Some people have PM'd me about this so here is some more detail. Here is an article on the known instance: http://www.news.com/8301-10784_3-9741357-7.html there has been speculation on the source forums that a few source email accounts have been compromised, and one good source is sending out emails claiming that hushmail is now voluntarily handing over unencrypted copies of suspect email accounts to the DEA, but that could very well be just a ploy to back out of the business. Spread the word though; in this day and age, based on the above case, if you are suspected of dealing in scheduled compounds the DEA has the power to break into your home and install monitoring software on your PC, and it's not considered violating your rights. Hopefully these defendants will find enough money to keep legal council and take it to a higher court to try to rule on the unconstitutional nature of their tactics, but in cases like this the government almost always outspends the defendant leading to a plea bargain ... welcome to 1984 ...
here is more info on recent hushmail injustices: http://www.usdoj.gov/usao/txn/PressRel05/saran_etal_indict_PR_FINAL.pdf here is the indictment http://static.bakersfield.com/smedia/2007/09/25/15/steroids.source.prod_affiliate.25.pdf 4. On June 6, 2007, DEA SA Shawn Riley received three CD's via Fed Ex from the DEA San Diego Division Office. The CD's were the result of a mutual legal assistance treaty ("MLAT") executed on Hush Communications Inc, based in Canada, for e-mail addresses osocabro@hushmail.com and oblist@hushmail.com. Hush Communications Inc., also known as Hush Mail, is a free encrypted email communication system that claims to ensure the security, privacy, and authenticity of emails sent and received by it's users. 5. A review of e-mails from e-mail address osocabro@hushmail.com between February 14, 2007 and May 17, 2007, revealed OSOCA filled 88 separate anabolic steroid orders for a total sale of $36,024.00. During a review of the e-mails, SA Shawn Riley identified OSOCA'S Chinese SOS for bulk ******ed anabolic steroids as "GLP". GLP was using the email address glpinternational@hushmail.com to communicate with OSOCA. The e-mails between osocabro@hushmail.com and glpinternational@hushmail.com showed there were two shipments of bulk ******ed anabolic steroids from GLP to OSOCA. Both orders were sent to Tyler STUMBO at 9530 Hageman, Suite B, #192, Bakersfield, CA. An address check revealed 9530 Hageman, Suite B, #192, Bakersfield, CA is a UPS Store. Quote: 9. On June 15, 2007, SA [DEA Special Agent] Shawn Riley received the results of Administrative Subpoena 2007-190 sent to Bright House Networks/Road Runner for internet protocol ("IP") addresses associated with osocabro@hushmail.com which is used by OSOCABRO LABS. The results of the MLAT conducted on osocabro@hushmail.com included an IP log associated with access to this e-mail account. SA Riley conducted a sampling of eight IP addresses logging onto the osocabro@hushmail.com e-mail account between March 29, 2007 and May 17, 2007 and requested the subscriber using the IP addresses. Bright House Networks/Road Runner indicated the eight IP addresses sampled were accessed by account 609020-03 subscribed to "Tyler S. STTUMBO" with a listed address of 5702 Rockwell Drive, Bakersfield, CA 93308 and phone number 661-703-2480. This account was installed on November 29, 2006 and is currently active. Quote: 10. ... The results results of this subpoena included account transaction details for card number ________________ SA Riley reviewed the transaction details and located the following orders to companies supplying equipment used in the manufacturing and distribution of anabolic steroids: ... [Daigger, Capsuline, Le Melange, Research Supply, E-Bottles, Col-Parmer (sic)] Quote: 15. On Sept 7, DEA SA Shawn Riley received nine CD's via Fed Ex from the DEA San Diego Division Office. The CD's were the result of a mutual legal assistance treaty ("MLAT") executed on Hush Communications Inc, based in Canada, for e-mail addresses osocabro@hushmail.com, oblist@hushmail.com, and glpinternational@hushmail.com. The analysis of the second MLAT revealed 45 separate anabolic steroid orders between May 29, 2007, and August 20, 2007 for a total sale of $18,977.00. Twenty two of the anabolic steroid orders were paid for by way of Green Dot. All of the money packs reloads were uploaded onto Green Dot account number 4852800001333917, which was previously identified as the account belonging to STUMBO.
Everyone be careful. The dea broke into my house in july and I wound up in jail for 2 weeks, plus 2 years probation. It is NOT worth getting caught. Be careful... I suggest using "SWIM", etc... Even though a lot of people think it's annoying. Btw, I don't do anything illegal now. Just SWIM.
This shouldn't surprise anyone. There is nowhere to hide anymore. The feds have absolute power, granted by King Bush to intercept any form of communication, foreign or domestic. And they are using it everyday, and there are rarely public records of the spying going on on Americans. What's fucked up about this is the cooperation on this by the Canadians. Canada just isn't what it used to be, a free country. And this proves Canada is Bush's Pussy. Meow Canada! When are Canadians gonna take back their country?
If you're concerned about your privacy then I'd be careful about using a service where you have to trust an organization to keep your privacy for you (Like Hushmail.) A better solution is to use your own encryption via regular email via a program like Pretty Good Privacy or the free version GNU Privacy Guard. Although when you get your computer took by federal agents and they see you have encrypted data on it they're allowed to force you to give them your encryption key otherwise you automatically face a few years in prison or something crazy like that.
Use the hushmail java applet before you enter your password and you will be fine I think. Also, using hush.ai will prevent the feds subpoena since the .ai servers are in the Caribbean. The Steroid guy was too lazy to use the java encryption so he might as well been using yahoo. The Feds subpoena'd hushmail and they gave it up like any legitimate company would. The .com servers are in Canada. As we know the Us and Canada have a good relationship. Basically its all up to you, use the java and dont let anyone corrupt your computer. Hushmail cant stop someone from hacking into your machine, lol. The PGP code cant be broken into, the only way is if you screw up. Your password is the key to breaking the code, if you turn on the java applet before entering your password no one has the key to breaking it, not even hushmail. When the police subpoena for your records, they will get code not text, and the PGP cannot be cracked not even by the guy who invented it(Phil Zimmermann) If you dont use the java, you might as well just use Yahoo or hotmail because when the feds come, they will get the key(your password) to reading all your emails. Peace, be vigilant LD
hushmail has a diclaimer on their websute advising that if need be they will cooperate with the legal and enforcement entities
So how safe is hushmail? Because some of the places I use you have to contact them through their hushmail account.
why don't we make a law enforcement agency that arrests rapists and burglars, not hippies and teenagers. damn DEA. what a waste of money, effort, life...is there anything good that comes out of the DEA?
This is odd. Swim is unable to log into 2 of swims hushmail accounts. They happen to be the accounts that swim talks to vendors with. Its telling swim that the pass phrase is incorrect. Swims hushmail account that has not been talking with vendors is fine.