Skip to comments.
Using email for business affairs or illicit affairs: A lesson from David Petraeus
Security Beacon ^
| 11/13/12
| Security Beacon
Posted on 11/13/2012 10:33:50 AM PST by CriticalThinking
Petraeus could probably have used better technology. Its however safe to assume if you write something in a digital realm, the Federal Government can find it if they want to find it. If you need to be discreet, feel you deserve your privacy, or otherwise want the Government and others to stay away there are some good practices to follow...
(Excerpt) Read more at securitybeacon.com ...
TOPICS:
KEYWORDS: cyberprivacy; cybersecurity; emails; petraeus
To: CriticalThinking
From what I read, they didn’t always exchange emails, but would share an email account and leave unsent emails in a ‘draft’ folder for each to read.
To: CriticalThinking
In today’s world, if you want communications to be private, whisper in her ear - and have her remove any large earrings she may be wearing first.
Anything else can come back to bite you.
3
posted on
11/13/2012 10:44:29 AM PST
by
Chuckster
(The longer I live the less I care about what you think.)
To: CriticalThinking
AshleyMadison.com adding a private, secure email service in 3.....2......1.......
To: TexasCajun
From what I read, they didnt always exchange emails, but would share an email account and leave unsent emails in a draft folder for each to read.
Don't know why anyone would think that's anything more than just barely more secure than sending an email. Unless someone goes to lengths to make sure it isn't the case, an email is just a document sitting on a server somewhere. Any logged-in interactions with it can be traced. And unless someone goes to lengths to make sure it isn't the case, a draft email is also just a document sitting on a server...
The only things you can do is encrypt an email enough that the NSA doesn't want to bother with the cpu time to crack it, or to use freakin' one time pads (which are absolutely impossible to crack). Of course, both would just draw attention to you in the first place.
I recommend the more security-conscious method of not getting into an extramarital affair in the first freakin' place, especially if you're the director of a federal agency charged with intelligence.
Terrifying that the head of the CIA was compromised in this manner. If the Russians or Chinese aren't using honey pots right now (unlikely) you can bet they're considering it after this!
5
posted on
11/13/2012 10:48:31 AM PST
by
verum ago
(Some people must truly be in love, for only love can be so blind.)
To: Chuckster
He should have followed Carlo Gambino practices. Never use a telephone or talk to more than one person at time to avoid corroboration of what was said and if you need to communicate personally have another person do it for you. Above all put nothing in writing that could be used against you.
6
posted on
11/13/2012 10:53:47 AM PST
by
Wiggins
To: Chuckster
In todays world, if you want communications to be private, whisper in her ear - and have her remove any large earrings she may be wearing first.
Anything else can come back to bite you.
Heck, in today's world, I'd only whisper in her ear if she wasn't wearing earrings at all. Even then it'd be safer if she wasn't wearing clothes (though they seemed to have gotten that part down) and had a shaved head, too.
I'm gonna have to stick with my position that the best security is to not have the affair in the first place.
7
posted on
11/13/2012 10:54:19 AM PST
by
verum ago
(Some people must truly be in love, for only love can be so blind.)
To: verum ago
“one time pads”. The U.S. numbers stations are still transmitting 24/7 around the world.
To: verum ago
—Don’t know why anyone would think that’s anything more than just barely more secure than sending an email.—
Disagree. It is a lot more protective than actually sending the email. An unsent email is just on that specific site. As soon as it’s sent it gets pinged around everywhere. Terrorists use this method (save as a draft method). It takes the chance of a keyword setting off something at NSA down. Which is better than nothing.
But I agree. The best method is to not get involved in the first place.
9
posted on
11/13/2012 10:56:50 AM PST
by
justice14
("stand up defend or lay down and die")
To: justice14
Disagree. It is a lot more protective than actually sending the email. An unsent email is just on that specific site. As soon as its sent it gets pinged around everywhere. Terrorists use this method (save as a draft method). It takes the chance of a keyword setting off something at NSA down. Which is better than nothing.
I have little doubt that the Feds, especially the NSA, can break into just about anyone's servers and go looking for their keywords. Frankly, I assume they do it on a regular basis as a matter of routine. That's why I think it's not all that much better than sending the email.
If they don't, then I guess it's significantly more secure than sending the email, but still. There have also been a number of cases recently where it turned out that ISPs and email providers have been cooperating behind the scenes anyway. And can't they still grab it when it's going back forth between the user's computer and the email server?
10
posted on
11/13/2012 11:05:24 AM PST
by
verum ago
(Some people must truly be in love, for only love can be so blind.)
To: CriticalThinking
11
posted on
11/13/2012 11:06:16 AM PST
by
E. Pluribus Unum
(Government is the religion of the psychopath.)
To: Chuckster
Non-verbal communication is the way to go.
12
posted on
11/13/2012 11:06:58 AM PST
by
Paladin2
To: CriticalThinking
Yo Echelon, check out these emails. This babe is hot to trot.
13
posted on
11/13/2012 11:06:58 AM PST
by
McGruff
(No New RINOs!)
To: Chuckster
Just deleted my meager Facebook and MySpace accounts today and unsubscribing from all e-newsletters. Going to be as invisible as I can.
To: verum ago
15
posted on
11/13/2012 11:36:07 AM PST
by
Grampa Dave
(Tagline space for rent to pay for some of my extra taxes the next 4 years!)
To: verum ago
—I have little doubt that the Feds, especially the NSA, can break into just about anyone’s servers and go looking for their keywords. Frankly, I assume they do it on a regular basis as a matter of routine. That’s why I think it’s not all that much better than sending the email.—
They can and do, but that takes action. Something they don’t like doing and is quite inneffective. They rely on information falling to them normally. This helps them pin point on which emails to hack.
Think about the amount of emails sent daily. They’d have enough trouble sorting through that, let a lone searching through draft folders.
16
posted on
11/13/2012 11:40:41 AM PST
by
justice14
("stand up defend or lay down and die")
To: CriticalThinking
The first thing my daughter discovered as a law student serving internships at law firms, is that really important and successful lawyers do not use laptops, desktops, or smart phones for anything other than personal matters.
17
posted on
11/13/2012 11:51:52 AM PST
by
blackdog
(There is no such thing as healing, only a balance between destructive and constructive forces.)
To: patriotsblood
If you want anonymous then all of your browsing should be using TOR and a TOR browser. If you want anonymous email then use a yahoo mail account with a pseudonym. Yahoo does not require a root or home email address to reference.
18
posted on
11/13/2012 12:20:37 PM PST
by
BuffaloJack
(Children, pets, and slaves get taken care of. Free Men take care of themselves.)
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson