Kryptos: a 29 Year Old Mystery Alfie Baines* — 170180540 [email protected] School of Mathematics, Statistics and Physics Supervisor: Dr Stuart Hall

Total Page:16

File Type:pdf, Size:1020Kb

Kryptos: a 29 Year Old Mystery Alfie Baines* — 170180540 A.E.Baines@Newcastle.Ac.Uk School of Mathematics, Statistics and Physics Supervisor: Dr Stuart Hall Kryptos: A 29 year old mystery Alfie Baines* | 170180540 [email protected] School of Mathematics, Statistics and Physics Supervisor: Dr Stuart Hall 1. Aims 3. Frequency analysis 5. Index of coincidence 6. Transposition Cipher H I To automate a majority of the cryptanalysis that has already The index of coincidence (IC) is the I A transposition cipher takes the original been carried out on Kryptos probability that two randomly chosen letters text and creates an anagram of it based on a I To use computing to decipher the final section of Kryptos, known in a block of text are identical. We know regular system or algorithm. as K4 IC ≈ 0:067, and IC ≈ 0:0385 I By taking the text in the green section and english random reversing the order, you can use the following n 1 X key, 1526374, based on the word KRYPTOS, 2. Transcript of Kryptos ciphertext IC = F (F − 1) (3) N(N − 1) i i to decipher the message. i=1 EMUFPHZLRFAXYUSDJKZLDKRNSHGNFIVJ I The key is obtained as follows: YQTQUXQBQVYUVLLTREVJYQTMKYRDMFD I N is the length of the text K T 1 5 R O 2 6 VFPJUDEEHZWETZYVGWHKKQETGFQJNCE I n is the length of the alphabet = = 1526374 Y S 3 7 I Fi is the frequency of the ith letter in the alphabet GGWHKK?DQMCPFQZDQMMIAGPFXHQRLG P 4 TIMVMZJANQLVKQEDAGDVFRPJUNGEUNA (When read horizontally) QZGZLECGYUXUEENJTBJLBQCRTBJDFHRR I The same method of using columns YIZETKZEMVDUFKSJHKFWHKUWQLSZFTI containing 4 letters and 3 letters is used in HHDDDUVH?DWKBFUFPWNTDFIYCUQZERE the rearrangement of the green section EVLDKFEZMOQQJLTTUGSYQPFEUNLAVIDX during decryption. FLGGTEZ?FKZBSFDQVGOGIPUFXHHDRKF I The similarity between generating a key, and FHQNTGPUAECNUVPDJMQCLQUMUNEDFQ deciphering the text leads to the belief that this may be the intended method of ELZZVRRGKFFVOEEXBDMVPNFQXEZLGRE decryption by the author. DNQFMPNZGLFLPMRJQYALMGNUVPDXVKP DQUMEBEDMHDAFMJGZNUPLGEWJLLAETG 7. K4 Discussion H ENDYAHROHNLSRHEOCPTEOIBIDYSHNAIA CHTNREYULDSLLSLLNOHSNOSMRWXMNE I Frequency analysis of K4, with comparison to TPRNGATIHNRARPESLNNELEBLPIIACAE the English language, shows that the use of a WMTWNDITEENRAHCTENEUDRETNHAEOE poly-alphabetic cipher for encryption is plausible. TFOLSEDTIWENHAEIOYTEYQHEENCTAYCR By analysing how often letters appear in each row, it became obvious that the I I IC calculations give a flat graph with no peaks EIFTBRSPAMHHEWENATAMATEGYEERLB majority of rows 15-28 were written in English, but had been reordered - typical of a near the IC of the English language. This TEEFOASFIOTUETUAEOTOARMAEERTNRTI Transposition Cipher contradicts the point above but allows the BSEDDNIAAHTTMSTEWPIEROAGRIEWFEB I When comparing the frequency of letters in the green section to the typical letter possibility of multiple encryption AECTDDHILCEIHSITEGOEAOSDDRYDLORIT frequencies of the English alphabet, it was almost identical methods being used for K4. RKLMLEHAGTDHARDPNEOHMGFMFEUHE I Using a clue given by Jim Sanborn, the ECDMRIPFEIMEHNLSSTTRTVDOHW? OBKR 4. Vigen´erecipher H H sculpture creator, that NYPVTTMZFPK decrypts to BERLINCLOCK, possible shifts UOXOGHULBSOLIFBBWFLRVQQPRNGKSSO The alphanumeric ordering of the Kryptos alphabet which is used for a polyalphabetic cipher are: 11, 17, 2, 5, TWTQSJQSSEKZZWATJKLUDIAWINFBNYP 15, 9, 