Professional Documents
Culture Documents
Encrypted Communication System Designed To Defeat Intelligence Agency Traffic Analysis
Encrypted Communication System Designed To Defeat Intelligence Agency Traffic Analysis
Background of Invention
Users that win may receive prizes from the organization that
operates the system. Advertisers may advertise goods and services
on the system for advertising fees. This money may be used to issue
prizes to users, where the system is best established as a non-profit
to maximize the effect. An organization operating the system may
contribute its own money into the system, which would result in
the issuance of more prizes, and encourage more users to create
redundant traffic. The system may also seek anonymous donations
for prizes.
The system may offer to users the games of Poker, Blackjack, slot
machines, and other common casino games. The system may hide
or assign a false identity to Poker Room users. A poker player’s
name may be changed daily by the system. The amount of gambling
chips the user possesses in total may not be displayed to other
users, where only a portion of the person’s chips may be shown to
other users, such as what is “on the table” and “in play”. A player
who loses all his/her chips may be transferred to a different poker
room and allowed to reload from his/her remaining chips. A name
change may occur between rooms. These practices may not only
prevent traffic analysis from intelligence agency infiltration into
poker rooms, but also prevent people playing teams in a poker
room. Playing teams in poker gives an unfair advantage to the
team, which is why casinos insist on English at the table, no text
messaging, and especially no hand signals. A user may not be
permitted to change poker rooms more than once a day, or search
for “friends”. These tactical means may be explained to the poker
players as to reasons behind the security issue. This may allow the
system to establish a reputation of fairness within the gambling
community, where typical online poker is completely corrupted by
players working in teams.
The system may contain a standard text chat app, which also allows
for the transmission of files, documents, and pictures. The system
may require users create their own usernames, where these
usernames may have no correlation to their actual names or phone
numbers. These surnames may be transmitted to each other by
alternative means to the system. When a document, picture, or file
is sent, the system may divide the file into multiple components.
The system may send the file to multiple mobile devices as Ghost
Packets, however only the intended recipient may view the sent
file. This may further confuse network traffic analysis as to who, the
file was sent to.
An intelligence agency may attempt to target mobile phones that
are not using voice communications, as this may indicate a device
used by a covert agent. Covert agents may also/instead use
desktop computers or tablet devices on various local networks, so
voice calls become unnecessary. Or a covert agent may in turn,
allow other trusted individuals to place regular phone calls to avoid
being placed in the category of “no phone calls”. These calls should
obviously not be to other mobile phones used by the covert
network, but rather to business and other social calls that do not
relate to the covert communication the device is used for. The
covert agents may wish to turn on the GPS feature from time to
time when the transmission of position wouldn't be dangerous, to
not be placed in that category of a phone that never uses GPS. A
covert agent should rotate phones as he/she allows other trusted
people to use the phones for voice calls/generating random traffic,
or simply use a mobile device on various publicly available
networks.