AFIO Intelligencer

Total Page:16

File Type:pdf, Size:1020Kb

AFIO Intelligencer The Intelligencer Journal of U.S. Intelligence Studies Volume 26 • Number 3 • $15 single copy price Summer-Fall 2021 C O N T E N T S I. Introduction V. AFIO Business and Events Activities During the Pandemic “AFIO Now” — Videos and Podcasts “AFIO Now” Interviews ............................... 3 for members-only and the public .............. 77 II. Current Issues Scholarships, Member Statistics .................. 83 The Evolving Nature of International Relations Chapters, Officers, Activities ....................... 84 and What It Means for Intelligence Intelligence Exhibits & Tours Norman A. Bailey PhD ............................... 5 in Washington Metro Area ...................... 121 Guarding Against Politicization VI. Deaths Robert M. Gates PhD ................................... 7 Deaths in the Intelligence Community ......... 91 Domestic Intelligence - An Enigmatic Piece of the National Security Puzzle VII. Professional Reading Patrick M. Hughes, LTG (USA, Ret.) .......... 15 Reviews by Peter C. Oleson North Korean Control Systems - Insights from a Kazeta: Toxic: A History of Nerve Agents, NKIS Intelligence Officer/Defector From Nazi Germany to Putin’s Russia ............ 119 Jihyun (Amanda) Won MPS and Kim Dong-sik PhD ................................... 35 Doughty: Invading Hitler’s Europe: From Salerno to the Capture of Göring – The Memoir of a U.S. III. Historical Context Intelligence Officer ..................................... 121 A Poem for Yakov Eisenberg — A CIA Operation to Determine If a Ukrainian Company Was Storey: Beating the Nazi Invader: Hitler’s Spies, Saboteurs and Secrets in Britain, 1940 ........... 122 Delivering Missile Parts to Iran Lester Paldy ............................................. 43 Kavanagh: Hitler’s Spies: Lena and the Prelude to Operation Sealion .................... 122 IV. Professional Insights When Intelligence Made a Difference - Assorted Books on China and Chinese Espionage ................................ 124 Part VI Intro — Peter Oleson ..................... 49 • Doctor Jameson’s Raid – Alex Vermeulen 51 Higgins: We Are Bellingcat: Global Crime, • First Battle of Bull Run: A First On-line Sleuths, and the Bold Future of News .... 126 in Many Ways – Greg Elder ................ 55 Review by David Chambers • The Karakol Organization and the Lynn: Where Is Juliet Stuart Poyntz?: Turkish War of Independence, 1919-1922 Gender, Spycraft, and Anti-Stalinism – Evren Altinkas PhD .......................... 61 in the Early Cold War ................................. 128 • Preparation for Operation Torch – Robert Girod JD PhD ....................... 67 New Books in Brief ................................... 129 • Denial and Deception in the Indian Nuclear Test Blogs, Newsletters, Podcasts of Interest ..... 131 – Robert M. Clark JD PhD ................... 73 Publication Watchdog – Forthcoming, On the Horizon, Under Contract, or Announced ....................................... 134 This issue is dedicated to the brave officers and agents whose obituaries begin on page 91. Summer-Fall 2021 Intelligencer: Journal of U.S. Intelligence Studies Page 1 The Intelligencer Journal of U.S. Intelligence Studies Volume 26 • Number 2 • $15 single copy price Winter-Spring 2021 C O N T E N T S I. Introduction V. Deaths Activities During the Long Pandemic Deaths in the Intelligence Community ......... 89 “AFIO Now” Interviews, Chapter Forums, VI. AFIO Business and Events Enhanced Social Media Engagement .......... 3 Letters, Scholarships, Member Statistics .... 115 II. Current Issues Chapters, Officers, Activities ..................... 116 Wet Affairs, Part III — Russia’s Assassination Intelligence Exhibits & Tours Pandemic in Washington Metro Area ...................... 122 Peter Oleson ............................................. 5 The Cooperating Scientist — Counterintelligence VII. Professional Reading Resource in a Time of Pandemic Reviews by Peter C. Oleson Lester Paldy ............................................. 25 Reassessing Edward Snowden — Whistleblower? Shimer: Rigged: America, Russia, Traitor? or Spy? and One Hundred Years of Covert Peter Oleson ............................................. 31 Electoral Interference .................................. 123 III. Historical Context Taub: Big Dirty Money: The Shocking Injustice and Unseen Cost of White Collar Crime ........... 