

Oh and so many others who would sing any old song for US Dollars, in fact a little update on an old saying gives “He who pays the piper, gets to hear what they want to hear”. By Israel’s over the ME with Yellow Cake, and others like the “in waiting” Iraqi National Congress, oh and a diplomats daughter telling of Iraqi troops flinging babies out of incubators so the equipment could be shipped back to Iraqi (turns out she was nowhere close at the time). They became overly reliant on others for HumInt, and “boots on the ground intel”. If you read the last sentence again and think back, the US got into the same SigInt / Elint mess back in the days of the U2, and they’ve never realy been out of it since. In fact, old-school tradecraft may turn out to be the Achilles’ heel for security services as they’ve become heavily reliant on signal intelligence to function. They worked just fine pre-internet and they can still work. There’s definitely something to be said for old-school methods.

There is an interesting paragraph in the article by Bill Blunden you link to, Here their explanation about how they compare to the rest of the applications addressed above. Cybersecurity Expert John McAfee even endorses RakEM.Also, unlike the other “secure messaging applications” who use standard 256 AES encryption with their chats, RakEM uses a self mutating encryption key with a length that ranges from 2048 to 4096 bits.It goes straight from device to device no server in the middle. RakEM uses an end-to-end transport protocol therefore no government body or hacker can intercept it’s communication.

