Introduction Background How It Works the VENONA Breakthrough

Total Page:16

File Type:pdf, Size:1020Kb

Introduction Background How It Works the VENONA Breakthrough By Cindy Flores, Hyeok Jung Kim, Dalia Moradi, Abanob Saleh, Xi Ye You Seminar 3: Science & Technology of NYC, Professor Kent D. Boklan Introduction Significance How It Works On February 1, 1943, a small group of code breakers of the U.S. Army’s Importance of the Venona Project The Code (Vernam Cipher) and How it Works Signal Intelligence Service (SIS) launched the VENONA Project, a secret • Exposed the Soviet spy ring and information about the atomic bomb • Proven to be mathematically secure under ideal implementation by counterintelligence program to decrypt and exploit communication by the • Lasted from 1943 to 1980, declassified in 1995- from World War 2 Claude Shannon Soviet Union. throughout the Cold War (1947-1991) 1) Represent plain text into numbers (alphabet positioning.. ie: A=1) • Exposed Julius and Ethel Rosenberg for espionage and conspiracy to 2) Create a randomly generated key that is the same length as the plain Background provide atomic secrets to the USSR. As a result, they were executed text by electric chair in 1953. 3) Combine the plaintext and random key using XOR or modular addition History • They were implicated by their in-laws Ruth and David Greenglass, 4) Convert the numbers back into cipher text • The code breakers were named “Arlington Hall” after their communists who were also Soviet spies 5) To get back to the plain text, XOR the key again or subtract using headquarters in Virginia • Alger Hiss was a former U.S. State Department official who was modular arithmetic to get the ciphertext. • “Venona” was the code word for the project convicted of perjury in 1950 for involvement in a communist • The SIS led to creation of the National Security Agency (NSA) espionage ring. During this time, many Americans had a fear of domestic communism (The “Red Scare”). Plaintext Initial Discoveries • There were 5 code systems used by the Soviet Union - Trade representatives (the Soviet Gov’t Purchasing Commission) - Diplomats (used by members of diplomatic corps) Key - KGB (Soviet Espionage Agency) - GRU (the Soviet Army General Staff Intelligence Directorate) - GRU – Naval (Soviet Naval Intelligence Staff) Information Theory Ciphertext • Claude Shannon, the Father of Information Theory, says that the key used in encryption must be random for it to be secure • Encryption: to encode messages or information so that only intended The VENONA Breakthrough recipients can read it and unauthorized parties cannot. • Use a key to encrypt the message (plaintext) into the ciphertext Who broke it and how? • Recipient uses a key to decrypt the ciphertext. • Richard Hallock noticed that the Soviets were reusing some of their • XOR (⊕): Addition of numbers (mod 2) keys • x(Mod n):The remainder, when x is divided by n • Since keys have to be random and only used once, it was inefficient Effectiveness • Binary: Base 2 number system (1,0) for the Soviets to create new ones. So, they reused the keys. • The ciphertext does not give any information about the plain text • When the Soviets used XOR in the Vernam cipher, the repetition of except for the maximum length of the message. the key meant that the plaintext could be found by XORing two cipher The randomness of the key means that even if a computer could try November 1943 - May 1945: military • team finds Soviet texts together. February 1, 1943 – Lieutenant Richard out every possible key, more than one plausible plaintext could be Hallock first breaks codebooks in Saxony • Physical copies of the keys were often carried around and weren’t Venona project begins yielded. Soviet diplomatic and Schleswig, properly disposed of after use cipher Germany Drawbacks Key Figures • Keys have to be randomly generated each time a message is sent. • Gene Gabreel • Since this is a mechanical code, there is no way to verify July – December - Was a new member of the army intelligence group when she was 1953 – Rosenbergs 1948 – 1951 – the 1946 – Meredith authentication. executed for Venona project Gardner translates recruited and assigned to start the VENONA project conspiracy to commit exposes major KGB messages including • Lieutenant Richard Hallock espionage espionage agents one about the atomic bomb - Discovered the repetitions and pattern in other Soviet codes, References leading to the first partial decryption in 1943 Carter Clarke, Robert, Lamphere, Gene Grabeel, Meredith Gardner, Cecil, and Phillips, Kim Philby, Klaus Fuchs, Elizabeth Bentley,. "The Venona • Cecil Phillips Story." (n.d.): n. pag. NSA.gov. Web. 24 Nov. 2014. - Cryptographer who first discovered the mathematical pattern in Klher, Harvey. "Venona." Google Books. Yale University, 1999. Web. 24 Nov. 2014. 