Arlington Is President and Founder of Alley Cat Allies

Total Page:16

File Type:pdf, Size:1020Kb

Arlington Is President and Founder of Alley Cat Allies Becky Robinson of Arlington is president and founder of Alley Cat Allies. On Forefront Of Feral Cat Care News, Page 3 Classifieds, Page 10 Classifieds, v Entertainment, Page 6 Uncovering Women HomeLifeStyle Code Breakers Page 9 News, Page 2 Requested in home 9-13-18 home in Requested Time sensitive material. material. sensitive Time Honoring Postmaster: Attention permit #322 permit Easton, MD Easton, PAID Neighborhood Health Postage U.S. News, Page 3 STD PRSRT Alley Cat Allies Photo September 12-18, 2018 online at www.connectionnewspapers.com News Uncovering Women Code Breakers Arlington author Event Details Meet Liza Mundy, author of describes World “Code Girls: The Untold Story of the American Women Code Break- Photo by Nina Subin Photo ers of World War II.” War II counter Books available for sale and signing. Date: Wednesday, Sept. 12 intelligence Time: 7-8:30 p.m. Location: Pohick Regional Library, program. Meeting Room 1 and 2, Burke the group to share their stories, By Teresa Carandang because even though the informa- The Connection tion was declassified, the women still felt rlington author Liza they shouldn’t A Mundy will talk about her talk about their most recent book, “Code work that was Girls: The Untold Story of the Liza Mundy considered confi- American Women Code Breakers dential for a long of World War II,” at the Pohick Regional Library in time. Burke on Sept. 12 starting 7 p.m. These women Mundy wrote about a group of women who worked moved to Washing- on the then top secret Venona Project, a counter in- ton, DC to work at telligence program started by the U.S. Army’s Sig- the SIS offices in Ar- nal Intelligence Service (SIS), that started during lington. They worked World War II. in Arlington Hall, a More than 10,000 codebreaking women were building that is now on instrumental in deciphering encrypted messages, the National Register of some of which were Japanese and Soviet. This led Historic Places. The 100- to the arrest of several spies like Americans Julius acre Ar- lington Hall Station is pres- and Ethel Rosenberg, British intelligence officer Kim ently the Department of State Foreign Service In- Philby, British diplomat Donald Maclean, and the stitute. Located at the corner of South George Ma- German physicist Klaus Fuchs. son Drive and Arlington Boulevard, the former girls Mundy describes some of these women — Angeline school, Arlington Hall Junior College for Girls, be- Nanni, Gloria Forbes, Mildred Hayes, Carrie Berry, came the headquarters of the codebreakers during Jo Miller Deafenbaugh, Joan Malone Callahan, Gene World War II. By coincidence, Mundy’s home is a Grabeel — and their lives and what they did to aid few minutes away from Arlington Hall. the development of computers, code-breaking and “Code Figures” is a new addition to books written cybersecurity. Mundy dispels the notion that women about the little known but important work of women held unimportant roles during the war, and that they that started during World War II like “Hidden Fig- in fact did most of the codebreaking work in the ures: The American Dream and the Untold Story of Venona project. the Black Women Mathematicians Who Helped Win Mundy first learned the stories of these women the Space Race” by Margot Lee Shetterly, and “Rise from a declassified Venona 1995 file written by Na- of the Rocket Girls: The Women Who Propelled Us, tional Security Agency (NSA) historian, Robert L. from Missiles to the Moon to Mars” by Nathalia Holt. Benson. He wrote that most of the members of the Mundy, a former Washington Post writer and cur- cryptanalytic unit of SIS, the precursor to the NSA, rently a senior fellow at New America, has written were women, and he was able to interview a few of extensively about women including “The Richer Sex,” them. “Michelle” (a biography of First Lady Michelle Based on Benson’s article, Mundy reviewed ros- Obama), “Why is Silicon Valley So Awful to Women,” ters, reached out to family members identified by “Playing the Granny Card,” “Wendy Davis, the Most the NSA and requested alumnae records from col- Judged Woman in America,” “Monica Lewinsky Re- leges like Goucher and Wellesley. That wasn’t considered,” “The Secret History of the Women in Mundy’s only challenge; once she found these women the Senate,” “The New Power Wives of Capitol Hill,” she also had to convince the surviving members of “Maternal Truths,” among other articles and essays. Home of the $6,850 Bathroom Remodel From Now to WOW in 5 Days Guarantee Select your 10% down TWO POOR TEACHERS nothing until the job products from isis completecomplete forfor thethe Kitchen and Bathroom Remodeling our Mobile past 17 years Showroom and Design Center Fully Insured & Class A Licensed Since 1999 Free Estimates 703-214-8384 Visit our website: www.twopoorteachers.com 2 ❖ Arlington Connection ❖ September 12-18, 2018 www.ConnectionNewspapers.com Arlington Connection Editor Steven Mauren News 703-778-9415 or [email protected] On Forefront of Feral Cat Care Arlington resident began her work of helping cats in an alleyway. By Robert Blizard trol facility in Indiana was telling employ- The Connection ees to put cats into a freezer to kill them, rather than perform humane euthanasia. A verall, the trajectory for out- whistleblower and then other staffers went “ door cats is definitely im- public this summer with their stories about Oproving. Not just in the what they were ordered to do. United States, but around Alley Cat Allies will attempt to bring jus- the world,” pointed out Arlington resident tice to harmed cats in these cases and teach Becky Robinson. She is founder and presi- these communities about appropriate, pro- dent of the international cat advocacy group gressive solutions to outdoor cats via TNR, Alley Cat Allies, based in Bethesda, Md. according to Robinson. “Unfortunately, we continually come up Robinson has worked with organizations against cases in which outdated practices throughout Virginia and from coast to coast. and attitudes have ruled the day,” she Allies Photo Cat Alley The reach of Alley Cat Allies and willing- added. “This means that lots of cats suffer ness to opt for TNR has now traveled to needlessly. And that cannot be allowed to dozens of countries. Inquiries from all over happen.” the globe regularly come into the Bethesda Robinson started her organization in 1990 office. while living in Arlington. She and a friend “It’s still hard for me to believe what I wanted to help cats seen frequently in an started in an alley all those years ago pio- Adams-Morgan alleyway in Washington. neered so much for so many cats,” said They knew that if they took the cats to Becky Robinson of Arlington is president and founder of Alley Cat Allies. Robinson while reflecting on 28 years in the local shelter, they would be killed be- business. “It is enormously gratifying.” cause they would be judged too wild to be basics while on the operating table and an said. She says her organization is now sup- adopted out as pets. So, they sought a non- ear tip, which is the trimming of the corner Despite this change of how to approach ported by thousands of individuals and re- lethal solution. of the left ear as a signal that the cat has the issue of feral cats, occasional aberra- ceives no government funding. Programs “We ultimately had all the cats spayed or already been sterilized. tions surface. For example, there are two range from organizing grassroots responses neutered and vaccinated and then returned These days, however, TNR is considered 2018 cases on which Alley Cat Allies has for cat concerns to lobbying for cat-friendly to their outdoor home while also socializ- mainstream by most animal protection been focused recently. legislation to ensuring justice is sought for ing and finding homes for the small kittens,” groups. It was Robinson’s efforts these last In Iowa, one town’s police department feline cruelty victims. said Robinson. 28 years that effected such change. had been encouraging people to trap and “Alley Cat Allies always has a zillion items Later, she took her newfound knowledge “Alley Cat Allies has been on the cusp of then shoot cats. on our plate demanding response,” about what is now known worldwide as change and has led the way for the entire “That was some uneducated person’s so- Robinson said. “But our main goal for the Trap-Neuter-Return to the rest of the na- animal sheltering field. Many people did not lution to outdoor cats,” Robinson said. “This future is for all animal shelters to have non- tion. Pioneered in England, TNR was a prac- agree with TNR because it meant allowing shows that shelters need more oversight, lethal control programs for cats and kittens tice long eschewed by major national hu- feral cats — also known as community cats regulation and training for employees and — which is what the public wants. TNR mane organizations. Cats who are TNR’d — outside, but nowadays almost every hu- volunteers.” should be the law of the land in all the also receive a rabies vaccine, other medical mane society and SPCA supports it,” she Meanwhile, the director of an animal con- states.” State resolution cites Honoring Neighborhood Health organization’s 20 years of service. el. Paul Krizek presented Neighbor- than two decades, our driving focus at Dhood Health’s board of directors Neighborhood Health has been to expand with a resolution recognizing the access to primary care for low-income and organization for its 20 years of service in uninsured Northern Virginians. Underpin- Northern Virginia.
