Cryptologic Quarterly Vol. 33

Total Page:16

File Type:pdf, Size:1020Kb

Cryptologic Quarterly Vol. 33 Cryptologic Quarterly 2014-012017-01 • Vol. • Vol. 33 36 CenterCenter for forCryptologic Cryptologic History History Cryptologic Quarterly Contacts. Please feel free to address questions or comments to Editor, CQ, at [email protected]. Disclaimer. All opinions expressed in Cryptologic PUBLISHER: Center for Cryptologic History Quarterly are those of the authors. Th ey do not neces- EXECUTIVE EDITOR: Pamela F. Murray sarily refl ect the offi cial views of the National Security MANAGING EDITOR: Laura Redcay Agency. ASSOCIATE EDITOR: Jennie Reinhardt Copies of Cryptologic Quarterly can be obtained by sending an email to [email protected]. Editorial Policy. Cryptologic Quarterly is the pro- fessional journal for the National Security Agency/ Central Security Service. Its mission is to advance knowledge of all aspects of cryptology by serving as a forum for issues related to cryptologic theory, doc- trine, operations, management, and history. Th e pri- mary audience for Cryptologic Quarterly is NSA/CSS professionals, but CQ is also distributed to personnel in other United States intelligence organizations as well as cleared personnel in other federal agencies and departments. Cryptologic Quarterly is published by the Center for Cryptologic History, NSA. Th e publication is de- signed as a working aid and is not subject to receipt, control, or accountability. Cover: Monument to Marian Rejewski in Bydgoszcz, Poland, with sculpture of the ENIGMA machine he reconstructed; see article on page 56. Cryptologic Quarterly, 2014-01 Contents 2014-01 • Volume 33 Articles Renaissance Cryptography, Occultism, and the Jewish Cabala by Erin Higgins ..........................................................................................2 The Dawn of American Communications Intelligence: The Spanish-American War and After by David A. Hatch ...................................................................................17 NSA’s Senior Technical Development Program Turns Twenty by Nancy Welker and Cathleen L. Civiello ...............................................30 Farmhouse Field Station Houlton, Maine: The U.S. Army’s First Fixed Field Site by Betsy Rohaly Smoot .............................................................................40 The Thought behind High-Level Cryptological Discovery, 1930–1945 by Peter W. Donovan ...............................................................................56 Contributors ..................................................................................... 72 Cryptologic Quarterly, 2014-01 Renaissance Cryptography, Occultism, and the Jewish Cabala Erin Higgins everal minor but cipher and an underpaid messenger. The early devel- historically interest- opers of Renaissance-era ciphers and codes were ing cipher systems focused in Italy but popped up throughout Europe: expounded upon by Leon Battista Alberti, inventor of the cipher wheel; Renaissance crypto- and Johannes Trithemius, who publicized and elabo- graphers have their rated on the wheel, and introduced steganography, origin in the Jew- for which he is most widely remembered. Then ish mystical system later, Bellaso developed mixed keying for polyalpha- Cabala. The link be- betic ciphers;1 Porta recommended layering ciphers Stween cryptography and Cabala is a book by Cornelius to prevent cryptanalysis, an art on which he wrote Agrippa, which reproduced and expounded upon sev- extensively; and Vigenère, the French diplomat and eral cabalistic systems of rearranging words. These sys- Cabalist, collated and expanded upon the works of tems were picked up and elaborated upon by the later these men and pioneered the concept of auto-key- cryptographers Giambattista della Porta and Blaise de ing, showing what was, by 1586,2 the state of the art Vigenère. We consider here the Tables of Ziruf, some- in cryptography. thing Agrippa learned from the Cabalists and which Our concern here is to establish the connection appear to be the ancestor of the Reciprocal Ciphers of among these men, the cryptographers, and Heinrich Giovan Battista Bellaso, Porta, and Vigenère. Cornelius Agrippa von Nettesheim (hereafter Agrip- Introduction pa), who is nearly exclusively