Alberta Securities Commission Page 1 of 2 Reporting Issuer List - Cover Page

Total Page:16

File Type:pdf, Size:1020Kb

Alberta Securities Commission Page 1 of 2 Reporting Issuer List - Cover Page Alberta Securities Commission Page 1 of 2 Reporting Issuer List - Cover Page Reporting Issuers Default When a reporting issuer is noted in default, standardized codes (a number and, if applicable a letter, described in the legend below) will be appear in the column 'Nature of Default'. Every effort is made to ensure the accuracy of this list. A reporting issuer that does not appear on this list or that has inappropriately been noted in default should contact the Alberta Securities Commission (ASC) promptly. A reporting issuer’s management or insiders may be subject to a Management Cease Trade Order, but that order will NOT be shown on the list. Legend 1. The reporting issuer has failed to file the following continuous disclosure document prescribed by Alberta securities laws: (a) annual financial statements; (b) an interim financial report; (c) an annual or interim management's discussion and analysis (MD&A) or an annual or interim management report of fund performance (MRFP); (d) an annual information form; (AIF); (e) a certification of annual or interim filings under National Instrument 52-109 Certification of Disclosure in Issuers' Annual and Interim Filings (NI 52-109); (f) proxy materials or a required information circular; (g) an issuer profile supplement on the System for Electronic Disclosure By Insiders (SEDI); (h) a material change report; (i) a written update as required after filing a confidential report of a material change; (j) a business acquisition report; (k) the annual oil and gas disclosure prescribed by National Instrument 51-101 Standards of Disclosure for Oil and Gas Activities (NI 51-101) or a technical report for a mineral project required under National Instrument 43-101 Standards of Disclosure for Mineral Projects (NI 43-101); (l) a mandatory news release; (m) corporate governance disclosure as required by National Instrument 58-101 Disclosure of Corporate Governance Practices; (n) audit committee disclosure as required by National Instrument 52-110 Audit Committees; or (o) disclosure in a reporting issuer's MD&A relating to disclosure controls and procedures and/or internal control over financial reporting and their effectiveness that is referred to in a certificate filed under NI 52- 109. 2. The reporting issuer's continuous disclosure does not comply with Alberta securities laws because: (a) financial statements of the reporting issuer, or the auditor’s report accompanying the financial statements, do not comply with the requirements of National Instrument 51-102 Continuous Disclosure Obligations (NI 51-102), National Instrument 81-106 Investment Fund Continuous Disclosure (NI 81-106) or National Instrument 52-107 Acceptable Accounting Principles and Auditing Standards; (b) the reporting issuer has acknowledged that its financial statements, or the auditor’s report accompanying the financial statements, may no longer be relied upon; Please be advised that pursuant to the Securities Amendment Act, 2006, the ASC no longer issues certificates of no default. Individuals seeking information relating to an issuer's status in that regard may wish to refer to this reporting issuer list. Every effort is made to ensure the accuracy of information included in the reporting issuers’ list. A reporting issuer that does not appear on this list or that has inappropriately been noted in default should contact the ASC promptly. If appropriate, the list will be revised as necessary. Alberta Securities Commission Page 2 of 2 Reporting Issuer