Abbreviations, Special Terms, and Names; Preface; Introduction; Chapter 1. Symmetric Codes; Chapter 2. The Birth of the NSA; Chapter 3. NSA 1953-1997; Chapter 4. NSA 1997-2010; Chapter 5. Conclusions; Appendix A. Some Mathematical Concepts of Cryptography; Appendix B. Public Key Crypto Concepts; Bibliography; Index.
Government is reading your mail, and the Intelligence services are reading the Government's mail. Who is in charge?. The National Security Agency was formed under such secrecy that it evades even Congressional scrutiny. A former NSA scientist raises an alarm over this abuse of America?s founding principles. Along the way, he gives a technical briefing on how messages were encrypted and deciphered until the Internet age, demonstrates that the paranoiac secrecy over encryption is now obsolete, and explains why. All this is enlivened with entertaining behind-the-scenes anecdotes from the author?s.