Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

Using email for business affairs or illicit affairs: A lesson from David Petraeus
Security Beacon ^ | 11/13/12 | Security Beacon

Posted on 11/13/2012 10:33:50 AM PST by CriticalThinking

Petraeus could probably have used better technology. Its however safe to assume if you write something in a digital realm, the Federal Government can find it if they want to find it. If you need to be discreet, feel you deserve your privacy, or otherwise want the Government and others to stay away there are some good practices to follow...

(Excerpt) Read more at securitybeacon.com ...


TOPICS:
KEYWORDS: cyberprivacy; cybersecurity; emails; petraeus

1 posted on 11/13/2012 10:33:59 AM PST by CriticalThinking
[ Post Reply | Private Reply | View Replies]

To: CriticalThinking

From what I read, they didn’t always exchange emails, but would share an email account and leave unsent emails in a ‘draft’ folder for each to read.


2 posted on 11/13/2012 10:37:47 AM PST by TexasCajun
[ Post Reply | Private Reply | To 1 | View Replies]

To: CriticalThinking

In today’s world, if you want communications to be private, whisper in her ear - and have her remove any large earrings she may be wearing first.

Anything else can come back to bite you.


3 posted on 11/13/2012 10:44:29 AM PST by Chuckster (The longer I live the less I care about what you think.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: CriticalThinking

AshleyMadison.com adding a private, secure email service in 3.....2......1.......


4 posted on 11/13/2012 10:47:36 AM PST by Buckeye McFrog
[ Post Reply | Private Reply | To 1 | View Replies]

To: TexasCajun
From what I read, they didn’t always exchange emails, but would share an email account and leave unsent emails in a ‘draft’ folder for each to read.

Don't know why anyone would think that's anything more than just barely more secure than sending an email. Unless someone goes to lengths to make sure it isn't the case, an email is just a document sitting on a server somewhere. Any logged-in interactions with it can be traced. And unless someone goes to lengths to make sure it isn't the case, a draft email is also just a document sitting on a server...

The only things you can do is encrypt an email enough that the NSA doesn't want to bother with the cpu time to crack it, or to use freakin' one time pads (which are absolutely impossible to crack). Of course, both would just draw attention to you in the first place.

I recommend the more security-conscious method of not getting into an extramarital affair in the first freakin' place, especially if you're the director of a federal agency charged with intelligence.

Terrifying that the head of the CIA was compromised in this manner. If the Russians or Chinese aren't using honey pots right now (unlikely) you can bet they're considering it after this!
5 posted on 11/13/2012 10:48:31 AM PST by verum ago (Some people must truly be in love, for only love can be so blind.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Chuckster
He should have followed Carlo Gambino practices. Never use a telephone or talk to more than one person at time to avoid corroboration of what was said and if you need to communicate personally have another person do it for you. Above all put nothing in writing that could be used against you.
6 posted on 11/13/2012 10:53:47 AM PST by Wiggins
[ Post Reply | Private Reply | To 3 | View Replies]

To: Chuckster
In today’s world, if you want communications to be private, whisper in her ear - and have her remove any large earrings she may be wearing first.

Anything else can come back to bite you.


Heck, in today's world, I'd only whisper in her ear if she wasn't wearing earrings at all. Even then it'd be safer if she wasn't wearing clothes (though they seemed to have gotten that part down) and had a shaved head, too.

I'm gonna have to stick with my position that the best security is to not have the affair in the first place.
7 posted on 11/13/2012 10:54:19 AM PST by verum ago (Some people must truly be in love, for only love can be so blind.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: verum ago

“one time pads”. The U.S. numbers stations are still transmitting 24/7 around the world.


8 posted on 11/13/2012 10:55:18 AM PST by Portcall24
[ Post Reply | Private Reply | To 5 | View Replies]

To: verum ago

—Don’t know why anyone would think that’s anything more than just barely more secure than sending an email.—

Disagree. It is a lot more protective than actually sending the email. An unsent email is just on that specific site. As soon as it’s sent it gets pinged around everywhere. Terrorists use this method (save as a draft method). It takes the chance of a keyword setting off something at NSA down. Which is better than nothing.

But I agree. The best method is to not get involved in the first place.


