Cryptoleaks – Wie CIA & BND Mit Schweizer Hilfe Global Spionierten

Die CIA und der BND spionierten mit manipulierten Chiffriergeräten der Schweizer Firma Crypto AG jahrzehntelang mehr als 100 Staaten aus, darunter auch befreundete Länder. Dies belegen Recherchen von SRF Rundschau, ZDF und Washington Post. SRF DOK auf YouTube abonnieren 🔔 https://www.youtube.com/SRFDOK?sub_co…

Im Zentrum steht ein Aktenordner mit explosivem Inhalt: 280 Seiten, bisher unbekannte Papiere der Geheimdienste CIA und BND. Sie belegen eine weltweite Geheimdienstoperation. Die geleakten Papiere werfen ein höchst fragwürdiges Licht auf die Schweiz und auf das Zuger Unternehmen Crypto AG, eine Firma für Verschlüsselungstechnik. Über manipulierte Chiffriermaschinen der ehemaligen Verschlüsselungsfirma horchten die Geheimdienste CIA und BND jahrzehntelang über hundert Staaten ab. Im Nahen Osten, in Asien, in Südamerika und auch in Europa wurde die geheime Kommunikation befreundeter und feindlicher Staaten abgefangen und ausgewertet. Alle abgehörten Länder hatten ihre Crypto-Chiffriermaschinen im guten Glauben in der neutralen Schweiz gekauft. Welche Folgen hatte die Überwachungsoperation auf die internationale Politik der Nachkriegszeit? Wie gingen die Geheimdienstleute der CIA und des BND vor? Wie wurden die Schweizer Chiffriergeräte manipuliert? Was wussten die Schweizer Behörden? Und was bedeutet dieser Skandal für die Schweizer Neutralität?

How Governments Utilized Swiss Crypto AG Encryption Devices To Spy On Countries

Crypto AG: Wie die Geheimdienste Schweizer Backdoor ...

On the eleventh of February 2020, The Washington Post and German ZDF uncovered that from 1970 onwards, knowledge organizations in the US and West Germany covertly possessed a controlling stake in the Swiss firm, Crypto AG. The insight organizations continued to utilize the organization’s encoded correspondences gear to keep an eye on more than 100 nations. The Washington Post guaranteed it is the “Insight overthrow of the century.” Crypto AG was a Swiss organization established in 1952, which had some expertise in correspondences and data security, producing encryption machines and figure gadgets. In World War 2, Crypto AG was a significant maker of old school mechanical encryption machines for the US government. Nonetheless, by the mid 1950s, American government operatives started to stress that Crypto AG may offer a similar innovation to US foes. In this manner, US cryptographers in the US Central Intelligence Agency (CIA) made an unwritten ‘man of his word’s concurrence with’ Boris Hagelin (author) to sell innovation just to nations affirmed by the US. With the guide of NSA, the CIA started to mess with these items for chose nations.

In 1970, the CIA set moving an arrangement to covertly take a significant money related stake in Crypto AG, alongside West Germany’s government operative organization, the BND. Both knowledge organizations had more prominent access to gear, just as being able to fix the organization’s gadgets so they could without much of a stretch break codes that different nations used to send encoded messages. At the point when innovation advanced from mechanical to electronic, the NSA and CIA constructed indirect accesses which permitted them to control calculations utilized by crypto gadgets to listen in on enemies and partners. Hence, two variants of the machines were being made, a safe rendition, and a fixed framework. By 1970, a large portion of the world’s legislatures were accidentally giving the CIA their cash and mysteries and by 1980, 40% of remote interchanges were being handled by US insight authorities through the gracefully of Crypto AG’s machines.

The ongoing report has uncovered that any semblance of Iran, Italy, Saudi Arabia, Iraq and South Korea, all coincidentally succumbed to these fixed machines. It is accepted that American and German government operatives had the option to pull significant insight during the 1979 Iran prisoner emergencies and furthermore the 1982 Falkland war. The Washington Post expressed: “outside governments were paying acceptable cash to the US and West Germany for the benefit of having their most mystery correspondences read by in any event 2 other remote nations.” It is accepted that any semblance of the UK, Canada, Australia, New Zealand and the US all profited by the relationship, they are alluded to as ‘Five Eyes’. Russia and China never believed the machines so they never utilized them.