8, 7, 20, 0 VTTMZFPKWGDKZXTJCDIGKUHUAUEKCAR when deciphering K1 and K2. I In the first plot, there are peaks at 5, 10, 13 and 15 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 alphabets. This indicates that the length of the 8. Future work HEL K1 - Solved using Vigen´ere cipher: Keyword - Palimpsest KRYPTOSABCDEFGHIJLMNQUVWXZ keyword for the Vigen´eredeciphering is a multiple of HEL K2 - Solved using Vigen´ere cipher: Keyword - Abscissa 5. Starting with a keyword of length 10, as it has the I Research how Hamiltonian cycles can be HEL K3 - Solved using Transposition cipher If Σ is the alphabet of length l, with m being the length of the key, highest peak, lead to `PALIMPSEST' being used to solve a large Transposition cipher H HEL K4 - UNSOLVED Vigen´ereencryption and decryption can be written; identified as the key word. and normal anagrams. Similar observations for the second plot lead to Research how to use a combination of a Ci = EK (Mi) = (Mi + K(i mod m)) mod l (1) I I English alphabet: ABCDEFGHIJKLMNOPQRSTUVWXYZ `ABSCISSA' eventually being identified as the Transposition cipher H and a Vigen´erecipher Di = DK (Ci) = (Ci − K(i mod m)) mod l (2) Kryptos alphabet: KRYPTOSABCDEFGHIJLMNQUVWXZ keyword. H H to solve the final part of Kryptos. References: 1. National Security Agency. 1993, June 9. CIA KRYPTOS sculpture - Challenge and resolution. United States Government - Memorandum. https://docs.google.com/file/d/0B7G1aFZQuZtXRmRkcmhkNGtqQ2c/edit. 2. Stein, D. 1999. Cracking the Courtyard Crypto. https://nsarchive2.gwu.edu//NSAEBB/NSAEBB431/docs/intell ebb 010.PDF.
Recommended publications
  • DOCUMENT RESUME ED 071 911 SE 015 548 TITLE Project Physics
    DOCUMENT RESUME ED 071 911 SE 015 548 TITLE Project Physics Teacher Guide 6, The Nucleus. INSTITUTION Harvard Univ., Cambridge, Mass. Harvard Project Physics. SPONS AGENCY Office of Education (DHEW) Washington, D.C. Bureau of Research. BUREAU NO BR-5-1038 PUB DATE 68 CONTRACT OEC-5-10-058 NOTE 235p.; Authorized Interim Version EDRS PRICE MF-$0.65 HC-S9.87 DESCRIPTORS Instructional Materials; *Multimedia Instruction; *Nuclear Physics; Physics; *Radiation; Science Activities; Secondary Grades; *Secondary School Science; *Teaching Glides; Teaching Procedures IDENTIFIERS Harvard Project Physics ABSTRACT Teaching procedures of Project Physics Unit 6are presented to help teachers make effectiveuse of learning materials. Unit contents are discussed in connection withteaching aid lists, multi-media schedules, schedule blocks, andresource charts. Brief summaries are made for transparencies, 16mm films, and reader articles. Included is information about the backgroundand development of each unit chapter, procedures in demonstrations, apparatus operations, notes on the student handbook, andan explanation of film loops. Additional articlesare concerned with objects dated by radiocarbon, radiation safety, propertiesof radiations, radioactive sources, radioactivity determinationby electroscopes, and radiation detecting devices.Scalers, counters, Geiger tubes, and cadmium selenide photocellsare analyzed; and a bibliography of references is given, Solutionsto the study guide are provided in detail, and answers to test itemsare suggested. The sixth unit of the text, with marginal commentson each section, is also compiled in the manual. The work of Harvard ProjectPhysics has . been financially supported by: the Carnegie Corporation ofNew York, the Ford Foundation, the National Science Foundation,the Alfred P. Sloan Foundation, the United States office of Education,and Harvard University.