Recommended publications
  • National Security Agency
    Coordinates: 39°6′32″N 76°46′17″W National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United National Security Agency States Department of Defense, under the authority of the Director of National Intelligence. The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems.[8][9] The NSA relies on a variety of measures to accomplish its Seal of the National Security Agency mission, the majority of which are clandestine.[10] Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become the largest of the U.S. intelligence organizations in terms of Flag of the National Security Agency personnel and budget.[6][11] The NSA currently conducts worldwide mass data collection and has been known to physically bug electronic systems as one method to this end.[12] The NSA is also alleged to have been behind such attack software as Stuxnet, which severely damaged Iran's nuclear program.[13][14] The NSA, alongside the Central Intelligence Agency (CIA), maintains a physical presence in many countries across the globe; the CIA/NSA joint Special Collection Service (a NSA Headquarters, Fort Meade, Maryland highly classified intelligence team) inserts eavesdropping devices in high value targets (such Agency overview as presidential palaces or embassies).
    [Show full text]
  • ABSTRACT Title of Document: from the BELLY of the HUAC: the RED PROBES of HOLLYWOOD, 1947-1952 Jack D. Meeks, Doctor of Philos
    ABSTRACT Title of Document: FROM THE BELLY OF THE HUAC: THE RED PROBES OF HOLLYWOOD, 1947-1952 Jack D. Meeks, Doctor of Philosophy, 2009 Directed By: Dr. Maurine Beasley, Journalism The House Un-American Activities Committee, popularly known as the HUAC, conducted two investigations of the movie industry, in 1947 and again in 1951-1952. The goal was to determine the extent of communist infiltration in Hollywood and whether communist propaganda had made it into American movies. The spotlight that the HUAC shone on Tinsel Town led to the blacklisting of approximately 300 Hollywood professionals. This, along with the HUAC’s insistence that witnesses testifying under oath identify others that they knew to be communists, contributed to the Committee’s notoriety. Until now, historians have concentrated on offering accounts of the HUAC’s practice of naming names, its scrutiny of movies for propaganda, and its intervention in Hollywood union disputes. The HUAC’s sealed files were first opened to scholars in 2001. This study is the first to draw extensively on these newly available documents in an effort to reevaluate the HUAC’s Hollywood probes. This study assesses four areas in which the new evidence indicates significant, fresh findings. First, a detailed analysis of the Committee’s investigatory methods reveals that most of the HUAC’s information came from a careful, on-going analysis of the communist press, rather than techniques such as surveillance, wiretaps and other cloak and dagger activities. Second, the evidence shows the crucial role played by two brothers, both German communists living as refugees in America during World War II, in motivating the Committee to launch its first Hollywood probe.
