NSA Releases Secret Pre-History of Computers 167
An anonymous reader writes "The National Security Agency has declassified an eye-opening pre-history of computers used for code-breaking between the 1930s and 1960s. The 344 page report, entitled It Wasn't All Magic: The Early Struggle to Automate Cryptanalysis (pdf), it is available on the Government Attic web site. Government Attic has also just posted a somewhat less declassified NSA compendium from 1993: A Collection of Writings on Traffic Analysis. (pdf)"
Pay no attention (Score:5, Funny)
to the man in the Russian airport.
Re:Pay no attention (Score:5, Funny)
What man? The media is now reporting that Snowden never made it to Moscow. In fact, they are now reporting that there is no record of a US citizen with that name, anymore. It was all a big misunderstanding. It was just an intelligence training exercise.
Re: (Score:1)
Re: (Score:3)
You mean it wasn't just a viral advertisement for next year's "average guy hunted down by the government for knowing too much" blockbuster movie?
"Enemy of the State 2: Electric Boogaloo"
Re: (Score:3)
they are now reporting that there is no record of a US citizen with that name
At the risk of feeding a troll, being wooshed, or having the black helicopters come find me, I have some middle school yearbooks which say otherwise.
*woosh*
If the media really is reporting that Edward Snowden is a made up person, please, provide a citation.
Re: (Score:3)
they are now reporting that there is no record of a US citizen with that name
At the risk of feeding a troll, being wooshed, or having the black helicopters come find me, I have some middle school yearbooks which say otherwise.
*woosh*
If the media really is reporting that Edward Snowden is a made up person, please, provide a citation.
I blame some sort of PRISM intercept for that *woosh* ending up in the wrong place.
Re: (Score:2)
OMG, whatachump! Posting anonymously won't save you, dude! You're history now, too! Or - more accurately, you're NOT history anymore. You'll be disappeared soon. And, sadly for you, no one will even know who the hell you were. Sad, sad, sad. Your own parents will soon forget you, as the NSA agents brainwash them.
If you're going to save yourself, you had better head to Cuba now!
Re:Pay no attention (Score:5, Insightful)
Re:Pay no attention (Score:5, Insightful)
That is exactly what I was thinking. Since their secret program just blew up like semtex in a times square car bomb, they need to do some quick spin control. Look how we move tech forward people! Don't look at what we are doing now....look at new stuff we want to tell you about the past!
Don't pay any mind to the way we spread our own brand of terror like anthrax spores through the sears tower ventilation system. Just pay attention to the muslamic terror groups that we want you to be afraid of, thats the terror that we are trying to create here for our purposes.
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
"muslamic"
lol
Re: (Score:1)
Cut that out please... (Score:2)
My page loads have slowed to a crawl!
Re:Pay no attention (Score:4, Insightful)
Well I for one am convinced. Thank god these files were classified, or else terrorists would know all about how to break WW2 codes. What if Snowden had leaked this? People could have died. People would have died.
What other things besides obsolete WW2 cryptanalysis could the NSA be keeping from terrorists? That's why it's so important for us to trust them.
Re: (Score:2)
All part of damage control -
I was thinking all of sudden there's lots of discussion regarding missile attack on TWA 800 (I thought that whole event was pretty much settled by now). Maybe part of filling up media time to reduce time talking about recent NSA abuses.
Re: (Score:2)
If that's their goal, it seems like an odd way to go about it. "Hey, look at our rich history of codebreaking!" does a poor job of distracting me from PRISM, since one of my concerns is that the NSA may be able to break the encryption used in various cloud services. Releasing such a document only serves to reinforce the idea that the NSA has been breaking codes for a long, long time before PRISM ever existed, and that is an uncomfortable thought, given the recent debacle.
If, on the other hand, the headline
Re:Pay no attention (Score:5, Insightful)
Pay no attention to the man in the Russian airport.
No, they want you to pay attention to him, to this, to ANYTHING except for what they (the US government and the NSA in particular) are actually doing with regards to you personal liberties. That is what they are trying to distract you from thinking about.
Re:Pay no attention (Score:4)
War is Peace
Freedom is Slavery
Ignorance is Strength
(I tried to do all caps like in the book but /. wouldn't let me)
Re: (Score:2)
War is Peace
Freedom is Slavery
Ignorance is Strength
(I tried to do all caps like in the book but /. wouldn't let me)
One difference, I think between the book and today: As far as I can tell, the constant monitoring (telescreens) were something only used on Party members. I don't think that proles were completely bereft of them, but theirs were public screens designed to display the progress of the war, ration updates, and so forth. Not installed in prole residences.
