How Insecure is
Internet E-mail?
It is
very important for all Internet Patriot, Militia
and Survivalist members to
understand that
regular e-mail is absolutely insecure. Without encryption, the entire
Internet e-mail
system is like a worldwide bulletin board. Almost any e-mail can be read
by many people
other than who it is sent to.
Regular Internet e-mail is notoriously
insecure and offers no privacy.
Typical e-mail
travels through lots of Internet computers.
The administrators of these
computers can
read, copy and store any relayed e-mail.
Some big governments and
organizations
routinely intercept e-mail
and scan it for interesting words or phrases.
An example of
this would be the Federal Bureau of Investigation's (FBI)
Carnivore
software
implementation.
The Carnivore system is a Microsoft Windows-based
workstation with
packet-sniffing software placed at Internet Service Providers (ISP’s).
The likes of the Federal Bureau of
Investigation (FBI), Department of Defense (DoD),
the Department of Homeland
Security (DHS), and the National Security Agency (NSA) are monitoring Internet
traffic 24 hours a day.
People who value privacy should feel
uncomfortable and do something to protect themselves.
PGP is such a great tool for this purpose.
Why should
PGP be used?
For the uninitiated, PGP stands for Pretty Good
Privacy. It is a very good encryption
program for files and e-mail. It uses something called "public key"
cryptography where
your encryption key is split into a "public" key and a "private" key.
You keep the
private key and pass out the “public key” to whomever you wish to have
secure
communications with.
We expect all Patriots, Survivalists, and Militia members
who value their privacy and
wish to stay in
the loop will download it and learn how to use it.
Anyone who can intercept your e-mail can alter
your e-mail's content. Even worse, anyone
can send e-mail that looks as if it was sent by you. With PGP, you can
digitally sign
your e-mail. When your e-mail and signature is received, PGP can be used
to verify that
the message is unaltered, and from you.
This program is our default security standard for alerts and e-mail
contact with the
public at large.
Why don't you always send your paper
mail on postcards without using envelopes?
Sending your mail through computers is even less confidential than
sending the same
material on a postcard. PGP provides secure envelopes that protect your
privacy.
E-mail messages are too easy to intercept and scan. This can be done
easily, routinely,
automatically, and undetectably on a grand scale. PGP empowers people to
take their
privacy into their own hands.
Your first step in contacting the Connecticut Survivalist Alliance (CSA)
should be to
e-mail us your Public PGP key.
Our RSA Public PGP key is available below.
During the 1990s, the NSA was frequently in court trying to keep PGP off
the market.
In the 1980s, the NSA was trying to get the key length of commercial
ciphers kept
shorter than business wanted.
Although the NSA never admitted it, most cryptography experts believed
the NSA wanted to
keep longer keys out of use, because the NSA did not have powerful
enough techniques, or
computers at the time, to crack longer keys.
The security of an encryption system depends upon a lot more than the
encryption
algorithms used. We use the RSA cipher which some consider infeasible,
but security
depends upon the user, weak passphrases (passwords) are the most common
weakness.
Using any passphrase that's ever been published is the inexperienced
users first
mistake.
Cracking PGP is extremely easy if this is done.
The NSA as well as many organizations such as ourselves use dictionary
attacks and can
also bruteforce the “key”, which is a string of letters and numbers.
Use an older version of PGP, (before the NSA interest, and suspected
algorithms of
current versions) and use at least a 2048 bit RSA Key generated by using
a completely
random passphrase (never been in any published book).
With the leap in
technology, the NSA's current Cray supercomputer,
code-named the "Black Widow", can scans millions of domestic and
international phone calls
and e-mails every hour. The Black Widow, performing hundreds of
trillions of calculations per second, searches through and reassembles
key words and patterns, across many languages.
With Barack Hussein Obama in charge of the biggest domestic and
international spying operation in history, and his stated feelings about
small-town Americans
clinging to their guns or religion, do you expect him NOT to spy on you?
Currently there is no "invulnerable" encryption" method.
Human apathy is the biggest weakness.
The CSA offers these resources for individuals to secure their e-mail in
contacting us.
A pre-NSA interested versions of PGP 6.5.8ckt can be downloaded for FREE
at:
PGPFW658Win32.zip
This version works on XP only and not on Vista
PGP in a Nutshell
pgpnut.pdf[MISSING]
PGP Installation
and Use for Dummies
pgp4dummies.pdf
Send us an
e-mail with the subject of: Recipe Request and our current "PGP public"
key"
will be e-mailed to you.
For other militias and groups, this PGP “public key" may be
used to verify our digital signature on signed messages.
ATTENTION ALL MILITIAS, PATRIOTS, AND
OTHER GROUPS:
Please e-mail us your PGP “public key" so that we may use it to verify
your digital
signature on signed messages.
We have had several
individuals recently that are unable to install PGP.
To eliminate this problem once and for all, we have asked the
Intelligence and logistics Unit to create this
step-by-step illustrated tutorial.
We will first
assume you know how to use a .zip file.
If you don't, PGP is definitly out of your league.
1. Run the setup
program.
![]()
2. Click next when you are ready.
![]()
3. Click yes and agree to the
license agreement
![]()
4. Read the product Information
if you'd like to. just click on next when you're ready.
![]()
5. As in this example, enter
your name and company.
For OPerational SECurity (OPSEC) reasons,
we suggest using your handle and militia or group name.
Then click on next.
![]()
6. Unless you have a custom PC,
we strongly suggest using the default folder.
Click on next.
![]()
7. Choose the components to
install. we suggest using the defaults.
Click on next.
![]()
8. Verify your information and
click on next.
![]()
9. Let the program install.
If prompted to import an existing keyring, don't bother if this is an
initial install.
![]()
10. Click finish to complete the
install.
![]()
11. As the program starts for
the first time, the key generation wizard will start.
Click next
![]()
12. Enter your name and e-mail
address.
For OPSEC use your handle or pseudonym as your name.
When ready click next.
![]()
13. Choose an RSA key, do not
use Diffie-Hellman/DSS
Click next.
![]()
14. Choose a 2048 bit key pair.
Click next
![]()
15. Choose key pair never
expires.
Click next.
![]()
16. Enter your passphrase.
Weak passphrases are the most common mistake.
Using any passphrase that's ever been published is the inexperienced
users first mistake.
The NSA as well as many organizations use dictionary attacks,
they have every Bible quote, Qur'an quote, and almost every book
available as a dictionary.
Use a completely random passphrase that's never been published.
Make sure you have it memorized,
you will need it repeatedly.
Click next when completed.
![]()
17. Let your key pair generate
Click next when completed.
![]()
18. Do NOT attempt to
send your key to the root server.
Click next.
![]()
19. Click Finish.
After you have generated your key pair, export your "public key" and
e-mail it to
ctsurv@yahoo.com,
You will receive an encrypted e-mail response to
your inquiry.
PLEASE NOTE:
WE CHANGE OUR PUBLIC KEY QUARTERLY,
SO A NEW KEY IS MAILED QUARTERLY IF YOU'RE ON OUR KEYRING.
(We used to change our key monthly,
but found affiliates had a hard time keeping pace with this schedule.)
DIGITAL SIGNATURE VERIFICATION
AND PUBLIC KEY FOR JANUARY - MARCH 2012

|