Tradecraff in ANCIENT GREECE

Total Page:16

File Type:pdf, Size:1020Kb

Tradecraff in ANCIENT GREECE DECLASSIFIED Authority NND 947003 Strategemata I I TRADECRAFf IN ANCIENT GREECE Rose Mary Sheldon 1 The ancient Greeks knew a great deal about the ins and outs of spying, but they did not make our modern terminology distinctions among intelligence collection, security, counterintelligence, and covert operations. If the Greeks did h~ve a word for it, it was strategemata, the single heading under which they gtouped all such activities. We are able to study these "strategems of war" today, t~anks to the survival of several Greek military handbooks, called strategika biblia. Their chapters on intelligence gathering instruct a commander in what w~uld today be called tradecraft: the finer arts of running agents, sending secret rriessages, using codes. ciphers, disguises, and surveillance. We can also glean information from the works of Greek historians and other ancient writers who, even if they are not primarily concerned with military matters, do refer occa­ sibnally to techniques of secret operations. Here is a look at what these sources h~ve to say about the " how to do it" of ancient spying. Of all the surviving military treatises, by far the best is the one written about ~7 B.C. by Aeneas the Tactician-another name, it is thought, for Aeneas of Stymphalos, general of the Arcadian Confederacy. As a fourth-century com­ mlmder, he very likely served most of his time as a mercenary soldier. The Arcadians had been the first Greeks to turn to soldiering as a profession and were mhre in demand than any other mercenaries. They were said to have been the first practical instructors in the art of war. A man of sagacity, whose use of sources proves he was both well traveled and well read, Aeneas had a keen understanding oflhuman nature. His insight and experience, gathered from a career of adven­ ture, give his work an immediacy lacking in the works compiled in libraries by mere epitomizers. Living in an age when the general alone was the driving power behind the whole army, Aeneas recognized intelligence collection and counter­ intelligence as integral parts of the defense of the state. A commander. could afford to leave nothing to' the initiative and good faith of his subordinates; he could not even trust his own men and often set them as spies against one another. I One of Aeneas' basic observations is that intelligence being sent into or out II of .a fortified city has to be transmitted clandestinely to avoid capture by the enemy; he provides us with the first instructional texts on communications security, and describes in detail IS different methods of sending messages, some of lthem cit>hers. Aeneas probably used recognized and traditional devices, th~ugh he no doubt made additions or refinements of his own. One example involved the use of message boards, wooden tablets covered in wax with messages thJnI inscribed in the wax, a common. vehicle of writing in his day. Aeneas suggested writing the secret message on the wood and then covering the wood wi~h wax in which another, more innocuous message could be written. The device originally comes from Herodotus and was used to transmit one of the most imbortant messages in all of Greek history. Demaratus. a Greek living as an exile . 39 DECLAS Tradecralt I 1 in Persia, learned that King Xerxes of Persia planned to invade Greece. Realizing the danger, Demaratus attempted to warn the Spartans. He scraped the wax off a pair of hinged wooden tablets, wrote his secret message on the wood, and then ctivered the boards again with wax. When the tablets arrived, the daughter of the Spartan King Cleomenes discovered the hidden message, and this discovery makes1 her the first known female cryptanalyst. It was both tragic and ironic that in1 the war that resulted, her own husband, Leonidas, died leading the valiant Spartan band that held the pass at Thermopylae for three days before the P~rsians found a way through. 