Proles were victims, just as much as Party members, but they weren't prone to being singled out. Mostly they just happened to be in the wrong places when bombs
Re: (Score:2)
Which book is that?
Re: (Score:2)
1984
Re: (Score:2)
Weird. I don't remember it (including its movie), but then it was so long ago.
Re: (Score:2)
Re: (Score:2)
"1984" the novel. Or you can watch the movie. The Eurythmics did an album for the movie. Always enjoyed listening to "Double Plus Good" while studying.
Re: (Score:2)
replace your I's with l's (Score:2)
FREEDOM lS SLAVERY
lGNORANCE lS STRENGTH
Re: (Score:2)
So how do the US government or NSA have any effect on your personal liberties? Will they be stopping you from voting, or what?
Hmm (Score:2)
Seems like it was released in 2002, picked up by a crypto blog today, and now we're claiming it was just released by the NSA.
Re:Hmm (Score:5, Informative)
Ummm...nope.
Requested date: 04-August-2012
Released date: 29-May-2013
Posted date: 24-June-2013
Requested date: 02-August-2012
Released date: 11-June-2013
Posted date: 24-June-2013
still using pre-computers over there (Score:2)
slashdotted. either that, or the flash drive with the files is on a plane to the jungle
Re: (Score:1)
Re: (Score:2)
Pay attention to the man. Ignore the contents of his message.
First pwned! (Score:5, Funny)
Am I crazy for opening a PDF from the NSA?
Re:First pwned! (Score:5, Informative)
Not if you did it in a VM running a LiveCD...
Re:First pwned! (Score:5, Interesting)
If you're worried about a NSA attack, a VM isn't going to save you. There have been several known exploits to break out of VM's. That will get them access to any harddrive if there's one connected at all. And if there isn't, there have been occasional exploits to flash a rootkit into BIOS. They could also activate Wifi or Bluetooth to infect any nearby computers or smartphones or any other smart devices, which could even bounce the infection back to the current computer after it's rebooted without the LiveCD and/or without the VM and/or with the harddrive reconnected.
-
Re: (Score:2)
Not if you did it in a VM running a LiveCD...
As if there have never been expliots allowing the guest to compromise its host. Even booting a live CD on metal you run risk of rouge software overwriting firmware of the system or any number of subsystems. Spinning platters are not much different than spinning centrifuges when you think about it.
Re: (Score:1)
Re: (Score:1)
AC sending an FYI for you to google...
There have been successful remote exploits against firmware drivers for over a decade (think your NIC, my old dell wireless card, and all types of video drivers... anything with DMA access and a bit of a microprocessor)
And for about two years there's been public proof of concepts actually infecting the firmware itself with a rootkit that preloads and installs itself into the O/S. I believe two were presented at blackhat recently.
For about five year's, there's been virt
Re: (Score:2)
I commend you on your best practices, but think very carefully if you ever want a machine you open such a PDF on to be connected to any network. You really might be better off dumping the link to wget, burning a CD, and physically carrying it over to an "assumed compromised" host.
Yes. When in doubt, airgap.
Re: (Score:2)
48MB for 344 pages?
Re:First pwned! (Score:5, Insightful)
Not particularly implausible if it has pictures(especially highish-quality and/or appallingly malcompressed ones). The actual exploit code is probably a pretty small percentage of the total.
Re: (Score:2)
Scanned and OCR'ed, but it's all images.
Re: (Score:2)
If they're going to bring the battering ram to your door, you might as well open it and let them in. It'll save you the door at least.
More Secret History (Score:2, Interesting)
How about Bush's blackmail scheme where he used the NSA to try to obtain material to blackmail UN ambassadors into voting for invading Iraq. Most of the media treated that like it was secret...
Re: (Score:2)
Since the Roman Republic? Get out of here - even Ronald Reagan wasn't that old!
Re: (Score:2)
PDFS (Score:5, Funny)
Re:PDFS (Score:4, Funny)
Hey you guys who are talking about Snowden, download this PDF with some cool additional code! Don't worry about it. I promise we didn't buy exploits from Adobe or Microsoft!
Why buy what you can get for free?
Re:PDFS (Score:5, Insightful)
Hey you guys who are talking about Snowden, download this PDF with some cool additional code! Don't worry about it. I promise we didn't buy exploits from Adobe or Microsoft!
Why buy what you can get for free?
If you don't use up the budget you don't get more next year. Especially if your working at an agency that can't be measured for efficiency in any way.
Re: (Score:2)
Possibly true; but if you have a wishlist that is longer than your budget(and who doesn't?) why buy items you could get for free and deny yourself the means to buy items that you need to buy?
Re: (Score:2)
You never have enough sharks with lasers - NEVER! Or enough nukes in orbit. You just can't have enough!
