The Central Intelligence Agency ( CIA ) and National Security Agency ( NSA ) sight on ally and enemies alike through a company they owned that made cryptography equipment , according to an explosive young written report from theWashington Postand Germany ’s ZDF news outlet .
The Swiss - establish party , Crypto AG , which was found in the forties as an autonomous firm during World War II , strike a shady deal with the CIA in 1951 , subsequently became own by the CIA in the seventies , and was disbanded in 2018 . And many former employees of the fellowship , most of whom apparently had no idea that Crypto AG was on the Q.T. controlled by the CIA , are not happy with the Book of Revelation .
The Washington Post and ZDF learned about the program , codenamed both Rubicon and Thesaurus at various prison term , through a 2004 secret CIA account written document produced by the agency itself and a 2008 oral history by German intelligence . But the newsworthiness vent never order readers how they hold these tightly ward written document .

Aerial image of George Bush Center for Intelligence, the headquarters of the Central Intelligence Agency (CIA), in Langley, Virginia in 2018.Photo: (Getty Images)
The CIA and NSA operate Crypto AG together with with Western Germany ’s news agency during the first Cold War .
“ It was the intelligence operation takeover of the century , ” the CIA report reads , harmonize to the Washington Post . “ extraneous governments were paying good money to the U.S. and West Germany for the prerogative of having their most unavowed communication study by at least two ( and mayhap as many as five or six ) foreign land . ”
The “ five or six alien countries ” likely refers to theFive Eyesintelligence - share concord between the U.S. , UK , Canada , Australia , and New Zealand , with the sixth country being Germany .

Excerpt from an internal CIA history written in 2004 about CIA’s intelligence successes, obtained by the Washington PostScreenshot: (Washington Post)
The spying plan was wildly successful and accounted for roughly 40 percent of all intel interception of strange politics by U.S. intelligence in the eighties and a banging 90 per centum for West German intelligence ( BND ) , concord to a screenshot of the CIA history published by the Post .
The Americans eventually bought out the Germans , who left the snoop arrangement in the early 1990s , to take sole ownership of Crypto AG , sometimes referred to by its ship’s company codename Minerva .
How did the cryptography applied science work to lead astray foreign government ? Crypto AG ’s machines were made to see like they were producing randomly generate lineament to encode substance , but they were anything but random . The NSA did n’t install backdoors , it just made the encoding infirm enough that the agency could crack the message .

The Soviet Union and China never buy Crypto AG ’s technology , but at least 62 other land like Japan , Mexico , Egypt , South Korea , Iran , Saudi Arabia , Italy , Argentina , Indonesia , and Libya , all reportedly used the encryption devices and had their most sensitive politics communication theory intercepted and deciphered by the CIA for over half a century . As just one example in the Post ’s story , the Carter administration was spying on Egypt ’s president Anwar Sadat during the Camp David Accords .
This , of trend , leads to some uncomfortable questions about times when U.S. intelligence agencies may have instruct about horrid human rights abuses and did nothing to hold on them . Or , in the font of Central and South America , meter when the CIA may have actively helped perpetrate crimes against humanity while memorise about different plots around the world .
From the Washington Post :

The paper largely forefend more unsettling questions , including what the United States knew — and what it did or did n’t do — about countries that used Crypto machines while engaged in assassination patch , ethnic cleanup campaigns and human rights maltreatment .
The revelations in the documents may provide reason to revisit whether the United States was in place to interfere in , or at least expose , international atrociousness , and whether it opted against doing so at time to preserve its access to worthful streams of intelligence .
The Washington Post even mentions an incident in 1977 when an technologist at Crypto AG , identified as Peter Frutiger , fixed the vulnerabilities of the company ’s technology that it deal to Syria , lead the CIA to complain that they could no longer decode messages coming from Damascus . The engineer was promptly fired .

By the eighties , some countries were becoming suspicious that their encryption devices were compromise , but the CIA organise a plan to fix all that . The agency recruit a extremely well-thought-of pedantic , Kjell - Ove Widman of Sweden , to become a top adviser to the company who was slay anytime a land was ready to dump Crypto AG . After Argentina became suspicious that their technology had been whoop during the Falklands War , Widman swooped in and insisted that their machines were “ unbreakable . ” In reality , U.S. intelligence was decode Argentina ’s messages without any trouble and run them to British word .
The novel theme is truly unbelievable and will obviously afford up a lot more door for historians about the role of organizations like the CIA and NSA in hundreds of events , both large and small , that train place during the late 20th and other 21st century .
And the report should also be an center - opener for multitude in the encryption community who say that today ’s tools likeSignalandTorare secure . Crypto - defenders insist that it does n’t matter if something like Tor received money from the U.S. military machine , the math of the programs keeps everyone ’s communications secure . But with a bombshell like today ’s report , it ’s grueling to fence that any communication theory are completely safe .

you may understand the full account over at theWashington Post . It ’s definitely deserving your time if you have any interest at all in the Cold War , espionage , or the history of cryptography .
CryptoEncryptionSignal
Daily Newsletter
Get the safe tech , science , and culture news in your inbox daily .
News from the future , delivered to your nowadays .
Please select your desired newssheet and submit your email to upgrade your inbox .

You May Also Like










![]()