remembered as a super- stitious magician and occasionally as an early modern During the Renaissance, manual cryptography, skeptic. The tremendous dissonance between these such as was used until very recently, was just begin- two labels should immediately rouse the suspicions of ning to flower. Particularly in Italy and the Papal the reader: what has he done that history can name states, with the advent of resident ambassadors and him equally superstitious and skeptical? An explana- what we would even now recognize as modern-style tion lies in Agrippa’s relationship with the cryptogra- diplomacy, powerful players recognized the need pher Trithemius, who, likewise, was widely regarded for communication more secure than a Caesar-shift as a magician, though we know differently today. 2 Cryptologic Quarterly, 2014-01 Up until 1996, Trithemius schol- arship was split into two camps: those who thought the books he wrote were strictly about cryptography, and those who thought that some of his writings dealt in magic. With Thomas Ernst’s and James Reeds’ 3 independent solutions of the remaining ciphers in Book III of Steg- anographia, history knows Trithemius as strictly a cryptographer, who used magical- sounding verbiage only as cover text. Agrippa entered the story in 1509, shortly after the Benedictine monk Trithemius had left his first abbey in Sponheim, Germany, having been ordered to Wurzburg. Agrippa had Heinrich Cornelius Agrippa von Nettesheim (Wikimedia) read something of Trithemius’ work— though only in manuscript, since Steg- anographia was not published until sonal letter he sent with it referenced their meeting nearly a century later, and Polygraphia, Trithemius’s and discussions of Cabala and magic. Trithemius is overt book of ciphers, was not yet written. Agrippa, said to have detained the messenger so he could read returning from what seems to have been a diplomat- the manuscript immediately and compose a response ic mission on behalf of the Holy Roman Emperor,4 that very hour. The reply letter, which Agrippa later stopped by the abbey at Wurzburg. Our record of had printed along with his letter to Trithemius as a the meeting is a pair of letters the men exchanged sort of preface to De Occulta Philosophia Libri Tres, afterward. In early 1510, Agrippa sent Trithemius a praises Agrippa’s accomplishment this far, urging manuscript of a book he had been writing; the per- him to continue, but with caution.5 3 3 Cryptologic Quarterly, 2014-01 Trithemius, in writing Steganographia, evi- Background on Ciphers dently thought it the height of cleverness to com- and Cabala pose a book of ciphers disguised as magic, and was Cabala is probably unfamiliar to most readers; shocked when there was outcry against it and he there is room here only for explanation of the ele- was called “magician.”6 Agrippa, soon after, sent ments which pertain to Agrippa and cryptography. him this manuscript which was full of what schol- An important book in traditional Jewish cabalism13 ars of the time called “natural magic”—a sort of is the Sefer Yetzirah. It had circulated in one of four bastard mix of early science, late superstition, and manuscript versions for generations,14 though it was folk medicine. There was nothing obviously iden- not translated into Latin before Agrippa’s death.15 The tifiable as ciphers or cipher text in the initial draft; book, the name of which translates as “The Book of if there are ciphers, they are more cleverly hidden Formation” or “The Book of Creation,” poetically than in Steganographia. describes the creation of the universe as an analogy to Agrippa could be highly rationalist, especially in the creation of the Hebrew alphabet. his later years. While the publication of De Occulta The Sefer Yetzirah is the source of a system Philosophia is his most remembered bit of civil disobe- literally ,צירוף) ”of cipher alphabets, called “Ziruf dience today, at the time he landed himself in worse “refinement”) by Johannes Reuchlin,16 Agrippa,17 trouble for a book he published several years earlier, and Vigenère,18 but called “the 231 gates” by Aryeh in 1530: De incertitudine et vanitate scientiarum atque Kaplan in his commentary to the Sefer Yetzirah. There artium declamatio invectivo.7 This book, an example are no Ziruf in