 Good afternoon. Hello everybody here in Cologne. I'm glad actually to be in Cologne since I lived here in Cologne for years and I've also some friends over here coming today to see me and watch me here a little bit. So let's see what we can do. At first I'd like to introduce myself a little bit. Well, my name is Arjen Hoffmann. In my usual, my usual profession is to be a teacher for information sciences, for computer sciences in Frankfurt. I'm actually an internet user and internet activist more or less from the first days of the internet more or less. What concerns me with the CCC is, well, I'm a little bit Unix-affined, let's say, and I'm also a developer for software known by Daniel Bernstein, who is also pretty much known here in the cryptographic world and I try to develop it further and so on. If you like to watch me what I do and like to follow me up, you get my webpage here. It's also a diary. It's also a blog you can have a look at and also if you need to send me an email, you have here my email address here. Actually, the entire talk here will be available as PDF. So it's a lot of material, a lot of links over there. That means in that respect, it's more or less complete. I hope so. Okay. Now I'll switch a little bit to German as well. Let's see what we can do about that. So what I'd like to tell you today is not about the technical measures that the NSA is taking to break the crypto key and how they organize their whole programs, but how the internal process of the NSA actually looks like. At the moment, the topic is a little bit hot again. There was a discussion here about this, well, Trojano or the attacks that were made against the Bundestag. It's about the question of advanced data storage. I have to say, this lecture here is about half a year old. So I kept it as a lecture at my high school and cut it a bit here. So I'll talk a little bit more about it in the next few minutes. So what I want to clarify is actually how the organization of the NSA is actually built up for the first time. The NSA is a secret organization. You don't really know much about it. What you know, I've put together a few years ago, especially also a few events that brought the constant. And also the Andy Müller-Mokun has presented it. I've put it together here so that you have a good overview. I want to briefly go into the corresponding legal basis of surveillance. That will often be forgotten. Here we have the impression that the NSA is actually a crypto company that operates practically in secret. In fact, of course, it is also available in the Americans. Very clear basis on which it is based. What they can do, what they can do, what they shouldn't actually do. Even if they are broken. But that is also a point that we should discuss here. Then I would like to briefly introduce that it is also very interesting what the portfolio is, as we say so beautifully, the corresponding operation of the NSA. That means, what do they have in Petto? What can I get from them if I can take their service in demand? And we also have the same in the Federal Republic at the time. The big question is, what does the BND have to do with the NSA? What have they demanded? So I would like to put that a little bit here. Also that you know how it works in principle, what you can basically book. We will see at the end of the talk. The NSA is actually a kind of service provider. Service provider for information, as you can imagine. And how the processes run. So that is the opposite of my little lecture today. So of course, it is also in the direction of selectors, tracking, targeting. What we also recognize today, there was again great excitement today in the Bundestag or this week in the Bundestag, what these selectors are dealing with. Yes, you can actually relax a little bit if you know what it is about. And yes, how can you possibly be against it so far? Then I would like to go to the end and know a few processes. In fact, the NSA is basically a semi-military organization, you can say. And so ultimately, it has to share its target numbers with the president. That means it has to say what it has done, how far it was successful. Yes, and how successful it was, we will still see. Good, first point here, the tasks. Yes, you will find a few keywords about the NSA in principle in Wikipedia. Let's put it up again in April. Yes, the fact is that the NSA is actually a part of a large secret service for the American, the US American. That includes the Defense Intelligence Agency, that includes the CIA. There are other parts of it that meet the military as far as possible. And the whole thing is actually coordinated, they are assembled from the Director of National Intelligence, the OTNI. And the boss of that is now also known, that's James Clapper. Well, Fever says that the guy is lying publicly. Yes, he is known. And yes, what the NSA is doing, so in this whole area, I already set up the news services. As with us, the BND is actually responsible for the foreign clearing. If you look at it and research a little, what are the numbers that are in the background, you first have to look at what the budget is. And the budget of this service, in total, is printed at least in 2013. Of course, there are all the export points with it, so in the area of ​​50 billion dollars to 80 billion dollars. I think today we are at the largest order that is given, only for intelligence services. To estimate the 100 billion dollars, you can well say that it is well given for the Americans, yes. I have named a few target numbers there. So, as I said, the goal of the NSA is here, the expansion of electronic devices, the discovery of complete means here, but also the sabotage of it, and any kind of subversive action, at least in terms of the technical part. Yes, the assignment has been on for a few years and then in 2001, the parents of our generation still remember it a little bit, 9-Eleven. So I like to call it Pearl Harbor, in principle, the CIA. All these programs, or a large program with which we still come to talk, or on which I still come to talk, they already existed, in principle. Yes, you don't have to do anything about it, but