INTERNET EMAIL DOCUMENT SECURITY & PRIVACY RESOURCES AN AMP-3 PREPAREDNESS PRIMER Resources Compiled and Printed by Amp-3, LLC V2.0 rev April 2014
! INTERNET EMAIL DOCUMENT SECURITY & PRIVACY RESOURCES AMP- 3, LLC Preparedness Brief APB MAR 2014 v3.0 revapr14 amp- 3.net ACTION ITEMS http://www.amp-3.net GET OFF Facebook, Twitter, All Things Google, All Social Media NOW! DO NOT USE Internet Explorer or Google Chrome START using SECURE internet & email DEVELOP a secure password protected USB drive for your important files ARTICLES TO READ Keep Uncle Sam Out Of Your Inbox With Our Layman s Guide To Email Encryption http://www.digitaltrends.com/how-to/how-to-pgp-encrypt-email-mac-mail-app/ The Secure email Challenge http://www.newyorker.com/online/blogs/elements/2013/11/the-daunting-challenge-ofsecure-e-mail.html COUNTERMAIL: Hushmail Alternative Review http://www.hacker10.com/internet-anonymity/one-year-review-of-anonymous-emailservice-countermail/ THREAT LEVEL: Encrypted E-Mail Company Hushmail Spills to Feds http://www.wired.com/threatlevel/2007/11/encrypted-e-mai/ MAC - Apple security flaw could allow hackers to beat encryption http://www.reuters.com/article/2014/02/22/us-apple-flaw-idusbrea1l01y20140222 MAC - How to encrypt your email http://www.macworld.com/article/2041083/how-to-encrypt-your-email.html MAC - Encrypt your OS X email and files the easy way http://www.zdnet.com/encrypt-your-os-x-email-and-files-the-easy-way-7000016986/ How To Protect Your PC From PRISM http://www.pcworld.com/article/2041044/how-to-protect-your-pc-from-prism.html How To Hide Your House From Google Maps http://www.offthegridnews.com/2013/10/30/how-to-hide-your-house-from-google-maps/ HACKER10 - USB Encryption Information http://www.hacker10.com/usb-encryption/ SECURITY: The Resistance Security Manual RECOMMENDED: get this from Forward Observer Magazine [$10 Download] http://forwardobservermagazine.com/product/security-the-resistance-security-manual
USEFUL WEBSITES Charles Carroll Society http://charlescarrollsociety.com http://itunes.apple.com/us/podcast/charles-carroll-society-traditionalist/id555325971?mt=2 SecureMac How Secure is Your Mac? http://www.securemac.com Off The Grid News http://www.offthegridnews.com AmRRON American Redoubt Radio Operators Network http://www.amrron.com Radio Free Redoubt http://www.radiofreeredoubt.com Hacker10 Security Hacker / Computer Security http://www.hacker10.com/ GuerrillAmerica - Making Patriots More Dangerous to Tyranny Since 2011 http://guerrillamerica.com Forward Observer Magazine http://forwardobservermagazine.com Forward Observer Magazine Spring 2014 http://forwardobservermagazine.com/product/fo-spring-2014 Dr. Katherine Albrecht: RFID & SPYCHIPS http://www.spychips.com/ http://en.wikipedia.org/wiki/katherine_albrecht http://www.youtube.com/watch?v=1q2fssg1lk8! SECURITY PRIVACY CRYPTO RESOURCES INTERNET PRIVACY RESOURCES StartPage http://www.startpage.com/eng/protect-privacy.html Ghostery https://www.ghostery.com Tor Browser Bundle The Tor Project is a US 501(c)(3) non-profit dedicated to the research, development, and education of online anonymity and privacy. http://www.torproject.org/projects/torbrowser.html.en
HTTPS EveryWhere Plug-In http://www.eff.org/https-everywhere SECURE EMAIL RESOURCES HushMail - Web based support for PGP encryped email and digital signatures, computer IP hidden in the headers, company headquarters based in Canada http://www.hushmail.com CounterMail!"