The 13 Critical Tasks an Inside-Out Approach to Solving More Gun Crime

Total Page:16

File Type:pdf, Size:1020Kb

The 13 Critical Tasks an Inside-Out Approach to Solving More Gun Crime The 13 Critical Tasks An Inside-Out Approach to Solving More Gun Crime by Pete Gagliardi 2019 Ultra Electronics Forensic Technology Inc. © 2019 All rights reserved. The 13 Critical Tasks: An Inside-Out Approach to Solving More Gun Crime Edition 3.0 ISBN: 978-1-9990038-3-8 This book may not be reproduced, stored, distributed, or transmitted, in any form or by any means, electronic, mechanical, recording, photocopying or otherwise, without the prior written permission of Ultra Electronics Forensic Technology Inc. The content of this document is furnished for informational purposes only, is subject to change without notice, and does not imply a commitment by Ultra Electronics Forensic Technology Inc. Ultra Electronics Forensic Technology Inc. assumes no responsibility or liability for errors or inaccuracies that may appear in this document. Other material, including but not limited to texts, images, and illustrations, is owned or held under license by Ultra Electronics Forensic Technology Inc., and Ultra Electronics Forensic Technology Inc. does not represent or warrant that such material does not infringe the rights of any other person or entity. The material is protected in Canada and in other jurisdictions by the Copyright Act and by virtue of the applicable international treaties. Consequently, this other material may not be copied, reproduced, republished, transmitted in electronic form, distributed or modified, in whole or in part, in any form whatsoever without proper written consent of Ultra Electronics Forensic Technology Inc. Nothing herein is to be interpreted as conferring a right to use such other material protected by copyright. Disclaimer The opinions expressed in this book are those of the author, Pete Gagliardi, and may or may not reflect those of Ultra Electronics Forensic Technology Inc. The source of the information contained in the chapters titled “Task 8” and “Task 9” is Ultra Electronics Forensic Technology Inc. To the maximum extent permitted by applicable law, Ultra Electronics Forensic Technology Inc. and its suppliers disclaim any and all warranties and conditions, either express or implied, including, without limitation, implied warranties of merchantability, fitness for a particular purpose, title, and non-infringement, and those arising out of usage of trade or course of dealing, concerning these materials. Trademarks (™) Trademarks of Ultra Electronics Forensic Technology Inc. All other trademarks contained herein are the property of their respective owners. Ultra Electronics Forensic Technology Inc. 5757 Cavendish Boulevard, Suite 200 Côte-Saint-Luc, Québec, Canada H4W 2W8 Telephone: +1 514-489-4247 Canada/USA Toll free +1-888-984-4247 Fax: +1 514-485-9336 Email: [email protected] Web site: www.ultra-forensictechnology.com This book is dedicated to all victims of firearm violence and their families, all men and women of law enforcement, the forensic scientists, prosecutors, and court and corrections personnel who are at the front lines, dealing with armed criminals and the aftermath of their violent acts; to all public administrators, policy makers, and private sector businesses that support those on the front lines by providing the guidance, resources, and tools needed to address violent crime; and last, but not least, to every one of us who is seeking a more peaceful and just way of life. v Contents Acknowledgments .............................................................................................. ix What People are Saying About The 13 Critical Tasks ........................................ x About this Book .................................................................................................. xi Prologue ............................................................................................................ xiii The Presumptive Approach: Every Crime Gun Has a Story to Tell.................... 1 Why is the Presumptive / Inside-out Approach needed? ............................... 1 What is the forecast? ........................................................................................ 2 What information is available for solving gun crimes? ................................. 4 Where is the information? ............................................................................... 5 How can the information be of value, both tactically and strategically? ....... 5 Key Considerations ........................................................................................... 8 Summary ........................................................................................................... 8 Technology Helps Sustain Processes ................................................................... 9 Why adopt and adapt? .................................................................................... 9 How can we adopt and adapt? ..................................................................... 10 Recommended Best Practices ......................................................................... 23 Key Considerations ......................................................................................... 23 Summary ......................................................................................................... 23 People, Processes and Technology .................................................................... 25 Why do we need all three? ............................................................................ 25 Case Study: Chicago, Illinois ........................................................................... 