GOVEROTRAGEOUS: The Untold Story of Japan’s Secret Spy Agency

“Very few people know what the DFS is doing and can enter the building,” according to an active-duty official with knowledge of the directorate’s operations, who spoke on condition of anonymity because they were not authorized to talk to the media. The official agreed to share details about the directorate after The Intercept and NHK last year revealed that the spy agency had obtained a mass surveillance system called XKEYSCORE, which is used to sift through copies of people’s emails, online chats, internet browsing histories, and information about social media activity. The official said that they believed the directorate’s use of XKEYSCORE was “not permissible” under the Japanese Constitution, which protects people’s right to privacy.

Source: The Untold Story of Japan’s Secret Spy Agency

# – # – # – # – #

Here’s an example of why no Gooferment’s Deep State can be trusted or contained by mere “constitution”.  Lysander Spooner had it right.

“Inasmuch as the Constitution was never signed, nor agreed to, by anybody, as a contract, and therefore never bound anybody, and is now binding upon nobody; and is, moreover, such an one as no people can ever hereafter be expected to consent to, except as they may be forced to do so at the point of the bayonet, it is perhaps of no importance what its true legal meaning, as a contract, is. Nevertheless, the writer thinks it proper to say that, in his opinion, the Constitution is no such instrument as it has generally been assumed to be; but that by false interpretations, and naked usurpations, the government has been made in practice a very widely, and almost wholly, different thing from what the Constitution itself purports to authorize. He has heretofore written much, and could write much more, to prove that such is the truth. But whether the Constitution really be one thing, or another, this much is certain – that it has either authorized such a government as we have had, or has been powerless to prevent it. In either case, it is unfit to exist.” Lysander Spooner (1808-1887), No Treason (1870)

# – # – # – # – #

FUN:Luddite sent me a Laughing Baby video!119&parid=E96C39C9B735AB8C!110&authkey=!ABlb_nSM43Bpn4Y

# – # – #

Yeah the whole 5 Gig file in an email. Argh! So, here it is for your enjoyment. Just the link; take the file if you want it. But why? You can just share the link. Think of all those electrons you’re saving.

# – # – # – # – #  2012-Jan-07 @ 12:19

SERVICE: Amazon Simple Email

*** begin quote ***

Amazon Simple Email Service (Amazon SES) (beta)

Amazon Simple Email Service (Amazon SES) is a highly scalable and cost-effective bulk and transactional email-sending service for businesses and developers. Amazon SES eliminates the complexity and expense of building an in-house email solution or licensing, installing, and operating a third-party email service. The service integrates with other AWS services, making it easy to send emails from applications being hosted on services such as Amazon EC2. With Amazon SES there is no long-term commitment, minimum spend or negotiation required – businesses can utilize a free usage tier and after that enjoy low fees for the number of emails sent plus data transfer fees.

*** end quote ***

10¢ per thousand emails?


That’s going to change the dynamics of the marketplace.

Not as simple as a Yahoo Group. Haven’t played with Google Groups. It requires coding and the use of APIs. I’m sure someone will write an smtp front end that makes it trivial to use.

# # # # #

PRODUCTIVITY: Always have a email account to spare?

No secret I use a lot of email accounts. For a purpose. For a community. For relatives. For friends. For projects.

Interesting that some ISPs (i.e., Saint Peter’s University Hospital and Robert Wood Johnson University Hospital) offer free wifi.

Unfortunately, like most things you get for “free”, they both have their own “unique” opportunities.

Not everyone has a VWBBIE (i.e., a Verizon Wireless Broad Band Service for 70$/month) or an IPAD with the AT&T 3G turned on!

SPUH doesn’t permit email. I chatted with a fellow nerd from a past employment and he had no idea why or even who “decreed” this. But the diktat couldn’t be overturned.

Now clearly with web access, you can use the web front end that most email providers have. But that’s not a very efficient or effective imho. Your really want a unified mailbox for the different account with the capability to send from the correct account.

GMAIL to the rescue.

It was trivial to set this up so that “emergency” could read and write in the “important” accounts.

Now when I need it, I have it.

Kudos to GMAIL.


SERVICE: Why don’t ISPs validate all return addresses?

Don’t the ISPs have the capability to do a domain look up?

We need to revise the email handling protocols. (imho)

ISPs should insist that peers do some validation.

For example, if say COMCAST and YAHOO are peers, then, at the very least, COMCAST should not accept any email with a Yahoo return address that doesn’t originate from Yahoo. Yahoo should validate every email it peers to COMCAST has having originated from a valid email address. If COMCAST Users mark it as spam, then that fact should be fed back to Yahoo for appropriate action.

And, visa versa.

(I laugh sarcastically when I get spam with a Yahoo bogus return address.)

ISPs like Comcast and EMail providers like Yahoo could “cut off” offenders.

It would seem to be in everyone’s best interest to truncate the flow of bogus email.

Seems easy to me?

# # # # #

TECHNOLOGY: The value of strange email addresses

It’s no secret that I have lots of email addresses.

Some are pretty standard that I use for catch alls. Some are hung off the domains that I own. Some are secret for dedicated purposes. Some for family, friends, social networking, fellow alums, and past coworkers.

I’m always amused when some spammer or ne’er-do-well guesses the address and the bank I use.