9 posted on 11/13/2012 10:56:50 AM PST by justice14 ("stand up defend or lay down and die")
[ Post Reply | Private Reply | To 5 | View Replies]

To: justice14
Disagree. It is a lot more protective than actually sending the email. An unsent email is just on that specific site. As soon as it’s sent it gets pinged around everywhere. Terrorists use this method (save as a draft method). It takes the chance of a keyword setting off something at NSA down. Which is better than nothing.

I have little doubt that the Feds, especially the NSA, can break into just about anyone's servers and go looking for their keywords. Frankly, I assume they do it on a regular basis as a matter of routine. That's why I think it's not all that much better than sending the email.

If they don't, then I guess it's significantly more secure than sending the email, but still. There have also been a number of cases recently where it turned out that ISPs and email providers have been cooperating behind the scenes anyway. And can't they still grab it when it's going back forth between the user's computer and the email server?
10 posted on 11/13/2012 11:05:24 AM PST by verum ago (Some people must truly be in love, for only love can be so blind.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: CriticalThinking
At least with http://hushmail.com they might have had a shot at anonymity.
11 posted on 11/13/2012 11:06:16 AM PST by E. Pluribus Unum (Government is the religion of the psychopath.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Chuckster

Non-verbal communication is the way to go.


12 posted on 11/13/2012 11:06:58 AM PST by Paladin2
[ Post Reply | Private Reply | To 3 | View Replies]

To: CriticalThinking

Yo Echelon, check out these emails. This babe is hot to trot.

13 posted on 11/13/2012 11:06:58 AM PST by McGruff (No New RINOs!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Chuckster

Just deleted my meager Facebook and MySpace accounts today and unsubscribing from all e-newsletters. Going to be as invisible as I can.


14 posted on 11/13/2012 11:10:54 AM PST by patriotsblood
[ Post Reply | Private Reply | To 3 | View Replies]

To: verum ago

“Terrifying that the head of the CIA was compromised in this manner. If the Russians or Chinese aren’t using honey pots right now (unlikely) you can bet they’re considering it after this!”

Did Israel Honey Trap David Petraeus?
November 9th, 2012 | Author: Patriot

With the breaking news on General Petraeus (http://news.yahoo.com/blogs/ticket/cia-chief-petraeus-resigns-reportedly-over-affair-201305343–politics.html) you might be interested in taking a look at the Mondoweiss.net link (at the following New Statesman article) which broke the story about email exchanges with David Petraeus which US mainstream media ignored as well (as also mentioned on Press TV via http://tinyurl.com/proisraelbiasedmedia & http://www.youtube.com/watch?v=gEtASJOjDU8).

Or did the ChiComs, Ruskies, Iranian Serial Killers or al Qaeda Honey Trap Petraeus and the latest General:


15 posted on 11/13/2012 11:36:07 AM PST by Grampa Dave (Tagline space for rent to pay for some of my extra taxes the next 4 years!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: verum ago

—I have little doubt that the Feds, especially the NSA, can break into just about anyone’s servers and go looking for their keywords. Frankly, I assume they do it on a regular basis as a matter of routine. That’s why I think it’s not all that much better than sending the email.—

They can and do, but that takes action. Something they don’t like doing and is quite inneffective. They rely on information falling to them normally. This helps them pin point on which emails to hack.

Think about the amount of emails sent daily. They’d have enough trouble sorting through that, let a lone searching through draft folders.


16 posted on 11/13/2012 11:40:41 AM PST by justice14 ("stand up defend or lay down and die")
[ Post Reply | Private Reply | To 10 | View Replies]

To: CriticalThinking

The first thing my daughter discovered as a law student serving internships at law firms, is that really important and successful lawyers do not use laptops, desktops, or smart phones for anything other than personal matters.


17 posted on 11/13/2012 11:51:52 AM PST by blackdog (There is no such thing as healing, only a balance between destructive and constructive forces.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: patriotsblood

If you want anonymous then all of your browsing should be using TOR and a TOR browser. If you want anonymous email then use a yahoo mail account with a pseudonym. Yahoo does not require a root or home email address to reference.


18 posted on 11/13/2012 12:20:37 PM PST by BuffaloJack (Children, pets, and slaves get taken care of. Free Men take care of themselves.)
[ Post Reply | Private Reply | To 14 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson