[SFDXA] Attention SWLers - Spy Radio - Old-school spy tech - From Kim Komando

Bill bmarx at bellsouth.net
Sun Jul 14 09:50:26 EDT 2024


  Old-school spy tech

This is one of the coolest things I’ve learned recently: Foreign 
intelligence agencies /still/ use good ol’ radio to share top secrets. 
Even with all the powerful tech at their fingertips, radio use in 
espionage has actually gone /up/ in popularity since the 2010s. Pretty wild.

Russia in particular loves this technique. Why? Intelligence agencies 
don't trust the internet. Makes sense.


    A brief history of spy radio

Foreign agencies have been using shortwave radio frequencies to 
broadcast coded messages for decades 
<https://click.convertkit-mail.com/68u2p86qq5t8hkmo8gvc9uz8850kku9/p8heh9hz6677z8ur/aHR0cHM6Ly93d3cuZWNvbm9taXN0LmNvbS90ZWNobm9sb2d5LXF1YXJ0ZXJseS8yMDI0LzA3LzAxL3NvbWV0aW1lcy10aGUtb2xkLXdheXMtb2YtZXNwaW9uYWdlLWFyZS10aGUtYmVzdA==>.

Starting in the mid-1960s, if you tuned your radio to shortwave 
frequencies between 5.422 and 16.084 megahertz (MHz), you might hear 
music … or you might hear a woman’s voice with an English accent reading 
number combinations.

The U.K.'s MI6 intelligence agency and other spy networks used these 
“number stations” until at least 2008 to talk to operatives in the 
field. Whoa.


    Old tech, new tricks

This tactic is still very much alive and well. In 2020, the FBI 
discovered messages being sent to Russian deep-cover officers living in 
Massachusetts. Just this past March, researchers caught Russia's foreign 
intelligence agency, SVR, broadcasting a test transmission in French.

So what's the advantage of old-school radio? Even encrypted phones can 
be hacked. It’s also easier than ever to plant spyware on an 
internet-connected device.


    Number stations aren't so easily cracked

In each broadcast, the sender and receiver use what's called a "one-time 
pad" to encrypt and decrypt the message. It's basically a matching list 
of random numbers, no fancy spy gear required.

Of course, anyone listening could pick up on /other/ patterns and blow 
up an agency's spot. For example, a broadcast pattern could reveal how 
many agents there are and when or where they're active.

When the FBI discovered the 2020 broadcasts, they realized the messages 
corresponded to the specific /rooms/ active operatives were in!


    Maybe try a homing pigeon instead

The moral of the story: Sometimes old stuff is more reliable than the 
new. Even in today's AI-powered digital and internet age, spies trust radio!

If you /really/ want to geek out and slide into the underground world of 
secret radio messages, check out Priyom 
<https://click.convertkit-mail.com/68u2p86qq5t8hkmo8gvc9uz8850kku9/x0hph6hw2277wktg/aHR0cHM6Ly9wcml5b20ub3JnLw==>, 
a group of international radio enthusiasts who track number stations 
around the world. They have chatrooms to swap stories, and their website 
follows intelligence, military, and diplomatic communication via 
shortwave radio. Happy listening!

https://priyom.org/

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.qth.net/pipermail/sfdxa/attachments/20240714/e6e1a064/attachment.html>


More information about the SFDXA mailing list