'I A related method of sending secret messages was to write on a boxwood tablet with good quality black ink, letting it dry and then whitening the tablet (~resumably with white slip) to make the letters invisible. The recipient then immersed the tablet in water to wash away the whitening agent and make the ~riting visible. The same method was used for disguising a message as a votive offering at a local shrine. Aeneas suggests using a wooden plaque with the oicture of a heroic horseman carrying a torch and wearing a white cloak, since sculp­ tlired tablets of this kind were commonly offered at altars. (Vows requiring such offerings were made to heroes on many occasions like childbirth, rescue from shipwreck, or recovery from illness}. The tablet was sent along with an unwitting atcomplice and vosted at whatever temple he went to for prayer. (A dead drop, one might say.) It was later retrieved and soaked in oil to bring out the message . I Bladders, Strokes, and Dots ! One rather amusing way to send a secret message required a bladder large enough to hold a message. (No particular animal is recommended for obvious reasons; the longer the message, the larger the bladder required.) The sender i~flated the bladder, knotted it, and let it dry. A message could then be written o~ the outside of the bladder with a mixture of ink and glue. When the writing dried, the bladder was deflated and stuffed into a flask of appropriate size. The fl:ask was filled with oil and corked. In this state, the secret message was hidden in the flask, and it could be carried around unnoticed. The recipient emptied the flask and removed the bladder to read the message. The bladder was r~usable : an answer could be sent by svonging off the bladder, writing a new ~essage, sealing it back into the flask in the same way, and returning it to the original sender. "Especially secret messages," Aeneas writes, "might take the following forms. Insert a book (probably a scroll) into your traveling gear which has the message coded by marking certain letters with dots at long intervals or by strokes ~f unusual length." Thus OmisPetomenoseLipenoikiAn disguises the word O,la. The recipient merely has to transcribe the marked letters. This method has along history that reaches up until the present. The Washington Post of 24 Avril I ~918, for example, revorted the story of Ram Chandra, an Indian revolutionary, who received information for his own newsoaver in San Francisco through specially marked copies of the Koran sent from India which the Indian censors ~ould not touch. A variant method requires using two copies of the same book I ~nd sending a code seoarately to indicate the designated words or letters; but this refinement had to await the invention of printing. The printing press both ~tandardized books and made them easily available to the general public; and I 4o I I DECLASSIFIED Authority NND 947003 I - Tradecraft I the success of this method requires that the unaltered originals be identical in every detail. · : David Kahn in his study The Codebreakers explains some of Aeneas' methods for encoding messages. Among the simplest was replacing vowels for the plain text by dots: one for aloha, two for epsilon, etc. A typical message would look like this: "Dionysius Docked" D:.::N:::S:.:.:S D::CK:D "LET HERACLEIDES COME" L:T H:R.CL::.D:S C::M: Aeneas Tacticw, 31.31 Loeb edition. p. 171 j A more complicated steganographic system used a disk that bore holes representing the letters of the alphabet. The encipherer passed yarn through the hbles that represented the letters of his messages and the decipherer would undo the yarn and get the text in reverse. The holes in the center were used in between tne letters that had to be repeated. Hermann Diels gives us a reconstruction: ~ similar method used an astraga) (a . I sheep's ankle bone) instead of a disk. The astraga) had four flat sides which could be marked with dots; they were frequently used as dice. The 24letters of the alphabet naturally fall into four :;;.... gtoups of six. The thread would be ~ p~ssed through the appropriate letters with a needle. When this operation was finished, the appearance would be of a simple astragal with a ball of thread afound it. The recipient would have to ubwind it and transcribe the message. This device is the one certain invention Hermann Diels attributed solely to Aeneas and not t\nlike Technd:. p . 74 traceable to another source. Leipzig, 1924 I I Simple, uncoded messages could be disguised in several ways. They were w!itten on thin strips of papyrus, then concealed in the shoulder of a tunic, tied to the bridle of a horse, or sewn into the leather skirts on a soldier's cuirass. Aeneas even reoorts a man from Ephesus who sent a message written on leaves bound t~ a wound on his leg. I In special cases a message might need protection from water or mud. Such m'essages, written on sheets of beaten tin, were sewn into sandals and walked through a checkooint. If the communicators worked carefully, they could even slip the message unnoticed into the sandals of an unsuspecting person and then retrieve it while he slept. Similarly, small, rolled and inscribed plates of lead I could hang from a woman's ears as earrings. One Roman example from a later u¢e shows the general Hirtius sending messages on lead plates tied to the arms of a soldier who then swam the Scultenna River.
