Information Management of British Military Intelligence: the Work of the Documentalists, 1909–1945
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Chancellor's Speech to GCHQ on Cyber Security
Speech Chancellor's speech to GCHQ on cyber security From: HM Treasury, Government Communications Headquarters and The Rt Hon George Osborne MP Delivered on: 17 November 2015 (Original script, may differ from delivered version) Location: GCHQ First published: 17 November 2015 Part of: Spending Review and Autumn Statement 2015 Chancellor lays out new plan for £1.9 billion cyber investment, and details seven more departments that have settled ahead of the Spending Review. Before I start my speech, I want to say a few words about the heart-breaking events that unfolded in Paris on Friday evening. This was an assault not just on the people of France, but on all of us who value freedom and democracy. We stand with the people of France. We know that we must act as one, just as our enemies see us as one. As David Cameron has said, we will do everything we possibly can to help the French at this moment of national trauma. That includes making available to them the sharpest of our own national capability, which includes the skills and capabilities of GCHQ. Before the dreadful events of the weekend we had already indicated that we would be increasing substantially the resources we dedicate to countering the terrorist threat posed by ISIL. The Prime Minister has made clear that across the agencies a further 1,900 staff will be recruited to keep Britain safe from terrorist attack. This was going to be an important outcome of the Spending Review. What has unfolded in Paris has reminded us all that it is a vital one too. -
Georgetown University in Partial Fulfillment of the Requirements for the Degree of Master of Arts in Security Studies
THE BATTLE FOR INTELLIGENCE: HOW A NEW UNDERSTANDING OF INTELLIGENCE ILLUMINATES VICTORY AND DEFEAT IN WORLD WAR II A Thesis submitted to the Faculty of the Graduate School of Arts and Sciences of Georgetown University in partial fulfillment of the requirements for the degree of Master of Arts in Security Studies By Edward J. Piotrowicz III, B.A. Washington, DC April 15, 2011 Copyright 2011 by Edward J. Piotrowicz III All Rights Reserved ii THE BATTLE FOR INTELLIGENCE: HOW A NEW UNDERSTANDING OF INTELLIGENCE ILLUMINATES VICTORY AND DEFEAT IN WORLD WAR II Edward J. Piotrowicz III, B.A. Thesis Advisor: Jennifer E. Sims, PhD. ABSTRACT Does intelligence make a difference in war? Two World War II battles provide testing grounds for answering this question. Allied intelligence predicted enemy attacks at both Midway and Crete with uncanny accuracy, but the first battle ended in an Allied victory, while the second finished with crushing defeat. A new theory of intelligence called “Decision Advantage,”a illuminates how the success of intelligence helped facilitate victory at Midway and how its dysfunction contributed to the defeat at Crete. This view stands in contrast to that of some military and intelligence scholars who argue that intelligence has little impact on battle. This paper uses the battles of Midway and Crete to test the power of Sims‟s theory of intelligence. By the theory‟s standards, intelligence in the case of victory outperformed intelligence in the case of defeat, suggesting these cases uphold the explanatory power of the theory. Further research, however, could enhance the theory‟s prescriptive power. -
'Global Intelligence Co-Operation Versus Accountability: New Facets
This article was downloaded by: [Aldrich, Richard J.] On: 2 April 2009 Access details: Access Details: [subscription number 910154969] Publisher Routledge Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Intelligence and National Security Publication details, including instructions for authors and subscription information: http://www.informaworld.com/smpp/title~content=t713672628 Global Intelligence Co-operation versus Accountability: New Facets to an Old Problem Richard J. Aldrich Online Publication Date: 01 February 2009 To cite this Article Aldrich, Richard J.(2009)'Global Intelligence Co-operation versus Accountability: New Facets to an Old Problem',Intelligence and National Security,24:1,26 — 56 To link to this Article: DOI: 10.1080/02684520902756812 URL: http://dx.doi.org/10.1080/02684520902756812 PLEASE SCROLL DOWN FOR ARTICLE Full terms and conditions of use: http://www.informaworld.com/terms-and-conditions-of-access.pdf This article may be used for research, teaching and private study purposes. Any substantial or systematic reproduction, re-distribution, re-selling, loan or sub-licensing, systematic supply or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date. The accuracy of any instructions, formulae and drug doses should be independently verified with primary sources. The publisher shall not be liable for any loss, actions, claims, proceedings, demand or costs or damages whatsoever or howsoever caused arising directly or indirectly in connection with or arising out of the use of this material. -
