The CIA Rigged Foreign Spy Devices for Years. What Secrets Should It Share

Total Page:16

File Type:pdf, Size:1020Kb

The CIA Rigged Foreign Spy Devices for Years. What Secrets Should It Share The CIA rigged foreign spy devices for years. What secrets shouldnow/2020/02/28/b570a4ea-58ce-11ea-9000-f3cffee23036_story.html it share now? By Peter Kornbluh/ senior analyst at the National Security Archive, a nonprofit research center in Washington that advocates for declassification and freedom of information/ Twitter: @peterkornbluh February 28, 2020 The revelation that the CIA secretly co-owned the world’s leading manufacturer of encryption machines, and rigged those devices to conduct espionage on more than 100 nations that purchased them for more than half a century, has generated a number of historical and ethical questions: What did U.S. officials know, and when did they know it, about key episodes in recent world history? How did U.S. policymakers act on the intelligence that was gathered? Did U.S. officials have an obligation, as The Washington Post’s Greg Miller put it, to “expose or stop human rights violations unfolding in their view”? Should the United States have been spying on friends and foes alike? But the most immediate question has yet to be answered: What should the United States do with the massive trove of intercepted communications it obtained and decrypted, along with the thousands of secret intelligence reports those intercepts generated? Those files are gathering dust in the SCIFs — the sensitive compartmented information facilities — of the CIA and the National Security Agency. Hidden away, the documents represent a history held hostage; they have the potential to significantly advance the historical record, not only on U.S. foreign policy but on key world crises and events (wars, coups, terrorist attacks, peace accords) over more than five decades. But their value to history, and the lessons they hold, will become apparent only if and when the documents are declassified and made accessible to the public. ‘We can neither confirm nor deny that such documents exist.” That is a standard, official response by the CIA and the NSA to Freedom of Information Act requests seeking the release of classified documentation on past covert operations and espionage programs, especially those that involve signals intelligence. “SIGINT,” in the parlance of the intelligence community, is gleaned from phone transmissions, telexes, emails, satellites and other forms of electronic communication. Perhaps the most sacrosanct secret kept by spy agencies is how they obtain such information. The exposés in February by Miller and Peter Mueller of the German public broadcaster ZDF, however, confirm the existence of a 50-year-long paper trail of extraordinary SIGINT documentation. Through a leak, those reporters gained access to a 96-page CIA history, along with an oral history compiled by officers of the German intelligence agency, showing 1/3 The National Security Archive, 2130 H Street, NW, Suite 701, Washington, DC 20037 www.nsarchive.org how those governments controlled the Swiss company, Crypto AG, that made the encryption machines. The name for this operation was “Rubicon,” and the secret CIA history about it is titled “Minerva,” the code name assigned to company. The secret history describes how a “handshake deal” between Boris Hagelin, the founder and owner of Crypto AG, and William Friedman, the founding father of American cryptology, set up a system in the early 1950s that allowed the NSA to dictate where the company sold “breakable” communications devices and where it sold unbreakable machines. After the U.S. and German governments bought the company for $5.75 million in 1970, Washington “controlled nearly every aspect of Crypto’s operations,” among them “hiring decisions, designing its technology, sabotaging its algorithms and directing its sales targets,” according to The Post’s report. It monitored Egypt’s negotiating strategies during the 1978 peace talks with Israel led by President Jimmy Carter at Camp David; Iranian mullahs amid the 1979 embassy hostage crisis in Tehran; and more than 19,000 encrypted messages during the Iran-Iraq War. The United States sent intercepted Argentine messages to its ally Britain during the 1982 Falklands War. In Latin America, a major market for the Crypto machines, the Minerva program let the CIA listen in as generals plotted coups in Chile, Argentina, Uruguay, Brazil, Paraguay and Bolivia, and then waged the “dirty wars” of repression that followed. The rigged machines also enabled the CIA to surveil the sinister consortium of those nations’ secret police services, known as Operation