For a considerable length of time the CIA and West Germany had so much control, the two governments successfully controlled everything. Until 1995, when The Baltimore Sun ran a story on how the NSA covertly fixed Crypto AG encryption machines, this made numerous nations prevent purchasing from the organization. Around this time, the CIA purchased out the German BND insight administration for $17 million. They at that point kept on controlling the organization until 2018, when it was exchanged and offered to two different organizations, because of the headways in online encryption innovation. Nonetheless, the Chairman of the now Crypto International, Andrea Linde told ‘The Post’ that he feels “double-crossed” by the ongoing disclosure as it was by all accounts structured as a concealment for the CIA.

The ongoing disclosures about the connection between the CIA and Crypto AG comes when the US Government isn’t just admonition about the conceivable digital reconnaissance by different nations, yet in addition when they are pushing for residential law requirement organizations to have the option to get to encoded correspondences. Alongside Trump overseers notice about Huawei gear in their 5G systems, because of the dread of having their broadcast communications traffic being blocked by the Chinese Government. With government interchanges being at the cutting edge of the news once more, with one outrage after another, there is boundless worry about how governments handle information and correspondences, as far as both interior and outside correspondence channels.

The requirement for secure correspondences is a higher priority than at any other time these days. Governments must be progressively particular by they way they decide to impart basic information, data or even state privileged insights. SaltDNA gives the best shield to associations, offering a high security framework that ensures all competitive advantages and other delicate, vital and restrictive data when conveying on electronic gadgets. SaltDNA gives genuine feelings of serenity by permitting governments to choose their own encryption libraries to send inside the SaltDNA system. This adaptability totally evacuates the danger of an unapproved party fabricating an encryption secondary passage.

Exposed – Codewords Related to Crypto AG – The Swiss Code Company Owned By CIA & BND

250'000 Franken Schweigegeld!: Crypto AG wollte Ex-Mitarbeiter ...

(Between 1970 and 2018, the CIA secretly owned the Swiss manufacturer of encryption equipment Crypto AG, until 1994 in a 50/50 partnership with German BND)

A
ALTER – Cryptonym for the chief of Research & Development at Crypto AG (1981) *
ATHENA – Cryptonym for Kjell-Ove “Henry” Widman, the principal crypto-mathematician of Crypto AG (1980-1995) *
AURORA – Cryptonym for InfoGuard, a Swiss company that became a joint venture between Crypto AG and Ascom in 1989 *

B
BALL – Cryptonym for Sture Nyberg, CEO of Crypto AG (1970-1975) *
BLOCK – Cryptonym for Heinz Wagner, CEO of Crypto AG (1976-1989) *
BUTCHER – Cryptonym for Gerrit Brussaard, who in 1978 was briefly head of R&D of Crypto AG *

C
CLAPPER – Cryptonym for Kurt Kirchhofer, in 1978 head of R&D, later sales manager at Crypto AG *

E
EOS – Cryptonym for the CIA in relation to Crypto AG *

F
FIDELIO – Cryptonym for Deutsche Treuhand Gesellschaft (DTG), the accounting firm involved in the purchase of Crypto AG *

G
GAMMA – Cryptonym for the German intelligence service BND in relation to Crypto AG *
GOLF – Cryptonym for AEH, the holding company that owned Crypto AG *

H
HOCKEY – Cryptonym for the NSA in relation to the Crypto AG operation *
HYDRA – Cryptonym for Hans Buehler, a salesman for Crypto AG *

M
METAL – Cryptonym for a BND officer involved in the Crypto AG operation *
MINERVA – Cryptonym for the Swiss manufacturer of encryption devices Crypto AG, which was purchased by CIA and BND in 1970 under operation THESAURUS *

N
NAVAHO – Cryptonym for Motorola in relation to Crypto AG *

O
OLYMPIA – Cryptonym for the German company Siemens in relation to Crypto AG *

Q
QUINCE – Cryptonym for Switzerland in relation to Crypto AG *

R
REX – Cryptonym for Sigmar Horst-Joachim “Mickie” Grützmann, chief of Research & Development of Crypto AG (1978-1980) *
RUBICON – Code name for the joint CIA-BND project to secretly run the Swiss manufacturer of encryption devices Crypto AG (cryptonym: MINERVA). Before 1987 codenamed THESAURUS.*