Recommended publications
  • Trends Toward Real-Time Network Data Steganography
    TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY James Collins, Sos Agaian Department of Electrical and Computer Engineering The University of Texas at San Antonio, San Antonio, Texas, USA [email protected], [email protected] Abstract Network steganography has been a well-known covert data channeling method for over three decades. The basic set of techniques and implementation tools have not changed significantly since their introduction in the early 1980’s. In this paper, we review the predominant methods of classical network steganography, describing the detailed operations and resultant challenges involved in embedding data in the network transport domain. We also consider the various cyber threat vectors of network steganography and point out the major differences between classical network steganography and the widely known end-point multimedia embedding techniques, which focus exclusively on static data modification for data hiding. We then challenge the security community by introducing an entirely new network data hiding methodology, which we refer to as real-time network data steganography. Finally, we provide the groundwork for this fundamental change of covert network data embedding by introducing a system-level implementation for real-time network data operations that will open the path for even further advances in computer network security. KEYWORDS Network Steganography, Real-time Networking, TCP/IP Communications, Network Protocols 1. INTRODUCTION Even though the origins of steganography reach back to the time of ancient Greece, to Herodotus in 440 BC, the art of steganography continues to evolve. This is especially true in the technical methods of digital embedding [1][2]. Digital steganography has been used since the early 1980’s and network steganography techniques quickly evolved with the advent of the Internet and standardized multimedia formats used for data exchange [3].
    [Show full text]
  • SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM
    SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM HEINEMANN: AUSTRALIA First published in 1987 by HEINEMANN PUBLISHERS AUSTRALIA (A division of Octopus Publishing Group/Australia Pty Ltd) 85 Abinger Street, Richmond, Victoria, 3121. Copyright (c) 1987 by Peter Wright ISBN 0-85561-166-9 All Rights Reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. TO MY WIFE LOIS Prologue For years I had wondered what the last day would be like. In January 1976 after two decades in the top echelons of the British Security Service, MI5, it was time to rejoin the real world. I emerged for the final time from Euston Road tube station. The winter sun shone brightly as I made my way down Gower Street toward Trafalgar Square. Fifty yards on I turned into the unmarked entrance to an anonymous office block. Tucked between an art college and a hospital stood the unlikely headquarters of British Counterespionage. I showed my pass to the policeman standing discreetly in the reception alcove and took one of the specially programmed lifts which carry senior officers to the sixth-floor inner sanctum. I walked silently down the corridor to my room next to the Director-General's suite. The offices were quiet. Far below I could hear the rumble of tube trains carrying commuters to the West End. I unlocked my door. In front of me stood the essential tools of the intelligence officer’s trade - a desk, two telephones, one scrambled for outside calls, and to one side a large green metal safe with an oversized combination lock on the front.
    [Show full text]
  • Espionage Against the United States by American Citizens 1947-2001
    Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8.
    [Show full text]
  • Tine Statue of Athena in the Parthenon
    REMARKS UPON THE COLOSSALCHRYSELEPHAN- TINE STATUE OF ATHENA IN THE PARTHENON INTRODUCTION IT is not to be expectedthat even fragmentsof the gold and ivory colossal statue of Athena in the Parthenon should have survived the ravages of time. However, a good deal is known about the statue from small copies in the round and from coins, plaques, gems and the like; also, the famous statue is mentioned by ancient writers, sometimes at considerable length. Consequently we have a fairly good idea of her appearance. And when we come to consider the pedestal on which the statue stood, we find that there are data which can be studied to advantage. Obviously the importance of the statue called for a carefully designed pedestal. Thus it is desirable that all existing data concerning the pedestal be recorded. Let us, then, make a few remarks not only about the colossal statue, but also about the pedestal on which the statue stood. I ATHENA PARTHENOS, THE CLIMAX OF THE PANATHENEA Figure 1 shows the position of the colossal statue (often referred to as the Parthenos) in the east cella of the temple. The blocks which give the position of the statue are toward the west end of the nave and on the axis of the temple. They are poros blocks of the type used for foundations. They are flush with the marble pave- ment of the nave, and they are in situ. The poros blocks, thirty in number, cover an area so extensive that they at once tell us that the statue which stood above them was of colossal size (Figs.
