The NSA Bibliographies The NSA
internally publishes thousands of papers every year, on every topic from spycraft to cryptography to physics & aliens (no, really!). Each year the titles of these papers gets indexed & those indexes are also published internally. The Memory Hole has made a successful FOIA request for a large number of these, spanning almost 50 years. We don't get to see the actual papers, but just the titles are fascinating - including such page turners as "Computer Virus Infections: Is NSA Vulnerable?", "KAL 007 Shootdown: A View from [redacted]", "NSA in the Cyberpunk Future", "Telephone Codes and Safe Combinations: A Deadly Duo", "Coupon Collecting and Cryptology", "Cranks, Nuts, and Screwballs" & my personal favorite, "Key to the Extraterrestrial Messages". When you're done browsing the titles, there's a sample form you can use to request some of the documents yourself!
posted by scalefree
on Oct 2, 2006 -
MYSTERY TWISTER 2005 is an international crypto competition. During the year 2005, different tasks will be set, altogether 13 CryptoChallenges, CC1 to CC13, of increasing difficulty, such as, for example, decrypting an encrypted message or forging a digital signature.
The variety of topics, which will be covered by the collection of
challenges, is intended to provide a survey of modern cryptology. Powered by the Ruhr-University Bochum (Germany), registration required.
posted by tcp
on Jan 18, 2005 -
You've probably heard of the WWII Navajo "code talkers"
who managed to baffle crack Japanese cryptanalysts and were credited with enabling US success at Iwo Jima. Civil engineer, journalist and photographer Philip Johnston
was the determined mind behind the "windtalkers". The son of missionaries, Johnston grew up on a Navajo reservation and was one of only a handful of outsiders fluent in the Navajo language. A bit of his background is included this article
, and you can read a complete history
of his plan, view an archive of photos by Johnston
, and see copies of his enlistment application
letter to the Marine Corps commandant, as well as a recommendation letter
from the Commanding General. (more inside...)
posted by taz
on Jan 22, 2003 -
Microsoft unleashes Palladium, an intrusive doozy
of a feature involving specially secure AMD/Intel computer chips and cryptology provided by Microsoft. Newsweek's head-bobbing Steven Levy, the first to get the story, remains taciturn
, failing to call into question Microsoft's security sins of the past
. Geeks run scared
while digital rights and GPL concerns
are wholly ignored by the mainstream media. Is this yet another example of a malcontent media that will never possess the balls to actually question a new feature put out by Microsoft? Even Wired
can't seem to read between the lines of a technology that "stemmed from early work by engineers to deliver digital movies that couldn't be pirated."
posted by ed
on Jun 25, 2002 -
Why Digital Signatures Are Not Signatures
"When first invented in the 1970s, digital signatures made an amazing promise: better than a handwritten signature -- unforgeable and uncopyable -- on a document. Today, they are a fundamental component of business in cyberspace. And numerous laws, state and now federal, have codified digital signatures into law. These laws are a mistake." -- Bruce Schneier, November Crypto-Gram
posted by lagado
on Nov 15, 2000 -