Meeting the Espionage Challenge: a Review of United States Counterintelligence and Security Programs

Total Page:16

File Type:pdf, Size:1020Kb

Meeting the Espionage Challenge: a Review of United States Counterintelligence and Security Programs 99m CONGRESS REPORT 2d Session SEAE99-522 MEETING THE ESPIONAGE CHALLENGE: A REVIEW OF UNITED STATES COUNTERINTELLIGENCE AND SECURITY PROGRAMS REPORT OF THE SELECT COMMITTEE ON INTELLIGENCE UNITED STATES SENATE OcOBER 3 (legislative day, SEPTEMBER 23), 1986.-Ordered to be printed U.S. GOVERNMENT PRINTING OFFICE 64-2680 WASHINGTON' 1986 SENATE SELECT COMMITTEE ON INTELLIGENCE [Established by S. Res. 400, 94th Cong., 2d Sess.] DAVE DURENBERGER, Minnesota, Chairman PATRICK J. LEAHY, Vermont, Vice Chairman WILLIAM V. ROTH, Ja., Delaware LLOYD BENTSEN, Texas WILLIAM S. COHEN, Maine SAM NUNN, Georgia ORRIN HATCH, Utah THOMAS F. EAGLETON, Missouri FRANK MURKOWSKI, Alaska ERNEST F. HOLLINGS, South Carolina ARLEN SPECTER, Pennsylvania DAVID L. BOREN, Oklahoma CHIC HECHT, Nevada BILL BRADLEY, New Jersey MITCH McCONNELL, Kentucky ROBERT DOLE, Kansas, Ex Officio ROBERT C. BYRD, West Virginia, Ex Officio BERNARD F. MCMAHON, Staff Director Enic D. NEWSOM, Minority Staff Director DORTHEA ROBERTSON, Clerk (II) CONTENTS Page I. Introduction and Summary.................................................................................... 1 A. Background.......................................................... 1 B. Organization of tlieU.S. Government to Meet the Hostile Intelli- gence Challenge...................................................................................... 3 C. Counterintelligence: Learning the Lessons of Recent Cases ............ 4 D. Security Countermeasures: Defending on Many Fronts................... 6 E. Budgetary Impact .................................................................................... 9 F. Legislative Proposals................................................................................ 10 G. Respect for Individual Rights................................................................. 11 II. The Hostile Intelligence Threat ........................................................................... 12 A. Damage to National Security ................................................................. 12 B. Sources of the Threat............................................................................... 17 1. Soviet Union............................................................................... 17 2. Warsaw Pact and Cuba............................................................ 18 3. People's Republic of China ..................................................... 19 4. Other Countries ......................................................................... 20 C. Human Intelligence Techniques ............................................................ 20 1. Official Presence ........................................................................ 21 2. Other Aspects of the Hostile Intelligence Presence............ 23 3. Recruited Agents....................................................................... 25 4. Soviet Methods of Recruitment .............................................. 26 5. Technology Transfer ................................................................. 28 6. Active Measures and Disinformation .................. 30 D. Technical Collection Operations ............................................................ 33 1. Interception of Communications ............................................ 33 2. Other Forms of Electronic Surveillance ............................... 34 3. Penetration of Computer Systems.................... 35 4. Im agery ....................................................................................... 36 E . Sum m ary .................................................................................................... 37 M. Counterintelligence.................................................................................................. 38 A. Need for a Counterintelligence Strategy.............................................. 39 B. Hostile Presence Limits........................................................................... 40 C. Counterintelligence Awareness Programs........................................... 45 D. Domestic Operations ................................................................................ 48 1. Coverage of Establishments and Officers ............................. 49 2. Offensive Operations................................................................ 50 3. Espionage Investigations and Prosecutions.......................... 52 E. Overseas Operations................................................................................. 56 F. Personnel Management and Training................................................. 56 IV. Security Countermeasures...................................................................................... 58 A. A National Strategic Security Program............................................... 59 B. Personnel Security.................................................................................... 65 C. Information Security................................................................................ 74 D. Communications, Computer and Emanations Security.................... 80 E. Technical and Physical Security............................................................ 85 F. Industrial Security......................................................... 87 G. Congressional Security............................................................................. 90 V. Appendixes ..........................................................-............... 97 Appendix A. U.S. v. Whitworth, Affidavit of RADM William 0. Stu- deman and Declaration of John L. Martin.............................................. 