    [Show full text]
  • Communicator
    DOCID: 3682074 SECRET Vol III, No. 40 10October1995 A Note From the Director (U} fPO~ Presidential Decision Directive (PDD) 35, signed earlier this year, represents the President's highest national intelligence priorities and is intended to chart the course of Intelligence Community (IC) actions in programming, collection, analysis, reporting, resource allocation, and other related areas. During his Town Meeting here in August, the DC!, Dr. Deutch. echoed these objectives as he discussed his perception of the post-Cold War priorities of the IC. tFOUOf It is critical that every member of the NSA workforce be familiar with the provisions of PDD-35, and understand its impact on the Agency's mission. Furthermore, every effort should be made to ensure that all overview briefings, background papers, mission statements, etc., are updated to reflect a focus consistent with the Directive. 1'POU01 The following article highlights key provisions of PDD-35. I urge you to review it carefully and contact N5P, 963-3247s, with any related questions. Very Respecifully, VADM J.M. McConnell ~As INTELLIGENCE national security takes on a broader definition in the post-Cold War era, intelligence must address a wider range of threats and policy needs. PRIORITIES - In addition to maintaining its global perspective, the Intelligence Community EXCERPTS must refine and focus its collection on information unavailable to the policymaker by other means or from other sources. The Community's tactical FROM PDD-35 and strategic analytic efforts should provide a coherent framework that (u) systematically incorporates intelligence to help senior U.S. officials identify and overcome potential challenges to the nation's military.
    [Show full text]
  • Historical Dictionary of International Intelligence Second Edition
    The historical dictionaries present essential information on a broad range of subjects, including American and world history, art, business, cities, countries, cultures, customs, film, global conflicts, international relations, literature, music, philosophy, religion, sports, and theater. Written by experts, all contain highly informative introductory essays on the topic and detailed chronologies that, in some cases, cover vast historical time periods but still manage to heavily feature more recent events. Brief A–Z entries describe the main people, events, politics, social issues, institutions, and policies that make the topic unique, and entries are cross- referenced for ease of browsing. Extensive bibliographies are divided into several general subject areas, providing excellent access points for students, researchers, and anyone wanting to know more. Additionally, maps, pho- tographs, and appendixes of supplemental information aid high school and college students doing term papers or introductory research projects. In short, the historical dictionaries are the perfect starting point for anyone looking to research in these fields. HISTORICAL DICTIONARIES OF INTELLIGENCE AND COUNTERINTELLIGENCE Jon Woronoff, Series Editor Israeli Intelligence, by Ephraim Kahana, 2006. Russian and Soviet Intelligence, by Robert W. Pringle, 2006. Cold War Counterintelligence, by Nigel West, 2007. World War II Intelligence, by Nigel West, 2008. Sexspionage, by Nigel West, 2009. Air Intelligence, by Glenmore S. Trenear-Harvey, 2009. Middle Eastern Intelligence, by Ephraim Kahana and Muhammad Suwaed, 2009. German Intelligence, by Jefferson Adams, 2009. Ian Fleming’s World of Intelligence: Fact and Fiction, by Nigel West, 2009. Naval Intelligence, by Nigel West, 2010. Atomic Espionage, by Glenmore S. Trenear-Harvey, 2011. Chinese Intelligence, by I. C.
    [Show full text]
  • Project VENONA: Breaking the Unbreakable Code
    Georgia Southern University Digital Commons@Georgia Southern University Honors Program Theses 2020 Project VENONA: Breaking the Unbreakable Code Cassandra Hankin Georgia Southern University Follow this and additional works at: https://digitalcommons.georgiasouthern.edu/honors-theses Part of the History Commons Recommended Citation Hankin, Cassandra, "Project VENONA: Breaking the Unbreakable Code" (2020). University Honors Program Theses. 471. https://digitalcommons.georgiasouthern.edu/honors-theses/471 This thesis (open access) is brought to you for free and open access by Digital Commons@Georgia Southern. It has been accepted for inclusion in University Honors Program Theses by an authorized administrator of Digital Commons@Georgia Southern. For more information, please contact [email protected]. Project VENONA: Breaking the Unbreakable Code An Honors Thesis submitted in partial fulfillment of the requirements for Honors in History. By Cassandra Hankin Under the mentorship of Dr. Bill Allison ABSTRACT Project VENONA was a top-secret counterintelligence program initiated by the United States Army Signals Intelligence Service during World War II. VENONA was established to decipher intercepted Soviet communications and break the “unbreakable” Soviet code system. Examining Project VENONA and its discoveries is vital to understanding the history of the early Cold War. Thesis Mentor:________________________ Dr. Bill Allison Honors Director:_______________________ Dr. Steven Engel April 2020 Department of History University Honors Program Georgia Southern University 2 Acknowledgements There are many people I’d like to thank for helping me during the year and a half I worked on this project. For helping me through the research and writing process, I would like to thank Dr. Bill Allison, who never gave up on me or my project.