Condor, which orchestrated covert, cross-border rendition and assassination missions against opponents in Latin America, Europe and even the United States. The intelligence gathered on Operation Condor carries a humanitarian value that goes beyond its historical importance. These records have the potential to shed light on the fate of Condor’s victims, many of whom remain desaparecidos — disappeared. The documents are also likely to contain evidence that could help hold the perpetrators of those and other human rights crimes legally and historically accountable as trials continue in countries like Argentina and Chile. Perhaps most significantly for U.S. security interests, the Condor papers may reveal how and why U.S. intelligence officials failed to deter an act of international terrorism on the streets of Washington: the Sept. 21, 1976, car-bombing that killed former Chilean ambassador Orlando Letelier and his 25-year-old colleague, Ronni Karpen Moffitt. These are secrets the government has kept hidden for decades. The NSA, for instance, resisted FBI and Justice Department requests for assistance in the investigation of the Letelier-Moffitt assassination. “It would be very unfortunate if one agency of our Government possessed information which may be relevant to this murder and would not disclose it to us,” the Justice Department prosecutor, Eugene Propper, complained in a classified memo (later declassified) more than a year after the terrorist attack. 2/3 The NSA also moved to sequester and classify papers donated to the Virginia Military Institute by Friedman, Hagelin’s NSA handler, when it discovered their existence. More recently, the keepers of the secrets have demonstrated that documents related to Crypto AG and signals intelligence can be declassified — albeit with extensive redactions — without damaging U.S. security interests. The NSA has declassified older examples of its daily signals-intelligence summary that probably contain information from the Minerva project. As part of President Barack Obama’s Open Government Initiative, in 2015 the NSA posted some 7,600 documents relating to Friedman’s career, including censored versions of his communications with Hagelin in the 1950s. The NSA “periodically conducts ‘Special Topical Reviews’ of categories of records, such as the Gulf of Tonkin, USS Liberty, UKUSA, and posts those records,” according to a statement on its website. “In accordance with the federal Open Government initiative, we will identify subjects and records for which there is a general public interest.” There is certainly a “general public interest,” as well as a global public interest, in the Minerva papers. With the history of one of their most successful espionage operations now in the spotlight, the NSA and the CIA could undertake a “special topical review” of those documents that proceeds along these lines: First, the CIA could quickly review and declassify the 96-page Minerva history. Now that it has leaked, these operations are no longer a secret. This would allow the U.S. government to take credit not only for the intelligence achievements of Minerva but also for making the history available for public scrutiny. Second, the NSA and the CIA could centralize the files that served as the basis for the Minerva history and review those records for declassification over the next two years. Finally, the agencies could divide the papers into several special topical reviews: a Condor collection, an Iran hostage crisis collection, an Iran-Iraq War collection and so on. Each grouping would combine the raw decrypted communications on those topics with the finished intelligence reports that drew on those intercepts. A series of releases, similar to ones the NSA and the CIA have done in the past, could be scheduled over the next decade. In particular, documentation related to human rights cases in Latin America and elsewhere could be given special priority and made accessible to legal authorities who are prosecuting crimes against humanity. Clearly, officials at the CIA and the NSA understand the value of history and the ongoing relevance of these documents. That is why they spent considerable time, effort and taxpayer resources to compile the Minerva history — to help the next generation of intelligence officials understand the lessons of the past and their implications for the future. Presumably, this internal history would be shared on a “need to know” basis. But the public at large also has a need to know — and an even greater right to know. The Minerva intelligence operations were carried out to advance our national security. Now, the records they generated can be used to secure our history. 3/3.
