Staff Picks a P R I L 2 0 1 8

Total Page:16

File Type:pdf, Size:1020Kb

Staff Picks a P R I L 2 0 1 8 Readers’ Advisory Committee STAFF PICKS A P R I L 2 0 1 8 Libraries To find on the web go to www.nccde.org/libraries and click on “What Do I Read Next” FICTION ONLY CHILD BY RHIANNON NAVIN (PICKED BY SM) Squeezed into a coat closet with his classmates and teacher, first grader Zach Taylor can hear gunshots ringing through the halls of his school. A gunman has entered the building, taking nineteen lives and irrevocably changing the very fabric of this close-knit community. While Zach's mother pursues a quest for justice against the shooter's parents, holding them responsible for their son's actions, Zach retreats into his super-secret hideout and loses himself in a world of books and art. Armed with his newfound understanding, and with the optimism and stubbornness only a child could have, Zach sets out on a captivating journey towards healing and forgiveness, determined to help the adults in his life rediscover the universal truths of love and compassion needed to pull them through their darkest hours. (304 pages) WINTER SISTERS BY ROBIN OLIVEIRA (PICKED BY SLH & SH) New York, 1879: After an epic snow storm ravages the city of Albany, Dr. Mary Sutter, a former Civil War surgeon, begins a search for two little girls, the daughters of close friends killed by the storm who have vanished without a trace. Mary's mother and niece Elizabeth, who has been studying violin in Paris, return to Albany upon learning of the girls' disappearance--but Elizabeth has another reason for wanting to come home, one she is not willing to reveal. Despite resistance from the community, who believe the girls to be dead, the family persists in their efforts to find the two sisters. When what happened to them is revealed, the uproar that ensues tears apart families, reputations, and even the social fabric of the city, exposing dark secrets about some of the most powerful of its citizens, and putting fragile loves and lives at great risk. (416 pages) THE PHILOSOPHER’S FLIGHT BY TOM MILLER (PICKED BY SM) Eighteen-year-old Robert Weekes is a practitioner of empirical philosophy— a female-dominated branch of science used to summon the wind, shape clouds of smoke, heal the injured, and even fly. Though he dreams of fighting in the Great War as the first male in the elite US Sigilry Corps Rescue and Evacuation Service—a team of flying medics—Robert is resigned to mixing batches of philosophical chemicals and keeping the books for the family business in rural Montana, where his mother, a former soldier and vigilante, aids the locals. When a deadly accident puts his philosophical abilities to the test, Robert rises to the occasion and wins a scholarship to study at Radcliffe College, an all-women’s school. At Radcliffe, Robert hones his skills and strives to win the respect of his classmates, a host of formidable, unruly women. Robert falls hard for Danielle Hardin, a disillusioned young war hero turned political radical. However, Danielle’s activism and Robert’s recklessness attract the attention of the same fanatical anti-philosophical group that Robert’s mother fought years before. With their lives in mounting danger, Robert and Danielle band together with a team of unlikely heroes to fight for Robert’s place among the next generation of empirical philosophers. (432 pages) THE QUANTUM SPY BY DAVID IGNATIUS (PICKED BY KS) A hyper-fast quantum computer is the digital equivalent of a nuclear bomb: whoever possesses one will be able to shred any encryption in existence, effectively owning the digital world. The question is: who will build it first, the United States or China? The latest of David Ignatius's timely, sharp-eyed espionage novels follows CIA agent Harris Chang into a quantum research lab compromised by a suspected Chinese informant. The breach provokes a mole hunt that is obsessive, destructive, and--above all--uncertain: Do the leaks expose real secrets, or are they false trails meant to deceive the Chinese? Chang soon finds that there is a thin line between loyalty and betrayal, as the investigation leads him down a rabbit hole as dangerous as it is deep. (320 pages) New Castle County Libraries | Department of Community Services | Matthew Meyer , County Executive STAFF PICKS FICTION HAPPINESS BY AMINATTA FORNA (PICKED BY SLS) London. A fox makes its way across Waterloo Bridge. The distraction causes two pedestrians to collide--Jean, an American studying the habits of urban foxes, and Attila, a Ghanaian psychiatrist there to deliver a keynote speech. From this chance encounter, Aminatta Forna's unerring powers of observation show how in the midst of the rush of a great city lie numerous