    [Show full text]
  • NSA-FOIACASELOG-2016.Pdf
    This document is made available through the declassification efforts and research of John Greenewald, Jr., creator of: The Black Vault The Black Vault is the largest online Freedom of Information Act (FOIA) document clearinghouse in the world. The research efforts here are responsible for the declassification of hundreds of thousands of pages released by the U.S. Government & Military. Discover the Truth at: http://www.theblackvault.com NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 FOIA Case: 100503A 4 April 2017 JOHN GREENEWALD Dear Mr. Greenewald: This responds to your Freedom of Information Act (FOIA) request dated 1 January 2017 which was received by this office on 2 January 2017, for "a copy of the FOIA case log for calendar year 2016." For purposes of this request and based on the information you provided in your letter, you are considered an "all other" requester. As such, you are allowed 2 hours of search and the duplication of 100 pages at no cost. Since processing fees were minimal, no fees were assessed. Your request has been processed under the FOIA, and the logs for calendar year 2016 are enclosed, along with a FOIA Case Dispositions reference sheet that explains the final case dispositions. Please be advised that the logs do not contain the number of pages released. They contain a final disposition if the case was closed at the time the logs were created. If there is no final disposition, the case was still pending at the time the logs were created. Certain information has been deleted from the enclosures.
    [Show full text]
  • VENONA and China December 11
    VENONA and China December 11 The VENONA Project, begun by the Army Security Agency and continued by NSA, looked at Soviets codes and ciphers beginning in World War II (1939-1945); the successful solution after the war provided a treasure trove of information about Soviet espionage activity inside the United States. As a case in point, the Soviet Union successfully tested its first atomic bomb in August 1949, earlier than anticipated, in part because it stole U.S. atomic secrets (the United States dropped its atomic bombs on Hiroshima and Nagasaki, Japan, in August 1945); we discovered this information loss from VENONA decrypts but, unfortunately, too late to plug the leaks of secret data. Yet, though the information was from decrypting Soviet espionage messages, the topics covered in the project were hardly limited to the Soviets. VENONA, for example, included information about China, which was an ally of the United States in the war against Japan at the time. China was then ruled by the Chiang Kaishek-led Nationalists, who had a shaky truce with Mao Tsetung’s Communists. When the war with Japan ended in 1945, a full-fledged civil war between the two sides erupted, resulting in an eventual Communist victory and the creation of the People’s Republic of China on October 1, 1949. According to a November 21, 1944, VENONA message to Moscow from the United States, the new U.S. Ambassador to China—Brigadier General Patrick Hurley—was hostile to the Chinese Communists. The accusations against Hurley were by Nathan Gregory Silvermaster, an economist for the U.S.
