ANC Covert Communication System in Apartheid South Africa

Historical Setting and Demographics

  • South Africa located at the southern tip of the African continent.
  • Population circa mid-1980s: 57,000,00057,000,000 people.
    • 80%80\% Black
    • 8.8%8.8\% Coloured (mixed-race classification in South Africa)
    • 8.4%8.4\% White
    • 2.5%2.5\% Indian & Asian

Apartheid Overview ( 1948early 1990s1948 \rightarrow \text{early }1990\text{s} )

  • System of legally enforced, institutionalized racial segregation.
  • Two levels of apartheid:
    • Petty Apartheid
      • Segregation in day-to-day facilities, events, restaurants, public spaces.
    • Grand Apartheid
      • Structural segregation in housing, employment, education, political rights.

African National Congress (ANC)

  • Founded 19121912; political movement opposing apartheid.
  • Nelson Mandela’s party.
  • Initially non-violent.
    • Shift after the Sharpeville Massacre ( 19601960 ): South African police fired on peaceful protesters.
  • Post-1960 repercussions:
    • ANC officially banned inside South Africa.
    • Leadership forced into exile (Zambia, London, many other countries).
    • Still maintained covert operatives inside South Africa.

Communication Challenges for the Banned ANC

  • Need: Reliable, secure links between exiled leadership and undercover operatives.
  • Early techniques employed:
    • Secret inks.
    • Book codes.
  • Limitations of early methods:
    • Very low bandwidth (tiny amounts of data per message).
    • Tedious manual encryption → users avoided communicating as frequently as necessary.

Design Requirements for a New Mid-1980s System

  1. Asynchronous operation
    • Parties could rarely be “online” (or at the phone) simultaneously.
  2. Covert usage
    • Both computers and overt encryption raised suspicion under apartheid security forces.
  3. Long-distance resilience
    • Messages traveled from locales such as London → Johannesburg, introducing noise & errors.
  4. Public-space operability
    • Many safe houses lacked private phone lines; operators relied on public phone booths.

Computing Environment of the Era

  • Personal computers existed but were uncommon and conspicuous.
  • Computers kept in safe houses to avoid detection.
  • Benefit: Automated encryption → could protect large message volumes.

Core Hardware/Software Components

  • Computer with custom encryption programs (location: safe house).
  • Acoustic modem:
    • Converts digital ciphertext → audio tones.
    • Operates asynchronously (sender & receiver modems need not be connected concurrently).
  • Portable tape recorder (compact, innocuous).
  • Public phone booth.
  • London safe-house telephone number equipped with a simple answering machine.

Step-by-Step Message Flow (Sender → Receiver)

  1. Sender (e.g.
    in Cape Town) types plaintext on the safe-house computer.
  2. Computer runs encryption algorithm → outputs ciphertext.
  3. Ciphertext fed into acoustic modem → converted to an audio stream.
  4. Audio recorded onto a cassette via portable tape recorder.
  5. Sender walks to a public phone booth (hiding technology in plain sight).
  6. Dial London safe-house number; call connects to an answering machine.
  7. Play recorded audio down the phone line; answering machine captures the tones.
  8. Some time later, Receiver (e.g. in Johannesburg) visits a phone booth with their own tape recorder.
  9. Calls the same London number; answering machine plays back stored audio.
  10. Receiver records the playback onto cassette, returns to their safe house.
  11. Playback cassette into acoustic modem → digital ciphertext recovered.
  12. Computer decrypts → original plaintext message displayed to receiver.

Architectural Advantages & Innovations

  • Asynchronous by design: answering machine acts as a temporary buffer → no sender/receiver synchronicity needed.
  • Covert appearance:
    • Tape recorder small; using a public phone appeared routine.
    • No direct computer–phone-booth interaction (avoids suspicious hardware setups).
  • Long-distance robustness:
    • Audio tones survive trans-continental telephone circuits; any line noise handled by modem error-correction.
  • Scalability: Same London answering machine could queue multiple messages for various operatives.

Lecturer’s Reflections & Broader Crypto Context

  • Speaker has ~1515 years in cryptography, 2020 years in computer science, yet never encountered this design → underscores its historical obscurity.
  • Demonstrates real-world ingenuity when facing severe political oppression.
  • Foreshadows many modern concepts:
    • Store-and-forward messaging (e.g. email servers, voice mail).
    • Asynchronous encrypted communications (e.g. Signal, WhatsApp when recipients are offline).
    • Steganographic use of everyday devices to mask encryption activity.

Ethical & Practical Implications

  • Encryption as a tool of liberation vs. instrument of suspicion:
    • Under apartheid, mere possession of encryption/computers could be incriminating.
  • Highlights ethical responsibility of technologists: design solutions that protect at-risk populations.
  • Demonstrates that low-tech components (answering machines, tape recorders) can synergize with high-tech cryptography to achieve sophisticated security goals.

Takeaways for Modern Security Engineering

  • Constraints breed creativity; understanding user environment (public phone booths, scarce lines) is crucial.
  • Covert channels need not be high-bandwidth; reliability & plausible deniability often more important.
  • Asynchronous design patterns remain fundamental in distributed secure systems.
  • Historical case studies reveal timeless principles applicable to contemporary activism, journalism, and secure communications.