comparemela.com

>> and there's a letter, greg that he's writing about surveillance and e-mail. he says "we should assume that the enemy can see these emails and only send through e-mail information that can bring no harm if the enemy reads it. they should not trust it juz just because it's encrypted. the enemy can monitor all e-mail traffic through the mujaheddin. computer science is not our science, we not the ones who invented it." >> there's a lot of material in this trove that reveals his real concern about security in a number of ways. one of the backs he had in the stack was about trying to find counter measures anti-aircraft capabilities for guerrilla movements which clearly looks like he was trying to figure out some way to combat the success of the cia's drone program in pakistan. a lot of the letters like you said are urging you know, to be careful in how you communicate finding new ways to communicate, using multiple methods of communication. that one of those letters that went out right a month or so

Related Keywords

E Mail ,Enemy ,E Mail Information ,Harm ,Letter ,Greg Miller National Security ,Writing ,Emails ,Surveillance ,Lot ,Concern ,Security ,Material ,Trove ,Science ,Computer Science ,E Mail Traffic ,Mujaheddin ,Ones ,Way ,One ,Success ,Number ,Ways ,Cia ,Guerrilla Movements ,Drone Program ,Capabilities ,Stack ,Letters ,Communication ,Methods ,Pakistan ,

© 2024 Vimarsana

comparemela.com © 2020. All Rights Reserved.