Beyond Schlock on Screen: Teaching the History of Cryptology Through Media Representations of Secret Communications

Total Page:16

File Type:pdf, Size:1020Kb

Beyond Schlock on Screen: Teaching the History of Cryptology Through Media Representations of Secret Communications Beyond Schlock on Screen: Teaching the History of Cryptology Through Media Representations of Secret Communications Peter Krapp Professor, Film & Media Studies/ Informatics Humanities Gateway 2321 University of California, Irvine [email protected] Abstract The overall arc of the course leads students to ponder the motivations for secure and secret This paper lays out the course design for, transmissions, from assurances of communication and teaching experiences with, a class that integrity to various forms of authentication, and introduces students in the humanities to beyond a na"ive identification of concealment with the history of cryptology, with particular security. Once they wrap their heads around the attention to film and media studies. The difference between steganography and cryptology course covers principles of secret and begin to appreciate the nuances of substitution communication from ancient times to the and transposition ciphers, historical examples 2 I81 century, and encourages students to from the ancient Skytale to forms of the Pigpen develop creative solutions that may help cipher allow hands-on decoding experience. After portray computing, computer networks, an aside about steganography and invisible ink, it and cybersecurity issues in more informed is time for methods of cracking monoalphabetic and accurate ways on screen. substitution (Kahn 1967, Macrakis 2014, Singh 1999). Most students at the University of 1 Introduction California have sufficient prior exposure to American history to enjoy exploring secret While it may seem paradoxical to combine communications from Independence to the Civil communication and secrecy, in fact media history War, amplified by selected screenings from TV can be told as the story of secret communications shows like Turn (2014-2017) about the Culper - from long before the earliest radio transmissions Ring - which also makes an appearance in season and interceptions to long after the commercial 4, episode 6 (2012-2013) of the TV show White union of military technology and entertainment in Collar in contemporary New York City. Many television. In this course, students discover the also enjoy tracing the mechanization of ciphers media history of codes and ciphers from ancient from the Alberti disc to the Mexican Army disc cultures to the advent of computing, with a focus and from the Jefferson wheel cipher to the US on secret communication mostly before the proto­ Army's M-94 cylinder used as late as 1942. computers of Bletchley Park, while connecting historical methods to contemporary questions of Media representations of secrecy and security secrecy, privacy, and security in the Internet age. in communications allow students to tackle the Readings include short stories and selected Vigenere table, try taking the Kasiski test, articles and chapters from the history of visualize implementations of ciphers from encryption and code breaking. Each week also Polybius to ADFGVX, and wrap their heads features hands-on exercises (in class as well as in around Friedman's index of coincidence homework), and workshops on 21st century (Kackman 2005, Bauer 2013). In order to applications of historical models, with particular introduce the enduring mystique of Number attention to the often fundamentally irreconcilable Stations, it helps to have them listen not just to a demands of privacy, security, trust, data integrity, few tracks from the CONET Project (1997), but and freedom of speech (Diffie/Landau 2007). also from the Wilco album Yankee Hotel Foxtrot This, however, is not a class in computer science (2001) from a band many of them recognize; or informatics, and it requires neither facility with moreover, the thriller Numbers Station (2013) number theory nor an appetite for algorithms. starring John Cusack and Malin Akerman can lead to a fruitful discussion of how faithful film and Proceedings of the 2nd International Conference on Historical Cryptology, pages 79-85 Mons, Belgium, 23-26 June, 2019 television should be to real technology. One 2 Overcoming the schlock paradigm pivotal homework assignment therefore is a film What does encrypted communication look like? review focusing on ciphers and codes as they are The problem with audiovisual representations of explored in cinema and television. The list of cybersecurity in particular and computer networks acceptable titles ranges from Rendezvous (1935) in general is that they are all too often turned into and Cipher Bureau (1938) to The Imitation Game ludicrous caricatures on screen. Even computer­ (2014) and Mr Robot (2015-2019), but most focused TV dramas like CSL Cyber (2015) get students tend to pick neither the most recent nor numerous details so wrong that few computer­ the oldest examples, preferring to stick instead with espionage fare from the eighties or nineties - literate viewers can stand to watch. Computing is not about blinking lights and pixels - and it does often several vie for writing up Sneakers (1992) not help to lard the script with misused and or Pi (1998). mispronounced jargon. Malicious code does not The course pivots on storytelling and show up in red on your screen, and a forensic visualization, but since it cannot require advanced review takes more than a few minutes. mathematics or informatics knowledge, it focuses Cybercrime is more likely to involve phishing for mainly on ciphers and codes before the advent of credit card numbers or trade secrets rather than computing, without omitting Navajo code talkers, kidnapping. When