Thursday, August 30, 2007

How the FBI Wiretap Network Works

So have you noticed lately that there is more noise on the phone? Strange clicks and silent gaps? Maybe that file you are downloading is taking more time than it used to. Or, you are having connection problems with VOIP phones like Vonage? Having a little more of a delay in your push to talk walkie talkie feature?

If you are, it may be the Fascist Feds snooping on you. Better start using some encryption. Death to the Empire!!!


By Ryan Singel Email 08.29.07 | 2:00 AM

The FBI has quietly built a sophisticated, point-and-click surveillance system that performs instant wiretaps on almost any communications device, according to nearly a thousand pages of restricted documents newly released under the Freedom of Information Act.

The surveillance system, called DCSNet, for Digital Collection System Network, connects FBI wiretapping rooms to switches controlled by traditional land-line operators, internet-telephony providers and cellular companies. It is far more intricately woven into the nation's telecom infrastructure than observers suspected.

It's a "comprehensive wiretap system that intercepts wire-line phones, cellular phones, SMS and push-to-talk systems," says Steven Bellovin, a Columbia University computer science professor and longtime surveillance expert.

DCSNet is a suite of software that collects, sifts and stores phone numbers, phone calls and text messages. The system directly connects FBI wiretapping outposts around the country to a far-reaching private communications network.

Many of the details of the system and its full capabilities were redacted from the documents acquired by the Electronic Frontier Foundation, but they show that DCSNet includes at least three collection components, each running on Windows-based computers.

The $10 million DCS-3000 client, also known as Red Hook, handles pen-registers and trap-and-traces, a type of surveillance that collects signaling information -- primarily the numbers dialed from a telephone -- but no communications content. (Pen registers record outgoing calls; trap-and-traces record incoming calls.)

DCS-6000, known as Digital Storm, captures and collects the content of phone calls and text messages for full wiretap orders.

A third, classified system, called DCS-5000, is used for wiretaps targeting spies or terrorists.

What DCSNet Can Do

Together, the surveillance systems let FBI agents play back recordings even as they are being captured (like TiVo), create master wiretap files, send digital recordings to translators, track the rough location of targets in real time using cell-tower information, and even stream intercepts outward to mobile surveillance vans.

The rest of the story HERE

Friday, August 17, 2007

Ed & Elaine need supplies

Ed & Elaine need supplies go HERE for more information
Freedom Shenanigan #11

Use Encryption Software

For Instant Messaging:

ScatterChat is a secure instant messaging client designed for non-technical users who require secure and anonymous communications. Our typical end-users include human rights and democracy advocates operating in hostile territory. ScatterChat is also a valuable tool for anyone requiring secure communications.

It is based upon the Gaim software, provides end-to-end encryption, integrated onion-routing with Tor, secure file transfers, and easy-to-read documentation.

ScatterChat's security features include resiliency against partial compromise, immunity from replay attacks, and limited resistance to traffic analysis... all reinforced through a pro-actively secure design.

For E-mail:

Safe-mail is the most secure, easy to use communication system. It includes encrypted mail system with collaboration features and document storage functions. Always accessible at any time from anywhere!
3 Mb space is free. More space and functionality is supplied under Premium Packages. There are no advertisements, downloads or cookies. Safe-mail supports most hardware platforms and any operating system. Includes file storage, spam filters and anti virus protection. Full compatibility with most browsers, email clients and all relevant protocols including POP, SMTP, IMAP, S/MIME and PKI.

Thursday, August 16, 2007

Freedom Shenanigan #10
Breaking Sticks

There is a fairly well-known story about a father with three sons. The father is reaching a point in his life where he wants to pass on his successful business to one of his sons. In many cultures, the first-born would get the job. But the father wanted to make sure that the business that he sweated blood and tears and slaved over for years and built up into a thriving enterprise, would survive his replacement. So the father devised a simple little test for each one of his sons to take, separately, without the other two sons being present.

