-Caveat Lector-

Pay attention to the geophysical aspects of the various echelon
stations around the globe. For example stations in the Asia pacific
might be more sensitive to indonesian military traffic and chinese triad
activity as much as any Iran-Contra scandal. Why would the americans looks
for Contra-drugs-for-arms conspiracies in radio traffic over southeast Asia
when such signals would more easily be found in Virginia anyway? Even the NSA
does not have limitless resources.

Remember echelon is global. Intelligence systems do not operate in such
isolation. Intercepts are often targeted, e.g. phone calls in an area, email
from a person monitored, perhaps because an attack is suspected, or a target
identified. General signals analysis would also be carried about -- to
determine nominal levels of different
signals -- pattern analysis of signals deviations would be monitored and
categorised as well as pattern analysis of communication content.

Targets might be monitored for changes in signals patterns, which give
valuable intelligence in its own right quite apart from the value of the
actual content. To illustrate, if a person suddenly starts sending many
encrypted messages one day to highly unusual addresses [Baghdad?], this might
be important information which can be acted upon immediately, before the
contents of the messages are decrypted.

As much as sending nonsense messages with keywords attached, people
could do as the following:

completely disrupt your usual online habits/patterns, if possible.

open a hotmail account. on the day, suddenly send it dozens of small,
encyrpted messages.

find email addresses, telephone numbers, inside defence establishments
and government departments. send a mixture of clear text and encrypted
(don't use your own key) information.

EXAMPLE

"to: [EMAIL PROTECTED]
from: george b. boring
subject:  i am the unassuming little man

in the funny cardigan with the bow tie. we spoke last week at the bar
after your disappointment. attached is the information about our
products that you seek. we assure you complete satisfaction in all our
operations."

Attach an encrypted picture of an atom bomb plan, or something like
that. In fact, attach an triply encrypted copy of another encryption key.
Send another message some hours later, with the instruction "use the key I
sent you to encode our futher communications".


Make up fake plans to seize executive power in Jakarta by military coup and
install a junta. Email it to every single Indonesian military email address
you can lay your hands on.

Encypt sensitive commerical information from your workplace and email it to
your friends. (if you don't wish to damage your employer you can
always use a totally bogus key, you coward).

Ring your friends and talk about the type of security responses you
expect from the authorities for the different operations and your agreed
responses (when to escalate, when to back down, and so forth). Mention the
healthy profit you derived from the whitegoods supplied thru "our contact in
Mexico City", and remind your leiutenants that they will have an excellent
selection of arms available because of it. Detail some.

Write love letters that purport to be from the CMDR US SEVENTH FLEET to his
bondage mistress in Honululu. Use freemail accounts for that one; include a
plausible explanation.

Try phoning known government extension numbers and make indiscrete
inquiries about things they might be interested in.

Have an email discussion on naval ship movements from your home port
with Chinese journalists. Make sure you keep a detailed account of the
numbers on their bow. Extra brownies for looing up in a Jane's for the ship
names. Discuss their operational capabilities and potential deployment
assignments (this information is often publically available).

and so on!
happy jamming,

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance—not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to