Crypto AG

Crypto AG was a Swiss company specialising in communications and information security. It was secretly jointly owned by the American Central Intelligence Agency (CIA) and West German Federal Intelligence Service (BND) from 1970 until about 1993, with the CIA continuing as sole owner until about 2018.[1] With headquarters in Steinhausen, the company was a long-established manufacturer of encryption machines and a wide variety of cipher devices.

Crypto AG
IndustryCryptography
PredecessorCryptograph
Founded1952
FounderBoris Hagelin
Defunct2018
Headquarters,
OwnerCentral Intelligence Agency (1970–2018)
Federal Intelligence Service (1970–1993)

The company had about 230 employees, had offices in Abidjan, Abu Dhabi, Buenos Aires, Kuala Lumpur, Muscat, Selsdon and Steinhausen, and did business throughout the world.[2] The owners of Crypto AG were unknown, supposedly even to the managers of the firm, and they held their ownership through bearer shares.[3]

The company has been criticised for selling backdoored products to benefit the American, British and German national signals intelligence agencies, the National Security Agency (NSA), the Government Communications Headquarters (GCHQ), and the BND, respectively.[4][5][6] On 11 February 2020, The Washington Post, ZDF and SRF revealed that Crypto AG was secretly owned by the CIA in a highly classified partnership with West German intelligence, and the spy agencies could easily break the codes used to send encrypted messages. The operation was known first by the code name "Thesaurus" and later "Rubicon".[1]According to a Swiss parliamentary investigation, "Swiss intelligence service were aware of and benefited from the Zug-based firm Crypto AG’s involvement in the US-led spying".[7]

History

Crypto AG was established in Switzerland by the Russian-born Swede, Boris Hagelin.[4] Originally called AB Cryptoteknik and founded by Arvid Gerhard Damm in Stockholm in 1920, the firm manufactured the C-36 mechanical cryptograph machine that Damm had patented. After Damm's death, and just before the Second World War, Cryptoteknik came under the control of Hagelin, an early investor.

Hagelin's hope was to sell the device to the United States Army.[8] When Germany invaded Norway in 1940, he moved from Sweden to the US and presented the device to the military, which in turn brought the device to the Signal Intelligence Service, and the code-breakers in Arlington Hall. In the end he was awarded a licensing agreement. 140,000 units were made during the war for American troops.

During his time in United States, Hagelin became close friends[9] with William F. Friedman, who in 1952 became chief cryptologist for the National Security Agency (NSA) and whom Hagelin had known since the 1930s.[8][1] The same year, Hagelin's lawyer, Stuart Hedden, became deputy commander in CIA, Inspector General.

In 1948 Hagelin moved to Steinhausen in Switzerland to avoid taxes.[8] In 1952 the company, which until then had been incorporated in Stockholm, also moved to Switzerland.[4] The official reason was that it was transferred as a result of a planned Swedish government nationalization of militarily important technology contractors.[8] A holding company was set up in Liechtenstein.

During the 1950s, Hagelin and Friedman had frequent mail correspondence, both personal and business alike. Crypto AG sent over new machines to the NSA and they had an ongoing discussion concerning which countries they would or would not sell the encryption systems to, and which countries to sell older, weaker systems. In 1958 when Friedman retired, Howard C. Barlow, a high-ranking NSA employee, and Lawrence E. Shinn, NSA's signal intelligence directory in Asia, took over the correspondence.

In June 1970, the company was bought in secret by the CIA and the West-German intelligence service, BND, for $5.75 million.[1] Hagelin had first been approached to sell to a partnership between the French and West-German intelligence services in 1967, but Hagelin contacted CIA and the Americans did not cooperate with the French. At this point, the company had 400 employees and the revenue increased from 100,000 Swiss franc in the 1950s to 14 million Swiss franc in the 1970s.

In 1994, Crypto AG bought InfoGuard AG a company providing encryption solutions to banks.[4]

In 2010, Crypto AG sold G.V. LLC, a Wyoming company providing encryption and interception solutions for communications.[10]

In 2018, Crypto AG was liquidated, and its assets and intellectual property sold to two new companies. CyOne was created for Swiss domestic sales, while Crypto International AG was founded in 2018 by Swedish entrepreneur Andreas Linde, who acquired the brand name, international distribution network, and product rights from the original Crypto AG. [11]

in 2020, it was established following a parliamentary investigation that the Swiss government and its intelligence services were aware of the spying activities of Swiss-based CRYPTO since many years and "benefited from the US-led spying".[12]

Products

The CX-52

The company had radio, Ethernet, STM, GSM, phone and fax encryption systems in its portfolio.

