NSA and Silicon Valley—25 years of history

A career in cybersecurity

|The Volokh Conspiracy |

This is admittedly self-indulgent, but I was recently interviewed by Cyberinsecurity News about my involvement in technology and national security policy over the years, and the result might be of interest to those who weren't there for the fights that still shape the policy environment. A sample:

Now, you cannot overestimate how significant the decryption victories of World War II were in shaping NSA's culture. They were, one way or another, part of breaking Japanese codes, and Nazi codes, and everyone agreed that those decryption achievements shortened the war and maybe made it possible to win the war. Given the stakes, no one wanted to be caught in the situation again where we did not have an overwhelming advantage with respect to dealing with foreign nations' codes. At the same time, the Soviets, who had seen that experience, had developed formidable capabilities of their own. We only occasionally got little glimpses of what was going on inside Russian communications, because their encryption was so good and so disciplined. So everybody was aware that what we had achieved in World War II was not ours by birthright. It was going to have to be something we scrapped and clawed at if we wanted to get that advantage again. So NSA was reluctant to surrender any advantage, including export controls on encryption.

For Microsoft and the rest of Silicon Valley, they were already deep into the cycle of destroying other people's businesses by turning them into software. Microsoft had done that successfully and become a massive new company at a time when new companies were rare. Basically by eating other people's businesses and saying, "Oh, sorry about that!" and moving on. I think they started out with the assumption that NSA's encryption and decryption advantage was just one more business model that was not going to survive Microsoft's software advantages. They were more confident maybe than they should have been, but they had plenty of experience and a lot of achievement behind them. You had two very proud, very self-confident organizations dueling with each other over matters that each of them thought was central to their future.

More here: http://www.cyberinsecuritynews.com/stewart-baker-1

NEXT: Students Fight to Free Contraception From Vending Machine Laws: Reason Roundup

Editor's Note: We invite comments and request that they be civil and on-topic. We do not moderate or assume any responsibility for comments, which are owned by the readers who post them. Comments do not represent the views of Reason.com or Reason Foundation. We reserve the right to delete any comment for any reason at any time. Report abuses.

  1. Nothing you say or do is not self-indulgent. And as someone who has been in inforsec for almost twenty years now – you are literally unknown and have zero impact. As evidence by the delusional “interview” you gave. Why does you are even allowed to post here is a mystery.

    1. It’s been a long time since I was anywhere near the PGP world, but memory says Stewart Baker did indeed have something to do with PGP’s bursting out into public; not from the PGP side, but from getting the government to see the reality that they couldn’t stop it.

    2. What’s the deal? Every time Stewart posts something here, I see over-the-top ad hominem attacks like this one.

      What the heck is your beef?

      1. What’s the deal? Every time Stewart posts something here, I see over-the-top ad hominem attacks like this one.

        What the heck is your beef?

        He is a lawyer who has advocated for an encryption back door for the deep state. He is the poster child for the less you know about something the easier it is to find a solution.

        1. Yes I know that. But just because someone is on the opposite side in a debate is no reason to disrespect them. Grow up.

  2. “they were already deep into the cycle of destroying other people’s businesses by turning them into software.”

    You misspelled “providing more efficient products and services”

    1. Destroying, destruction, same difference. You never heard of “creative destruction”?

  3. We have been all looking here to get the way to instagram hack online and this can be the best way here for us.

Please to post comments

Comments are closed.