Real Time Cryptanalysis of A5/1 on a PC
A5/1 is the strong version of the encryption algorithm used by about 130 million GSM customers in Europe to protect the over-the-air privacy of their cellular voice and data communication. The best published attacks against it require between 240 and 245 steps. This level of security makes it vulnerable to hardware-based attacks by large organizations, but not to software-based attacks on multiple targets by hackers.
Wednesday, November 22, 2000
Killing Pablo
Eight years ago, at the request of the Colombian government, U.S. military and spy forces helped fund and guide a massive manhunt that ended with the killing of Pablo Escobar, the richest cocaine trafficker in the world.
Eight years ago, at the request of the Colombian government, U.S. military and spy forces helped fund and guide a massive manhunt that ended with the killing of Pablo Escobar, the richest cocaine trafficker in the world.
International co-operation in internet surveillance
The police, Security Intelligence Service and the Government Communications Security Bureau of New Zealand are pushing for major new surveillance powers including the ability to spy on emails.
The police, Security Intelligence Service and the Government Communications Security Bureau of New Zealand are pushing for major new surveillance powers including the ability to spy on emails.
Did Swisscom sell our Secrets to the USA?
Swisscom may have violated an agreement made with the Confederation by selling sensitive installations to the Americans of Verestar. The military suspects that this company is related to the Echelon network for interception.
Swisscom may have violated an agreement made with the Confederation by selling sensitive installations to the Americans of Verestar. The military suspects that this company is related to the Echelon network for interception.
Draft Report: Independent Technical Review of the Carnivore System
This Draft Report from the IIT Research Institute (IITRI) is part of an overall review of the Carnivore system requested by the Attorney General.
This Draft Report from the IIT Research Institute (IITRI) is part of an overall review of the Carnivore system requested by the Attorney General.
State Department Employees Pressed to Protect Secrets
Paper shredders, State Department employees are told, must trim classified documents down to slices no larger than 1/32 inch by 1/2 inch. Disposal can also be achieved, they are advised, with machines that can "pulverize" secrets into powder. Safes storing sensitive materials must weigh at least 500 pounds — too heavy to be carted off.
Paper shredders, State Department employees are told, must trim classified documents down to slices no larger than 1/32 inch by 1/2 inch. Disposal can also be achieved, they are advised, with machines that can "pulverize" secrets into powder. Safes storing sensitive materials must weigh at least 500 pounds — too heavy to be carted off.
Monday, November 20, 2000
Stolen Enigma retrieved
The Sunday Times has negotiated secretly for weeks to ensure the safe return of the three vital rotors from the historic Enigma code machine that was stolen from Bletchley Park.
The Sunday Times has negotiated secretly for weeks to ensure the safe return of the three vital rotors from the historic Enigma code machine that was stolen from Bletchley Park.
Subscribe to:
Posts (Atom)