July 7th, 2024

Modern-day spying: sometimes old technology is more secure

Number stations, such as the "Lincolnshire Poacher," are historic espionage tools dating back to the mid-1960s. Despite the Cold War's end, these stations persist, with increased activity noted since the mid-2010s, raising questions about their relevance today.

Read original articleLink Icon
Modern-day spying: sometimes old technology is more secure

Number stations, like the infamous "Lincolnshire Poacher," have been a staple of espionage communication since the mid-1960s. These stations broadcast coded messages over shortwave frequencies, believed to be used by spy agencies like MI6 to communicate with field agents. Despite the end of the Cold War, many number stations continue to operate, with increased activity noted since the mid-2010s, including broadcasts in voice, Morse code, and digital signals. Priyom.org tracks these stations, highlighting Russia as a prominent user. The persistence of these old-school broadcasts raises questions about their relevance in an era dominated by advanced technologies.

Related

Before Smartphones, an Army of Real People Helped You Find Stuff on Google

Before Smartphones, an Army of Real People Helped You Find Stuff on Google

Before smartphones, human-powered services like GOOG-411, 118 118, and AQA provided information. They declined with cheaper data plans, giving way to automated search engines, missing the personal touch and unique responses.

Sweden reports Russian jamming against Astra satellites

Sweden reports Russian jamming against Astra satellites

Sweden reports Russian jamming signals affecting Astra satellites to ITU, disrupting northern European communications. Interference targets SES-operated satellites in Scandinavia, sparking concerns amid broader radio war in Eastern Europe. Flight suspensions and communication challenges ensue.

Why GPS Is Under Attack

Why GPS Is Under Attack

The Global Positioning System (GPS) faces threats from jamming and spoofing attacks, affecting commercial flights. American GPS risks obsolescence compared to other systems. Vulnerabilities impact various sectors.

Leaks reveal how Russia's foreign intelligence runs disinformation campaigns

Leaks reveal how Russia's foreign intelligence runs disinformation campaigns

Leaked SVR correspondence unveils "Project Kylo," a disinformation campaign targeting the West. The operation aimed to incite fear and anti-government sentiments through fake news and social media manipulation, emphasizing fear and manipulation tactics.

Leaks reveal how Russia's foreign intelligence runs disinformation campaigns

Leaks reveal how Russia's foreign intelligence runs disinformation campaigns

Leaked SVR correspondence unveils "Project Kylo," a disinformation campaign targeting the West. SVR planned to incite anti-government sentiments through fake NGOs, news sites, and social media, emphasizing fear and manipulation tactics.

Link Icon 20 comments
By @matt_daemon - 5 months
This whole Technology Quarterly was terrifically written and researched for those wanting further reading: https://www.economist.com/technology-quarterly

They're all on the Internet Archive to read free, e.g. https://archive.md/Ed12X

By @roody15 - 5 months
This article makes me think of an intercom system I maintain at one of our buildings. The fact that it is offline and each location is physically wired = it’s safe and secure. Another school district about 80 miles away had their systems hacked including phones, cameras and intercom .. as they were all meter and “cloud” based.

Just makes me rethink does everything thing need internet access. Sometimes perhaps simple safe and secure may fit better. Kind of off topic of this article but the concept just kind of got me thinking out loud.

By @bmurray7jhu - 5 months
Matt Blaze's analysis of the flawed OTPs used by Cuban numbers stations: https://www.mattblaze.org/blog/neinnines/
By @jwsteigerwalt - 5 months
(1) a one time pad is and will remain highly secure (2) blocking shortwave radio (even if you are a nation state) is more difficult then taking down web assets. (3) there are benefits to security by obscurity when its part of a layered approach with constant maintenance and feedback (#3 is my controversial take)
By @heinrich5991 - 5 months
By @barbs - 5 months
Sort of related - someone uses Windows 98 and tries to install a virus, but can't.

https://youtu.be/mbbRUDexuBk

By @dfc - 5 months
This is the article by Ingesson and Andersson.

Clandestine communications in cyber-denied Environments: Numbers stations and radio in the 21st century

https://www.tandfonline.com/doi/epdf/10.1080/18335330.2023.2...

By @StiffFreeze9 - 5 months
Radio receivers have significant digital components which may leave more trail than the spy intends.

I like how some malware hides in plain sight and relays through google analytics.

By @tahoeskibum - 5 months
Sounds like the storyline for Battlestar Galactica :-)
By @davidgerard - 5 months
By @a-dub - 5 months
see also: the conet project. home recordings of numbers stations from around the world:

https://en.wikipedia.org/wiki/The_Conet_Project

audio now free on the internet archive:

https://archive.org/details/ird059

By @weitendorf - 5 months
Not really a good article. You can and should apply the exact same argument to number stations as you apply to all the technology they criticize: they are vulnerable to being compromised at the supply-chain/provenance level. I'm not a radio expert but I'm also pretty sure that you can interfere with their signals. And you can communicate using OTPs using a computer network as long as you're smart about it.

Actually the one interesting point made is that nobody can track whether you're tuning into a particular station. On a network, there has to be some traceable path of connections between the transmitter and receiver: even if the message is hidden in some other content or transmitted through a bunch of proxies, that traceable flow of data must exist. It makes me wonder how common it is to open ephemeral p2p connections over shortwave to transmit data between two computers - I'm sure someone's thought of it, and I think I brought it up one time during a quant firm system design interview.

By @az09mugen - 5 months
Security by obsolescence
By @localfirst - 5 months
how do you create encrypted communication that isn't easily triangulated?

some youtubers are pushing LoRa but its hardly secure or encrypted

creating your own number station requires shortwave broadcast which takes up a ton of power and your station is known

the only way to break 5E is good old paper with one time pad encryption with dead drops but its hardly efficient

By @guardianbob - 5 months
Fax Machines FTW baby
By @1vuio0pswjnm7 - 5 months
"Radio is more resilient than software."
By @sreejithr - 5 months
No shit
By @andix - 5 months
I think those old technologies are still around, because it's hard to train older spies on new technology. They learned that knowledge decades ago and would have a hard time to learn new things. So they let them use the stuff they know, instead of risking some boomer making an opsec mistake by updating their Facebook status on a secure device while doing sensitive communication.