[21] crypto and surveillance

brian carroll electromagnetize@gmail.com
Sun Oct 6 23:22:47 PDT 2013


// disclaimer: all my posts and diagrams copyright free...

a few ideas related to the context for crypto today.

there is certain irony in crypto that can be subverted and used to attack
or surveil via stealth. reminds of the basic situation with most home
electronics, blackboxed. such as IPcams that remain on 24/7/365 and have
microphones accessible over the network, compromises built-in. thus to seek
security is to extend the hidden security state and its illegal home
invasion. solution: five dollar on/off switch, activate security device
only when away, and upon return turn it off again, limiting the designed
for boundlessness of political technology.

2-Port RJ45 Manual Network Switch
https://www.dropbox.com/s/lk7gg8zgf7wxjjj/RJ45switch.JPG

the diagrams here reference the following NSA document...

The Borders of Cryptology - NSA & Electronic Warfare*
http://cryptome.org/2013/09/nsa-cryptology-borders.pdf

diagrams created with the excellent software tool yEd...

yEd - Graph Editor - yWorks  (freeware)
http://www.yworks.com/en/products_yed_about.html

the question of crypto in a complex environment where it has both offensive
and defensive functioning, relating to weak and strong crypto and security
ratings

crypto   (protection & exploitation)
https://www.dropbox.com/s/d7jrpilz35dvk4k/graph1v1.gif

the paradoxical utility and purpose of compromised crypto that has both
strong and weak, secure and insecure characteristics in a complex
environment

dual-use multilevel crypto
https://www.dropbox.com/s/ndwlu9lqf4yvhy9/graph2v1.gif

the role of installation and usage errors as related to security and
exploits, inherent in complicated or high-literacy approaches

crypto implementation flaw
https://www.dropbox.com/s/bjofccwrun7lok1/graph3v1.gif

this is the direct reference and extension of the NSA diagram above.
cryptanalysis was included, Technical Surveillance Countermeasures (TSCM),
though likely other domains are missing or perhaps in relational error.
 improvements or corrections appreciated...

Electromagnetic Borders of Cryptology
https://www.dropbox.com/s/tp7dbqjbmpscv0h/diagram4v1.gif

this is my estimation of the situation today, based on the above
technosocial structure. it does not include many aspects and is limited by
my lack of awareness and understanding, though makes an attempt at an
integrated view of the larger dynamics involved...

Context for computer Crypto today
https://www.dropbox.com/s/jn73d4d9b5ksz8u/context5v1.gif


additional diagrams will follow, surveying aspects of this same territory...

---
Grant Hart - You're the Reflection of the Moon On the Water
http://www.youtube.com/watch?v=NTH4Zu8gleA

☾
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://cpunks.org/pipermail/cypherpunks/attachments/20131007/de1e3c03/attachment.html>


More information about the cypherpunks mailing list