of course you saw with the fall of the Wolltengratzer and the impact it has given, the whole information strategy that the NSA has experienced, it was also useless. That means, in fact, it could have prevented it, despite all the restrictions that have been made. And that actually led to the fact that, as was said by the American government, okay, we basically have to set up the NSA and the entire infrastructure that is in the USA, in the end. That means the whole program, that means the activities of the NSA and the CIA were set up again. There was a common center, that was called the Cyber Command, which is in the discussion today, and a connection was set up with the most feared business partners, the so-called Five Eyes, with which one intelligence and intelligence services had basically been divided, had then been operated together so far. So that was the idea. Of course, there was also the founding of the Homeland Security. That was all part of it. So the world before and afterwards is quite different, you could say. Let's take a look at the NSA. The NSA is, as I said, the character in which you look at your leadership structure so far. There is a chief of central security services and a command of the United States Cyber Command. When you look at the websites, I have a few linked, then it's always quite strange. Because there is so much patriotism in it, how great it is, the morale of the troops, the ethics that come to bear it, often co-operates on the websites. But internally, you don't get much, you can say. And the whole thing is summarized as a humanitarian organization. And there is this wonderful sentence on the website, to find the central security services provides timely and accurate cryptologic support, knowledge and assistance to the military cryptologic community. So here, too, the close-up of the game between the intelligence services, which are actually a state task, ultimately, and the military defense apparatus that the USA has. Yes, and now we come to a exciting point, that is, how is the NSA built up? You can imagine that the NSA, in principle, is built up in several main departments. And these main departments are under different driving departments. Some of these main departments I have a pen here, to get my laser friends out of here so far. Laser sword here, yes. There are the special collection services, yes, SCS. You know them, that's what people do, especially those who have heard the phone from Merkel. Yes, that's what the CIA is doing together. And of course, these are not only locations that are to be found in the USA, but also locations that are of course worldwide related. We'll see that in a moment. Then there is the cryptologic intelligence unit. These are the ones who try to break the code, so they are active there, so to find out the RSA key, what all comes so far. And then there is the own department S, which stands for Signals or Signals Intelligence. And that ensures that we get the data. So also digital data will be historically seen as signals, even though it is actually something else so far. Then there is the department S, Legal Interception. Who knows what that is? Legal Interception here. Yes. Hello, I also assume that these are the... There is not the NSA on the phones and the internet provider and says, Hello, please send the data out. We are allowed to do that. There is a good discontent, and everything you need to do on the internet is allowed to be applied. There are locations that can be applied from outside, within the framework of legal action, you can say, or the law giver says, do it. What the NSA normally does, that's all grandestine, so to speak, but they also deal with it so far. I have also been asked with my software, do you not do my interface, that you can download the emails there? Then I could be even more successful in dealing with it so far. Good. Then there is the department S1. It is also very exciting, is Customer Relations. What are the customers of the NSA? We will see in a moment, exciting opportunity. And then there is the department S2. There is the analysis and production center for special countries. There is really the clarification in special countries, for example, here, Foreign Intelligence, so what is done together with the CIA, so here, the messages here, or what do you call it in Darmstadt, the complex there, the Decker complex, what we have everything with it. And then there is the data acquisition with the various environmental departments. I don't want to break it all up now, but these are the department departments that ultimately carry out the individual programs, the individual projects and prepare the technology. We will talk about it later. So the department departments actually prepare the corresponding services, which build up the technical possibilities and provide them as far as possible. Yes, the whole thing is, as I said, distributed here on the whole of the USA. That means we have now, besides the NSA, many others who are connected to this cyber command. But there is only that since 9-11-2001. So we have here at the top the US government, of course. Then there is the Department of Justice, which belongs to it. Under their control, the famous FISA courts, so these half-state, half-officials, or in the hidden days, justice courts, yes, similar to the case with TTIP in the future, and we have the corresponding organizations down here in the suburb, the CIA, the NSA, so that's the, that's the FBI, of course, and interestingly, the Drug Enforcement Administration, so it's all about drug smuggling or drug abuse. So that's basically the high-level organization of the whole USA, which is dealing with the secrets and their activities. All the best to you. Known is the NSA, because it absorbs data, and that's a nice picture of it. So you can see how the Internet connections, the glass connections are built up in the USA and how the secret services, especially the NSA, attack it. They have their headquarters in Maryland. On the one hand, this is the complex here and the U.T.A., which should be rebuilt. We also know that in principle, capacity-wise, the next 10 years and the