26 The Three-Legged Stool ................................................................................. 27 Recommended Best Practices ......................................................................... 28 Key Considerations ......................................................................................... 29 Summary ......................................................................................................... 29 Development of the 13 Critical Tasks ............................................................... 31 Why were they developed? ........................................................................... 31 How were they developed? ........................................................................... 31 The Results ...................................................................................................... 32 The 13 Critical Tasks ........................................................................................ 33 Asking the Right Question ............................................................................. 34 Summary ......................................................................................................... 35 Task 1: Managing Stakeholders ........................................................................ 37 Why do we need to manage stakeholders? ................................................. 37 Forming Groups .............................................................................................. 40 Meetings ......................................................................................................... 42 Recommended Best Practices ......................................................................... 43 Critical Elements ............................................................................................. 49 Key Considerations ......................................................................................... 50 Summary ......................................................................................................... 50 vi Task 2: Integrating Programs ............................................................................ 51 Why do we need to integrate programs? ..................................................... 51 Steel Cables ..................................................................................................... 52 CGI Case Study: Erie, Pennsylvania ................................................................ 54 Recommended Best Practices ......................................................................... 55 Critical Elements ............................................................................................. 61 Key Considerations ......................................................................................... 62 Summary ......................................................................................................... 62 Task 3: Establishing a Formal Understanding and Reinforcing Directives ..... 63 Why is policy important? ............................................................................... 63 Why establish a formal understanding and reinforce directives? ............... 68 Recommended Best Practices ......................................................................... 69 Critical Elements ........................................................................................... 100 Key Considerations ....................................................................................... 100 Summary ....................................................................................................... 100 Task 4: Collecting Firearm and Related Evidence ........................................... 101 Why collect firearm and related evidence? ................................................ 101 Recommended Best Practices ....................................................................... 106 Critical Elements ..........................................................................................
Recommended publications
  • STRATEGIC PLAN Funding in the US (Circa 1980) MANAGING RISK to ENSURE INTELLIGENCE ADVANTAGE
    Intelligence Reform And Terrorism Prevention Act of 2004 FY2016-2020 IC S&T Executive Order 12333 (1981) Industrial R&D Funding Begins Exceeding Government R&D STRATEGIC PLAN Funding in the US (Circa 1980) MANAGING RISK TO ENSURE INTELLIGENCE ADVANTAGE National Security Act of 1947 Office of Strategic Services Disbanded (1945) 1 About the Cover: The cover uses a red and blue double helix to represent multiple concepts relating to the Intelligence Community’s (IC’s) science and technology (S&T) efforts. For example, starting at the bottom and moving up the image on the cover one observes—in chronological order—a number of key “red” challenges and “blue” technological achievements in the history of the IC. The use of this construct was not chosen randomly, however. Akin to how the base pairs in strands of deoxyribonucleic acid (DNA) correspond to one another, researchers and technologists within the IC S&T enterprise aspire to create capabilities that link to the threat environment of today—and in the future. Lastly, and perhaps most importantly, the choice of a DNA strand is meant to convey the critical importance of basic research to the IC’s mission. Contents Foreword ............................................................................................................................................ iii Vision, Mission, and Guiding Principles for Intelligence Community Science and Technology Enterprise Investments ........................................................................... v Chapter 1 — Introduction ............................................................................................................
