Cryptologic Quarterly, 2019-01

Total Page:16

File Type:pdf, Size:1020Kb

Cryptologic Quarterly, 2019-01 Cryptologic Quarterly NSA’s Friedman Conference Center PLUS: Vint Hill Farms Station • STONEHOUSE of East Africa The Evolution of Signals Security • Mysteries of Linguistics 2019-01 • Vol. 38 Center for Cryptologic History Cryptologic Quarterly Contacts. Please feel free to address questions or comments to Editor, CQ, at [email protected]. Disclaimer. All opinions expressed in Cryptologic PUBLISHER: Center for Cryptologic History Quarterly are those of the authors. Th ey do not neces- CHIEF: John A. Tokar sarily refl ect the offi cial views of the National Security EXECUTIVE EDITOR: Pamela F. Murray Agency/Central Security Service. MANAGING EDITOR: Laura Redcay Copies of Cryptologic Quarterly can be obtained by ASSOCIATE EDITOR: Jennie Reinhardt sending an email to [email protected]. Editorial Policy. Cryptologic Quarterly is the pro- fessional journal for the National Security Agency/ Central Security Service. Its mission is to advance knowledge of all aspects of cryptology by serving as a forum for issues related to cryptologic theory, doc- trine, operations, management, and history. Th e pri- mary audience for Cryptologic Quarterly is NSA/CSS professionals, but CQ is also distributed to personnel in other United States intelligence organizations as well as cleared personnel in other federal agencies and departments. Cryptologic Quarterly is published by the Center for Cryptologic History, NSA/CSS. Th e publication is de- signed as a working aid and is not subject to receipt, control, or accountability. Cover: “Father of American cryptology” William Friedman’s retirement ceremony in the Arlington Hall Post Theater, Arlington, VA, 1955. Lieutenant General Ralph Canine is at left, Solomon Kullback is seated left, Friedman is second from right, and Director of Central Intelligence Allen Dulles is at far right. National Security Agency Archives. See story page 53. Cryptologic Quarterly, 2019-01 Contents 2019-01 • Volume 38 History and Transparency: Two Years at a Glance! by John A. Tokar ......................................................................................1 Family Album—Vint Hill Farms Station by Betsy Rohaly Smoot ..............................................................................9 Th e Evolution of Signals Security as a Counterintelligence Discipline by David G. Boak .....................................................................................17 Th e STONEHOUSE of East Africa by Mark Nixon .........................................................................................29 A Layman’s Guide to the Mysteries of Linguistics by Jack Gurin ...........................................................................................39 A Space Worthy of its Namesakes: Th e Friedman Conference Center by Sarah Parsons .......................................................................................53 Cryptologic Quarterly, 2019-01 History and Transparency: Two Years at a Glance! John A. Tokar At the start of each year, I deliberate the style istic of our chosen profession at the NSA/CSS Cen- and format of the calendar or portfolio I choose ter for Cryptologic History (CCH). Moreover, one to accompany me each day in both my work and of the many challenges of any leader or manager is private lives. Unlike many other professions, at the a seemingly never-ending demand from one’s supe- National Security Agency/Central Security Service riors for information: reports, metrics, and some- (NSA/CSS) we do not have the option of using times merely lists. Lists of people; lists of resources; our smartphones for this purpose. Some years I lists of dates and meetings; lists of suspenses; and will just continue using the same version of calen- lists of accomplishments. The latter are sometimes dar as the last. Early in my US Army career, I car- required to track individual accomplishments, for ried a pocket-sized calendar that was commercially example in support of an award nomination, per- available from an office store. I preferred its size formance appraisal, or promotion packet. Other and layout to the many government-issued vari- times the