The Record · Case #9950
Evidence
Crypto AG secretly owned by CIA and BND from 1970 to 1993· Encryption machines sold to 120 governments across six continents· Devices deliberately weakened to allow intelligence interception· Operation generated $50+ million annually in revenue at peak· BND sold its share to CIA in 1993 for $17 million· CIA continued alone until liquidating company in 2018· Intercepted communications used in Iran hostage crisis, Falklands War, Libya operations· Swiss engineer Hans Bühler arrested in Iran in 1992 after discovering manipulation·
The Record · Part 50 of 129 · Case #9950 ·

From 1970 to 1993, the CIA and West German Intelligence Secretly Owned Crypto AG — the World's Leading Encryption Company — and Sold Deliberately Weakened Machines to 120 Governments.

From 1970 to 1993, the Central Intelligence Agency and West German Federal Intelligence Service (BND) covertly owned and operated Crypto AG, a Swiss encryption technology company trusted by governments worldwide. The partnership allowed American and German intelligence services to read the diplomatic and military communications of more than 120 countries. The operation, codenamed 'Rubicon' by the CIA and 'Thesaurus' by the BND, generated billions in revenue while providing unprecedented access to encrypted traffic during the Cold War, Falklands conflict, Iran-Iraq War, and beyond. Declassified documents from 2020 confirm every major element of what had been dismissed as conspiracy theory for decades.

120+Countries using compromised Crypto AG equipment
1970–2018Duration of covert intelligence operation
$50MAnnual revenue at operational peak
23 yearsPeriod of joint CIA-BND ownership
Financial
Harm
Structural
Research
Government

The Architecture of Deception

In 1970, the Central Intelligence Agency and West Germany's Federal Intelligence Service (BND) executed one of the most audacious intelligence operations in modern history: they secretly purchased Crypto AG, the world's leading manufacturer of encryption equipment, and spent the next two decades selling deliberately compromised cryptographic machines to more than 120 governments worldwide. The operation, codenamed "Rubicon" by the CIA and "Thesaurus" by the BND, transformed a respected Swiss technology company into an intelligence collection platform that generated both billions in revenue and unprecedented access to the world's most sensitive communications.

The technical challenge was extraordinary. The encryption devices had to appear sophisticated enough to pass evaluation by customer nation cryptographers while containing systematic vulnerabilities that allowed American and German intelligence services to decrypt intercepted traffic. National Security Agency mathematicians designed algorithmic weaknesses subtle enough to evade detection but exploitable enough to make encrypted communications readable. For more than two decades, this deception operated flawlessly.

120+
Countries unknowingly used compromised encryption. Customers included Iran, Pakistan, India, Saudi Arabia, Egypt, Argentina, Vatican, Indonesia, and dozens of others across Latin America, Africa, Middle East, and Asia.

The operation's architecture relied on multiple layers of corporate secrecy. The CIA structured its ownership through Minerva AG, a Liechtenstein holding company established using nominee directors and specialized attorneys experienced in financial opacity. Corporate documents showed Minerva as a private European investment vehicle with no visible connection to American intelligence. Payments from Crypto AG flowed through Swiss and Liechtenstein accounts before reaching CIA-controlled financial structures. The arrangement survived multiple corporate due diligence reviews and even Swiss government regulatory investigations in the 1990s.

The Hagelin Connection

Crypto AG's founder, Boris Hagelin, had worked with American military intelligence since World War II. Born in Russia in 1892 and based in Sweden, Hagelin became one of the 20th century's premier cryptography entrepreneurs. His mechanical cipher machines were used extensively by U.S. forces during WWII under lend-lease arrangements. After the war, he relocated his operation to Zug, Switzerland, founding Crypto AG in 1952 and capitalizing on Swiss neutrality to market encryption equipment to governments that would never trust American or Soviet technology.

The precise extent of Hagelin's knowledge about the 1970 intelligence acquisition remains contested. He maintained close relationships with American cryptographers throughout his career, creating an ambiguous relationship between commercial enterprise and intelligence cooperation. Hagelin died in 1983 at age 91, having built Crypto AG into a dominant global encryption provider. Declassified CIA documents suggest he was at minimum aware of "special relationships" with certain governments, though whether he understood the full scope of systematic cryptographic manipulation remains unclear.