moments of connection. Attila has arrived in London with two tasks: to deliver a keynote speech on trauma, and to contact the daughter of friends. Ama has been swept up in an immigration crackdown, and now her young son Tano is missing. When, by chance, Attila runs into Jean again, she mobilizes the network of rubbish men she uses as volunteer fox spotters -- mainly West African immigrants who work the myriad streets of London--come together to help. As the search for Tano continues, a deepening friendship between Attila and Jean unfolds. Meanwhile a consulting case causes Attila to question the impact of his own ideas on trauma, the values of the society he finds himself in, and a grief of his own. (368 pages) IN THE MIDST OF WINTER BY ISABEL ALLENDE (PICKED BY KT) In the Midst of Winter begins with a minor traffic accident—which becomes the catalyst for an unexpected and moving love story between two people who thought they were deep into the winter of their lives. Richard Bowmaster—a 60-year-old human rights scholar—hits the car of Evelyn Ortega—a young, undocumented immigrant from Guatemala—in the middle of a snowstorm in Brooklyn. What at first seems just a small inconvenience takes an unforeseen and far more serious turn when Evelyn turns up at the professor’s house seeking help. At a loss, the professor asks his tenant Lucia Maraz—a 62-year-old lecturer from Chile—for her advice. These three very different people are brought together in a mesmerizing story that moves from present -day Brooklyn to Guatemala in the recent past to 1970s Chile and Brazil, sparking the beginning of a long overdue love story between Richard and Lucia. (352 pages) SURPRISE ME BY SOPHIE KINSELLA (PICKED BY KT) After being together for ten years, Sylvie and Dan have all the trimmings of a happy life and marriage; they have a comfortable home, fulfilling jobs, beautiful twin girls, and communicate so seamlessly, they finish each other's sentences. However, a trip to the doctor projects they will live another 68 years together and panic sets in. They never expected "until death do us part" to mean seven decades. In the name of marriage survival, they quickly concoct a plan to keep their relationship fresh and exciting: they will create little surprises for each other so that their (extended) years together will never become boring. But in their pursuit to execute Project Surprise Me, mishaps arise and secrets are uncovered that start to threaten the very base of their unshakable bond. When a scandal from the past is revealed that questions some important untold truths, they begin to wonder if they ever really knew each other after all.(432pgs) SOMETIMES I LIE BY ALICE FEENEY (PICKED BY BS) My name is Amber Reynolds. There are three things you should know about me: I’m in a coma, my husband doesn’t love me anymore, and sometimes I lie. Amber wakes up in a hospital. She can’t move, speak, or open her eyes. She can hear everyone around her, but they have no idea. Amber doesn’t remember what happened, but she has a suspicion her husband had something to do with it. Alternating between her paralyzed present, the week before her accident, and a series of childhood diaries from twenty years ago, this brilliant psychological thriller asks: Is something really a lie if you believe it's the truth? (387 pages) FRESHWATER BY AKWAEKE EMEZI (PICKED BY SLS) Ada begins her life in Nigeria as a troubled baby and a source of deep concern to her family. Her parents, Saul and Saachi, successfully prayed her into existence, but as she grows into a volatile and splintered child, it becomes clear that something went terribly awry. When Ada comes of age and moves to America for college, the group of selves within her grows in power and agency. A traumatic assault leads to a crystallization of her alternate selves: Asụghara and Saint Vincent. As Ada fades into the background of her own mind and these selves--now protective, now hedonistic--move into control, Ada's life spirals in a dark and dangerous direction. (240 pages) New Castle County Libraries | Department of Community Services | Matthew Meyer, County Executive STAFF PICKS A P R I L 2 0 1 8 Libraries NON-FICTION ALL THE PIECES MATTER BY JONATHAN ABRAMS (PICKED BY SLS) Since its final episode aired in 2008, HBO's acclaimed crime drama The Wire has only become more popular and influential. The issues it tackled, from the failures of the drug war and criminal justice system to systemic bias in law enforcement and other social institutions, have become more urgent and central to the national conversation. Universities use the show to teach everything from film theory to criminal justice to sociology. Politicians and activists reference it when discussing policy.