request is for organizational information, eties available. Later, I would forego a templated, listed in weekly, quarterly, and annual tallies. preprinted calendar altogether, and just carry one Shortly after my arrival at CCH, one of our of the omnipresent, lime-green, hard-sided tablets historians cleverly began a year-at-a-glance nar- issued by the Federal Supply Service. It fit neatly in rative of the many ways that CCH conducts its the cargo-pocket of my uniform pants, and it was mission to “provide objective, meaningful histori- virtually indestructible. That style of tablet suited cal support to the NSA/CSS leadership and work- me for decades, and I would either write calendar force to enhance decision making, cryptologic dates on the lined pages inside, or sometimes print knowledge, and esprit de corps.” Many of those small, 5" × 8" calendars and stick them inside for actions and activities also serve to “preserve and reference. This year, I am back to a larger, commer- advance an understanding of cryptologic history cially available planner. I particularly like the “year- for the United States Intelligence Community at-a-glance” feature inside the front cover. (IC), the Department of Defense, other govern- Why all this talk about calendars? For one, we ment agencies, academia, and the general pub- use them to track time, a fairly important character- lic.” More than a simple list or calendar of events, 1 Cryptologic Quarterly, 2019-01 this running tally has proven very valuable to us, discussion about their significance. The sympo- as the entire team contributes to its maturation sium attracts hundreds of attendees and dozens throughout the year. It serves to remind us of of presenters from NSA, the IC, academia, and where we have been, what we have done, and the the general public from around the globe. It is impact that we are having as a federal government the largest event of its kind, welcoming all top- history program in general and on NSA/CSS in ics relevant to the history of cryptology, signals particular. Moreover, it serves as a useful tool to intelligence, cybersecurity, computer technology, plot course changes and to allocate our resources information assurance, and other related national against future requirements. security themes. This issue of NSA’s professional journal Cryp- Schorreck Lecture. CCH also educates and tologic Quarterly, timed to precede our biennial informs the NSA/CSS workforce through brief- Symposium on Cryptologic History, strives to ings and panel presentations, often aligned with present “two years at a glance” from CCH’s per- significant anniversaries in cryptologic history. spective. My hope is that it will provide the NSA/ The Henry F. Schorreck Memorial Lecture series CSS workforce, the rest of government, academia, has been sponsored by CCH for the past twelve and the general public with a deeper understand- years. Schorreck, former NSA historian, was a ing of what we do as a federal government history pioneer in the discipline of cryptologic history. program. In 2017, I wrote an article that explored Last year, we were fortunate enough to host Dr. how CCH provides meaningful historical sup- Mitchell Lerner, Ohio State University profes- port to the NSA/CSS leadership and workforce sor of history and director of the Korean Stud- to enhance decision making, cryptologic knowl- ies Institute, to mark the 50th anniversary of the edge, and esprit de corps (“What CCH Can Do capture of the USS Pueblo by North Korea. While for You: Make History Relevant!” Cryptologic the primary focus of his lecture was based upon Quarterly 2017-03: 1-7). In this article, I’d like to his book The Pueblo Incident: A Spy Ship and the focus on transparency by providing a two-years- Failure of American Foreign Policy, his expertise at-a-glance view of CCH’s outreach efforts from with the modern day Democratic People’s Repub- 2017 through 2019. lic of Korea was the topic of many of the ques- tions he fielded, truly emphasizing the potential 2019 Symposium on Cryptologic History. impact of applied history to current operations. This fall, we again will partner with the National This year, we were extremely honored to host Cryptologic Museum Foundation