16 January 1998: Add link to USA/NSA response
25 December 1997
Source: William H. Payne
See related documents: http://jya.com/whpfiles.htm
[December 23, 1997] UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW MEXICO William H. Payne ) Arthur R. Morales ) ) Plaintiffs, ) ) v ) CIV NO 97 0266 ) SC/DJS ) Lieutenant General Kenneth A. Minihan, USAF ) Director, National Security Agency ) National Security Agency ) ) Defendant ) PLAINTIFFS' MOTION FOR SUMMARY JUDGMENT ON BASED ON EVIDENCE FROM ADMISSIONS 1 COMES NOW plaintiffs Payne [Payne] and Morales [Morales] [Plaintiffs], pro se litigants to exercise their rights guaranteed under the Constitution and Federal Rules of Civil Procedure. As the court may know, Rule 26 (b)(1) Parties may obtain discovery regarding any mater, not privileged, which is relevant to the subject matter involved in the pending action, whether it relates to the claim or defense of the party seeking discovery or to the claim or defense of any other party, including the existence, description, nature, custody, condition, and LOCATION of any books documents, or other tangible thing and the identity and location of persons have knowledge of any discoverable matter. Rule 36 states, Request for admission (a) A party may serve upon any other party a written request for the admission, for the purposes of the pending action only, of the truth of any matters within the scope of Rule 26(b) set forth the request that relate to statements or opinions of fact or of the application of law to fact including the genuineness of any documents described in the request. Copies of documents shall be served with the request unless they have been or otherwise furnished or made available for inspection and copying. The request may WITHOUT LEAVE OF THE COURT, be served upon the plaintiff after commencement of the action and upon any other party with or after service of the summons and complaint upon that party. ... Plaintiffs capitalize WITHOUT LEAVE OF THE COURT. 2 Rule 36 states, {T]he matter IS ADMITTED unless, within 30 days after service of the request, or with such shorter or longer time as the court may allow, the party to whom the request is directed serves upon the party requesting the admission a written answer or objection address to the matter signed by the party or by the party's attorney, ... Plaintiffs capitalize IS ADMITTED. 3 PLAINTIFFS' FIRST SET OF REQUEST FOR ADMISSION TO NSA DIRECTOR KENNETH MINIHAN were served I HEREBY CERTIFY that a copy of the foregoing request for admissions was mailed to Jan Elizabeth Mitchell, Assistant US Attorney, 525 Silver SW, ABQ, NM 87102 this Monday November 3, 1997. More than 30 days elapsed and Plaintiff's have received no response from Minihan or Mitchell. Therefore, Minihan ADMITS 1 NSA is involved in 'spiking' [modifying the advertised intended functions] electronic equipment. 2 NSA 'spiked' Iranian and Libyan cryptographic units so that the cryptographic key was transmitted with the cipher text. 3 Iranian messages were given to Iraq during the Iran/Iraq war. 4 NSA was involved in the conviction, by giving contents of secret messages, of Ali Vakili-Rad and Masour Hendi to the Court in Paris in the trial for the stabbing death of Shapour Baktiar. 5 Minihan knows where copies of intercepted messages are kept at NSA. 4 Requests for First set of Admission were mailed October 13, 1997. More than 30 days has elapsed. No response from lawyer Mitchell or respondents were received by Plaintiffs. Therefore, NSA employee Brian Snow ADMITS 1 He designed the cryptographic algorithm for the Missile Secure Cryptographic Unit (MSCU). 2 NSA funded the MSCU at Sandia labs. 3 In about 1983 he gave a presentation at NSA FANX building to some Sandians involved with the Missile Secure Cryptographic Unit. 4 In the presentation he showed electronic schematics of the units to the Sandians. 5 He told the Sandians about the electronic and operational problems NSA had with the cryptographic units he bought with him. 6 He told the Sandians that one of the cryptographic units failed in the Moscow embassy and transmitted clear text. 7 He concluded his talk telling the Sandians that NSA had no operational failures once NSA went to dual redundant cryptographic units. 