Recommended publications
  • Hagelin) by Williaj-1 F
    .. REF ID :A2436259 Declassified and approved for release by NSA on 07-22 2014 pursuant to E.O. 1352e REF ID:A2436259 '!'UP SECRE'l' REPORT"OF.VISIT 1Q. CRYPTO A.G. (HAGELIN) BY WILLIAJ-1 F. FRIEDI.W.if SPECIAL ASSISTANT TO THE DIRECTOR, NATIONAL SECURITY AGENCY 21 - 28 FEBRUARY 1955 ------------------ I -:-· INTRO:bUCTIOI~ 1. In accordance with Letter Orders 273 dated 27 January 1955, as modified by L.0.273-A dated~ February 1955, I left Washington via MATS at 1500 houri' on 18 'February 1955, arrived at Orly Field, Pe,ris, at 1430 hours on 19 February, ' • • f • I ' -,-:--,I." -'\ iII ~ ~ ,.oo4 • ,. ,.. \ • .... a .. ''I •:,., I I .arid at Zug, Switzerland, at 1830 the same day. I sp~~~ th~· ~e~t .few da;s· ~ Boris Hagelin, Junior, for the purpose of learning the status of their new deyelop- ' ments in crypto-apparatus and of makifie an approach and a proposal to Mr. Hagelin S~, 1 / as was recently authorized by.USCIB and concurred in by LSIB. ~ Upon completion of that part of my mission, I left Zug at 1400 hours on ··'··· 28 February and proceeded by atrb-eme:Bfle to Zll:N:ch, ·1.'fteu~ I l3e-a.d:ee: a s~f3:es ah3::i:nMP plE.t;i~ie to London, arriving i:n mndo-l't' at 1845 that evening, f;the schedu1 ed p1anli ed 2_. The following report is based upon notes made of the subste.nce of several talks with the Hagel~ns, at times in separate meetings with each of them and at other times in meetings with both of them.
    [Show full text]
  • Virtual Currencies: International Actions and Regulations Last
    Virtual Currencies: International Actions and Regulations Last Updated: January 8, 2021 No Legal Advice or Attorney-Client Relationship: This chart is provided by Perkins Coie LLP’s Decentralized Virtual Currency industry practice group for informational purposes only and is not legal advice. This information is not intended to create, and receipt of it does not constitute, an attorney-client relationship. Recipient should not act upon this information without seeking advice from a lawyer licensed in his/her own state or country. For questions or comments regarding this chart, please contact [email protected]. Developments Over Time Country Current Summary Date Occurrence Sources 2/20/2020 The Financial Services Regulatory Authority has updated and Guidance expanded its guidance through amendments to its cryptoasset regulatory framework. The amendments change the terminology used in the framework from “crypto asset” to “virtual asset,” a change that aligns with those descriptions used by the Financial Action Task Force (FATF) (see Issuers and intermediaries of virtual Financial Action Task Force (below)). The FATF currencies and “security” tokens may be recommendations are an international standard for regulation Abu Dhabi subject to regulation—depending upon of crypto assets including KYC requirements, anti-money the nature of the product and service. laundering and fraud prevention rules, and sanctions and screening controls. The amendments also overhaul regulations to move the applicable rules from a singular category to those respective to the underlying activities. This means that such assets can be regulated according to their idiosyncratic natures and not as a monolithic class. 29032535.40 10/09/2017 The Financial Services Regulatory Authority (FSRA) of Abu Supplementary Dhabi issued guidance on the regulation of initial coin/token Guidance – Regulation offerings (ICO) and digital currency as supplemental of Initial Coin/Token guidance to the existing 2015 Financial Services and Markets Offerings and Virtual Regulations (FSMR).