Machines:[13]

Compromised machines

According to declassified (but partly redacted) US government documents released in 2015, in 1955 (just after encryption was added to the US Munitions List on November 17, 1954) Crypto AG's founder Boris Hagelin and William Friedman entered into an unwritten agreement concerning the C-52 encryption machines that compromised the security of some of the purchasers.[5] Friedman was a notable US government cryptographer who was then working for the National Security Agency (NSA), the main United States signals intelligence agency. Hagelin kept both NSA and its United Kingdom counterpart, Government Communications Headquarters (GCHQ), informed about the technical specifications of different machines and which countries were buying which machines. Providing such information would have allowed the intelligence agencies to reduce the time needed to crack the encryption of messages produced by such machines from impossibly long to a feasible length. The secret relationship initiated by the agreement also involved Crypto AG not selling machines such as the CX-52, a more advanced version of the C-52, to certain countries; and the NSA writing the operations manuals for some of the CX-52 machines on behalf of the company, to ensure the full strength of the machines would not be used, thus again reducing the necessary cracking effort.

Crypto AG had already earlier been accused of rigging its machines in collusion with intelligence agencies such as NSA, GCHQ, and the German Federal Intelligence Service (BND), enabling the agencies to read the encrypted traffic produced by the machines.[4][14] Suspicions of this collusion were aroused in 1986 following US president Ronald Reagan's announcement on national television that, through interception of diplomatic communications between Tripoli and the Libyan embassy in East Berlin, he had irrefutable evidence that Muammar Gaddafi of Libya was behind the West Berlin discotheque bombing in 1986. President Reagan then ordered the bombing of Tripoli and Benghazi in retaliation. There is no conclusive evidence that there was an intercepted Libyan message.

Further evidence suggesting that the Crypto AG machines were compromised was revealed after the assassination of former Iranian Prime Minister Shapour Bakhtiar in 1991. On 7 August 1991, one day before Bakhtiar's body was discovered, the Iranian Intelligence Service transmitted a coded message to Iranian embassies, inquiring "Is Bakhtiar dead?" Western governments deciphered this transmission, causing the Iranians to suspect their Crypto AG equipment.[15]

The Iranian government then arrested Crypto AG's top salesman, Hans Buehler, in March 1992 in Tehran. It accused Buehler of leaking their encryption codes to Western intelligence. Buehler was interrogated for nine months but, being completely unaware of any flaw in the machines, was released in January 1993 after Crypto AG posted bail of $1m to Iran.[16] Soon after Buehler's release Crypto AG dismissed him and sought to recover the $1m bail money from him personally. Swiss media and the German magazine Der Spiegel took up his case in 1994, interviewing former employees and concluding that Crypto's machines had in fact repeatedly been rigged.[17]

Crypto AG rejected these accusations as "pure invention", asserting in a press release that "in March 1994, the Swiss Federal Prosecutor's Office initiated a wide-ranging preliminary investigation against Crypto AG, which was completed in 1997. The accusations regarding influence by third parties or manipulations, which had been repeatedly raised in the media, proved to be without foundation." Subsequent commentators[18][19][20][21] were unmoved by this denial, stating that it was likely that Crypto AG products were indeed rigged. Le Temps has argued that Crypto AG had been actively working with the British, US and West German secret services since 1956, going as far as to rig instruction manuals for the machines on the orders of the NSA.[22][23] These claims were vindicated by US government documents declassified in 2015.[5]

In 2020, an investigation carried out by The Washington Post, Zweites Deutsches Fernsehen (ZDF), and Schweizer Radio und Fernsehen (SRF) revealed that Crypto AG was, in fact, entirely controlled by the CIA and the BND. The project, initially known by codename "Thesaurus" and later as "Rubicon" operated from the end of the Second World War until 2018.[1][24][25]

The Swiss government's decision to impose export controls on Crypto International in the wake of the Crypto AG disclosures caused diplomatic tensions with Sweden, reportedly leading to the latter cancelling plans to celebrate 100 years of diplomatic relations with Switzerland.[26][27] The export controls preventing Swedish authorities from obtaining equipment from Crypto International was reportedly a reason behind Sweden's decision.[26][27]

