<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta content="text/html;charset=ISO-8859-1" http-equiv="Content-Type">
<title></title>
</head>
<body bgcolor="#ffffff" text="#000000">
Eugen Leitl wrote:<br>
<blockquote cite="mid20050927102055.GB2249@leitl.org" type="cite">
<pre wrap="">On Mon, Sep 26, 2005 at 09:16:11PM -0400, David Lubkin wrote:
</pre>
<blockquote type="cite">
<pre wrap="">Kevin Freels wrote:
</pre>
</blockquote>
<pre wrap=""><snip>
</pre>
<blockquote type="cite">
<pre wrap="">communicate will not draw attention. In the WW II model, signalling
by the radio broadcast of a particular popular song is preferable to
"the crows fly at dawn."
</pre>
</blockquote>
<pre wrap=""><!---->
Number stations broadcast just fine with one-time pads.
</pre>
<blockquote type="cite">
<pre wrap="">Because encrypted traffic is relatively rare, it draws attention.
</pre>
</blockquote>
<pre wrap=""><!----></pre>
</blockquote>
The following excerpt is from "The Numbers Game" by Martin Cannon,<br>
The Anomalist:1 <a class="moz-txt-link-rfc2396E" href="http://www.anomalist.com">< http://www.anomalist.com ></a>.<br>
<br>
"My encounters with Number-Man call to mind the mysterious "number<br>
readers" which afflict the shortwave band. For many years, on various<br>
frequencies, female and male announcers have broadcast four- and<br>
five-digit numbers [voice "off-line" encryption] in several different<br>
languages. In his 1983 book *Big Secrets*, William Poundstone<br>
speculated that these transmissions involve codes used by drug-runners,<br>
or perhaps by the Cubans. But a few years later, appearing on a local<br>
tavloid-TV program called "Eye on L.A.," Poundstone revealed that<br>
shortwave enthusiasts had triangulated the broadcasts to their most<br>
probable origin point: The state of Virginia.<br>
<br>
"Which pretty much gives the game away.<br>
<br>
"In his book *Without Cloak or Dagger*, ex-spook Miles Copeland<br>
reveals that clandestine shortwave messages sometimes take the form<br>
of "screech" broadcasts: The information is sped up, making it<br>
incomprehensible to outsiders. One can retrieve the data only by<br>
recording the message and replaying the tape slowly.<br>
<br>
"Consider the loop line [telephone] as an espionage tool. You can check<br>
the telephone records of anyone calling the lines and you'll never learn<br>
who his contact is. A trace will turn up nothing. Even the telephone<br>
company will be forever mystified. Loops are the last bastion of<br>
telephone privacy, and would therefore prove enormously helpful to<br>
an operative seeking secure communications."<br>
<br>
Terry<br>
<br>
<snip><br>
<pre class="moz-signature" cols="72">
--
"Only a zit on the wart on the heinie of progress." Copyright 1992, Frank Rice
Terry W. Colvin, Sierra Vista, Arizona (USA) < fortean1 at mindspring.com >
Alternate: < fortean1 at msn.com >
Home Page: <a class="moz-txt-link-rfc2396E" href="http://www.geocities.com/Area51/Stargate/8958/index.html">< http://www.geocities.com/Area51/Stargate/8958/index.html ></a>
Sites: * Fortean Times * Mystic's Haven * TLCB *
U.S. Message Text Formatting (USMTF) Program
------------
Member: Thailand-Laos-Cambodia Brotherhood (TLCB) Mailing List
TLCB Web Site: <a class="moz-txt-link-rfc2396E" href="http://www.tlc-brotherhood.org">< http://www.tlc-brotherhood.org ></a> [Southeast Asia
veterans, Allies, CIA/NSA, and "steenkeen" contractors are welcome.]</pre>
</body>
</html>