1995 – Venona the Soviet cryptosystem and break the KGB cipher Linder, Douglas. "The Alger Hiss Trial." The Alger Hiss Trial. N.p., 2003. Web. 24 Nov. 2014. October 1, 1980 – documents begin to Venona project ends • Meredith Gardner Linder, Douglas. "The Trial of Ethel and Julius Rosenberg." The Trial of Ethel and Julius Rosenberg. N.p., 2008. Web. 23 Nov. 2014. get declassified - Made key code breaks and worked with the FBI to discover many NSA. "Declassification and Transparency- Venona." Venona. NSA, 15 Jan. 2009. Web. 24 Nov. 2014. espionage agents "Venona: Soviet Espionage and The American Response 1939-1957."Central Intelligence Agency. Central Intelligence Agency, 19 June 2013. Web. 24 Nov. 2014. .
Recommended publications
  • SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM
    SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM HEINEMANN: AUSTRALIA First published in 1987 by HEINEMANN PUBLISHERS AUSTRALIA (A division of Octopus Publishing Group/Australia Pty Ltd) 85 Abinger Street, Richmond, Victoria, 3121. Copyright (c) 1987 by Peter Wright ISBN 0-85561-166-9 All Rights Reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. TO MY WIFE LOIS Prologue For years I had wondered what the last day would be like. In January 1976 after two decades in the top echelons of the British Security Service, MI5, it was time to rejoin the real world. I emerged for the final time from Euston Road tube station. The winter sun shone brightly as I made my way down Gower Street toward Trafalgar Square. Fifty yards on I turned into the unmarked entrance to an anonymous office block. Tucked between an art college and a hospital stood the unlikely headquarters of British Counterespionage. I showed my pass to the policeman standing discreetly in the reception alcove and took one of the specially programmed lifts which carry senior officers to the sixth-floor inner sanctum. I walked silently down the corridor to my room next to the Director-General's suite. The offices were quiet. Far below I could hear the rumble of tube trains carrying commuters to the West End. I unlocked my door. In front of me stood the essential tools of the intelligence officer’s trade - a desk, two telephones, one scrambled for outside calls, and to one side a large green metal safe with an oversized combination lock on the front.
    [Show full text]
  • Venona Special Studies
    - 1 - Venona Project Special Studies Transcribed by Students of the Mercyhurst College Institute for Intelligence Studies Arranged by John Earl Haynes, Library of Congress, 2010 COVER NAMES IN NEW YORK TRAFFIC p. 2 UNIDENTIFIED COVER NAMES IN NEW YORK TRAFFIC p. 86 COVER NAMES IN SAN FRANCISCO TRAFFIC p. 92 COVER NAMES IN WASHINGTON TRAFFIC p. 123 ADDITIONAL COVERNAMES AND RELATED INFORMATION IN DIPLOMATIC TRAFFIC p. 127 REVISED TRANSLATION OF MESSAGE ON ANTENNA-LIBERAL'S WIFE ETHEL p. 135 THE COVERNAMES "ANTENNA" AND "LIBERAL" IN . MESSAGES p. 139 ESSAGES IN . INVOLVING THE COVERNAME"ENORMOZ" AND THE NAMES OF NUCLEAR PHYSICISTS, ETC. p. 147 UNDATED REPORT OF MEREDITH GARDNER p. 155 DEVELOPMENT OF THE “G--“HOMER” [“GOMER”] CASE p. 158 THE KOMAR (KRAVCHENKO) AFFAIR IN . MESSAGES p. 161 REVISED TRANSLATION OF TWO . MESSAGES ON CHANGES IN COVERNAMES p. 170 THE COVERNAME "KARAS" IN. TRAFFIC p. 178 THE COVERNAMES "TÉNOR", "BAS", AND "CHETÁ" (? IN . TRAFFIC p. 181 - 2 - Special Study Cover Names in New York Traffic - 3 - cover-name Message number Date Publication reference S/ or 3/NBF/ 19 N.Y. to M. 812 29053 JKI 06 T1022 1B-1910 0027A ABRAM N.Y. to M. 992 24063 JKR 14 T872√ 1B-7518 0005A JACK SOBLE 1086 06073 JKV 48 T873√ 2A-0011 1957 29113 NNNNNN T939√ 625 04054 JHD 48 T916√ 851 15064 JIJ 40 T10.1√ 1146 10084 JHM 41 T123√ 1251 02094 JHN 12 T301√ (to ChEKh) 0005B 1353 23094 JHO 42 T289√ 1449 12104 JIL 37 T106√ 1754 14124 JHZ 49 T6√ 48 11015 JHV 37 (NSA)T1941 AVGUR 2A-0013 1638 (AUGUR) N.Y.