the Sefer Yetzirah itself; they originated of Pyrrhonic skepticism similar to that which Des- probably in early medieval and Renaissance commen- cartes would espouse a few years later, attacks all the ”,or “change ,(תמורח) taries.19 This system of Temurah arts and sciences. In it—and in a section of the book is itself the source for the famous AThBaSh and reprinted and included as an epilogue in Occulta Phi- ALBaM biblical ciphers.20 losophia three years later—Agrippa appears to recant his early magical experimentations as the foolishness Traditional Cabala concerns itself, in addi- of youth, accounting for nothing.8 In De Vanitate,9 tion to the Temurah, with other letter and word after he is finished declaiming magic, sorcery, and his manipulations. Gematria is the practice of equat- own De Occulta Philosophia, he goes on to forswear ing words on the basis of the numeric value of their mathematics, astronomy and astrology, chemistry letters.21 Notarikon is shorthand, acrostic, or initial- and alchemy, painting, printing, the monastic sys- ism: a new word is formed from the initial,
Recommended publications
  • Secure Transmission of Data Using Rabbit Algorithm
    International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 05 | May -2017 www.irjet.net p-ISSN: 2395-0072 Secure Transmission of Data using Rabbit Algorithm Shweta S Tadkal1, Mahalinga V Mandi2 1 M. Tech Student , Department of Electronics & Communication Engineering, Dr. Ambedkar institute of Technology,Bengaluru-560056 2 Associate Professor, Department of Electronics & Communication Engineering, Dr. Ambedkar institute of Technology,Bengaluru-560056 ---------------------------------------------------------------------***----------------------------------------------------------------- Abstract— This paper presents the design and simulation of secure transmission of data using rabbit algorithm. The rabbit algorithm is a stream cipher algorithm. Stream ciphers are an important class of symmetric encryption algorithm, which uses the same secret key to encrypt and decrypt the data and has been designed for high performance in software implementation. The data or the plain text in our proposed model is the binary data which is encrypted using the keys generated by the rabbit algorithm. The rabbit algorithm is implemented and the language used to write the code is Verilog and then is simulated using Modelsim6.4a. The software tool used is Xilinx ISE Design Suit 14.7. Keywords—Cryptography, Stream ciphers, Rabbit algorithm 1. INTRODUCTION In today’s world most of the communications done using electronic media. Data security plays a vitalkrole in such communication. Hence there is a need to predict data from malicious attacks. This is achieved by cryptography. Cryptographydis the science of secretscodes, enabling the confidentiality of communication through an in secure channel. It protectssagainstbunauthorizedapartiesoby preventing unauthorized alterationhof use. Several encrypting algorithms have been built to deal with data security attacks.
    [Show full text]
  • How I Learned to Stop Worrying and Love the Bombe: Machine Research and Development and Bletchley Park
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CURVE/open How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park Smith, C Author post-print (accepted) deposited by Coventry University’s Repository Original citation & hyperlink: Smith, C 2014, 'How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park' History of Science, vol 52, no. 2, pp. 200-222 https://dx.doi.org/10.1177/0073275314529861 DOI 10.1177/0073275314529861 ISSN 0073-2753 ESSN 1753-8564 Publisher: Sage Publications Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders. This document is the author’s post-print version, incorporating any revisions agreed during the peer-review process. Some differences between the published version and this version may remain and you are advised to consult the published version if you wish to cite from it. Mechanising the Information War – Machine Research and Development and Bletchley Park Christopher Smith Abstract The Bombe machine was a key device in the cryptanalysis of the ciphers created by the machine system widely employed by the Axis powers during the Second World War – Enigma.