125 Terror in Athens: Remembering Station Chief Wells: Between Five Eyes: 50 Years of Dick Welch Intelligence Sharing ................................... 125 Samantha Randazzo Childress and Carol “Rollie” Flynn ................................ 37 Vuving: Hindsight, Insight, Foresight: Agnes Smedley — Singular Woman, Thinking About Security in the Indo-Pacific ..... 126 Exceptional Spy Toll: Twilight of the Gods: War in the Bob Bergin .............................................. 47 Western Pacific, 1944-45 ........................... 128 IV. Professional Insights New Books in Brief ................................... 131 When Intelligence Made a Difference - Publication Watchdog – Forthcoming, Part V Intro — Peter Oleson ....................... 65 On the Horizon, Under Contract, • Soviet Deception and the Cuban Missile Crisis or Announced ....................................... 136 — Robert M. Clark ............................. 67 • Occasionem Cognosce — Francis Cabot Lowell — Joel Wickwire ............................... 71 • The Seizure of Danang City Hall — Jim Schnell PhD ............................ 75 • The Breaking of JN-25 and its Impact in the War Against Japan — Peter C. Oleson .............................. 79 • Developing a Cooperative Strategy in the El Salvador Civil War — John Fishel .... 85 This issue is dedicated to the brave officers and agents whose obituaries begin on page 89. Winter-Spring 2021 Intelligencer: Journal of U.S. Intelligence Studies Page 1 The Intelligencer Journal of U.S. Intelligence Studies Volume 26 • Number 1 • $15 single copy price Fall 2020 C O N T E N T S I. Introduction V. Deaths Election Threats — Two Statements Deaths in the Intelligence Community ......... 61 William Evanina, NCSC Director ................ 3 VI. AFIO Business and Events II. Current Issues Letters, Scholarships, Member Statistics ...... 95 Espionage During a Pandemic: Collection, Chapters, Officers, Activities ....................... 96 Analysis, and Counterintelligence Implications Intelligence Exhibits & Tours of COVID-19 in Washington Metro Area ...................... 100 Edward Mickolus ...................................... 7 Chinese Offensive Intelligence Operations VII. Professional Reading Peter Oleson ............................................... 9 Dead Doubles Cyber Intelligence and the Private Sector Review by Raymond J. Batvinis ................ 101 Al Lewis .................................................. 13 Reviews by Peter C. Oleson U.S. Domestic Security—Establishing a U.S. Belton’s Putin’s People: How the KGB Domestic Security Service Modeled on MI-5 Took Back Russia and Then Took on the West ... 103 Anthony Fratini ....................................... 19 Mattis and Brazil’s Chinese Communist Espionage: An Intelligence Primer and Faligot’s III. Historical Context Chinese Spies—From Chairman Mao to Intelligence Support to Arms control—The Bomber Xi Jinping ................................................ 109 Gap 1955 - Sputnik I 1957 - The Missile Gap 1958 Clark’s Geospatial Intelligence: Origins and Evan Hineman ......................................... 27 Evolution ................................................ 112 The Top Secret Story of Coast Guard Code Breaking Otis’s True or False – A CIA Analyst’s Guide Michael Bennett ...................................... 31 to Spotting FAKE NEWS ............................. 113 Gellman’s Dark Mirror: Edward Snowden IV. Professional Insights and the American Surveillance State ............... 115 Larson’s The Splendid and the Vile: When Intelligence Made a Difference - A Saga of Churchill, Family, and Defiance Part IV Intro — Peter Oleson ..................... 33 During the Blitz ........................................ 117 • The Doolittle Raid — Peter Oleson ................................. 35 New Books in Brief ................................... 119 • Dismantling 17 November Intelligence and Terrorism Themes — Maria (Mary) Papageorgiou ............ 41 in Documentaries, TV, and Movies • Stuxnet Compiled by Allen Read ......................... 123 — Al Lewis ....................................... 45 Publication Watchdog – Forthcoming, • William Weisband — Naiomi Gonzalez .. 49 On the Horizon, Under Contract, • The First Victory—The Duquesne Spy Ring or Announced ....................................... 128 — Raymond J. Batvinis ....................... 53 • The 1947 Pukhtoon Invasion of Jammu and Kashmir and India’s ‘Prescience’ — Christopher Snedden ..................... 57 This issue is dedicated to the brave officers and agents whose obituaries begin on page 61. Fall 2020 Intelligencer: Journal of U.S. Intelligence Studies Page 1 The Intelligencer Journal of U.S. Intelligence Studies Volume 25 • Number 3 • $15 single copy price Winter-Spring 2020 C O N T E N T S I. Introduction V. Deaths Infectious Disease and National Security — Deaths in the Intelligence Community ......... 61 Strategic Information Needs VI. AFIO Business and Events Gary Cecchine and Melinda Moore ............. 3 Recent AFIO National Events ....................... 79 II. Current Issues Scholarships, Member Statistics .................. 84 The Theory and Practice
Recommended publications
  • Trends Toward Real-Time Network Data Steganography
    TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY James Collins, Sos Agaian Department of Electrical and Computer Engineering The University of Texas at San Antonio, San Antonio, Texas, USA [email protected], [email protected] Abstract Network steganography has been a well-known covert data channeling method for over three decades. The basic set of techniques and implementation tools have not changed significantly since their introduction in the early 1980’s. In this paper, we review the predominant methods of classical network steganography, describing the detailed operations and resultant challenges involved in embedding data in the network transport domain. We also consider the various cyber threat vectors of network steganography and point out the major differences between classical network steganography and the widely known end-point multimedia embedding techniques, which focus exclusively on static data modification for data hiding. We then challenge the security community by introducing an entirely new network data hiding methodology, which we refer to as real-time network data steganography. Finally, we provide the groundwork for this fundamental change of covert network data embedding by introducing a system-level implementation for real-time network data operations that will open the path for even further advances in computer network security. KEYWORDS Network Steganography, Real-time Networking, TCP/IP Communications, Network Protocols 1. INTRODUCTION Even though the origins of steganography reach back to the time of ancient Greece, to Herodotus in 440 BC, the art of steganography continues to evolve. This is especially true in the technical methods of digital embedding [1][2]. Digital steganography has been used since the early 1980’s and network steganography techniques quickly evolved with the advent of the Internet and standardized multimedia formats used for data exchange [3].
    [Show full text]
  • Allen W. Dulles and the CIA
    THE GILDED AGE Allen W. Dulles and the CIA Allen W. Dulles spent his tenure as the Director of Central Intelligence (DCI) entrenched in secret power struggles that would ensure his ultimate power over the foreign and domestic aff airs for the United States. Th roughout his childhood, Dulles learned to use political power in order to get ahead, and to use secrecy to make unilateral deci- sions. Aft er analyzing examples of his treatment of various foreign aff airs disasters, as well as his manipulation of American media and politicians, Dulles is exposed as a man whose legacy lives in the CIA, as a legendary fi gure who is in fact much more of a craft ed legend than a man of truth. By Sada O. Stewart ‘16 Princeton University of the CIA’s own making, the product of the publicity and the political propaganda Allen Dulles manufactured in the 1950s.”4 How, though, did Dulles craft a fl awless, genius im- age for the CIA? What methods did Dulles use to manipulate the press, the public, and even the other branches of govern- ment to bring forth an agency with “a great reputation and a terrible record?”5 Dulles made the CIA seem like an elite agency full of top agents resulting in high risk, high reward missions—how is this reconciled with the reality of the CIA under Dulles’ reign? INTELLIGENCE IN YOUTH To begin, it is vital to identify the signifi cance of developing and running an intelligence agency in an open democratic system.6 Sun Tzu, author of Th e Art of War, insists the best A Bas-relief of Allen Dulles at the Original Headquarters of (only) way to fi ght a war is to know the enemy.