    [Show full text]
  • National Security Agency
    Coordinates: 39°6′32″N 76°46′17″W National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United National Security Agency States Department of Defense, under the authority of the Director of National Intelligence. The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems.[8][9] The NSA relies on a variety of measures to accomplish its Seal of the National Security Agency mission, the majority of which are clandestine.[10] Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become the largest of the U.S. intelligence organizations in terms of Flag of the National Security Agency personnel and budget.[6][11] The NSA currently conducts worldwide mass data collection and has been known to physically bug electronic systems as one method to this end.[12] The NSA is also alleged to have been behind such attack software as Stuxnet, which severely damaged Iran's nuclear program.[13][14] The NSA, alongside the Central Intelligence Agency (CIA), maintains a physical presence in many countries across the globe; the CIA/NSA joint Special Collection Service (a NSA Headquarters, Fort Meade, Maryland highly classified intelligence team) inserts eavesdropping devices in high value targets (such Agency overview as presidential palaces or embassies).
    [Show full text]
  • ABSTRACT Title of Document: from the BELLY of the HUAC: the RED PROBES of HOLLYWOOD, 1947-1952 Jack D. Meeks, Doctor of Philos
    ABSTRACT Title of Document: FROM THE BELLY OF THE HUAC: THE RED PROBES OF HOLLYWOOD, 1947-1952 Jack D. Meeks, Doctor of Philosophy, 2009 Directed By: Dr. Maurine Beasley, Journalism The House Un-American Activities Committee, popularly known as the HUAC, conducted two investigations of the movie industry, in 1947 and again in 1951-1952. The goal was to determine the extent of communist infiltration in Hollywood and whether communist propaganda had made it into American movies. The spotlight that the HUAC shone on Tinsel Town led to the blacklisting of approximately 300 Hollywood professionals. This, along with the HUAC’s insistence that witnesses testifying under oath identify others that they knew to be communists, contributed to the Committee’s notoriety. Until now, historians have concentrated on offering accounts of the HUAC’s practice of naming names, its scrutiny of movies for propaganda, and its intervention in Hollywood union disputes. The HUAC’s sealed files were first opened to scholars in 2001. This study is the first to draw extensively on these newly available documents in an effort to reevaluate the HUAC’s Hollywood probes. This study assesses four areas in which the new evidence indicates significant, fresh findings. First, a detailed analysis of the Committee’s investigatory methods reveals that most of the HUAC’s information came from a careful, on-going analysis of the communist press, rather than techniques such as surveillance, wiretaps and other cloak and dagger activities. Second, the evidence shows the crucial role played by two brothers, both German communists living as refugees in America during World War II, in motivating the Committee to launch its first Hollywood probe.
