I recognized the basic schema in the following from the history of the French Resistance movement. The idea is for critical information to be held in separate "cells" each of which knows only enough to inteact with the others, but not enough to compromise the entire net. ************************************************************************** Consider three sets of code in three computers that constitutes a "Family"(the whole program). "Grandpa" talks to "Pa". "Pa" then talks "Son". "Son" then talks to "Grandpa". Each "Family" member closely monitors its cup clock & if its expected message is not received on time - it suicides! Capture "Pa" & in seconds, "Grandpa" & "Son" take their own lives! That is to say, they scramble certain essential parts of themselves including cryptographic sections. ************************************************************************** In any covert activity, many conditions will lead to a mission abort. This is largely due to the paranoid nature of the activity and the low level of trust in others neccessitated by said activity. If even one aspect seems "wrong" the meeting, transmission, transfer, trade, whatever, is called off. No offense intended, and ususally none taken. When you are trying to be covert, everyone fears compromise. A computer system so paranoid that it swallows a poison-pill whenever it suspects unauthorized tampering (read: investigation) would be fairly secure, but unreliable. ***Many*** conditions would trigger the "trip-wire" mech- anisms so the system would have to have a high order of built-in redundency. What it always boils down to is, "who do you **really** trust?". Or, boy was my face red when I found out I vouched for my best friend's public key only to find out that he worked for the NSA. (Think it doesn't happen? HUMINT will tell you much more than Signal Analysis ever will.)