    [Show full text]
  • The NAMTA Journal
    The NAMTA Journal Back To The Future Volume 45. Number 1 May 2021 Molly OʼShaughnessy Jacqui Miller Kimberlee Belcher-Badal Ph.D. Robyn MilosGregory MacDonald Jennifer ShieldsJacquie Maughan Lena WikramaratneAudrey Sillick Gerard Leonard Kathleen Allen Jim RobbinsDeborah Bricker Dr. Maria Montessori Mario M. Montessori A.M. Joosten Mary Black Verschuur Ph.D. John McNamara David Kahn TABLE OF CONTENTS BACK TO THE FUTURE:WHY MONTESSORI STILL MATTERS …………..………….…….7 Molly O’Shaughnessy THE RETURN TO SCIENTIFIC PEDAGOGY: EMBRACING OUR ROOTS AND RESPONSIBILITIES……………………………………………………………………….33 Jacqui Miller and Kimberlee Belcher-Badal Ph.D. IN REMEMBRANCE………………………………..……………..……………………...53 Deborah Bricker TRIBUTE TO ANNETTE HAINES…………………..……………..……………………....56 Robyn Milos TRIBUTE TO KAY BAKER………………………..……………..…………………….... 59 Gregory MacDonald TRIBUTE TO JOEN BETTMANN………………..………………..………………………..62 Jennifer Shields GUIDED BY NATURE…………….…………..………….……..………………………..66 Jacquie Maughan THE CHILD IN THE WORLD OF NATURE…….………..…………………………..69 Lena Wikramaratne SOWING THE SEEDS OF SCIENCE:OUR GIFT TO THE FUTURE…………………...78 Audrey Sillick EXPERIENCES IN NATURE:RESOLUTE SECOND-PLANE DIRECTIONS……….……...88 TOWARD ERDKINDER Gerard Leonard and Kathleen Allen 2 The NAMTA Journal • Vol. 44, No. 1 • Winter 2020 ECOPSYCHOLOGY:HOW IMMERSION IN NATURE AFFECTS YOUR HEALTH……….107 TOWARD ERDKINDER Jim Robbins SILENCE AND LISTENING ……………………..………………...……..………….…….115 Gerard Leonard ABOUT THE IMPORTANCE AND THE NATURE OF THE SILENCE GAME…………………………………..………………...………………….. 117
    [Show full text]
  • Breaking Crypto Without Keys: Analyzing Data in Web Applications Chris Eng
    Breaking Crypto Without Keys: Analyzing Data in Web Applications Chris Eng 1 Introduction – Chris Eng _ Director of Security Services, Veracode _ Former occupations . 2000-2006: Senior Consulting Services Technical Lead with Symantec Professional Services (@stake up until October 2004) . 1998-2000: US Department of Defense _ Primary areas of expertise . Web Application Penetration Testing . Network Penetration Testing . Product (COTS) Penetration Testing . Exploit Development (well, a long time ago...) _ Lead developer for @stake’s now-extinct WebProxy tool 2 Assumptions _ This talk is aimed primarily at penetration testers but should also be useful for developers to understand how your application might be vulnerable _ Assumes basic understanding of cryptographic terms but requires no understanding of the underlying math, etc. 3 Agenda 1 Problem Statement 2 Crypto Refresher 3 Analysis Techniques 4 Case Studies 5 Q & A 4 Problem Statement 5 Problem Statement _ What do you do when you encounter unknown data in web applications? . Cookies . Hidden fields . GET/POST parameters _ How can you tell if something is encrypted or trivially encoded? _ How much do I really have to know about cryptography in order to exploit implementation weaknesses? 6 Goals _ Understand some basic techniques for analyzing and breaking down unknown data _ Understand and recognize characteristics of bad crypto implementations _ Apply techniques to real-world penetration tests 7 Crypto Refresher 8 Types of Ciphers _ Block Cipher . Operates on fixed-length groups of bits, called blocks . Block sizes vary depending on the algorithm (most algorithms support several different block sizes) . Several different modes of operation for encrypting messages longer than the basic block size .