    [Show full text]
  • Cryptologic Quarterly, 2019-01
    Cryptologic Quarterly NSA’s Friedman Conference Center PLUS: Vint Hill Farms Station • STONEHOUSE of East Africa The Evolution of Signals Security • Mysteries of Linguistics 2019-01 • Vol. 38 Center for Cryptologic History Cryptologic Quarterly Contacts. Please feel free to address questions or comments to Editor, CQ, at [email protected]. Disclaimer. All opinions expressed in Cryptologic PUBLISHER: Center for Cryptologic History Quarterly are those of the authors. Th ey do not neces- CHIEF: John A. Tokar sarily refl ect the offi cial views of the National Security EXECUTIVE EDITOR: Pamela F. Murray Agency/Central Security Service. MANAGING EDITOR: Laura Redcay Copies of Cryptologic Quarterly can be obtained by ASSOCIATE EDITOR: Jennie Reinhardt sending an email to [email protected]. Editorial Policy. Cryptologic Quarterly is the pro- fessional journal for the National Security Agency/ Central Security Service. Its mission is to advance knowledge of all aspects of cryptology by serving as a forum for issues related to cryptologic theory, doc- trine, operations, management, and history. Th e pri- mary audience for Cryptologic Quarterly is NSA/CSS professionals, but CQ is also distributed to personnel in other United States intelligence organizations as well as cleared personnel in other federal agencies and departments. Cryptologic Quarterly is published by the Center for Cryptologic History, NSA/CSS. Th e publication is de- signed as a working aid and is not subject to receipt, control, or accountability. Cover: “Father of American cryptology” William Friedman’s retirement ceremony in the Arlington Hall Post Theater, Arlington, VA, 1955. Lieutenant General Ralph Canine is at left, Solomon Kullback is seated left, Friedman is second from right, and Director of Central Intelligence Allen Dulles is at far right.
    [Show full text]
  • VENONA: an Overview
    DOCID: 3575728 Cryptologic Almanac 50th Anniversary Series VENONA: An Overview (U) "Spy catching" is an alluring phrase more often connected with James Bond than with a cryptanalyst. However, during the Cold War, a group ofcryptanalysts assisted the spy catchers in their efforts to stop Soviet espionage in the United States and other allied countries. Their decrypts revealed, among other things, the extent ofthe KGB operations in the United States and furthered the FBI's and other agencies' efforts in tracking down these spies. (U) VENONA was the final in a series ofcover names for the project to exploit cryptosystems used to protect what was initially believed to be Soviet diplomatic communications. The messages were encrypted using a complicated code that was then superenciphered by adding a numeric key stream from a one-time pad to the code. After some analysis, the cryptanalysts discovered they were really attacking five different systems being used by five different entities instead ofone as originally thought. The five users for the five versions ofVENONA were Soviet trade representatives, Soviet diplomats, and three Soviet spy agencies (the KGB, the Soviet Army General Staff Intelligence Directorate (GRU), and the Soviet Naval Intelligence, Staff(GRU-Naval)). ~ Although American cable companies, at the direction ofthe U.S. Army, had been collecting VENONA messages since 1939, there was no serious effort against the traffic until 1 February 1943. Prior to that time the system was believed unbreakable and thus not worth the cryptanalytic effort. One-time pads were and are still considered one ofthe most difficult manual cryptosystems to exploit; properly used, a one-time pad is virtually unbreakable.
    [Show full text]
  • Welcome to the Pentagon • 2021 Foreward 2021 Orientation and Guide
    WELCOME TO THE PENTAGON • 2021 FOREWARD 2021 ORIENTATION AND GUIDE PENTAGON RESERVATION COVID-19 OPERATIONS Right now, the Pentagon is operating in a unique COVID-19 environment. The Department of Defense (DoD) implemented precautionary measures when the COVID-19 pandemic began and continues to monitor and assess the situation carefully with the assistance of expert guidance from the Centers for Disease Control, and local, state, and federal authorities. In response to the COVID-19 pandemic, the Pentagon Reservation adopted the Department’s Health Protection Condition framework known as HPCON levels. They range from Alpha to Delta, and each one has specific guidelines for employees to follow. You will find a detailed list of these guidelines on the Washington Headquarters Services (WHS) website: www.WHS.mil. Hours of operation and Operating Status for certain services on the Pentagon Reservation are subject to change. Log on to www.whs.mil/ coronavius for most up to date information. Stay safe, stay healthy and welcome to the Pentagon. 2 3 TABLE OF CONTENTS PENTAGON RESERVATION COVID-19 OPERATIONS 3 THE PENTAGON RESERVATION 9 TRANSPORTATION 11 METROPOLITAN AREA TRANSIT OPTIONS ..........................................................................................................................................................................................................11 WASHINGTON HEADQUARTERS SERVICES TRANSPORTAION MANAGEMENT PROGRAM OFFICE (WHS TMPO) .......................................................................................11
    [Show full text]
  • Compiled Fall 2018 Binder
    Recent Writings and Press Coverage for Howard Gardner and Project Zero September 2018 Prof. Howard Gardner Harvard Graduate School of Education 13 Appian Way Longfellow Hall 234 Cambridge, MA 02138 Phone: 617-496-4929 Fax: 617-496-4855 [email protected] www.howardgardner.com www.multipleintelligencesoasis.org www.pz.harvard.edu www.thegoodproject.org Table of Contents I. The App Generation “Getting smart about smartphones” The Atlantic “You should talk about politics this Thanksgiving” Salon.com II. Education “Celebrating Every Learner: Activities and Strategies for Creating a Multiple Intelligences Classroom” Amazon “Visible Learners: Promoting Reggio-Inspired Approaches in All Schools” Amazon “Learning lessons, the fun way” The Hindu “Harvard Fellows deliver inspiring testimony during MCSB meeting” Ledger-Enquirer “Can science change the culture of education?” The Frederick News-Post “Contra-disciplinary - the best model of artscience education” The Hindu “The 2018 RHSU Edu-Scholar Public Influence Rankings” American Enterprise Institute “Education must be more than mere consumption of knowledge, says Saikat Majumdar” The Hindu “So your preschooler can’t sit still? Don’t worry, it’s normal” Momaha “Safari Kid: enabling children in perfect learning environment” Digital Learning “Back to Leonardo’s notebooks” Outlook “Learn to unlearn” The Hindu “On creativity” The Brooklyn Rail “Riverview charter school recognized for closing education gap” Bloomingdale Patch “Urgent memo to Malaysia’s new Minister of Education” Eurasia Review “Sole
    [Show full text]
  • Top Secret Studies on U.S. Communications Intelligence During World War II
    A Guide to the Microfilm Edition of World War II Research Collections Top Secret Studies on U.S. Communications Intelligence during World War II Part 3. Organization and Administration UNIVERSITY PUBLICATIONS OF AMERICA A Guide to the Microfilm Edition of World War II Research Collections Top Secret Studies on U.S. Communications Intelligence during World War II Parts. Organization and Administration Project Editor Robert E. Lester Guide compiled by Blair D. Hydrick A microfilm project of UNIVERSITY PUBLICATIONS OF AMERICA An Imprint of CIS 4520 East-West Highway • Bethesda, MD 20814-3389 LCCN 90-956381 Copyright ® 1989 by University Publications of America. All rights reserved. ISBN 1-55655-183-5. TABLE OF CONTENTS Introduction v Scope and Content Note xi Source Note xm Editorial Note ...• xiii Abbreviations xv Reel Index 1 Subject Index 19 INTRODUCTION Soon after declassif ¡cation of selected communications intelligence material from World War 11 was undertaken by the National Security Agency in the late 1970s, many valuable documents were made available to researchers in the National Archives. An early scholar of this material, the late Ronald Lewin, said to the press in Washington, D.C., in 1981, "If I were writing a Ph.D. [dissertation], I'd rush over to Archives this minute." Since then much more material has been declassified; some of the Top Secret Studies in this collection of microfilm were declassified only in the late 1980s. SRH Case Studies Special Research Histories (SRHs), a series of studies, monographs, and reports principally concerning cryptographic operations in World War II, were compiled mostly from highly classified contemporary files by wartime participants.
