{"id":80437,"date":"2016-07-02T15:58:51","date_gmt":"2016-07-02T19:58:51","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2022-08-10T12:20:58","modified_gmt":"2022-08-10T16:20:58","slug":"independence-day-2016","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/independence-day-2016\/","title":{"rendered":"Independence Day 2016"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-94639 \" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encryption-and-security-cmprx-03-e1561907748262-150x141.png?resize=85%2C80&#038;ssl=1\" alt=\"\" width=\"85\" height=\"80\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encryption-and-security-cmprx-03-e1561907748262.png?resize=150%2C141&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encryption-and-security-cmprx-03-e1561907748262.png?resize=75%2C70&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/encryption-and-security-cmprx-03-e1561907748262.png?w=427&amp;ssl=1 427w\" sizes=\"auto, (max-width: 85px) 100vw, 85px\" \/>Independence Day is the time when Americans celebrate freedom from a tyrannical government in the 18th century. While gaining that freedom, the founding fathers used encryption. They used encryption while risking their lives to gain the freedom we celebrate on July 4th. The <a href=\"https:\/\/www.eff.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">EFF<\/a> <a href=\"https:\/\/www.eff.org\/deeplinks\/2015\/10\/crypto-everyone-and-american-history-proves-it\" target=\"_blank\" rel=\"noopener noreferrer\">documents<\/a> how many of the <a title=\"Founding Fathers of the United States\" href=\"http:\/\/en.wikipedia.org\/wiki\/Founding_Fathers_of_the_United_States\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">Founding Fathers of the United States<\/a> used encryption to secure our freedoms.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.whitehouse.gov\/1600\/presidents\/thomasjefferson\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Thomas Jefferson<\/strong><\/a>\u00a0<a href=\"https:\/\/johnbartramlives.me\/2011\/10\/16\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-94642\" title=\"Thomas Jefferson invented an encryption device\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/thomas-jefferson.gif?resize=100%2C110&#038;ssl=1\" alt=\"Thomas Jefferson invented an encryption device\" width=\"100\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/thomas-jefferson.gif?resize=137%2C150&amp;ssl=1 137w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/thomas-jefferson.gif?resize=68%2C75&amp;ssl=1 68w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/>was<\/a> the principal author of the <a href=\"http:\/\/www.archives.gov\/exhibits\/charters\/charters_of_freedom_3.html\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Declaration of Independence<\/strong><\/a> and the country\u2019s third <strong>president. <\/strong>He\u00a0is known to be one of the most prolific users of <strong>secret communications methods<\/strong>. He even invented his own cipher system\u2014the \u201cwheel cipher\u201d\u00a0 or the \u201c<a href=\"http:\/\/www.cryptomuseum.com\/crypto\/usa\/jefferson\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Jefferson disk<\/strong><\/a>\u201d as it is now commonly referred to. Mr. Jefferson also presented a special cipher to Meriwether Lewis for use in the <a href=\"https:\/\/www.archives.gov\/education\/lessons\/lewis-clark\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Lewis and Clark Expedition<\/strong><\/a>.<\/li>\n<\/ul>\n<ul>\n<li><strong><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-94645\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/washingtoncivility1.jpg?resize=87%2C110&#038;ssl=1\" alt=\"\" width=\"87\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/washingtoncivility1.jpg?resize=119%2C150&amp;ssl=1 119w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/washingtoncivility1.jpg?resize=59%2C75&amp;ssl=1 59w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/washingtoncivility1.jpg?w=143&amp;ssl=1 143w\" sizes=\"auto, (max-width: 87px) 100vw, 87px\" \/><a href=\"https:\/\/www.whitehouse.gov\/1600\/presidents\/georgewashington\" target=\"_blank\" rel=\"noopener noreferrer\">George Washington<\/a><\/strong> was the <strong>first president of the United States<\/strong>. He frequently dealt with<strong> encryption<\/strong> and espionage issues as the <strong>commander of the <a href=\"https:\/\/www.army.mil\/article\/40819\/Washington_takes_command_of_Continental_Army_in_1775\/\" target=\"_blank\" rel=\"noopener noreferrer\">Continental Army<\/a><\/strong>. He gave his intelligence officers detailed instructions on methods for maintaining the secrecy and for using decryption to <strong>uncover British spies<\/strong>.<\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/www.whitehouse.gov\/1600\/presidents\/johnadams\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>John Adams<\/strong><\/a> was the second <strong>U.S. president. <\/strong>He\u00a0used a cipher provided by James Lovell\u2014a member of the <strong>Continental Congress<\/strong> <a href=\"https:\/\/history.state.gov\/milestones\/1776-1783\/secret-committee\" target=\"_blank\" rel=\"noopener noreferrer\">Committee on Foreign Affairs<\/a>. He was an early advocate of <strong>cipher systems<\/strong>\u2014for correspondence with his wife, <strong>Abigail Adams<\/strong>\u00a0while traveling.<\/li>\n<\/ul>\n<ul>\n<li><a href=\"http:\/\/www.pbs.org\/benfranklin\/l3_citizen_founding.html\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Benjamin Franklin<\/strong><\/a> in<a href=\"https:\/\/web.archive.org\/web\/20210226221033\/http:\/\/www.historyimages.com\/founding-fathers\/clipart.html\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-94649\" title=\"Benjamin Franklin published a book on encryption\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/franklin-ben.gif?resize=85%2C110&#038;ssl=1\" alt=\"Benjamin Franklin published a book on encryption\" width=\"85\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/franklin-ben.gif?resize=116%2C150&amp;ssl=1 116w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/franklin-ben.gif?resize=58%2C75&amp;ssl=1 58w\" sizes=\"auto, (max-width: 85px) 100vw, 85px\" \/><\/a>vented ciphers used by the <a href=\"https:\/\/history.state.gov\/milestones\/1776-1783\/continental-congress\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Continental Congress<\/strong><\/a>. In 1748, he published a book that <a href=\"http:\/\/quod.lib.umich.edu\/e\/evans\/N05611.0001.001\/1:5.17?rgn=div2;view=fulltext\" target=\"_blank\" rel=\"noopener noreferrer\">spoke of <strong>encryption<\/strong><\/a> written by George Fisher, <a href=\"http:\/\/quod.lib.umich.edu\/e\/evans\/N05611.0001.001?view=toc\" target=\"_blank\" rel=\"noopener noreferrer\"><em>The American Instructor<\/em><\/a>.<\/li>\n<\/ul>\n<ul>\n<li><strong><a href=\"https:\/\/www.whitehouse.gov\/1600\/presidents\/jamesmadison\" target=\"_blank\" rel=\"noopener noreferrer\">James Madison<\/a> <\/strong>was\u00a0the author of the <a href=\"http:\/\/www.archives.gov\/exhibits\/charters\/bill_of_rights.html\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Bill of Rights<\/strong><\/a> and the country\u2019s fourth <strong>president. <\/strong>He\u00a0was a big user of <strong>enciphered communications. <\/strong>Numerous examples from his correspondence prove that. The text of one letter from Madison to Joseph Jones, a member of the Continental Congress from Virginia, dated May 2, 1782, was almost completely encrypted via cipher. And on May 27, 1789, Madison sent a partially encrypted letter to <strong>Thomas Jefferson<\/strong> describing his plan to introduce a Bill of Rights.<\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20201214141506\/https:\/\/supremecourthistory.org\/timeline_court_jay.html\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>John Jay<\/strong><\/a>, the first <a href=\"https:\/\/web.archive.org\/web\/20200217051112\/http:\/\/supremecourthistory.org:80\/htcw_chiefjustice.html\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Chief Justice of the U.S. Supreme Court<\/strong><\/a>, used <strong>ciphers<\/strong> for all diplomatic correspondence made while outside the United States. And John Jay\u2019s brother, Sir James Jay, invited a special <a href=\"http:\/\/www.artofmanliness.com\/2011\/09\/09\/man-knowledge-the-history-of-invisible-ink\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>invisible ink<\/strong><\/a>, also known as <a title=\"Invisible ink\" href=\"http:\/\/en.wikipedia.org\/wiki\/Invisible_ink\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">sympathetic ink<\/a>, and sent a supply from London to both his brother and then\u00a0<strong>General Washington<\/strong>.