97 Appendix B. Defense Security Institute Analysis of the Harper Case... 105 Appendix C. Defense Security Institute Analysis of the Bell/Za- ch arak i C ase ................................................................................................... 112 IV Appendix D. Defense Security Institute Analysis of the Cavanagh Page C ase ................................................................................................................. 126 Appendix E. U.S. v. Zakharov, Affidavit for an Arrest Warrant and Search Warrant; and Indictment............................................................... 136 Appendix F. Forged letter from Herbert Romerstein to Senator David Durenberger; actual letter from Romerstein to LTG Robert L. Schweitzer; and forged letter from LTG Schweitzer to President Augusto Pinochet of Chile........................................................................... 142 Appendix G. Draft Senate Security Manual............................................... 146 99m CONGRESS REPORT 2d Session SENATE 99-522 MEETING THE ESPIONAGE CHALLENGE: A REVIEW OF UNITED STATES COUNTERINTELLIGENCE AND SECURITY PROGRAMS OCTOBER 3 (legislative day, SEPTEMBER 23), 1986.-Ordered to be printed Mr. DURENBERGER, from the Select Committee on Intelligence, submitted the following REPORT I. INTRODUCTION AND SUMMARY As espionage is ancient, so is counterintelligence. The Chinese military theorist Sun Tzu stated the principle in the fourth century B.C.: "It is essential to seek out enemy agents who have come to conduct espionage against you. ." I Today, over two millenia later, the battle is still being waged. A. BACKGROUND At the beginning of the 99th Congress, the Select Committee on Intelligence initiated a comprehensive review of the capabilities of U.S. counterintelligence and security programs for dealing with the threat to the United States from Soviet espionage and other hostile intelligence activities. This decision was an outgrowth of eight years of Committee interest in these issues. The review is also con- sonant with the Committee's mission to "oversee and make con- tinuing studies of the intelligence activities and programs of the United States Government, and to submit to the Senate appropri- ate proposals for legislation and report to the Senate concerning such intelligence activities and programs." Senate Resolution 400, which established the Committee ten years ago, specifies that intel- ligence activities include "activities taken to counter similar activi- ties directed against the United States." The Committee's review had barely begun when the arrests of John Walker and two of his relatives began to make 1985 the "Year of the Spy." In June, 1985, the Committee pledged that it 'Sun Tzu, The Art of War, trans. by Samuel B. Griffith, Oxford University Press (London: 1963). p. 148. would prepare a report to the full Senate at the earliest possible time. In light of this Committee's ongoing efforts, the Senate decid- ed not to create a National Commission on Espionage and Security. On June 20, 1985, the Chairman of the Committee wrote to the President, saying, "You and we share an historic opportunity- both to dramatically improve U.S. counterintelligence and security and to demonstrate how Congress and the Executive can work to- gether to achieve progress in sensitive intelligence areas." The ensuing fifteen months have generated an amazingly sus- tained interest in counterintelligence and security on the part of both policymakers and the public. There have been over a dozen arrests for espionage, nearly all leading to guilty pleas or verdicts; Americans and West Germans with sensitive information have de- fected to the Soviet Union and East Germany; and Soviets with sensitive information have defected to the West, and in one major case then returned to the Soviet Union. Most recently, the Soviet arrest of an innocent American journalist in retaliation
Recommended publications
  • Steganography As a Means of Attacking Information Systems
    Scientific and Practical Cyber Security Journal (SPCSJ) 2(4): 75-80 ISSN 2587-4667 Scientific Cyber Security Association (SCSA) STEGANOGRAPHY AS A MEANS OF ATTACKING INFORMATION SYSTEMS Anna Romanova 1, Sergiy Toliupa 2 1Taras Shevchenko University of Kyiv, Faculty of Information Technology, 2 Taras Shevchenko University of Kyiv, Faculty of Information Technology ABSTRACT. An analysis of steganography methods that are can be potentially used as instruments in attacks on information and communication systems is presented. The possible solutions to ensure resilience to such attacks are presented. Keywords: steganography, TEMPEST, covert channel, information protection Cryptography is widely used as one of the most efficient and approbated methods of critical information resources protection. Nevertheless, in particular cases it might be more effective to hide the communication channel itself instead of making the information within it unreadable. Such a practice, namely concealing data within unsuspicious, innocent-looking containers, is called steganography. Any concept might have a double application. While being primarily considered a means of information protection, steganography can be used with ill intentions, as well. In fact, several high-tech attacks are based on the hidden data transmission, and contemporary methods of counteraction do not provide satisfactory level of resilience to those. These attacks are not always considered to be steganography-based, as they, for the most part, use a variety of features, characteristic for information and communication systems – physical effects, transmission protocols, communication infrastructure, specific features of software, cryptography etc. Nevertheless, the attack requires a classical statement of the task of steganography – how to transmit data so that a potential attacker could not acquire them due to not knowing about the presence of a transmission channel, even if he or she has a suspicion about one and the possible methods are known.