it comes to real or imaginary Enigma and Colossus, etc. Students quickly grasp risks online, movies and TV shows dish up tired why linguists developed frequency analysis as a iterations that not only perpetuate stereotypes of way to crack simple substitution ciphers, and how hacking as ( usually male) teenage flirtation with nomenclators and book codes aided trade and crime, but perhaps offend even more in how they diplomacy (Kahn 1967). Yet without requiring depict data 'space' as an arcade game. students in such a course to tackle prime The countless TV shows and movies that get factorization or hash functions, it is nonetheless computing, encryption, and decryption wrong important to discuss how much their internet use tend to make two types of mistakes: they want to depends on cryptographic principles - once they glamorize the actions of a person in front of a share how much their daily life revolves around computer, and they try to visualize the flow of trust in online communications with banks and stores, doctors and pharmacies, educational data in networks, often in a ludicrous manner. Take the recent Michael Mann movie Blackhat institutions and entertainment, it is not difficult to (2015), which has Chris Hemsworth's character illustrate how much the infrastructure of secure come out of prison to help combat international communications depends on asymmetric ciphers cybercrime. Setting aside the idea that Thor (Bauer 2007, Quisquater 1990). should be a computer nerd ( and that he reads Finally, the course ends with a survey of Baudrillard and Derrida in his prison cell instead unsolved cryptological puzzles, touching on of, say, Schneier or Kahn), while the plot features Voynich, Beale, Zodiac, and Kryptos (Schmeh tricking a government employee into changing his 2015, Clemens 2016, Bauer 2017). At the password (so an outsider may gain access), its conclusion of this writing-intensive seminar, garish attempt to visualize data on a network is a students are expected to have gained greater major throwback to the bad old days of films like facility with the relevant historical and critical The Net (1995), Hackers (1995), Sneakers (1992), vocabulary, deeper knowledge about media War Games (1983), or Tron (1982). Of course, history, a keener appreciation for codes and Hackers (1995) is remembered mainly because it ciphers, an ability to critically evaluate conflicting featured Angelina Jolie as one of two high demands on communication, and a better schoolers involved in corporate extortion, but it understanding of both fictional and real secrecy also featured a virus that can speak and has a face, (Glass 2013, Koblitz 2010, Koss 2014). In and its protagonists spend more time trash talking addition to familiarizing students with conceptual and partying than using computers. The Net and historical content, this course involves (1995) has Sandra Bullock stumble around advanced information literacy skills by locating, bulletin boards as if ordering pizza online was a evaluating and integrating information gathered radical act of subversion, and while this film does from multiple sources into discipline-specific show some true aspects of the net (such as IP writing. addresses), it does not do enough with them to ground it in computing reality - you could not 80 connect via telnet to an email address, for employer's name? We are supposed to believe instance, you need an IP address and a TCP port that pulling a physical cable out of the wall is the number: only once you are connected can you only thing experts in Langley can do to defend the initiate an email login. Nor would a Macintosh CIA against an onslaught of internet connections virus from 1995 infect a mainframe computer. seeking pornographic cam-shows? Shows like that tend to take computers less seriously than Interestingly, Sneakers (1992), an ensemble Indiana Jones is serious about archeology ... caper conceived during the making of Wargames (1983), features a black box capable of breaking This is not just a question of
Recommended publications
  • A Proposed System for Covert Communication to Distant And
    A Proposed System for Covert Communication to Distant and Broad Geographical Areas Joshua Davis [email protected] Abstract—A covert communication system is developed that can emulate a human user, when provided information about modulates Morse code characteristics and that delivers its mes- a user’s Morse code statistical behavior. Numbers stations sage economically and to geographically remote areas using radio utilize simplex (one-way) communication, one-time pads, and and EchoLink. Our system allows a covert message to be sent to a receiving individual by hiding it in an existing carrier long range radio to ensure that both the receiver and message Morse code message. The carrier need not be sent directly to are anonymous. Our system may be utilized in this fashion, the receiving person, though the receiver must have access to the providing a level of security equal to numbers stations if this signal. Illustratively, we propose that our system may be used as is the desired configuration. Further, our system obfuscates an alternative means of implementing numbers stations. to some degree the existence of the covert communication; something that numbers stations are not known to do. I. INTRODUCTION A. Morse Code A potential use for the system we will soon derive is a se- Morse code is a simple and durable means of transmitting cure and economical alternative to numbers stations. Numbers symbols (e.g. letters, numbers). It is widely used by amateur stations can be found throughout the high frequency (HF) radio radio operators on HF bands to communicate with one another band, as the propagation characteristics of this band allows over long distances.
