[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Spoofing Clipper



I had a fun idea.  Imagine getting enough information together to
spoof clipper transmissions?  The idea being to disguise other types
of secure transmissions as clipper ones. 

What would be needed would the escrow encryption identifer, a bunch of
damaged LEAF/IV assemblies and a transmission channel that wouldn't
be easily distinguishable from data portions of a clipper transmission.
You start the channel up prepending one of a large number of spoofed
LEAF/IV assemblies.  

With enough of these traversing the ether, the chaff/wheat noise ratio
goes down to where having a source identifier (ID in the LEAF) gets
real hit or miss - to where it loses traffic analysis value.  Sort of
growing weeds intentionally on the information superhighway.