    [Show full text]
  • A Counterintelligence Reader, Volume 2 Chapter 1, CI in World
    CI in World War II 113 CHAPTER 1 Counterintelligence In World War II Introduction President Franklin Roosevelts confidential directive, issued on 26 June 1939, established lines of responsibility for domestic counterintelligence, but failed to clearly define areas of accountability for overseas counterintelligence operations" The pressing need for a decision in this field grew more evident in the early months of 1940" This resulted in consultations between the President, FBI Director J" Edgar Hoover, Director of Army Intelligence Sherman Miles, Director of Naval Intelligence Rear Admiral W"S" Anderson, and Assistant Secretary of State Adolf A" Berle" Following these discussions, Berle issued a report, which expressed the Presidents wish that the FBI assume the responsibility for foreign intelligence matters in the Western Hemisphere, with the existing military and naval intelligence branches covering the rest of the world as the necessity arose" With this decision of authority, the three agencies worked out the details of an agreement, which, roughly, charged the Navy with the responsibility for intelligence coverage in the Pacific" The Army was entrusted with the coverage in Europe, Africa, and the Canal Zone" The FBI was given the responsibility for the Western Hemisphere, including Canada and Central and South America, except Panama" The meetings in this formative period led to a proposal for the organization within the FBI of a Special Intelligence Service (SIS) for overseas operations" Agreement was reached that the SIS would act
    [Show full text]
  • The First Americans the 1941 US Codebreaking Mission to Bletchley Park
    United States Cryptologic History The First Americans The 1941 US Codebreaking Mission to Bletchley Park Special series | Volume 12 | 2016 Center for Cryptologic History David J. Sherman is Associate Director for Policy and Records at the National Security Agency. A graduate of Duke University, he holds a doctorate in Slavic Studies from Cornell University, where he taught for three years. He also is a graduate of the CAPSTONE General/Flag Officer Course at the National Defense University, the Intelligence Community Senior Leadership Program, and the Alexander S. Pushkin Institute of the Russian Language in Moscow. He has served as Associate Dean for Academic Programs at the National War College and while there taught courses on strategy, inter- national relations, and intelligence. Among his other government assignments include ones as NSA’s representative to the Office of the Secretary of Defense, as Director for Intelligence Programs at the National Security Council, and on the staff of the National Economic Council. This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other US government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: (Top) Navy Department building, with Washington Monument in center distance, 1918 or 1919; (bottom) Bletchley Park mansion, headquarters of UK codebreaking, 1939 UNITED STATES CRYPTOLOGIC HISTORY The First Americans The 1941 US Codebreaking Mission to Bletchley Park David Sherman National Security Agency Center for Cryptologic History 2016 Second Printing Contents Foreword ................................................................................
    [Show full text]
  • 1 British Signals Intelligence and the 1916 Easter Rising in Ireland ABSTRACT Historians for Decades Have Placed Room 40, the Fi
    British Signals Intelligence and the 1916 Easter Rising in Ireland ABSTRACT Historians for decades have placed Room 40, the First World War British naval signals intelligence organization, at the centre of narratives about the British anticipation of and response to the Easter Rising in Ireland in 1916. A series of crucial decrypts of telegrams between the German embassy in Washington and Berlin, it has been believed, provided significant advance intelligence about the Rising before it took place. This article upends previous accounts by demonstrating that Room 40 possessed far less advance knowledge about the Rising than has been believed, with most of the supposedly key decrypts not being generated until months after the Rising had taken place. INTRODUCTION A key moment in twentieth century Irish history, on Easter Monday 1916 a group of rebels launched in Dublin an uprising against British rule. Carefully prepared in advance, the Irish rebels had previously sought German assistance in providing arms and in organizing transport for famed Irish nationalist Roger Casement. The Germans agreed to provide this assistance, dispatching Casement aboard a German submarine and organizing a covert landing of munitions aboard a merchant ship masquerading as the Norwegian steamer Aud. The arms, however, were intercepted and Casement captured by the British authorities. Notwithstanding these reverses, the uprising went forward shortly thereafter on Easter Monday, 24 April 1916. Though apparently catching the British authorities in Ireland by surprise, the uprising was put down by the British in a violent crackdown. For decades, signals intelligence has been treated as the linchpin in our understanding of the British anticipation of and response to these events.
    [Show full text]
  • A Short History of Army Intelligence
    A Short History of Army Intelligence by Michael E. Bigelow, Command Historian, U.S. Army Intelligence and Security Command Introduction On July 1, 2012, the Military Intelligence (MI) Branch turned fi fty years old. When it was established in 1962, it was the Army’s fi rst new branch since the Transportation Corps had been formed twenty years earlier. Today, it remains one of the youngest of the Army’s fi fteen basic branches (only Aviation and Special Forces are newer). Yet, while the MI Branch is a relatively recent addition, intelligence operations and functions in the Army stretch back to the Revolutionary War. This article will trace the development of Army Intelligence since the 18th century. This evolution was marked by a slow, but steady progress in establishing itself as a permanent and essential component of the Army and its operations. Army Intelligence in the Revolutionary War In July 1775, GEN George Washington assumed command of the newly established Continental Army near Boston, Massachusetts. Over the next eight years, he dem- onstrated a keen understanding of the importance of MI. Facing British forces that usually outmatched and often outnumbered his own, Washington needed good intelligence to exploit any weaknesses of his adversary while masking those of his own army. With intelligence so imperative to his army’s success, Washington acted as his own chief of intelligence and personally scrutinized the information that came into his headquarters. To gather information about the enemy, the American com- mander depended on the traditional intelligence sources avail- able in the 18th century: scouts and spies.
    [Show full text]
  • National Intelligence Council's Global Trends 2040
    A PUBLICATION OF THE NATIONAL INTELLIGENCE COUNCIL MARCH 2021 2040 GLOBAL TRENDS A MORE CONTESTED WORLD A MORE CONTESTED WORLD a Image / Bigstock “Intelligence does not claim infallibility for its prophecies. Intelligence merely holds that the answer which it gives is the most deeply and objectively based and carefully considered estimate.” Sherman Kent Founder of the Office of National Estimates Image / Bigstock Bastien Herve / Unsplash ii GLOBAL TRENDS 2040 Pierre-Chatel-Innocenti / Unsplash 2040 GLOBAL TRENDS A MORE CONTESTED WORLD MARCH 2021 NIC 2021-02339 ISBN 978-1-929667-33-8 To view digital version: www.dni.gov/nic/globaltrends A PUBLICATION OF THE NATIONAL INTELLIGENCE COUNCIL Pierre-Chatel-Innocenti / Unsplash TABLE OF CONTENTS v FOREWORD 1 INTRODUCTION 1 | KEY THEMES 6 | EXECUTIVE SUMMARY 11 | THE COVID-19 FACTOR: EXPANDING UNCERTAINTY 14 STRUCTURAL FORCES 16 | DEMOGRAPHICS AND HUMAN DEVELOPMENT 23 | Future Global Health Challenges 30 | ENVIRONMENT 42 | ECONOMICS 54 | TECHNOLOGY 66 EMERGING DYNAMICS 68 | SOCIETAL: DISILLUSIONED, INFORMED, AND DIVIDED 78 | STATE: TENSIONS, TURBULENCE, AND TRANSFORMATION 90 | INTERNATIONAL: MORE CONTESTED, UNCERTAIN, AND CONFLICT PRONE 107 | The Future of Terrorism: Diverse Actors, Fraying International Efforts 108 SCENARIOS FOR 2040 CHARTING THE FUTURE AMID UNCERTAINTY 110 | RENAISSANCE OF DEMOCRACIES 112 | A WORLD ADRIFT 114 | COMPETITIVE COEXISTENCE 116 | SEPARATE SILOS 118 | TRAGEDY AND MOBILIZATION 120 REGIONAL FORECASTS 141 TABLE OF GRAPHICS 142 ACKNOWLEDGEMENTS iv GLOBAL TRENDS 2040 FOREWORD elcome to the 7th edition of the National Intelligence Council’s Global Trends report. Published every four years since 1997, Global Trends assesses the key Wtrends and uncertainties that will shape the strategic environment for the United States during the next two decades.
    [Show full text]
  • GCHQ): New Accommodation Programme
    House of Commons Committee of Public Accounts Government Communications Headquarters (GCHQ): New Accommodation Programme Twenty–third Report of Session 2003–04 Report, together with formal minutes, oral and written evidence Ordered by The House of Commons to be printed 5 May 2004 HC 65 Published on 15 June 2004 by authority of the House of Commons London: The Stationery Office Limited £10.00 The Committee of Public Accounts The Committee of Public Accounts is appointed by the House of Commons to examine “the accounts showing the appropriation of the sums granted by Parliament to meet the public expenditure, and of such other accounts laid before Parliament as the committee may think fit” (Standing Order No 148). Current membership Mr Edward Leigh MP (Conservative, Gainsborough) (Chairman) Mr Richard Allan MP (Liberal Democrat, Sheffield Hallam) Mr Richard Bacon MP (Conservative, South Norfolk) Mrs Angela Browning MP (Conservative, Tiverton and Honiton) Jon Cruddas MP (Labour, Dagenham) Rt Hon David Curry MP (Conservative, Skipton and Ripon) Mr Ian Davidson MP (Labour, Glasgow Pollock) Rt Hon Frank Field MP (Labour, Birkenhead) Mr Brian Jenkins MP (Labour, Tamworth) Mr Nigel Jones MP (Liberal Democrat, Cheltenham) Ms Ruth Kelly MP (Labour, Bolton West) Jim Sheridan MP (Labour, West Renfrewshire) Mr Siôn Simon MP (Labour, Birmingham Erdington) Mr Gerry Steinberg MP (Labour, City of Durham) Jon Trickett MP (Labour, Hemsworth) Rt Hon Alan Williams MP (Labour, Swansea West) The following was also a member of the Committee during the period of this inquiry. Mr Nick Gibb MP (Conservative, Bognor Regis and Littlehampton) Mr George Osborne MP (Conservative, Tatton) Powers Powers of the Committee of Public Accounts are set out in House of Commons Standing Orders, principally in SO No 148.
