An excellent primer here:
COMSEC for 2021
A lot of folks are wondering what happens if things get spicy. Big Country has been posting tactical tips, as did Aesop last year (it doesn't look like he has a blog post tag for these so you'll have to dig). Other folks are posting, and they have an expertise there that I simply don't.
On the other hand, I do have a (professional) background in COMSEC - Communications Security. This post is how to pull off a level of COMSEC and OPSEC that will make it harder for you to end up on The Powers That Be's radar. Note that I said harder, not impossible. Ross Ulbricht messed up OPSEC, and he was very good at it. A professional grade level of paranoia is not just desirable, it's probably mandatory.
One thing that I keep seeing repeated is the phrase "Be the Gray Man". That's the primary objective here. That will limit the sorts of communications that you will be able to (hopefully) keep off TPTB's radar. And so what I'm going to write about here is not useful for voice or email protection (mostly), and won't help with GPS geolocation tracking. It's purely a thought experiment on how to transmit decently large quantities of information without TPTB being likely to understand the content, or even know that information is likely being transmitted at all.
That last point is the key. Traffic Analysis is pretty terrifying, at least to those in the know, and was by far the biggest issue in the whole Snowden/NSA brouhaha. I'm not sure that this solves that problem, but it takes some steps in that direction. Remember, your mileage may vary, void where prohibited, do not remove tag under penalty of law.
Lots of great advice and links to open source applications.
Leave a comment