    [Show full text]
  • On the Chronology of Third-Century Bc Athenian Silver Coinage
    John H. KROLL * ON THE CHRONOLOGY OF THIRD-CENTURY BC ATHENIAN SILVER COINAGE Abstract – ﬈is paper draws attention to evidence that was overlooked in Christophe Flament’s recently proposed revisions for the chronology and interpretation of Athe- nian silver coinage of the 3rd century bc. ﬈is evidence supports the prior dating of the quadridigité silver to the 280s and of all three known issues of silver pentobols to the years of the Chremonidean War (268-262 bc). In addition, the paper contends that the heterogeneous tetradrachms and fractions should be accepted as genuine Athenian emissions, and that the 3rd-century tetrobols are still best interpreted as specie minted for compensating garrison troops in Attica. uilt upon inference and incomplete evidence, greek numis- matic chronologies are by nature subject to improvement as ﬔrther B information comes to light. ﬈us, with the publication of Agora 26 in 1992, it was only a matter of time before new data and new observations would require adjustments in the chronological framework it presented for Athenian coinage [1]. One such adjustment has emerged from a recent cor- rection in the chronology of 2nd-century bc stamped Rhodian amphora handles: by lowering the date of the Middle Stoa construction deposit in the Athenian Agora from ca 183 to 170/168 bc, the correction has elimi- nated a formerly inexplicable gap of about twenty years in the absolute dating of Athenian bronze coins between ca 200 and 167 bc [2]. ﬈is adjustment, however, is but a minor refinement when placed next to the bold revisions in the chronology of Athenian 3rd-century silver coin- age that Christophe Flament proposed in a recent volume of this journal [3].
    [Show full text]
  • ICD 203: Analytic Standards
    Analytic Standards A. AUTHORITY: The National Security Act of 1947, as amended; the Intelligence Reform and Terrorism Prevention Act of2004; Executive Order 12333, as amended; Presidential Policy Directive/PPD-28; and other applicable provisions of law. B. PURPOSE 1. This Intelligence Community Directive (lCD) establishes the Intelligence Community (IC) Analytic Standards that govern the production and evaluation of analytic products; articulates the responsibility of intelligence analysts to strive for excellence, integrity, and rigor in their analytic thinking and work practices; and delineates the role of the Office of the Director ofNational Intelligence (ODNI) Analytic Om buds. 2. This Directive supersedes lCD 203, Analytic Standards, dated 21 June 2007, and rescinds ICPM 2006-200-2, Role ofthe Office of the Director ofNational Intelligence Analytic Ombudsman. C. APPLICABILITY 1. This lCD applies to the IC, as defined by the National Security Act of 194 7, as amended; and to such elements of any other department or agency as may be designated an element of the IC by the President, or jointly by the Director of National Intelligence (DNI) and the head of the department or agency concerned. 2. This Directive does not apply to purely law enforcement information. When law enforcement information also contains intelligence or intelligence-re lated information, this Directive shall apply only to the intelligence or intelligence-related information and analysis contained therein. D. POLICY I. The IC Analytic Standards are the core principles of intelligence analysis and are to be applied across the IC. IC Analytic Standards shall be applied in each analytic product in a manner appropriate to its purpose, the type and scope of its underlying source information, its production timeline, and its customers.
    [Show full text]
  • Spy Lingo — a Secret Eye
    A Secret Eye SpyLingo A Compendium Of Terms Used In The Intelligence Trade — July 2019 — A Secret Eye . blog PUBLISHER'S NOTICE: Although the authors and publisher have made every eort to ensure that the information in this book was correct at press time, the authors and publisher do not assume and hereby disclaim any liability to any party for any loss, damage, or disruption caused by errors or omissions, whether such errors or omissions result from negligence, TEXTUAL CONTENT: Textual Content can be reproduced for all non-commercial accident, or any other cause. purposes as long as you provide attribution to the author / and original source where available. CONSUMER NOTICE: You should assume that the author of this document has an aliate relationship and/or another material connection to the providers of goods and services mentioned in this report THIRD PARTY COPYRIGHT: and may be compensated when you purchase from a To the extent that copyright subsists in a third party it provider. remains with the original owner. Content compiled and adapted by: Vincent Hardy & J-F Bouchard © Copyright 9218-0082 Qc Inc July 2019 — Spy Lingo — A Secret Eye Table Of Contents INTRODUCTION 4 ALPHA 5 Ab - Ai 5 Al - As 6 Au - Av 7 Bravo 8 Ba - Bl 8 Bl - Bre 9 Bri - Bu 10 CHARLIE 11 C3 - Can 11 Car - Chi 12 Cho - Cl 13 Cn - Com 14 Comp - Cou 15 Cov 16 Cu 17 DELTA 18 Da - De 18 De - Di 19 Di - Dru 20 Dry - Dz 21 Echo 22 Ea - Ex 22 Ey 23 FOXTROT 24 Fa - Fi 24 Fl - For 25 Fou - Fu 26 GOLF 27 Ga - Go 27 Gr - Gu 28 HOTEL 29 Ha - Hoo 29 Hou - Hv 30 INDIA 31 Ia
