Well going to the NSA won’t be pleasant if you are not American.
I don’t know if this is true, but I’ve heard you have to have permission from the NSA to become a professional cryptologist. Probably they could arrest you just for violating that law.
A lot of Frederick Forsyth’s stories seem oddly prescient, including at least one that predicted the current wave of extremists in the West getting radicalised via the internet quite some time before it became a hot-button issue.
And probably anecodatal, but I read somewhere that the producers of the Bond movie Goldfinger had to guess what the inside of Fort Knox looks like (for obvious reasons) and apparently while it wasn’t close enough to be a concern to anyone, it wasn’t a million miles off the mark either.
If you publish an interesting, let alone revolutionary, result (in any field of research) then people will be interested (that means you have done good work). Including the NSA if applicable.
If you don’t want your work to receive public scrutiny/peer review just don’t publish it. But you can publish whatever you want. Indeed, why wouldn’t you, having done all that hard work? You can study, receive various doctorates, apply for and be granted funding for research in cryptography (say) with no communication to or from the NSA.
Well, there was the “Disney Bomb,” although that was a proposed weapon from an educational/propaganda film based on a non-fiction book, not a fictional weapon appearing in a fictional context.
A work of fiction getting uncomfortably close to a geopolitical secret, and officialdom overreacting, is part of the plot of the 1975 Robert Redford thriller Three Days of the Condor.
Heinlein in “Solution Unsatisfactory” (?) not only proposed a dirty bomb (drop radioactive material on a city) but also predicted the cold war MAD standoff.
It’s not true.
Jacques d’Emal’s Masters Thesis, “ANTICIPATING THE ATOM: POPULAR PERCEPTIONS OF ATOMIC POWER BEFORE HIROSHIMA” lists 160 atomic power stories before Heinlein’s. There were a dozen before Wells’ The World Set Free, although not all used atomic weaponry in the modern sense. Fandom’s love of Campbell’s Golden Age sf is like Orwellian propaganda: it rewrote history to make it appear that it arose out of nothingness fully formed.
“By The Waters of Babylon” by Benét is often mistaken for just another post-atomic war return-to-savagery story. yet it was published in 1937 (In the Saturday Evening Post !! ) and imagined a level of war(s) so horrific it completely destroys civilization, written before WWII trumped the WWI’s scale of destructive orgy. Not in the OP’s range, but a demonstration of the range of imagination of earlier writers. No, Campbell did not invent SF, nor did Gernsback, nor did Wells.
Sounds doubtful. First of all, what would a “professional cryptologist” be? Someone well-versed in cryptology? The mathematical foundations behind cryptology are publicly available; they are out there, in books and journals, for everyone with an interest in the matter to read. The NSA can’t prevent you from going to a good library and reading up on it.
Yup. It’s a damn shame they arrested Phil Zimmerman just as he was beginning to write Pretty Good Privacy, so that it couldn’t become the foundation of a multi-billion-dollar-per-year commercial cryptographic security industry.
No, wait, that’s the opposite of what happened. Zimmerman wrote and released PGP, in spite of the opposition of cryptologic agencies, and those agencies did nothing (other than fume silently, and maybe try ill-fated efforts to supplant strong commercial crypto with weaker or key-escrowed systems that the market almost completely ignored.)
The NSA is not The Star Chamber. They do not have assassin teams, or black helicopters, or most of law enforcement in their pockets. And you will not be arrested for implementing cryptography. You should be, if you implement poor home-rolled crap cryptography, but only for fraud, not for “unlicensed practice of cryptology”.
While you don’t need a “license to be a professional cryptologist”, cryptographic consulting services still require an export license, and encryption registration with the U.S. Bureau of Information and Security is required for the export of mass market encryption commodities, software and components with encryption exceeding 64 bits. Other items require a one-time review by or notification to BIS prior to export to most countries: Crypto Wars - Wikipedia
My dad tells me that if, as a student at the US Naval Academy, you write a term paper that describes something uncomfortably close to something that is actually in development, you will get your paper back just long enough to learn your grade, and then you’ll never see that paper again.
Presumably a good grade.
I personally know several professional cryptologists. A few years ago NIST requested proposals for how SHA-3 should work. There were a lot of proposals from different companies. My colleagues worked on one proposal. Sadly for them a different proposal was chosen. Schnitte is correct they are basically mathematicians who have specialized in the math of cryptography. They have no special licenses.
There are agreements between at least some governments in which they can request that such patent applications be declared secret by the local government. I’ve seen at least one case of such a thing in Canada, after it was finally declassified, in which the US asked Canada to classify it.
Good thing you cannot patent an algorithm; you can publish it, say online or in a journal, or not.
To the extent that the government is interested in restricting the export of cryptographic software, that is less like regulating stories involving fictional sci-fi death rays, and more like restricting export of actual death rays or detailed blueprints for manufacturing death rays.
1920’s style?
I’m aware your dad was probably in school back in the Uncle Joe Stalin era, judging by the average age of posters on this board, but surely even Admiral Halsey’s Navy would have heard of the magical technological wonder of carbon paper and, I don’t know, handwritten notes and outlines.
Plus, any sign that distinguishes the interesting from the uninteresting is a grave security breach in and of itself, and you don’t need to be Claude Shannon to understand the importance of not leaking even one bit of information about what you deem interesting.