    [Show full text]
  • THE CIA KRYPTOS SCULPTURE: a Summary of Previous Work and New Revelations in Working Toward Its Complete Solution By
    DOCID: 4145037 CONFIDENTIALHREL TO USA, FVEYH20320108 (U) THE CIA KRYPTOS SCULPTURE: A summary of previous work and new revelations in working toward its complete solution by PL 86-36/50 USC 3605 pprnved or Release v ~-~SA on 9-16-2014. OIA Case .. 65414 CO~:FUltJ;NTIALh'IU;L TO USA, FYEY//20320108 1 DOCID: 4145037 CONFIBENTIALHREL T0 USA, FYEYH26326168 (U//FOUO) Back in 1990, the Central Intelligence Agency's Fine Arts Commission canvassed Washington, DC, area artists, asking for proposals for costs and designs for a sculpture which would be erected in the CIA's new Courtyard outside its cafeteria. The winning sculptor was James Sanborn, and he created a nice little puzzle. It stands about 3 metres (10 feet) tall, and con­ sists of two curved copper plates standing side-by-side, forming an "S" shape if viewed from above. (U/IFOUC>) Before we look at the cipher on the sculpture, here's what James Sanborn had to say about his creation on November 3, 1990, the day it was dedicated: "The stonework at the entrance and in the courtyard served two functions. First, it creates a natural framework for the project as a whole, and is part of a landscaping scheme designed to recall the natural stone outcropping that existed on the site before the Agency, and that will endure, as do mountains. "Second, the tilted strata tell a story like pages of a document. Inserted between these stone pages is a flat copper sheet through which letters and symbols have been cut. This code, which includes certain ancient ciphers, begins as international morse, and increases in complexity as you move through the piece at the entrance and into the courtyard.
    [Show full text]
  • Raw Notes from Elonka Dunin and John Wilson
    Raw notes from Elonka Dunin and John Wilson: X & Q in K3 are/could be quote marks Miniature was missing the extra L, and Sanborn asked about an M when looking at it 2 people have the key to K4 - Jae (S.O.) and Muffin (friend) in Tucson, AZ Muffin has one of the COF's Sanborn says there are about 14 COF's Duck pond slabs were supposed to have Morse also, but he ran out of time The Morse code slabs continue under the rock, so the "T is your position" is actually "What is your position" Scheidt gave a talk to the Kryptos society @ NSA, and went over the math behind the codes of Kryptos Arabic COF was originally translated at an Arabic Language Facility in Falls Church, VA, but Sanborn later found out that they gave him some Islamic propaganda in the mix, so he had the translations checked by people he personally knew. PT on the Arabic was from CIA tradecraft Ed Scheidt already knew Whitfield Diffie Ed Scheidt is the ISO person doing the standardization of various crypto techniques for XML formats Sanborn expressed surprise that we didn't include the rotation of the pool in the 3D modeling Sanborn was harassed by CIA personnel during the CIA installation, saying his work was a "waste of money" Christie'isms: errors in various pulped art pieces Errors in CP were Sanborn'isms Christie was suspended above the pulped pieces in a sling in order to be able to reach the inner letters Gilbert Kinney (original purchaser of Untitled Kryptos Piece) currently lives in NY Sanborn has bunches of docs from the Library of Congress Current location of the large COF-english is in his studio.
    [Show full text]
  • Petrified Wood of Oklahoma: Lap- Lawrence, 455P
    2 Petrified Wood In Oklahoma Neil H. Suneson, Geologist IV, Oklahoma Geological Survey Adjunct Professor, ConocoPhillips School of Geology and Geophysics, University of Oklahoma [email protected] / 405.325.7315 Introduction world’s most baffling puzzles, the bane of professional cryp- tologists and amateur sleuths who have spent 15 years trying In the fossil world, petrified wood may be second only to solve it” (www.guardian.co.uk/world/2005/jun/11/dan- to dinosaurs in its fascination to humans, and “wood turned brown.books, acc. 2/27/10). Kryptos is referred to twice to stone” probably has the longer history of the two. In fact, on the dust jacket of the U.S. version of Dan Brown’s novel a fossil cycad was placed in the tomb of the Marzabotto “The Da Vinci Code” (http://en.wikipedia.org/wiki/kryptos, necropolis over 4000 years ago by the ancient Etruscans. It acc. 2/27/10). was accompanied by other funerary objects and thus must have had some special significance. Furthermore, it appears that the trunk of a fossil cycad may have been used by Ne- olithic people as a sharpening stone (Wieland, 1916) and thus may have “the longest known history of any fossil” (from www.plantapalm.com/vce/intro/historicalperspec- tive.htm, acc. 2/27/10). Around 1000 A.D. the Persian as- tronomer, chemist, mathematician, physicist, scientist, theologian, and philosopher Avicenna suggested “that or- ganic materials might be ‘turned into stone by a certain min- eralizing, petrifying power … and this transmutation of the bodies of animals and plants is just as short a step as the transmutation of waters.