    [Show full text]
  • Development of Surveillance Technology and Risk of Abuse of Economic Information
    ∋(9(/230(172)6859(,//∃1&( 7(&+12/2∗<∃1∋5,6.2)∃%86( 2)(&2120,&,1)250∃7,21 9ΡΟ 7ΚΗςΗΡΙΚΗΥΛΘΦΡΠΠΞΘΛΦΛΡΘς ,ΘΗΟΟΛϑΗΘΦΗ&20,17ΡΙΞΡΠ∆ΗΓΣΥΡΦΗςςΛΘϑΙΡΥΛΘΗΟΟΛϑΗΘΦΗΣΞΥΣΡςΗς ΡΙΛΘΗΥΦΗΣΗΓΕΥΡΓΕΘΓΠΞΟΛΟΘϑΞϑΗΟΗςΗΓΡΥΦΡΠΠΡΘΦΥΥΛΗΥ ς∴ςΗΠςΘΓΛςΣΣΟΛΦΕΛΟΛ∴Ρ&20,17ΥϑΗΛΘϑΘΓςΗΟΗΦΛΡΘ ΛΘΦΟΞΓΛΘϑςΣΗΗΦΚΥΗΦΡϑΘΛΛΡΘ :ΡΥΝΛΘϑΓΡΦΞΠΗΘΙΡΥΚΗ672∃3ΘΗΟ /Ξ[ΗΠΕΡΞΥϑ2ΦΡΕΗΥ 3(9ΡΟ &ΟΡϑΞΛΘϑΓ 7ΛΟΗ 3∆Υ7ΚΗςΗΡΙΚΗΥΛΘΦΡΠΠΞΘΛΦΛΡΘς ,ΘΗΟΟΛϑΗΘΦΗ&20,17ΡΙΞΡΠ∆ΗΓΣΥΡΦΗςςΛΘϑΙΡΥ ΛΘΗΟΟΛϑΗΘΦΗΣΞΥΣΡςΗςΡΙΛΘΗΥΦΗΣΗΓΕΥΡΓΕΘΓΞΟΛ ΟΘϑΞϑΗΟΗςΗΓΡΥΦΡΠΠΡΘΦΥΥΛΗΥς∴ςΗΠςΘΓΛς ΣΣΟΛΦΕΛΟΛ∴Ρ&20,17ΥϑΗΛΘϑΘΓςΗΟΗΦΛΡΘ ΛΘΦΟΞΓΛΘϑςΣΗΗΦΚΥΗΦΡϑΘΛΛΡΘ :ΡΥΝΣΟΘ5ΗΙ (3,9%672∃ 3ΞΕΟΛςΚΗΥ (ΞΥΡΣΗΘ3ΥΟΛΠΗΘ ∋ΛΥΗΦΡΥΗ∗ΗΘΗΥΟΙΡΥ5ΗςΗΥΦΚ ∋ΛΥΗΦΡΥΗ∃ 7ΚΗ672∃3ΥΡϑΥ∆ΠΠΗ ∃ΞΚΡΥ ∋ΞΘΦΘ&ΠΣΕΗΟΟ,379/ΩΓ(ΓΛΘΕΞΥϑΚ (ΓΛΡΥ 0Υ∋ΛΦΝ+2/∋6:257+ +ΗΓΡΙ672∃8ΘΛ ∋Η 2ΦΡΕΗΥ 3(ΘΞΠΕΗΥ 3(9ΡΟ 7ΚΛςΓΡΦΞΠΗΘΛςΖΡΥΝΛΘϑ∋ΡΦΞΠΗΘΙΡΥΚΗ672∃3ΘΗΟ,ΛςΘΡΘΡΙΙΛΦΛΟΣΞΕΟΛΦΛΡΘΡΙ672∃ 7ΚΛςΓΡΦΞΠΗΘΓΡΗςΘΡΘΗΦΗςςΥΛΟ∴ΥΗΣΥΗςΗΘΚΗΨΛΗΖςΡΙΚΗ(ΞΥΡΣΗΘ3ΥΟΛΠΗΘ I nterception Capabilities 2000 Report to the Director General for Research of the European Parliament (Scientific and Technical Options Assessment programme office) on the development of surveillance technology and risk of abuse of economic information. This study considers the state of the art in Communications intelligence (Comint) of automated processing for intelligence purposes of intercepted broadband multi-language leased or common carrier systems, and its applicability to Comint targeting and selection, including speech recognition. I nterception Capabilities 2000 Cont ent s SUMMARY .............................................................................................................................................................................................