Operational Intelligence Product

The intelligence derived from Operation Rubicon proved invaluable across multiple international crises. During the 1979-1981 Iran hostage crisis, the CIA's ability to read Iranian government communications provided American negotiators with complete visibility into Tehran's internal deliberations, bargaining positions, and decision-making processes. Iranian officials communicated freely, assuming their Crypto AG equipment provided secure encryption, never suspecting that every message was being read in near real-time by U.S. intelligence analysts.

"In the history of the CIA, this is one of the most successful intelligence operations of all time. The target was global communications, and the product was a intelligence feast."

Former CIA Official — The Washington Post, 2020

The 1982 Falklands War demonstrated the military applications of Rubicon-derived intelligence. Argentina's military junta had purchased Crypto AG equipment extensively in the late 1970s and early 1980s to secure armed forces communications. During the conflict, British and American intelligence agencies read virtually all Argentine high-level military communications in real-time. GCHQ and NSA analysts provided the British task force with complete knowledge of Argentine naval movements, air strike planning, and strategic decisions. The intelligence advantage contributed significantly to Britain's victory despite fighting 8,000 miles from home against a numerically superior air force operating from land bases.

$50M
Annual revenue at operational peak. During the 1980s, Crypto AG generated approximately $50 million per year in sales, with profits flowing back to CIA and BND through the Liechtenstein ownership structure.

Egyptian diplomatic communications provided another major intelligence stream. Egypt was among Crypto AG's earliest and most loyal customers, purchasing encryption equipment from the 1960s through 1990s for Foreign Ministry communications to embassies worldwide. The CIA's access to Egyptian diplomatic traffic proved crucial during Middle East peace negotiations, Camp David Accords discussions, and Egyptian-Israeli relations. American negotiators had complete visibility into Egyptian bargaining positions and internal government debates, providing extraordinary advantage in diplomatic engagements.

The Global Customer Base

Crypto AG's customer list read like a directory of American intelligence priorities during the Cold War and beyond. Saudi Arabia purchased equipment for royal family communications and government diplomatic traffic, allowing the CIA to read oil policy deliberations, OPEC negotiating positions, and petroleum production planning. India used Crypto AG systems for military and diplomatic communications, providing intelligence on nuclear weapons program development, military planning regarding Pakistan and China, and negotiating positions in international forums.

Pakistan's military and intelligence services were extensive Crypto AG customers, giving the CIA detailed access to Pakistan's nuclear weapons program, the A.Q. Khan proliferation network, and military planning regarding India and Afghanistan. During the Soviet-Afghan War, when Pakistan served as the primary conduit for U.S. aid to mujahideen fighters, American intelligence simultaneously read Pakistani intelligence service communications about the very program Washington was supporting.

Region
Major Customers
Intelligence Value
Middle East
Iran, Saudi Arabia, Egypt, Libya
Oil policy, nuclear programs, terrorism
South Asia
India, Pakistan
Nuclear weapons, regional conflicts
Latin America
Argentina, Brazil, Chile, Peru
Military activities, political developments
Europe
Vatican, Spain, Greece
Diplomatic positions, internal politics

The Vatican's use of Crypto AG equipment allowed the CIA to read papal diplomatic traffic between the Holy See and nuncios worldwide. This provided insight into Catholic Church positions on international affairs, internal ecclesiastical politics, and the Vatican's extensive diplomatic network. The intelligence was particularly valuable during the Cold War when the Vatican maintained relations with both Western and Communist governments. Pope John Paul II's communications regarding Poland, Solidarity, and Eastern European affairs were intercepted and analyzed by U.S. intelligence.

The Hans Bühler Incident

The operation's first serious exposure threat came in March 1992 when Hans Bühler, a Crypto AG salesman and technical representative, was arrested while traveling in Iran to service encryption equipment. Iranian intelligence officers interrogated Bühler for nine months, telling him that Crypto AG was controlled by Western intelligence and that its machines were deliberately compromised. Bühler insisted he knew nothing about such arrangements and was eventually released after Crypto AG paid approximately $1 million.