    [Show full text]
  • The Role of Allen Dulles in Us Policy Discussions on Latin America, 1953-611
    THE PRAGMATIC FACE OF THE COVERT IDEALIST: THE ROLE OF ALLEN DULLES IN US POLICY DISCUSSIONS ON LATIN AMERICA, 1953-611 Assessments of the CIA’s role in Latin America during the 1950s have tended to focus predominantly on the twin case-studies of Guatemala and Cuba. Consequently, the Agency’s role – and, more broadly, that of its head Allen Dulles – has come to be seen as one obsessed with covert action and relatively unimportant in terms of policy discussions. Dulles, in fact, has been portrayed as an unwilling and disinterested participant in policy discussions. The present article will challenge those assertions by suggesting that, by examining Dulles’s role in the Eisenhower administration’s discussions on Latin America, a different picture emerges – one that paints Dulles as an active and rational participant, and which raises important questions for our understanding of the CIA’s role during the Eisenhower era. ‘In the 1950s’, writes Greg Grandin in describing the Central Intelligence Agency’s role in Guatemala in 1954, ‘the Cold War was often presented as a battle of ideas, yet CIA agents on the ground didn’t see it that way’…they insisted ‘on a strategy intended to inspire fear more than virtue.’2 Grandin’s view – along with the widely held perception among many non- specialists that the 1950s served as a form of ‘golden age’ for the CIA – has come to dominate historical, and indeed cultural, representations of the Agency’s role in the early- Cold War era. During the period when Dwight D. Eisenhower was president and Allen Dulles was the Director of Central Intelligence (DCI), it is commonly held, the CIA enjoyed a position of unparalleled success in US foreign policy.
    [Show full text]
  • SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM
    SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM HEINEMANN: AUSTRALIA First published in 1987 by HEINEMANN PUBLISHERS AUSTRALIA (A division of Octopus Publishing Group/Australia Pty Ltd) 85 Abinger Street, Richmond, Victoria, 3121. Copyright (c) 1987 by Peter Wright ISBN 0-85561-166-9 All Rights Reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. TO MY WIFE LOIS Prologue For years I had wondered what the last day would be like. In January 1976 after two decades in the top echelons of the British Security Service, MI5, it was time to rejoin the real world. I emerged for the final time from Euston Road tube station. The winter sun shone brightly as I made my way down Gower Street toward Trafalgar Square. Fifty yards on I turned into the unmarked entrance to an anonymous office block. Tucked between an art college and a hospital stood the unlikely headquarters of British Counterespionage. I showed my pass to the policeman standing discreetly in the reception alcove and took one of the specially programmed lifts which carry senior officers to the sixth-floor inner sanctum. I walked silently down the corridor to my room next to the Director-General's suite. The offices were quiet. Far below I could hear the rumble of tube trains carrying commuters to the West End. I unlocked my door. In front of me stood the essential tools of the intelligence officer’s trade - a desk, two telephones, one scrambled for outside calls, and to one side a large green metal safe with an oversized combination lock on the front.