    [Show full text]
  • NPS Investigative Services Branch HIGHLIGHTS of 2015 HIGHLIGHTS of 2015 from the NPS INVESTIGATIVE SERVICES BRANCH
    National Park Service US Department of the Interior NPS Investigative Services Branch HIGHLIGHTS OF 2015 HIGHLIGHTS OF 2015 FROM THE NPS INVESTIGATIVE SERVICES BRANCH The view from Storm Peak in Rocky Mountain National Park. NPS photo by C Brindle. The Investigative Services Branch of the National Park Service provides critical investigative and other law enforcement support to a wide range of customers. Our core mission is the immediate and long-term protection of park resources, visitors, assets, employees, and residents. We accomplish this through detection, investigation, apprehension, and successful prosecution of persons who violate laws of the United States of America while within, or while affecting, the National Park System. from the ISB Mission Statement HIGHLIGHTS OF 2015 FROM THE NPS INVESTIGATIVE SERVICES BRANCH Map and Organizational Structure of ISB The Investigative Services Branch (ISB) of the National Park Service is led by a Deputy Chief stationed in Washington, DC, and by a Special Agent in Charge (SAC). The SAC directly oversees ISB’s five Assistant Special Agents in Charge (ASACs), and each ASAC leads a field office covering multiple states. The Special Agents of the Investigative Services Branch are geographically distributed across the National Park System, pre-positioned to conduct investigations as efficiently as possible. Larger operations are often carried out by Special Agents from multiple field offices. In its first full year with this single SAC organization structure, the team saw closer cooperation, coordination,
    [Show full text]
  • A Review of FBI Security Programs, March 2002
    U.S. Department of Justice A Review of FBI Security Programs Commission for Review of FBI Security Programs March 2002 Commission for the Review of FBI Security Programs United States Department of Justice 950 Pennsylvania Avenue, NW, Room 1521 Washington, DC 20530 (202) 616-1327 Main (202) 616-3591 Facsimile March 31, 2002 The Honorable John Ashcroft Attorney General United States Department of Justice 950 Pennsylvania Avenue, N.W. Washington, D.C. 20530 Dear Mr. Attorney General: In March 2001, you asked me to lead a Commission to study security programs within the Federal Bureau of Investigation. Your request came at the urging of FBI Director Louis Freeh, who had concluded that an outside review was critical in light of the then recently discovered espionage by a senior Bureau official. In discharging my duties, I turned to six distinguished citizens as fellow Commissioners and to a staff of highly qualified professionals. I want to acknowledge the diligence with which my colleagues pursued the complex matters within our mandate. The Commission took its responsibilities seriously. It was meticulous in its investigation, vigorous in its discussions, candid in sharing views, and unanimous in its recommendations. When I agreed to chair the Commission, you promised the full cooperation and support of the Department of Justice and the FBI. That promise has been fulfilled. I would like to thank the Department’s Security and Emergency Planning Staff for the expert help they gave us, and I especially commend the cooperation of Director Mueller and FBI personnel at every level, who have all been chastened by treachery from within.
