(I began publishing my monthly newsletter The Bob Livingston Letter™ in 1969. The following is an excerpt from the September 1999 issue. Spying by the National Security Agency came into the public conscience when Edward Snowden exposed the breadth and depth of it with his revelations in 2013, just before he skirted to Russia to avoid prosecution. But my readers were warned about it 12½ years before Snowden came on the scene. We even offered advice on how to [at the time] defeat it with a follow-up article from asset protection expert Mark Nestmann.)
The U.S. National Security Agency can scan and record every long-distance phone call, fax and email sent or received in the United States. In addition, all commercial financial transactions conducted through commercial financial institutions are recorded and open to scrutiny by the Feds.
Avoid Intel’s Pentium III chip that identifies you when you are online.
The Sovereign Society, Waterford Ireland
“The reality of global surveillance must be taken into account by anyone seeking privacy or asset protection, civil libertarians, and by any company developing high-technology products. But despite the high volume of communications signals relayed by satellite and microwave, a great many communications — both local and domestic long distance — can’t be intercepted without a direct wiretap. And, adds Canadian ex-spook Mike Frost, there’s a problem sorting and reading all the data. While ECHELON can potentially intercept millions of communications, there aren’t enough analysts to sort through everything.
“In addition, you can employ simple strategies that can frustrate the operations of this network —
“Use Voice Communication. The technical capabilities to listen in to voice communications are far less advanced than those available to tap data. Frost describes NSA computers that can ‘listen’ to telephone calls and recognize keywords. However, voice recognition computers that can listen in to a large volume of telephone calls simultaneously don’t appear to yet be available, he says. For the moment, telephone calls are more secure from ECHELON monitoring than email, fax or other computer-generated communication.
“Use Encryption. The easiest targets for ECHELON are unencrypted data streams. Merely taking the precaution of using off-the-shelf software such as PGP to secure email makes it virtually impervious to being read. It remains extremely important, however, to guard your private key(s) and passphrase(s), as discussed in my special report Practical Privacy Strategies for Windows 95 — available for free downloading at [unviable link removed].” — Mark Nestmann
The post The U.S. National Security Agency appeared first on Personal Liberty®.
![]()
from PropagandaGuard https://propagandaguard.wordpress.com/2015/09/03/the-u-s-national-security-agency/
from WordPress https://toddmsiebert.wordpress.com/2015/09/02/the-u-s-national-security-agency/
No comments:
Post a Comment