    [Show full text]
  • How the US and Germany Fooled the World for Decades
    How the US and Germany Fooled the World for Decades Cmdr. (res.) Eyal Pinko (Competitive Intelligence and Cyber Consulting, Ph.D. candidate Strategy, Defense and Intelligence studies, Bar Ilan University, Israel) Copyright: Research Institute for European and American Studies (www.rieas.gr) - Publication date: 23 February 2020 Note: The article reflects the opinion of the author and not necessarily the views of the Research Institute for European and American Studies (RIEAS) The American and German intelligence communities used Crypto AG, a Swiss company that made encryption tools, to spy on more than 100 countries. Intelligence gathered through this joint operation is said to have influenced the Israel-Egypt peace talks, the Falklands War, and the Iran-Iraq war, among others Recently uncovered information indicates that the American NSA and the BND (the German foreign intelligence service) have been cooperating since the 1970s, and have conducted joint intelligence gathering operations for decades, collecting information about more than 100 different countries. The cooperative operation was given the codename “Rubikon” and is considered one of the largest of its kind in history. Rubikon involved such activities as remote penetration of radio communications, of landlines, and more recently - of cellular phones. It included tracing phones and listening in on calls. The targets included politicians, senior government officials, members of the military and ambassadors. The NSA-BND cooperation began with a joint investment in a company called Crypto AG, which is registered in Lichtenstein and operated in Switzerland. It was founded by Boris Hagelin – an Azerbaijan-born businessman and inventor of encryption machines. Following the rise of communism, Hagelin and his wife fled the Soviet Union to Norway.
    [Show full text]
  • Verschlüsselt : Der Fall Hans Bühler
    Verschlüsselt Der Fall Hans Bühler P R ! S 0 N E R / / Res Strehle WERDVERLAG Digitized by the Internet Archive in 2018 https://archive.org/details/verschlusseltderOOstre Res Strehle Verschlüsselt Der Fall Hans Bühler WERDVERLAG Alle Rechte Vorbehalten, einschliesslich derjenigen des auszugsweisen Abdrucks und der photomechanischen Wiedergabe © 1994 Werd Verlag, Zürich Lektorat: Christina Sieg Gestaltung: Albin Koller, Berikon Printed in Switzerland ISBN 3 85932 141 2 Inhalt Kapitel Seite I 5 II 9 III 18 IV 26 V 38 VI 49 VII 59 VIII 70 IX 79 X 88 XI 98 XII 108 XIII 114 Dokumentarischer Anhang Die Person 125 Die Technik 135 Die Firma 143 Die Gefangenschaft 149 Die Rückkehr 171 Nachwort von Hans Bühler 195 CrypticLabs Accelerator for secure blockchain Whitfield Diffie Co-founder and chief scientist tel. 1.650.714.8669 [email protected] www.crypticlabs.org I Was wollten die von ihm? Einer hatte befohlen, den Stuhl zur Wand zu drehen. Dann war ihm eine grüne Augenbinde aufgesetzt worden. Fortan konnte er nur noch die Schuhe seiner Befrager sehen und einen Streifen Boden, vielleicht fünfzig Zentimeter. Ob er einen Dienstpass habe? Ein gutes Zeichen, die waren auf korrekten Umgang bedacht. Überhaupt schienen das Profis in Verhaftungsaktionen, keine Spur von Nervosität bei diesem Dutzend jüngerer Männer; nicht einer hatte die Hand an der Pistole. War das zivile Polizei, Militärpolizei, oder waren es die Sepah Pas- daran, die «Revolutionswächter»? Kein Entführungskommando je¬ denfalls, vermutete B., sonst hätten sie keinerlei Rücksicht auf diplo¬ matische Gepflogenheiten genommen. Hätte er einen Dienstpass oder gar Diplomatenpass vorzeigen können, er wäre vermutlich gleich wie¬ der freigekommen, damit keine aussenpolitischen Scherereien entstan¬ den.