    [Show full text]
  • Assessing Hard-Target Espionage in the Cyber Era Kyle S. Cunliffe Thesis Submitt
    An existential crisis and a golden opportunity? Assessing hard-target espionage in the cyber era Kyle S. Cunliffe Thesis submitted in fulfilment of the requirements for the degree of PhD Department of International Politics Aberystwyth University January 18th 2021 Summary Cyberspace is transforming global society. Its effects on states, intelligence, and national security are the subject of much comment, but its relationship with espionage, or human intelligence, remains under-researched to an alarming degree. At a time when the British-US intelligence community is making headway in cyberspace, necessitated by emerging threats and rising nation-state agendas, this is a glaring omission. The strategic imperatives of Russia and China have provoked a reorientation by the British SIS and the US CIA, turning resources back towards nation-state ‘hard targets’. Yet these hard target states are investing resources in innovative surveillance practices, tools that fundamentally threaten intelligence officers’ ability to travel freely or acquire the increasingly important human sources (agents) of espionage. As the operations of British-US intelligence personnel become more threatened in physical terms, espionage agencies now focus their attention towards cyberspace, where innovation opens up new opportunities in tradecraft. By turning to cyberspace to conduct tradecraft, particularly in the recruitment and handling of spies, espionage’s success and failure is now entwined with the value of innovation, and as consequence, cyber-enabled tradecraft is entwined with the present and future of Western security. However, the value of cyberspace to espionage’s sources and methods remains ambiguous, receiving only limited study. Views put forward by a small cadre of mostly seasoned practitioners, express both powerful enthusiasm and debilitating cynicism, reflecting a dichotomy of opinions that have not yet been addressed.
    [Show full text]
  • Read the Introduction (Pdf)
    Introduction N WEDNESDAY, June 29, 1955, the Senate Internal Security Sub- committee met in the Caucus Room where the fl amboyant Wis- O consin senator Joseph McCarthy had held his most sensational hearings in 1953 and 1954. Led by Mississippi Democrat James Eastland and undeterred by McCarthy’s political downfall, the subcommittee began an unprecedented investigation of American journalism by delving into alleged Communist infi ltration of some of the nation’s most prominent newspapers. Committee members saw the daily press as a prime Soviet target for propaganda and infi ltration because journalists could often access sensitive information and because they infl uenced public opinion.1 The Eastland committee, as the subcommittee was popularly known, intended to ask selected reporters and editors about any involvement they may have had with the Communist Party, but the actual questioning went much further. The committee asked about their political interests and their personal thoughts and beliefs. Members questioned newspaper editorial policies and hiring practices, areas that were thought to be sacrosanct under the First Amendment. That McCarthy-era inquest reverberated in the summer of 2005 when a federal prosecutor ordered several journalists to identify the sources whose disclosures had led to the publication of a CIA agent’s name. New York Times reporter Judith Miller refused but others complied. She spent eighty-fi ve days in jail and briefl y became a symbol of courageous com- mitment to protecting First Amendment rights, as the media defi ned them. 0001-039_Intro-Ch02_P2R1.indd01-039_Intro-Ch02_P2R1.indd 1 44/18/07/18/07 112:30:232:30:23 PPMM 2 INTRODUCTION The core issue was the same as it had been fi fty years earlier: government power, exercised in the name of national security, to compel journalists to testify and reveal confi dences.
    [Show full text]
  • The Changing Face of the NCMF
    The Link BULLETIN OF THE NATIONAL CRYPTOLOGIC MUSEUM FOUNDATION, INC. VOLUMES 9, NO. 3 - , NO. 2, COMPOSITE Summer 2008 THe CHANGING FAce of THe NCMF Events of the past year have moved too quickly for the slow pace of publication of The Link. Issues intended for publication covering Fall 2006 and Winter 2006-2007 have, accordingly, been “pulled back” from the printer and – to adopt the term recently applied to military action in Iraq – we are “surging” by consolidating about a year and a half of content into a single composite issue. That requires a great deal of compression and omission, even to “hit the highlights.” We apologize in advance for the omitted coverage. In return, we plan next to introduce a new look, with color photographs, as the beginning of some further experiments to improve our communication with you, our members and readers. We thank our ambidextrous colleague, John Garcia, and his associates and corporate sponsors for the interim issuance of the occasional “NCMF Newsletter,” mailed to you. Our webmaster, Bob Bowie, Bill Saadi, our website coordinator, and others are pondering changes in the NCMF web site. Thanks also go to occasional Link contributors Ray Schmidt, David Hamer, “cub reporter” Mary Faletto, Kirsten Eland, Jim Boone, Prof. Mark Sommer, and others whose by-lines have appeared. They represent the vanguard of what we hope will be a plethora of “new” (and familiar) names as we invite others of you to remember (as we reminded you in Volume 1, Number 1 ten years ago) that, by our old definition, a “link” should go both ways.