    [Show full text]
  • Open Hearing: Nomination of Gina Haspel to Be the Director of the Central Intelligence Agency
    S. HRG. 115–302 OPEN HEARING: NOMINATION OF GINA HASPEL TO BE THE DIRECTOR OF THE CENTRAL INTELLIGENCE AGENCY HEARING BEFORE THE SELECT COMMITTEE ON INTELLIGENCE OF THE UNITED STATES SENATE ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION WEDNESDAY, MAY 9, 2018 Printed for the use of the Select Committee on Intelligence ( Available via the World Wide Web: http://www.govinfo.gov U.S. GOVERNMENT PUBLISHING OFFICE 30–119 PDF WASHINGTON : 2018 VerDate Sep 11 2014 14:25 Aug 20, 2018 Jkt 030925 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 C:\DOCS\30119.TXT SHAUN LAP51NQ082 with DISTILLER SELECT COMMITTEE ON INTELLIGENCE [Established by S. Res. 400, 94th Cong., 2d Sess.] RICHARD BURR, North Carolina, Chairman MARK R. WARNER, Virginia, Vice Chairman JAMES E. RISCH, Idaho DIANNE FEINSTEIN, California MARCO RUBIO, Florida RON WYDEN, Oregon SUSAN COLLINS, Maine MARTIN HEINRICH, New Mexico ROY BLUNT, Missouri ANGUS KING, Maine JAMES LANKFORD, Oklahoma JOE MANCHIN III, West Virginia TOM COTTON, Arkansas KAMALA HARRIS, California JOHN CORNYN, Texas MITCH MCCONNELL, Kentucky, Ex Officio CHUCK SCHUMER, New York, Ex Officio JOHN MCCAIN, Arizona, Ex Officio JACK REED, Rhode Island, Ex Officio CHRIS JOYNER, Staff Director MICHAEL CASEY, Minority Staff Director KELSEY STROUD BAILEY, Chief Clerk (II) VerDate Sep 11 2014 14:25 Aug 20, 2018 Jkt 030925 PO 00000 Frm 00002 Fmt 5904 Sfmt 5904 C:\DOCS\30119.TXT SHAUN LAP51NQ082 with DISTILLER CONTENTS MAY 9, 2018 OPENING STATEMENTS Burr, Hon. Richard, Chairman, a U.S. Senator from North Carolina ................ 1 Warner, Mark R., Vice Chairman, a U.S. Senator from Virginia ........................ 3 WITNESSES Chambliss, Saxby, former U.S.
    [Show full text]
  • Dragon Magazine Within the Last Cherie Knull Tually Has Been with Us Since Last October, Year
    January 1981 Dragon 1 Dragon Vol. V, No. 7 Vol. V, No. 7 January 1981 Publisher. E. Gary Gygax Editor. Jake Jaquet Assistant editor. Kim Mohan Good-bye 1980, hello 1981. And hello to a tain aspects of role-playing and the benefits Editorial staff . Bryce Knorr couple of new (and pretty, I might add, if I derived therefrom. He and his wife, who is Marilyn Mays won’t get accused of sexism) faces here at the typist and a behind-the-scenes collab- Sales & Circulation . Debbie Chiusano Dragon Publishing. New, or at least rela- orator, have been responsible for more Corey Koebernick tively new, to our sales and circulation de- than a dozen short articles and stories pub- Office staff . Dawn Pekul partment is Debbie Chiusano—Debbie ac- lished in Dragon magazine within the last Cherie Knull tually has been with us since last October, year. Roger’s name is on the alchemist and Roger Raupp but this has been our first opportunity to astrologer NPC articles in this issue, and in Contributing editors . Roger Moore formally welcome her in print. The most Dragon issue #44 he became the first Ed Greenwood recent addition to our organization is author to have two creatures featured in Marilyn Mays, added just last month to our Dragon’s Bestiary in the same magazine. editorial staff. Let’s hear it for the new kids This month’s contributing artists: on the block! With the start of a new year, it seems appro- Morrissey Jeff Lanners priate to reflect a bit on the past year and Roger Raupp Kenneth Rahman We’re also happy to welcome two other look ahead a little to the future.