for our 17th Mr. Tony Comer, Departmental Historian at the Symposium on Cryptologic History, which will Government Communications Headquarters be held at the Johns Hopkins University Applied (GCHQ), NSA’s counterpart in the United King- Physics Laboratory in Laurel, Maryland. The dom, which marked its centennial in 2019. Tony’s theme for 2019 is “From Discovery to Discourse.” talks both inside and outside the fence were well The symposium is an occasion for historians (and attended. This year’s Schorreck Lecture not only fans of cryptologic history) to gather for reflec- served to educate attendees about GCHQ’s cen- tion and debate on relevant and important topics tury of achievement, but more importantly it from the cryptologic past. Since 1990, our sym- reinforced the nature of the special relationship posium has served as an opportunity to present that exists between the cryptologic communities historical discoveries found in unclassified and of the United States and the United Kingdom. declassified IC records and engage in scholarly 2 Cryptologic Quarterly, 2019-01 The GCHQ headquarters building, Cheltenham, UK. For the 2019 Schorreck lecture, CCH hosted GCHQ historian Tony Comer. GCHQ
Recommended publications
  • Steganography As a Means of Attacking Information Systems
    Scientific and Practical Cyber Security Journal (SPCSJ) 2(4): 75-80 ISSN 2587-4667 Scientific Cyber Security Association (SCSA) STEGANOGRAPHY AS A MEANS OF ATTACKING INFORMATION SYSTEMS Anna Romanova 1, Sergiy Toliupa 2 1Taras Shevchenko University of Kyiv, Faculty of Information Technology, 2 Taras Shevchenko University of Kyiv, Faculty of Information Technology ABSTRACT. An analysis of steganography methods that are can be potentially used as instruments in attacks on information and communication systems is presented. The possible solutions to ensure resilience to such attacks are presented. Keywords: steganography, TEMPEST, covert channel, information protection Cryptography is widely used as one of the most efficient and approbated methods of critical information resources protection. Nevertheless, in particular cases it might be more effective to hide the communication channel itself instead of making the information within it unreadable. Such a practice, namely concealing data within unsuspicious, innocent-looking containers, is called steganography. Any concept might have a double application. While being primarily considered a means of information protection, steganography can be used with ill intentions, as well. In fact, several high-tech attacks are based on the hidden data transmission, and contemporary methods of counteraction do not provide satisfactory level of resilience to those. These attacks are not always considered to be steganography-based, as they, for the most part, use a variety of features, characteristic for information and communication systems – physical effects, transmission protocols, communication infrastructure, specific features of software, cryptography etc. Nevertheless, the attack requires a classical statement of the task of steganography – how to transmit data so that a potential attacker could not acquire them due to not knowing about the presence of a transmission channel, even if he or she has a suspicion about one and the possible methods are known.
    [Show full text]
  • Seguridad Internacional En Un Orden Mundial En Transformación
    SEGURIDAD INTERNACIONAL EN UN ORDEN MUNDIAL EN TRANSFORMACIÓN ______________ INTERNATIONAL SEGURITY IN AN EVOLVING WORLD ORDER COORDINADORES: ALDA MEJÍAS, SONIA ÁNGEL SANTANO, SILVIA CAAMAÑO ARAMBURU, LUIS FERREIRA, SUSANA DE SOUSA GARCÍA CASTRO, EMILIO GIL GIL, ALICIA GUTIÉRREZ LÓPEZ, BEATRIZ HUERTA BARAJAS, JUSTO ALBERTO LÁUZARA MORALES, FRANCISCO MACULAN, ELENA MARCÉN VALBUENA, PILAR VIVAS GONZÁLEZ, PEDRO AUTORES: ABU-WARDA PÉREZ, AMAL ANGUITA OLMEDO, CONCEPCIÓN AYALA GALÁN, DAVID COLOM PIELLA, GUILLEM DE PRADA SOLAESA, JOSÉ RICARDO FERNÁNDEZ MOLINA, ESTHER FERREIRA, SUSANA DE SOUSA FLORES GIMÉNEZ, FERNANDO FOJÓN CHAMORRO, ENRIQUE GÁLVEZ SALVADOR, YADIRA GONZÁLEZ DEL MIÑO, PALOMA GONZÁLEZ GONZÁLEZ, DAVID GRIJALVA ETERNOD, AUREA ESTHER HERNÁNDEZ LLORENTE, ADOLFO JIMÉNEZ RUIZ, JUAN LUIS LÁUZARA MORALES, FRANCISCO LÓPEZ ESTÉVEZ, DARÍO PÉREZ-HERRANZ, MATILDE SETAS VÍLCHEZ, CARLOS USHAKOVA, TATSIANA Editor: Elena MACULAN SEGURIDAD INTERNACIONAL EN UN ORDEN MUNDIAL EN TRANSFORMACIÓN INSTITUTO UNIVERSITARIO GENERAL GUTIÉRREZ MELLADO – UNED 2014 © Copyright by Instituto Universitario General Gutiérrez Mellado de Investigación sobre la Paz, la Seguridad y la Defensa c/ Princesa 36 28008 Madrid Teléfono: 91 7580011 Fax: 91 7580030 [email protected] www.iugm.es El IUGM aplica a sus procesos de producción editorial los criterios de calidad establecidos por la ANECA, la CNEAI y la ANEP. La política y la gestión editorial del IUGM garantizan un riguroso proceso de selección y evaluación de los trabajos recibidos. Madrid, 2014 ISBN: 978-84-617-0800-0
    [Show full text]
  • NSA's Efforts to Secure Private-Sector Telecommunications Infrastructure
    Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail ac- counts and stealing intellectual property,1 the company turned to the National Security Agency (NSA) for help in securing its systems. For a company that had faced accusations of violating user privacy, to ask for help from the agency that had been wiretapping Americans without warrants appeared decidedly odd, and Google came under a great deal of criticism. Google had approached a number of federal agencies for help on its problem; press reports focused on the company’s approach to the NSA. Google’s was the sensible approach. Not only was NSA the sole government agency with the necessary expertise to aid the company after its systems had been exploited, it was also the right agency to be doing so. That seems especially ironic in light of the recent revelations by Edward Snowden over the extent of NSA surveillance, including, apparently, Google inter-data-center communications.2 The NSA has always had two functions: the well-known one of signals intelligence, known in the trade as SIGINT, and the lesser known one of communications security or COMSEC. The former became the subject of novels, histories of the agency, and legend. The latter has garnered much less attention. One example of the myriad one could pick is David Kahn’s seminal book on cryptography, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet.3 It devotes fifty pages to NSA and SIGINT and only ten pages to NSA and COMSEC.
    [Show full text]
  • Prism Vol. 9, No. 2 Prism About Vol
    2 021 PRISMVOL. 9, NO. 2 | 2021 PRISM VOL. 9, NO. 2 NO. 9, VOL. THE JOURNAL OF COMPLEX OPER ATIONS PRISM ABOUT VOL. 9, NO. 2, 2021 PRISM, the quarterly journal of complex operations published at National Defense University (NDU), aims to illuminate and provoke debate on whole-of-government EDITOR IN CHIEF efforts to conduct reconstruction, stabilization, counterinsurgency, and irregular Mr. Michael Miklaucic warfare operations. Since the inaugural issue of PRISM in 2010, our readership has expanded to include more than 10,000 officials, servicemen and women, and practi- tioners from across the diplomatic, defense, and development communities in more COPYEDITOR than 80 countries. Ms. Andrea L. Connell PRISM is published with support from NDU’s Institute for National Strategic Studies (INSS). In 1984, Secretary of Defense Casper Weinberger established INSS EDITORIAL ASSISTANTS within NDU as a focal point for analysis of critical national security policy and Ms. Taylor Buck defense strategy issues. Today INSS conducts research in support of academic and Ms. Amanda Dawkins leadership programs at NDU; provides strategic support to the Secretary of Defense, Chairman of the Joint Chiefs of Staff, combatant commands, and armed services; Ms. Alexandra Fabre de la Grange and engages with the broader national and international security communities. Ms. Julia Humphrey COMMUNICATIONS INTERNET PUBLICATIONS PRISM welcomes unsolicited manuscripts from policymakers, practitioners, and EDITOR scholars, particularly those that present emerging thought, best practices, or train- Ms. Joanna E. Seich ing and education innovations. Publication threshold for articles and critiques varies but is largely determined by topical relevance, continuing education for national and DESIGN international security professionals, scholarly standards of argumentation, quality of Mr.
