If you can read this, either the style sheet didn't load or you have an older browser that doesn't support style sheets. Try clearing your browser cache and refreshing the page.

(WorldNetDaily)   Worried about the NSA recording your phone calls? Then just switch to secure communications like CB radios and the unbreakable encryption of Morse code   (wnd.com) divider line 115
    More: Satire, NSA, communications security, phone calls, two-way radio, encryption, reference range  
•       •       •

1048 clicks; posted to Politics » on 12 Jun 2013 at 1:00 PM (1 year ago)   |  Favorite    |   share:  Share on Twitter share via Email Share on Facebook   more»



115 Comments   (+0 »)
   
View Voting Results: Smartest and Funniest

Archived thread

First | « | 1 | 2 | 3 | » | Last | Show all
 
2013-06-12 11:20:24 AM
The left out Semaphore, Signal Lamps, Maritime Signal Flag, Carrier Pigeon and Smoke Signal.
 
2013-06-12 11:29:09 AM
"Creek?"

Sounds like one of the liberal hippie names.  For shame, WND.  For shame.
 
2013-06-12 11:29:21 AM
And if they send up a bear in the air, just put the hammer down and tear up your swindle sheets. Your Cab-over Pete will be in Shakeytown before they can locate your 20.
 
2013-06-12 11:35:15 AM
Everyone should just figure out what key words the Government is scanning for and put copy/pasta all the words at the bottom of each and every E-mail they send.  Basically they would have to admit the filter is no longer working at what they are actually doing is targeting people for data mining.
 
2013-06-12 11:58:46 AM
I don't think this is satire.
 
2013-06-12 12:08:12 PM
Actually, the article is mainly about communications in a disaster, and it's actually pretty solid advice, though it essentially ignores the option of ham radio.

Having said that, subby's headline isn't really that far off the track.  Please excuse the wall of text here, but this is part of an essay I've been working on for a while that touches on this very subject, and it's actually quite timely:

Much of what we use modern computerized communications for is relatively short range communications, and can be handled in a more secure manner by short range radios.   While typical short range radios like Family Radio Service (FRS) radios are actually more vulnerable to casual eavesdropping, they are ironically more secure against systematic monitoring than a cellphone.  When you carry a cellphone, it has to regularly communicate with the local cellular sites in order to maintain communication.  This data is logged by the cell service providers, and it can be later used to reconstruct your movements if they know your cell phone number.  In addition, any calls or texts that you send or receive are also logged.  Even if they aren't actively recording what you are saying, there is a record that you said *SOMETHING* at such-and-such a date and time, and such-and-such a location.  If you carry and use one long enough, a profile can be built of where you go (and by inference, what you are doing), and who you talked to, when, and for how long.

    A radio, on the other hand, doesn't give away any information until it transmits.  A radio in receive mode doesn't regularly transmit its location like a cellphone does, and when it does transmit, it doesn't automatically leave traces on a computer somewhere.  Someone interested in where you are can use direction finding (or DF for short) to see where you are, but it's not as precise a location as the cell providers can get, and it requires the use of specialized equipment that is within range.   Another advantage of using radios is that you can't tell a specific radio talked to another specific radio without very highly specialized monitoring equipment.  Even then, it's not as detailed as 555-1212 at location X called 555-1213 at location Y on 2011/11/15 at 14:37 EST, and the call lasted 5 minutes and 13 seconds.

    Of course, anyone with the proper receiver, and within range, can hear the conversation between two radios.  Knowing this, we can communicate in ways that minimize the danger that someone will be able to identify the communications and identify us as the source of the communications.


[I've snipped the part about setting up callsigns and authentication (both formal and informal) here.  Anyone familiar with military radio procedures would know what to do]

For longer range uses, you will obviously need something better than a short range radio.  You can use longer range radios, with the understanding that it increases the range that you can be monitored.  This requires that you keep transmissions as short as possible.  Modern equipment can generate a Direction Finding (DF) bearing pretty much instantly, so short transmissions are little help here, but if you keep them short they might go unnoticed, and a transmission that isn't detected immediately can't be DF'ed.

After that, I go on to talk about manual encryption methods like the strip cipher and manual one time pads, which I'm sure you're all sick of me touting by now.