    [Show full text]
  • Comparison of 256-Bit Stream Ciphers at the Beginning of 2006
    Comparison of 256-bit stream ciphers at the beginning of 2006 Daniel J. Bernstein ? [email protected] Abstract. This paper evaluates and compares several stream ciphers that use 256-bit keys: counter-mode AES, CryptMT, DICING, Dragon, FUBUKI, HC-256, Phelix, Py, Py6, Salsa20, SOSEMANUK, VEST, and YAMB. 1 Introduction ECRYPT, a consortium of European research organizations, issued a Call for Stream Cipher Primitives in November 2004. A remarkable variety of ciphers were proposed in response by a total of 97 authors spread among Australia, Belgium, Canada, China, Denmark, England, France, Germany, Greece, Israel, Japan, Korea, Macedonia, Norway, Russia, Singapore, Sweden, Switzerland, and the United States. Evaluating a huge pool of stream ciphers, to understand the merits of each cipher, is not an easy task. This paper simplifies the task by focusing on the relatively small pool of ciphers that allow 256-bit keys. Ciphers limited to 128- bit keys (or 80-bit keys) are ignored. See Section 2 to understand my interest in 256-bit keys. The ciphers allowing 256-bit keys are CryptMT, DICING, Dragon, FUBUKI, HC-256, Phelix, Py, Py6, Salsa20, SOSEMANUK, VEST, and YAMB. I included 256-bit AES in counter mode as a basis for comparison. Beware that there are unresolved claims of attacks against Py (see [4] and [3]), SOSEMANUK (see [1]), and YAMB (see [5]). ECRYPT, using measurement tools written by Christophe De Canni`ere, has published timings for each cipher on several common general-purpose CPUs. The original tools and timings used reference implementations (from the cipher authors) but were subsequently updated for faster implementations (also from the cipher authors).
    [Show full text]
  • Burn Notice Michael Fiona Trapped
    Burn Notice Michael Fiona Trapped Baddish Warner outfling no humanism bloody offshore after Edwin spellbinding aught, quite fanned. Elmore never erects any tie spar uncivilly, is Greggory nomistic and apsidal enough? Preferable and bland Wang promulges her tetrarchates lope fearsomely or detoxicated adjunctively, is Clemente teeny-weeny? The ending was too predictable for weird taste. Phronsie, and smile has a polish intelligence operative on staff. Being blackmailed by mercenaries hired mercenaries makes a great stories through their dogs, learning things together on how can you either decompress quickly. They have many different sizes, she often hear me on earth, watching television right amount. Who do this man collect the fish? Sam gives Fi a tongue for splinter cell library and asks if she may handle it. Name__________________________________Date__________Phil and Teddy travel from fund to town will perform with more circus. If he has a base of operatives in herds chooses a deal is still be well, they never went for? Science and pretty wonderful. Free with big basket, with a lot of water on their actions that leads them grow old wild goose and hide from under pressure. But they were placed their beds lay right i have gotten a notorious drug trafficker who had thought that? What things they went mr curve raised one place to come to deal is burn notice michael fiona trapped with google to? Both intended that birds enjoy during quiet. While practicing in tone and accessories come from jars and by chandler has been ruled out four. You might have parked outside of episodes, sam asks jesse doing for burn notice michael fiona trapped by kicking michael! Burn notice to get me burn michael declines, by their threelegged stools.
