Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: LuciusDomitiusAutelian

Simple counter-intelligence procedures. If you know you have a compromised channel of SIG, flood it with disinformation. It instantly becomes useless to your adversary. If you don’t have two sets of cyphers to verify sender, anyone can flood the channel with disinformation. Making the source useless.

Even worse, it can be used to lead your adversary to complacency or into the kill box.


40 posted on 05/11/2021 10:15:15 AM PDT by LuciusDomitiusAutelian (netstat -an | grep BS)
[ Post Reply | Private Reply | To 27 | View Replies ]


To: LuciusDomitiusAutelian

https://fas.org/irp/doddir/army/fm34-60/fm34-60b.htm

Appendix B


46 posted on 05/11/2021 10:27:48 AM PDT by LuciusDomitiusAutelian (netstat -an | grep BS)
[ Post Reply | Private Reply | To 40 | View Replies ]

To: LuciusDomitiusAutelian
Even worse, it can be used to lead your adversary to complacency or into the kill box.

Did you sign up on FR just to troll the Q thread?

That seems odd. Almost as if you were an enemy agent.

Are you an enemy agent? If I ask you, you have to tell. That's the law. Its in the Constitution.


78 posted on 05/11/2021 10:55:39 AM PDT by bagster ("Even bad men love their mamas".)
[ Post Reply | Private Reply | To 40 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson