Skip to content

espionage

When covert messages are passed from hand to hand the governing rule is not to trust what you are getting until you can identify where it came from.

When a system of covert messaging is hi-jacked it can be used to pass messages along the same route but containing dis-information.

Safeguards must be built in.

Plural.

~~

 

What do you call a code with four purposes?

One of instant recognition, one that confirms it, one of disguise then the message itself.

When Mr Francis handed the coded Rubaiyat to Detective Sergeant Leane he did so without knowing any more then anyone else, and very few in Adelaide in 1948 knew the extent of inter-agency secrecy that accompanied the development of weapons of mass destruction in South Australia by Australia and its Allies.

~~

You’ve just been passed this message at a covert meeting. You must identify it’s origin.

Just a glance is enough.

Where would you look?

You’ve got two seconds.

iTTmtsamstgab.

That’s where I’d look.

Meeting over.

Later, there is more time to confirm the message’s origin.

Where would you look?

wrgoababD mliAoi wtbimpaNEetp mliaboaiaqc iTTmtsamstgAb

That’s where I’d look.

Message authentic.

Then the steganography.

Then the message.

 

This slideshow requires JavaScript.

Quote from John le Carre

code pics courtesy of Gordon Cramer

J E S S I C A

D A N E T T A

Now here’s something the codebreakers have yet to try.

One Comment Post a comment
  1. Good thinking Pete, if you get to try out one or more of the online tools, don’t forget to use German as one of the input languages.

    November 1, 2017

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s