Recommended publications
  • SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM
    SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM HEINEMANN: AUSTRALIA First published in 1987 by HEINEMANN PUBLISHERS AUSTRALIA (A division of Octopus Publishing Group/Australia Pty Ltd) 85 Abinger Street, Richmond, Victoria, 3121. Copyright (c) 1987 by Peter Wright ISBN 0-85561-166-9 All Rights Reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. TO MY WIFE LOIS Prologue For years I had wondered what the last day would be like. In January 1976 after two decades in the top echelons of the British Security Service, MI5, it was time to rejoin the real world. I emerged for the final time from Euston Road tube station. The winter sun shone brightly as I made my way down Gower Street toward Trafalgar Square. Fifty yards on I turned into the unmarked entrance to an anonymous office block. Tucked between an art college and a hospital stood the unlikely headquarters of British Counterespionage. I showed my pass to the policeman standing discreetly in the reception alcove and took one of the specially programmed lifts which carry senior officers to the sixth-floor inner sanctum. I walked silently down the corridor to my room next to the Director-General's suite. The offices were quiet. Far below I could hear the rumble of tube trains carrying commuters to the West End. I unlocked my door. In front of me stood the essential tools of the intelligence officer’s trade - a desk, two telephones, one scrambled for outside calls, and to one side a large green metal safe with an oversized combination lock on the front.
    [Show full text]
  • Venona Special Studies
    - 1 - Venona Project Special Studies Transcribed by Students of the Mercyhurst College Institute for Intelligence Studies Arranged by John Earl Haynes, Library of Congress, 2010 COVER NAMES IN NEW YORK TRAFFIC p. 2 UNIDENTIFIED COVER NAMES IN NEW YORK TRAFFIC p. 86 COVER NAMES IN SAN FRANCISCO TRAFFIC p. 92 COVER NAMES IN WASHINGTON TRAFFIC p. 123 ADDITIONAL COVERNAMES AND RELATED INFORMATION IN DIPLOMATIC TRAFFIC p. 127 REVISED TRANSLATION OF MESSAGE ON ANTENNA-LIBERAL'S WIFE ETHEL p. 135 THE COVERNAMES "ANTENNA" AND "LIBERAL" IN . MESSAGES p. 139 ESSAGES IN . INVOLVING THE COVERNAME"ENORMOZ" AND THE NAMES OF NUCLEAR PHYSICISTS, ETC. p. 147 UNDATED REPORT OF MEREDITH GARDNER p. 155 DEVELOPMENT OF THE “G--“HOMER” [“GOMER”] CASE p. 158 THE KOMAR (KRAVCHENKO) AFFAIR IN . MESSAGES p. 161 REVISED TRANSLATION OF TWO . MESSAGES ON CHANGES IN COVERNAMES p. 170 THE COVERNAME "KARAS" IN. TRAFFIC p. 178 THE COVERNAMES "TÉNOR", "BAS", AND "CHETÁ" (? IN . TRAFFIC p. 181 - 2 - Special Study Cover Names in New York Traffic - 3 - cover-name Message number Date Publication reference S/ or 3/NBF/ 19 N.Y. to M. 812 29053 JKI 06 T1022 1B-1910 0027A ABRAM N.Y. to M. 992 24063 JKR 14 T872√ 1B-7518 0005A JACK SOBLE 1086 06073 JKV 48 T873√ 2A-0011 1957 29113 NNNNNN T939√ 625 04054 JHD 48 T916√ 851 15064 JIJ 40 T10.1√ 1146 10084 JHM 41 T123√ 1251 02094 JHN 12 T301√ (to ChEKh) 0005B 1353 23094 JHO 42 T289√ 1449 12104 JIL 37 T106√ 1754 14124 JHZ 49 T6√ 48 11015 JHV 37 (NSA)T1941 AVGUR 2A-0013 1638 (AUGUR) N.Y.
