Its been revealed that the CIA secretly owned the world’s top encryption supplier, Crypto AG, for a number of decades, selling equipment to governments for their secure use. All the while the CIA a backdoor into all of their communications, monitoring all government and espionage communiques to its wimaintained de variety of clientele around the globe.
But what none of its customers ever knew was that Crypto AG was secretly owned by the CIA in a highly classified partnership with West German intelligence. These spy agencies rigged the company’s devices so they could easily break the codes that countries used to send encrypted messages.
Imagine that. Now ask yourself what other backdoors exist amid the era of smart phones, social media and the PATRIOT Act.
Its for these reasons that in the classes I run we cover the basics of the techniques themselves rather than relying only on third party equipment with potential pitfalls built it. Because even if there’s a backdoor but your tradecraft behind operating the equipment remains sound, you’ll still have an unbreakable level of security.
That’s why I cover the old-hand methods that we’ve gotten away from in the past twenty years of no-peer adversary warfare. In a near-peer war, poor operating techniques are going to lead to a lot of casualties. Not only that, but to the average citizen concerned about privacy, it might be a good idea to get a course on the starting points of your own information security- we’ve got a class for that coming up in March.
Its techniques, not technology, that wins in the end. Know where to start, know how to win.