    [Show full text]
  • Introduction to Cryptography - 1 CSC4601 F04 Overviewoverview
    IntroductionIntroduction toto CryptographyCryptography Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 [email protected] These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601_04/ Louisiana State University 5- Introduction to Cryptography - 1 CSC4601 F04 OverviewOverview Definitions Secret keys Public keys Hash functions Louisiana State University 5- Introduction to Cryptography - 2 CSC4601 F04 CommunicationCommunication SecrecySecrecy The history of codes and ciphers is the story of centuries-old battle between codemakers and codebreakers Evolution of codes. Always under attack from codebreakers. Analogous to the situation of a strain of infectious bacteria under the attack of antibiotics Technologies involved from mathematics to linguistics, from information theory to quantum theory Louisiana State University 5- Introduction to Cryptography - 3 CSC4601 F04 TheThe EvolutionEvolution ofof SecretSecret WritingWriting In The histories, Herodotus, “the father of history”, chronicled the conflicts between Greece and Persia in the fifth century B.C. The art of secret writing saved the Greece Demaratus send information to Greece about Persian preparation using secret messages: scraping the wax off a pair of wooden folding tablets, writing on the wood underneath and then covering the message with wax again. Herodotus chronicled also the story of Histaiaeus who wanted to encaurage Aristagoras of Miletus to revolt against Persians To convey his instructions securely, Histaiaeus shaved the head of his messenger, wrote the message on his scalp, and then waited for the hair to grow. It seems this period of history tolerated a certain lack of urgency. Hiding a message is known as steganography derived from the Greek word steganos meaning “covered” and graphein–“to write”.
    [Show full text]
  • Cracking the Courtyard Crypto
    00 ::._:ourtyard Crypto http://www .csi .cia!studies/vol43no I /ar15 .html APPROVED FOR J't'J' Unclassified RELEASE DATE: Tlte Puzzle at CIA 1/eadquarters Cracking the Courtyard Crypto (b)( 1 ) (b)(3) Editor's Note: In the late 1980s, under a GSA program, the CIA commissioned Washington artist James . Sanborn to create a series of sculptures for CIA's new Headquarters building. Working together with( i :. who was soon to retire from the Office of Communications, Sanborn created a sculpture named "Kr)iptos" (Greek for hidden) that was dedicated in 1990 and now resides in the northwest comer of the courtyard. The curving verdigris scroll contains an 865-character coded message that seems to flow out from a petrified tree and is located near a water-filled basin bordered by various types of stones. In t.he following article,( describes how he has deciphered most of the secret message contamed within the sculptun:. I looked down at the large number ofyellow pages littering the top ofmy desk, obscuring its dark oak finish. E'ach page was covered in hundreds ofalphabetic letters that, although they appeared to be arranged randomly, were really carefolly laid out in columns ofhidden order. For the past week or so, I had been feeling that I was very close to a solution--but was I? As a hobby, I had solved many puzzles since I was a child. and I had discovered that the most difficult challenge was continually dealing with the nagging fear that I may be on .the wrong track. The voice in my head would whisper, "Maybe you're mistaken--maybe this first part of the Kryptos code is really not a polyalphabetic Vigenere Tableau after all--maybe it's a different type ofcode entirely.
    [Show full text]
  • NSA Documents on Kryptos
    NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 66050B 17 June 2014 JOHN GREENEWALD THE BLACK VAULT Dear Mr. Greenewald: This further responds to your Freedom of Information Act (FOIA) request of 26 December 2011 for "a copy of each document at the National Security Agency concerning the famous KRYPTOS sculpture located on the grounds of the Central Intelligence Agency. Please review and release both documents that have already been made available as well as documents that have not yet been reviewed and/or released. I am particularly interested in documents regarding the as-yet undecrypted fourth message." A copy of your request is enclosed. Your request has been processed under the FOIA, and eight of the documents are enclosed. Certain information, however, has been deleted from the enclosures. Some of the information deleted from the documents has been found to be currently and properly classified in accordance with Executive Order 13526. The information meets the criteria for classification as set forth in Subparagraph (c) of Section 1. 4 and remains classified CONFIDENTIAL as provided in Section 1. 2 of Executive Order 13526. The information is classified because its disclosure could reasonably be expected to cause damage to the national security Because the information is currently and properly classified, it is exempt from disclosure pursuant to the first exemption of the FOIA (5 U.S.C. Section 552(b)(1)). In addition, this Agency is authorized by various statutes to protect certain information concerning its activities. We have determined that such information exists in these documents.
