CIA's Secret Ownership of Crypto AG Enabled Extensive EspionageCIA's Secret Ownership of Crypto AG Enabled Extensive Espionage
Crypto AG made millions selling encryption devices to more than 120 countries, which unknowingly transmitted intel back to the CIA.
February 11, 2020
Crypto AG, a Switzerland-based communications encryption firm, was secretly owned by the CIA in a classified partnership with West German intelligence. For years, it sold rigged devices to foreign governments with the intent of spying on messages its users believed to be encrypted.
In an account published by the Washington Post and German public broadcaster ZDF, reporters dive into the details of a decades-long arrangement through which the United States and allies made millions selling encryption equipment to more than 120 countries into the 21st century. Crypto clients included Iran, India, Pakistan, Iraq, Nigeria, Saudi Arabia, Syria, even the Vatican.
Governments relying on Crypto devices to protect their communications did not know they were designed so intelligence officials could easily break the codes used to send messages. The operation, first known as "Thesaurus" and later "Rubicon," intercepted correspondence that informed them of global military operations, hostage crises, assassinations, and bombings.
"It was the intelligence coup of the century," as stated in a CIA report, one of the documents obtained by the Post and ZDF as part of their investigation. "Foreign governments were paying good money to the U.S. and West Germany for the privilege of having their most secret communications read by at least two (and possibly as many as five or six) foreign countries."
The Swiss government has officially opened an investigation into Crypto, according to SwissInfo, the International Service of the Swiss Broadcasting Corporation. The general export license for Crypto devices has been suspended "until open questions have been clarified."
Read the full report here.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023