Re: (Score:2)
If you don't use up the budget you don't get more next year. Especially if your working at an agency that can't be measured for efficiency in any way.
Well, any other way.
Re: (Score:2)
Because it creates goodwill, and an excuse not to be subversive. People like excuses to maintain the status quo. Paying for a service rendered, even if pennies on the dollar, qualifies.
It's an old mobster trick.
Re: (Score:2)
They are cryptanalysts after all - always writing and thinking in codes...
Re: (Score:3, Insightful)
I'm not too worried about exploits from Adobe or Microsoft affecting evince...
Of course it wasn't magic (Score:2, Funny)
As we all know it was Lawrence Pritchard Waterhouse, using a steam powered analog computer to break (and make) secret communications. Case closed, this is clearly more lies by the NSA.
wrong topic (Score:5, Insightful)
Dear NSA, I think you're confused. The current topic of discussion is your ongoing violation of the 4th Amendment of the U.S. constitution.
Compared to that, I truly doing give a fuck about your history of codebreaking.
Re: (Score:3, Insightful)
I do care about the history of codebreaking, but it doesn't mean i'm going to trust the NSA to tell me the truth about it. Which is why I'm focusing more on their fourth amendment violations instead. And, of course, the potential repercussions the same violations are liable to have on our rights to free association, since apparently we can now be surveiled on the grounds of where a friend of a friend of a friend ordered pizza from that may have had a foreign national working there.
Re: (Score:2)
And that's why this is the kind of place that can plant the seeds of revolution. This post alone is guaranteed to put me into an NSA database of known subversives. So be it. Now the question is, what can we crowd-source? How about starting with some local elections, and working our way up?
Re:wrong topic - but speculative (Score:2)
Speculation:
The secret pre-history of the NSA may apply to the current Snowden issues. Reading Bamford (Puzzle Palace et al) it's obvious that the USA has been able to "coax" carriers and software developers into providing back-doors into their trunk lines and software. I've always wondered if it's because the NSA has prior art in much of computing discoveries of the pas 75 years, and uses it to gain access to whereever it wants to go? I mean, it does go whereever it wants to, and this may be why.
I'm just
Re: (Score:2)
Dear NSA, I think you're confused. The current topic of discussion is your ongoing violation of the 4th Amendment of the U.S. constitution.
I think the confusion here is entirely yours. There was another topic adjacent to this one where the subject you want to discuss would not have been out of place. Why aren't you posting there?
Wikileaks Aiding Snowden - Chinese Social Media Divided - Relations Strained [slashdot.org]
There is no "violation of the 4th Amendment" if the activities of the NSA are consistent with the Article II powers of the Constitution, and otherwise consistent with the law. So far they appear to be. I see many bold claims about violatio
Oh, isn't this convenient... (Score:5, Funny)
Squirrel!
Re: (Score:2)
Squirrel!
and partner Moose? constantly being threatened by Boris and Natasha?
Re: (Score:2)
I believe it's in reference to this. [youtube.com] A running gag in "Up!"
The Puzzle Palace (Score:1)
There's a relatively old book about the NSA and SIGINT written by a journalist who studied publicly available materials using Tom Clancy's MO, that you can buy at Barnes and Noble or Amazon.com. I remember reading it and thinking it was more like "what it's like to work at the NSA" than an expose, though. Still, IIRC the author and publisher had to square off with the NSA to get it in print.
'This site has been suspended' (Score:1)
Secret service intervention or just slashdotted?
Pre History? (Score:1)
What do you mean Pre-History?
According to Wikipedia: Prehistory means "before we had written records,"
So while the written records of these code breaking computers may just recently have been declassified, its not like they didn't exist, and of course there were 'computers' before that (Hollerith punched cards, and of course Charles Babbage and Ada Lovelace)
Re: (Score:3)
Re: (Score:2)
Pre-History means "before recorded history". [snip] So it is basically wrong.
I take your point. However, I would note the qualifier: "secret pre-history."
From the time of the "father of history" Herodotus himself, it's pretty clear that history is about people being able to tell a story about past events.
If facts about some devices were kept secret and thus were not available for historians to write about, there's a strong argument that such information is "pre-historical," in the sense that stuff may have been going on before the known written ("historical") record. Of course
Re: (Score:3)
I would note the qualifier: "secret pre-history."
It's a formerly secret history, not a secret pre-history. The former is what you get when you hide the records. The latter is what you get when there are no records, and nobody talks about it (or everyone is silenced, or dies of natural causes, etc.)
Re: (Score:2, Funny)
Who did Herodotus have to fuck to be the father of history?