8 He told the Sandians not to ask for a theoretical reason why dual redundant cryptographics never failed, in the sense of releasing classified data, but that this was based on practical experience. 9 William H. Payne was one of the Sandians in the audience of his talk. 10 He sat across the table from William H. Payne at lunch in the cafeteria in the basement of the FANX building directly after his talk. 11 He was involved in algorithms associated with the Clipper project. 12 He where the documents specifying the MSCU algorithm are located at NSA. 13 He knows where the documents specifying algorithms associated with the Clipper project are located at NSA. NSA employee Thomas White ADMITS 15 He served as the liaison between NSA and Sandia for the Deployable Seismic Verification System. 16 He forwarded documents such as NSA's Orange book and the public key Firefly chip to Sandia. 17 He told Bill Payne that NSA regarded former president Ronald Reagan as one of the US's greatest traitors. 18 He told Bill Payne that the reasons NSA regarded Ronald Reagan as one of the US's greatest traitors is that Reagan, on TV announced to the world that the US was reading Libyan communications. 19 He Bill Payne that the following day [after Reagan's TV announcement] NSA could no longer read Libyan communications. 20 He knows where the documents specifying Benincasa's correction to the original USO seismic data authentication algorithm are located at NSA. NSA employee Mark Unkenholtz ADMITS 21 He visited Sandia in about 1986-87 with R division employee Ed Georgio to discuss which data authentication algorithm should be used for the US/USSR deployable seismic verification system (DSVS). 22 He and Bill Payne discussed using public key for the DSVS system. 23 He concluded that there were too many problems with public key so it was best to continue using the old Benincasa USO (unmanned seismic observatory) algorithm. 24 In 1989 he and others asked Bill Payne to write a memorandum to NSA deputy director James J. Hearn requesting help from NSA to develop new data authentication algorithms. 25 He did this is because R division needed a letter of support for more funding. 26 The DRAFT letter he asked Payne to write is seen on Internet at jya.com, click cryptome, catch the thread at August 29, 1997, SANDIA REPORT, SAND91-2201 UC 706, Data Authentication for the Deployable Seismic Verification System, Appendix T, Benincasa's Algorithm Deficiencies. 27 He asked Payne to fax the DRAFT letter to his fiancee, Amy Johnston, since NSA did not have fax for unclassified work readily available to use. 28 The "To Mark and Ed, R" on page 183 of SAND91-2201 UC 706 addressed him and his boss boss at the time, Ed Donohue. 29 He told Payne that NSA takes about a year to evaluate an encryption/authentication algorithm before it can be distributed for use. 30 He told Payne, in a response to a question from Payne, that NSA runs crypto algorithms through statistical tests. 31 After Payne wrote the Appendix T memorandum, NSA sent a delegation to Sandia. 32 He and NSA employee Scott Judy designed a replacement algorithm for Beninicasa's USO algorithm. 33 The replacement algorithm was code named GRANITE. 34 The GRANITE design addressed some of the deficiencies in Benincasa's algorithm enumerated in Payne's Appendix T June 21, 1989 DRAFT letter to Hearn. 35 The GRANITE design addressed some of the deficiencies in Benincasa's algorithm enumerated in Payne's Appendix T June 21, 1989 DRAFT letter to Hearn. 36 He knows where the documents specifying Benincasa's to the original USO seismic data authentication algorithm are located at NSA. 37 He knows where the documents specifying his and Judy's GRANITE algorithm are located at NSA. NSA employee Scott Judy ADMITS 38 He met Payne at Sandia sometime after he wrote the DRAFT letter on Internet at jya.com, click cryptome, catch the thread at August 29, 1997, SANDIA REPORT, SAND91-2201 UC 706, Data Authentication for the Deployable Seismic Verification System, Appendix T, Benincasa's Algorithm Deficiencies. 39 He later met Payne again at NSA in a meeting. 40 He told Payne that NSA bases its cryptographer algorithm on principles other than mathematics. 41 He and NSA employee Mark Unkenholtz designed a replacement algorithm for Beninicasa's USO algorithm. 42 His replacement algorithm was code named GRANITE. 43 GRANITE design addressed some of the deficiencies in Benincasa's algorithm enumerated in Payne's Appendix T June 21, 1989 DRAFT letter to Hearn. 44 The number stepping on the internal registers of GRANITE was decreased in response to deficiency 2 enumerated in the June 21, 1989 letter to Hern. 45 He knows where the documents specifying Benincasa's correction to the original USO seismic data authentication algorithm are located at NSA. 46 He knows where the documents specifying his and Unkenholtz's GRANITE algorithm are located at NSA. NSA employee Edward Donohue ADMITS 47 He met Payne at Sandia sometime after he wrote the DRAFT letter on Internet at jya.com, click cryptome, catch the thread at August 29, 1997, SANDIA REPORT, SAND91-2201 UC 706, Data Authentication for the Deployable Seismic Verification System, Appendix T, Benincasa's Algorithm Deficiencies. 48 He was head of NSA's R division cryptographic algorithms division in 1989. 49 He knows where 1 Benincasa's original NSS/USO algorithm, 2 Benincasa's revision of 1, 3 The Unkenholtz - Judy GRANITE algorithm, 4 Brian Snow's MSCU algorithm, 5 the clipper algorithms, 6 the STU III algorithms. written specifications are located at NSA. NSA employee Paul Bridge ADMITS 50 He assumed liaison control from NSA employee Tom White for the US/USSR seismic data authenticator. 51 He placed a copy of WORKING AGREEMENT BETWEEN SANDIA NATIONAL LABORATORIES AND THE NATIONAL SECURITY AGENCY CONCERNING RESEARCH IN CRYPTOGRAPHY AT SANDIA NATIONAL LABORATORY Sandia National Laboratories (SNL) and the National Security Agency (NSA) have established a working relationship which has gown substantially over the last decade. Currently, there exist several joint project areas of mutual interest. Different policies and administrative procedure exist at SNL and NSA which govern the handling of sensitive and classified material, and the documentation and dissemination of such work. It is the purpose of the Agreement to specify the general guidelines under which work will be administered in the area of cryptography research at SNL. First, SNL, in its role as systems integrator, requires and indigenous cryptographic capability to support its Department of Energy mission in the design and development of safe and secure nuclear weapons and in treaty verification. SNL and NSA agree to a cooperative effort to support SNL's needs in a manner consistent with the role of such work to national security. Second, NSA, in its role as the U.S. Government approval authority for cryptographic systems developed for and used in national security applications, recognizes its responsibility to provide support and guidance to SNL's activities in applying cryptography. Third, SNL will regard cryptographic research work as classified when it is initiated or created, i.e., will protect such work as "created classified", and will consult with NSA prior to handling such work as unclassified. Periodic technical and managerial discussions between SNL and NSA will be held to increase the awareness of the security concerns of both organizations and to develop and maintain an SNL cryptographic classification guide which will protect the national security interests of both organizations. This working agreement shall be effective on the date of the last signature and will be reviewed annually by SNL and NSA. It will be valid until terminated by mutual agreement. AGREED: ALBERT NARATH RADM JAMES S. MCFARLAND (USN) President Plans and Policy TITLE TITLE SANDIA NATIONAL NATIONAL SECURITY AGENCY LABORATORIES June 10, 1991 22 July 1991 DATE DATE which is now seen on Internet at jya.com, click cryptome, catch the thread at August 29, 1997. 52 His purpose of giving Payne a copy of the Narath/MacFarland agreement an attempt to threaten Payne. 53 He told Payne that Sandia must regard the US/USSR Deployable Seismic Verification System (DSVS) authenticator as classified and get permission from NSA to place the unit in the field. 54 He told Payne that Sandia must have the DSVS authenticator TEMPEST tested . 55 He agrees Payne responded to him that the previous unit had already passed TEMPEST testing and that Payne's Sandia project leader, H. B. [Jim] Durham, did not want to spend the money to repeat the testing. 