Showing posts with label cryptography. Show all posts
Showing posts with label cryptography. Show all posts

Tuesday, April 5, 2016

The NSA, Nazi Gold, Watergate, Enigma and Cryptome.org


We have two documents here from the Center for Cryptological History (CCH) of the NSA. Both papers are interesting on several different levels and are highly recommended for those who wish to be informed about how the NSA works and thinks about its work. Those who are paranoid about the NSA (possibly with good reason) but don't know much about it should certainly read these reports to get a more nuanced view of what is going on.

The first paper is a report on how the NSA found itself involved in the ever-beguiling topic of Nazi Gold. In 1997, Congress began an investigation into this history requesting input from the various law enforcement and intelligence agencies, but did not ask the NSA for some reason (one reason could be that the NSA did not come into existence until years after the end of the war). The NSA read about it in the open press and did not think much about it. But coincidentally an NSA historian happened to be going through old archives for work on another topic and discovered to his surprise that the NSA had something to contribute on this subject. Apparently a predecessor organization to the NSA had in fact captured and decrypted discussions between the Swiss delegation on the topic when negotiating with the United States. This started a process whereby the NSA internally decided to bring this document to the attention of the Congressional committee even though they had not asked.




The second paper is a discussion, formerly classified Top Secret Umbra, about the impact of Watergate and the release of Enigma decryption efforts of WW 2 had on their operations. It is particularly interesting because it goes over in modest detail some of the problems that occur when intelligence collected for national security purposes is repurposed for domestic law enforcement. This is a very important problem and one that has the chance of vindicating one small part of the Snowden revelations (even though I believe that most of the Snowden revelations have nothing to do with the violation of American civil rights and were released for other purposes). It is therefore important for anyone who is concerned on these issues to become aware of some of the history of this dilemma which this report describes.

In particular the report discusses what happened when the Reagan Administration requested NSA to cooperate with FBI in using SIGINT for domestic law enforcement and what the NSA thought and did about it. Those who believe that the NSA gladly violates the Constitutional rights of Americans will be reassured to know that by no means is the NSA cavalier about these issues. Those who are concerned about whether their Constitutional rights to privacy might be compromised by a future or current Administration have every reason to be concerned.




You will note that both of these documents are archived on the internet site cryptome.org. Cryptome is a well known entity in the area of Internet privacy and government secrecy. Run by John Young and Deborah Natsios in the upper west side of NYC, they maintain an online repository of many of the government documents that have been released and those that have been leaked and include many items of relevant commentary by individuals, groups and news sources. Although the politics of Mr. Young and Ms. Natsios are far to the left and I certainly do not agree with them on many issues, I have found Cryptome to be a useful and reliable web site and worth checking out on a regular basis.

But can we really believe the content of these papers? Even now the US Government hides the facts of our use of Nazi Gold to finance the reverse engineering of the Nazi anti-gravity drive. And what about the Nazi bases at the Polar regions? Sadly, no mention. We must conclude that these papers were released to deflect attention from the truth.



NSA Paper on Cryptology and the Watergate Era

NSA Paper on Nazi Gold


Thursday, January 30, 2014

Commentary on the Proposed Voynich Solution


This news item is getting a lot of Internet play but I felt that the the commentary out there did not emphasize one of the most appealing elements of the proposed Voynich solution and so we will do so here.

To backup a bit, a manuscript was acquired in 1912 by a collector of rare manuscripts whose text appeared to be enciphered and whose illustrations were exotic and whose provenance appeared to be about 16th century. Many, many people have tried to decode the text and failed. Many others have asserted that the document is a forgery or fraud and at least as many have said they believe it is genuine.

But the biggest mystery was, if it was genuine, what is its backstory? How could it have come out of nothing without someone having known about it? A secret cult ? A mysterious religion ? Proof once more of aliens from outer space who have come for our women ?





What makes this story all the better is that the proposed solution comes from a retired botanist and antiquarian who has published in the journal of the American Botany Council.

So far the response to this paper, from other botanists at least, has been very positive.

What appealed to me was the implied answer to the questions of why the language seems unknown, why no one knew of this document, why the plants are exotic and so forth.  The answer suggested by the proposal is because it was created by indiginous people in New Spain (e.g. Mexico) who later died of one of the epidemics, whose dialect went extinct with so many others in that period, and whose related documents were all burned by the Spanish as they burned so many documents in order to destroy the culture of their conquered territory.

