As a follow up to my communication frequencies post, a continuation of my communication series:
The conspirators who were responsible for the Fusion GPS dossier and wiretapping of the NYC election headquarters of Trump’s campaign were using HAM radios to communicate and coordinate this effort, in violation of Federal law. No one at the FCC cared.
Then word came down that people involved in the January 6 Capitol incursion were using HAM radios, so the FCC decided to begin looking out for that. Because of this, any communications that we are conducting need to be encoded in such a way as to not appear to be a code.
The answer to that is in cryptonyms. Setting up a cryptonym system is easy. All it takes is to setup a set of codewords that can be used in a sentence.
People pick up pseudonyms that don’t sound like pseudonyms. Generating them is as easy as using a random name generator. Locations can also be generated. You can give a place a random person’s name. Actions can receive a random verb.
When you transmit, you can still use your callsign:
This is WX4 NNE. John Davidson, are you there? (John Davidson doesn’t exist. That name is a code word for an asset you want to send a message to)
Another station answers:
This is KK2 WXA. John is helping Karen Bartow this weekend with her tennis game. He said he would see you on Monday at the gym.
Now the asset “John Davidson” just told you that he met the asset “Karen Bartow” this weekend at the Walmart on 23rd street (code named tennis court) and would update you by Monday by leaving the information at the dead drop (code named “the gym”).
You get the point. Use your imagination.