The main thrust of the essay, though, is that the irony of modern communications technology is that it is actually less secure from governmental monitoring than more "primitive" methods of communicating.

That's why Osama bin Laden stopped using phones, relying on a 'sneakernet' to communicate.
 
2013-06-12 12:11:10 PM

mrshowrules: Everyone should just figure out what key words the Government is scanning for and put copy/pasta all the words at the bottom of each and every E-mail they send.  Basically they would have to admit the filter is no longer working at what they are actually doing is targeting people for data mining.


Nah, all they'd have to do is filter out those e-mails that contain every key word, especially if it's a copy-pasta thing where it's identical.

No brainer.
 
2013-06-12 12:13:16 PM

dittybopper: mrshowrules: Everyone should just figure out what key words the Government is scanning for and put copy/pasta all the words at the bottom of each and every E-mail they send.  Basically they would have to admit the filter is no longer working at what they are actually doing is targeting people for data mining.

Nah, all they'd have to do is filter out those e-mails that contain every key word, especially if it's a copy-pasta thing where it's identical.

No brainer.


That's even better, because they would all get filtered out / not in.
 
2013-06-12 12:14:29 PM
3.bp.blogspot.com

HA!  Suck it, Feds!
 
2013-06-12 12:22:09 PM

mrshowrules: dittybopper: mrshowrules: Everyone should just figure out what key words the Government is scanning for and put copy/pasta all the words at the bottom of each and every E-mail they send.  Basically they would have to admit the filter is no longer working at what they are actually doing is targeting people for data mining.

Nah, all they'd have to do is filter out those e-mails that contain every key word, especially if it's a copy-pasta thing where it's identical.

No brainer.

That's even better, because they would all get filtered out / not in.


Well, no.

The filters they would use would look at the context of the usage of those words.  It would be much more sophisticated than the primitive Y2K era spam-filtering you're thinking of.
 
2013-06-12 12:26:05 PM

dittybopper: mrshowrules: dittybopper: mrshowrules: Everyone should just figure out what key words the Government is scanning for and put copy/pasta all the words at the bottom of each and every E-mail they send.  Basically they would have to admit the filter is no longer working at what they are actually doing is targeting people for data mining.

Nah, all they'd have to do is filter out those e-mails that contain every key word, especially if it's a copy-pasta thing where it's identical.

No brainer.

That's even better, because they would all get filtered out / not in.

Well, no.

The filters they would use would look at the context of the usage of those words.  It would be much more sophisticated than the primitive Y2K era spam-filtering you're thinking of.


That goes back to my original point.  The fancier they make the filter, the more they have to admit, their application is actually reading/interpreting the content.  Right now, they tell Congress, we look for key words like "bomb", "Jihad", "timer", whatever.  Let them tell Congress that their filters are actually reading the E-mails effectively.
 
2013-06-12 12:39:51 PM

mrshowrules: Everyone should just figure out what key words the Government is scanning for and put copy/pasta all the words at the bottom of each and every E-mail they send.  Basically they would have to admit the filter is no longer working at what they are actually doing is targeting people for data mining.


This is relevant to your interest.
 
2013-06-12 12:52:01 PM
If you want to completely avoid being technologically spied on by the government, my best advice is to abandon all technology. Which is practically impossible in this day and age.

Encryption is great, you can have practically unbreakable encryption - but if your computer is hackable, any time something appears on the screen it could be scraped. Phone calls can be encrypted but not their metadata. Every cash withdrawal is traceable.

Anyway...point is, no one should really be worried unless they are doing something illegal. But they should still be worried that the government has those capabilities because of the power it would give a corrupt government.
 
2013-06-12 12:53:09 PM
Monitor this digital communication...
oi46.tinypic.com
Durka, Durka JIHAD!
 
2013-06-12 01:01:55 PM
encrypted-tbn2.gstatic.com
 
2013-06-12 01:05:00 PM
i.dailymail.co.uk
 
2013-06-12 01:08:07 PM
www.clker.com
 
2013-06-12 01:08:08 PM
If you've ever listened to the anti-government nut jobs on ham radio, this isn't bad advice.
 