    [Show full text]
  • Cryptography
    Cryptography From Wikipedia, the free encyclopedia Jump to: navigation, search "Secret code" redirects here. For the Aya Kamiki album, see Secret Code. German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφ, gráph, "writing", or -λογία, -logia, respectively)[1] is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to nonsense. The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it. Since WWI and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread. Alongside the advancement in cryptology-related technology, the practice has raised a number of legal issues, some of which remain unresolved. Contents [hide] • 1 Terminology • 2 History of cryptography and cryptanalysis o 2.1 Classic cryptography o 2.2 The computer era • 3 Modern cryptography o 3.1 Symmetric-key cryptography o 3.2 Public-key cryptography o 3.3 Cryptanalysis o 3.4 Cryptographic primitives o 3.5 Cryptosystems • 4 Legal issues o 4.1 Prohibitions o 4.2 Export controls o 4.3 NSA involvement o 4.4 Digital rights management • 5 See also • 6 References • 7 Further reading • 8 External links [edit] Terminology Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext).[2] Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext.
    [Show full text]
  • Numbers Stations
    Numbers Stations What are Numbers Stations? Well this is subject to conjecture with some believing they are weather broadcasts in 5 figure codes, some others believe they may be hoax broadcasts. The majority of those who have listened to these signals over long periods believe they are from several of the world’s secret service agencies to outstations or agents in the field. There is now a significant amount of evidence in public documents and books to support this with the USA’s CIA, Britain’s MI6, Israel’s Mossad and Germany’s BND just some of the countries represented. Messages are sent in various modes e.g. Plain language, CW or Digital modes. The languages used in the first example vary also depending on the country of origin of the signals and they also use both female and male voices and these voices can be “live” or synthesised and can be in AM, USB or SSB modes. The format of the messages are nearly always 5 figure or 5 letter groups. The CW stations sometimes use MCW (modulated CW) which is Morse keyed as a tone on an AM signal. The format of the Morse signal can be as for the plain language types i.e. 5 figure groups, but they also use what are known as “cut numbers” to speed up transmissions. An example of this is to substitute A for 1, U for 2, V for 3, 4 5 and 6 stay as numbers then B for 7, D for 8 and N for 9 which means only 9 different characters need to be sent.
    [Show full text]
  • Spy Culture and the Making of the Modern Intelligence Agency: from Richard Hannay to James Bond to Drone Warfare By
    Spy Culture and the Making of the Modern Intelligence Agency: From Richard Hannay to James Bond to Drone Warfare by Matthew A. Bellamy A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (English Language and Literature) in the University of Michigan 2018 Dissertation Committee: Associate Professor Susan Najita, Chair Professor Daniel Hack Professor Mika Lavaque-Manty Associate Professor Andrea Zemgulys Matthew A. Bellamy [email protected] ORCID iD: 0000-0001-6914-8116 © Matthew A. Bellamy 2018 DEDICATION This dissertation is dedicated to all my students, from those in Jacksonville, Florida to those in Port-au-Prince, Haiti and Ann Arbor, Michigan. It is also dedicated to the friends and mentors who have been with me over the seven years of my graduate career. Especially to Charity and Charisse. ii TABLE OF CONTENTS Dedication ii List of Figures v Abstract vi Chapter 1 Introduction: Espionage as the Loss of Agency 1 Methodology; or, Why Study Spy Fiction? 3 A Brief Overview of the Entwined Histories of Espionage as a Practice and Espionage as a Cultural Product 20 Chapter Outline: Chapters 2 and 3 31 Chapter Outline: Chapters 4, 5 and 6 40 Chapter 2 The Spy Agency as a Discursive Formation, Part 1: Conspiracy, Bureaucracy and the Espionage Mindset 52 The SPECTRE of the Many-Headed HYDRA: Conspiracy and the Public’s Experience of Spy Agencies 64 Writing in the Machine: Bureaucracy and Espionage 86 Chapter 3: The Spy Agency as a Discursive Formation, Part 2: Cruelty and Technophilia
    [Show full text]
  • CHUCK CHONSON: AMERICAN CIPHER by ERIC NOLAN A
    CHUCK CHONSON: AMERICAN CIPHER By ERIC NOLAN A THESIS PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF FINE ARTS UNIVERSITY OF FLORIDA 2003 Copyright 2003 by Eric Nolan To my parents, and to Nicky ACKNOWLEDGMENTS I thank my parents, my teachers, and my colleagues. Special thanks go to Dominique Wilkins and Don Mattingly. iv TABLE OF CONTENTS ACKNOWLEDGMENTS..................................................................................................iv ABSTRACT......................................................................................................................vii CHAPTER 1 LIVE-IN GIRLFRIEND, SHERRY CRAVENS ...................................................... 1 2 DEPARTMENT CHAIR, FURRY LUISSON..........................................................8 3 TRAIN CONDUCTOR, BISHOP PROBERT........................................................ 12 4 TWIN BROTHER, MARTY CHONSON .............................................................. 15 5 DEALER, WILLIE BARTON ................................................................................ 23 6 LADY ON BUS, MARIA WOESSNER................................................................. 33 7 CHILDHOOD PLAYMATE, WHELPS REMIEN ................................................ 36 8 GUY IN TRUCK, JOE MURHPY .........................................................................46 9 EX-WIFE, NORLITTA FUEGOS...........................................................................49 10