    [Show full text]
  • Intelligence, Surveillance, and Reconnaissance Assessment
    Improving Outcomes Intelligence, Surveillance, and Reconnaissance Assessment Brig Gen Timothy D. Haugh, USAF Lt Col Douglas W. Leonard, USAF Disclaimer: The views and opinions expressed or implied in the Journal are those of the authors and should not be con- strued as carrying the official sanction of the Department of Defense, Air Force, Air Education and Training Command, Air University, or other agencies or departments of the US government. This article may be reproduced in whole or in part without permission. If it is reproduced, the Air and Space Power Journal requests a courtesy line. he seemingly insatiable appetite of US DOD combatant commands (CCMD) for intelligence, surveillance, and reconnaissance (ISR) has driven the growth of a massive theater ISR enterprise. Despite this tremendous invest- Tment, one that has seen DOD expenditures rise six-fold from 2001 to 2012, the then Air Force deputy chief of staff (DCS) for intelligence, surveillance, and reconnais- sance (DCS-ISR), Lt Gen Robert Otto, remarked that the department satisfies fewer CCMD intelligence needs today than at the height of the Iraq surge.1 How did the DOD get in this remarkable position? The department, it appears, has been a victim of its success. The now retired chairman of the joint chiefs, Gen Martin Dempsey, 4 | Air & Space Power Journal Senior Leader Perspective wrote: “The current joint force of ISR personnel, sensors, platforms, and networks is so vast, diverse, and distributed that managing their effective employment repre- sents a large and growing
    [Show full text]
  • Perspectives on Enhanced Interrogation Techniques
    Perspectives on Enhanced Interrogation Techniques Anne Daugherty Miles Analyst in Intelligence and National Security Policy July 9, 2015 Congressional Research Service 7-5700 www.crs.gov R43906 Perspectives on Enhanced Interrogation Techniques Contents Introduction ...................................................................................................................................... 1 Background ...................................................................................................................................... 2 Perspectives on EITs and Torture..................................................................................................... 7 Perspectives on EITs and Values .................................................................................................... 10 Perspectives on EITs and Effectiveness ......................................................................................... 11 Additional Steps ............................................................................................................................. 14 Appendixes Appendix A. CIA Standard Interrogation Techniques (SITs) ........................................................ 15 Appendix B. CIA Enhanced Interrogation Techniques (EITs) ....................................................... 17 Contacts Author Contact Information........................................................................................................... 18 Congressional Research Service Perspectives on Enhanced Interrogation
    [Show full text]
  • 7133 Trouble V4.Pdf