2013-06-12 01:08:21 PM
Nut bound and down, loaded up and truckin.
We gonna do what they said can't be done.
We got a lot of conspiracy theories and a short time to tell them.
I'm nut bound, just watch Joe Farah run.
 
2013-06-12 01:09:15 PM
State of the art


www.migrationheritage.nsw.gov.au
 
2013-06-12 01:10:26 PM

vernonFL: [encrypted-tbn2.gstatic.com image 253x199]


That looks like "durka durka durka" from the the 1700/1800s.  And we all know what happened to most of them when the NSA Cavalry decoded those ancient texts.
 
2013-06-12 01:11:13 PM
connectme.typepad.com


"Militia meeting.....Over"
 
2013-06-12 01:13:19 PM
Nice use of the [Satire] tag, submitter.
 
2013-06-12 01:13:20 PM
upload.wikimedia.org
 
2013-06-12 01:13:53 PM
FrancoFile:

Ah, breaker one-nine, this here's the Rubber Duck. You ready for some second amendment solutions, Big Ben, c'mon?
 
2013-06-12 01:15:41 PM
Get off the grid.
 
2013-06-12 01:17:41 PM

bdub77: If you want to completely avoid being technologically spied on by the government, my best advice is to abandon all technology.


upload.wikimedia.org

Approves.
 
2013-06-12 01:20:13 PM

Pants full of macaroni!!: bdub77: If you want to completely avoid being technologically spied on by the government, my best advice is to abandon all technology.

[upload.wikimedia.org image 555x414]

Approves.


Crossed paths with that guy once. Didn't even know who he was, but making eye contact chilled the hell out of me

/csb
 
2013-06-12 01:21:28 PM

Ennuipoet: mrshowrules: Everyone should just figure out what key words the Government is scanning for and put copy/pasta all the words at the bottom of each and every E-mail they send.  Basically they would have to admit the filter is no longer working at what they are actually doing is targeting people for data mining.

This is relevant to your interest.


Cool but I also have a simple way to randomize it.  Go to the Bing translater online.  Copy/paste.  Convert it to any language, and convert back to English.  That would introduce just enough variation to keep the E-mail unique enough.
 
2013-06-12 01:23:39 PM
The World Nutjob Daily does satire?  Or is indistinguishable from satire?
 
2013-06-12 01:24:44 PM

sigdiamond2000: And if they send up a bear in the air, just put the hammer down and tear up your swindle sheets. Your Cab-over Pete will be in Shakeytown before they can locate your 20.


memecrunch.com
 
2013-06-12 01:24:46 PM

dittybopper: mrshowrules: Everyone should just figure out what key words the Government is scanning for and put copy/pasta all the words at the bottom of each and every E-mail they send.  Basically they would have to admit the filter is no longer working at what they are actually doing is targeting people for data mining.

Nah, all they'd have to do is filter out those e-mails that contain every key word, especially if it's a copy-pasta thing where it's identical.

No brainer.


So you are saying it could work analogously to when in that movie  Arnold Schwartzenegger covered himself in mud, and the Predator's  iR vision couldn't see him anymore.

Awesome
 
2013-06-12 01:26:36 PM
It's 11:59 on Radio Free America; this is Uncle Sam, with music, and the truth until dawn. Right now I've got a few words for some of our brothers and sisters in the occupied zone: "the chair is against the wall, the chair is against the wall", "john has a long mustache, john has a long mustache". It's twelve o'clock, American, another day closer to victory. And for all of you out there, on, or behind the line, this is your song.
 
2013-06-12 01:28:17 PM
o.onionstatic.com
That's just what History's Greatest Monster wants you to do!
 
2013-06-12 01:28:47 PM
Better yet, go way back and start sending smoke clouds.


Those things were encrypted from what I hear.
 
2013-06-12 01:29:40 PM

Jake Havechek: It's 11:59 on Radio Free America; this is Uncle Sam, with music, and the truth until dawn. Right now I've got a few words for some of our brothers and sisters in the occupied zone: "the chair is against the wall, the chair is against the wall", "john has a long mustache, john has a long mustache". It's twelve o'clock, American, another day closer to victory. And for all of you out there, on, or behind the line, this is your song.


