Tag: Cryptography

Germany can’t crack ‘CIA double agent’ laptop

41zw0p9563l.-ss400-

Der Spiegel reports that Attorney General Harald Range gave the German Parliament’s NSA investigation committee the bad news last week. Security experts from the Criminal Police (BKA) and secret services are trying to find out whether the intelligence officer at the

27 Phrases Only Spies Will Understand

Source: AP

People and regions all around the world have unique phrases and slang that only they would understand, and the intelligence community of spies, analysts, and cryptography specialists is no different. For people working in the shadows of the intelligence community, “illegal”

NSA Has ‘Far-Reaching’ Partnership With Israeli Intelligence Agency

index

Documents published Monday by The Intercept revealed the “far-reaching” extent of the U.S. National Security Agency’s collaboration with Israeli intelligence services. The revelations came as the U.S. State Department criticized Israel for its “disgraceful” shelling of a U.N. school, and

What Are the Limits of Legitimate Economic Espionage?

shutterstock_keyboard

What are the limits of legitimate economic espionage? The indictment of five PLA officers for stealing U.S. intellectual property brings economic espionage into the same spotlight lately enjoyed by diplomatic cryptography.  The U.S. decision immediately produced a firestorm of criticism

China’s decision to replace IBM servers with domestic equivalents may boost national security

server_room_ss_img

Chinese government institutions, including the People’s Bank of China and the Ministry of Finance, are reviewing domestic commercial banks’ reliance on IBM servers in an attempt to single out threats to the country’s financial security, Bloomberg reported Tuesday. “The US

Congress Finally Put a (Really Obscure, But Important) Limit on NSA Power

heartbleed_bug

The House passed a toothless NSA reform bill yesterday, and VC Marc Andreessen says that meetings about privacy and surveillance between tech companies and the Obama administration haven’t been very productive. But the news isn’t all depressing for privacy advocates.

NSA infiltrated RSA security more deeply than thought – study

CyberAttack_0204131-617x416

(Reuters) – Security industry pioneer RSA adopted not just one but two encryption tools developed by the U.S. National Security Agency, greatly increasing the spy agency's ability to eavesdrop on some Internet communications, according to a team of academic researchers.

NSA reportedly building quantum computer that could crack most encryption types

US-Intelligence-Report-to-Calculate-Losses-Caused-by-Cyberattacks-from-China

The National Security Agency is reportedly racing to build a computer that will be able to break almost every kind of encryption used to protect medical, banking, business and government records around the world. According to documents provided by NSA

Prestigious speaker Mikko Hypponen cancels RSA talk to protest NSA deal

hypponen - 2c04772cdcfe28f51013d3074203cd142b98838a_389x292

Friday's report that RSA received $10 million to make an NSA-favored random number generator the default setting in its BSAFE crypto tool aren't yet creating any problems on Wall Street, with stock for parent company EMC rising 2 percent on Monday.

Spies worry over “doomsday” cache stashed by ex-NSA contractor Snowden

Edward-Snowden-foto-size-598

(Reuters) – British and U.S. intelligence officials say they are worried about a "doomsday" cache of highly classified, heavily encrypted material they believe former National Security Agency contractor Edward Snowden has stored on a data cloud. The cache contains documents

After NSA leaks, businesses seek security in quantum physics

quantum-mechanics

Cryptography is having a rough few months. On September 5th, leaked NSA documents revealed a systematic effort by the agency to undermine encrypted communications across the board, breaking accepted standards like SSL and systematically weakening others. But while the news

Major US security company warns over NSA link to encryption formula

original

A major American computer security company has told thousands of customers to stop using an encryption system that relies on a mathematical formula developed by the National Security Agency (NSA). RSA, the security arm of the storage company EMC, sent

NSA subversion of internet security: bad for the US, good for criminals

nationalsecurityagencyheadquartersfortmeademaryland

"Properly implemented strong crypto systems are one of the few things that you can rely on," declared Edward Snowden, the former computer technician at America's National Security Agency (NSA) responsible for leaking a trove of documents about his erstwhile employer's

RSA Tells Its Developer Customers: Stop Using NSA-Linked Algorithm

ggfgfgffggfddfdffd.jpg.1000x297x1

Amidst all of the confusion and concern over an encryption algorithm that may contain an NSA backdoor, RSA Security released an advisory to developer customers today noting that the algorithm is the default in one of its toolkits and strongly

NSA and GCHQ unlock privacy and security on the internet

nsa-aibling-540x304

US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former

How the U.S. Cracked Japan’s ‘Purple Encryption Machine’ at the Dawn of World War II

original

When one thinks about cryptography or encryption in World War II, the first thing that comes to mind is the Enigma Machine used by the Nazis, whose code was broken by the Allies and used as a secret tactical advantage.

REVIEW: The Reader of Gentlemen’s Mail. Herbert O. Yardley and the Birth of American Intelligence

books

By David Kahn. New Haven, CT: Yale University Press, 2004. 242 pages Few authors have so successfully mined the history of codebreaking. In Kahn's latest book, he explores the life and times of Herbert Yardley, one of the forgotten figures

REVIEW: Trust but Verify. Imagery Analysis in the Cold War

41RBVDDSZPL._SL500_AA300_

By David T. Lindgren. Annapolis, Md.: Naval Institute Press, 2000. Pp. xiii+222. __________________________________________________________________________________________________________________________ For some reason, books on cryptology apparently sell well. Go to your local Borders and look in the espionage section and you will find half a dozen

REVIEW: Espionage in the Ancient World. An Annotated Bibliography

images25

By R. M. Sheldon. Jefferson, N.C.: McFarland & Co., 2003. ISBN 0-7864-1365-4. Glossary. Index. Pp. ix, 232. $45.00. _________________________________________________________________________________________________________________________________________ The esoteric processes of gathering, evaluating, and applying intelligence information have preoccupied governments and fascinated observers ever since antiquity. That becomes

REVIEW: Cryptography Decrypted

cryptode

by H. X. Mel/Doris Baker, 2001, Addison-Wesley Publishing Co. , 352 p. ______________________________________________________________________________________________________________________________ The book seems to be rather ambitious, since the preface says that it is addressed to any (and therefore all) audience(s), without any limitation on the stated