Ike and His Spies in The
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Massive Retaliation Charles Wilson, Neil Mcelroy, and Thomas Gates 1953-1961
Evolution of the Secretary of Defense in the Era of MassiveSEPTEMBER Retaliation 2012 Evolution of the Secretary OF Defense IN THE ERA OF Massive Retaliation Charles Wilson, Neil McElroy, and Thomas Gates 1953-1961 Special Study 3 Historical Office Office of the Secretary of Defense Cold War Foreign Policy Series • Special Study 3 Evolution of the Secretary of Defense in the Era of Massive Retaliation Evolution of the Secretary of Defense in the Era of Massive Retaliation Charles Wilson, Neil McElroy, and Thomas Gates 1953-1961 Cover Photos: Charles Wilson, Neil McElroy, Thomas Gates, Jr. Source: Official DoD Photo Library, used with permission. Cover Design: OSD Graphics, Pentagon. Cold War Foreign Policy Series • Special Study 3 Evolution of the Secretary of Defense in the Era of Massive Retaliation Evolution of the Secretary OF Defense IN THE ERA OF Massive Retaliation Charles Wilson, Neil McElroy, and Thomas Gates 1953-1961 Special Study 3 Series Editors Erin R. Mahan, Ph.D. Chief Historian, Office of the Secretary of Defense Jeffrey A. Larsen, Ph.D. President, Larsen Consulting Group Historical Office Office of the Secretary of Defense September 2012 ii iii Cold War Foreign Policy Series • Special Study 3 Evolution of the Secretary of Defense in the Era of Massive Retaliation Contents Opinions, conclusions, and recommendations expressed or implied within are solely those of the authors and do not necessarily represent the views of the Department of Defense, the Historical Office of the Office of Foreword..........................................vii the Secretary of Defense, Larsen Consulting Group, or any other agency of the Federal Government. Executive Summary...................................ix Cleared for public release; distribution unlimited. -
Peacetime Espionage, International Law and the Existence of Customary Exceptions I˜Naki Navarrete† & Russell Buchan‡
\\jciprod01\productn\C\CIN\51-4\CIN403.txt unknown Seq: 1 8-APR-19 15:07 Out of the Legal Wilderness: Peacetime Espionage, International Law and the Existence of Customary Exceptions I˜naki Navarrete† & Russell Buchan‡ This Article demonstrates that peacetime espionage does not benefit from permissive customary international law exceptions. The mainstream view contends that, though peacetime espionage may contravene interna- tional law, developments in customary international law (CIL) nevertheless undercut State responsibility for such conduct. The gist of this view is that acts of espionage benefit from permissive CIL exceptions because its prac- tice is widespread and accepted within the international society. However, the mainstream literature has rarely— if ever— meaningfully engaged with the practice of espionage in an effort to tease out the objective and subjec- tive elements supportive of customary espionage exceptions. This Article closes this gap and debunks the mainstream view. We show that, although widespread, most acts of espionage are committed in secret and, as such, they cannot qualify as State practice for the purpose of CIL formation. We further demonstrate that States have failed to issue expressions of the sub- jective element in support of customary espionage exceptions. We con- clude by suggesting that, while States are entitled to develop customary espionage exceptions in the future, for now they have yet to come out of the legal wilderness. Introduction ..................................................... 898 R I. International Law and Peacetime Espionage............... 901 R A. Principle of Territorial Sovereignty ..................... 905 R B. Law of the Sea ........................................ 909 R C. Diplomatic and Consular Law ......................... 910 R II. Customary Exceptions and Peacetime Espionage ......... -
How Should the United States Confront Soviet Communist Expansionism? DWIGHT D
Advise the President: DWIGHT D. EISENHOWER How Should the United States Confront Soviet Communist Expansionism? DWIGHT D. EISENHOWER Advise the President: DWIGHT D. EISENHOWER Place: The Oval Office, the White House Time: May 1953 The President is in the early months of his first term and he recognizes Soviet military aggression and the How Should the subsequent spread of Communism as the greatest threat to the security of the nation. However, the current costs United States of fighting Communism are skyrocketing, presenting a Confront Soviet significant threat to the nation’s economic well-being. President Eisenhower is concerned that the costs are not Communist sustainable over the long term but he believes that the spread of Communism must be stopped. Expansionism? On May 8, 1953, President Dwight D. Eisenhower has called a meeting in the Solarium of the White House with Secretary of State John Foster Dulles and Treasury Secretary George M. Humphrey. The President believes that the best way to craft a national policy in a democracy is to bring people together to assess the options. In this meeting the President makes a proposal based on his personal decision-making process—one that is grounded in exhaustive fact gathering, an open airing of the full range of viewpoints, and his faith in the clarifying qualities of energetic debate. Why not, he suggests, bring together teams of “bright young fellows,” charged with the mission to fully vet all viable policy alternatives? He envisions a culminating presentation in which each team will vigorously advocate for a particular option before the National Security Council. -
