Today, we see a growing vulnerability of our communications and how they impact our short term, and long-term lives. With hacking on the rise, electronic protection systems growing more and more complex, Social media nannies, and increased reliance on foreign components (that may have embedded spyware) …Americans are starting to wake up to the thought “maybe what I am saying isn’t private anymore”. You would be correct, and this would hint that a total loss of freedoms of speech and of security of your person has occurred or isn’t far away.
Our liberties are eroding around us in America, and whether we can change the trajectory that our governance is taking us…we can still have some fun playing games. Hey – the military has war games, we can have some too. Today I would like to challenge you all to a game of hide-and-seek. Let me explain.
If you want to hide information that only you and another pre-approved party are privy to, then you need to have ways to conceal that information or encrypt it. Since encryption is not my strongest talent, I will elaborate on the means and methods that allow someone to physically hide and transfer information in a secret manner to minimize the risk of interception. This article will give you means and methods that let you keep your communications obscure and separated from the typical channels. Let’s dive in.
Disclaimer: This article IN NO WAY advocates or encourages criminal activity!
THE DELIVERY
Here are a couple ways that you can be your own James Bond for communications transfers:
Option 1: The Dead Drop
Channel your inner spy with the old classic dead drop. A dead drop is a note, jump drive, CD, signal, etc. that is left in a location that another pre-informed person is supposed to find covertly. The point of a dead drop is that you can transfer a bunch of information where the actual transfer between parties is not witnessed and where both parties are not at the drop point at the same time. This is classic spy tradecraft that you probably read in novels or seen in movies.Continue reading“Silent, Secure Communication – Part 1, by P.J.”