    [Show full text]
  • VENONA: an Overview
    DOCID: 3575728 Cryptologic Almanac 50th Anniversary Series VENONA: An Overview (U) "Spy catching" is an alluring phrase more often connected with James Bond than with a cryptanalyst. However, during the Cold War, a group ofcryptanalysts assisted the spy catchers in their efforts to stop Soviet espionage in the United States and other allied countries. Their decrypts revealed, among other things, the extent ofthe KGB operations in the United States and furthered the FBI's and other agencies' efforts in tracking down these spies. (U) VENONA was the final in a series ofcover names for the project to exploit cryptosystems used to protect what was initially believed to be Soviet diplomatic communications. The messages were encrypted using a complicated code that was then superenciphered by adding a numeric key stream from a one-time pad to the code. After some analysis, the cryptanalysts discovered they were really attacking five different systems being used by five different entities instead ofone as originally thought. The five users for the five versions ofVENONA were Soviet trade representatives, Soviet diplomats, and three Soviet spy agencies (the KGB, the Soviet Army General Staff Intelligence Directorate (GRU), and the Soviet Naval Intelligence, Staff(GRU-Naval)). ~ Although American cable companies, at the direction ofthe U.S. Army, had been collecting VENONA messages since 1939, there was no serious effort against the traffic until 1 February 1943. Prior to that time the system was believed unbreakable and thus not worth the cryptanalytic effort. One-time pads were and are still considered one ofthe most difficult manual cryptosystems to exploit; properly used, a one-time pad is virtually unbreakable.
    [Show full text]
  • Compiled Fall 2018 Binder
    Recent Writings and Press Coverage for Howard Gardner and Project Zero September 2018 Prof. Howard Gardner Harvard Graduate School of Education 13 Appian Way Longfellow Hall 234 Cambridge, MA 02138 Phone: 617-496-4929 Fax: 617-496-4855 [email protected] www.howardgardner.com www.multipleintelligencesoasis.org www.pz.harvard.edu www.thegoodproject.org Table of Contents I. The App Generation “Getting smart about smartphones” The Atlantic “You should talk about politics this Thanksgiving” Salon.com II. Education “Celebrating Every Learner: Activities and Strategies for Creating a Multiple Intelligences Classroom” Amazon “Visible Learners: Promoting Reggio-Inspired Approaches in All Schools” Amazon “Learning lessons, the fun way” The Hindu “Harvard Fellows deliver inspiring testimony during MCSB meeting” Ledger-Enquirer “Can science change the culture of education?” The Frederick News-Post “Contra-disciplinary - the best model of artscience education” The Hindu “The 2018 RHSU Edu-Scholar Public Influence Rankings” American Enterprise Institute “Education must be more than mere consumption of knowledge, says Saikat Majumdar” The Hindu “So your preschooler can’t sit still? Don’t worry, it’s normal” Momaha “Safari Kid: enabling children in perfect learning environment” Digital Learning “Back to Leonardo’s notebooks” Outlook “Learn to unlearn” The Hindu “On creativity” The Brooklyn Rail “Riverview charter school recognized for closing education gap” Bloomingdale Patch “Urgent memo to Malaysia’s new Minister of Education” Eurasia Review “Sole
    [Show full text]
  • Project VENONA: Breaking the Unbreakable Code
    Georgia Southern University Digital Commons@Georgia Southern University Honors Program Theses 2020 Project VENONA: Breaking the Unbreakable Code Cassandra Hankin Georgia Southern University Follow this and additional works at: https://digitalcommons.georgiasouthern.edu/honors-theses Part of the History Commons Recommended Citation Hankin, Cassandra, "Project VENONA: Breaking the Unbreakable Code" (2020). University Honors Program Theses. 471. https://digitalcommons.georgiasouthern.edu/honors-theses/471 This thesis (open access) is brought to you for free and open access by Digital Commons@Georgia Southern. It has been accepted for inclusion in University Honors Program Theses by an authorized administrator of Digital Commons@Georgia Southern. For more information, please contact [email protected]. Project VENONA: Breaking the Unbreakable Code An Honors Thesis submitted in partial fulfillment of the requirements for Honors in History. By Cassandra Hankin Under the mentorship of Dr. Bill Allison ABSTRACT Project VENONA was a top-secret counterintelligence program initiated by the United States Army Signals Intelligence Service during World War II. VENONA was established to decipher intercepted Soviet communications and break the “unbreakable” Soviet code system. Examining Project VENONA and its discoveries is vital to understanding the history of the early Cold War. Thesis Mentor:________________________ Dr. Bill Allison Honors Director:_______________________ Dr. Steven Engel April 2020 Department of History University Honors Program Georgia Southern University 2 Acknowledgements There are many people I’d like to thank for helping me during the year and a half I worked on this project. For helping me through the research and writing process, I would like to thank Dr. Bill Allison, who never gave up on me or my project.
