Crypto AG
Crypto AG is a Swiss company specialising in communications and information security. With headquarters in Steinhausen, the company is a long-established manufacturer of encryption machines and a wide variety of cipher devices. The company has about 230 employees, has offices in Abidjan, Abu Dhabi, Buenos Aires, Kuala Lumpur, Muscat, Selsdon and Steinhausen, and does business throughout the world.[1] The owner(s) of Crypto AG are unknown, supposedly even to the managers of firm, and they hold their ownership through bearer shares.[2]
On 28 March 2015, it was reported that nearly half a dozen investigative “strands” tied to the sabotage of Pan Am Flight 103 were related to Crypto AG projects, which had security protocols tagging all encrypted messages with a built-in hack and redirecting them to the Mossad for evaluation and “valuation.”[3]
History
Crypto AG was established in Bern by Russian-born Swede, Boris Hagelin. Originally called AB Cryptoteknik and founded by Arvid Gerhard Damm in Stockholm in 1920, the firm manufactured the C-36 mechanical cryptograph machine that Damm had patented. After Damm's death, and just before World War II, Cryptoteknik came under the control of Boris Hagelin, an early investor, and during the War essentially operated in the United States, where 140,000 units were made under licence as C-38. In the early 1950s, it was transferred from Stockholm to Zug as a result of a planned Swedish government nationalisation of militarily important technology/contractors, and was incorporated in Switzerland in 1952.
Crypto AG has a sister company, InfoGuard AG.
Products
The company has radio, ethernet, STM, GSM, phone and fax encryption systems in its portfolio.
Machines
- C-52
- CD-57
- HX-63
Back-doored machines
Crypto AG has been accused of rigging its machines in collusion with intelligence agencies such as the German Bundesnachrichtendienst (BND) and the United States National Security Agency (NSA), enabling such organisations to read the encrypted traffic produced by the machines.[4] Suspicions of this collusion were aroused in 1986 following US president Ronald Reagan's announcement on national television that, through interception of diplomatic communications between Tripoli and the Libyan embassy in East Berlin, he had irrefutable evidence that Muammar Gaddafi of Libya was behind the 1986 Berlin discotheque bombing in which two US service personnel were killed and another fifty injured. President Reagan then ordered the bombing of Tripoli and Benghazi in retaliation. There is no conclusive evidence that there was an intercepted Libyan message.
Further evidence suggesting that the Crypto AG machines were compromised was revealed after the assassination of former Iranian Prime Minister Shahpour Bakhtiar in 1991. On 7 August 1991, one day before Bakhtiar's body was discovered, the Iranian Intelligence Service transmitted a coded message to Iranian embassies, inquiring "Is Bakhtiar dead?" Western governments were able to decipher this transmission, causing Iranian suspicion to fall upon their Crypto AG equipment.[5]
The Iranian government then arrested Crypto AG's top salesman, Hans Buehler, in March 1992 in Tehran. It accused Buehler of leaking their encryption codes to Western intelligence. Buehler was interrogated for nine months but, being completely unaware of any flaw in the machines, was released in January 1993 after Crypto AG posted bail of $1m to Iran.[6] Soon after Buehler's release Crypto AG dismissed him and charged him the $1m. Swiss media and the German magazine Der Spiegel took up his case in 1994, interviewing former employees and concluding that Crypto's machines had in fact repeatedly been rigged.[7]
Crypto AG rejected these accusations as "pure invention", asserting in a press release that "in March 1994, the Swiss Federal Prosecutor's Office initiated a wide-ranging preliminary investigation against Crypto AG, which was completed in 1997. The accusations regarding influence by third parties or manipulations, which had been repeatedly raised in the media, proved to be without foundation." Subsequent commentators [8][9][10][11] are unmoved by this denial, stating that it is likely that Crypto AG products were indeed rigged.
References
- ↑ "Headquarters and regional offices worldwide". Crypto AG. Retrieved 2008-01-06.Page Module:Citation/CS1/styles.css must have content model "Sanitized CSS" for TemplateStyles (current model is "Scribunto").
- ↑ Leo Müller. "Espionage: A Spooky Cooperation" (PDF). Bilanz.Page Module:Citation/CS1/styles.css must have content model "Sanitized CSS" for TemplateStyles (current model is "Scribunto").
- ↑ "The Crash: Coming into Focus"
- ↑
{{URL|example.com|optional display text}}
- ↑
{{URL|example.com|optional display text}}
- ↑ Schneier, Bruce (2004-06-15). "Breaking Iranian codes". Crypto-Gram newsletter.Page Module:Citation/CS1/styles.css must have content model "Sanitized CSS" for TemplateStyles (current model is "Scribunto").
- ↑
{{URL|example.com|optional display text}}
- ↑
{{URL|example.com|optional display text}}
- ↑ Grabbe, J. Orlin (1997-11-02). "NSA, Crypto AG, and the Iraq-Iran conflict". Archived from the original on 2007-06-07.Page Module:Citation/CS1/styles.css must have content model "Sanitized CSS" for TemplateStyles (current model is "Scribunto").
- ↑ Schneier, Bruce (2008-01-11). "NSA Backdoors in Crypto AG Ciphering Machines". Schneier on Security blog.Page Module:Citation/CS1/styles.css must have content model "Sanitized CSS" for TemplateStyles (current model is "Scribunto").
- ↑ Baranyi, Laszlo (1998-11-11). "The story about Crypto AG".Page Module:Citation/CS1/styles.css must have content model "Sanitized CSS" for TemplateStyles (current model is "Scribunto").
External links
Wikipedia is not affiliated with Wikispooks. Original page source here