See


and the essay itself




Sunday, March 10, 2013

Modern Historically Correct Computer Phonetic Alphabet


v 0.1 Beta  3/10/2013
[in progress]

Tired of being told words over the phone that you can not spell correctly and have the person on the other end fail to enunciate what they mean and too lazy to use an approved phonetic alphabet for voice communication?  Then consider the following new, rationalized, technology appropriate phonetic alphabet.  The words suggested below are intended to be highly redundant and recognizable words that are unmistakable for any other word on the list, and either have some value in a computer historical sense, or allow the speaker to get out some of their frustration using good Anglo Saxon idiom.

Each comma separated phrase is as good as another, there is no particular expressed priority between the terms. In other words, Burroughs is as good as Burnout.


A -- Alpha, Alphabet, Analog, ASCII, ARPANET
B -- Burroughs, Burnout
C -- Collossus, Channel, Cantaloupe, COBOL
D -- DEC, Dogshit, Data General, Digital Equipment Corporation
E -- Echo, Enigma, EBCDIC
F -- Fuck, Fuckit, Fucking
G -- Geheimschreiber
H -- Hacker, Honeywell, Hollerith
I -- Idiot, IBM
J -- Jerk
K -- Kernel
L -- Lemonade, Lichtenstein
M -- Moron, MIT
N -- Negative, Nebula
O -- Ohbaby, Orion
P -- PDP, Penis, Process, Punched Card
Q -- Quasi, Quack
R -- Ramo, Rancid, Rogue
S -- Stupid, Spacewar
T -- Turing, Teletype, Tron
U -- Ubetcha, User
V -- von Neumann, vector
W -- Woolridge, Whirlwind, Washedup
X -- Xray, Xanadu
Y -- Yessir, Yes Maam
Z -- Zebra, Zork


Examples

Bolt := Burnout Ohbaby Lemonade Teletype
Scumbag := Stupid Cantaloupe Ubetcha Moron Burnout Alphabet Geheimschreiber



References

Category of Phonetic Alphabets on Wikipedia:

Nato Phonetic Alphabet:

Saturday, January 19, 2013

Archive of Books on Cryptome Courtesy of Aaron Swartz


[January 22, 2013: Cryptome has added more books from the archive, and a discussion of the issues related to how they got the archive.   This is the link and it has the most comprehensive list of books that are available from this source on their site.    See http://cryptome.org/aaron-swartz-series.htm]

Cryptome is an internet site that acts as a reporitory of documents, usually government documents, that are related to freedom of speech, cryptography, spying and surveillance. In the aftermath of the Aaron Swartz suicide, they listed on their website approximately 40 different books in PDF form that were probably part of the cache of documents that Swartz had taken from MIT.

But these books are actually a selection from the larger group of books that Swartz 'liberated' and that Cryptome has supposedly archived.  For a  complete list, see below:
http://cryptome.org/2013/01/aaron-swartz/swartz-dl-docs.txt

The first thing I noticed was one of my favorite books, about the Mitochondria by Nick Lane is on this extended list.

A few favorites out of the 40 or so that are posted include:

The MIT Encyclopedia of Cognitive Sciences, by Wilson and Keil, a 1000+ page encyclopedia of topics in the field of Cognitive Science.

The Psychology of Intelligence Analysis by Heier, Jr,, CIA book on the psychology behind Intelligence analysis, addressing such issues as bias in intelligence analysis and reporting.

A Culture of Conspiracy by Barkun, which is a discussion and history of apocalyptic vision in contemporary America, including a review of how the radical right wing started picking up aspects of UFOlogy, as well as the relationship between apocalyptic prophecy and various right wing fringe groups.

Complexity and Cryptography: An Introduction, by Talbot and Welsh, which is a book derived from a course taught by Talbot and Welsh at Oxford as part of a MsC course in Mathematics and the Foundations of Computer Science. It introduces basic complexity theory and cryptography together.

Information Technology and Moral Philosophy by van der Hoven and Weckert, a collection of essays on information ethics, the epistemology of blogging, etc.

Principles of Cybercrime by Clough, which is a 500 page introduction to the history, theory, law and practice of international cybercrime.

And about 35 other books.  Go to http://cryptome.org and look for entries marked "Aaron Swartz:".

The Wikipedia page on Cryptome: