Anon Archived Serious thread: infosec, opsec, guerrilla war, advice (8chan)
submitted ago by 2980539?
Posted by: 2980539?
Posting time: 1.9 years ago on
Last edit time: never edited.
Archived on: 4/19/2019 10:00:00 AM
Views: 308
SCP: 1
1 upvotes, 0 downvotes (100% upvoted it)
Anon Archived Serious thread: infosec, opsec, guerrilla war, advice (8chan)
submitted ago by 2980539?
view the rest of the comments →
[–] 16203838? ago
First Means: The Telephone:
Because of significant technological advances, security measures for monitoring the telephone and broadcasting equipment have increased. Monitoring may be done by installing a secondary line or wireless broadcasting device on a telephone that relays the calls to a remote location…That is why the Organization takes security measures among its members who use this means of communication (the telephone).
[2.] Cell or cluster methods should be adopted by the Organization. It should be composed of many cells whose members do not know one another, so that if a cell member is caught the other cells would not be affected, and work would proceed normally.
UK/BM-31 TRANSLATION
Conversation should be coded or in general terms so as not to alert the person monitoring [the telephone].
Periodically examining the telephone wire and the receiver.
Telephone numbers should be memorized and not recorded. If the brother has to write them, he should do so using a code so they do not appear as telephone numbers (figures from a shopping list, etc.)
5 . The telephone caller and person called should mention some words or sentences prior to bringing up the intended subject. The brother who is calling may misdial one of the digits and actually call someone else. The person ‘called may claim that the call is for him, and the calling brother may start telling him work-related issues and reveal many things because of a minor error.
In telephone conversations about undercover work, the voice should be changed and distorted.
When feasible, it is preferable to change telephone lines to allow direct access to local and international calls. That and proper cover facilitate communications and provide security protection not available when the central telephone station in the presence of many employees is used.
When a telephone [line] is identified [by the security apparatus], the command and all parties who were using it should be notified as soon as possible in order to take appropriate measures.
When the command is certain that a particular telephone [line] is being monitored, it can exploit it by providing information that misleads the enemy and benefits the work plan.
UK/BM-32 TRANSLATION