From: Michael Wilson <0005514706@mcimail.com>
To: Cypherpunks <cypherpunks@toad.com>
Message Hash: c2458fa19056daeaa3b98a966063e89a976189680c84fd8cba859ae393e95e2c
Message ID: <00940627182400/0005514706NA1EM@mcimail.com>
Reply To: N/A
UTC Datetime: 1994-06-27 19:45:23 UTC
Raw Date: Mon, 27 Jun 94 12:45:23 PDT
From: Michael Wilson <0005514706@mcimail.com>
Date: Mon, 27 Jun 94 12:45:23 PDT
To: Cypherpunks <cypherpunks@toad.com>
Subject: RE: NSA and competence
Message-ID: <00940627182400/0005514706NA1EM@mcimail.com>
MIME-Version: 1.0
Content-Type: text/plain
An anonymous author comments on my comments...
>> I think that this message betrays a serious misconception that a number of
>> people likely share, and that has to do with the levels of security offered
by
>> commercial versus military methods.
>I think that this reply betrays a serious lack of reading competence. The
>breakthroughs cited were the most important breakthroughs in the
>science of cryptography, period. There are no branches of mathematics
>called "military" and "commercial". The techniques have both
>military and commercial application. There is no evidence that the NSA
>knows about _any_ fundamental technique that has not been published
>in the literature. Nor is there any evidence (save the hearsay about
>S-boxes, which were actually developed at IBM) that they have made
>any major contribution to the science of cryptography, despite the
>massive resources they throw into it. But they do want to preserve their
>jobs, so they would like you to think they do. Their ability to drop
>hints here and there without having to demonstrate they actually know
>anything, to make people believe that Skipjack is an "advanced" algorithm
>without having to actually publish it, in general their ability
>to use their top secret status for the purpose of selective
>revelation, is perfectly suited to this kind of PR.
I always love it when they try to get a personal attack in first; be that as it
may, I prefer to think my reading competence is quite adequate, thank you. As
for there not being any branches of mathematics that differentiate between
application, you make a serious error when you fall into the standard academic
'if they didn't publish it, they didn't do it' mentality. Unlike corporations
such as AT&T with the old Bell System Technical Journal or IBM with their
internal publication of their own filed patents (and technical papers designed
to act as prior art to prevent *others* from filing patents), NSA and the others
who make advances do not publish, but build systems that stay in the defense
sector and remain classified. If you want an interesting clue as to what sort
of things they will leak into the commercial domain every so often, research the
creation of relational databases and the involvement of CIA; it is quite
educational.
As for their making advances, they have done it on a number of occassions, and I
think you would benefit by reading a good primer on the history of the topic and
organizations. Kahn or Bamford would do nicely. As for rumours... I am
uncertain of which rock you have been hiding under, but until recently, they
weren't even officially recognized, and capabilities that we know about are
known more from leaks or defectors. NSA is a military organization and is run
as one; the snake pit that the anonymous author works in may operate on rumour,
but these people do not.
>Thus they can claim to "contribute to American competitiveness" by
>releasing Skipjack, an algorithm for which there is _not even
>any evidence that it is stronger than DES_, much less state of
>the art algorithms like IDEA. This has the actual efffect
>of shooting the American computer security industry in the balls,
>while making Congress believe they are helping it.
Actually, the argument they are truly using is one of 'the child down the street
can listen to your portable and cell phone conversations, and this will stop
that.' What Skipjack and Clipper provide is a higher floor for the average
person; it also, incidentally, kills the viability of the marketplace for
alternate solutions. No money, no advances. Life gets simpler for them. I
have pointed this out in my two earlier posts, which you in fact are commenting
on.
>Note that I am _not_ accusing the NSA of political incompetence.
>Any organization that can get a Congressional intelligence committee
>to vote its way 13-0, that can keep pushing a warmed-over DES
>crippled with a last-minute Rube Goldberg version of key escrow,
>in the face of 70% public opposition (and nearly unanimous and quite
>vocal opposition in the hi-tech industries) is no political slouch.
>Any organization that can increase their budget after their mission
>has gone away, knows the ropes in D.C. They are simply much better
>lobbyists than cryptographers.
NSA didn't get anyone to do anything; the situation is status quo--crypto wasn't
liberalized for export, which is what Cypherpunks want, and would have
constituted a change. NSA has a very real function, which I would like to
remind you of--they are responsible for the introduction of technology security
into the Defense Department. Based on track record, from 'spy birds' capable of
picking up a conversation on the ground, to creating the first evaluation rigor
of computer security (even though Orange was out of date when instituted), they
have been doing it. As for political ability, of course they are no slouch;
they view it much as I do, a form or warfare, which they are very good at. Has
their mission gone away? Not in the least; they are still the watchdog of the
airwaves. People who think that NSA and CIA have no remaining mission are
people who have no understanding of what they do.
>> integration style 'one shot' systems for military use created a number of
>> companies, such as the Honeywell Secure Computing Technology Center, as well
as
>> a number of DARPA funded groups such as Cray and Thinking Machines.
>Of course with their budget, they can buy lots of slick hardware.
>That doesn't mean they know how to use it well.
>Let's face it, our awe of NSA stems entirely from their budget
>and their ability to stamps their incompetence top secret.
I don't think you know *how* they use the gear they have, so I recommend you
don't make comments that you are not informed to make. My awe of NSA comes from
viewing them as a powerful opponent with incredible resources, but as one who is
limited by their own tradecraft; a healthy respect, but we hold our own.
You do raise an interesting point, and that is the ability of groups such as NSA
to abuse their Classification priviledge. They do. Everyone in the
intelligence community does. Far too much material is considered classified.
The hazards of professional intelligence organizations stem from classification;
they aren't open to outside review, analyses can end up driven by political
agendas rather than available facts (see Casey and his positions vis a vis
terrorism and State sponsorship by the Sovs and Libyans, neither of which is
accurate), and sometimes gross errors are covered by the same cloak of secrecy.
Do not, however, assume that they do not know and perform their job to the best
of their abilities, or you will be in the position of the mark talking to a
cardsharp: 'I'm not any good at cards, but I sure do like to play for money.'
Michael Wilson
Managing Director, The Nemesis Group
[The Maryland Procurement Office, which was the shell used to purchase budgeted
items of a 'black' nature by the intelligence community, actually published (by
accident) their complete records during the hottest part of the Cold War. You
can find them if you look in the right place, and see what it was that NSA, CIA,
etc. were spending their money on. Capability is augmented by resource,
including such hardware, and so this gives vital clues as to the lines they were
developing themselves along.]
Return to June 1994
Return to “Michael Wilson <0005514706@mcimail.com>”
1994-06-27 (Mon, 27 Jun 94 12:45:23 PDT) - RE: NSA and competence - Michael Wilson <0005514706@mcimail.com>