    [Show full text]
  • Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Case Log October 2000 - April 2002
    Description of document: Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Case Log October 2000 - April 2002 Requested date: 2002 Release date: 2003 Posted date: 08-February-2021 Source of document: Information and Privacy Coordinator Central Intelligence Agency Washington, DC 20505 Fax: 703-613-3007 Filing a FOIA Records Request Online The governmentattic.org web site (“the site”) is a First Amendment free speech web site and is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. 1 O ct 2000_30 April 2002 Creation Date Requester Last Name Case Subject 36802.28679 STRANEY TECHNOLOGICAL GROWTH OF INDIA; HONG KONG; CHINA AND WTO 36802.2992 CRAWFORD EIGHT DIFFERENT REQUESTS FOR REPORTS REGARDING CIA EMPLOYEES OR AGENTS 36802.43927 MONTAN EDWARD GRADY PARTIN 36802.44378 TAVAKOLI-NOURI STEPHEN FLACK GUNTHER 36810.54721 BISHOP SCIENCE OF IDENTITY FOUNDATION 36810.55028 KHEMANEY TI LEAF PRODUCTIONS, LTD.
    [Show full text]
  • Intelligence Community Presidentially Appointed Senate Confirmed Officials (PAS) During the Administrations of Presidents George W
    Intelligence Community Presidentially Appointed Senate Confirmed Officials (PAS) During the Administrations of Presidents George W. Bush, Barack H. Obama, and Donald J. Trump: In Brief May 24, 2021 Congressional Research Service https://crsreports.congress.gov R46798 Intelligence Community Presidentially Appointed Senate Confirmed Officials (PAS) Contents Introduction ..................................................................................................................................... 1 Methodology ................................................................................................................................... 2 Tables Table 1. George W. Bush Administration-era Nominees for IC PAS Positions............................... 2 Table 2. Obama Administration-era Nominees for IC PAS Positions ............................................. 5 Table 3. Trump Administration Nominees for IC PAS Positions .................................................... 7 Contacts Author Information ........................................................................................................................ 10 Congressional Research Service Intelligence Community Presidentially Appointed Senate Confirmed Officials (PAS) Introduction This report provides three tables that list the names of those who have served in presidentially appointed, Senate-confirmed (PAS) positions in the Intelligence Community (IC) during the last twenty years. It provides a comparative perspective of both those holding IC PAS positions who have
    [Show full text]
  • The Ethics of Intelligence Collection Ross W. Bellaby
    What’s the Harm? The Ethics of Intelligence Collection Ross W. Bellaby Thesis submitted in fulfilment of the requirements for the degree of PhD Department of International Politics Aberystwyth University June 13th, 2011 DECLARATION This work has not previously been accepted in substance for any degree and is not being concurrently submitted in candidature for any degree. Signed ...................................................................... (Ross W. Bellaby) Date ........................................................................ STATEMENT 1 This thesis is the result of my own investigations, except where otherwise stated. Where *correction services have been used, the extent and nature of the correction is clearly marked in a footnote(s). Other sources are acknowledged by footnotes giving explicit references. A bibliography is appended. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ [*this refers to the extent to which the text has been corrected by others] STATEMENT 2 I hereby give consent for my thesis, if accepted, to be available for photocopying and for inter- library loan, and for the title and summary to be made available to outside organisations. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ I hereby give consent for my thesis, if accepted, to be available for photocopying
    [Show full text]
  • Operation Sunrise: America's OSS, Swiss Intelligence, and the German Surrender 1945
    Swiss American Historical Society Review Volume 52 Number 1 Article 3 2-2016 Operation Sunrise: America's OSS, Swiss Intelligence, and the German Surrender 1945 Stephen P. Halbrook Follow this and additional works at: https://scholarsarchive.byu.edu/sahs_review Part of the European History Commons, and the European Languages and Societies Commons Recommended Citation Halbrook, Stephen P. (2016) "Operation Sunrise: America's OSS, Swiss Intelligence, and the German Surrender 1945," Swiss American Historical Society Review: Vol. 52 : No. 1 , Article 3. Available at: https://scholarsarchive.byu.edu/sahs_review/vol52/iss1/3 This Article is brought to you for free and open access by BYU ScholarsArchive. It has been accepted for inclusion in Swiss American Historical Society Review by an authorized editor of BYU ScholarsArchive. For more information, please contact [email protected], [email protected]. Halbrook: Operation Sunrise Operation Sunrise: America's OSS, Swiss Intelligence, and the German Surrender 1945 by Stephen P. Halbrook* Operation Sunrise was a cooperative effort of American and Swiss intelligence services which led to the unconditional surrender of the German Wehrmacht forces in Northern Italy and Western Austria on May 2, 1945. General Heinrich von Yietinghoff, Commander-in­ Chief of the Southwest Command and of Army Group C, surrendered nearly a million soldiers, the strongest remaining German force. This was the first great surrender of German forces to the Allies, and became a strong impetus for the final Allied victory over Nazi Germany on May 8, Victory in Europe (YE) Day. Operation Sunrise helped to nip in the bud Nazi aspirations for guerilla resistance in an Alpine redoubt.