    [Show full text]
  • ARLINGTON HALL STATION 4000 Arlington Boulevard Ar I.Lngton
    ARLINGTON HALL STATION HABS NO." VA-1270 4000 Arlington Boulevard Ar I.lngton Ar1ington County Virginia LPH- PHOTOGRAPHS WRITTEN HISTORICAL AW) DESCRIPTIVE DATA Historic American Buildings Survey Mid-Atlantic Region National Park Service Department of the Interior Phi ladephia „ Pennsylvania 19 106 'hP \ C* t HISTORIC AMERICAN BUILDINGS SURVEY ARLINGTON HALL STATION HABS No. VA-1270 Location: 4000 Arlington Boulevard, Arlington, Arlington County, V i rg i n i a USGS Alexandria, VA Quadrangle. Universal Transverse Mercator Coordinates: 18.317500.4304000 Present Owner: General Services Administration Present Occupant: United States Army Present Use: Military Post Significance: Arlington Hall Station is significant as the location of both Arlington Hall Junior College, a women*s educational institution established in 1927, and as the headquarters of United States Army intelligence activities from 1942 to 1989. Arl ington Hall Junior College was one of the first post- secondary women's educational institutions established in the Washington, D.C. area. The school provided both liberal arts and home economics-oriented curriculum. The school's founder, Dr. William E. Martin, stressed the importance of physical activity in conjunction with education and, as a result, Arlington Hall Junior College included an active program of physical education, most notably an award-winning riding club. Arlington Hall Junior College also provided social opportunities for its students with an active schedule of dinners, teas, balls, and formal dances. In 1942 the United States Army took over Arlington Hall Junior College and established its Signal Intelligence Service (SIS) at the former campus. The SIS had responsibility for cryptoanalysis of intercepted enemy messages, development of codes and ciphers for the Army, and production of Army cipher machines.
    [Show full text]
  • Communicator
    DOCID: 3682074 SECRET Vol III, No. 40 10October1995 A Note From the Director (U} fPO~ Presidential Decision Directive (PDD) 35, signed earlier this year, represents the President's highest national intelligence priorities and is intended to chart the course of Intelligence Community (IC) actions in programming, collection, analysis, reporting, resource allocation, and other related areas. During his Town Meeting here in August, the DC!, Dr. Deutch. echoed these objectives as he discussed his perception of the post-Cold War priorities of the IC. tFOUOf It is critical that every member of the NSA workforce be familiar with the provisions of PDD-35, and understand its impact on the Agency's mission. Furthermore, every effort should be made to ensure that all overview briefings, background papers, mission statements, etc., are updated to reflect a focus consistent with the Directive. 1'POU01 The following article highlights key provisions of PDD-35. I urge you to review it carefully and contact N5P, 963-3247s, with any related questions. Very Respecifully, VADM J.M. McConnell ~As INTELLIGENCE national security takes on a broader definition in the post-Cold War era, intelligence must address a wider range of threats and policy needs. PRIORITIES - In addition to maintaining its global perspective, the Intelligence Community EXCERPTS must refine and focus its collection on information unavailable to the policymaker by other means or from other sources. The Community's tactical FROM PDD-35 and strategic analytic efforts should provide a coherent framework that (u) systematically incorporates intelligence to help senior U.S. officials identify and overcome potential challenges to the nation's military.
    [Show full text]
  • Frustrating Evolution of the Defense Intelligence Agency
    INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand corner and continuing from left to right in equal sections with small overlaps. Each original is also photographed in one exposure and is included in reduced form at the back of the book. Photographs included in the original manuscript have been reproduced xerographically in this copy. Higher quality 6" x 9" black and white photographic prints are available for any photographs or illustrations appearing in this copy for an additional charge. Contact UMI directly to order. University Microfilms International A Bell & Howell Information Com pany 300 North Zeeb Road. Ann Arbor. Ml 48106-1346 USA 313/761-4700 800/521-0600 Order Number 1353496 The frustrating evolution of the Defense Intelligence Agency Jeszenszky, Elizabeth, M.A. The American University, 1992 Copyright ©1992 by Jeszenszky, Elizabeth.
    [Show full text]