The Forgotten Fronts the First World War Battlefield Guide: World War Battlefield First the the Forgotten Fronts Forgotten The
Ed 1 Nov 2016 1 Nov Ed The First World War Battlefield Guide: Volume 2 The Forgotten Fronts The First Battlefield War World Guide: The Forgotten Fronts Creative Media Design ADR005472 Edition 1 November 2016 THE FORGOTTEN FRONTS | i The First World War Battlefield Guide: Volume 2 The British Army Campaign Guide to the Forgotten Fronts of the First World War 1st Edition November 2016 Acknowledgement The publisher wishes to acknowledge the assistance of the following organisations in providing text, images, multimedia links and sketch maps for this volume: Defence Geographic Centre, Imperial War Museum, Army Historical Branch, Air Historical Branch, Army Records Society,National Portrait Gallery, Tank Museum, National Army Museum, Royal Green Jackets Museum,Shepard Trust, Royal Australian Navy, Australian Defence, Royal Artillery Historical Trust, National Archive, Canadian War Museum, National Archives of Canada, The Times, RAF Museum, Wikimedia Commons, USAF, US Library of Congress. The Cover Images Front Cover: (1) Wounded soldier of the 10th Battalion, Black Watch being carried out of a communication trench on the ‘Birdcage’ Line near Salonika, February 1916 © IWM; (2) The advance through Palestine and the Battle of Megiddo: A sergeant directs orders whilst standing on one of the wooden saddles of the Camel Transport Corps © IWM (3) Soldiers of the Royal Army Service Corps outside a Field Ambulance Station. © IWM Inside Front Cover: Helles Memorial, Gallipoli © Barbara Taylor Back Cover: ‘Blood Swept Lands and Seas of Red’ at the Tower of London © Julia Gavin ii | THE FORGOTTEN FRONTS THE FORGOTTEN FRONTS | iii ISBN: 978-1-874346-46-3 First published in November 2016 by Creative Media Designs, Army Headquarters, Andover. -
Polish Mathematicians Finding Patterns in Enigma Messages
Fall 2006 Chris Christensen MAT/CSC 483 Machine Ciphers Polyalphabetic ciphers are good ways to destroy the usefulness of frequency analysis. Implementation can be a problem, however. The key to a polyalphabetic cipher specifies the order of the ciphers that will be used during encryption. Ideally there would be as many ciphers as there are letters in the plaintext message and the ordering of the ciphers would be random – an one-time pad. More commonly, some rotation among a small number of ciphers is prescribed. But, rotating among a small number of ciphers leads to a period, which a cryptanalyst can exploit. Rotating among a “large” number of ciphers might work, but that is hard to do by hand – there is a high probability of encryption errors. Maybe, a machine. During World War II, all the Allied and Axis countries used machine ciphers. The United States had SIGABA, Britain had TypeX, Japan had “Purple,” and Germany (and Italy) had Enigma. SIGABA http://en.wikipedia.org/wiki/SIGABA 1 A TypeX machine at Bletchley Park. 2 From the 1920s until the 1970s, cryptology was dominated by machine ciphers. What the machine ciphers typically did was provide a mechanical way to rotate among a large number of ciphers. The rotation was not random, but the large number of ciphers that were available could prevent depth from occurring within messages and (if the machines were used properly) among messages. We will examine Enigma, which was broken by Polish mathematicians in the 1930s and by the British during World War II. The Japanese Purple machine, which was used to transmit diplomatic messages, was broken by William Friedman’s cryptanalysts. -
Idle Motion's That Is All You Need to Know Education Pack
Idle Motion’s That is All You Need to Know Education Pack Idle Motion create highly visual theatre that places human stories at the heart of their work. Integrating creative and playful stagecraft with innovative video projection and beautiful physicality, their productions are humorous, evocative and sensitive pieces of theatre which leave a lasting impression on their audiences. From small beginnings, having met at school, they have grown rapidly as a company over the last six years, producing five shows that have toured extensively both nationally and internationally to critical acclaim. Collaborative relationships are at the centre of all that they do and they are proud to be an Associate Company of the New Diorama Theatre and the Oxford Playhouse. Idle Motion are a young company with big ideas and a huge passion for creating exciting, beautiful new work. That is All You Need to Know ‘That Is All You Need To Know’ is Idle Motion’s fifth show. We initially wanted to make a show based on the life of Alan Turing after we were told about him whilst researching chaos theory for our previous show ‘The Seagull Effect’. However once we started to research the incredible work he did during the Second World War at Bletchley Park and visited the site itself we soon realised that Bletchley Park was full of astounding stories and people. What stood out for us as most remarkable was that the thousands of people who worked there kept it all a secret throughout the war and for most of their lives. This was a story we wanted to tell. -