    [Show full text]
  • Pioneers in U.S. Cryptology Ii
    PIONEERS IN U.S. CRYPTOLOGY II This brochure was produced by the Center for Cryptologic History Herbert 0. Yardley 2 Herbert 0. Yardley Herbert 0 . Yardley was born in 1889 in Worthington, Indiana. After working as a railroad telegrapher and spending a year taking an English course at the University of Chicago, he became a code clerk for the Department of State. In June 1917, Yardley received a commission in the Signal Officers Reserve Corps; in July Colonel Ralph Van Deman appointed him chief of the new cryptanalytic unit, MI-8, in the Military Intelligence division. MI-8, or the Cipher Bureau, consisted of Yardley and two clerks. At MI-8's peak in November 1918, Yardley had 18 officers, 24 civilians, and 109 typists. The section had expanded to include secret inks, code and cipher compilation, communications, and shorthand. This was the first formally organized cryptanalytic unit in the history of the U.S. government. When World War I ended, the Army was considering disbanding MI-8. Yardley presented a persuasive argument for retaining it for peacetime use. His plan called for the permanent retention of a code and cipher organization funded jointly by the State and War Departments. He demonstrated that in the past eighteen months MI-8 had read almost 11,000 messages in 579 cryptographic systems. This was in addition to everything that had been examined in connection with postal censorship. On 17 May Acting Secretary of State Frank L. Polk approved the plan, and two days later the Army Chief of Staff, General Peyton C.
    [Show full text]
  • Libro:Maquetación 1.Qxd
    Actividades Académicas, Conferencias, Cursos, Congresos, Seminarios Nota del editor Como norma general se ha respetado la lengua en la que se ha recibido la información en la Secretaría. Se ha seguido igualmente un criterio cronológico en la confección de este listado, desde lo más próximo en el tiempo hasta lo más tardío. Teaching and Enjoying the Words and Music of Bob Dylan, Leonard Cohen and Joni Mitchell FAZEKAS MIHALY GIMNAZIUM, HORVÁTH TÉR 8, 1082 BUDAPEST 1st-2nd March 2008 This is the 2008 Event of IATEFL LMCS SIG (International Association of Teachers of English as a Foreign Language, Literature Media & Cultural Studies, Special Interest Group). Plenary Speakers: David Boucher, Professorial Fellow, School of European Studies, University of Cardiff, UK (author of Dylan & Cohen: Poets of Rock & Roll, Continuum 2004); Jim Scrivener, Bell Educational Trust, London, UK. Further information about the event: Venue: Fazekas Mihaly Gimnazium, Horváth tér 8, 1082 Budapest (carefully modernized Art Nouveau style school on the edge of central Pest). Exhibition of materials on the three musicians, plus DVDs of performance. *** On Whose Terms?: Critical Negotiations in Black Irish Literature and the Arts GOLDSMITHS COLLEGE, UNIVERSITY OF LONDON (UK) 13th-14th March 2008 This conference focuses upon local, international and transnational engagements with Black British literature and the arts – in relation to its production, reception and cultural position. Through the multiple disciplines of the arts, it creates a meeting-point for prominent and emerging scholars, writers and practitioners in order to explore the 29 impact of this field, both at home and abroad. The context is one of critical investigation and celebration; a journey along diasporic and aesthetic routes.
    [Show full text]
  • DEPARTMENT of STATE AIRGRAM A-30 Department of State INFO: ADDIS ABABA PASS: CGUSASA, CINCSTRIKE, DOD from Amconsul Asmara DATE
    DEPARTMENT OF STATE AIRGRAM A-30 Department of Stat e INFO : ADDIS ABABA PASS: CGUSASA, CINCSTRIKE, DOD FROM AmConsul Asmara DATE : April 10, 196 9 SUBJECT: The Eritrean Liberation Front and Kagnew Statio n REF A-174 of October 9, 1968 The reference airgram contained our assessment, as of six months ago, o f the potential ELF threat to Kagnew Station . At that time we conclude d that the ELF lacked both intent and capability to damage the U .S . presenc e in Eritrea, but that the beginnings of a more militant policy plus a large r degree of anti-American influence in the Front could be discerned . INCREASED TEMPO OF ELF ACTIVITY In view of recent events, we think it timely to take a further look a t the possibility for hostile action against Kagnew. After a midwinter lull , the ELF has in March and A pril shown a hi gh degree of activism an d effectiveness against Ethiopian security forces . March saw the destructio n of three oil tankers and two buses on the vital Asmara-Massawa highway , and the spectacular sabotage-bombing of an Ethiopian Air Lines commercia l jet in Frankfurt, Germany ; while in the first week of April, the ELF ha s staged a sophisticated attack on the main electiic power and water suppl y systems of the city of Asmara (ourtel 197) . Taken together, these recen t incidents show a shift in ELF tacti cs an d also a more sophisticated capability, previously lacking, to conduct skilled sabotage operations with modern explosive devices and weapons .
