[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Spoofing Nuclear Weapons and PGP




Responding to msg by [email protected] (Mikolaj 
Habryn) on Thu, 25 Aug  5:51 PM

>not really certain. *shrug* sorry. Read some books on 
>it - the  amount of literature which should be 
>classified but is freely available  is mind-boggling.


To tie this back to crypto and technology:

Under a sub-sub-sub-contract I once worked on some phony CAD 
drawings for the nuclear weapons production process, plotting 
false info that still appears in popular books, some of which 
has been posted here.

The docs were then encrypted and stegonagraphied for 
authenticity.  We were told that they were turned loose on the 
market for this product in other countries.

I don't know if the USG was involved, there no security 
clearances.  It may have been a commercial scam.

Also, growing up not to far from LANL, I was told that kids of 
staff were encouraged to chat about B-this  and W-that by the 
security people there as part of the fog around that outfit.

This supports the suggestion for profligate use of PGP as a 
stratagem, to make it harder to tell the trivial from the 
other.

Or is public encryption a stratagem to focus on software rather 
than hardware?

Anybody hear anything about covert ID in new-generation CPUs, 
like done with supercomps?


John