S
SIEGFRIED – Cryptonym for Oscar Stuerzinger, technical director of Crypto AG *
SIGMA – Cryptonym for the German cryptologic service ZfCh in relation to Crypto AG *
SOCRATES – Cryptonym for a CIA fiduciary involved in the Crypto AG operation *
SPARTAN – Secret licensing agreement between the CIA and Boris Hagelin, owner of Crypto AG (1960-1970) *

T
THESAURUS – Code name for the joint CIA-BND project to buy (in 1970) and secretly run the Swiss manufacturer of encryption devices Crypto AG (cryptonym: MINERVA). In 1987 renamed into RUBICON.*
THRAN – Cryptonym for Transvertex *
TIGER – Cryptonym for Gretag, a Swiss competitor of Crypto AG *

 


Vault 7 and Vault 8 codewords

(From March to September 2017 Wikileaks published user guides and other documents (Vault 7) and in November 2017 also the source code (Vault 8) of CIA hacking tools)

A
Achilles – Capability to trojan an OS X disk image (.dmg) installer with one or more desired operator specified executables for a one-time execution; part of the Imperial project.
Aeris – Automated implant written in C that supports a number of POSIX-based systems; part of the Imperial project.
AfterMidnight – Framework that allows dynamically loading and executing malware payloads on a target computer.
Angelfire – Persistent framework that loads and executes custom implants on target computers running Windows XP or Win7; comprised of five components: Solartime, Wolfcreek, Keystone (previously MagicWand), BadMFS, and the Windows Transitory File system.
Archimedes – Tool used to attack a computer inside a Local Area Network (LAN).
Assassin – Automated implant that provides a simple collection platform on remote Windows computers.
Athena – Provides remote beacon and loader capabilities on target computers using Window XP to Windows 10.

B
BothanSpy – Implant that targets the SSH client program Xshell and steals user credentials for all active SSH sessions.
Broken Promise – Postprocessor to evaluate colelcted information; part of Brutal Kangaroo
Brutal Kangaroo – tool suite for Microsoft Windows that targets closed networks by air gap jumping using thumbdrives.

C
CherryBlossom – Tool for monitoring the internet activity of and performing software exploits on targets of interest.
CherryTree – Command and Control server for contacting the FlyTrap beacon
CherryWeb – Browser=based user interface to monitor the status of FlyTrap devices
CouchPotato – Remote tool for collection against RTSP/H.264 video streams.

D
Dark Mallet – Infector for the Triton MacOSX malware
Dark Matter – Projects that infect Apple Mac firmware, persisting evenwhen the operating system is re-installed.
DarkSeaSkies – An implant that persists in the EFI firmware of an Appple MacBook Air computer.
DerStarke – EFI persistent version of the Triton MacOSX (or Dark Mallet) malware.
Drifting Deadline – Thumbdrive infection tool; part of Brutal Kangaroo
Dumbo – Capability to suspend processes utilizing webcams and corrupt any video recordings that could compromise a physical access operation.

E
ELSA – Geo-location malware for WiFi-enabled devices like laptops running the Micorosoft Windows operating system
ExpressLane – Covert information collection tool used by the CIA to secretly exfiltrate data collections from systems provided to liaison services.

F
FlyTrap – A wireless device compromized by CherryBlossom

G
Grasshopper – Platform used to build customized malware payloads for Microsoft Windows systems.
Gyrfalcon – Implant that targets the OpenSSH client on Linux platforms to steal user credentials of active SSH sessions and collect full or partial OpenSSH session traffic

H
HighRise – Redirector function for SMS messaging that could be used by IOC tools that use SMS messages for communication between implants and listening posts
Hive – Back-end infrastructure malware used by CIA implants to transfer exfiltrated information from target computers to the CIA.

I
Imperial – Hacking project consisting of the Achilles, Aeris and Seapea components

M
Marble Framework – Used to hamper forensic investigators and anti-virus companies from attributing viruses, trojans and hacking attacks to the CIA.

N
NightSkies – A beacon/loader/implant tool for the Apple iPhone.

O
OutlawCountry – Malware that allows for the redirection of all outbound network traffic on a target computer

P
Pandemic – A persistant implant for Microsoft Windows machines that share files or program with remote users in a local network.
Protego – PIC-based missile control system developed by Raytheon

S
Scribbles – A document-watermarking preprocessing system to embed “web beacon”-style tags into documents that are likely to be copied by insiders, whistleblowers, journalists or others.
SeaPea – OS X Rootkit that provides stealth and tool launching capabilities; part of the Imperial project
Shadow – Primary persistence mechanism for Brutal Kangaroo.
Shattered Assurance – Server tool that handles automated infection of thumbdrives; part of Brutal Kangaroo.
Sonic Screwdriver – A mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting.

