-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 01/22/2016 03:46 PM, Michael Best wrote:
How does "spy-by-crypto" work?
If you can't beat them, buy them out: Compromised cryptographic tools are a rich source of intelligence. Historical example: http://www.mediafilter.org/caq/cryptogate/ Current example: https://www.schneier.com/blog/archives/2015/12/nsagchq_exploit.html :o)
On Fri, Jan 22, 2016 at 2:53 PM, John Young <jya@pipeline.com <mailto:jya@pipeline.com>> wrote:
DIRNSA said at Atlantic Council on 21 January that NSA spying ("intelligence") and information protection (IAD) to be meshed. Separation not suitable for current requirement.
Outside partners to aid dual tech: spy-by-crypto.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJWoqcHAAoJEDZ0Gg87KR0LefYP/28ea/Rf2w/yAM21SrtX6paR uqndXOhoDoNn99CqHMcHYtmj7wzIi4V5VAyDBDbkUMiVAciWdXJ9ONESfD8xdxZ2 FcpmobEfHlbyCWILzaSrB5iRjL0GmXuix41B3ow15JDS6U91XDRhKcOBWhkX/shh InYAa85l1ZQP+K81+cWhckoqKivS1kPm6RdCMAQRJQ81oVeh+xQKGhWf94nAaWgN kSuE500BrE708oFrXaqm+dX+Bl/BwQNg0W1ckRTe20XW86b6s2t1BFzBOT8g3NMb YY8iIettl9hOxOh6WwlTvuiQHD8SRJNADDMoU0x4s/RmKcIx73Bpr8tGehhS3/3t bpyQ4p1hcgJ37yjLy5h8tQP94/Xmih9CWmQUzxoji2aMWAJ0pxN54ooE4wyyX4aK MW+jGdBV8oQy6i7+/BSueWKB/9xn9+tyEPl95DZpwy6MmSmw97MbR/8F7GVznZTR 8y2SCW5MnM4ntDlcw7zcqIw318S/zBSKn+i8N6Q+szIWrmZYo7KMSdYKh/frQm5c bv0jfiVdwdajoQYEgmvuMGSxAAxYI0rSt/Ztya/UaXbt2pdmK3tki/kcjoK+pBcw s6h4v677Cyhcm6s6zmBRdaDMIZkZjEKO0oEHk814vTPGb9bSD8uzPmZ1EClg9cOz bEy8lXdIfGmBQFC0UhpW =Rfi6 -----END PGP SIGNATURE-----