    [Show full text]
  • The Historical Impact of Revealing the Ultra Secret
    DOCID: 3827029 Harold C. Deutsch UNCLASSIFIED @>pproved for Release bv NSA on 10-26-2006. FOIA Case# 51639 The Historical Impact of Revealing The Ultra Secret (Reprinted, with permission from Parameters Journal ofthe U.S. Army War College) We really should not have been greatly surprised. Enigma messages.3 To say this much was, of course, to When Group Captain (Colonel) F. W. Winterbotham·s affirm that the machine had not been invulnerable, that work, The Ultra Secrel, burst on our consciousness in its secrets had been at least partially unveiled, and that it 1974, it undoubtedly produced the most sweeping was Soviet rather than Western specialists who had sensation thus far created by an historical revelation.1 It achieved the near-impossible. Kahn did make one was sweeping. especially, in the sense of seeming to reference to the term " Ultra" but seemed to regard it as demand immediate and wholesale revision of historical merely another designation for the solving of the Japanese assumptions about virtually all that determined the course cipher system known as·· Magic." of World War II in the Atlancic sector. In view of the bombshell impact of Winterbotham's It astonishes one to reflecr on how little speculation book in the following year, it is astonishing how little there had been hitherto about the extent of codebreaking sensation resulted from the publication in 1973 of on the part of the Western Allies and how few pressures Gustave Bertrand's Et1ig"14 ou /11 p/111 grll'flde enigme de there had been on governments to answer perplexing la guerre 1939-1945.
    [Show full text]
  • The Authorized History of GCHQ, Britain's Secret Cyber-Intelligence
    Journal of Military and Strategic VOLUME 20, ISSUE 3 Studies Commentary Behind the Enigma: The Authorized History of GCHQ, Britain’s Secret Cyber-Intelligence Agency (London: Bloomsbury Publishing, 2020). Dr. John Ferris I was asked to write the authorized history of GCHQ (Government Communications Headquarters) because not that many people work in the history of ©Centre of Military and Strategic Studies, 2021 ISSN : 1488-559X JOURNAL OF MILITARY AND STRATEGIC STUDIES signals intelligence, which practitioners call sigint. In fact, I may have been studying the history of that topic longer than any other scholar. Beyond that, over the years I’ve built up a reputation among siginters who are interested in history, as actually understanding the techniques of their craft, of being able to make sense of what they do and, above all, of being able to do something that was uncommon, to answer the so what? question. In this case the so what question is, all right, you've produced this material through some complex means, which may be extremely difficult, time- consuming, and sophisticated, but so what? Once you've generated that material, who cares? Who uses that material, how is it used and how can you assess how is it used? Those are questions which I've been dealing with as a historian since the 1980s, but which few other scholars have tried to tackle. So, when in 2014-15, Government Communications Headquarters decided that it needed to have an authorized history, I was the obvious candidate, in all due modesty. Why did GCHQ decide that it needed an authorized history? Signals intelligence agencies, especially Anglophone ones, have been very reticent - I might almost say anal - about maintaining secrecy for their practice.