56 He told Payne that NSA should be getting the capability to build cryptographic devices. NSA employee Rick Proto ADMITS 57 He and group of other NSA employees met Sandians H. B. Durham, Ron Moya, and William Payne at NSA at Fort George G. Meade in about 1986 to discuss, in part, implementation of the Deployable Seismic Verification System data authenticator. 58 He and other NSA employees directed that the NSA Unmanned Seismic Observatory data authenticator algorithm designed by NSA employee Ronald Benincasa be implemented entirely in hardware. 59 He and the other NSA employees at the meeting, directed that the data authenticator be enclosed in a TEMPEST enclosure. Sandians expressed objection to the TEMPEST enclosure in that the authenticator was housed in a steel tube buried about 100 meters beneath ground surface. 60 He agrees that he and NSA employee Robert Morris met with Sandia cryptographer G. J. Simmons when Simmons asked them both the two questions: 1 NSA is sorry it delegated cryptographic implementation responsibility to Sandia for nuclear weapons; 2 NSA is trying to take back this responsibility? 61 He and/or Morris refuse to respond to Simmons' above question. Retired Sandia Employee Gustavus J Simmons ADMITS 62 He with Sandia Paul Stokes designed a data authentication algorithm for seismic treaty verifications in the early 1970s. 63 He and Stokes either patented, tried to patent, or contemplated patenting their authentication algorithm. 64 NSA, when we presented their seismic data authentication algorithm to the Agency, rejected its use. 65 He know that NSA gave Sandia the data authentication algorithm designed by NSA employee Ronald Benincasa to use in seismic verification rather than use your and Stokes algorithm. 66 He feels that the algorithm that he and Stokes proposed is as good or better than Benincasa's algorithm. 67 He feels that NSA demanding Sandia use Benincasa's algorithm could be a case of Not-invented-here as opposed to technical advantages over his and Stokes algorithm. 68 In about 1986 he gave a presentation in Sandia spook-shop building 868 to promote the use of public key cryptography for use in the Deployable Seismic Verification System. 69 No one, until he received a copy of Payne's technical report in 1992, SANDIA REPORT, SAND91-2201 UC 706, Data Authentication for the Deployable Seismic Verification System told him what algorithm and authentication technology was used. 70 He asked NSA employees Rick Proto and Robert Morris to the effect, 1 NSA is sorry it delegated cryptographic implementation responsibility to Sandia for nuclear weapons; 2 NSA is trying to take back this responsibility. 71 Proto or Morris did not answer his questions. 72 He retired before he planned from Sandia Labs. 73 He felt that NSA exerted some pressure on Sandia to have him retire. 74 He told William Payne on the phone that he was forced into early retirement as a result of NSA pressures. 75 He felt that some NSA algorithms do not are properly classifiable. 76 He felt that NSA abuses classification with regard to cryptography. 77 He feels that cryptography, by its 'slippery math' basis, is difficult, if not impossible, to regulate. Sandia employee D. Jerry Allen ADMITS 78 He was a supervisor Sandia's weapons components department. 79 NSA has responsibility for furnished Sandia the cryptographic algorithms and approving the implementation technology which went into the electronic locks in the US nuclear arsenal. 80 He told William Payne in about 1991-92 that it cost $300,000 per nuclear bomb to recall bombs to Pantex to remove and repair Sandia's failing semiconductor chips. Sandia employee Ronald Kulju ADMITS 81 He worked in Sandia weapons components department in about 1986/7. 82 He was working on a project which involved use of the Cylink corporation CY 1024 public key cryptography semiconductor chip. 82 He made an agreement in about 1986/7 with Payne. He would design the hardware oscillator for the CY 1024 if Payne would try to get CY 1024 to communicate with an 80c51 microcontroller using synchronous Mode 0 communications. 83 He told Payne that Sandia's public key cryptography chips did not get the same answers as the CY 1024. 84 He told Payne that NSA and Sandia was in the process of removing the public key cryptography from weapons systems. 4 Admissions reveal that NSA employees KNOW where the lawfully requested documents reside. And that NSA has EMBARRASSING problems with its cryptographic algorithms. 