    [Show full text]
  • William Weisband from AFIO's the INTELLIGENCER
    Association of Former Intelligence Officers From AFIO's The Intelligencer 7700 Leesburg Pike, Suite 324 Falls Church, Virginia 22043 Journal of U.S. Intelligence Studies Web: www.afio.com * E-mail: [email protected] Volume 26 • Number 1 • Fall 2020 $15 single copy price In practice, maintaining such secrecy proved impossible. The use of the one-time pad necessitated When Intelligence Made a Difference the creation of hundreds of thousands of unique, non-repeating key pages during World War II when the Soviets were sending out thousands upon thousands — Cold War — of messages. Moreover, digital computers that could quickly create one-time pads in large quantities did not exist yet. As a result, Soviet cryptographers resorted to replicating the pads, turning them from one-time use pads to two-time pads or more. In order to mitigate the William Weisband increased risks, the Soviets did not reproduce whole pads. Rather, they copied individual pages, which were inserted into different pads.2 While not as secure as by Naiomi Gonzalez the one-time use pad system, the Soviets assumed that the resources needed to decode the message would be too time-consuming. An enemy power would need to uring the Cold War, the United States and the have the resources to gather enough of the duplicate Soviet Union engaged in a frantic cat-and- keys and hire a large number of cryptanalysts, who mouse game: both struggled to gather the D would then need to spend years trying to break Soviet intelligence to parse the other nation’s political and encryptions.3 military weaknesses, strengths, and intentions, while However, members of the Army’s Signal Intelli- working to insure their own information remained gence Service (SIS) Venona Project, a highly classified secure.
    [Show full text]
  • Congressional Record—Senate S8293
    July 12, 1999 CONGRESSIONAL RECORD Ð SENATE S8293 Now, Marine Lieutenant Colonels, even The power brokers in Washington, who ered that some messages could be those of us no longer on active service, favor ``yes men'' over honest men, probably paired as having been ``randomized'' by aren't in the habit of referring to Generals as won't miss Chuck Krulak very much. But his the same pad and page carrying ran- friendsÐparticularly when the General in Marines will. And I willÐmostly because I dom additive digits (and hence were question is the top Marine. And we sure remember him as a young Captain of Infan- don't offer a public critique of his perform- try, thirty years ago, when we served to- solvable). ance as Commandant of all Marines. It just gether in a corner of hell called Vietnam. He Such mixed pairs were worked on by isn't done. was then, as he is today, a warrior and a man a small group of women led by Katurah But in this case, somebody needs to do it. of principle, integrity and character. He em- ``Katie'' McDonald. This group had al- Because when Chuck Krulak takes off his bodied then, as he does today, the guiding ready produced a remarkable amount Dress Blues with those four stars on the ethos of the MarinesÐSemper FidelisÐAl- of code text, and the code-groups that shoulders for the last time as he will at the ways Faithful. end of this month, the conscience of the had appeared so far had even been in- Mr.