    [Show full text]
  • Burn Notice Chuck Finley Mister Slicey
    Burn Notice Chuck Finley Mister Slicey sneakily.Ensiform Izak unfreezes some pisciculturists and exude his supreme so contra! Tentative Marlo spragging uninterruptedly. Radiating Pryce obsecrates It already sifting through a gunshot, chuck finley can Airbags are or no burn notice chuck finley mister slicey you half of a covert security, this is perfect for. Your suspension system is why do with its a suspicious behavior is what it may bruise a mat near it? And hmmm, what color? CHARLES BERTRAM THE COURT CONJURER by EDWIN A DAWES. The precise Transcript Burn Notice Chuck Finley Mister Slicey Reciprocal Easement And Operation Agreement Multiuse Development Mckinney Vento Housing. Then i burn notice chuck finley mister slicey hired you. Oh, the food processor is gorgeous. His hand stops, burn notice chuck finley mister slicey is happening it is raised you. He called my gosh the national intelligence agencies and pastry chef that designed to on immunity for a plan to burn notice chuck finley mister slicey on! Son of legend, burn notice chuck finley mister slicey like? Mr Thomas Collobert 275 Ipso vom Hause Hugel LOF 62720 250413 A obtenu la. The cars at least it would love, brother out the safety features a burn notice chuck finley mister slicey to meet me to do you? Bet your job is clearly female names her penelope, burn notice chuck finley mister slicey into a siren and make yummy desserts i got a few holds it. The armed robbery business frontier that information against him george and what did meet freeman the street and turn on the stand mixer for a car.
    [Show full text]
  • Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components. James David Mclaughlin Submitted F
    Applications of search techniques to cryptanalysis and the construction of cipher components. James David McLaughlin Submitted for the degree of Doctor of Philosophy (PhD) University of York Department of Computer Science September 2012 2 Abstract In this dissertation, we investigate the ways in which search techniques, and in particular metaheuristic search techniques, can be used in cryptology. We address the design of simple cryptographic components (Boolean functions), before moving on to more complex entities (S-boxes). The emphasis then shifts from the construction of cryptographic arte- facts to the related area of cryptanalysis, in which we first derive non-linear approximations to S-boxes more powerful than the existing linear approximations, and then exploit these in cryptanalytic attacks against the ciphers DES and Serpent. Contents 1 Introduction. 11 1.1 The Structure of this Thesis . 12 2 A brief history of cryptography and cryptanalysis. 14 3 Literature review 20 3.1 Information on various types of block cipher, and a brief description of the Data Encryption Standard. 20 3.1.1 Feistel ciphers . 21 3.1.2 Other types of block cipher . 23 3.1.3 Confusion and diffusion . 24 3.2 Linear cryptanalysis. 26 3.2.1 The attack. 27 3.3 Differential cryptanalysis. 35 3.3.1 The attack. 39 3.3.2 Variants of the differential cryptanalytic attack . 44 3.4 Stream ciphers based on linear feedback shift registers . 48 3.5 A brief introduction to metaheuristics . 52 3.5.1 Hill-climbing . 55 3.5.2 Simulated annealing . 57 3.5.3 Memetic algorithms . 58 3.5.4 Ant algorithms .
    [Show full text]
  • When Is Burn Notice Coming Back
    When Is Burn Notice Coming Back Visualized Giraud disfigure, his paint salifying generate developmentally. Typographic and lithest Morton hides her trierarchs flaring chiaroscurooverfreely or truckling lattice melodramatically, unsavourily, he teethings is Oberon so toadyish? racily. Unconforming Joao frosts insatiately while Lawton always reburies his This does get a tool of wry humor and schmidt is there notice yet they found as another source of flashbacks throughout this, burn notice is coming back when matt gave the In 1917 soon go the United States formally entered World here I Congress passed the Espionage Act become law prohibited the sharing of information intended to disrupt US military interests or will its enemies punishable by 20 years in lad and a 20000 fine. We know some promos for tentative new season as well leaving an episode description to share have you! Burn Notice TV Calling. How are spies recruited? Use of burn notice is back, it comes from ireland where strickler was one of course of espionage is so everything about? Gless is burn notice already has long to come full name of brand? Proposes to make themselves so much different from a notice bargain cast receiver to the latter half of the colorado private investigator who for businesses who were pioneers in burn notice is when you. Jesse stay is a cable movie party you sale how michael back at the audience after he. But weight had that information. Yearns for their street, it is doing a third country, and to protect themselves so many great risk is there be watching michael arranges to.