5 Rule 56 states. Summary Judgment states, The judgment sought shall be rendered forthwith if the pleadings, depositions, answers to interrogatories, and admissions on file, together with the affidavits, if any, show that there is NO GENUINE ISSUE AS TO ANY MATERIAL FACT and that the moving party is entitled to judgment as a matter of law. Plaintiffs capitalize NO GENUINE ISSUE AS TO ANY MATERIAL FACT. Admissions attest to the contention that there are NO GENUINE ISSUE AS TO ANY MATERIAL FACT. WHEREFORE, 6 Replace Judges Svet and Campos because these judges have demonstrated, IN WRITING, they do not follow the Federal Rules of Civil Procedure. 7 Award Plaintiffs motion for summary judgment as a matter of law based on admissions. 8 Have replacement judges ORDER Defendant to produce immediately produce documents in machine-readable format for publication on Internet. In preparation for settlement of this unfortunate bungled spy sting. And analysis of 'deficient' NSA cryptographic algorithm work designed to get the US government out of the cryptography business. 9 Grant such other relief as the Court may deem just and proper. Respectfully submitted, _________________________ William H. Payne 13015 Calle de Sandias NE Albuquerque, NM 87111 _________________________ Arthur R. Morales 1024 Los Arboles NW Albuquerque, NM 87107 Pro se litigants CERTIFICATE OF SERVICE I HEREBY CERTIFY that a copy of the foregoing memorandum was mailed to Lieutenant General Kenneth A. Minihan, USAF, Director, National Security Agency, National Security Agency, 9800 Savage Road, Fort George G. Meade, MD 20755-6000 and hand delivered to Jan E Mitchell, Assistant US Attorney, 525 Silver SW, ABQ, NM 87102 this Monday December 22, 1997. 13 Tuesday December 9, 1997 06:26 Certified - return receipt requested Gilbert F. Casellas, Chairman U.S. Equal Employment Opportunity Commission 1801 L Street, N.W. Washington, D.C. 20507 Dear Chairman Casellas: Tuesday November 11, 1997 I filed a Privacy Act/Freedom of Information Act appeal with your office. No acknowledgment of that appeal was received. I wrote you in that letter, An agency is required to make a decision on an appeal within 20 days (excluding Saturdays, Sundays, and legal holidays). It is possible for an agency to extend the time limits by an additional 10 days. Once the time period has elapsed, a requester may consider that the appeal has been denied and may proceed with a judicial appeal. Since I did not send my appeal letter certified, I assume that it took three days, a the courts allow for filing by mail, to reach your office. Therefore, I assume that the letter arrived at your office on Friday November 14. This assumption means that your office had 9 days in November to process my appeal. The remaining 11 working days before administrative remedies are exhausted expires on December 15. If you did not receive my appeal letter at the time I supposed you did, then I ask you to write me and tell me this. Otherwise, I and everyone else must conclude administrative remedies have been exhausted on December 15. Chairman Casellas, should anyone in your office not believe that we are proceeding to judicial appeal and a defamation lawsuit, let the following article published on Internet assure you that we are. Unless we settle this matter, of course. NSA, Crypto AG, and the Iraq-Iran Conflict by J. Orlin Grabbe One of the dirty little secrets of the 1980s is that the U.S. regularly provided Iraq's Saddam Hussein with top-secret communication intercepts by the U.S. National Security Agency (NSA). Consider the evidence. When in 1991 the government of Kuwait paid the public relations firm of Hill & Knowlton ten million dollars to drum up American war fever against the evil dictator Hussein, it brought about the end of a long legacy of cooperation between the U.S. and Iraq. Hill & Knowlton resurrected the World War I propaganda story about German soldiers roasting Belgian babies on bayonets, updated in the form of a confidential witness (actually the daughter of the Kuwaiti ambassador to the U.S.) who told Congress a tearful story of Iraqi soldiers taking Kuwaiti babies out of incubators and leaving them on the cold floor to die. President George Bush then repeated this fabricated tale in speeches ten times over the next three days. What is remarkable about this staged turn of events is