This services is available to security-vetted clients and is most frequently used as a “Dead Man’s Switch” or “fail-deadly” mechanism, releasing information or final instruction upon certain conditions being met (decryption key not entered daily/weekly/yearly/hourly, death determined by human operators or heuristic scanners (the media like to refer to it as “AI”.)



Files – automatically published if not disarmed on a frequent basis. Required as secondary physical key held by several people. File and description key are backed up. Autorelease at 11:59PM on the final day of every month by default if not actively reset.

Dead Man’s Switch – from Wikipedia on 10/02/2024

A dead man’s switch is a switch that is designed to be activated or deactivated if the human operator becomes incapacitated, such as through death, loss of consciousness, or being bodily removed from control. Originally applied to switches on a vehicle or machine, it has since come to be used to describe other intangible uses, as in computer software.

These switches are usually used as a form of fail-safe where they stop a machine with no operator from a potentially dangerous action or incapacitate a device as a result of accident, malfunction, or misuse. They are common in such applications in locomotives, aircraft refuelling, freight elevators, lawn mowers, tractors, personal watercraft, outboard motors, chainsaws, snowblowers, treadmills, snowmobiles, amusement rides, and many medical imaging devices. On some machines, these switches merely bring the machines back to a safe state, such as reducing the throttle to idle or applying brakes while leaving the machines still running and ready to resume normal operation once control is reestablished.

Dead man’s switches are not always used to stop machines and prevent harm; such switches can also be used as a fail-deadly, since a spring-operated switch can be used to complete a circuit, not only to break it. This allows a dead man’s switch to be used to activate a harmful device, such as a bomb or improvised explosive device. The switch that arms the device is only kept in its “off” position by continued pressure from the user’s hand. The device will activate when the switch is released, so that if the user is knocked out or killed while holding the switch, the bomb will detonate. The Special Weapons Emergency Separation System is an application of this concept in the field of nuclear weapons. A more extreme version is Russia’s Dead Hand program, which allows for automatic launch of nuclear missiles should a number of conditions be met, even if all Russian leadership were to be killed.

A similar concept is the handwritten letters of last resort from the Prime Minister of the United Kingdom to the commanding officers of the four British ballistic missile submarines. They contain orders on what action to take if the British government is destroyed in a nuclear attack. After a prime minister leaves office the letters are destroyed unopened.

Wikipedia, 10/02/2024

Fail-Deadly – from Wikipedia on 10/02/2024

Fail-deadly is a concept in nuclear military strategy that encourages deterrence by guaranteeing an immediate, automatic, and overwhelming response to an attack, even if there is no one to trigger such retaliation. The term fail-deadly was coined as a contrast to fail-safe.

Military usage

Fail-deadly operation is an example of second-strike strategy, in that aggressors are discouraged from attempting a first strike attack. Under fail-deadly nuclear deterrence, policies and procedures controlling the retaliatory strike authorize launch even if the existing command and control structure has already been neutralized by a first strike. The deterrent efficacy of such a system clearly depends on other nuclear-armed nations having foreknowledge of it. The Soviet Union used a fail-deadly system known as Dead Hand (codenamed “Perimeter”); after the collapse of the Soviet Union, Russia retained the system (although it is now only activated in times of crisis).

Fail-deadly can refer to specific technology components, or the controls system as a whole. The United Kingdom‘s fail-deadly policies delegate strike authority to submarine commanders in the event of a loss of command (using letters of last resort), ensuring that even when uncoordinated, nuclear retaliation can be carried out.[1]

An example of the implementation of such a strategy could be: US Navy ballistic missile submarines are ordered to surface at periodic intervals to receive communications indicating that no change has occurred in the defense condition. Should the submarines be unable to receive the proper command and control signals indicating normal, peacetime conditions, their orders would be to launch their nuclear missiles under the assumption that command and control structures had been destroyed in a nuclear attack and that retaliation was therefore necessary. All available means of verification and all due caution would naturally be applied. This approach is obviously exceptionally dangerous for a variety of reasons, as any benign communications disruption due to technical failure could conceivably incite a completely unnecessary nuclear war. The strategy’s intended value lies in deterrence against attack on command, control, communications, and computer (see C4I) networks by any potential adversary.

Fail-deadly is also associated with massive retaliation, a deterrence strategy that ensures that the counterstrike will be conducted on a larger scale than the initial attack.

Wikipedia 10/02/2024

The final tier of severity here is termed “massive relaliation” – from Wikipedia, 10 February 2024

Massive retaliation, also known as a massive response or massive deterrence, is a military doctrine and nuclear strategy in which a state commits itself to retaliate in much greater force in the event of an attack.


Main article: Assured destruction

In the event of an attack from an aggressor, a state would massively retaliate by using a force disproportionate to the size of the attack.

The aim of massive retaliation is to deter another state from attacking first. For such a strategy to work, it must be made public knowledge to all possible aggressors. The aggressor also must believe that the state announcing the policy has the ability to maintain second-strike capability in the event of an attack. It must also believe that the defending state is willing to go through with the deterrent threat, which would likely involve the use of nuclear weapons on a massive scale.

Massive retaliation works on the same principles as mutual assured destruction (MAD), with the important caveat that even a minor conventional attack on a nuclear state could conceivably result in all-out nuclear retaliation. However, when massive retaliation became policy, there was no MAD yet since the Soviet Union lacked second-strike capability throughout the 1950s.

Wikipedia, 10/02/2024

Leave a Reply

Your email address will not be published. Required fields are marked *