T
Triton – MacOSX malware

W
Weeping Angel – An implant designed for Samsung F series smart televisions.

 


Some other CIA codewords


A
APPLESAUCE – CIA station on Cyprus (1950s)
AQUATONE – Cryptonym for the development of the Lockheed U-2 spy plane

C
CHAOS – CIA domestic spying operation (1967-1973)
CONDOR – Operation in which the secret services of Argentina, Chile, Uruguay, Paraguay, Bolivia and Brazil, backed by the CIA, cooperated to suppress left-wing opposition movements and assassinate their leaders (1968–1989)
CONQUERER – NSA ECI compartment for joint NSA-CIA clandestine radio frequency operations (since 2003) *
CRISSCROSS – Database of telecommunications selectors, operated by the CIA and also used by DOJ, DOD and NSA

E
EASYCHAIR (EC) – CIA research project for developing resonant cavity covert listening devices (1954-1967)

G
GLOTAIC – Joint BND-CIA operation to acquire foreign telephone communications from the German subsidiary of MCI (2005) *
GOLD – Joint SIS-CIA operation to wiretap Soviet army landlines through a tunnel under Berlin (1953-1956; British codename: STOPWATCH)
GREYSTONE (GST) – CIA’s highly secret rendition and interrogation programs (since 2001) *

H
HERCULES – CIA terrorism database
HYDRA – Program to secretly access databases maintained by foreign countries and extract data to add to US watchlists *

I
IVY BELLS – NSA, CIA and US Navy operation to place wire taps on Soviet underwater communication cables (1970s-1980s)

K
KLAMATH (KLM) – Classification control system which in 2003 included the NSA ECI compartments CONQUERER, LYSERGIC and WASHBURN *

O
OXCART – Code word for the development of the Lockheed A-12 reconnaissance aircraft and for the plane itself (since 1958)

P
PISCES – Joint NSA, CIA and State Department program collecting biometric data on border crossings from a wide range of countries *
PROTON – Storage and analysis system for the CRISSCROSS database of (telephony?) metadata of (counterintelligence) targets; operated by CIA and used by DOJ, DOD and NSA *
PSALM – Defunct Top Secret control system for intelligence related to the Cuban missile crisis (October 1962) *

Q
QUANTUM LEAP – CIA tool to “find non-obvious linkages, new connections, and new information” from within a dataset *

R
RAINFALL – The joint CIA/NSA/DSD satellite ground station Pine Gap, Australia (F78) *
RAMPART-T (RAM-T) – Program providing access to land-based cables, in cooperation with the NSA, to collect communications from state leaders and their entourage (since 1991)*
ROCKING CHAIR (RC) – Dutch research program on behalf of the CIA for developing a telephone line bug (1960s) *

S
SHENANIGANS – Aircraft-based NSA geolocation system used by CIA (ca. 2013) *

T
TRIGON – Codename for Soviet diplomat and CIA agent Alexander Ogorodnik *

U
ULTIMATE – CIA operation sending weather balloons into Eastern Europe in order to map Soviet defense radar activity (1950s) *
UMBRAGE – Unit of the Remote Development Branch (RDB) that stockpiled hacking techniques from other hackers (before 2017)

V
VICTORYDANCE – Joint NSA-CIA operation to map WiFi fingerprints of nearly every major town in Yemen (ca. 2013) *

W
WASHBURN – NSA ECI compartment for an NSA-CIA CLANSIG effort to exploit a source in a Middle Eastern location (since 2003) *

 


Abbreviations


A
AED – Applied Engineering Division (part of the EDG)
AIB – Automated Implants Branch (part of the AED)