Remnants of Al-Qaeda in Saudi Arabia: Current Assessment
Remnants of al-Qaeda in Saudi Arabia: Current Assessment Washington, DC - November 9th, 2006 Center for Strategic and International Studies Nawaf Obaid Managing Director Counter-Terrorism in the Kingdom • Since May 2003, Saudi security forces have captured ~845 individuals with direct or indirect links to al-Qaeda. • Over 400 have attended “ideological re-education programs.” • 264 al-Qaeda commanders, logisticians, theologians, financiers and fighters have been captured or killed. • Of 26 members that comprised first “most wanted” list, all but one have been killed or captured and all five initial al-Qaeda cells have been identified, infiltrated and decimated. • Of 36 second-tier operatives comprising second “most wanted” list: • 20 had already fled the Kingdom when list was published • Of remaining 16, only 4 have not been killed or captured • This group carried out recent failed attack on Abqaiq • Over 25 major terrorist attacks have been foiled since May 2003. Saudi National Security Assessment Project 2 Counter-Terrorism in the Kingdom (cont.) • Four of the main routes used by terrorists to smuggle themselves, fighters, weapons and drugs have been identified. • Close surveillance had resulted in hundreds of interceptions on the Saudi-Yemeni border. • The largest of the al-Qaeda safe houses used for logistical support has been destroyed. As have three in Riyadh, two in Qassim, two in the Eastern Province, one in Najran and three in the Western Province (Makkah, Madinah and Jeddah). • Several arrests of fighters returning from Afghanistan and Pakistan have been made over the past several months. Important Note: They had no attack plan and no clear command structure, focused exclusively on avoiding Saudi security services. -
The War Room Managed North Sea Trap 1907-1916
Michael H. Clemmesen 31‐12‐2012 The War Room Managed North Sea Trap 1907‐1916. The Substance, Roots and Fate of the Secret Fisher‐Wilson “War Plan”. Initial remarks In 1905, when the Royal Navy fully accepted the German High Seas Fleet as its chief opponent, it was already mastering and implementing reporting and control by wireless telegraphy. The Admiralty under its new First Sea Lord, Admiral John (‘Jacky’) Fisher, was determined to employ the new technology in support and control of operations, including those in the North Sea; now destined to become the main theatre of operations. It inspired him soon to believe that he could centralize operational control with himself in the Admiralty. The wireless telegraph communications and control system had been developed since 1899 by Captain, soon Rear‐Admiral Henry Jackson. Using the new means of communications and intelligence he would be able to orchestrate the destruction of the German High Seas Fleet. He already had the necessary basic intelligence from the planned cruiser supported destroyer patrols off the German bases, an operation based on the concept of the observational blockade developed by Captain George Alexander Ballard in the 1890s. Fisher also had the required The two officers who supplied the important basis for the plan. superiority in battleships to divide the force without the risk of one part being To the left: George Alexander Ballard, the Royal Navy’s main conceptual thinker in the two decades defeated by a larger fleet. before the First World War. He had developed the concept of the observational blockade since the 1890s. -
'The Admiralty War Staff and Its Influence on the Conduct of The
‘The Admiralty War Staff and its influence on the conduct of the naval between 1914 and 1918.’ Nicholas Duncan Black University College University of London. Ph.D. Thesis. 2005. UMI Number: U592637 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. Dissertation Publishing UMI U592637 Published by ProQuest LLC 2013. Copyright in the Dissertation held by the Author. Microform Edition © ProQuest LLC. All rights reserved. This work is protected against unauthorized copying under Title 17, United States Code. ProQuest LLC 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, Ml 48106-1346 CONTENTS Page Abstract 4 Acknowledgements 5 Abbreviations 6 Introduction 9 Chapter 1. 23 The Admiralty War Staff, 1912-1918. An analysis of the personnel. Chapter 2. 55 The establishment of the War Staff, and its work before the outbreak of war in August 1914. Chapter 3. 78 The Churchill-Battenberg Regime, August-October 1914. Chapter 4. 103 The Churchill-Fisher Regime, October 1914 - May 1915. Chapter 5. 130 The Balfour-Jackson Regime, May 1915 - November 1916. Figure 5.1: Range of battle outcomes based on differing uses of the 5BS and 3BCS 156 Chapter 6: 167 The Jellicoe Era, November 1916 - December 1917. Chapter 7. 206 The Geddes-Wemyss Regime, December 1917 - November 1918 Conclusion 226 Appendices 236 Appendix A. -