AIR POWER History / WINTER 2015 from the Editor
WINTER 2015 - Volume 62, Number 4 WWW.AFHISTORICALFOUNDATION.ORG The Air Force Historical Foundation Founded on May 27, 1953 by Gen Carl A. “Tooey” Spaatz MEMBERSHIP BENEFITS and other air power pioneers, the Air Force Historical All members receive our exciting and informative Foundation (AFHF) is a nonprofi t tax exempt organization. Air Power History Journal, either electronically or It is dedicated to the preservation, perpetuation and on paper, covering: all aspects of aerospace history appropriate publication of the history and traditions of American aviation, with emphasis on the U.S. Air Force, its • Chronicles the great campaigns and predecessor organizations, and the men and women whose the great leaders lives and dreams were devoted to fl ight. The Foundation • Eyewitness accounts and historical articles serves all components of the United States Air Force— Active, Reserve and Air National Guard. • In depth resources to museums and activities, to keep members connected to the latest and AFHF strives to make available to the public and greatest events. today’s government planners and decision makers information that is relevant and informative about Preserve the legacy, stay connected: all aspects of air and space power. By doing so, the • Membership helps preserve the legacy of current Foundation hopes to assure the nation profi ts from past and future US air force personnel. experiences as it helps keep the U.S. Air Force the most modern and effective military force in the world. • Provides reliable and accurate accounts of historical events. The Foundation’s four primary activities include a quarterly journal Air Power History, a book program, a • Establish connections between generations. -
The Ethics of Intelligence Collection Ross W. Bellaby
What’s the Harm? The Ethics of Intelligence Collection Ross W. Bellaby Thesis submitted in fulfilment of the requirements for the degree of PhD Department of International Politics Aberystwyth University June 13th, 2011 DECLARATION This work has not previously been accepted in substance for any degree and is not being concurrently submitted in candidature for any degree. Signed ...................................................................... (Ross W. Bellaby) Date ........................................................................ STATEMENT 1 This thesis is the result of my own investigations, except where otherwise stated. Where *correction services have been used, the extent and nature of the correction is clearly marked in a footnote(s). Other sources are acknowledged by footnotes giving explicit references. A bibliography is appended. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ [*this refers to the extent to which the text has been corrected by others] STATEMENT 2 I hereby give consent for my thesis, if accepted, to be available for photocopying and for inter- library loan, and for the title and summary to be made available to outside organisations. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ I hereby give consent for my thesis, if accepted, to be available for photocopying -
Cryptography
Cryptography From Wikipedia, the free encyclopedia Jump to: navigation, search "Secret code" redirects here. For the Aya Kamiki album, see Secret Code. German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφ, gráph, "writing", or -λογία, -logia, respectively)[1] is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to nonsense. The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it. Since WWI and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread. Alongside the advancement in cryptology-related technology, the practice has raised a number of legal issues, some of which remain unresolved. Contents [hide] • 1 Terminology • 2 History of cryptography and cryptanalysis o 2.1 Classic cryptography o 2.2 The computer era • 3 Modern cryptography o 3.1 Symmetric-key cryptography o 3.2 Public-key cryptography o 3.3 Cryptanalysis o 3.4 Cryptographic primitives o 3.5 Cryptosystems • 4 Legal issues o 4.1 Prohibitions o 4.2 Export controls o 4.3 NSA involvement o 4.4 Digital rights management • 5 See also • 6 References • 7 Further reading • 8 External links [edit] Terminology Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext).[2] Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext. -