    [Show full text]
  • National Security Agency 60 Years of Defending Our Nation
    National Security Agency 60 Years of Defending Our Nation National Security Agency Defending Our Nation. Securing The Future 60 Years of Defending Our Nation 60 Years of Defending Our Nation National Security Agency, circa 1950s. n November 4, 2012, the National Security Agency (NSA) celebrates its 60th anniversary of providing critical information to U.S. decisionmakers and Armed Forces personnel in Odefense of our Nation. NSA has evolved from a staff of approximately 7,600 military and civilian employees housed in 1952 in a vacated school in Arlington, VA, into a workforce of more than 30,000 demographically diverse men and women located at NSA headquarters in Ft. Meade, MD, in four national Cryptologic Centers, and at sites throughout the world. While the mission to defend the Nation against all adversaries has not changed, the adversaries have changed considerably. During the Cold War, NSA’s primary focus was on the Soviet challenge, punctuated by tense crises, such as the one in Cuba in 1962. After the breakup of the Soviet Union, the adversary was less likely to be wearing the uniform of a specific country. In fact, today our greatest threat may be a lone person using a computer. Throughout its six decades, NSA has pursued its mission by employing smart, committed, and courageous people, developing innovative technology, partnering with allied nations, and collaborating with our DoD and IC colleagues. Our commitment to upholding the law of the Nation and protecting the civil liberties of its people has never wavered. On behalf of the dedicated employees of the National Security Agency, we are pleased to present this publication that tells the fascinating story of NSA – 60 years of “Defending Our Nation and Securing The Future.” We have only just begun.
    [Show full text]
  • Introduction Background How It Works the VENONA Breakthrough
    By Cindy Flores, Hyeok Jung Kim, Dalia Moradi, Abanob Saleh, Xi Ye You Seminar 3: Science & Technology of NYC, Professor Kent D. Boklan Introduction Significance How It Works On February 1, 1943, a small group of code breakers of the U.S. Army’s Importance of the Venona Project The Code (Vernam Cipher) and How it Works Signal Intelligence Service (SIS) launched the VENONA Project, a secret • Exposed the Soviet spy ring and information about the atomic bomb • Proven to be mathematically secure under ideal implementation by counterintelligence program to decrypt and exploit communication by the • Lasted from 1943 to 1980, declassified in 1995- from World War 2 Claude Shannon Soviet Union. throughout the Cold War (1947-1991) 1) Represent plain text into numbers (alphabet positioning.. ie: A=1) • Exposed Julius and Ethel Rosenberg for espionage and conspiracy to 2) Create a randomly generated key that is the same length as the plain Background provide atomic secrets to the USSR. As a result, they were executed text by electric chair in 1953. 3) Combine the plaintext and random key using XOR or modular addition History • They were implicated by their in-laws Ruth and David Greenglass, 4) Convert the numbers back into cipher text • The code breakers were named “Arlington Hall” after their communists who were also Soviet spies 5) To get back to the plain text, XOR the key again or subtract using headquarters in Virginia • Alger Hiss was a former U.S. State Department official who was modular arithmetic to get the ciphertext. • “Venona” was the code word for the project convicted of perjury in 1950 for involvement in a communist • The SIS led to creation of the National Security Agency (NSA) espionage ring.
    [Show full text]