Reply
Tue 19 Jul, 2011 07:42 pm
I'm writing a spy thriller and need to know the following:
Person A in an Intelligence Service sends without permission a damning top secret file to Person B outside that Service. How would it be possible for Person B, the receipient of that top secret file, to prove it is authentic, that it came from that Service? Would it be possible for him to show that SERVICE-SPECIFIC ID computer codes, imbedded in that Intelligence Service's file, prove that file was authentic, that it did come from that Service?