    [Show full text]
  • Hệ Thống Thông Tin Gián Điệp Toàn Cầu Echelon
    HỆ THỐNG THÔNG-TIN GIÁN-ĐIỆP TOÀN CẦU ECHELON Lê Chánh Thiêm Trong lịch-sử chiến-tranh, từ trước đến nay, chiến-thắng nhiều lúc lại tùy-thuộc vào những tin-tức thu- lượm được về đối phương để có những chiến thuật chiến lược thích hợp để chiến thắng ngoài các yếu-tố khác như tài chỉ huy, vũ-khí, địa-thế trận địa, thiên thời, địa lợi, nhân hòa, v.v... Những tin tức này cho biết mọi tình-trạng về chiến-thuật chiến-lược, quân số, vũ-khí, tiếp-liệu... của phe bên kia để có biện- pháp đối phó ngõ hầu tạo ra chiến thắng. Trong thời đại ngày nay, khi văn-minh nhân-loại đã đến độ khá cao, các phương-tiện phục-vụ cho chiến-tranh lại càng mang lại lợi thế cho đội quân nào có khả- năng áp-dụng khoa-học kỹ-thuật. Một trong các phương-tiện được Hoa-Kỳ đặt lên hàng đầu là hệ-thống thông tin, gián-điệp, tin tức tình báo. Trước đây, giống như mọi nước, Mỹ gởi những điệp viên ra khắp nơi để thu lượm tin-tức. Thời gian sau nầy, một phương-thức khác được áp-dụng, đó là thiết-lập các thiết-bị nghe lén. Một trong các dụng-cụ do-thám mà Mỹ áp dụng vài thập niên qua, đó là hệ-thống nghe lén mang tên “Echelon” mà bài viết nầy đề cập đến. 1. Đại-cương: Hệ-thống Echelon là mạng lưới nghe lén bí-mật có khả năng kiểm-soát toàn thể hệ-thống thông-tin toàn cầu.
    [Show full text]
  • Moi Calls on Workers to Register National Address Through Metrash2
    www.thepeninsula.qa Monday 2 March 2020 Volume 24 | Number 8184 7 Rajab - 1441 2 Riyals BUSINESS | 01 SPORT | 11 UDC and CHL sign 2020 Copa deal to operate America: Qatar eye Corinthia Doha in improved show Gewan Island in second stint FREE Wi-Fi device! Ooredoo FREE installation! Full fun! ONE *Terms & Conditions Apply MoI calls on workers to Amir meets Executive Vice-President of Venezuela register National Address through Metrash2 PRAMOD PRABHAKARAN For companies Address registered. If a THE PENINSULA company has less than 300 with more than 300 workers, then the workers have In a presentation to raise workers, the PRO go to the Service Centre in awareness among companies has to approach the batches of 20-30 people every about National Address, day. Ministry of Interior (MoI) urged MoI Service Centre One needs to take pref- companies to encourage their with an official letter erably a colour printout of the workers to register National addressed to the application form from the Min- Address through Metrash2. istry’s website. PRO has to take Underlining the importance head of the Service printed forms and the of completing National Address Centre and take an employees to the service centre through Metrash 2, an MoI appointment to get and the signature should be official said during the presen- done in front of the officer at Amir H H Sheikh Tamim bin Hamad Al Thani met yesterday with Executive Vice-President of the tation at the General Direc- the National Address the Service Centre and not at Bolivarian Republic of Venezuela, H E Dr.