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.techdirt.com\/articles\/20151101\/23483432691\/our-founding-fathers-used-encryption-so-should-you.shtml\" target=\"_blank\" rel=\"noopener noreferrer\"><em>TechDirt<\/em><\/a>\u00a0correctly concludes that If encryption was good enough for the <strong>Founding Fathers<\/strong> to use in the 18th Century &#8230; it&#8217;s pretty ridiculous that we&#8217;re still having this debate now in this age of <strong><a href=\"https:\/\/web.archive.org\/web\/20220616132928\/https:\/\/www.nytimes.com\/2016\/04\/26\/technology\/obama-europe-privacy-terrorism.html\" target=\"_blank\" rel=\"noopener noreferrer\">constant government monitoring<\/a>, <a href=\"https:\/\/theintercept.com\/2016\/05\/03\/nsa-and-cia-double-their-warrantless-searches-on-americans-in-two-years\/\" target=\"_blank\" rel=\"noopener noreferrer\">warrantless searches<\/a>, <a href=\"https:\/\/www.schneier.com\/essays\/archives\/2013\/10\/your_life_under_cons.html\" target=\"_blank\" rel=\"noopener noreferrer\">corporate data aggregation<\/a>,\u00a0<a href=\"https:\/\/www.behavioraleconomics.com\/5-reasons-why-we-compromise-our-privacy-online\/\" target=\"_blank\" rel=\"noopener noreferrer\">data sharing, <\/a><\/strong>and\u00a0tools like IBM&#8217;s Non-Obvious Relationship Awareness software (<strong><a href=\"https:\/\/web.archive.org\/web\/20200809084917\/https:\/\/www.ibmbigdatahub.com\/tag\/6351\" target=\"_blank\" rel=\"noopener noreferrer\">NORA<\/a>)<\/strong>. The time is now to fight shortsighted \u201c<a href=\"https:\/\/web.archive.org\/web\/20210712122021\/https:\/\/www.nytimes.com\/2016\/06\/14\/us\/omar-mateen-fbi.html\" target=\"_blank\" rel=\"noopener noreferrer\">going dark<\/a>\u201d claims by the FBI and efforts by <a href=\"http:\/\/www.businessinsider.com\/harvard-study-ban-encryption-international-bruce-schneier-2016-2\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>clueless politicians<\/strong><\/a> like\u00a0Sen. <span class=\"rollover-people\"><a class=\"rollover-people-link\" href=\"https:\/\/thehill.com\/people\/dianne-feinstein\" target=\"_blank\" rel=\"noopener noreferrer\" nid=\"188242\">Dianne Feinstein<\/a><\/span> (D-CA) who have plans to ban encryption.<\/p>\n<p><em><strong>rb-<\/strong><\/em><\/p>\n<p><em>Seems to me that the biggest threat to <a href=\"http:\/\/www.adweek.com\/fishbowlny\/a-look-back-at-mission-accomplished\/35342\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-94652 size-medium alignright\" title=\"George Bush Mission not accomplished\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/george-bush-mission-accomplished-e1561916251398-150x135.jpg?resize=150%2C135&#038;ssl=1\" alt=\"\" width=\"150\" height=\"135\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/george-bush-mission-accomplished-e1561916251398.jpg?resize=150%2C135&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/george-bush-mission-accomplished-e1561916251398.jpg?resize=75%2C68&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/george-bush-mission-accomplished-e1561916251398.jpg?w=420&amp;ssl=1 420w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>America this Independence Day is the political ambitions of <strong>technically illiterate know-nothings<\/strong> in the gooberment. Be like the Founding Fathers and encrypt something start with <a href=\"https:\/\/www.eff.org\/https-everywhere\" target=\"_blank\" rel=\"noopener noreferrer\">HTTPS Anywhere<\/a>\u00a0from the\u00a0EFF.<\/em><\/p>\n<p>&nbsp;<\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/coolmaterial.com\/food-drink\/how-to-drink-like-the-founding-fathers-this-4th-of-july\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">How to Drink Like the Founding Fathers this 4th of July<\/a> (coolmaterial.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Celebrate Independence Day by encrypting your web browsing with #HTTPSEverywhere because the gooberment wants to take away your privacy<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3125],"tags":[2686,639,2708,1831,1875,638,2709,2710,266,824,2705,2183,2000,640,286,1689,2707,2706,2704,1780,1995,2703],"class_list":["post-80437","post","type-post","status-publish","format-standard","hentry","category-holidays","tag-2686","tag-american-revolution","tag-benjamin-franklin","tag-bill-of-rights","tag-constitution","tag-continental-army","tag-continental-congress","tag-declaration-of-independence","tag-eff","tag-encryption","tag-founding-fathers","tag-fourth-of-july","tag-freedom","tag-george-washington","tag-https","tag-independence-day","tag-john-adams","tag-john-jay","tag-lewis-and-clark-expedition","tag-potus","tag-scotus","tag-thomas-jefferson"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/80437","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=80437"}],"version-history":[{"count":19,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/80437\/revisions"}],"predecessor-version":[{"id":131488,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/80437\/revisions\/131488"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=80437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=80437"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=80437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}