    [Show full text]
  • NSA's Efforts to Secure Private-Sector Telecommunications Infrastructure
    Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail ac- counts and stealing intellectual property,1 the company turned to the National Security Agency (NSA) for help in securing its systems. For a company that had faced accusations of violating user privacy, to ask for help from the agency that had been wiretapping Americans without warrants appeared decidedly odd, and Google came under a great deal of criticism. Google had approached a number of federal agencies for help on its problem; press reports focused on the company’s approach to the NSA. Google’s was the sensible approach. Not only was NSA the sole government agency with the necessary expertise to aid the company after its systems had been exploited, it was also the right agency to be doing so. That seems especially ironic in light of the recent revelations by Edward Snowden over the extent of NSA surveillance, including, apparently, Google inter-data-center communications.2 The NSA has always had two functions: the well-known one of signals intelligence, known in the trade as SIGINT, and the lesser known one of communications security or COMSEC. The former became the subject of novels, histories of the agency, and legend. The latter has garnered much less attention. One example of the myriad one could pick is David Kahn’s seminal book on cryptography, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet.3 It devotes fifty pages to NSA and SIGINT and only ten pages to NSA and COMSEC.
    [Show full text]
  • Key Differentiation Attacks on Stream Ciphers
    Key differentiation attacks on stream ciphers Abstract In this paper the applicability of differential cryptanalytic tool to stream ciphers is elaborated using the algebraic representation similar to early Shannon’s postulates regarding the concept of confusion. In 2007, Biham and Dunkelman [3] have formally introduced the concept of differential cryptanalysis in stream ciphers by addressing the three different scenarios of interest. Here we mainly consider the first scenario where the key difference and/or IV difference influence the internal state of the cipher (∆key, ∆IV ) → ∆S. We then show that under certain circumstances a chosen IV attack may be transformed in the key chosen attack. That is, whenever at some stage of the key/IV setup algorithm (KSA) we may identify linear relations between some subset of key and IV bits, and these key variables only appear through these linear relations, then using the differentiation of internal state variables (through chosen IV scenario of attack) we are able to eliminate the presence of corresponding key variables. The method leads to an attack whose complexity is beyond the exhaustive search, whenever the cipher admits exact algebraic description of internal state variables and the keystream computation is not complex. A successful application is especially noted in the context of stream ciphers whose keystream bits evolve relatively slow as a function of secret state bits. A modification of the attack can be applied to the TRIVIUM stream cipher [8], in this case 12 linear relations could be identified but at the same time the same 12 key variables appear in another part of state register.
    [Show full text]
  • THE-POLISH-TRACE-Ebook.Pdf
    8 THE POLISH TRACE COMPOSED FROM COMMONLY AVAILABLE SOURCES BY LECH POLKOWSKI FOR IJCRS2017 FOREWORD It is a desire of many participants of conferences to learn as much as possible about the history and culture of he visited country and place and organizers try to satisfy this desire by providing excursions into attractive places and sites. IJCRS2017 also tries to take participants to historic sites of Warmia and Mazury and to show elements of local culture. As an innovation, we propose a booklet showing some achievements of Polish scientists and cryptographers, no doubt many of them are known universally, but some probably not. What bounds all personages described here is that they all suffered due to world wars, th efirst and the second. These wars ruined their homes, made them refugees and exiles, destroyed their archives and libraries, they lost many colleagues, friends and students but were lucky enough to save lives and in some cases to begin the career overseas. We begin with the person of Jan Czochralski, world famous metallurgist, discoverer of the technique of producing metal monocrystals `the Czochralski methode’ and inventor of duraluminum and the `bahnalloy’ who started his career and obtained its heights in Germany, later returned to Poland, became a professor at the Warsaw Polytechnical, played an important role in cultural life of Warsaw, lived in Warsaw through the second world war and the Warsaw Uprising of August-September 1944 and after the war was accused of cooperating ith occupying German forces and though judged innocent was literally erased from the public life and any information about him obliterated.