He wrapped a bundle of kindling with a stout string to hold the bundle together. He then presented the bound bundle to the first son and told the son to break it. No matter how hard the first son tried, he could not break the bundle. The father then gave the bundle to his second son and asked that son to do the same, break the bundle. Again, the results were the same. The second son could not break the bundle either. So finally, feeling a little disappointed with his first two sons, the father gave the bundle to the third son, and said, "break the bundle." The third son contemplated the bundle for a short while and then with great deliberation, took out a knife, cut the string and then commenced to break each kindling stick, one at a time. The third son got the job.

My father told of a similar story as young pattern-maker during World War II. Because of his skill as a pattern-maker, he was exempt from military service, but was ordered to the Bremerton Shipyards in Bremerton, Washington, to build the patterns for large valves, fittings, and propellers for war ships. He told me that when he was presented with a blueprint for his first job, it was so complex that he could not make head nor tail out of it. As he sat there with his chin resting on his two palms, he was feeling helpless and lost in an impenetrable fog. He was stumped. Just then, an old-timer walked by and saw that my father was in a serious dilemma and made a simple suggestion. He told my father to look for something in the blueprint that he recognized, and then build on that. Sure enough, a piece of the blueprint sprang out at him as something he knew, and my father went on to complete the pattern. It was a life-changing moment for him, and he passed that wisdom on to me.

So much of life presents itself as a bundle of sticks, or a complicated blueprint. If we try to take on the whole bundle of sticks, or understand the entire blueprint all at once, we find the task too daunting, get frustrated, and turn away or give up. Thus it is with our struggle to preserve, protect and defend freedom and liberty.

Rest of the story HERE

Friday, August 10, 2007

The evil we face

by Ed Lewis

There is a state of affairs that should be relatively easy to fix - except that it seems to go unnoticed except by a very few. Presumably this is as expected by those who would destroy our county with the multitude of anti-Liberty treasonous edicts and thoughts emerging from the country’s capitol.

The plan is and always has been to keep people divided and to prevent actions taken against government officials. There is much disinformation with perhaps a mix of very few facts to cause ignorance of the people’s actual and real control. Also, this serves to keep the people’s attentions elsewhere, focused on atrocities or alleged corrections of atrocities while freedom is destroyed from within.

Public education, a tool of propagandists, has lent well to the scheme, as has the fact that only the two major political parties have been granted control. The control is as false as the war against drugs, crimes, and now terrorism. It is for appearances’ sake only. Sorry, Congress and State legislators - your control isn’t real and hasn’t been for some time.

This dates back to the Civil War and the first Executive Order ever issued. A president has no law-making authority, not in peace or in war. Thus, every EO by passes legislative - and judicial - bodies.

Read the rest of this entry »

Thursday, August 09, 2007


Freedom Shenanigan #9

The Send-A-Brick Project was created by concerned citizens to send bricks to Washington encouraging our Congressmen to stand tough on border security.

Each brick sends a message to our Senators and Representatives that we want our borders secured before any other action is taken on illegal immigration.

How Do I Get Involved?

You can Either:

Send a Brick Yourself!


Have us Send a Brick for you!


Ed and Elaine Approved!


Ed and Elaine invites everyone to their home on Saturday SEPTEMBER 15, 2007 from noon till 10pm for a celebration of freedom. It will include the talents of David VonKleist playing his hit music "show me the law" with others bands to be announced. There will be food and drink along with horses shoes, bocchi ball and other games. We ask if you could bring some food items of your own. There will be a grill for cooking. Camping on the grounds will be permitted, RV and trailers are welcome. Anybody with a band thats interested in playing, please contact me through the myspace page's email. I hope to see everyone there to celebrate the awakening of the American people to the cause of freedom. updates to follow.

By Danny Riley

Tuesday, August 07, 2007

Freedom Shenanigan #8

Thanks to Kurt at for this GREAT SHENANIGAN!!!