"The cheese stands alone." I repeat: "The cheese stands alone".
 
2013-06-12 01:30:36 PM
Nice use of the satire tag, subby.
 
2013-06-12 01:30:50 PM

dittybopper: Actually, the article is mainly about communications in a disaster, and it's actually pretty solid advice, though it essentially ignores the option of ham radio.

Having said that, subby's headline isn't really that far off the track.  Please excuse the wall of text here, but this is part of an essay I've been working on for a while that touches on this very subject, and it's actually quite timely:

Much of what we use modern computerized communications for is relatively short range communications, and can be handled in a more secure manner by short range radios.   While typical short range radios like Family Radio Service (FRS) radios are actually more vulnerable to casual eavesdropping, they are ironically more secure against systematic monitoring than a cellphone.  When you carry a cellphone, it has to regularly communicate with the local cellular sites in order to maintain communication.  This data is logged by the cell service providers, and it can be later used to reconstruct your movements if they know your cell phone number.  In addition, any calls or texts that you send or receive are also logged.  Even if they aren't actively recording what you are saying, there is a record that you said *SOMETHING* at such-and-such a date and time, and such-and-such a location.  If you carry and use one long enough, a profile can be built of where you go (and by inference, what you are doing), and who you talked to, when, and for how long.

    A radio, on the other hand, doesn't give away any information until it transmits.  A radio in receive mode doesn't regularly transmit its location like a cellphone does, and when it does transmit, it doesn't automatically leave traces on a computer somewhere.  Someone interested in where you are can use direction finding (or DF for short) to see where you are, but it's not as precise a location as the cell providers can get, and it requires the use of specialized equipment that is within range.   Another advantage of using radios i ...


Spending a lot of time planning your insurrection these days?
 
2013-06-12 01:38:25 PM
Jake Havechek: WOLVERINES!!!
 
2013-06-12 01:39:34 PM
What we should do is for everyone to agree to start every conversation by saying "allah, jihad, bomb" instead of "hello" and end every convo with "amonium nitrate, death to america" instead of goodbye and like replace the word "like" with "pressure cooker". Good luck sifting through every single phone call ever made in America, NSA.
 
2013-06-12 01:42:42 PM
I don't worry. I use ravens for my messages.
 
2013-06-12 01:43:05 PM
1.bp.blogspot.com
 
2013-06-12 01:45:14 PM
Here you go.
http://youtu.be/91_jymgH8QY
 
2013-06-12 01:48:37 PM
S m   m s a e   a e   a d r   o   u o c n   h n   t e s
 o e   e s g s   r   h r e   t   a t s a   t a   o h r
 
2013-06-12 01:51:11 PM
vinnieh.files.wordpress.com
Now, how many hard surfaces can you spot in this room?
 
2013-06-12 01:55:04 PM

vernonFL: [i.dailymail.co.uk image 634x424]


Always harping on about 9/11
 
2013-06-12 01:55:18 PM
.--. .- ... ... .-- --- .-. -..
 
2013-06-12 01:56:57 PM

DarnoKonrad: FrancoFile:

Ah, breaker one-nine, this here's the Rubber Duck. You ready for some second amendment solutions, Big Ben, c'mon?


FYI:
Trucker slang for a semi pulling a livestock trailer hauling swine is "pig pen." In the song you referenced, the term was used when the protagonist was talking to the "Jimmy hauling hogs." In your defense,"Big Ben" is a commonly misheard lyric.

themoreyouknow.jpg

/misses trucking
 
2013-06-12 02:00:01 PM

Philip Francis Queeg: Spending a lot of time planning your insurrection these days?


What insurrection?  Is there something you know about that you aren't telling me?

Seriously, though, given my background in this subject, why wouldn't I have thought of it?  Don't you do little mental exercises and gedankenexperiments on occasion?
 
2013-06-12 02:04:40 PM
www.wired.com

/go ahead....I dare ya
 
Displayed 50 of 115 comments

First | « | 1 | 2 | 3 | » | Last | Show all

View Voting Results: Smartest and Funniest


This thread is archived, and closed to new comments.

Continue Farking
Submit a Link »






Report