    [Show full text]
  • Comparison of 256-Bit Stream Ciphers DJ Bernstein Thanks To
    Comparison of Cipher implementations 256-bit stream ciphers from cipher authors D. J. Bernstein Timing tools Thanks to: (De Canni`ere) University of Illinois at Chicago Denmark Technical University Timings Alfred P. Sloan Foundation on various machines Graphing tools (Bernstein) Speed graphs in this talk Comparison of Cipher implementations Security disasters 256-bit stream ciphers from cipher authors Attack claimed on YAMB: “258.” D. J. Bernstein 72 Timing tools Attack claimed on Py: “2 .” Thanks to: (De Canni`ere) Presumably also Py6. University of Illinois at Chicago Attack claimed on SOSEMANUK: Denmark Technical University Timings “2226.” Alfred P. Sloan Foundation on various machines Is there any dispute Graphing tools about these attacks? (Bernstein) If not: Reject YAMB etc. as competition for 256-bit AES. Speed graphs in this talk Cipher implementations Security disasters from cipher authors Attack claimed on YAMB: “258.” 72 Timing tools Attack claimed on Py: “2 .” (De Canni`ere) Presumably also Py6. Attack claimed on SOSEMANUK: Timings “2226.” on various machines Is there any dispute Graphing tools about these attacks? (Bernstein) If not: Reject YAMB etc. as competition for 256-bit AES. Speed graphs in this talk Cipher implementations Security disasters Speed disasters from cipher authors Attack claimed on YAMB: “258.” FUBUKI is slower than AES 72 in all of these benchmarks. Timing tools Attack claimed on Py: “2 .” Any hope of faster FUBUKI? (De Canni`ere) Presumably also Py6. If not: Reject FUBUKI. Attack claimed on SOSEMANUK: VEST is extremely slow Timings “2226.” on various machines in all of these benchmarks. Is there any dispute On the other hand, Graphing tools about these attacks? VEST is claimed to be (Bernstein) If not: Reject YAMB etc.
    [Show full text]
  • Fish-Stream Identification Guidebook
    of BRITISH COLUMBIA Fish-stream Identification Guidebook Second edition Version 2.1 August 1998 BC Environment Fish-stream Identification Guidebook of BRITISH COLUMBIA Fish-stream Identification Guidebook Second edition Version 2.1 August 1998 Authority Forest Practices Code of British Columbia Act Operational Planning Regulation Canadian Cataloguing in Publication Data Main entry under title: Fish-stream identification guidebook. – 2nd ed. (Forest practices code of British Columbia) ISBN 0-7726-3664-8 1. Fishes – Habitat – British Columbia. 2. River surveys – British Columbia. 3. Forest management – British Columbia. 4. Riparian forests – British Columbia – Management. I. British Columbia. Ministry of Forests. SH177.L63F58 1998 634.9 C98-960250-8 Fish-stream Identification Guidebook Preface This guidebook has been prepared to help forest resource managers plan, prescribe and implement sound forest practices that comply with the Forest Practices Code. Guidebooks are one of the four components of the Forest Practices Code. The others are the Forest Practices Code of British Columbia Act, the regulations, and the standards. The Forest Practices Code of British Columbia Act is the legislative umbrella authorizing the Code’s other components. It enables the Code, establishes mandatory requirements for planning and forest practices, sets enforcement and penalty provisions, and specifies administrative arrangements. The regulations lay out the forest practices that apply province-wide. The chief forester may establish standards, where required, to expand on a regulation. Both regulations and standards are mandatory requirements under the Code. Forest Practices Code guidebooks have been developed to support the regulations, however, only those portions of guidebooks cited in regulation are part of the legislation.
