ANC Covert Communication System in Apartheid South Africa
Historical Setting and Demographics
- South Africa located at the southern tip of the African continent.
- Population circa mid-1980s: 57,000,000 people.
- 80% Black
- 8.8% Coloured (mixed-race classification in South Africa)
- 8.4% White
- 2.5% Indian & Asian
Apartheid Overview ( 1948→early 1990s )
- System of legally enforced, institutionalized racial segregation.
- Two levels of apartheid:
- Petty Apartheid
• Segregation in day-to-day facilities, events, restaurants, public spaces. - Grand Apartheid
• Structural segregation in housing, employment, education, political rights.
African National Congress (ANC)
- Founded 1912; political movement opposing apartheid.
- Nelson Mandela’s party.
- Initially non-violent.
- Shift after the Sharpeville Massacre ( 1960 ): South African police fired on peaceful protesters.
- Post-1960 repercussions:
- ANC officially banned inside South Africa.
- Leadership forced into exile (Zambia, London, many other countries).
- Still maintained covert operatives inside South Africa.
Communication Challenges for the Banned ANC
- Need: Reliable, secure links between exiled leadership and undercover operatives.
- Early techniques employed:
- Limitations of early methods:
- Very low bandwidth (tiny amounts of data per message).
- Tedious manual encryption → users avoided communicating as frequently as necessary.
Design Requirements for a New Mid-1980s System
- Asynchronous operation
• Parties could rarely be “online” (or at the phone) simultaneously. - Covert usage
• Both computers and overt encryption raised suspicion under apartheid security forces. - Long-distance resilience
• Messages traveled from locales such as London → Johannesburg, introducing noise & errors. - Public-space operability
• Many safe houses lacked private phone lines; operators relied on public phone booths.
Computing Environment of the Era
- Personal computers existed but were uncommon and conspicuous.
- Computers kept in safe houses to avoid detection.
- Benefit: Automated encryption → could protect large message volumes.
Core Hardware/Software Components
- Computer with custom encryption programs (location: safe house).
- Acoustic modem:
• Converts digital ciphertext → audio tones.
• Operates asynchronously (sender & receiver modems need not be connected concurrently). - Portable tape recorder (compact, innocuous).
- Public phone booth.
- London safe-house telephone number equipped with a simple answering machine.
Step-by-Step Message Flow (Sender → Receiver)
- Sender (e.g.
in Cape Town) types plaintext on the safe-house computer. - Computer runs encryption algorithm → outputs ciphertext.
- Ciphertext fed into acoustic modem → converted to an audio stream.
- Audio recorded onto a cassette via portable tape recorder.
- Sender walks to a public phone booth (hiding technology in plain sight).
- Dial London safe-house number; call connects to an answering machine.
- Play recorded audio down the phone line; answering machine captures the tones.
- Some time later, Receiver (e.g. in Johannesburg) visits a phone booth with their own tape recorder.
- Calls the same London number; answering machine plays back stored audio.
- Receiver records the playback onto cassette, returns to their safe house.
- Playback cassette into acoustic modem → digital ciphertext recovered.
- Computer decrypts → original plaintext message displayed to receiver.
Architectural Advantages & Innovations
- Asynchronous by design: answering machine acts as a temporary buffer → no sender/receiver synchronicity needed.
- Covert appearance:
- Tape recorder small; using a public phone appeared routine.
- No direct computer–phone-booth interaction (avoids suspicious hardware setups).
- Long-distance robustness:
- Audio tones survive trans-continental telephone circuits; any line noise handled by modem error-correction.
- Scalability: Same London answering machine could queue multiple messages for various operatives.
Lecturer’s Reflections & Broader Crypto Context
- Speaker has ~15 years in cryptography, 20 years in computer science, yet never encountered this design → underscores its historical obscurity.
- Demonstrates real-world ingenuity when facing severe political oppression.
- Foreshadows many modern concepts:
- Store-and-forward messaging (e.g. email servers, voice mail).
- Asynchronous encrypted communications (e.g. Signal, WhatsApp when recipients are offline).
- Steganographic use of everyday devices to mask encryption activity.
Ethical & Practical Implications
- Encryption as a tool of liberation vs. instrument of suspicion:
• Under apartheid, mere possession of encryption/computers could be incriminating. - Highlights ethical responsibility of technologists: design solutions that protect at-risk populations.
- Demonstrates that low-tech components (answering machines, tape recorders) can synergize with high-tech cryptography to achieve sophisticated security goals.
- Constraints breed creativity; understanding user environment (public phone booths, scarce lines) is crucial.
- Covert channels need not be high-bandwidth; reliability & plausible deniability often more important.
- Asynchronous design patterns remain fundamental in distributed secure systems.
- Historical case studies reveal timeless principles applicable to contemporary activism, journalism, and secure communications.