B
BTTP – Basic Telecommunications Training Program

C
CAG – Crypto AG (Swiss crypto manufacturer purchased by CIA and BND in 1970)
CCI – Center for Cyber Intelligence (CIA hacking division, part of the DDI)
CIB – ? (part of the NOD)
CICM – Counterintelligence Mission Center
CIG – Central Intelligence Group (1946-1947)
CINEMA – CIA Information NEeds MAnagement (database)
CLANSIG – Clandestine Signals (joint NSA/CIA interception program) *
CMO – Collection Management Officers
CNB – Closed Network Branch (part of the ESD)
CO – Case Officer
CoB – Chief of Base
COG – Computer Operations Group (part of the CCI)
CoS – Chief of Station
CRD – ? (sub-compartment of HCS-P)
CREST – CIA Records Search Tool
CRT – Computer Research Team (part of the NOD)
CRU – ? (classification control system which includes GREYSTONE)
CTC – CIA CounterTerrorism Center
CTC/SO – CTC Special Operations

D
DA – Directorate of Analysis
DCI – Director of Central Intelligence (1946-2005)
D/CIA – Director of the Central Intelligence Agency (since 2005)
DDI – Directorate of Digital Innovation (CIA cyber division)
DDO – Deputy Director for Operations
DevLAN – Developers Local Area Network (internal computer system from which the Vault7 hacking tools were stolen)
DI – Directorate of Intelligence
DO – Directorate of Operations (Clandestine Service)
DS – Directorate of Support
DS&T – Directorate of Science & Technology

E
ECI – Exceptionally Controlled Information
EDB – Embedded Devices Branch (part of the AED)
EDG – Engineering Development Group (part of the CCI)
ESD – ? (part of the EDG)
ETB – ? (part of the ETB)

F
FINO – ? (part of the CCI)
FIO – ? (part of the CCI)
FSG – Field Service Group

G
GB – ? (part of the OED)

H
HCS – HUMINT Control System
HCS-O – HUMINT Control System-Operations
HCS-P – HUMINT Control System-Product
HUMINT – Human Intelligence

I
IB – Infrastructure Branch (part of the SED)
ICE – ? (part of the COG)
IOC – Information Operations Center
IVV – Independent Verification & Validation (part of the SED)

J
JIS – Joint Issues Staff (CIA liaison offices in foreign countries)

K
KLM – KLAMATH (see codewords listing)

M
MDB – Mobile Development Branch (part of the AED)
MRB – Mission Requirements Branch (part of the OED)

N
NCS – National Clandestine Service (2005-2015)
NDB – Network Devices Branch (part of the SED)
NEA – ? (part of the COG)
NEB – ? (part of the NOD)
NHB – New Headquarters Building (opened in 1991)
NOC – Non-Official Cover (for CIA operatives)
NOD – Network Operations Division (part of COG)
NRT – Network Research Team (part of the NOD)

O
OED – ? (part of the OTR)
OHB – Old Headquarters Building (opened in 1961)
OO – Operations Officers
OS – Office of Security
OSB – Operational Support Branch (part of the AED)
OSD – ? (part of the COG)
OSE – Open Source Enterprise (part of the DDI)
OSS – Office of Strategic Services (1942-1945)
OTR – Office of Technical Readiness (part of the DST)

P
P6 – Project 6 (joint BND, BfV and CIA anti-terrorism unit, stationed in Neuss, Germany; 2005-2010)*
PAG – Physical Access Group (part of the CCI)
PAG – Political Action Group (part of SAC)
PX – ? (database supporting the joint BND, BfV and CIA anti-terrorism unit Project 6)*

R
RDB – Remote Development Branch (part of the AED)

S
SAC- Special Activities Center (since 2016)
SAD- Special Activities Division (prior to 2016)
SCS – Special Collection Service (joint NSA-CIA unit)
SDB – Software Development Branch (part of the ESD)
SED – ? (part of the EDG)
SIB – Special Investigations Branch (part of OS)
SOG – Special Operations Group (part of SAC)
SOO – Staff Operations Officers
SPO – Special Police Officer
SRD – Special Requirements Division
SSO – Specialized Skills Officers

T
TAC – Technical Advisory Council (part of the EDG)
TISO – Technical Information Security Officer
TOB – ? (part of the NEA)
TOE – ? (part of the ICE)

U
UCL – UMBRAGE Component Library

W
WGB – Wireless Geolocation Branch (part of the ESD)
WTC – Warrington Training Center

X
X-2 – Counter Espionage Branch (1943-1945)

 


Organizational chart

Wikileaks has a partial organizational chart of the CIA, which provides a rough outline of its internal organization. It’s a reconstruction and can also be subject to changes due to internal reorganizations. A chart of the National Clandestine Service (now Directorate of Operations) can be found here.