Aerial Survellance-Reconnaisance Field Army
<3 # / FM 30-20 DEP/KRTMENT OF THE ARMY FIELD MANUAL SURVEILLANCE NAISSANCE ARMY ^SHINGTONXC K1££ orti HEADQUARTERS, DEPARTMENT DiF THE ARMY APRIL 1969 TAGO 7075A # 9 * *FM 30-20 FIELD MANUAL HEADQUARTERS DEPARTMENT OF THE ARMY No. 30-20 WASHINGTON, D.C., 25 April 1969 AERIAL SURVEILLANCE-RECONNAISSANCE, FIELD ARMY Paragraph Page CHAPTER 1. INTRODUCTION 1-1—1-4 1-1 2. G2 AIR ORGANIZATION AND FUNCTIONS Section I. Organization 2-1 2-1 2-1 II. Functions 2-3, 3-4 2-1 CHAPTER 3. CONCEPT OF AERIAL SURVEILLANCE AND RECONNAISSANCE EMPLOYMENT 3-1—3-6 3-1 4. AERIAL SURVEILLANCE AND RECONNAIS- SANCE MISSIONS Section I. Type missions 4_i 4_g 4-1 II. Collection means 4_7_4_n 4-2 CHAPTER 5. AERIAL SURVEILLANCE AND RECONNAIS- SANCE PLANNING, OPERATIONS, AND COORDINATION Section I. General planning 5-1—5-5 5-1 II. Specific planning 5-6, 5-7 5-4 III. Request prccedures 5-8—5-10 5- 6 IV. Aircraft and sensor capabilities 5-11,5-12 5-10 V. Operational aids 5-13—5-26 5-12 VI. Coordination 5-27—5-30 5-21 CHAPTER 6. COMMUNICATIONS 6-1—6-5 6- 1 7. MILITARY INTELLIGENCE BATTALION, AIR RECONNAISSANCE SUPPORT, FIELD ARMY Section I. Mission, organization, and functions •_ 7-1—7-3 7-1 II. Concept of employment 7_4 7_g 7-3 III. Planning and operations _ 7_9, 7-10 7-5 CHAPTER 8. AVIATION AERIAL SURVEILLANCE COMPANY Section I. Mission, organization, capabilities, and limitations __ g_i g-6 8-1 II. Command, control, and communication g_7 8-10 8-4 III. -
The Merchants of Death
THE MERCHANTS OF DEATH The Military-Industrial Complex and the Influence on Democracy Name: Miriam Collaris Student number: 387332 Erasmus University Rotterdam Master thesis: Global History & International Relations Supervisor: Prof. Wubs Date: June 12th, 2016 Merchants of Death Miriam Collaris Erasmus University Rotterdam June 12, 2016 PREFACE This is a thesis about the Military-industrial Complex in the United States of America, a subject, which has been widely discussed in the 1960s, but has moved to the background lately. I got inspired by this subject through an internship I have done in Paris in 2012. Here I was working for an event agency that organized business conventions for the defense and security sector, and in particular the aerospace industry. This was the first time I got in touch with this defense industry and this was the first moment that I realized how much money is involved in this sector. Warfare turned out to be real business. At the conventions enormous stands emerged with the most advanced combat vehicles and weaponry. These events were focused on matchmaking between various players in this sector. Hence, commercial deals were made between government agencies and the industry, which was very normal and nobody questioned this. When I read about this Military-industrial Complex, years later, I started to think about these commercial deals between government and industry and the profits that were gained. The realization that war is associated with profits, interested me in such a way that I decided to write my master -
BATTLE-SCARRED and DIRTY: US ARMY TACTICAL LEADERSHIP in the MEDITERRANEAN THEATER, 1942-1943 DISSERTATION Presented in Partial
BATTLE-SCARRED AND DIRTY: US ARMY TACTICAL LEADERSHIP IN THE MEDITERRANEAN THEATER, 1942-1943 DISSERTATION Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of The Ohio State University By Steven Thomas Barry Graduate Program in History The Ohio State University 2011 Dissertation Committee: Dr. Allan R. Millett, Adviser Dr. John F. Guilmartin Dr. John L. Brooke Copyright by Steven T. Barry 2011 Abstract Throughout the North African and Sicilian campaigns of World War II, the battalion leadership exercised by United States regular army officers provided the essential component that contributed to battlefield success and combat effectiveness despite deficiencies in equipment, organization, mobilization, and inadequate operational leadership. Essentially, without the regular army battalion leaders, US units could not have functioned tactically early in the war. For both Operations TORCH and HUSKY, the US Army did not possess the leadership or staffs at the corps level to consistently coordinate combined arms maneuver with air and sea power. The battalion leadership brought discipline, maturity, experience, and the ability to translate common operational guidance into tactical reality. Many US officers shared the same ―Old Army‖ skill sets in their early career. Across the Army in the 1930s, these officers developed familiarity with the systems and doctrine that would prove crucial in the combined arms operations of the Second World War. The battalion tactical leadership overcame lackluster operational and strategic guidance and other significant handicaps to execute the first Mediterranean Theater of Operations campaigns. Three sets of factors shaped this pivotal group of men. First, all of these officers were shaped by pre-war experiences. -