    [Show full text]
  • Attorney at Law Loyola Law School Graduate • 20 Years Experience
    IInside:nside: PProtectingrotecting tthehe aattorney-clientttorney-client pprivilegerivilege EEveryvery votevote mmattersatters EEnforcingnforcing mmediationediation LLawaw DayDay — MMayay 1 aagreementsgreements BBRBRBA BBenchench BBarar CConferenceonference jjULYULY 224-26,4-26, 22014014 GGRANDRAND HHOTELOTEL MMARRIOTTARRIOTT • PPOINTOINT CCLEAR,LEAR, AAlaBAMAlaBAMA • CConferenceonference HHighlightsighlights • FIRST-TIMER REGISTRATION PRICE IS $325 — DEADLINE: JUNE 20 n rregistere today! atio gist istr 12.5 HOURS OF CLE wwww.brba.orge•r eg : w to ar• r line On-site registration begins Thursday, July 24 at 10 a.m. w. day gul ead br ! rregulare t eregistration d 0 CLE seminars begin Thursday, July 24 at 2 p.m. ba. ratera deadlinene 3 : or JJuneu 30Golf tournament Saturday, July 26 • Auction to benefit the Baton Rouge Bar Foundation g • aattendingttending jjudgesudges • Judge Richard Anderson • Judge Carl Barbier • Judge James J. Brady • Judge Michael Caldwell Judge Paula Hartley Clayton • Judge Louis R. Daniel Judge Charlene Day • Judge Shelly D. Dick • Judge Michael Erwin Judge John Michael Guidry • Judge Toni Higginbotham • Judge Guy Holdridge Justice Jeff Hughes • Judge Brian A. Jackson • Judge Tim Kelley Judge William T. Kleinpeter • Judge Jessie LeBlanc • Judge William A. Morvant Judge Pamela Moses-Laramore • Judge Laura Prosser Judge Ralph E. Tureau • Judge Alex “Brick” Wall • Judge Jewel “Duke” Welch Judge Kirk Williams • Judge Lisa Woodruff-White • Judge Jay Zainey • CConferenceonference ssponsorsponsors • Adams and Reese, LLP • Babcock Partners, LLC • Brady Law Firm • Baker, Donelson, Bearman, Caldwell & Berkowitz PC Cazayoux & Ewing LLC • Chaffe McCall • Breazeale, Sachse & Wilson • Committee to Elect Hillar Moore Dampf, Thibaut & Hessburg, LLP • DeCuir, Clark & Adams, LLP • Delatte, Edwards & Marcantel FindLaw • Glusman, Broyles & Glusman • Dr. Michael J.
    [Show full text]
  • Cracking the Kryptos Code
    ####################################################################### # 5/5/2009 Cracking the Kryptos Code - KHOV.com (News 4) # # # # URL: http://www.thekryptosproject.com/media/video/ # # http://it.truveo.com/Cracking-the-Kryptos-Code/id/298443071 # # # # NR: News Reporter # # DZ: Diana Zoga # # ED: Elonka Dunin # # # # Transcribed by: Jew-Lee Irena Lann # # # # Please report any boo boo's to [email protected] # ####################################################################### 2:54 NR:...Decades in the making. There is a secret code, hidden in a piece of art, at CIA Headquarters. For years, no one has been able to crack it. News Force, Diana Zoga, spoke with one of the top experts on this mystery. A local video game developer, who isn't ready to back down yet. 2:38 DZ: It's tucked away at CIA Headquarters, in a courtyard, with no public access. A sculpture, titled Kryptos. Few have seen it in person, yet thousands are trying to decipher its message. 2:25 ED: The Central Intelligence Agency, the idea that there is an unsolved puzzle in middle of the CIA, also has a mystic about it. 2:17 DZ: The man behind the mystic is, artist, James Sanborn. He challenged the CIA to solve four codes, stamped into a ten-foot tall copper screen. Three have been cracked. But the last is a secret the artist refuses to give away. 2:02 ED: Sanborn uh..likes the idea that it hasn't been solved yet. H..he said that he actually wants to die knowing that it hasn't been solved. 1:55 DZ: Elonka Dunin, a video game developer, based in St. Charles, is one of the world's top experts on Kryptos.
