First, at least some of the time during that period, the Russian numbers were relayed by the Cuban numbers broadcasts (a powerful station co-located with Radio Havana's transmitters in Lourdes, Cuba that is easily heard in the US). This was well after the Soviet Union fell.
-
Show this thread
-
But that's not that surprising either. The Cuban shortwave station is extremely powerful, easily heard in the US, and operates so often (currently 12 hrs a day) that people have derived its schedule and posted it to the Internet. But around 2005, something odd started happening.
1 reply 9 retweets 83 likesShow this thread -
The station sticks to a rigorous schedule. Every hour, on the scheduled frequency, a numbers broadcast starts. Standard practice is to use random fill traffic if there's no actual message for the agent listening in a given timeslot. That thwarts traffic analysis. Except...
2 replies 12 retweets 87 likesShow this thread -
One time pad ciphertext should always uniformly distributed with the digits 0-9. But around 2005 or so, a large number of the Cuban broadcasts inexplicably did not include the digit "9". No "nueve" at all. The probability of that happening in real OTP ciphertext is infinitesimal.
1 reply 24 retweets 126 likesShow this thread -
But other transmissions would include 9s just as they always did. The most plausible explanation was that the 9-less messages were dummy fill traffic, and that something had gone wrong with the random number generator and it wasn't including all the digits. This is, um, bad.
8 replies 17 retweets 138 likesShow this thread -
The effect is that it's now easy to distinguish cover traffic from real traffic, leaking enormously useful information for traffic analysis. You really don't want that if you're trying to hide how many spies you have and how busy they are. Anyway, back to Strzok...
1 reply 14 retweets 115 likesShow this thread -
The Strzok book doesn't mention any of this stuff about the 9's, except to say that they were listening the Cuban transmissions at a particular time and also that there was a big error on the part of the sender: there were no messages sent when the spy couple was out of town.
1 reply 12 retweets 109 likesShow this thread -
I strongly suspect this was an oversimplification. What was likely going on was that the FBI/NSA figured out about the 9's (I noticed it out, so surely they did, too) and correlated the 9-less messages during their slot with times they were traveling. And that helped finger them.
4 replies 14 retweets 137 likesShow this thread -
The interesting thing here is that this now at least the second time that the Russians/Soviets have been burned by sloppy OTP practices. The first was, more famously, the re-use of OTPs in the Venona traffic. Anyway, as they say on the radio... FINAL FINAL
6 replies 14 retweets 166 likesShow this thread -
Also, remember this story next time someone tries to sell you their super-secure one-time-pad-based crypto scheme. If actual Russian spies can't use it securely, neither can you.
10 replies 34 retweets 217 likesShow this thread
-
-
-
Replying to @mattblaze
I could ruin your career now just by deleting the tweet you replied to
1 reply 0 retweets 5 likes - Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.