next 10 years to serve the entire Internet traffic, actually completely mirror and lift up. Yes, that's where the capacities are present here. And the NSA just absorbs the glass cable, so in the direction of Pacific, in the direction of Atlantic, which is now also well known. Yes, a little bit of Star Trek comes in there, of course, yes, it's also well sold. So you have to consider that many activities that you see, they just come out of their fiction genre. When I look at something with my son up and down, I also look at the NSA. What's the name of it? This one TV series? Yes? We see something like that. Yes? Exactly. That's what it is. Yes. There are sometimes terms out there, terms and terms out there, in principle. They really give me the feeling that there are advisers for the NSA to have the whole thing strung together. And so on, it's a reality. So that's the point in their corresponding context. Well, I think we can briefly summarize the main part here. Of course, we have the Constitution of the USA that has been included so far. Yes. But then there is the Foreign Intelligence Surveillance Act from 1978. Yes, there are already these FISA legislation made. I have heard today at the request that yes, the BND also has to be set up on a real constitutional basis. This is back then with the NSA at the NSA and Jimi Carter. There was of course the Patrick Act from George W. Bush and now it's about the fact that the whole technology has been built up. What you also know now is that there is another lawful means. These are the so-called national security letters. This is an invitation that you get as a customer of such a small internet platform and you have to pass the company by Lava Bit where it has run its email. And it's interesting, you can't talk about it in the public that you have such a national security letter here. There is a turn that you also get. So it's completely secret what's going on there. Yes, in this Patrick Act there are different sections. Yes, there are FISA requests as I already say here. The NSA and the whole development here runs after certain processes. The question is who is the process trigger who is the process owner so far. Yes, there are six seven and two. There is about the metadata collection. So there are different programs. So in principle it is all that the NSA does or what they have I have already mentioned the court reports. Yes, there are these secret reports that decide what's going on there. So we know that actually the US Senate and the government are not right, they will share everything so far. This national security letter is very interesting if you look at the volume there is a statistic here a few years ago that was taken out from Wikipedia here. So it is information completely over the customer have to be with a higher attendance. So it's going until 2006. So there were around 12,000 letters that were sent each year. So be careful the whole thing here. What is still interesting is important to understand when you want to look at the NSA so a so-called lead or lead from Ronald Reagan his side was signed. Yes, the the other aspects as a Patriot Act and also what we have just seen that are the framework but here is basically what you have to do. So here it is especially because the the the the the the the the the the the the the the the the the the the data under the control of the U.S.A. That's what they practically internally as a guideline also have so far. That's what you have to think about. And above all, it's important. We had a discussion here in Germany a few weeks ago and months ago. In principle, it is so that the basic of the American constitution is basically only for the Americans, for yes citizens' money, the money is not for non-Americans and of course only for Aliens, the outside of America or the U.S.A. where we live so far. So NSA's slogan, know what but us, that is the understanding. Yes, very nice. Of course, this is relatively diametrically against our Western European understanding generally of data security and information security so far. We also have in Europe this Safe Harbor where we say that we are a security guarantee money for human rights. We know everything we have today what Facebook is, what Amazon is where they have to host their data how it is with cloud applications so that they can be set up here in Europe because otherwise they are, as we have seen in the framework of national security letters always comparable to Americans and relatively or you can do actually do nothing outside so certain cryptographic experiences that in fact have no data at all. Good. Let's take a look at the NSA programs. We have seen enough about the whole history with the legal prerequisites. Let's take a look at it. I once made a little screenshot of a constant art that, as you say, and she also researched what are the goals of the NSA for Germany, the Bundesrepublik Germany. These are cyberattacks against espionage to get out of strategic technologies here in Germany. What does Germany do with its corresponding weapons exports? How do they go before? How are these how are these monitored? What are the tasks in principle of the foreign ministry here? What does it look like in Germany with its financial and economic stability that we will get out of it? So these are the goals that are practically the object of the the NSA surveillance for Germany. So a sustainable service I think the foreign ministry would be able to understand what the Americans believe what is important for Germany. I don't think it's important. What do we have for NASA programs? For NSA programs? Not NSA programs. You just have to know that the NSA programs develop as a portfolio. That means you can ultimately book them. That means we have an offer outside a bouquet of measures of espionage, sabotage measures and the whole thing is organized in programs. And the programs are trained according to the technical requirements such as telephone numbers, e-mail surveillance, websites, etc. etc. and all these mechanisms are activated by so-called activity designators. That means they can be pulled specifically. So we learn from it what we heard