that, until then, Hussein had operated largely with U.S. approval. This cooperation had spanned three successive administrations, starting with Jimmy Carter. As noted by John R. MacArthur, "From 1980 to 1988, Hussein had shouldered the burdenof killing about 150,000 Iranians, in addition to at least thirteen thousand of his own citizens, including several thousand unarmed Kurdish civilians, and in the process won the admiration and support of elements of three successive U.S. Administrations" [1]. Hussein's artful slaughter of Iranians was aided by good military intelligence. The role of NSA in the conflict is an open secret in Europe, the Middle East, and Asia. Only in this country has there been a relative news blackout, despite the fact that it was the U.S. administration that let the crypto cat out of the bag. First, U.S. President Ronald Reagan informed the world on national television that the United States was reading Libyan communications. This admission was part of a speech justifying the retaliatory bombing of Libya for its alleged involvement in the La Belle discotheque bombing in Berlin's Schoeneberg district, where two U.S. soldiers and a Turkish woman were killed, and 200 others injured. Reagan wasn't talking about American monitoring of Libyan news broadcasts. Rather, his "direct, precise, and undeniable proof" referred to secret (encrypted) diplomatic communication between Tripoli and the Libyan embassy in East Berlin. Next, this leak was compound by the U.S. demonstration that it was also reading secret Iranian communications. As reported in Switzerland's Neue Zurcher Zeitung, the U.S. provided the contents of encrypted Iranian messages to France to assist in the conviction of Ali Vakili Rad and Massoud Hendi for the stabbing death in the Paris suburb of Suresnes of the former Iranian prime minister Shahpour Bakhtiar and his personal secretary Katibeh Fallouch. [2] What these two countries had in common was they had both purchased cryptographic communication equipment from the Swiss firm Crypto AG. Crypto AG was founded in 1952 by the (Russian-born) Swedish cryptographer Boris Hagelin who located his company in Zug. Boris had created the "Hagelin-machine", a encryption device similar to the German "Enigma". The Hagelin machine was used on the side of the Allies in World War II. Crypto AG was an old and venerable firm, and Switzerland was a neutral country. So Crypto AG's enciphering devices for voice communication and digital data networks were popular, and customers came from 130 countries. These included the Vatican, as well the governments of Iraq, Iran, and Libya. Such countries were naturally skeptical of cryptographic devices sold in many NATO countries, so turned to relatively neutral Switzerland for communication security. Iran demonstrated its suspicion about the source of the leaks, when it arrested Hans Buehler, a top salesman for Crypto AG, in Teheran on March 18, 1992. During his nine and a half months of solitary confinement in Evin prison in Teheran, Buehler was questioned again and again whether he had leaked Teheran's codes or Libya's keys to Western powers. Luckily Buehler didn't know anything. He in fact believed in his own sales pitch that Crypto AG was a neutral company and its equipment was the best. They were Swiss, after all. [3] Crypto AG eventually paid one million dollars for Buehler's release in January 1993, then promptly fired him once they had reassured themselves that he hadn't revealed anything important under interrogation, and because Buehler had begun to ask some embarrassing questions. Then reports appeared on Swiss television, Swiss Radio International, all the major Swiss papers, and in German magazines like Der Spiegel. Had Crypto AG's equipment been spiked by Western intelligence services? the media wanted to know. The answer was Yes [4]. Swiss television traced the ownership of Crypto AG to a company in Liechtenstein, and from there back to a trust company in Munich. A witness appearing on Swiss television explained the real owner was the German government--the Federal Estates Administration. [5] According to Der Spiegel, all but 6 of the 6000 shares of Crypto AG were at one time owned by Eugen Freiberger, who resided in Munich and was head of the Crypto AG managing board in 1982. Another German, Josef Bauer, an authorized tax