Jungle Operations International Course – Guidelines to Candidates
Jungle Operations International Course – Guidelines to Candidates ANNEX E – STUDENTS’S PREPARATION FOR THE DOCTRINAL INTERACTION GENERAL GUIDELINES FOR THE STUDENTS’S PREPARATION – CIOS 2018 The Doctrinal Interaction will take place on 03 (three) distinct days, and each day a specific block of issues will be dealt with in the jungle environment. During the selection process, still in the country of origin, the future student should receive, through the Military Attaché of his country, the subjects that will be addressed in the Doctrinal Interaction. Each subject contains requests with questions that must be answered and presented by the student in the Doctrinal Interaction. The requests, requisites, maps, letters and information required to resolve the requests are contained in the body of this document. Each student must answer all the questions of the requests in a single document in the ".doc" format and also in a single file in the ".ppt" format. These files must be recorded in a flash drive or CD – Rom and brought to CIGS with the student. A military from the Doctrinal and Research Division will collect the files on the first day of the Mobilization Week at CIGS. During the Doctrinal Interaction each student should present the answers to the questions as follows: - On the 1st day the student will have 30 min to present the requests 1, 2, 3 and 4. - On the 2nd day the student will have 30 min to present 5, 6, 7 and 8. - On the 3rd day the student will have 30 minutes to present the requests 9 and 10. -
Aerial Reconnaissance (Pennsylvania Military Museum, T
PMM BLOG ARCHIVE December 16, 2020 Aerial Reconnaissance (Pennsylvania Military Museum, T. Gum, Site Admin.) Even though the Korean War had come to a standstill a new form of warfare was being lit off between the United States and the USSR. To remain ahead of the curve, the ability to deliver substantial payloads of ordinance and conduct aerial reconnaissance was critical. The history of the B-47 is relatively well known, and on this day in history (17 DEC 1947) it completed its first flight. The related, and subsequent, iterations of this six-engine subsonic long-range flyer are perhaps lesser known by the general public; the “B” standing for bomber/bombing and others based on this platform carrying various lettering respective to design or purpose. DAYTON, Ohio -- Boeing RB-47H at the National Museum of the United States Air Force. (U.S. Air Force photo) The RB-47H being a (r)econnaissance outfitting of the B-47E platform, was a crucial option when dealing with an adversary well accomplished in deception and misinformation. The role played was quite simple – gather intelligence on the size, location, and capability of the Russian air defense and radar networks. From 1955 to the mid 1960s the RB-47H filled this role until being replaced by the RC-135… arguably a more capable option. The RB-47H was capable of long range missions due to it’s base-design, and successfully operated out of countless airfields and bases. The positioning of these airfields of course played a strategic role in staging and coordinating defensive measures when an RB was intercepted. -
Rhetoric and Reality
History Studies Volume 13 History Studies Volume 13 information on Walsh, but he was still dismissed by the Catholic Church. After his sacking Jimmy Walsh was Rhetoric and Reality -A History of the Formation employed as a hospital porter, but spent the rest of his life of the 'Domino Theory' trying to enter various religious orders, becoming a novice in a Luke Butterly Benedictine Monastery. He was unsuccessful in these attempts Gaps between rhetoric and reality in U.S. foreign however because he had once been married and was now policy have often been large; indeed such gaps might be said to constitute a defining characteristic of this separated. Jimmy Walsh died after a prolonged illness on 12 nation's diplomacy. I March 1977. and was buried in Sydney. He had never returned 76 to treland. When U.S. President Dwight D. Eisenhower announced the 'domino theory' at a news conference in 1954, he was not announcing a radical departure in Washington's understanding of the emerging situation in Indochina. Rather, he was making public aspects of U.S. foreign policy that had been in the making since the end of World War ll, which in turn interacted with older themes. This essay will first situate this 'theory' in the historiography of the Vietnam War in order to contextualise what follows. It will then map the formation of the domino theory from 1945 to 1954, and will briefly look at the broader implications of such an approach in foreign policy. This will be achieved by examining the secondary literature on the various historical events covered and reviewing the relevant primary sources.