    HOW TO LOOK FOR TROUBLE A STRATFOR Guide to Protective Intelligence S t r at for Global Intelligence STRATFOR 700 Lavaca Street, Suite 900 Austin, Texas 78701 Copyright © 2010 by STRATFOR All rights reserved, including the right of reproduction in whole or in part Printed in the United States of America The contents of this book originally appeared as analyses on STRATFOR’s subscription Web site. ISBN: [?] EAN-13: [?] Publisher: Grant Perry Editor: Michael McCullar Project Coordinator: Robert Inks Designer: TJ Lensing COntenTs Introduction v ANoteonContent ix CHapter 1: PrinCiples and CHallengEs TheProblemoftheLoneWolf 1 TheSecretsofCountersurveillance 8 Threats,SituationalAwarenessandPerspective 14 IntelligenceasaProactiveTool 19 CounterterrorismFunding:OldFearsandCyclical Lulls 25 AQAP:ParadigmShiftsandLessonsLearned 31 Counterterrorism:Shiftingfromthe‘Who’tothe ‘How’ 39 Profiling:SketchingtheFaceofJihadism 46 CHapter 2: The Art of SurvEillance Surveillance:ForGood—andEvil 53 TheSpreadofTechnicalSurveillance 55 PhysicalSurveillance:TailingSomeoneontheMove 57 PhysicalSurveillance:TheArtofBlendingIn 60 TurningtheTablesonSurveillants 62 iii Table of Contents CHapter 3: Protecting People Bhutto’sDeath:FatalFactors 67 India:AKidnappingCaseStudy 70 China:SecurityAspectsoftheDalaiLama’sTravels 73 TheU.S.ElectionSeason:SecurityChallengesand ConventionalWisdom 75 Mexico:ExaminingtheCartelWarThrougha ProtectiveLens 80 Mexico:TacticalImplicationsoftheLabastida Killing 87 Mexico:TheThirdWar 89 CHapter 4: SafegUaRding Places CorporateSecurity:TheTechnologyCrutch
    [Show full text]
  • AFIO Intelligencer
    The Intelligencer Journal of U.S. Intelligence Studies Volume 26 • Number 3 • $15 single copy price Summer-Fall 2021 C O N T E N T S I. Introduction V. AFIO Business and Events Activities During the Pandemic “AFIO Now” — Videos and Podcasts “AFIO Now” Interviews ............................... 3 for members-only and the public .............. 77 II. Current Issues Scholarships, Member Statistics .................. 83 The Evolving Nature of International Relations Chapters, Officers, Activities ....................... 84 and What It Means for Intelligence Intelligence Exhibits & Tours Norman A. Bailey PhD ............................... 5 in Washington Metro Area ...................... 121 Guarding Against Politicization VI. Deaths Robert M. Gates PhD ................................... 7 Deaths in the Intelligence Community ......... 91 Domestic Intelligence - An Enigmatic Piece of the National Security Puzzle VII. Professional Reading Patrick M. Hughes, LTG (USA, Ret.) .......... 15 Reviews by Peter C. Oleson North Korean Control Systems - Insights from a Kazeta: Toxic: A History of Nerve Agents, NKIS Intelligence Officer/Defector From Nazi Germany to Putin’s Russia ............ 119 Jihyun (Amanda) Won MPS and Kim Dong-sik PhD ................................... 35 Doughty: Invading Hitler’s Europe: From Salerno to the Capture of Göring – The Memoir of a U.S. III. Historical Context Intelligence Officer ..................................... 121 A Poem for Yakov Eisenberg — A CIA Operation to Determine If a Ukrainian Company Was Storey: Beating the Nazi Invader: Hitler’s Spies, Saboteurs and Secrets in Britain, 1940 ........... 122 Delivering Missile Parts to Iran Lester Paldy ............................................. 43 Kavanagh: Hitler’s Spies: Lena and the Prelude to Operation Sealion .................... 122 IV. Professional Insights When Intelligence Made a Difference - Assorted Books on China and Chinese Espionage ................................ 124 Part VI Intro — Peter Oleson ....................
    [Show full text]
  • Archaic and Classical Cult Statues in Greece
    ARCHAIC AND CLASSICAL CULT STATUES IN GREECE THE SETTING AND DISPLAY OF CULT IMAGES IN THE ARCHAIC AND CLASSICAL PERIODS IN GREECE By SHERR! DAWSON, B.A. A Thesis Submitted to the School of Graduate Studies In Partial Fulfilment of the Requirements For the Degree Master of Arts McMaster Uni versity © Copyright by Sherri Dawson, June 2002 MASTER OF ARTS (2002) McMaster University (Classical Studies) Hamilton, Ontario TITLE: The Setting and Display of Cult Images in the Archaic and Classical Peri ods in Greece. AUTHOR: Sherri Dawson, B. A. (Uni versity of Alberta) SUPERVISOR: Dr. Gretchen Umholtz NUMBER OF PAGES: xii, 257. 11 ABSTRACT The focus of this thesis is on ancient archaic and classical Greek cult statues and how their placement reflects both the role of the statues themselves and the continuity in worship. Greek sanctuaries generally exhibited a strong continuity of cult in terms of building successive temples directly on top of the remains of their predecessors. The sanctuary of Hera on Samos and the sanctuary of Apollo at Didyma are two such sanctuaries in Asia Minor that exhibit this type of continuity even though their early temples were replaced by large superstructures. The temple of Athena Nike in Athens is another example of continuity, since the larger Classical temple was built on the same site as the archaic one. The Athenian Parthenon, the temple of Zeus at Olympia, the Classical Heraion at Argos and the Classical temple of Dionysos on the south slope in Athens, however, were not built on the same site as the archaic temples.
    [Show full text]