    [Show full text]
  • Cryptography
    Cryptography From Wikipedia, the free encyclopedia Jump to: navigation, search "Secret code" redirects here. For the Aya Kamiki album, see Secret Code. German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφ, gráph, "writing", or -λογία, -logia, respectively)[1] is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to nonsense. The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it. Since WWI and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread. Alongside the advancement in cryptology-related technology, the practice has raised a number of legal issues, some of which remain unresolved. Contents [hide] • 1 Terminology • 2 History of cryptography and cryptanalysis o 2.1 Classic cryptography o 2.2 The computer era • 3 Modern cryptography o 3.1 Symmetric-key cryptography o 3.2 Public-key cryptography o 3.3 Cryptanalysis o 3.4 Cryptographic primitives o 3.5 Cryptosystems • 4 Legal issues o 4.1 Prohibitions o 4.2 Export controls o 4.3 NSA involvement o 4.4 Digital rights management • 5 See also • 6 References • 7 Further reading • 8 External links [edit] Terminology Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext).[2] Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext.
    [Show full text]
  • Darpa Starts Sleuthing out Disloyal Troops
    UNCLASSIFIED (U) FBI Tampa Division CI Strategic Partnership Newsletter JANUARY 2012 (U) Administrative Note: This product reflects the views of the FBI- Tampa Division and has not been vetted by FBI Headquarters. (U) Handling notice: Although UNCLASSIFIED, this information is property of the FBI and may be distributed only to members of organizations receiving this bulletin, or to cleared defense contractors. Precautions should be taken to ensure this information is stored and/or destroyed in a manner that precludes unauthorized access. 10 JAN 2012 (U) The FBI Tampa Division Counterintelligence Strategic Partnership Newsletter provides a summary of previously reported US government press releases, publications, and news articles from wire services and news organizations relating to counterintelligence, cyber and terrorism threats. The information in this bulletin represents the views and opinions of the cited sources for each article, and the analyst comment is intended only to highlight items of interest to organizations in Florida. This bulletin is provided solely to inform our Domain partners of news items of interest, and does not represent FBI information. In the JANUARY 2012 Issue: Article Title Page NATIONAL SECURITY THREAT NEWS FROM GOVERNMENT AGENCIES: American Jihadist Terrorism: Combating a Complex Threat p. 2 Authorities Uncover Increasing Number of United States-Based Terror Plots p. 3 Chinese Counterfeit COTS Create Chaos For The DoD p. 4 DHS Releases Cyber Strategy Framework p. 6 COUNTERINTELLIGENCE/ECONOMIC ESPIONAGE THREAT ITEMS FROM THE PRESS: United States Homes In on China Spying p. 6 Opinion: China‟s Spies Are Catching Up p. 8 Canadian Politician‟s Chinese Crush Likely „Sexpionage,‟ Former Spies Say p.
    [Show full text]