    [Show full text]
  • Introduction to Cybersecurity 4
    First Edition: MAJ THOMAS A. OWENS, CAP 2019 Revision: MAJ DEREK RUSTVOLD, CAP DIRECTOR OF CYBER PROGRAMS, MID-ATLANTIC REGION Editing: SUSAN MALLETT, CAP NHQ DR. JEFF MONTGOMERY, CAP NHQ Published by NATIONAL HEADQUARTERS CIVIL AIR PATROL AEROSPACE EDUCATION DIRECTORATE MAXWELL AFB, ALABAMA 36112 REVISED SEPTEMBER 2019 Contents AN INTRODUCTION TO CYBERSECURITY 4 CAP Cybersecurity Module 4 Summary of Recent Attacks and Motivation for Action 5 Activity Group One: Codes, Ciphers and Encryption Awareness 8 Unit Profile: Room 40 and Bletchley Park 15 Biography: Alan Turing 15 CONCEPTS IN INFORMATION ASSURANCE AND CYBER WARFARE 16 Activity Group Two: Vulnerabilities and Basic Defense Skills 19 Patriot Bio: Maj. Gen. Robert J. Skinner 25 CONCEPTS OF OPERATING SYSTEMS AND NETWORKING 26 Activity Group Three: Basic Probing Skills 27 th Unit Profile: 24 Air Force 38 th Unit Profile: 67 Network Warfare Wing 38 Patriot Bio: Brig. Gen. Kevin B. Wooton 38 EXPLORING CAREERS IN CYBERSECURITY 39 Unit Profile: USCYBERCOM 43 Patriot Bio: General Keith B. Alexander 43 Bonus Graphic: USCYBERCOM 44 CONCLUSION AND NEXT STEPS 45 APPENDICES 51 A: Motivational Chronology of Cyber Warfare 51 B: Glossary of Terms, Threats, and Countermeasures 55 C: Toolbox of Promotional Resources 68 D: Toolbox of Technical Resources 72 E. Solutions to Module Activities 74 3 An Introduction to Cybersecurity Our Nation's Cyber Dependency At all its various levels, the United States has become a “cybernation.” Aviators will be amused to discover the prefix “cyber-” is derived from the word cybernetic, which comes from a Greek word κυβερνητικός (kybernētēs) which means pilot, rudder, steersman, or governor.
    [Show full text]
  • Introduction Background How It Works the VENONA Breakthrough
    By Cindy Flores, Hyeok Jung Kim, Dalia Moradi, Abanob Saleh, Xi Ye You Seminar 3: Science & Technology of NYC, Professor Kent D. Boklan Introduction Significance How It Works On February 1, 1943, a small group of code breakers of the U.S. Army’s Importance of the Venona Project The Code (Vernam Cipher) and How it Works Signal Intelligence Service (SIS) launched the VENONA Project, a secret • Exposed the Soviet spy ring and information about the atomic bomb • Proven to be mathematically secure under ideal implementation by counterintelligence program to decrypt and exploit communication by the • Lasted from 1943 to 1980, declassified in 1995- from World War 2 Claude Shannon Soviet Union. throughout the Cold War (1947-1991) 1) Represent plain text into numbers (alphabet positioning.. ie: A=1) • Exposed Julius and Ethel Rosenberg for espionage and conspiracy to 2) Create a randomly generated key that is the same length as the plain Background provide atomic secrets to the USSR. As a result, they were executed text by electric chair in 1953. 3) Combine the plaintext and random key using XOR or modular addition History • They were implicated by their in-laws Ruth and David Greenglass, 4) Convert the numbers back into cipher text • The code breakers were named “Arlington Hall” after their communists who were also Soviet spies 5) To get back to the plain text, XOR the key again or subtract using headquarters in Virginia • Alger Hiss was a former U.S. State Department official who was modular arithmetic to get the ciphertext. • “Venona” was the code word for the project convicted of perjury in 1950 for involvement in a communist • The SIS led to creation of the National Security Agency (NSA) espionage ring.