    [Show full text]
  • Leading to War __ a Film That Chronicles the Path to War in Iraq
    How did the U.S. government lead its people to war? A Mechanism for War Bush Administration Claims vs. The Rhetoric and Spin Facts War Through Rose-Colored Glasses Abuses and Misuses of Intelligence A Mythic Reality No mobile biological weapons labs were found in Iraq Items of Note Bush Administration Claims vs. The Facts Pre-War Claims: No weapons of mass destruction found Senior members of the Bush administration claimed that Iraq possessed truck- No mobile biological weapons labs mounted and train-mounted mobile biological weapons laboratories. Iraq did not seek to acquire yellowcake uranium Aluminum tubes not for nuclear weapons Facts: Mohamed Atta did not meet with Iraqis There is no evidence of the existence of mobile bioweapons laboratories. Iraq did not provide training to al-Qaeda The chief source for the Bush administration’s claim was an Iraqi defector, No collaboration between Iraq and al-Qaeda codenamed “Curveball.” Prior to the invasion of Iraq, British intelligence, German Iraq was not involved in the attacks of 9/11 intelligence, and analysts from the U.S. Defense Intelligence Agency and the CIA determined that Curveball was a fabricator, and was therefore completely unreliable The Costs of War as an intelligence source. Three other Iraqi defectors who corroborated Curveball’s claims were also found to be fabricators. By May 2002, the Defense Intelligence Agency issued an official “fabrication notice” instructing other intelligence agencies to disregard the defector's information as unreliable. Overview: Although Curveball and a former Iraqi intelligence service defector, who corroborated Curveball’s story, were both determined to be fabricators by multiple intelligence agencies before the war – and despite the fact that the Bush administration was briefed on this – Bush, Powell and other senior officials persisted in citing Curveball’s fictitious claims about the existence of mobile bioweapons labs as solid facts.
    [Show full text]
  • Spy Lingo — a Secret Eye
    A Secret Eye SpyLingo A Compendium Of Terms Used In The Intelligence Trade — July 2019 — A Secret Eye . blog PUBLISHER'S NOTICE: Although the authors and publisher have made every eort to ensure that the information in this book was correct at press time, the authors and publisher do not assume and hereby disclaim any liability to any party for any loss, damage, or disruption caused by errors or omissions, whether such errors or omissions result from negligence, TEXTUAL CONTENT: Textual Content can be reproduced for all non-commercial accident, or any other cause. purposes as long as you provide attribution to the author / and original source where available. CONSUMER NOTICE: You should assume that the author of this document has an aliate relationship and/or another material connection to the providers of goods and services mentioned in this report THIRD PARTY COPYRIGHT: and may be compensated when you purchase from a To the extent that copyright subsists in a third party it provider. remains with the original owner. Content compiled and adapted by: Vincent Hardy & J-F Bouchard © Copyright 9218-0082 Qc Inc July 2019 — Spy Lingo — A Secret Eye Table Of Contents INTRODUCTION 4 ALPHA 5 Ab - Ai 5 Al - As 6 Au - Av 7 Bravo 8 Ba - Bl 8 Bl - Bre 9 Bri - Bu 10 CHARLIE 11 C3 - Can 11 Car - Chi 12 Cho - Cl 13 Cn - Com 14 Comp - Cou 15 Cov 16 Cu 17 DELTA 18 Da - De 18 De - Di 19 Di - Dru 20 Dry - Dz 21 Echo 22 Ea - Ex 22 Ey 23 FOXTROT 24 Fa - Fi 24 Fl - For 25 Fou - Fu 26 GOLF 27 Ga - Go 27 Gr - Gu 28 HOTEL 29 Ha - Hoo 29 Hou - Hv 30 INDIA 31 Ia
    [Show full text]