Simple counter-intelligence procedures. If you know you have a compromised channel of SIG, flood it with disinformation. It instantly becomes useless to your adversary. If you don’t have two sets of cyphers to verify sender, anyone can flood the channel with disinformation. Making the source useless.
Even worse, it can be used to lead your adversary to complacency or into the kill box.
Did you sign up on FR just to troll the Q thread?
That seems odd. Almost as if you were an enemy agent.
Are you an enemy agent? If I ask you, you have to tell. That's the law. Its in the Constitution.