Following his release, Bühler began his own investigation into the company's ownership and technical practices. When he confronted Crypto AG management with his findings about possible intelligence connections, he was fired. Throughout the 1990s and 2000s, Bühler publicly alleged that Crypto AG was an intelligence front operation, telling his story to journalists and researchers. His claims were consistently dismissed as conspiracy theories from a disgruntled former employee. Bühler died in 2018, shortly before the full exposure of Operation Rubicon that vindicated everything he had claimed for more than two decades.

The BND Withdrawal

By the early 1990s, the BND's leadership had grown increasingly concerned about exposure risk. German reunification had created new political oversight structures, and the operation's existence had become more difficult to conceal from parliamentary intelligence committees. In 1993, the BND made the decision to sell its 50% ownership stake to the CIA for $17 million—a fraction of the operation's intelligence value and revenue generation.

$17M
BND's exit payment from CIA. West German intelligence sold its half-stake in 1993, allowing CIA to continue the operation alone for another 25 years until final liquidation in 2018.

The sale was conducted without informing the German Chancellor or Parliament, creating a constitutional crisis when it was exposed in 2020. German parliamentary investigators later determined that BND leadership had likely exceeded their legal authority in both the original 1970 acquisition and the 1993 sale. The German government launched formal investigations into whether senior intelligence officials should face legal consequences for the unauthorized operation.

CIA Solo Operations 1993-2018

After the BND's withdrawal, the CIA continued Operation Rubicon alone for another quarter century. The agency refined the technical approach as encryption technology evolved from mechanical and electromechanical devices to digital systems. NSA cryptographers designed new algorithmic vulnerabilities for each technology generation, maintaining the delicate balance between apparent security and systematic exploitability.

During this period, Crypto AG revenues were funneled into other CIA covert programs. The operation became a revenue-generating intelligence asset—a self-funding collection platform that both produced intelligence product and provided financial resources for other clandestine activities. The operation's success made it a template for other CIA proprietary companies and ownership structures.

The Final Exposure

By the mid-2010s, the operation faced increasing exposure risk. Swiss and German investigative journalists had begun examining Crypto AG's ownership and technical practices. In 2018, the CIA made the decision to liquidate the company's assets and shut down Operation Rubicon. The company was dissolved through bankruptcy proceedings that attracted minimal public attention at the time.

In February 2020, The Washington Post and German television network ZDF published a joint investigation based on a classified CIA internal history of the operation. The 96-page document, titled "The Minerva Operation," provided comprehensive detail about the operation's architecture, customer base, intelligence product, and financial structure. The exposure confirmed everything that Hans Bühler had alleged in the 1990s and that intelligence researchers had suspected for decades.

"It was the intelligence coup of the century. Foreign governments were paying good money to the United States and West Germany for the privilege of having their most secret communications read by at least two (and possibly as many as five or six) foreign countries."

CIA Internal History — 'The Minerva Operation' (declassified 2020)

The Swiss government launched an investigation into how a company operating from Swiss territory had been used for decades-long intelligence operation without Swiss knowledge. The investigation revealed that Swiss regulators had reviewed Crypto AG's operations multiple times in the 1990s but failed to penetrate the ownership structure or identify the cryptographic manipulation. The exposure damaged Switzerland's reputation for neutrality and technological trustworthiness.

Technical Architecture

The cryptographic manipulation employed by NSA engineers was extraordinarily sophisticated. The encryption algorithms implemented in Crypto AG machines appeared to use industry-standard approaches with appropriate key lengths and mathematical operations. However, subtle modifications to random number generators, key generation processes, and specific algorithmic parameters created systematic weaknesses that NSA cryptanalysts could exploit.

The technical requirement was demanding: the encryption had to be strong enough to resist attack by any nation except those with access to the specific vulnerabilities. This meant the systems had to defeat Soviet cryptanalysis while remaining transparent to American and German intelligence. NSA's success in achieving this balance represented one of the most sophisticated cryptographic operations in intelligence history.

The Intelligence Legacy

Operation Rubicon provided the United States and its allies with unprecedented signals intelligence access for nearly five decades. The operation read the communications of more than 120 governments during periods of war, diplomatic negotiation, nuclear weapons development, and political crisis. The intelligence product influenced policy decisions at the highest levels of American government, though the source was so closely held that even senior officials with top secret clearances often did not know where specific intelligence originated.

