, virus, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, Atlas, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, Lynch, 414, Face, Pixar, IRIDF, eternity server, Skytel, Yukon, Templeton, LUK, Cohiba, Soros, Standford, niche, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, HoHoCon, SISMI, FIS, MSW, Spyderco, UOP, SSCI, NIMA, MOIS, SVR, SIN, advisors, SAP, OAU, PFS, Aladdin, chameleon man, Hutsul, CESID, Bess, rail gun, Peering, 17, 312, NB, CBM, CTP, Sardine, SBIRS, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, EG&G, AIEWS, AMW, WORM, MP5K-SD, 1071, WINGS, cdi, DynCorp, UXO, Ti, THAAD, package, chosen, PRIME, SURVIAC"

Sun, 06/16/2013 - 14:22 | 3662961 GreatUncle
GreatUncle's picture

Clog the system.

Try this if you want to give them a real cpu blower. Copy and paste the above add to the bottom of the email.

Then encrypt any msgs you send with your key. Maximum length < length of your paste as the key.

Choice then is this if you want to bother decrypting all the combinations or not and does not have to be anything fancy but the amount you can decrpyt starts falling rapidly. Reckon the NSA could handle 1024 bit encryption, be tough on the CPU now rack it up to say 8000 bit or greater. Mind boggles imagine a 1MB encryption key is 8 million bits and as a key can be passed in seconds with the current speed of data transfer.

Sun, 06/16/2013 - 14:46 | 3663018 llbutterfat
llbutterfat's picture

Is PGP still considered one of the strongest encryption programs available? I know Zimmerman was having legal problems w/the commerce dept for the development, and subsequent refusal to grant the US govt a back door key to PGP. At the time it seemed as if it could not be cracked...the case was then the dropped. no reason given. Did he end up giving a back door key? Or is the NSA abilities to crack encryption so advanced PGP is no longer a worry for our friends at NSA?

Do NOT follow this link or you will be banned from the site!