!Supports OpenPGP encryption and digital signatures for webmail, it also hides your IP on the headers, servers located in Sweden http://countermail.com InstanceMail http://instancemail.com StartMail http://beta.startmail.com The Enigmail Project OpenPGP Email Security for Mozilla Applications http://www.enigmail.net/home/index.php http://www.hacker10.com/encryption-software-2/email-encryption-with-vaultletsuite-2-go/ http://www.hacker10.com/other-computing/autonomy-central-email-encryption-andsecure-notes/ CryptoHeaven http://www.cryptoheaven.com AutonomyCentral http://www.valeso.com/products/index.html GPGMail 2.1 for Mavericks Everything you need to get started with secure communication and encrypting files in one simple package http://gpgtools.org/gpgmail/index.html PGP - Pretty Good Privacy http://en.wikipedia.org/wiki/pretty_good_privacy http://cryptography.org/getpgp.htm Off-The-Record Communication: Why Not to Use PGP https://otr.cypherpunks.ca/otr-codecon.pdf TrueCrypt http://www.truecrypt.org/downloads i2p http://en.wikipedia.org/wiki/i2p http://geti2p.net/en/
TAILS http://en.wikipedia.org/wiki/the_amnesic_incognito_live_system http://tails.boum.org/ CRYPTOLOGY: One-Time Pad (OTP) Resources OTP Precautions Create one-time pads with truly random digits Never ever use a one-time pad more than once Destroy the one-time pad immediately after use Dirk Rijmenants' Cipher Machines and Cryptology http://users.telenet.be OTP One Time Pad http://users.telenet.be/d.rijmenants/en/otp.htm Guide to Secure Communications with the One-Time Pad Cipher How to set up secure communications with one-time pad http://users.telenet.be/d.rijmenants/papers/one_time_pad.pdf OTP Six-Sided Die Template [ Your PRIVATE Random Number Generator! ] http://users.telenet.be/d.rijmenants/d10.pdf OTP Random Number Generator (RNG) http://users.telenet.be/d.rijmenants/en/otp.htm#software Is the One-Time Pad History? http://users.telenet.be/d.rijmenants/papers/is_one_time_pad_history.pdf OTP One-Time Pad Cryptology http://babkjl.wordpress.com/2012/03/18/one-time-pad-cryptography PRIVACY PRODUCTS ShieldSak lightweight fabric Faraday cage made for the U.S. Military and Government PROVEN to block Radio Frequencies ( RF ), Infrared and Skim/Quick Scan Technology that can steal your critical information http://www.loksak.com/products/shieldsak PrivacyCase - military-grade shielding technology blocks unwanted GPS location-tracking and real-time audio/video eavesdropping http://www.privacycase.com OffPocket - A sleek countersurveillance tool that blocks signals from entering or exiting the case http://offpocket.com SMART PHONE / TABLET APPS BurnerPhone - the simplest, most secure, and most affordable prepaid cell phone kit in the US. The Burner Kit - a quality disposable cell phone with unlimited voice and SMS messaging for 30 days http://www.burnerphone.us/
RedPhone ANDROID APP from WhisperSystems that provides endto-end encryption for your calls, securing your conversations so that nobody can listen in TextSecure - ANDROID APP from WhisperSystems that encrypts your text and chat messages over the air and on your phone http://whispersystems.org/ NOTES / DEFINITIONS Burner - a privacy layer app for your iphone or Android that provides disposable phone numbers for your iphone or ANDROID that you control at the push of a button http://burnerapp.com/ Hushed - makes it easy to create private numbers without hassle, significant expense, or commitment. Use Hushed whenever you need to contact or be contacted but don t want to share your private information http://hushed.com/ Public-Key Cryptogrphy, aka Asymmetric Key Encryption, refers to a cryptographic algorithm, which requires two separate keys, of which is a secret or private key and one of which is a public key. The term "asymmetric" stems from the use of different keys to perform these opposite functions, each the inverse of the other as contrasted with conventional ("symmetric") cryptography, which relies on the same key to perform both. SOURCE: http://en.wikipedia.org/wiki/public-key_cryptography