    [Show full text]
  • I,St=-Rn Endorsedb~ Chief, Policy, Information, Performance, and Exports
    NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY 2-4 Issue Date: IO May 20 I 9 Revised: HANDLING OF REQUESTS FOR RELEASE OF U.S. IDENTITIES PURPOSE AND SCOPE This policy, developed in consultation with the Director of National Intelligence (DNI), the Attorney General, and the Secretary of Defense, implements Intelligence Community Policy Guidance I 07 .1 , "Requests for Identities of U.S. Persons in Disseminated Intelligence Reports" (Reference a), and prescribes the policy, procedures, and responsibilities for responding to a requesting entity, other than NSA/CSS, for post-publication release and dissemination of masked US person idenlity information in disseminated serialized NSA/CSS reporting. This policy applies exclusively to requests from a requesting entity, other than NSA/CSS, for post-publication release and dissemination of nonpublic US person identity information that was masked in a disseminated serialized NSA/CSS report. This policy does not apply in circumstances where a U.S. person has consented to the dissemination of communications to, from, or about the U.S. person. This policy applies to all NSA/CSS personnel and to all U.S. Cryptologic System Government personnel performing an NSA/CSS mission. \ This policy does not affect any minimization procedures established pursuant to the Foreign Intelligence Surveillance Act of 1978 (Reference b), Executive Order 12333 (Reference £), or other provisions of law. This policy does not affect the requirements established in Annex A, "Dissemination of Congressional Identity Information," of Intelligence Community Directive 112, "Congressional Notification" (Reference d). ~A General, U.S. Army Director, NSA/Chief, CSS i,st=-rn Endorsedb~ Chief, Policy, Information, Performance, and Exports NSA/CSS Policy 2-4 is approved for public release.
    [Show full text]
  • The Crossing of Heaven
    The Crossing of Heaven Memoirs of a Mathematician Bearbeitet von Karl Gustafson, Ioannis Antoniou 1. Auflage 2012. Buch. xvi, 176 S. Hardcover ISBN 978 3 642 22557 4 Format (B x L): 15,5 x 23,5 cm Gewicht: 456 g Weitere Fachgebiete > Mathematik > Numerik und Wissenschaftliches Rechnen > Angewandte Mathematik, Mathematische Modelle Zu Inhaltsverzeichnis schnell und portofrei erhältlich bei Die Online-Fachbuchhandlung beck-shop.de ist spezialisiert auf Fachbücher, insbesondere Recht, Steuern und Wirtschaft. Im Sortiment finden Sie alle Medien (Bücher, Zeitschriften, CDs, eBooks, etc.) aller Verlage. Ergänzt wird das Programm durch Services wie Neuerscheinungsdienst oder Zusammenstellungen von Büchern zu Sonderpreisen. Der Shop führt mehr als 8 Millionen Produkte. 4. Computers and Espionage ...and the world’s first spy satellite... It was 1959 and the Cold War was escalating steadily, moving from a state of palpable sustained tension toward the overt threat to global peace to be posed by the 1962 Cuban Missile Crisis – the closest the world has ever come to nuclear war. Quite by chance, I found myself thrust into this vortex, involved in top-level espionage work. I would soon write the software for the world’s first spy satellite. It was a summer romance, in fact, that that led me unwittingly to this particular role in history. In 1958 I had fallen for a stunning young woman from the Washington, D.C., area, who had come out to Boulder for summer school. So while the world was consumed by the escalating political and ideological tensions, nuclear arms competition, and Space Race, I was increasingly consumed by thoughts of Phyllis.
    [Show full text]
  • Utah Data Center, As Well As Any Search Results Pages
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 84688A 2 May 2017 JOHN GREENEWALD Dear Mr. Greenewald : This responds to your Freedom of Information Act (FOIA) request of 14 June 2016 for Intellipedia pages on Boundless Information and/or BOUNDLESS INFORMANT and/or Bull Run and/or BULLRUN and/or Room 641A and/ or Stellar Wind and/ or Tailored Access Operations and/ or Utah Data Center, as well as any search results pages. A copy of your request is enclosed. As stated in our previous response, dated 15 June 2016, your request was assigned Case Number 84688. For purposes of this request and based on the information you provided in your letter, you are considered an "all other" requester. As such, you are allowed 2 hours of search and the duplication of 100 pages at no cost. There are no assessable fees for this request. Your request has been processed under the FOIA. For your information, NSA provides a service of common concern for the Intelligence Community (IC) by serving as the executive agent for Intelink. As such, NSA provides technical services that enable users to access and share information with peers and stakeholders across the IC and DoD.
    [Show full text]