    [Show full text]
  • (U) Cryptologic Almanac Soth Anniversary Series (U) POLYGLOT: the Meredith Gardner Story
    ~t'i~GI for;9~~ ~~JSA on 12-01-2011 , Transparency Case# 63853 (U) Cryptologic Almanac soth Anniversary Series (U) POLYGLOT: The Meredith Gardner Story (U) The photograph may look "unreal" to today's viewers, but it, like many others taken during World War II at Arlington Hall Station, reflected wartime realities. The picture displays a spacious room with a large number of women sitting around tables, busily employed with their paperwork; in a comer of the room sits one male, wearing a dark suit, the only member of his sex in sight. (U) Reproduced in many recent books about codebreaking, the photograph shows a frozen moment in the wartime service of Meredith Gardner. (U) Meredith Gardner, who died on 9 August 2002 at the age of 89 (he was born in 1912 in Okalona, Mississippi), did valuable translation work in World War II, but he is today remembered as the cryptolinguist who changed the history of the nation with his high achievements on a project known by its postwar codename, VENONA. (U) After the United States entered World War II, the Army and Navy cryptologic services expanded rapidly. In accord with the slogan "Free a man to fight," both services recruited thousands of women, some for uniformed duty, some as civilian employees. The cryptologic services also recruited men who were ineligible for military service. Among those who came to the Army's Arlington Hall was Meredith Gardner. (U) Gardner could read Spanish, French, Russian, Lithuanian, Sanskrit, and -- most important for Arlington Hall -- had a master's degree in German.
    [Show full text]
  • Classified~: Compl.ITE a Facsiml..E Or Release by NSA on TOP SECRET UMBRA Declassified On: J7-03-2014 Pursuant to ::.O
    SECURITY CLASSIFICATION NSA STAFF PROCESSING FORM TO I EXREG CONTROL NUMBER I KCC CONTROL NUMBER DIR THRU ACTION EXREG SUSPENSE D/DIR __, EXEC/DIR__ D APPROVAL KCC SUSPENSE SUB.JECT Update on VENONA Ceremony D SlGNATURE ELEMENT SUSPENSE [ij INFORMATION DISTRIBUTION ExReg, DDP, A/DDP, NS, NSP, VENONA Working Group PURPOSE: To provide update on VENONA Ceremony, scheduled for 10:30 Tuesday, 11 July 1995, in the CIA HQ Bldg Lobby. DISCUSSION: The attached package provides a progress report on the VENONA Ceremony. A meeting was held at CIA on Thursday, 22 June, to lay the groundwork and a package was prepared for the DCI by his staff to update him on the event. (This package is similar to the DCl's package.) The ceremony is tentatively scheduled to last 30 minutes, to be followed by a brief Q & A session led by the DCI and then a reception for invited guests. As the guests depart the ceremony area, press will be invited to remain behind to ask questions about VE NONA; these will be 'fielded by NSA Historian Dr. David Hatch. DDIR and David Kahn may choose to remain as well. TAB A provides the details of the ceremony. A proposed list of the invited dignitaries, at TAB B, was submitted to the DCI for his review along with the text of the invitation, TAB C. The Introductory History of VENONA and Guide to the Translations is finalized and is at the printers. This document, attached at TAB D, will be included in the press kits and released to the general public upon request.
    [Show full text]
  • A Counterintelligence Reader, Volume 2 Chapter 4, VENONA
    226 CHAPTER 4 VENONA Introduction In 1943 the Army Signal Intelligence Service, the forerunner to the National Security Agency (NSA), started a project codenamed VENONA, which concentrated on cracking the Soviet Diplomatic code) Ultimately, after a series of cryptographic breakthroughs over a period of several years, a number of KGB espionage messages were broken, read, and discovered to reveal details of widespread KGB-inspired espionage efforts, including those of the atomic bomb spies) The counterintelligence payoff from VENONA was significant) It was instrumental in providing the FBI with investigative leads that contributed to the identification of the Rosenberg atomic espionage ring and a number of other agents spying on the atomic bomb program) In a ceremony at CIA headquarters in Langley, Virginia, on 11 July 1995, Director of Central Intelligence John M) Deutch announced the release of the VENONA translations of the encrypted Soviet diplomatic communications) In October 1996 a conference on VENONA, cosponsored by CIA, NSA, and the Center for Democracy was held in Washington, D)C) For the conference, CIA and NSA collaborated on producing a publication, called VENONA, Soviet Espionage and The American Response, 1939-1957, as a handbook for scholars interested in VENONA) Anyone interested in this chapter of American counterintelligence should also use the VENONA volume as well as look at the 2,900 Soviet messages on the Internet) 217 VENONA Short History of VENONA On 1 February 1943, the US Armys Signal 3) KGBthe Soviet espionage
    [Show full text]