Re: (Score:2)
Who did Herodotus have to fuck to be the father of history?
Ananke, apparently.
It is a good read... (Score:4, Interesting)
For something in the time periods mentioned, it is a good read, especially with the issues at the time.
I would say that crypto advances and computers go hand in hand, from the mechanical rotor devices to more advanced algorithms like DES, then to ones that have a larger bitsize and block size (AES.)
What will be the next big crypto advance is a next generation public key algorithm. RSA has been good, but it, DSA, and ECC can fall if a quantum computer of a decent size can be built. What is needed is a next generation public key algorithm, but those are a lot harder to come by than symmetric algos. What would be nice is an algorithm with a small key size like ECC (which since in theory a 256 bit ECC key is as secure as a 128 bit AES key), compared to 16384 bit keys for RSA.
Of course, the applied crypto part is important as well.
Re: (Score:2)
I would say that crypto advances and computers go hand in hand...
I would actually say instead that crypto advances go in fits and spirts of understanding instead of tracking the advances of computer technology.
Today, we are apparently not much beyond iterated substitution/permutation block ciphers that have some hardening against linear and differential analysis (things known about by the NSA and applied to the DES algorithm back in the '70s). Nearly all ciphers (and ciphers used in hash algorithms) have been developed along these lines of thinking. When this switches
Re: (Score:2)
It's not, actually. There are already asymmetric crypto algorithms which are believed to be quantum-resistant. They are typically based on the hardness of vector problems in n-dimensional integer lattices, or problems that have been proven reducible to such problems such as learning with errors [nyu.edu].
Re: (Score:2)
It's not, actually. There are already asymmetric crypto algorithms which are believed to be quantum-resistant. They are typically based on the hardness of vector problems in n-dimensional integer lattices, or problems that have been proven reducible to such problems such as learning with errors [nyu.edu].
Interesting read, but it doesn't address the questions at hand:
Are cryptography advances and computer advances hand-in-hand? I believe the answer to that question is still no.
Are big crypto advances in a next generation public key algorithm limited by our knowledge? I believe the answer to that question is still yes.
For example, the McEliece-like crypto system (which seems suspiciously analogus to your LWE paper) did not appear to have any major advances for many years (probably because sending around huge
Re: (Score:2)
That's a fair and very insightful point. And I see now by re-reading your original post it was actually the point you were making all along, I just didn't see it.
Re: (Score:2)
I repeat: as far as I know. Feel free to correct me if I'm wrong.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
D-Wave claimed to have a 512 quantum bit system: http://m.npr.org/news/Technology/185532608?start=5 [npr.org]
Re: (Score:2)
Originally, people thinking about quantum computing were only thinking about entanglement computers because nobody assumed that another type could exist. Then DWave built a quantum computer based on tunneling, which is clever but a completely different thing. 'Quantum computer' in most contexts refers to an entanglement computer, you can't run Shor's_algorithm [wikipedia.org] on a DWave.
acknowledgements.... (Score:1)
From the traffic analysis document page 3: Thanks are due .... for her encouragement and support in the making
of this collection. Without the access to her files she so generously offered, it could not
have been produced.
LOL. All sorts of scenarios crossed my mind reading this.
Site suspended (Score:2)
Government Attic is offline. Any chance of a mirror?
The site got suspended... (Score:2)
The only link on the NSA's site that mentions it was this one:
http://www.nsa.gov/public_info/_files/crypto_almanac_50th/NSA_Before_Super_Computers.pdf [nsa.gov]
But it's not the actual pdf... And no trace of the pdf on torrent sites. Can anyone seed it and post a link?
Re: (Score:1)
NSA (Score:3)
No Safeguards Assured.
blackholed (Score:2)
Name: www.governmentattic.org
Address: 127.0.0.1
Comment removed (Score:3)
Re: (Score:2)
Sigh. Just google the pdf name WastlAlM 2002.pdf and you'll find authentic pictures and controversial scriptures at http://tmk.rauris.net/outdex.php?site=11 [rauris.net] at first hit.
Re: (Score:2)
Anyone has alternative links to the pdfs?
No need. All the targeted people have download it by now.
Re: (Score:3, Informative)
Alternative, working, link. (Score:2)
Much ado about nothing... (Score:2)
If reading of Stalin's and Mao's purges didn't teach you that, then the still-unsatisfied quest for WMDs and al Qaida trai
Re:Broken Link (Score:5, Funny)
Re: (Score:3)
Re: (Score:2)
Re: (Score:2)
The links aren't dead. The NSA is logging every request.
Re: (Score:2)
Wrong-o, AC!!
The need for high-quality Porn is at least as important a driver. This is admitted by all true geeks.