See also

References

  1. Miller, Greg (11 February 2020). "The intelligence coup of the century". The Washington Post. Archived from the original on 11 February 2020. Retrieved 11 February 2020.
  2. "Headquarters and regional offices worldwide". Crypto AG. Archived from the original on 16 May 2011. Retrieved 6 January 2008.
  3. Müller, Leo (18 September 2013). "Spionage: Unheimlich kooperativ". Bilanz (in German). Retrieved 30 March 2017.
  4. Atmani, Mehdi (21 August 2015). "Agents doubles". Le Temps (in French). p. 11. Retrieved 13 February 2020.
  5. Corera, Gordon (28 July 2015). "How NSA and GCHQ spied on the Cold War world". BBC News. Retrieved 9 October 2015.
  6. "Swiss machines 'used to spy on governments for decades'". BBC News. 11 February 2020. Retrieved 13 February 2020.
  7. https://web.archive.org/web/20201111022708/https://www.swissinfo.ch/eng/swiss-intelligence-benefited-from-cia-crypto-spying-affair/46153706
  8. Dugstad, Line; Kibar, Osman (2 January 2015). "Den skjulte partneren". Dagens Næringsliv (in Norwegian). Retrieved 13 February 2020.
  9. Bamford, James (2 October 2014). "The NSA and Me". The Intercept.
  10. "Business Entity Detail - Wyoming Secretary of State". wyobiz.wy.gov. Retrieved 8 March 2020.
  11. Miller, Greg (11 February 2020). "The intelligence coup of the century". The Washington Post. Retrieved 8 March 2020.
  12. https://www.swissinfo.ch/eng/business/no-official-outcry-in-swiss-crypto-spying-affair/46223594
  13. "Crypto and cipher machines - A list of popular machines and a history of Crypto AG". www.cryptomuseum.com. Retrieved 22 February 2020.
  14. "Wer ist der befugte Vierte?". Der Spiegel (in German). No. 36. 2 September 1996. pp. 206–207. Retrieved 13 February 2020.
  15. Madsen, Wayne (1999). "Crypto AG: The NSA's Trojan Whore?". CovertAction Quarterly. Archived from the original on 27 September 2007. Retrieved 11 February 2020.
  16. Schneier, Bruce (15 June 2004). "Breaking Iranian Codes". Crypto-Gram. Schneier on Security. Retrieved 9 October 2015.
  17. Shane, Scott; Bowman, Tom (4 December 1995). "No Such Agency, part four: Rigging the game". The Baltimore Sun. pp. 9–11. Archived from the original on 1 March 2019. Retrieved 9 October 2015.
  18. De Braeckeleer, Ludwig (29 December 2007). "The NSA-Crypto AG Sting". OhmyNews. Archived from the original on 29 December 2008.
  19. Grabbe, J. Orlin (2 November 1997). "NSA, Crypto AG, and the Iraq-Iran conflict". Associated Communications Internet. Archived from the original on 7 June 2007. Retrieved 13 February 2020.
  20. Schneier, Bruce (11 January 2008). "NSA Backdoors in Crypto AG Ciphering Machines". Schneier on Security. Retrieved 9 October 2015.
  21. Baranyi, Laszlo (11 November 1998). "The story about Crypto AG". Archived from the original on 14 December 2010 via biphome.spray.se.
  22. Atmani, Mehdi (28 July 2015). "Depuis 1956, l'entreprise suisse Crypto AG collaborait avec le renseignement américain, britannique et allemand". Le Temps (in French). Retrieved 13 February 2020.
  23. Bammerlin, Steven (30 July 2015). "Cryptologie: un lecteur du "Temps" raconte les dessous de l'alliance entre la Suisse et les Anglo-saxons". Le Temps (in French). Retrieved 13 February 2020.
  24. "#cryptoleaks: Wie die Crypto AG weltweit agierte". heute (in German). ZDF. 11 February 2020. Retrieved 12 February 2020.
  25. "Operation Rubikon" (in German). ZDFmediathek. 11 February 2020. Retrieved 12 February 2020.
  26. "Crypto affair prompts tensions between Switzerland and Sweden". Swissinfo. 20 September 2020. Retrieved 22 September 2020.
  27. Mikael Grill Pettersson; Fredrik Laurin (22 September 2020). "Uppgifter: Sverige avbokade firande med Schweiz efter konflikt om kontroversiellt krypteringsföretag". SVT Nyheter (in Swedish). Retrieved 22 September 2020.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.