    [Show full text]
  • Kryptos MATH3302 LECTURE, 2 APRIL 2019 RICHARD BEAN Background
    Kryptos MATH3302 LECTURE, 2 APRIL 2019 RICHARD BEAN Background ID360 “Cryptography” in 1995 An “interdisciplinary” subject Mathematics and Computer Science Cryptography links to many areas of mathematics and CS Number theory Combinatorics Statistics Information theory Cryptanalysis – linguistics and psychology also help The prehistory of the Kryptos sculpture Office of Strategic Services (OSS) founded 1942 after Pearl Harbor Central Intelligence Agency (CIA) founded 1947 after WW2 Original HQ built at Langley, Virginia in Nov 1959 – Mar 1961. Langley is a metonym for the CIA CIA Fine Arts Commission established in 1963 Purpose: “to advise the Director on esthetic matters relating to the Headquarters Building and grounds” New HQ built at Langley in May 1984 – Mar 1991 “George Bush Center for Intelligence” (DCI 1976-77, named 1999) Art selection for the new HQ General Services Administration “Art-in-Architecture” department chose artists for new building Criteria: “This art should reflect life in all its positive aspects (e.g. truth, justice, courage, liberty etc.) It should engender feelings of well-being, hope and promise and such.” March 1988 – James Sanborn selected for sculpture and Matt Mullican for interior design. $450,000 total contract. April 1988 – Mullican declines. “When I think CIA, I think guns … I think international trauma. I think participating at the CIA would somehow imply my support for it. Context creates meaning.” Sanborn “signed on immediately” saying “… something on this scale … transforms you financially.” $250,000 contract. Creation (1988) November 1988 – model presented ”a sculpture composed primarily of slabs of red granite, with verdigris copper plates (pierced by frequency code alphabet tables), lodestone, and petrified wood used as secondary materials.” “Four aesthetically united sculptural groupings that are sophisticated, intellectual, and of a simple, strong, successful scale.
    [Show full text]
  • FOIA CASE LOGS for the Central Intelligence Agency (CIA)
    Description of document: FOIA CASE LOGS for: The Central Intelligence Agency (CIA) for FY 2005 – FY 2007 Requested date: 21-October-2007 Released date: 19-February-2008 Posted date: 29-April-2008 Title of Document FY 2005, FY 2006, FY 2007 Case Log Date/date range of document: 01-October-2004 – 21-November-2007 Source of document: Information and Privacy Coordinator Central Intelligence Agency Washington, DC 20505 Fax: (703) 613-3007 The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file Central Intelligence Agency Washington, o.c. 20505 • FEB 19 lOW Reference: F-2008-00211 This is a final response to your 21 October 2007 Freedom ofInformation Act (FOIA) request for "FOIA Case Logs for CIA for the time period FY2005 and FY2006 and FY2007-to-date." We processed your request in accordance with the FOIA, 5 U.S.C. § 552, as amended, and the CIA Information Act, 50 U.S.c. § 431, as amended.
    [Show full text]
  • Kryptos Sculpture, the National Security Agency Located CIA Material and Referred It to Us on 8 December 2015 for Review and Direct Response to You
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com Central Intelligence Agency W•ashington, D.C. 20505 20 July 2017 Mr. John Greenewald The Black Vault Reference: F-2016-00621 Dear Mr. Greenewald: In the course of processing your 19 September 2014 Freedom of Information Act (FOIA) request for Intellipedia entry(s) for Kryptos Sculpture, the National Security Agency located CIA material and referred it to us on 8 December 2015 for review and direct response to you. We have determined that one document can be released in segregable form with deletions made on the basis ofFOIA exemption (b)(3). A copy of the document and an explanation of exemptions are enclosed. Exemption (b)(3) pertains to information exempt from disclosure by statute. The relevant statutes are Section 6 of the Central Intelligence Agency Act of 1949, as amended, and Section 102A(i)(l) of the National Security Act of 1947, as amended. As the CIA Information and Privacy Coordinator, I am the CIA official responsible for this determination. You have the right to appeal this response to the Agency Release Panel, in my care, within 90 days from the date of this letter. Please include the basis of your appeal. If you have any questions regarding our response, you may contact us at: Central Intelligence Agency Washington, DC 20505 Information and Privacy Coordinator 703-613-3007 (Fax) Please be advised that you may seek dispute resolution services from the CIA's FOIA Public Liaison or from the Office of Government Information Services (OGIS) of the National Archives and Records Administration.
    [Show full text]