today about the selectors and what is discussed there. Which selectors are used? That's not interesting. The selectors only have an activity. When they are activated, they are the activators that we have. They are used. They can be applied to a person, to an institution, to the foreign ministry, for example, as you need them. That means they are taken the data, as long as you have them. And then the data is evaluated when the operation is completed and in principle, the report is ready. So that's the pre-emptive way. You can say very roughly the NSA is actually also a normal day-to-day business at the intelligence services. They do it all like that. That's not something that is unusual. That's maybe for one or the other pre-care or morally cumbersome, but that's the day-to-day business at the intelligence services. Let's take a look at how the whole thing has developed so far. There is also a nice foil here, at least in colour. So the whole intelligence that is located here, the intelligence services can be divided into different programs. I have already mentioned that the programs are located on the basis of a framework of the US government. In other words, there are a lot of drones around. The planes flew around earlier. They have cut off mobile radio traffic and so far so good. Under this program, there is also the disconnection here by Merkel's cell phone through an MC catcher or whatever. That's the distribution of F6. It belongs to the company. That's what we have now. Then there is the metadata. To do this, the US government is obligated to use the telephone company. That means who has called, when, how long etc. There is also the program content here. The program content belongs to the special source operations. Content can be the content that falls on the providers. To evaluate this, there is the prison program. Or the content that falls on the internet sites. For example, at glass water sources worldwide. So the corresponding data traffic is copied. And this program still finds city, of course. That means everything that the NSA can get on digital data via the public glass network of the internet they will be snorkeling without doing anything. We will see later how it works. That is the prison program. And of course there is the wonderful thing about sabotage. The Americans are also very proud of it. The program under which the city is called Olympic Games or Olympic Games leads to the fact that we have lost emails and can also compromise the websites. So we do more in-between attacks against HTTPS websites. And that is also very nice. That's what it's about. But of course also the manipulation of the end-end direction, with the help of Trojan, Stuxnet, what we have seen there, against the Siemens systems, for example, and the Iran program. Olympic Games. And what we have still taken into account is not too long ago, the whole search for Google the program here was called Serendipity. Google was pretty pissed off about it and since the last year they have been trying to destroy their internal data communication via the Google Nets. The other program is Webforer. That is why the corresponding goal is to hack the network, to compromise the end-nodes and so on. That's a short overview of the development of the USA program. You can basically say that this program Content here, the program 205 of the USA can actually be divided into non-program press. There has already been a few of them shared in the public. It is about getting the corresponding data on the web servers. We know that they have been complimented and used by the information sources Yahoo, AOL, Google, Microsoft, Apple, they are all in the process. That's what the National Security Letter is about. The other thing is that we are ultimately copying the data from the internet for example, but also by hacking the glass phasor. If we have no direct access to the internet nodes, we know that they have done that with the glass phasor routes that run through the Red Sea, for example. There is a special U-Boat, the Jimmy Carter, which is exactly for this purpose and is also used for that. And then there is the so-called sources TKU. Do you all know that? It's all about the sources TKU. That means it's going to be the original in principle. On the source here, through Sero de Trojano and also the Germans, quite well with BND, he plays in the same class. I don't think that the BND is working here at this point. He's just doing it here. That's why they are legally obligated. These special source operations, as I said, are a large part of the U.S. American companies. Of course, Facebook is also involved. As I said, they can be forced through letters, in principle, what happens there. There are the corresponding sub-programs for that. They are so multifaceted and there are all the corresponding secretive names here, Bryson, Marina, Mainway. I don't know them by themselves, but there is a lot of information on the Internet. If you want to have something to do with it, please email me. I can provide the material that I have put together, at least in peer-to-peer way. My PGPki is well-known, but it's all online later on. Let's take a look at how this works. This is a press program against providers like Yahoo and Google, for example. We also have a friendly organization, FBI and CIA, and then it's looked at the values of the mechanisms that the NSA offers. It's even suitable to evaluate the entire data traffic in the same way as it is needed. This is the top-secret prism-collection-dataflow that we know. As I said, the whole thing is not on a server on the Internet, but it also applies to the corresponding glass water lines on the Internet. All these lines that we have are at least when the endpoint is completed. The entire data traffic is duplicated and sent to UTA. There is also a corresponding communication line between the Americans, the NSA and the GCHQ, where the GCHQ is asked whether it can bring cryptographic services. It's not like it's being created from the world, but it's taking place every day. Yes, this special collection services is worldwide present. They have support points everywhere, of course in Frankfurt and Berlin, where they are located. Here is a small map and the whole thing is connected to these 5Is that play a role. That means you really try to research and record the entire data traffic worldwide. In a special case, there are tailored access operations. You can use them for a special use in need of corresponding services. There is also a nice tower inside here. I was inspired by that. It's both about espionage and observation and sabotage. That's also the secret, what has come so far. Let's take a look. In principle, the NSA is like in every business. Someone has to give it to someone and give it to someone else. There are nice examples, but I don't want to say them. For example, the white house would be the assignment giver. The assignment giver would be a friendly partner organisation, for example. That's how it works. There is a requirement. In principle, the NSA is like, we have this in our portfolio. Can we offer these services? Can we prepare these messages? There is a third point, the compensation. What is it? I can't tell you what you have to compensate for. The fact is, it's a big problem with the secret services, because they are in secret. It's not known. So, if I want to request the information, I have to bring it through the counter. It's a compromise against the assignment giver. Things like the data affairs or the betrayals. Some people have a lot of stuff to hide. That's the secret that it's a role to play. The goal is business and industry espionage, especially in foreign companies. There is strategic clarification. It's about preparing for uncomfortable persons, sabotage and manipulation of an animal. There is very little talk about counter-terrorism. If you look at it in detail, it looks a bit different. We have a customer who is making a request. There is a process to do business with the NSA. You have to see which program and technique can be used. We call it supply chain management to prepare the information. So, the selector will be selected. An operation will be created. The activity will be targeted against the country, the company and the person. The information will be collected as an artifact. It will be checked that the value chain of the NSA will be selected. The information we have here is relevant for the customer, the customer and only the information that comes through. That's the NSA process. It's generally set up by the NSA. I can book it, I can use it and prepare it. It looks like this. We have someone who asks for the information. It's the BND or something. It makes a request for the NSA. Then it is checked that the request is suitable for running operations. What is suitable in our portfolio for this operation? We have the information that will be activated by the selectors. The data will be taken and then filtered, verified and returned from the NSA. Of course, that happens against a contract X, dollar, X, euro or whatever happens. We have a responsible hemisphere and a leading hemisphere. That's the cleanest part. The Jews are selected if we can say that. In detail it looks a bit more complicated. We have the customer from the NSA. Usually, there is a liaison officer who says, that sounds reasonable to ask. He makes a request for the NSA. That's the Signals Intelligence Directory. The SID is the request for the NSA as far as possible. The request is changed to the Customer Relations operation. The request is then for the department that is responsible for the operational business. They do the tasking and make sure that the correct technical measures are taken as far as possible. That's what we have to use. That's the portfolio that the NSA has to offer. It's also a normal secret business. I don't think the BND is as complex as the NSA is. Then there is the case of 9-11. Something has changed. It was the case with 9-11 that the selection, the tasking was only done on-demand. Later we said, that's too little. We're making a null selector. That's what we saw. It's generally everything that can be snorkeled and laid out for a later analysis. What we saw was a strategy that took place when something happened that reacted. That's the case of the pro-active. We have a complete image. If the customer comes and asks a question, I can prepare an operation and there is a complete image of the internet data. I can research it and the idea is that the data is so big that you can go back 5 years and that's the point where the need has increased because he said that it's a useless or a suspicious pre-mortem storage or image of the whole story. So if I made a mistake two years ago, then it's in here and can be used to compromise. That would have been possible. Yes, there is a program for the filtering. It's also known. It's X-KeyScore. That means that the data is sealed. I can set the filter here. That's practical. It can search for email addresses, pre-mortems, time points and so on. It can extract the corresponding data. These are a few examples. You can't see that well. These are screen prints but you can download them as a PDF. The offer portfolio we'll go through briefly. All of these operations are small. They belong in the storage. I've already talked about it. The information on the source, etc. I'm with Felix von Leitner with an opinion that the USA can't break strong cryptography. What they do is that the errors and errors in cryptography can actually exist and try to use their corresponding approaches. That means that strong cryptography, especially Perfect Forward Secrecy is protected from it. What you can't protect is that the data can be collected via the National Security Letter. But the NSA is also used to modify standards so that they are comfortable to use. There were many discussions on the Internet about the connection between TLS in the frame of Fortetza or the new cryptographic elliptical curves. But I think that we can handle the cryptography quite well. What you want is this story here. The whole world is basically ethnographed by IT technology. We can look at certain countries and certain people and then we can target every person and see what they are doing. What we are discussing here and what is happening in the field. Do we still have time? Let's try it. I don't know how long you know that the NSA is already in Germany and is doing the earliest case that is documented and that I know because I can show you that there was a company in Germany called Ennecon in Germany that makes wind turbines and so on. They wanted to make it in the USA in 1998. So they hacked their e-mails and telephones and checked that Ennecon didn't come to the USA but a comfortable US company and that is documented. That is not known. There was an article about the espionage that was in 2009 in the climate crisis in Toronto that was also espionaged. Sabotage in 2010, Stux virus espionage in 2012 that was the whole surveillance of the Brazilian oil company Petro Press. There was a fair for what was used and last year the story with the CIA espionage that means the own US was filtered out in the USA. That is what it looks like with the programs that have implemented it so modular that these technology programs can be used quite simply so there is always such a number that shows the program and with the properties against which it is directed. P2 is Yahoo for example Sequential Query that can be done from this portfolio S is not included. Fixed 3-crab is here how to evaluate it that the selectors are here so these are the corresponding properties that we have learned there so far. When it came up with Google that the Google network should be disconnected here was the following situation that the internal network was unconnected that has changed Google and the internal communication in the Google Cloud is now also disconnected. What was tried before is that the communication between the normal Internet and between the Google Cloud which then leaves the interface or router leaves that you try to break the TLS connection and so far but that does not work in all cases Park. Do you know the last point the NSA is obligated like many other military organizations also have these success quotas to share with the US president they do that periodically once a week, once a month so there are activities so Obama knows exactly what is going on there I know from other sources look at it we have a TAO team in Texas so Taylor Access Operations team in Texas these numbers are usually not particularly noticeable there are a lot of people involved so there are 30 employees from the US Air Force that means you have to show what you have in principle so far. The next thing you have to share is what you have done the production operations for 2007-2008 is a relatively old number but you do not always get the newest Olympus Tickets who has that followed? All awake again Olympus Tickets, what is it? Olympus Tickets are lost mails are lost mails that are sent away and that was 10,000 of them what sharp focus and patch is there is no explanation what are FoxEssetMessages there is also an explanation these are spoofed websites that you have sent away and that means you have forged 12 or 17 different websites and on that you have seen 2,400 people 3,440 here and accordingly then came this return and exploited where you have used it to compromise was in this case 226 these are the measures whether you then use HTTP20 I can not say that is already my conclusion with the entire huge apparatus with the 100 billion dollars that are issued every year from the USA we have to ask ourselves what is the FoxQuote of the NSA Constanze Kunze here she has the news from the NSA with this number only modest contribution to the nation security is achieved so in principle the huge apparatus is hardly able to provide information there has been no instance in which NSA could say which confidence that the outcome of the terror investigation would have been any different in the short time before the Boston attack where the guy was now that was practically the report of the White House and that is the whole success balance we have and that is what stands against it we have in principle a really big sub-union of the entire internet structure we have this huge mix of compromise and on the other hand we have to realize that there is hardly any success today there are these actions in Germany with these pre-cops so that you have a statistical program to find out where there are any increases differences in some areas of Munich etc you also have to say that it is probably a self-fulfilling prophecy because of course you get to the point that more policemen will prevent it and the statistical significance lies here in general that was my little overview about what the NSA has to offer here so again the NSA is actually a more or less normal organization, we have customers we have programs, we have corresponding outcomes that we can get if we know how this thing works then we are much better equipped to protect ourselves from it so what I have tried to do with the knowledge I have is to take a little bit of fear from the NSA what it can do, what it wants these are of course restricted means they do not have all the possibilities to open up the code pressure as I said, the experts worked on a lot of cryptography and that is of course the biggest horror for the organization so what they had for a long time in order to learn it does not work, you have to have other possibilities then I say thank you and who has questions yes, thank you from our side yes, do you have any questions can we ask if there are any none? how much do you set the contract ready? no idea, I'm just a helper here so you don't have to yes then we can go the answer was from the audience that it will be on the website there are all the links there are also the materials I have tried to research substantially the whole topic here I think there is a lot of work yes, it is always the reverse engineering of secret services is of course effort but there is no other way because the corresponding organization does not voluntarily discredit their information so we have to do it from our side and I thank you for your help and for supporting us in the whole work that is a massive point for the public and for finding the right political direction if there are no questions then again thank you