Donate for the Cryptome archive of files from June 1996 to the present

2 April 2012

Postal Digital Spying

Cryptome welcomes information on, examples of, postal digital spying: cryptome[at]earthlink.net

Before email, social media, hacking, anonymizers and back-doored encryption took their place, postal services (most of them also ran telecommunications) were the prime means of official and commercial spying. The freedom-promising Internet's ease and ubiquity of digital spying worldwide for a while made paper mail more secure, used even by officials and the military who knew digital communications favored its operators over users. That short-lived, somewhat safe postal means of comms -- along with courier and delivery services -- now looks to be again doing do-gooders' triple-crossing evil.

In our NYC 72-unit condo, an in-house digital tracking, security video and notification system records the last-few-feet spying node supplementing an all-building cable-tv-phone-internet rig with handy tap-panel in the basement and a perp-IDing in-home converter box surveilling and archiving futile surfing for escape.


Date: Sun, 01 Apr 2012 20:07:10 +0200
From: "Erich M." <me[at]quintessenz.org>
To: nettime-l[at]kein.org
Subject: Re: <nettime> The (Letter-) Post Office's last stand ... in Florida(WSJ)

On 03/30/2012 01:57 PM, John Young wrote:

> The postal system remains the most secure public communication
> system for all its faults and invasive letter opening and craven
> cooperation with official spies and their corporate cohorts.

Servus John et al,

Ack to all you wrote with a single exception, squire John. The first paragraph ought to be in past tense. I just started digging into that topic, what I already know is: Address scanning/reading in, applying 2-D Codes and timestamps at every stage of transportation. When post office cars or private delivery services stop in front of my house here in .AT my signature is performed on an electronic pad.

At first sight I'd say massive datasets generated by snail mail and packet sorting and processing systems are generously inviting companies to spy on each other and combat competitors abroad. Analysis of delivery cycles, timely detection of hostile marketing campaigns, tracking and blocking delivery of goods under patent/copyright claims or whatever the clone offsprings of ancient DMCA ACTA/TPP/SOPA/PIPA require.

What a nice topic to dig - ahem - to dive into, methinks. Not forgetting my nose clamp I remain

humbly yours

Erich M.

> All digital comsec is faulty -- by design so its designers say to
> aid sysadministration and security/privacy updates. No official
> agency has ever had such intimate sustained access to those
> willing to barter digital hawking-gawking for instant full-body
> cat-scan diagnosis.

http://fm4.ORF.at/erichmoechel

http://moechel.com/kontakt.html        PGP KEY 0xEA7DC174
fingerprint 02AA B2E7 C609 307D 34FE 4B5C ACC6 A796 EA7D C174

--... ...--   -.. .   . .-. .. -.-. ....   --- . ...-- . -- -...

#  distributed via <nettime>: no commercial use without permission
#  <nettime>  is a moderated mailing list for net criticism,
#  collaborative text filtering and cultural politics of the nets
#  more info: http://mx.kein.org/mailman/listinfo/nettime-l
#  archive: http://www.nettime.org contact: nettime[at]kein.org