From the Cold War to the Crypto War: Crypto-Advocates, the NSA, and Private Industry in the “New Informational World Order;” 1991-1996
()
About this ebook
As the Cold War came to a close, a new informational economy and society emerged in the last decade of the 20th century. As such, new approaches to the flow of information were needed. This historical study follows the contentions between academics and counterculturalists and their adversaries in the intelligence community such as the NSA. In doing so, this historical case study illustrates how these contentions were deeply ingrained in a Cold War dialogue between open and closed information theories. This case study follows individuals from the center of the early 1990s Crypto Wars. By exploring their arguments, their associations, and their assumptions from the Computer, Freedom, and Privacy conference as well as from the Whole Earth 'Lectronic Link (an early internet forum). As Americans came to terms with the World Trade Center bombing and the bloody siege at Waco, TX in 1993, counterculturalists and the NSA battled over the future of informational access. Would it be one where the government had full control over encryption methods (as had been over hundreds of years) or would new paradigms be necessary for the new millennium?
Related to From the Cold War to the Crypto War
Related ebooks
Behold a Pale Farce: Cyberwar, Threat Inflation, & the Malware Industrial Complex Rating: 5 out of 5 stars5/5None of Your Damn Business: Privacy in the United States from the Gilded Age to the Digital Age Rating: 4 out of 5 stars4/5War of the Web: Book One: The Battle of the Clouds Rating: 0 out of 5 stars0 ratingsSAFE: Science and Technology in the Age of Ter Rating: 3 out of 5 stars3/5Cyber-War: The Anatomy of the Global Security Threat Rating: 0 out of 5 stars0 ratingsCyber Disobedience: Re://Presenting Online Anarchy Rating: 0 out of 5 stars0 ratingsInformation Politics: Liberation and Exploitation in the Digital Society Rating: 0 out of 5 stars0 ratingsThe Uncertain Digital Revolution Rating: 0 out of 5 stars0 ratingsAidan’S Goldfish Rating: 0 out of 5 stars0 ratingsPiracy: The Intellectual Property Wars from Gutenberg to Gates Rating: 4 out of 5 stars4/5A Vulnerable System: The History of Information Security in the Computer Age Rating: 0 out of 5 stars0 ratingsCopy Fights: The Future of Intellectural Property in the Information Age Rating: 0 out of 5 stars0 ratingsYour Right To Privacy: Minimize Your Digital Footprint Rating: 0 out of 5 stars0 ratingsCybercrime and the Darknet: Revealing the hidden underworld of the internet Rating: 5 out of 5 stars5/5WikiLeaks and the Age of Transparency Rating: 5 out of 5 stars5/5Privacy in the Modern Age: The Search for Solutions Rating: 4 out of 5 stars4/5It's Mine: How the Crypto Industry Is Redefining Ownership Rating: 0 out of 5 stars0 ratingsDark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5The Digital Divide Navigating the Cyber Landscape: cyber security, #1 Rating: 0 out of 5 stars0 ratingsCome and Take It: The Gun Printer's Guide to Thinking Free Rating: 4 out of 5 stars4/5Internet Kill Switch: Who will decide the complete digital blackout on a global scale? Rating: 0 out of 5 stars0 ratingsThe Information Trade: How Big Tech Conquers Countries, Challenges Our Rights, and Transforms Our World Rating: 0 out of 5 stars0 ratingsNo Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Rating: 4 out of 5 stars4/5No-Nonsense Guide to Global Surveillance Rating: 0 out of 5 stars0 ratingsInhuman Power: Artificial Intelligence and the Future of Capitalism Rating: 1 out of 5 stars1/5Zero Day: The Threat In Cyberspace Rating: 4 out of 5 stars4/5State Crime: Governments, Violence and Corruption Rating: 0 out of 5 stars0 ratingsCypherpunks: Freedom and the Future of the Internet Rating: 4 out of 5 stars4/5Dynamic Tensions: Essays on Balancing Privacy, Security and Identity in the 21st Century Rating: 0 out of 5 stars0 ratings
United States History For You
The Book of Charlie: Wisdom from the Remarkable American Life of a 109-Year-Old Man Rating: 4 out of 5 stars4/5Lies My Teacher Told Me: Everything Your American History Textbook Got Wrong Rating: 4 out of 5 stars4/5Just Kids: A National Book Award Winner Rating: 4 out of 5 stars4/5Killing the Guys Who Killed the Guy Who Killed Lincoln: A Nutty Story About Edwin Booth and Boston Corbett Rating: 5 out of 5 stars5/5Angels in America: A Gay Fantasia on National Themes: Revised and Complete Edition Rating: 4 out of 5 stars4/5Our Kind of People: Inside America's Black Upper Class Rating: 3 out of 5 stars3/5The Great Reset: And the War for the World Rating: 4 out of 5 stars4/51776 Rating: 4 out of 5 stars4/5A People's History of