    [Show full text]
  • Hagelin) by William F
    .. REF ID :A2436259 Declassified and approved for release by NSA on 07-22 2014 pursuant to E.O. 13s2e REF ID:A2436259 '!'UP SECRE'I' REPO'.RT·oF.VISIT 1Q. CRYPTO A.G. (HAGELIN) BY WILLIAM F. FRIEDMAlif SPECIAL ASSISTANT TO THE DIRECTOR, NATIONAL SECURITY AGENCY 21 - 28 FEBRUARY 1955 ----------~------- I -:-· INTRO:bUCTIOI~ 1. In accordance with Letter Orders 273 dated 27 January 1955, as modified by L.0.273-A dated~ February 1955, I left Washington via MATS at 1500 hour~ on 18 'February 1955, arrived at Orly Field, Pe,ris, at 1430 hours on 19 February, • • • f ' I ' -,-:--, I." -'\ i I I ~ ~ ,.o"4 • ,. ... \ • .... a .. ''I •:,,., I I .arid at Zug, Switzerland, at 1830 the same day. I sp~~~ th~- ~e~t .few da;s· ~ Boris Hagelin, Junior, for the purpose of learning the status of their new deyelop- ' ments in crypto-apparatus and of makifie an approach and a proposal to Mr. Hagelin S~, 1 / as was recently authorized by.USCIB and concurred in by LSIB. ~ Upon completion of that part of rrry mission, I left Zug at 1400 hours on ··'··· 28 February and proceeded by atrb-eme:afle to Zttr-3:ch, wfl:eie I l3e-a.d:ee: a s~"3:es ah3::i:nMP plet;ille to London, arriving :H1 i:Jendo-l't' at 1845 that evening, f,the schedll1 ed plan'i ed 2_. The following report is based upon notes made of the subste.nce of several talks with the Hagel~ns, at times in separate meetings with each of them and at other times in meetings with both of them.
    [Show full text]
  • AUX ETATS-UNIS Claude DELESSE
    DU RÉSEAU ECHELON A LA « RÉVOLUTION DES AFFAIRES DE RENSEIGNEMENT » AUX ETATS-UNIS par Claude DELESSE (*) La découverte ingénue par l’Europe du réseau Echelon L’existence du réseau technologique d’espionnage et de contre-espionnage américain du nom de code Echelon a été révélée à l’opinion en 1988 lors de l’affaire du Watergate par deux reporters du Cleveland Plain Dealer (Ohio), C. Epstein et John S. Long (1). C’est l’enquête du journaliste britannique Duncan Campbell (2), commencée la même année, qui alerta l’Europe. En 1996, un journaliste néo-zélandais, Nicky Hager, réussit à s’infiltrer dans une base secrète du réseau. De l’intérieur du système, une poignée d’agents, choqués par les pratiques de leur service, n’hésitèrent pas à sacrifier leur carrière en dénonçant les orientations illégales de ce réseau d’écoutes (ce fut le cas notamment de Fred Stock, qui alerta des parlementaires et engagea des plaintes contre l’agence canadienne, lesquelles furent étouffées pendant cinq ans et laissées sans suite). Divers mouvements de protestation s’organisèrent en Grande- Bretagne, où des militantes féministes, bravant arrestations, évacuations musclées, procès et prison, harcelèrent épisodiquement la plus grosse station d’écoute anglaise dans le Yorkshire, Menwith Hill (3). Elles campèrent aux alentours, fouillèrent les poubelles, découpèrent les grilles de sécurité et pénétrèrent dans les lieux. D’autres activistes, en octobre 1999, tentèrent d’engorger les ordinateurs du réseau en envoyant des e-mails bourrés de mots-clefs provocateurs. L’Europe découvrit ainsi progressivement un réseau d’espionnage qui semblait fonctionner en partie à son détriment.
    [Show full text]
  • Cryptomagazine
    CRYPTOMAGAZINE TRADE FAIRS For the customers of Crypto AG, Switzerland 1 2009 DSEi, 8 to 11 September 2009 London, Great Britain SEMINARS by InfoGuard AG Crypto AG, Headquarters For Information Security Professionals Crypto AG ISC09/1 20 – 24 April 2009 P.O. Box 460 ISC09/2 15 – 19 June 2009 CH-6301 Zug Switzerland ISC09/3 28 September – 02 October 2009 Tel. +41 41 749 77 22 ISC09/4 09 – 13 November 2009 Fax +41 41 741 22 72 [email protected] www.crypto.ch Contemporary Cryptography CCC09/1 27 April – 01 May 2009 Crypto AG, Regional Offices CCC09/2 22 – 26 June 2009 CCC09/3 16 – 20 November 2009 Abidjan Crypto AG 01 B.P. 5852 Ethical Hacking and Cyber Crime Abidjan 01 EHC09/1 08 – 12 June 2009 Ivory Coast Tel. +225 22 41 17 71 EHC09/2 05 – 09 October 2009 Fax +225 22 41 17 73 EHC09/3 23 – 27 November 2009 Abu Dhabi Crypto AG – Abu Dhabi Further information at www.infoguard.ch/crypto P.O. Box 41076 Abu Dhabi United Arab Emirates Tel. +971 2 64 22 228 PRESS REVIEW Fax +971 2 64 22 118 Buenos Aires Study confirms fears about personal data on the Internet Crypto AG To mark the third European data protection day on 28 January in Berlin, Maipu 1256 PB «A» 1006 Buenos Aires Privatim, the association of Swiss data protection registrars, commis- Argentina sioned a survey. Around 1,600 people were interviewed throughout Tel. +54 11 4312 1812 Fax +54 11 4312 1812 Switzerland and the results showed that Swiss inhabitants see data pro- tection as being important.
