Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
TAP Magazine - Issue #108

TAP Magazine - Issue #108

Ratings: (0)|Views: 88|Likes:
Published by GBPPR
January 2009
January 2009

More info:

Published by: GBPPR on Feb 25, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

02/25/2012

pdf

text

original

 
TAP - Issue #108 – January, 2009
Copyright © 2008, 2009 by TA Productions. All rights reserved.
Page 1
 
`
Issue #108 Jan. 2009
The legend returns!
In this issue:-> Principles ofSecureCommunications-> Packet Fun-> FRS Base Charger12Vdc Conversion-> Can AmericaFall?-> Tools of theTradePHREAK REPORT
 
TAP - Issue #108 – January, 2009
Published (on & off) since 1971. Welcome to the reincarnation ofthe legendary and originaltechnological underground newsletter.
TAP ISSUE #108
January, 2009
Copyright © 2008, 2009 by TAPublications and NESOG. Allrights reserved.
TABLE OF CONTENTS:
Pg. 2 -
Principles of SecureCommunications
, by Mark O'RyanPg. 7 -
Packet Fun
, by LostbakaPg. 10 -
FRS Base Charger 12VdcConversion
, by Dr.NoxxPg. 12 -
Can America Fall?
, byCorcceigh GreenPg. 20 –
Tools of the Trade
, byTicomPg. 28 –
Phreak Report
Principles of SecureCommunications
by Mark O'Ryan
“War is nothing but thecontinuation of politics by other means” 
-Carl Von ClausewitzThe means to communicatebetween operational elements isof greatest importance and thehistory of military, lawenforcement and intelligenceoperations has evidenced thisrepeatedly. Communicationbetween operational elements,individual or organizational,must be secured to preventexploitation by the Opposition,to prevent compromise ofoperational activities and aboveall, maintain the security(anonymity) of the operator.Advances in technology andlegislation have greatlycontributed to the effectivenessof the Opposition. The physicaland legislative tools availableto compromise your liberty,subordinate you to the state andprevent any meaningful change arewell reported. National SecurityLetters, no-knock warrants,reduced legal thresholds for alltypes of surveillance, coupled toa judicial system that favors theOpposition and not the citizen,make it necessary that activistslearn, understand and employtechniques and methodologies oncereserved for clandestineintelligence officers and specialmilitary forces. These techniques
Copyright © 2008, 2009 by TA Productions. All rights reserved.
Page 2
 
TAP - Issue #108 – January, 2009
of the underground arts andsciences facilitate your libertyby preventing imprisonment andcontribute to the success of anyactivity.Employing clandestinetradecraft correctly keeps youfree to conduct politicalactivism and other operationalacts as required.To appreciate securecommunications, the operator mustunderstand the difference betweenovert, covert and clandestinecommunications. While the wordsclandestine and covert arepopularly used synonymously,these are different modes ofaction and have separatedefinitions.A covert act is one wherethe parties remain unknown butthe act is known. A clandestineact is where the act isconcealed, and an overt act isobservably conducted betweencommunicants.
Overt, Covert and ClandestineCommunications
Overt communication is mostfamiliar to all of us. We do thisall of the time. The fact ofcommunicating with other partiesis not concealed, nor is the themessage (voice, text, image)concealed. The meaning of thecommunication is not concealed.Two persons speakingtogether in a public environmentis an overt communication. Forexample, Bill and Alice are oldfriends and meet regularly at alocal park to converse abouttheir lives. They make noattempt to conceal either theirmeeting or communication. Boththe meaning and act ofcommunication are not concealed.When we talk with a friend viatelephone or exchange textmessages via computer, we areengaging in overt communication.Even if encrypted, the fact thatparties exist and the fact thatcommunication is taking place isknown to all that care toobserve. This is fine for oureveryday usage, but sensitiveactivities that carryimprisonment, death or other harmrequire greater security.We provide this securitythrough the application ofprinciples that deny some or allparts of the communicationsprocess.A covert communication(COVCOM) occurs when the fact ofcommunications is known, but thecommunicants are unknown. Anexample is the Blind TransmissionBroadcast (BTB). The fact that aradio operator is transmitting isnot hidden, but the identity ofthe communicants is not revealed.An example of COVCOM is wellknown to most people. An alliedintelligence officer in WWIIsending a radio report fromGermany to England makes noattempt to conceal the fact ofthe communication, but the senderand recipients are unidentified.In this case, the fact ofcommunication is not hidden, but
Copyright © 2008, 2009 by TA Productions. All rights reserved.
Page 3

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->