The CSA                                     

The Connecticut Survivalist Alliance

Because the whole damn world is going to Hell in a handbasket!




The CSA Homepage 

The CSA - Who Are We?

The CSA MySpace Blog

The CSA MySpace Page

The CSA Blog

The CSA Back-up Blog

The CSA Public SMS Network

CSAnet Online Network 

CSA New England Weather

CSA National Weather

Connecticut Survival Info

CSA Radio Standards

CSA Intelligence Unit

CSA PGP Tutorial

CSA Protection Condition

Islamic Infiltration in New England

CSA Google Discussion Group






 

CSA Group History 

CSA Radio Channel

CSA's Response to the ADL

 Our response to the ADL's Extremism in Connecticut Report

CSA's Response to Wesleyan
 Our response to Josh Nathan-Kazis

The CSA Dar al-Harb
(House of War)

The CSA Office Machines
(Member Desktops)

Girls of the Militia 

Girls of La Raza

Islamic Girls Gone WILD!

Stinger Sniper
Work on your hand/eye coordination

Tactical Assassin 2
Work on your hand/eye coordination

Sniper Assassin II
Work on your hand/eye coordination

Save the Witness
Work on your hand/eye coordination

CSA Online Store
 Get your Official CSA Merchandise


 




 



How Insecure is Internet E-mail?

It is very important for all Internet Patriot, Militia and Survivalist members to understand that
regular e-mail is absolutely insecure. Without encryption, the entire Internet e-mail
system is like a worldwide bulletin board. Almost any e-mail can be read by many people
other than who it is sent to.


Regular Internet e-mail is notoriously insecure and offers no privacy.
Typical e-mail travels through lots of Internet computers.
The administrators of these computers can read, copy and store any relayed e-mail.
Some big governments and organizations routinely intercept e-mail
and scan it for interesting words or phrases.
An example of this would be the Federal Bureau of Investigation's (FBI)
Carnivore software implementation.
The Carnivore system is a Microsoft Windows-based workstation with
packet-sniffing software placed at Internet Service Providers (ISP’s).


The likes of the Federal Bureau of Investigation (FBI), Department of Defense (DoD),
the Department of Homeland Security (DHS), and the National Security Agency (NSA) are monitoring Internet traffic 24 hours a day.
People who value privacy should feel uncomfortable and do something to protect themselves.

PGP is such a great tool for this purpose.


Why should PGP be used?

For the uninitiated, PGP stands for Pretty Good Privacy. It is a very good encryption
program for files and e-mail. It uses something called "public key" cryptography where
your encryption key is split into a "public" key and a "private" key. You keep the
private key and pass out the “public key” to whomever you wish to have secure
communications with.

We expect all Patriots, Survivalists, and Militia members
who value their privacy and wish to stay in the loop will download it and learn how to use it.

Anyone who can intercept your e-mail can alter your e-mail's content. Even worse, anyone
can send e-mail that looks as if it was sent by you. With PGP, you can digitally sign
your e-mail. When your e-mail and signature is received, PGP can be used to verify that
the message is unaltered, and from you.

This program is our default security standard for alerts and e-mail contact with the
public at large.

Why don't you always send your paper mail on postcards without using envelopes?

Sending your mail through computers is even less confidential than sending the same
material on a postcard. PGP provides secure envelopes that protect your privacy.

E-mail messages are too easy to intercept and scan. This can be done easily, routinely,
automatically, and undetectably on a grand scale. PGP empowers people to take their
privacy into their own hands.

Your first step in contacting the Connecticut Survivalist Alliance (CSA) should be to
e-mail us your Public PGP key.
Our RSA Public PGP key is available below.

During the 1990s, the NSA was frequently in court trying to keep PGP off the market.
In the 1980s, the NSA was trying to get the key length of commercial ciphers kept
shorter than business wanted.

Although the NSA never admitted it, most cryptography experts believed the NSA wanted to
keep longer keys out of use, because the NSA did not have powerful enough techniques, or
computers at the time, to crack longer keys.

The security of an encryption system depends upon a lot more than the encryption
algorithms used. We use the RSA cipher which some consider infeasible, but security
depends upon the user, weak passphrases (passwords) are the most common weakness.

Using any passphrase that's ever been published is the inexperienced users first mistake.

Cracking PGP is extremely easy if this is done.

The NSA as well as many organizations such as ourselves use dictionary attacks and can
also bruteforce the “key”, which is a string of letters and numbers.

Use an older version of PGP, (before the NSA interest, and suspected algorithms of
current versions) and use at least a 2048 bit RSA Key generated by using a completely
random passphrase (never been in any published book).

With the leap in technology,  the NSA's current Cray supercomputer,
code-named the "Black Widow", can scans millions of domestic and international phone calls
and e-mails every hour.  The Black Widow, performing hundreds of trillions of calculations per second, searches through and reassembles key words and patterns, across many languages.

With Barack Hussein Obama in charge of the biggest domestic and international spying operation in history, and his stated feelings about small-town Americans
clinging to their guns or religion, do you expect him NOT to spy on you?


Currently there is no "invulnerable" encryption" method.
Human apathy is the biggest weakness.

The CSA offers these resources for individuals to secure their e-mail in contacting us.

A pre-NSA interested versions of PGP 6.5.8ckt can be downloaded for FREE at:

PGPFW658Win32.zip
This version works on XP only and not on Vista

PGP in a Nutshell

pgpnut.pdf[MISSING]

PGP Installation and Use for Dummies

pgp4dummies.pdf

Send us an e-mail with the subject of: Recipe Request and our current "PGP public" key"
will be e-mailed to you.
For other militias and groups, this PGP “public key" may be
used to verify our digital signature on signed messages.

ATTENTION ALL MILITIAS, PATRIOTS, AND OTHER GROUPS:

Please e-mail us your PGP “public key" so that we may use it to verify your digital
signature on signed messages.

We have had several individuals recently that are unable to install PGP.
To eliminate this problem once and for all, we have asked the Intelligence and logistics Unit  to create this
step-by-step illustrated tutorial.

We will first assume you know how to use a .zip file.
If you don't, PGP is definitly out of your league.

1. Run the setup program.



2. Click next when you are ready.

3. Click yes and agree to the license agreement

4. Read the product Information if you'd like to. just click on next when you're ready.

5. As in this example, enter your name and company.
For OPerational SECurity (OPSEC) reasons,
we suggest using your handle and militia or group name.
Then click on next.

6. Unless you have a custom PC, we strongly suggest using the default folder.
Click on next.

7. Choose the components to install. we suggest using the defaults.
Click on next.

8. Verify your information and click on next.

9. Let the program install.
If prompted to import an existing keyring, don't bother if this is an initial install.

10. Click finish to complete the install.

11. As the program starts for the first time, the key generation wizard will start.
Click next

12. Enter your name and e-mail address.
For OPSEC use your handle or pseudonym as your name.
When ready click next.

13. Choose an RSA key, do not use Diffie-Hellman/DSS
Click next.

14. Choose a 2048 bit key pair.
Click next

15. Choose key pair never expires.
Click next.

16. Enter your passphrase.
Weak passphrases are the most common mistake.
Using any passphrase that's ever been published is the inexperienced users first mistake.
The NSA as well as many organizations use dictionary attacks,
they have every Bible quote, Qur'an quote, and almost every book available as a dictionary.

Use a completely random  passphrase that's never been published.

Make sure you have it memorized, you will need it repeatedly.
Click next when completed.

17. Let your key pair generate
Click next when completed.

18. Do NOT attempt to send your key to the root server.
Click next.

19. Click Finish.


After you have generated your key pair, export your "public key" and e-mail it to
ctsurv@yahoo.com,
You will receive an encrypted e-mail response to your inquiry.


PLEASE NOTE:

WE CHANGE OUR PUBLIC KEY QUARTERLY,
SO A NEW KEY IS MAILED QUARTERLY IF YOU'RE ON OUR KEYRING.
(We used to change our key monthly,
but found affiliates had a hard time keeping pace with this schedule.)

DIGITAL SIGNATURE VERIFICATION
AND PUBLIC KEY FOR JANUARY - MARCH 2012


All You Ever Wanted to Know about Microsoft Windows XP WinXP

United Disaster Survival and Defense Alliance


 

 

 

 

Support the CSA!

The CSA does not ask individuals for money out of their pockets,
but we do ask you for your support in our efforts.
Register here and make $6.00 and by supporting us we make $1.25

Use a Fake Name if you have privacy issues.

Thanks to your generous support,
we are able to add new features to the system.
Keep up the support!

Register on every IP you can!

Homeland Security Advisory

 

 

 

 

 

"If the freedom of speech is taken away then dumb and silent we may be led, like sheep to the slaughter."
- George Washington

 

 

Islamic Girls Gone Wild!

 

Meet "Lonely Jihadist Wives"
HERE!

 

 

 

 

 

 

 

 

 

 

 


 


Like Hacker Chicks?
WE DO!

 

 


Never Again Novels

 

WANT YOUR AD HERE? CONTACT US
NO CHARGES!











 

Press Contact

CSA Survival Interest Links

CSA Nationwide Militia Links

Contact CSA Online

Membership

 

SHOUTBOX

follow ctsurvivalist at http://twitter.com


 

Web Site Inquiries Should be Made to:  ctsurv/CSA

HTML Presentation by CTsurvivalist/ICSA
Copyright © 2001-2009  All rights reserved.