Obviously, a bank message on the “wrong” id (e.g., First Superior Bank’s message comes in to sticks out like a sore thumb. Just as obvious, an email account dedicated to my bank (e.g., MY BANK @ SUPER secret address dot com) suddenly has weight loss ads. Like a sef-proving affidavit, the message and the account must “align”.

I’m less amused when spam looks like a real message and comes in on an account where it might be valid. Then I have to waste time to recognize the “barbara streisand”.


When will we get fully authenticated email?

I find it funny when spam comes to my Yahoo account purporting to be from Yahoo. Is anyone awake at Yahoo? NO ONE, nobody, should be allowed to queue a message that purports to from the provider. Wake up guys. IT isn’t supposed to be short for IDIOT!

Why can’t we have a PKI infrastructure at least with an ISP for starters that would ensure that intra Verizon, Comcast, or other large ISP is authentic?


For this IT Architecture weenie doesn’t think this is rocket science!

Fix it guys!

# # # # #

SERVICE: Your ISP email address is a trap; any ATT users as well?


*** begin quote ***

AT&T has made some major changes to its internet system. They included removing the term “worldnet” from the Email address that some of you use to contact me. They will not transmit emails that contain that term after 3/15.

*** end quote ***

*** begin quote ***

In my mind, it’s impossible to communicate the change to everyone who has your old email address. It may have been given to them by someone else.

*** end quote ***

May I suggest that you might want to avoid giving out your ISP’s email address?

Your ISP’s email is a trap to lock you in to their service. It can leave you high and dry at the most inopportune times.

They can: (1) be acquired; (2) sell out; (3) change their brand; (4) go out of business; (5) do something dumb; OR (6) have a meltdown of some type.

And, you can be out of luck. No email temporarily or permanently. Then you’re forced to change.

Good luck finding everyone who HAS your email address. They may have been given it by someone you know. But you don’t know them.

You should NEVER permit them to own almost the mort important thing you “own” — your email address. It’s a key to your digital identity. if they get bought out or go out.


# # # # #

RANT: Roach ruins a photo op for the gooferment skool!

Sixth-graders give dining diva Rachael Ray’s lunch menu passing marks
BY Mark Morales and Corky Siemaszko
Tuesday, October 27th 2009, 4:00 AM

*** begin quote ***

Dining diva Rachael Ray unveiled her healthy new lunch for students at Public School 89 in Tribeca on Monday before a gaggle of reporters – and one brazen cockroach.

*** end quote ***


OK, not really.

The roach will survive a nuclear war. But, the liberals think that they don’t exist.

Why should the State be “educating” (aka indoctrinating) children?

Parents should be in charge; not overpaid bureaucrats.

Bet home schoolers don’t have this problem.

Finally, it’s sad when we allow the gooferment to run our lives.

# # # # #

TECHNOLOGY: Email is worse than a postcard!

September 26, 2009
Whoa; NBC Producer to anti-ACORN group employee: ‘Bite me, Jew boy?’
Rick Moran

*** begin quote ***

When Stone received an email urging Congress to defund ACORN from Alex Rosenwald, director of media outreach for Americans for Limited Government, the following sentence came back to Rosenwald from Stone’s account: “Bite me, Jew Boy!”

*** and ***

   But Stone’s response email-provided to POLITICO-did not have any anti-Semitic comment. In fact, it had just one line: “Take me off this list!” (There are also subtle differences, including number of dashes, between the two emails).

   “Somebody, on the other end, I’m assuming, took the return stamp from the email and then put in this hateful message,” Capus said. “I don’t know who did it. It’s outrageous to suspect that somebody from NBC News would do it.”

*** end quote ***

I always rant that email should be secured. It’s the vendors, the ISPs, and the technology community that has to do it. We can’t leave it to the users.

Like IPv6, the technology industry has been sitting on its hands for decades. FIgure it out boys and girls!

(Or should that be girls and boys. Do girls come before boys? Or is always alpha order?)

We have had the capability to do encryption for stuff for eons. PGP can encrypt messages. At the very least it can give you a hash of the message that proves if it’s been tampered with!

Then we’d completely avoid these little distractions about “who did it”.

Time has come for the technology folks to get their act together.

# # # # #

SERVICE: PIPL to find people

Pipl – People Search

Welcome to the Deep Web

There are various reasons why you might need to search for people, you may need to find a lost relative, an old flame, a classmate or a business contact – but if you are using a search engine such as Google or Yahoo to search for people, you have probably realized by now that it might work in some cases but in most cases it won’t.

# – # – #

Another tool?

# # # # #

TECHNOLOGY: AntiSPAM tactic that Yahoo misses

Here’s a spam that I received at my Yahoo account. It purports to be from a Yahoo user id. BUT, if it didn’t originate entirely inside Yahoo, then Yahoo should be able to NUKE it before it hits my inbox. Seems simple to me?

*** begin quote ***

Return-Path: <>

Authentication-Results:; domainkeys=neutral (no sig)

Received: from (EHLO ( by with SMTP; Thu, 20 Nov 2008 21:25:19 -0800

Received: from User ([]) by with Microsoft SMTPSVC(6.0.3790.3959); Fri, 21 Nov 2008 05:17:48 +0000

Reply-To: <>



Add sender to Contacts

Subject: Question about Item – Respond Now

Date: Thu, 20 Nov 2008 23:24:41 -0600

MIME-Version: 1.0

Content-Type: text/html; charset=”Windows-1251″

Content-Transfer-Encoding: 7bit



Message-ID: <>

Content-Length: 10368

*** end quote ***

# # # # #