Black Unicorn (unicorn@schloss.li)
Mon, 06 Apr 1998 14:32:09 -0500
At 01:47 AM 4/6/98 , Nicholas Charles Brawn wrote:
>Is anyone on this list familiar with any examples of how intelligence
>and/or the military "watermark" limited distribution documents (ie, with
>sensitive and higher classifications)?
>
>regards,
Canary Trapping.
It's generally done by typesetting differences, (font, margins, tab size)
which will be preserved in the event the document is xeroxed or photograph.
To catch things which are transcripted unique wording and phrases are
employed "such as" being replaced with e.g., "for example" or "e.g." or
whatever and the differences referenced with the document inventory number.
That kind of thing is rarely done unless on extremely sensitive material,
or as part of a counterintel operation because its labor intensive, and
cannot be easily automated (in the case of phrase and word substitution)
without the danger of changes in meaning. This will be recognized as the
translating computer problem, which is, of course, decades old. It's also
fairly easily thawrted with e.g., OCR and translation (in the event the
attacker is foreign).
I might add, it's not particularly on topic for CodherPlunks.
The following archive was created by hippie-mail 7.98617-22 on Fri Aug 21 1998 - 17:16:54 ADT