    [Show full text]
  • David Mamet in Conversation
    David Mamet in Conversation David Mamet in Conversation Leslie Kane, Editor Ann Arbor Copyright © by the University of Michigan 2001 All rights reserved Published in the United States of America by The University of Michigan Press Manufactured in the United States of America ∞ Printed on acid-free paper 2004 2003 2002 2001 4 3 2 1 No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the written permission of the publisher. A CIP catalog record for this book is available from the British Library. Library of Congress Cataloging-in-Publication Data David Mamet in conversation / Leslie Kane, editor. p. cm. — (Theater—theory/text/performance) Includes bibliographical references and index. ISBN 0-472-09764-4 (cloth : alk. paper) — ISBN 0-472-06764-8 (pbk. : alk. paper) 1. Mamet, David—Interviews. 2. Dramatists, American—20th century—Interviews. 3. Playwriting. I. Kane, Leslie, 1945– II. Series. PS3563.A4345 Z657 2001 812'.54—dc21 [B] 2001027531 Contents Chronology ix Introduction 1 David Mamet: Remember That Name 9 Ross Wetzsteon Solace of a Playwright’s Ideals 16 Mark Zweigler Buffalo on Broadway 22 Henry Hewes, David Mamet, John Simon, and Joe Beruh A Man of Few Words Moves On to Sentences 27 Ernest Leogrande I Just Kept Writing 31 Steven Dzielak The Postman’s Words 39 Dan Yakir Something Out of Nothing 46 Matthew C. Roudané A Matter of Perception 54 Hank Nuwer Celebrating the Capacity for Self-Knowledge 60 Henry I. Schvey Comics
    [Show full text]
  • A Reference Guide to Selected Historical Documents Relating to the National Security Agency/Central Security Service (NSA/CSS) 1931-1985
    Description of document: A Reference Guide to Selected Historical Documents Relating to the National Security Agency/Central Security Service (NSA/CSS) 1931-1985 Requested date: 15-June-2009 Released date: 03-February-2010 Posted date: 15-February-2010 Source of document: National Security Agency Attn: FOIA/PA Office (DJP4) 9800 Savage Road, Suite 6248 Ft. George G. Meade, MD 20755-6248 Fax: 443-479-3612 Online form: Here The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. A REFERENCE GUIDE TO SELECTED HISTORICAL DOCUMENTS RELATING TO THE NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICE 1931-1985 (U) SOURCE DOCUMENTS IN Compiled by: CRYPTOLOGIC HISTORY Gerald K.
    [Show full text]
  • Information Theory and Entropy
    3 Information Theory and Entropy Solomon Kullback (1907–1994) was born in Brooklyn, New York, USA, and graduated from the City College of New York in 1927, received an M.A. degree in mathematics in 1929, and completed a Ph.D. in mathematics from the George Washington University in 1934. Kully as he was known to all who knew him, had two major careers: one in the Defense Department (1930–1962) and the other in the Department of Statistics at George Washington University (1962–1972). He was chairman of the Statistics Department from 1964–1972. Much of his pro- fessional life was spent in the National Security Agency and most of his work during this time is still classified. Most of his studies on information theory were done during this time. Many of his results up to 1958 were published in his 1959 book, “Information Theory and Statistics.” Additional details on Kullback may be found in Greenhouse (1994) and Anonymous (1997). When we receive something that decreases our uncertainty about the state of the world, it is called information. Information is like “news,” it informs. Informa- tion is not directly related to physical quantities. Information is not material and is not a form of energy, but it can be stored and communicated using material or energy means. It cannot be measured with instruments but can be defined in terms of a probability distribution. Information is a decrease in uncertainty. 52 3. Information Theory and Entropy This textbook is about a relatively new approach to empirical science called “information-theoretic.” The name comes from the fact that the foundation originates in “information theory”; a set of fundamental discoveries made largely during World War II with many important extensions since that time.