    [Show full text]
  • Executive Summary
    34th Mayor’s Report to the Assembly Mayor’s Question Time – 12th September 2019 This is my Thirty-Fourth Mayor’s Report to the Assembly, fulfilling my duty under Section 45 of the Greater London Authority Act 1999. It covers the period from 5th July – 29th August 2019. Executive Summary Cycleway 4 construction to start ahead of schedule On 27 August, I announced that the next section of Cycleway 4 will start ahead of schedule. Once complete, Cycleway 4 will add 10km of segregated cycle route to London’s network – enabling thousands more people to enjoy the benefits of this major new route between Tower Bridge and Greenwich sooner. New pedestrian crossings are set to make the area much easier for people walking to get around. Notting Hill Carnival On Sunday 25 August, I spent the afternoon enjoying the music, magnificent parade costumes and sunshine at Notting Hill Carnival. Currently in its 53rd year, it is a celebration of Caribbean culture, that attracted an estimated 1 million people across the weekend. The event would not have been the success it was without the hard work of Notting Hill Carnival Ltd, the public and the voluntary agencies involved, and I thank them for their dedication. New figures show year of stability for London’s pubs On 24 August, new City Hall research shows the number of pubs in London remained stable between 2017 and 2018 after falling by more than a quarter since 2001 London pubs have been a key part of our capital’s heritage for generations, helping to unite Londoners and acting as a vital hub in the community.
    [Show full text]
  • Violent Crime Control and Law Enforcement Act of 1994’’
    H. R. 3355 One Hundred Third Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington on Tuesday, the twenty-fifth day of January, one thousand nine hundred and ninety-four An Act To control and prevent crime. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE. This Act may be cited as the ``Violent Crime Control and Law Enforcement Act of 1994''. SEC. 2. TABLE OF CONTENTS. The following is the table of contents for this Act: Sec. 1. Short title. Sec. 2. Table of contents. TITLE IÐPUBLIC SAFETY AND POLICING Sec. 10001. Short title. Sec. 10002. Purposes. Sec. 10003. Community policing; ``Cops on the Beat''. TITLE IIÐPRISONS Subtitle AÐViolent Offender Incarceration and Truth in Sentencing Incentive Grants Sec. 20101. Grants for correctional facilities. Sec. 20102. Truth in sentencing incentive grants. Sec. 20103. Violent offender incarceration grants. Sec. 20104. Matching requirement. Sec. 20105. Rules and regulations. Sec. 20106. Technical assistance and training. Sec. 20107. Evaluation. Sec. 20108. Definitions. Sec. 20109. Authorization of appropriations. Subtitle BÐPunishment for Young Offenders Sec. 20201. Certain punishment for young offenders. Subtitle CÐAlien Incarceration Sec. 20301. Incarceration of undocumented criminal aliens. Subtitle DÐMiscellaneous Provisions Sec. 20401. Prisoner's place of imprisonment. Sec. 20402. Prison impact assessments. Sec. 20403. Sentences to account for costs to the Government of imprisonment, re- lease, and probation. Sec. 20404. Application to prisoners to which prior law applies. Sec. 20405. Crediting of ``good time''. Sec. 20406. Task force on prison construction standardization and techniques.
    [Show full text]
  • British Codebreaking Operations: 1938-43 Andrew J
    East Tennessee State University Digital Commons @ East Tennessee State University Electronic Theses and Dissertations Student Works 5-2015 All the King’s Men: British Codebreaking Operations: 1938-43 Andrew J. Avery East Tennessee State University Follow this and additional works at: https://dc.etsu.edu/etd Part of the History Commons Recommended Citation Avery, Andrew J., "All the King’s Men: British Codebreaking Operations: 1938-43" (2015). Electronic Theses and Dissertations. Paper 2475. https://dc.etsu.edu/etd/2475 This Thesis - Open Access is brought to you for free and open access by the Student Works at Digital Commons @ East Tennessee State University. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons @ East Tennessee State University. For more information, please contact [email protected]. All the King’s Men: British Codebreaking Operations: 1938-43 _____________________ A thesis presented to the faculty of the Department of History East Tennessee State University In partial fulfillment of the requirements for the degree Master of Arts in History _____________________ by Andrew J. Avery May 2015 _____________________ Dr. Stephen G. Fritz, Chair Dr. Andrew L. Slap Dr. John Rankin Keywords: World War II, Alan Turing, Bletchley Park, Code-breaking, Room 40, Gordon Welchman, GC&CS ABSTRACT All the King’s Men: British Codebreaking Operations: 1938-43 by Andrew J. Avery The Enigma code was one of the most dangerous and effective weapons the Germans wielded at the outbreak of the Second World War. The Enigma machine was capable of encrypting radio messages that seemed virtually unbreakable.
    [Show full text]