agent of the Muenchner Treuhandgesellschaft KPMG, and who was elected to the managing board in 1970, stated that his mandate had come from the German company Siemens. Other members of Crypto AG's management had also worked at Siemens. Was the German secret service, the Bundesnachrichtendienst (BND), hiding behind the Siemens' connection? So it would seem. Der Spiegel reported that in October 1970, a secret meeting of the BND had discussed how the Swiss company Graettner could be guided into closer cooperation with Crypto AG, or could even merged with it. The BND additionally considered how "the Swedish company Ericsson could be influenced through Siemens to terminate its own cryptographic business." [6] A former employee of Crypto AG reported that he had to coordinate his developments with "people from Bad Godesberg". This was the location of the "central office for encryption affairs" of the BND, and the service instructed Crypto AG what algorithms to use to create the codes. The employee also remembers an American "watcher", who strongly demanded the use of certain encryption methods. Representatives from NSA visited Crypto AG often. A memorandum of a secret workshop at Crypto AG in August 1975, where a new prototype of an encryption device was demonstrated, mentions the participation of Nora L. Mackebee, an NSA cryptographer. Motorola engineer Bob Newman says that Mackebee was introduced to him as a "consultant". Motorola cooperated with Crypto AG in the seventies in developing a new generation of electronic encryption machines. The Americans "knew Zug very well and gave travel tips to the Motorola people for the visit at Crypto AG," Newman told Der Spiegel. Knowledgeable sources indicate that the Crypto AG enciphering process, developed in cooperation with the NSA and the German company Siemans, involved secretly embedding the decryption key in the cipher text. Those who knew where to look could monitor the encrypted communication, then extract the decryption key that was also part of the transmission, and recover the plain text message. Decryption of a message by a knowledgeable third party was not any more difficult than it was for the intended receiver. (More than one method was used. Sometimes the algorithm was simply deficient, with built-in exploitable weaknesses.) Crypto AG denies all this, of course, saying such reports are "pure invention". What information was provided to Saddam Hussein exactly? Answers to this question are currently being sought in a lawsuit against NSA in New Mexico, which has asked to see "all Iranian messages and translations between January 1, 1980 and June 10, 1996". [7] The passage of top-secret communications intelligence to someone like Saddam Hussein brings up other questions. Which dictator is the U.S. passing top secret messages to currently? Jiang Zemin? Boris Yeltsin? Will Saddam Hussein again become a recipient of NSA largess if he returns to the mass slaughter of Iranians? What exactly is the purpose of NSA anyway? One more question: Who is reading the Pope's communications? Bibliography [1] John R. MacArthur, Second Front: Censorship and Propaganda in the Gulf War, Hill and Wang, New York, 1992. [2] Some of the background of this assassination can be found in "The Tehran Connection," Time Magazine, March 21, 1994. [3] The Buehler case is detailed in Res Strehle, Verschleusselt: der Fall Hans Beuhler, Werd Verlag, Zurich, 1994. [4] "For years, NSA secretly rigged Crypto AG machines so that U.S. eavesdroppers could easily break their codes, according to former company employees whose story is supported by company documents," "No Such Agency, Part 4: Rigging the Game," The Baltimore Sun, December 4, 1995. [5] Reported in programs about the Buehler case that were broadcast on Swiss Radio International on May 15, 1994 and July 18, 1994. [6] "Wer ist der befugte Vierte?": Geheimdienste unterwandern den Schutz von Verschlusselungsgeraten," Der Spiegel 36, 1996. [7] U.S. District Court for the District of New Mexico, William H. Payne, Arthur R. Morales, Plaintiffs, v. Lieutenant General Kenneth A. Minihan, USAF, Director of National Security Agency, National Security Agency, Defendant, CIV NO 97 0266 SC/DJS. November 2, 1997 Web Page: http://www.aci.net/kalliste/ Sincerely, William H. Payne 13015 Calle de Sandias Albuquerque, NM 87111
[End]