    [Show full text]
  • Big Brother Is Watching You Iran Midfielder Vahid Amiri Wary of Hong Kong Threat
    WWW.TEHRANTIMES.COM I N T E R N A T I O N A L D A I L Y 8 Pages Price 50,000 Rials 1.00 EURO 4.00 AED 43rd year No.13958 Wednesday JUNE 2, 2021 Khordad 12, 1400 Shawwal 21, 1442 Iran, Tajikistan firm to Iran midfielder Annual exports of Artists remembering develop ties: interior Vahid Amiri wary of polymer products Imam Khomeini in minister Page 2 Hong Kong threat Page 3 exceed $1.3b Page 4 “Mourning for the Sun”Page 8 Iran nuclear chief sends letter to IAEA See page 3 TEHRAN - Ali Akbar Salehi, head of allegedly undeclared sites. The letter also the Atomic Energy Organization of Iran came after IAEA Director-General Rafael (AEOI), has sent a letter to the chief Grossi announced on May 24 that he had of the UN nuclear watchdog informing agreed with Iran to extend by one month a him that a February deal between Iran February deal between Iran and the IAEA and the International Atomic Energy allowing the UN nuclear watchdog to con- Agency has expired but Iran decided to tinue necessary monitoring activities. continue to store data related to moni- However, Kazem Gharibabadi, Iran’s toring activities. permanent representative to the UN offices The letter was announced after the in Vienna, said that Salehi, in his letter, Agency released a quarterly report on Iran told Grossi that the monitoring deal has in which it accused Iran of failing to ex- expired. plain traces of uranium found at several Continued on page 3 Iran’s biggest cement production line inaugurated TEHRAN – Iran’s biggest cement produc- “The country that once imported cement tion line was put into operation in northern has today become one of the countries Alborz Province’s Abyek Cement Complex exporting this product,” he stated.
    [Show full text]
  • Tempest’ on Anglo-American Communications Security and Intelligence, 1943–1970 David Easter
    INTELLIGENCE AND NATIONAL SECURITY https://doi.org/10.1080/02684527.2020.1798604 ARTICLE The impact of ‘Tempest’ on Anglo-American communications security and intelligence, 1943–1970 David Easter ABSTRACT This article examines the impact of the discovery by Britain and the United States in the late 1940s/early 1950s that cipher machines produced com­ promising emissions, a phenomenon which became known as Tempest. The British and Americans were forced to develop security measures to protect their encrypted communications but the Soviet Union was still able to exploit Tempest emissions from cipher machines in Western embassies in Moscow and read their diplomatic traffic. At the same time, Tempest became an important new way for the NSA and GCHQ to gather communications intelligence, particularly from developing world states and NATO allies. In the early years of the Cold War, Britain and the United States accidentally discovered that cipher machines produced electromagnetic and acoustic emissions which could reveal the original plain text of encrypted messages. Suddenly, many high level American and British code machines appeared vulnerable, raising the frightening possibility that the new Soviet enemy might be able to read their most secret diplomatic and military signals. The two allies had to urgently carry out research to determine the scale of the problem, which became known as Tempest, and develop counter-measures to secure their communications. At the same time though, Tempest opened up new ways for the American and British communications
    [Show full text]