The Central Intelligence Agency ( CIA ) and National Security Agency ( NSA ) sight on ally and enemies alike through a company they owned that made cryptography equipment , according to an explosive young written report from theWashington Postand Germany ’s ZDF news outlet .

The Swiss - establish party , Crypto AG , which was found in the forties as an autonomous firm during World War II , strike a shady deal with the CIA in 1951 , subsequently became own by the CIA in the seventies , and was disbanded in 2018 . And many former employees of the fellowship , most of whom apparently had no idea that Crypto AG was on the Q.T. controlled by the CIA , are not happy with the Book of Revelation .

The Washington Post and ZDF learned about the program , codenamed both Rubicon and Thesaurus at various prison term , through a 2004 secret CIA account written document produced by the agency itself and a 2008 oral history by German intelligence . But the newsworthiness vent never order readers how they hold these tightly ward written document .

Aerial image of George Bush Center for Intelligence, the headquarters of the Central Intelligence Agency (CIA), in Langley, Virginia in 2018.

Aerial image of George Bush Center for Intelligence, the headquarters of the Central Intelligence Agency (CIA), in Langley, Virginia in 2018.Photo: (Getty Images)

The CIA and NSA operate Crypto AG together with with Western Germany ’s news agency during the first Cold War .

“ It was the intelligence operation takeover of the century , ” the CIA report reads , harmonize to the Washington Post . “ extraneous governments were paying good money to the U.S. and West Germany for the prerogative of having their most unavowed communication study by at least two ( and mayhap as many as five or six ) foreign land . ”

The “ five or six alien countries ” likely refers to theFive Eyesintelligence - share concord between the U.S. , UK , Canada , Australia , and New Zealand , with the sixth country being Germany .

Screenshot:

Excerpt from an internal CIA history written in 2004 about CIA’s intelligence successes, obtained by the Washington PostScreenshot: (Washington Post)

The spying plan was wildly successful and accounted for roughly 40 percent of all intel interception of strange politics by U.S. intelligence in the eighties and a banging 90 per centum for West German intelligence ( BND ) , concord to a screenshot of the CIA history published by the Post .

The Americans eventually bought out the Germans , who left the snoop arrangement in the early 1990s , to take sole ownership of Crypto AG , sometimes referred to by its ship’s company codename Minerva .

How did the cryptography applied science work to lead astray foreign government ? Crypto AG ’s machines were made to see like they were producing randomly generate lineament to encode substance , but they were anything but random . The NSA did n’t install backdoors , it just made the encoding infirm enough that the agency could crack the message .

How To Watch French Open Live On A Free Channel

The Soviet Union and China never buy Crypto AG ’s technology , but at least 62 other land like Japan , Mexico , Egypt , South Korea , Iran , Saudi Arabia , Italy , Argentina , Indonesia , and Libya , all reportedly used the encryption devices and had their most sensitive politics communication theory intercepted and deciphered by the CIA for over half a century . As just one example in the Post ’s story , the Carter administration was spying on Egypt ’s president Anwar Sadat during the Camp David Accords .

This , of trend , leads to some uncomfortable questions about times when U.S. intelligence agencies may have instruct about horrid human rights abuses and did nothing to hold on them . Or , in the font of Central and South America , meter when the CIA may have actively helped perpetrate crimes against humanity while memorise about different plots around the world .

From the Washington Post :

Argentina’s President Javier Milei (left) and Robert F. Kennedy Jr., holding a chainsaw in a photo posted to Kennedy’s X account on May 27. 2025.

The paper largely forefend more unsettling questions , including what the United States knew — and what it did or did n’t do — about countries that used Crypto machines while engaged in assassination patch , ethnic cleanup campaigns and human rights maltreatment .

The revelations in the documents may provide reason to revisit whether the United States was in place to interfere in , or at least expose , international atrociousness , and whether it opted against doing so at time to preserve its access to worthful streams of intelligence .

The Washington Post even mentions an incident in 1977 when an technologist at Crypto AG , identified as Peter Frutiger , fixed the vulnerabilities of the company ’s technology that it deal to Syria , lead the CIA to complain that they could no longer decode messages coming from Damascus . The engineer was promptly fired .

William Duplessie

By the eighties , some countries were becoming suspicious that their encryption devices were compromise , but the CIA organise a plan to fix all that . The agency recruit a extremely well-thought-of pedantic , Kjell - Ove Widman of Sweden , to become a top adviser to the company who was slay anytime a land was ready to dump Crypto AG . After Argentina became suspicious that their technology had been whoop during the Falklands War , Widman swooped in and insisted that their machines were “ unbreakable . ” In reality , U.S. intelligence was decode Argentina ’s messages without any trouble and run them to British word .

The novel theme is truly unbelievable and will obviously afford up a lot more door for historians about the role of organizations like the CIA and NSA in hundreds of events , both large and small , that train place during the late 20th and other 21st century .

And the report should also be an center - opener for multitude in the encryption community who say that today ’s tools likeSignalandTorare secure . Crypto - defenders insist that it does n’t matter if something like Tor received money from the U.S. military machine , the math of the programs keeps everyone ’s communications secure . But with a bombshell like today ’s report , it ’s grueling to fence that any communication theory are completely safe .

Starship Test 9

you may understand the full account over at theWashington Post . It ’s definitely deserving your time if you have any interest at all in the Cold War , espionage , or the history of cryptography .

CryptoEncryptionSignal

Daily Newsletter

Get the safe tech , science , and culture news in your inbox daily .

News from the future , delivered to your nowadays .

Please select your desired newssheet and submit your email to upgrade your inbox .

Lilo And Stitch 2025

You May Also Like

CMF by Nothing Phone 2 Pro has an Essential Key that’s an AI button

Photo: Jae C. Hong

Doctor Who Omega

How To Watch French Open Live On A Free Channel

Argentina’s President Javier Milei (left) and Robert F. Kennedy Jr., holding a chainsaw in a photo posted to Kennedy’s X account on May 27. 2025.

William Duplessie

Starship Test 9

Roborock Saros Z70 Review

Polaroid Flip 09

Feno smart electric toothbrush

Govee Game Pixel Light 06