Download the Full PDF Here
THE PHILADELPHIA PAPERS A Publication of the Foreign Policy Research Institute GREAT WAR AT SEA: REMEMBERING THE BATTLE OF JUTLAND by John H. Maurer May 2016 13 FOREIGN POLICY RESEARCH INSTITUTE THE PHILADELPHIA PAPERS, NO. 13 GREAT WAR AT SEA: REMEMBERING THE BATTLE OF JUTLAND BY JOHN H. MAURER MAY 2016 www.fpri.org 1 THE PHILADELPHIA PAPERS ABOUT THE FOREIGN POLICY RESEARCH INSTITUTE Founded in 1955 by Ambassador Robert Strausz-Hupé, FPRI is a non-partisan, non-profit organization devoted to bringing the insights of scholarship to bear on the development of policies that advance U.S. national interests. In the tradition of Strausz-Hupé, FPRI embraces history and geography to illuminate foreign policy challenges facing the United States. In 1990, FPRI established the Wachman Center, and subsequently the Butcher History Institute, to foster civic and international literacy in the community and in the classroom. ABOUT THE AUTHOR John H. Maurer is a Senior Fellow of the Foreign Policy Research Institute. He also serves as the Alfred Thayer Mahan Professor of Sea Power and Grand Strategy at the Naval War College in Newport, Rhode Island. The views expressed in this article are those of the author alone, and do not represent the settled policy of the Naval War College, the Department of the Navy, the Department of Defense, or the U.S. Government. Foreign Policy Research Institute 1528 Walnut Street, Suite 610 • Philadelphia, PA 19102-3684 Tel. 215-732-3774 • Fax 215-732-4401 FOREIGN POLICY RESEARCH INSTITUTE 2 Executive Summary This essay draws on Maurer’s talk at our history institute for teachers on America’s Entry into World War I, hosted and cosponsored by the First Division Museum at Cantigny in Wheaton, IL, April 9-10, 2016. -
Defeating the U-Boat Inventing Antisubmarine Warfare NEWPORT PAPERS
NAVAL WAR COLLEGE NEWPORT PAPERS 36 NAVAL WAR COLLEGE WAR NAVAL Defeating the U-boat Inventing Antisubmarine Warfare NEWPORT PAPERS NEWPORT S NA N E V ES AV T AT A A A L L T T W W S S A A D D R R E E C C T T I I O O L N L N L L U U E E E E G G H H E E T T I I VIRIBU VOIRRIABU OR A S CT S CT MARI VI MARI VI 36 Jan S. Breemer Color profile: Disabled Composite Default screen U.S. GOVERNMENT Cover OFFICIAL EDITION NOTICE This perspective aerial view of Newport, Rhode Island, drawn and published by Galt & Hoy of New York, circa 1878, is found in the American Memory Online Map Collections: 1500–2003, of the Library of Congress Geography and Map Division, Washington, D.C. The map may be viewed at http://hdl.loc.gov/ loc.gmd/g3774n.pm008790. Use of ISBN Prefix This is the Official U.S. Government edition of this publication and is herein identified to certify its authenticity. ISBN 978-1-884733-77-2 is for this U.S. Government Printing Office Official Edition only. The Superintendent of Documents of the U.S. Govern- ment Printing Office requests that any reprinted edi- tion clearly be labeled as a copy of the authentic work with a new ISBN. Legal Status and Use of Seals and Logos The logo of the U.S. Naval War College (NWC), Newport, Rhode Island, authenticates Defeating the U- boat: Inventing Antisubmarine Warfare, by Jan S. -
Understanding and Intelligence Support to Joint Operations
JDP 2-00 JOINT DOCTRINE PUBLICATION 2-00 UNDERSTANDING AND INTELLIGENCE SUPPORT TO JOINT OPERATIONS Joint Doctrine Publication 2-00 (JDP 2-00) (3rd Edition), August 2011 is promulgated as directed by the Chiefs of Staff Assistant Chief of the Defence Staff (Development, Concepts and Doctrine) CONDITIONS OF RELEASE 1. This information is Crown copyright and the intellectual property rights for this publication belong exclusively to the Ministry of Defence (MOD). No material or information contained in this publication should be reproduced, stored in a retrieval system, or transmitted in any form outside MOD establishments except as authorised by both the sponsor and the MOD where appropriate. 2. This information may be subject to privately owned rights. i 3rd Edition, Change 1 JDP 2-00 AUTHORISATION The Development, Concepts and Doctrine Centre (DCDC) is responsible for publishing Joint Doctrine Publications (JDPs) within a hierarchy of similar publications. Readers wishing to quote JDPs as reference material in other work should confirm with the DCDC Doctrine Editor whether the particular publication and amendment state remains authoritative. Comments on factual accuracy or proposals for amendment are welcomed by the Doctrine Editor at: The Development, Concepts and Doctrine Centre Ministry of Defence Shrivenham SWINDON, Wiltshire, SN6 8RF Telephone number: 01793 314216/7 Military Network: 96161 4216/4217 Facsimile number: 01793 314232 Military Network: 96161 4232 E-mail: [email protected] DISTRIBUTION Distribution of JDPs is managed by the Forms and Publications Section, DSDA Operations Centre, C16 Site, Ploughley Road, Arncott, Bicester, OX25 1LP. Requests for issue of this publication, or amendments to its distribution should be referred to the DSDA Operations Centre.