Re: [liberationtech] NSA flag terms

2013-06-18 Thread Michael Azarkevich
I find it hard to believe the list is authentic. It has words like "Java",
"Quiche" and "Redheads" for gods sake. Also, they misspelled the name of
the Israeli equivalent of the Navy SEALS (They wrote "Shayet-13" instead of
"Shayetet-13").

The NSA aren't stupid, they're running the biggest spying operation in the
world. I know size doesn't imply competency but I'm inclined to believe
they know what they're doing.
The list is, in all probability, fake.


On Tue, Jun 18, 2013 at 8:09 PM, Owen Barton  wrote:

> Hi everyone (first post),
>
> I am pretty sure most of that list has been around since the late 90s at
> least - I remember many of them from "Jam Echelon Day" in 1999.
>
> Incidentally, if anyone is interested in a little Jam Echelon Day history
> you can read the hactivism e-mail list (which the JED idea emerged from,
> and which I happened to start/moderate) archives at
> http://archives.openflows.org/hacktivism/index.html and also
> a dissertation someone wrote on early hacktivism
> http://www.alexandrasamuel.com/dissertation/pdfs/Samuel-Hacktivism-entire.pdf.
> I think it's pretty clearly the NSA derives more intelligence from graphing
> connections/relationships than grepping for keywords, so I think JED was
> more conceptual than practical (and quite disorganized, of course).
>
> Thanks!
> - Owen
>
>
> On Tue, Jun 18, 2013 at 8:27 AM, Ryan Gallagher wrote:
>
>> FYI, this keyword list is at least about 12/13 years old. See:
>> http://www.theregister.co.uk/2001/05/31/what_are_those_words/
>>
>>
>> On 18 June 2013 15:59, Yosem Companys  wrote:
>>
>>> From: Khannea Suntzu 
>>>
>>> This is an (admittedly huge) list of words that supposedly cause the
>>> NSA to flag you as a potential terrorist if you over-use them in an
>>> email.
>>>
>>> We found this on Reddit, where James Bamford, a veteran reporter with
>>> 30 years experience covering the NSA, is answering questions from the
>>> community. This list comes from Reddit user GloriousDawn, who found it
>>> on Attrition.org, a site that very closely follows the security
>>> industry.
>>>
>>> You may want to peruse this entire list yourself, but here are some of
>>> our favourites that stick out:
>>>
>>> · dictionary
>>>
>>> · sweeping
>>>
>>> · ionosphere
>>>
>>> · military intelligence
>>>
>>> · Steve Case
>>>
>>> · Scully
>>>
>>> And the full list for your browsing pleasure:
>>>
>>> Waihopai, INFOSEC, Information Security, Information Warfare, IW, IS,
>>> Privacy, Information Terrorism, Terrorism Defensive Information,
>>> defence Information Warfare, Offensive Information, Offensive
>>> Information Warfare, National Information Infrastructure, InfoSec,
>>> Reno, Compsec, Computer Terrorism, Firewalls, Secure Internet
>>> Connections, ISS, Passwords, DefCon V, Hackers, Encryption, Espionage,
>>> USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon,
>>> Military, White House, Undercover, NCCS, Mayfly, PGP, PEM, RSA,
>>> Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2,
>>> BITNET, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, JICC,
>>> ReMOB, LEETAC, UTU, VNET, BRLO, BZ, CANSLO, CBNRC, CIDA, JAVA, Active
>>> X, Compsec 97, LLC, DERA, Mavricks, Meta-hackers, ^?, Steve Case,
>>> Tools, Telex, Military Intelligence, Scully, Flame, Infowar, Bubba,
>>> Freeh, Archives, Sundevil, jack, Investigation, ISACA, NCSA, spook
>>> words, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT,
>>> SCIF, FLiR, Lacrosse, Flashbangs, HRT, DIA, USCOI, CID, BOP, FINCEN,
>>> FLETC, NIJ, ACC, AFSPC, BMDO, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA,
>>> AHPCRC, ARPA, LABLINK, USACIL, USCG, NRC, ~, CDC, DOE, FMS, HPCC,
>>> NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, SGC, UNCPCJ, CFC, DREO,
>>> CDA, DRA, SHAPE, SACLANT, BECCA, DCJFTF, HALO, HAHO, FKS, 868, GCHQ,
>>> DITSA, SORT, AMEMB, NSG, HIC, EDI, SAS, SBS, UDT, GOE, DOE, GEO,
>>> Masuda, Forte, AT, GIGN, Exon Shell, CQB, CONUS, CTU, RCMP, GRU, SASR,
>>> GSG-9, 22nd SAS, GEOS, EADA, BBE, STEP, Echelon, Dictionary, MD2, MD4,
>>> MDA, MYK, 747,777, 767, MI5, 737, MI6, 757, Kh-11, Shayet-13, SADMS,
>>> Spetznaz, Recce, 707, CIO, NOCS, Halcon, Duress, RAID, Psyops, grom,
>>> D-11, SERT, VIP, ARC, S.E.T. Team, MP5k, DREC, DEVGRP, DF, DSD, FDM,
>>> GRU, LRTS, SIGDEV, NACSI, PSAC, PTT, RFI, SIGDASYS, TDM. SUKLO, SUSLO,
>>> TELINT, TEXTA. ELF, LF, MF, VHF, UHF, SHF, SASP, WANK, Colonel,
>>> domestic disruption, smuggle, 15kg, nitrate, Pretoria, M-14, enigma,
>>> Bletchley Park, Clandestine, nkvd, argus, afsatcom, CQB, NVD, Counter
>>> Terrorism Security, Rapid Reaction, Corporate Security, Police,
>>> sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, High Security,
>>> Security Evaluation, Electronic Surveillance, MI-17, Counterterrorism,
>>> spies, eavesdropping, debugging, interception, COCOT, rhost, rhosts,
>>> SETA, Amherst, Broadside, Capricorn, Gamma, Gorizont, Guppy,
>>> Ionosphere, Mole, Keyhole, Kilderkin, Artichoke, Badger, Cor

liberationtech@lists.stanford.edu

2013-06-18 Thread Michael Azarkevich
Why settle for "strong enough"? Use the strongest options you have at your
disposal.


On Tue, Jun 18, 2013 at 9:02 AM, Helder Ribeiro  wrote:

> On Mon, Jun 17, 2013 at 5:23 PM, Richard Brooks  wrote:
> >
> > From Guardian Q&A with Snowden
> >
> >
> http://www.guardian.co.uk/world/2013/jun/17/edward-snowden-nsa-files-whistleblower
> >
> > Is encrypting my email any good at defeating the NSA survelielance? Id
> > my data protected by standard encryption?
> >
> > Answer:
> >
> > Encryption works. Properly implemented strong crypto systems are one
> > of the few things that you can rely on. Unfortunately, endpoint security
> > is so terrifically weak that NSA can frequently find ways around it.
>
> How strong is strong enough?
>
> > --
> > Too many emails? Unsubscribe, change to digest, or change password by
> emailing moderator at compa...@stanford.edu or changing your settings at
> https://mailman.stanford.edu/mailman/listinfo/liberationtech
> --
> Too many emails? Unsubscribe, change to digest, or change password by
> emailing moderator at compa...@stanford.edu or changing your settings at
> https://mailman.stanford.edu/mailman/listinfo/liberationtech
>
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech