Posts Tagged ‘Codebreaking’

The global future of the surveillance states

December 6, 2019

Knowledge is power.  If I know everything there is to know about you, and you know nothing about me, I have power over you.

That power takes two forms.  One is the power of blackmail.  You would be highly unusual if you not only had never done anything bad, but had never done anything that could be made to look bad.

The other is the power of manipulation.  If I know everything about you, I have an idea of what psychological buttons to push to get you to do what I want.

Edward Snowden, in PERMANENT RECORD, told of how U.S. intelligence agencies are collecting information about the whole American population based on their electronic records and Internet activities.

We know that intelligence agencies use blackmail.  And we know from Shoshana Zuboff’s THE AGE OF SURVEILLANCE CAPITALISM that corporations such as Google, Facebook and Cambridge Analytica use data about individuals to help advertisers and win election campaigns.

But surveillance is not just American.  if U.S. intelligence agencies are gathering data about foreigners, foreign intelligence agencies must surely be gathering information about Americans.  And if they don’t yet have the technical capability to equal the American effort, it is only a matter of time until they do.

The government of China, for example, has financial and technological power equal to the USA, and the Chinese have an attitude that anything Americans or other Westerners can do, they can out-do.

They already carry surveillance of their own citizens to terrifying lengths, and there is no reason to think they would limit surveillance to their own citizens.

Snowden’s solution is strong encryption of electronic communication.  Individuals may or may not be able to bring their governments under control, he wrote, but they can take action to protect themselves.

There are problems with this.  One is persuading companies such as Google and Facebook to go along with it or persuading individuals to go without the convenience of using Google and Facebook.  After all, the Google and Facebook business model is based on collecting data from their users.

Another is whether they can be any encryption that is truly unbreakable.  Snowdon in his book gives examples of the Tor system of encryption and explains why it is not mathematically and technologically feasible to break it.

I don’t know enough about cryptography to contradict him.  But I do know the history of code-making and code-breaking has been a back-and-forth struggle.


How the Enigma code was broken

April 14, 2015

This pair of videos explains exactly how the World War Two German Enigma code worked, why it was so hard to break, and what the British Bletchley Park team did to break it.