    [Show full text]
  • The Legendary William F. Friedman
    '\ •' THE LEGENDARY WILLIAM F. FRH:DMAN By L~mbros D. C~llimPhos February 1974 "------- @'pp roved for Release bv NSA on 05-12-2014 Pursuant to E .0. 1352\3 REF ID:A4045961 "To my disciple, colles:igue, end friend, LPmbros Demetrios Cl3llim::>hos-­ who, hr:iving at an early ?ge become one of the gre?t fl1=1utists of the world, deserted the profession of musician, in favor of another in which he is making noteworthy contributions-- From r:illif'm F. Friedm?.n- - who, having ?t 8n early ege aspired to become noted in the field of biology, deserted the profession of geneticist, in favor of ~nother, upon which he hopes he hes left some impression by his contributions. In short: From deserter to deserter, with affectionate greetings! W.F.F. Washington, 21 November 1958" (Facing pege J-) REF ID:A4045961 ~ THE LEGENDARY WILLIAM F. FRIEDMAN By Lambros D. Callimahos Unclassified PROLOGUE When I joined the U.S. Army to enter the cryptologic service of my adopted country on February 11, 1941, William F. Friedman was already e legendRry figure in my eyes. I had read two efffly papers of his, "L'indice de coincidence et ses a-pplications en cryptographie" end "Application des methodes de la statistioue a la cryptogre~hie, when I was living in Feris in 1934, concertizing as a flute soloist throughout Europe while privately pursuing en active hobby of cryptology, which I felt would be my niche when the time CPme for me to enter the army. (Be­ sides the U.S. Army, I was also liable for service in the Greek, Egy-ptian, and Turkish armies, P.nd barely missed being in one of the letter.) As a member of the original group of 28 students in the Cryptogr8phic School at Fort Monmouth: N.
    [Show full text]
  • Welcome to the Pentagon • 2021 Foreward 2021 Orientation and Guide
    WELCOME TO THE PENTAGON • 2021 FOREWARD 2021 ORIENTATION AND GUIDE PENTAGON RESERVATION COVID-19 OPERATIONS Right now, the Pentagon is operating in a unique COVID-19 environment. The Department of Defense (DoD) implemented precautionary measures when the COVID-19 pandemic began and continues to monitor and assess the situation carefully with the assistance of expert guidance from the Centers for Disease Control, and local, state, and federal authorities. In response to the COVID-19 pandemic, the Pentagon Reservation adopted the Department’s Health Protection Condition framework known as HPCON levels. They range from Alpha to Delta, and each one has specific guidelines for employees to follow. You will find a detailed list of these guidelines on the Washington Headquarters Services (WHS) website: www.WHS.mil. Hours of operation and Operating Status for certain services on the Pentagon Reservation are subject to change. Log on to www.whs.mil/ coronavius for most up to date information. Stay safe, stay healthy and welcome to the Pentagon. 2 3 TABLE OF CONTENTS PENTAGON RESERVATION COVID-19 OPERATIONS 3 THE PENTAGON RESERVATION 9 TRANSPORTATION 11 METROPOLITAN AREA TRANSIT OPTIONS ..........................................................................................................................................................................................................11 WASHINGTON HEADQUARTERS SERVICES TRANSPORTAION MANAGEMENT PROGRAM OFFICE (WHS TMPO) .......................................................................................11
    [Show full text]