You are on page 1of 1

Traffic-flow security

The use of measures that conceal the presence and properties of valid messages on a
network to prevent traffic analysis.
This can be done by operational procedures or by the protection resulting from features
inherent in some cryptographic equipment.

Traffic-flow Security Techniques:

1. Changing radio call signs frequently


2. Encryption of a message's sending and receiving addresses (codress messages)
3. Causing the circuit to appear busy at all times or much of the time by sending
dummy traffic sending a continuous encrypted signal, whether or not traffic is
being transmitted.

Call Signs:
Every licensed Radio Amateur is given a call sign that is used to identify you and your
location of license. Each country that has Amateur Radio status is allocated a range of
call signs by the International Telecommunications Union (ITU). See below for pages
containing these country allocations

You might also like