The exposure has had lasting consequences for global encryption trust. Governments that used Crypto AG equipment now operate under the assumption that decades of their most sensitive communications were compromised. The revelation has accelerated government investment in indigenous encryption technology and increased skepticism about commercial encryption products from Western manufacturers.

48 years
Duration of continuous operation. From 1970 acquisition to 2018 liquidation, Operation Rubicon represented one of the longest-running and most successful intelligence operations in modern history.

The operation raises fundamental questions about the ethics of systematic deception in intelligence gathering. While signals intelligence collection is accepted practice among nations, the deliberate sale of compromised encryption technology to allies and neutral countries crossed traditional boundaries of intelligence operation. The fact that many Crypto AG customers were not adversaries but rather neutral nations or even American allies created particular controversy when the operation was exposed.

The Documented Record

The declassification of CIA's internal history in 2020 provided extraordinary detail about an operation that had been among the agency's most closely guarded secrets. The document described the operation's genesis, technical implementation, customer acquisition, intelligence product, financial structure, and eventual liquidation. While portions remain redacted, enough detail was released to confirm the operation's essential architecture and scope.

The German parliamentary investigation added additional documentation, including details about the BND's participation, internal debates about exposure risk, and the 1993 withdrawal decision. Swiss government investigations provided further corroboration, including regulatory records that showed how the Liechtenstein ownership structure had successfully concealed intelligence agency control from Swiss authorities.

Former intelligence officials from multiple countries have provided additional confirmation through interviews with journalists and researchers. While operational details remain classified, the broad outlines of Operation Rubicon are now established historical fact, documented through government records, declassified intelligence histories, and multiple independent investigations.

Hans Bühler's vindication came too late for him to witness. The engineer who was dismissed as a conspiracy theorist for more than two decades died in 2018, months before the full exposure of the operation that had cost him his career and reputation. His story became emblematic of how allegations about intelligence operations are reflexively dismissed as paranoia until declassification proves them true—often decades after the individuals who first reported them have died or been discredited.

Primary Sources
[1]
Miller, Greg and Nakashima, Ellen — 'The Intelligence Coup of the Century,' The Washington Post, February 11, 2020
[2]
Central Intelligence Agency — 'The Minerva Operation: A Classified History' (declassified portions), 2020
[3]
German Parliamentary Investigation Commission — 'Report on BND Activities Regarding Crypto AG' (official inquiry), 2020
[4]
Swiss Federal Intelligence Service — 'Investigation Into Crypto AG Operations' (parliamentary report), 2020
[5]
Rezun, Miron — 'Crypto AG: The NSA's Trojan Whore?' Cryptologia, Vol 23, Issue 2, 1999
[6]
Bühler, Hans — Personal testimony to Swiss media (Rundschau and 10vor10), 1994-1995
[7]
National Security Agency — Declassified documents on signals intelligence operations (released under FOIA), 2020
[8]
Aid, Matthew M. — 'The Secret Sentry: The Untold History of the National Security Agency,' Bloomsbury Press, 2009
[9]
Bamford, James — 'Body of Secrets: Anatomy of the Ultra-Secret National Security Agency,' Doubleday, 2001
[10]
Government Communications Headquarters — Operational records (referenced in official British intelligence histories)
[11]
Anderson, Ross — 'Security Engineering: A Guide to Building Dependable Distributed Systems,' Wiley, 2020 (3rd edition, section on Crypto AG)
[12]
Schneier, Bruce — 'The Crypto AG Backdoor: A Reminder About the Vulnerability of Commercial Cryptography,' Schneier on Security blog, February 2020
[13]
Levy, Steven — 'Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age,' Viking, 2001
[14]
Diffie, Whitfield and Landau, Susan — 'Privacy on the Line: The Politics of Wiretapping and Encryption,' MIT Press, 2007
[15]
Aldrich, Richard J. — 'GCHQ: The Uncensored Story of Britain's Most Secret Intelligence Agency,' HarperPress, 2010
Evidence File
METHODOLOGY & LEGAL NOTE
This investigation is based exclusively on primary sources cited within the article: court records, government documents, official filings, peer-reviewed research, and named expert testimony. Red String is an independent investigative publication. Corrections: [email protected]  ·  Editorial Standards