    [Show full text]
  • SARS-Cov-2 Vaccine Breakthrough Surveillance and Case Information Resource Washington State Department of Health September 22, 2021
    SARS-CoV-2 Vaccine Breakthrough Surveillance and Case Information Resource Washington State Department of Health September 22, 2021 1 Page Break To request this document in another format, call 1-800-525-0127. Deaf or hard of hearing customers, please call 711 (Washington Relay) or email [email protected]. Publication Number 420-339 For more information or additional copies of this report: Disease Control and Health Statistics Public Health Outbreak Coordination, Information, and Surveillance 1610 NE 150th Street, MS: K17-9 Shoreline, WA 98155 Phone: 206-418-5700 (24-hour contact for local health jurisdictions only) Email: [email protected] 2 Page break SARS-CoV-2 Vaccine Breakthrough Surveillance and Case Information Resource Washington State Department of Health September 22, 2021 COVID-19 vaccines are effective and critical tools to aid in the control of this pandemic. Large- scale clinical studies found that COVID-19 vaccines prevented most people from getting COVID- 19 illness, but like most other vaccines, they are not 100 percent effective. This means some fully vaccinated people will still get infected with SARS-CoV-2. These individuals may or may not develop COVID-19 symptoms. Vaccine breakthrough occurs when someone gets infected with an organism they are fully vaccinated against. For the COVID-19 vaccine, this means someone tests positive for SARS-CoV- 2 two weeks or more after receiving the full series of an authorized COVID-19 vaccine. Since millions of people in the United States are getting vaccinated, we expect to see some breakthrough disease. Fortunately, there is evidence from research studies that the COVID-19 vaccine reduces the risk of people getting really sick and needing to go to the hospital or dying from COVID-19.
    [Show full text]
  • Transportation Security Administration Agent Arrested for Conspiracy to Transport Illegal Aliens
    U.S. Department of Justice Rosa Emilia Rodríguez-Vélez United States Attorney District of Puerto Rico 350 Carlos Chardon Avenue, Suite 1201 Hato Rey, PR 00918 PHONE: 787-766-5656 FAX: 787-772-4012 FOR IMMEDIATE RELEASE Contact: U.S. Attorney’s Office Date: September 12, 2013 Lymarie V. Llovet-Ayala Public Affairs Specialist (787) 766-5656; (787) 340-1835 TRANSPORTATION SECURITY ADMINISTRATION AGENT ARRESTED FOR CONSPIRACY TO TRANSPORT ILLEGAL ALIENS San Juan, Puerto Rico – Today, David Alexander Díaz-Torres, Transportation Security Administration (TSA) Officer, was arrested by special agents of Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations (HSI) in Orlando, FL, for conspiracy to transport illegal aliens within the United States, announced U.S. Attorney for the District of Puerto Rico, Rosa Emilia Rodríguez-Vélez. Díaz-Torres was charged on September 10, 2013, in a 13-count superseding indictment with five other individuals for bringing, transporting, harboring and shielding illegal aliens within the United States. On August 7, 2013, Rafael Severino, Eduard Bueno-Beltrán, Luis Raul Sierra-Conde, Juan Severino-Basora and Esther Mary Sánchez-Cruz were indicted for participating in a scheme to bring illegal aliens to the United States. On March 24, 2012, a group of Brazilian nationals were smuggled by an unidentified female to New York through the Luis Muñoz Marín International Airport in San Juan, Puerto Rico. It is alleged that David A. Díaz-Torres assisted two co-defendants in smuggling the group of Brazilians by allowing them to pass the security checkpoint area without being questioned. The group continued to New York, Boston and Philadelphia on board commercial flights.
    [Show full text]
  • NSA's Efforts to Secure Private-Sector Telecommunications Infrastructure
    Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail ac- counts and stealing intellectual property,1 the company turned to the National Security Agency (NSA) for help in securing its systems. For a company that had faced accusations of violating user privacy, to ask for help from the agency that had been wiretapping Americans without warrants appeared decidedly odd, and Google came under a great deal of criticism. Google had approached a number of federal agencies for help on its problem; press reports focused on the company’s approach to the NSA. Google’s was the sensible approach. Not only was NSA the sole government agency with the necessary expertise to aid the company after its systems had been exploited, it was also the right agency to be doing so. That seems especially ironic in light of the recent revelations by Edward Snowden over the extent of NSA surveillance, including, apparently, Google inter-data-center communications.2 The NSA has always had two functions: the well-known one of signals intelligence, known in the trade as SIGINT, and the lesser known one of communications security or COMSEC. The former became the subject of novels, histories of the agency, and legend. The latter has garnered much less attention. One example of the myriad one could pick is David Kahn’s seminal book on cryptography, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet.3 It devotes fifty pages to NSA and SIGINT and only ten pages to NSA and COMSEC.