the United States Rating: 4 out of 5 stars4/5Manhunt: The 12-Day Chase for Lincoln's Killer: An Edgar Award Winner Rating: 4 out of 5 stars4/5Bowling Alone: Revised and Updated: The Collapse and Revival of American Community Rating: 4 out of 5 stars4/5The Indifferent Stars Above: The Harrowing Saga of the Donner Party Rating: 4 out of 5 stars4/5How to Hide an Empire: A History of the Greater United States Rating: 4 out of 5 stars4/5The Fourth Turning Is Here: What the Seasons of History Tell Us about How and When This Crisis Will End Rating: 4 out of 5 stars4/5Benjamin Franklin: An American Life Rating: 4 out of 5 stars4/5Bury My Heart at Wounded Knee: An Indian History of the American West Rating: 4 out of 5 stars4/5South to America: A Journey Below the Mason-Dixon to Understand the Soul of a Nation Rating: 4 out of 5 stars4/5Vanderbilt: The Rise and Fall of an American Dynasty Rating: 4 out of 5 stars4/5Master Slave Husband Wife: An Epic Journey from Slavery to Freedom Rating: 4 out of 5 stars4/5The Fifties Rating: 4 out of 5 stars4/5Slouching Towards Bethlehem: Essays Rating: 4 out of 5 stars4/5Three Sisters in Black: The Bizarre True Case of the Bathtub Tragedy Rating: 4 out of 5 stars4/5The Devil's Chessboard: Allen Dulles, the CIA, and the Rise of America's Secret Government Rating: 5 out of 5 stars5/5Killing the Mob: The Fight Against Organized Crime in America Rating: 4 out of 5 stars4/5The White Album: Essays Rating: 4 out of 5 stars4/5Waco: David Koresh, the Branch Davidians, and A Legacy of Rage Rating: 4 out of 5 stars4/5
Reviews for From the Cold War to the Crypto War
0 ratings0 reviews
Book preview
From the Cold War to the Crypto War - Nicholas Shumate
There are strange things done ‘neath the silicon sun,
By techies who moil for gold,
And the network trails have their hacker tales
That would make your blood run cold.
But of all the strange sights o’er the ‘lectronic nights
The strangest I ever did see
Is Phiber, Kapor, and Neidof -and more-
In a room with Ingraham, the Feds, and me.
In the last two years, there’ve been shed bitter tears
Over freedom, computers and crime,
By phone phreaks and hackers, by pirates and crackers
Complaining they shouldn’t do time.
The past had wildcat rules for the data pools;
Then, nary a sheriff we saw.
But the Wild West is done — the settlers have come
And with them, computer law.
Crashes litter the network road.; we’ve viruses, worms, malicious code
Is this freedom you’d spare?
Liberty to compute is not the right to pollute
The datastream we all must share.
It’s been twenty years since the ‘lectronic frontier
Cybernet all our lives interweaves.
With the interconnection comes the right to protection
From predators, vandals and thieves.
Techno-punks, you say, are here to stay.
They’re creative! The economy they’ll save!
But they’re not very nice: selfish — cold as Black Ice
D’you really think they’ll just choose to behave?
The sparks of creation and exploration
Need not conflict with order.
If we teach in school, if we live the ethical rule:
Respect for each other’s border.
Law defends freedom to speak, not to steal or to sneak
Into a private file or a -base.
Law means balancing and sharing, fairness and caring
For individual space.
Is this freedom’s demise? Must users arise
A new Constitution to seek?
No! Ours is doing just fine — it’s been tested by time
Then why else are we here, this week?
As the past parades into future decades,
We’re here now — in real-time — to plan,
To share, to shed light, define the rules and the rights
For the Age of Electronic Man.
-
Gail Thackeray, 1991
Introduction
For hundreds of years, encryption has been an asset of the military and the state. At its core, encryption (or the use of cryptography) is simply the scrambling of information so as to render it unreadable by individuals and or systems which lack the requisite knowledge on how to unscramble it. The Caesar cipher, named after Julius Caesar, is one of the most notable and simple examples of encryption whereby letters are systematically substituted for others by sliding down the alphabet. For example, if we applied the Caesar cipher to the term Cold War
by shifting the alphabet down by four, it would look like Gsph Aev.
Again, this was done by simply shifting the letters down four places in the alphabet, C - G, O - S, L - P, D - H, etc. Although this is an extremely simple example of encryption, the point is that militaries and states throughout history would use these and exponentially more complex forms of cryptography to protect important messages, typically military orders, from prying eyes.
However, looking at the digital infrastructure we hold dear today, encryption is commonplace. It is used every time we send a text