Keep and Bear Arms
Home Members Login/Join About Us News/Editorials Archives Take Action Your Voice Web Services Free Email
You are 1 of 170 active visitors Monday, December 22, 2014
EMAIL NEWS
Main Email List:
Subscribe
Unsubscribe

State Email Lists:
Click Here
SUPPORT KABA
Join/Renew Online
Join/Renew by Mail
Make a Donation
Magazine Subscriptions
KABA Memorial Fund
Advertise Here
Use KABA Free Email

JOIN/Renew NOW!
 
SUPPORT OUR SUPPORTERS

 

YOUR VOTE COUNTS

Keep and Bear Arms - Vote In Our Polls
Do you support or oppose the Obama Administration's plan for a U.N. Arms Trade Treaty?
Support
Oppose
Undecided

Current results
Earlier poll results
22972 people voted

 

SPONSORED LINKS

 
» U.S. Gun Laws
» AmeriPAC
» NoInternetTax
» Gun Show On The Net
» 2nd Amendment Show
» SEMPER FIrearms
» Colt Collectors Assoc.
» Personal Defense Solutions

 

 

 

News & Editorials
Search:
 
 
Encryption and the right to Freedom by Phil Wells

Encryption and the Right to Freedom

by
Phil Wells

April 11, 2003

KeepAndBearArms.com -- As this article is being written, more and more people are becoming aware of the intricate surveillance capabilities possessed and used by government agencies and the private sector to monitor the daily communication of law-abiding American Citizens. Whether it be the ease of wiretapping and email capture that was granted under the 'Patriot Act' or the data collection brought about by the Carnivore program, few people can argue the link between personal privacy and personal freedom.

While at first glance, it may appear that those who wish to deprive you and I of the dignity and liberty that is associated with being "secure in their persons, houses, papers, and effects, against unreasonable searches and seizures" have an unbeatable hand, there is no need to worry, as we as citizens still have the right to exercise our 4th Amendment rights legally and for free... through the use of encryption.

To those not very familiar with this technology, 'public key' encryption programs such as PGP, which stands for "Pretty Good Privacy", allow people to send and receive email, telephone calls and computer files in a manner that is as secure as possible in the civilian world. This technology is used by activists and aid workers around the globe to safely and freely communicate within countries where dissent is considered an offense punishable by death.

While that probably (and hopefully) isn't the case for most of us, PGP does offer many benefits that enhance your privacy and protect you from possible retribution, such as being able to express your opinions in a forum that may not welcome them (email from work), protect files from viruses or alteration, but most importantly, encryption gives you the ability to take control of your electronic personal security and privacy.

In addition to this, and in reference to the opening paragraph, PGP is useful in combating recent transgressions against our civil liberties in the form of data surveillance and eavesdropping. You see, programs such as Carnivore look for 'key words' to appear in email, but if all that goes through is 'random junk' (which is what an encrypted message looks like until the right password is entered) it will simply move on to the next person and ignore your message altogether.

On this note, it is estimated that to try to 'brute force' decrypt a PGP message would take a 1 million dollar computer something like 10000 years. This having been said, it is possible that people who might be interested in your email have already developed a way around PGP, but the key to using encryption is that the more people use it, and more often, the less likely it is for one person to be the center of attention, as it would likely be very expensive to attempt to 'break' more than a few encrypted messages at a time.

To try PGP, go to www.pgpi.org and download the latest version for your operating system. The program is free, installation is step-by-step, the manual provides an excellent introduction to encryption and the PGP program, and within maybe 20 minutes, you should have your own 'private' and 'public' keys made and be ready to send secure email communications.

Many people have said that using encryption is the virtual equivalent of gun ownership - you won't know that you needed it until it is taken away... Thank you and God bless.

Phil Wells' public key can be downloaded here: http://www.KeepAndBearArms.com/keys/PhilWells.asc 


Related Reading

Preparing for the Revolution
by
Kurt Amesbury, J.D.

Details the "Total Information Awareness" project

Details 'Patriot' II with an emphasis on privacy

About Carnivore, old, but inflammatory and I am sure, still valid information.

Print This Page
Mail To A Friend
 QUOTES TO REMEMBER
"If someone has a gun and is trying to kill you, it would be reasonable to shoot back with your own gun." The Dalai Lama, (May 15, 2001, The Seattle Times) speaking at the "Educating Heart Summit" in Portland, Oregon, when asked by a girl how to react when a shooter takes aim at a classmate

COPYRIGHT POLICY: The posting of copyrighted articles and other content, in whole or in part, is not allowed here. We have made an effort to educate our users about this policy and we are extremely serious about this. Users who are caught violating this rule will be warned and/or banned.
If you are the owner of content that you believe has been posted on this site without your permission, please contact our webmaster by following this link. Please include with your message: (1) the particulars of the infringement, including a description of the content, (2) a link to that content here and (3) information concerning where the content in question was originally posted/published. We will address your complaint as quickly as possible. Thank you.

 
NOTICE:  The information contained in this site is not to be considered as legal advice. In no way are Keep And Bear Arms .com or any of its agents responsible for the actions of our members or site visitors. Also, because this web site is a Free Speech Zone, opinions, ideas, beliefs, suggestions, practices and concepts throughout this site may or may not represent those of Keep And Bear Arms .com. All rights reserved. Articles that are original to this site may be redistributed provided they are left intact and a link to http://www.KeepAndBearArms.com is given. Click here for Contact Information for representatives of KeepAndBearArms.com.

Thawte.com is the leading provider of Public Key Infrastructure (PKI) and digital certificate solutions used by enterprises, Web sites, and consumers to conduct secure communications and transactions over the Internet and private networks.

KeepAndBearArms.com, Inc. © 1999-2014, All Rights Reserved. Privacy Policy