    [Show full text]
  • TCAS II) by Personnel Involved in the Implementation and Operation of TCAS II
    Preface This booklet provides the background for a better understanding of the Traffic Alert and Collision Avoidance System (TCAS II) by personnel involved in the implementation and operation of TCAS II. This booklet is an update of the TCAS II Version 7.0 manual published in 2000 by the Federal Aviation Administration (FAA). It describes changes to the CAS logic introduced by Version 7.1 and updates the information on requirements for use of TCAS II and operational experience. Version 7.1 logic changes will improve TCAS Resolution Advisory (RA) sense reversal logic in vertical chase situations. In addition all “Adjust Vertical Speed, Adjust” RAs are converted to “Level-Off, Level-Off” RAs to make it more clear that a reduction in vertical rate is required. The Minimum Operational Performance Standards (MOPS) for TCAS II Version 7.1 were approved in June 2008 and Version 7.1 units are expected to be operating by 2010-2011. Version 6.04a and 7.0 units are also expected to continue operating for the foreseeable future where authorized. 2 Preface................................................................................................................................. 2 The TCAS Solution............................................................................................................. 5 Early Collision Avoidance Systems................................................................................ 5 TCAS II Development .................................................................................................... 6 Initial
    [Show full text]
  • (OIG) Investigation Closing Report Concerning Hubbell Trading Post, 2008 and Memo from National Park Service (NPS) in Reply to Investigation, 2009
    Description of document: Department of the Interior Inspector General (OIG) Investigation Closing Report concerning Hubbell Trading Post, 2008 and memo from National Park Service (NPS) in reply to Investigation, 2009 Requested date: 24-December-2013 Released date: 30-December-2013 Posted date: 26-May-2014 Source of document: FOIA Officer Office of Inspector General U.S. Department of the Interior 1849 C Street, NW MS-4428 Washington, DC 20240 Fax: 202-219-1944 (Attn: FOIA Officer) Email: [email protected] The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. OFFICE OF INSPECTOR GENERAL U.S. DEPARTMENT OF THE INTERIOR VIA EMAIL December 30, 2013 Re: OIG-2014-00015 This is in response to your letter dated December 24, 2013, which was received by the Office oflnspector General (OIG) on December 26, 2013.
    [Show full text]
  • US Counterintelligence and Security Concerns Feb 1987.P65
    Union Calendar No. 3 100TH CONGRESS HOUSE OF REPRESENTATIVES REPORT 1st Session 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS1986 REPORT BY THE PERMANENT SELECT COMMITTEE ON INTELLIGENCE HOUSE OF REPRESENTATIVES FEBRUARY 4, 1987.Committed to the Committee of the Whole House on the State of the Union and ordered to be printed U.S. GOVERNMENT PRINTING OFFICE 68-440 WASHINGTON : 1987 Union Calendar No. 3 100TH CONGRESS REPORT 1st Session HOUSE OF REPRESENTATIVES 100-5 UNITED STATES COUNTERINTELLIGENCE AND SECURITY CONCERNS-1986 FEBRUARY 4, 1987-Committed to the Committee of the Whole House on the State of the Union and ordered to be printed Mr. STOKES, from the Permanent Select Committee on Intelligence, submitted the following REPORT EXECUTIVE SUMMARY Over the past several years, a dangerous upward trend in successful espionage operations against the United States has occurred. Present and former U.S. Gov- ernment employees with access to sensitive classified information have played the key roles in each operation. Damage to U.S. national security has been signifi- cant and is still being estimated. Deeply concerned over these developments, the House Permanent Select Com- mittee on Intelligence has spent a great deal of time investigating this alarming situation. This report represents one outcome of the investigation. From its early days, the Administration has focused considerable attention and effort on improving the effectiveness of U.S. counterintelligence. Concomitantly, the House and Senate Intelligence Committees have authorized significantly in- creased funding for counterintelligence and urged that counterintelligence con- cerns assume a higher priority within the Intelligence Community. These efforts have elevated the morale, status and numbers of counterintelligence personnel, helped cope with security investigation backlogs and encouraged new initiatives in some operational and policy areas.
    [Show full text]
  • Open Source Intelligence (OSINT)
    ATP 2-22.9 Open-Source Intelligence July 2012 DISTRIBUTION RESTRICTION: Unlimited Distribution Headquarters, Department of the Army *ATP 2-22.9 Army Techniques Publication Headquarters No. 2-22.9 (FMI 2-22.9) Department of the Army Washington, DC, 10 July 2012 Open-Source Intelligence Contents Page PREFACE.............................................................................................................. iv INTRODUCTION .................................................................................................... v Chapter 1 OPEN-SOURCE INTELLIGENCE (OSINT) FUNDAMENTALS ........................ 1-1 Definition and Terms .......................................................................................... 1-1 Characteristics .................................................................................................... 1-1 The Intelligence Warfighting Function ................................................................ 1-2 The Intelligence Process .................................................................................... 1-3 The Planning Requirements and Assessing Collection Process ........................ 1-4 The Military Decisionmaking Process ................................................................ 1-4 Intelligence Preparation of the Battlefield ........................................................... 1-5 Chapter 2 PLANNING AND PREPARATION OF THE OSINT MISSION ............................. 2-1 Section I – Planning OSINT Activities ...........................................................
    [Show full text]
  • Wh Owat Ches the Wat Chmen
    WHO WATCHES THE WATCHMEN WATCHES WHO WHO WATCHES THE WATCHMEN WATCHES WHO I see powerful echoes of what I personally experienced as Director of NSA and CIA. I only wish I had access to this fully developed intellectual framework and the courses of action it suggests while still in government. —General Michael V. Hayden (retired) Former Director of the CIA Director of the NSA e problem of secrecy is double edged and places key institutions and values of our democracy into collision. On the one hand, our country operates under a broad consensus that secrecy is antithetical to democratic rule and can encourage a variety of political deformations. But the obvious pitfalls are not the end of the story. A long list of abuses notwithstanding, secrecy, like openness, remains an essential prerequisite of self-governance. Ross’s study is a welcome and timely addition to the small body of literature examining this important subject. —Gabriel Schoenfeld Senior Fellow, Hudson Institute Author of Necessary Secrets: National Security, the Media, and the Rule of Law (W.W. Norton, May 2010). ? ? The topic of unauthorized disclosures continues to receive significant attention at the highest levels of government. In his book, Mr. Ross does an excellent job identifying the categories of harm to the intelligence community associated NI PRESS ROSS GARY with these disclosures. A detailed framework for addressing the issue is also proposed. This book is a must read for those concerned about the implications of unauthorized disclosures to U.S. national security. —William A. Parquette Foreign Denial and Deception Committee National Intelligence Council Gary Ross has pulled together in this splendid book all the raw material needed to spark a fresh discussion between the government and the media on how to function under our unique system of government in this ever-evolving information-rich environment.
    [Show full text]
  • Cryptography
    Cryptography From Wikipedia, the free encyclopedia Jump to: navigation, search "Secret code" redirects here. For the Aya Kamiki album, see Secret Code. German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφ, gráph, "writing", or -λογία, -logia, respectively)[1] is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to nonsense. The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it. Since WWI and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread. Alongside the advancement in cryptology-related technology, the practice has raised a number of legal issues, some of which remain unresolved. Contents [hide] • 1 Terminology • 2 History of cryptography and cryptanalysis o 2.1 Classic cryptography o 2.2 The computer era • 3 Modern cryptography o 3.1 Symmetric-key cryptography o 3.2 Public-key cryptography o 3.3 Cryptanalysis o 3.4 Cryptographic primitives o 3.5 Cryptosystems • 4 Legal issues o 4.1 Prohibitions o 4.2 Export controls o 4.3 NSA involvement o 4.4 Digital rights management • 5 See also • 6 References • 7 Further reading • 8 External links [edit] Terminology Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext).[2] Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext.
    [Show full text]