List - Cover Page (c) the reporting issuer's AIF, MD&A, MRFP, information circular, or a business acquisition report does not contain information for each of the items required by NI 51-102 or NI 81-106; or (d) the reporting issuer's technical disclosure or other reports do not comply with the disclosure requirements of NI 43-101 or NI 51-101; 3. The reporting issuer has failed to pay a fee required by Alberta securities laws. 4. The reporting issuer has failed to comply with a requirement related to continuous disclosure not referred to in 1 to 3, above. Cease Trade Order If a reporting issuer is subject to a cease trade order issued by the ASC or the Executive Director under section 33.1 of the Securities Act (Alberta) (Act) or by the ASC under section 198(1) or (2) of the Act, the existence of that order will be disclosed beside the name of the reporting issuer as “ASC CTO”. If a reporting issuer is subject to a cease trade order issued by another securities regulatory authority in Canada that applies in Alberta as a result of section 198.1 of the Act, and prohibits all trading of the securities of that issuer, the existence of that order will be disclosed beside the name of the reporting issuer as “Reciprocal CTO”. Securities that are subject to an ASC CTO or a Reciprocal CTO cannot be traded in Alberta. To determine if a person or company is the subject of a management cease trade order issued by the ASC, please refer to the “Proceedings, Decisions & Orders – Issuers” section on the ASC website (at www.albertasecurities.com). Additional information may be obtained by: - reviewing the filings made by the reporting issuer on SEDAR (at www.sedar.com); - contacting the reporting issuer directly; - reviewing the Commission website; or - reviewing the national cease trade order database located on the CSA website (at www.csa-acvm.ca). Please be advised that pursuant to the Securities Amendment Act, 2006, the ASC no longer issues certificates of no default. Individuals seeking information relating to an issuer's status in that regard may wish to refer to this reporting issuer list. Every effort is made to ensure the accuracy of information included in the reporting issuers’ list. A reporting issuer that does not appear on this list or that has inappropriately been noted in default should contact the ASC promptly. If appropriate, the list will be revised as necessary. Alberta Securities Commission Page 1 of 271 Reporting Issuer List Report Created on: 2020-08-28 Report as of: 2020-08-27 Name Cease Traded Nature of Default 01 COMMUNIQUE LABORATORY INC. 0941092 B.C. LTD. Reciprocal CTO 1a, 1b, 1c, 1e 1011704 BC LTD. Reciprocal CTO 1a, 1b, 1c, 1e 1011705 BC LTD. Reciprocal CTO 1a, 1b, 1c, 1e 1011707 BC LTD. Reciprocal CTO 1a, 1b, 1c, 1e 1011709 BC LTD. Reciprocal CTO 1a, 1b, 1c, 1e 1014379 B.C. LTD. 1020645 B.C. LTD. Reciprocal CTO 1a, 1b, 1c, 1e, 3 1020648 B.C. LTD. Reciprocal CTO 1a, 1b, 1c, 1e 1020650 B.C. LTD. Reciprocal CTO 1a, 1b, 1c, 1e 1020651 B.C. LTD. Reciprocal CTO 1a, 1b, 1c, 1e, 3 1024954 B.C. LTD. Reciprocal CTO 1a, 1b, 1c, 1e 1040436 BC LTD. Reciprocal CTO 1a, 1b, 1c, 1e 1040440 BC LTD. Reciprocal CTO 1a, 1b, 1c, 1e 10557510 CANADA CORP. 10557536 CANADA CORP. 1080854 ONTARIO LIMITED ASC CTO 1a, 1b, 1c, 1d, 1e, 1g 1132876 B.C. LTD. 1143990 BC LTD. Reciprocal CTO 1a, 1b, 1c, 1e 1169032 BC LTD. 1169071 BC LTD. 1169077 BC LTD. 1169082 BC LTD. 1246764 B.C. LTD. 1246765 B.C. LTD. 1246768 B.C. LTD. 1246773 B.C. LTD. 1246775 B.C. LTD. 1246777 B.C. LTD. 1246778 B.C. LTD. 1246779 B.C. LTD. 1511419 ONTARIO INC. ASC CTO 1a, 1b, 1c, 1d, 1e 1603546 ALBERTA LTD. ASC CTO 1a, 1b, 1c, 1e 1608557 ONTARIO INC. ASC CTO 1a, 1b, 1c, 1d, 1e 1832 AM INVESTMENT GRADE CANADIAN CORPORATE BOND POOL 1832 AM U.S. $ INVESTMENT GRADE U.S. CORPORATE BOND POOL 1911 GOLD CORPORATION 1933 INDUSTRIES INC 1987 NO 2 MINTAX MINERAL LIMITED PARTNERSHIP ASC CTO Please be advised that pursuant to the Securities Amendment Act, 2006, the ASC no longer issues certificates of no default. Individuals seeking information relating to an issuer's status in that regard may wish to refer to this reporting issuer list. Every effort is made to ensure the accuracy of information included in the reporting issuers’ list. A reporting issuer that does not appear on this list or that has inappropriately been noted in default should contact the ASC promptly. If appropriate, the list will be revised as necessary. Alberta Securities Commission Page 2 of 271 Reporting Issuer List Report Created on: 2020-08-28 Report as of: 2020-08-27 Name Cease Traded Nature of Default 2242749 ONTARIO LIMITED Reciprocal CTO 1a, 1b, 1c, 1d, 1e 2583262 ONTARIO INC. 27 RED CAPITAL INC. Reciprocal CTO 1a, 1b, 1c, 1e 2980304 CANADA INC. ASC CTO 1a, 1b, 1c, 1e 3 SIXTY RISK SOLUTIONS LTD. Reciprocal CTO 1a, 1b, 1c, 1e 360NETWORKS INC. ASC CTO 1a, 1b, 1c, 1d, 1e, 1g 37 CAPITAL INC. 3DX INDUSTRIES INC. ASC CTO 1a, 1b, 1c, 1d, 1e, 4 3MV ENERGY CORP. ASC CTO 1a, 1b, 1c, 1e, 1k, 3 4 TOUCHDOWNS CAPITAL INC. 3 407 INTERNATIONAL INC. 4404980 CANADA INC. ASC CTO 1a, 1b, 1c, 1e 4504020 CANADA INC. ASC CTO 1a, 1b, 1c, 1d, 1e 48NORTH CANNABIS CORP. 49 NORTH RESOURCES INC. 4FRONT VENTURES CORP. 523976 ALBERTA LTD. ASC CTO 1a, 1b, 1c, 1e 55 NORTH MINING INC. 5N PLUS INC. 66 RESOURCES CORP. 79 RESOURCES LTD. 7918534 CANADA INC. 79NORTH INC. 855 BURRARD CAPITAL LIMITED PARTNERSHIP NO. 3 ASC CTO 1a, 1b, 1c, 1e 9 CAPITAL CORP. 9342-8530 QUÉBEC INC. Reciprocal CTO 1a, 1b, 1c, 1e A MAN CALLED INTREPID ASC CTO 1a, 1b, 1c, 1e A&W REVENUE ROYALTIES INCOME FUND A.E. VENTURES LTD. ASC CTO 1a, 1b, 1c, 1e, 1g A.H.A. AUTOMOTIVE TECHNOLOGIES CORPORATION ASC CTO 1a, 1b, 1c, 1e A.I.S. RESOURCES LIMITED A.O.G. AIR SUPPORT INC. ASC CTO 1a, 1b, 1c, 1e A2Z TECHNOLOGIES CANADA CORP. AAJ CAPITAL 2 CORP.
Recommended publications
  • SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM
    SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM HEINEMANN: AUSTRALIA First published in 1987 by HEINEMANN PUBLISHERS AUSTRALIA (A division of Octopus Publishing Group/Australia Pty Ltd) 85 Abinger Street, Richmond, Victoria, 3121. Copyright (c) 1987 by Peter Wright ISBN 0-85561-166-9 All Rights Reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. TO MY WIFE LOIS Prologue For years I had wondered what the last day would be like. In January 1976 after two decades in the top echelons of the British Security Service, MI5, it was time to rejoin the real world. I emerged for the final time from Euston Road tube station. The winter sun shone brightly as I made my way down Gower Street toward Trafalgar Square. Fifty yards on I turned into the unmarked entrance to an anonymous office block. Tucked between an art college and a hospital stood the unlikely headquarters of British Counterespionage. I showed my pass to the policeman standing discreetly in the reception alcove and took one of the specially programmed lifts which carry senior officers to the sixth-floor inner sanctum. I walked silently down the corridor to my room next to the Director-General's suite. The offices were quiet. Far below I could hear the rumble of tube trains carrying commuters to the West End. I unlocked my door. In front of me stood the essential tools of the intelligence officer’s trade - a desk, two telephones, one scrambled for outside calls, and to one side a large green metal safe with an oversized combination lock on the front.
    [Show full text]
  • How I Learned to Stop Worrying and Love the Bombe: Machine Research and Development and Bletchley Park
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CURVE/open How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park Smith, C Author post-print (accepted) deposited by Coventry University’s Repository Original citation & hyperlink: Smith, C 2014, 'How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park' History of Science, vol 52, no. 2, pp. 200-222 https://dx.doi.org/10.1177/0073275314529861 DOI 10.1177/0073275314529861 ISSN 0073-2753 ESSN 1753-8564 Publisher: Sage Publications Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders. This document is the author’s post-print version, incorporating any revisions agreed during the peer-review process. Some differences between the published version and this version may remain and you are advised to consult the published version if you wish to cite from it. Mechanising the Information War – Machine Research and Development and Bletchley Park Christopher Smith Abstract The Bombe machine was a key device in the cryptanalysis of the ciphers created by the machine system widely employed by the Axis powers during the Second World War – Enigma.
    [Show full text]
  • A Practical Implementation of a One-Time Pad Cryptosystem
    Jeff Connelly CPE 456 June 11, 2008 A Practical Implementation of a One-time Pad Cryptosystem 0.1 Abstract How to securely transmit messages between two people has been a problem for centuries. The first ciphers of antiquity used laughably short keys and insecure algorithms easily broken with today’s computational power. This pattern has repeated throughout history, until the invention of the one-time pad in 1917, the world’s first provably unbreakable cryptosystem. However, the public generally does not use the one-time pad for encrypting their communication, despite the assurance of confidentiality, because of practical reasons. This paper presents an implementation of a practical one-time pad cryptosystem for use between two trusted individuals, that have met previously but wish to securely communicate over email after their departure. The system includes the generation of a one-time pad using a custom-built hardware TRNG as well as software to easily send and receive encrypted messages over email. This implementation combines guaranteed confidentiality with practicality. All of the work discussed here is available at http://imotp.sourceforge.net/. 1 Contents 0.1 Abstract.......................................... 1 1 Introduction 3 2 Implementation 3 2.1 RelatedWork....................................... 3 2.2 Description ........................................ 3 3 Generating Randomness 4 3.1 Inadequacy of Pseudo-random Number Generation . 4 3.2 TrulyRandomData .................................... 5 4 Software 6 4.1 Acquiring Audio . 6 4.1.1 Interference..................................... 6 4.2 MeasuringEntropy................................... 6 4.3 EntropyExtraction................................ ..... 7 4.3.1 De-skewing ..................................... 7 4.3.2 Mixing........................................ 7 5 Exchanging Pads 8 5.1 Merkle Channels . 8 5.2 Local Pad Security .
    [Show full text]
  • WRAP Theses Shah 2016.Pdf
    A Thesis Submitted for the Degree of PhD at the University of Warwick Permanent WRAP URL: http://wrap.warwick.ac.uk/81565 Copyright and reuse: This thesis is made available online and is protected by original copyright. Please scroll down to view the document itself. Please refer to the repository record for this item for information to help you to cite it. Our policy information is available from the repository home page. For more information, please contact the WRAP Team at: [email protected] warwick.ac.uk/lib-publications 1 2 ‘Secret Towns’: British Intelligence in Asia during the Cold War Nikita Shah A thesis submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Politics and International Studies Submitted March 2016 Department of Politics and International Studies University of Warwick 3 Table of Contents List of Abbreviations 1. Introduction 1 1.1 Chapter Outline 21 2. Methodology 25 2.1 Reading the Archive 25 2.2 A Lesson in Empire 31 2.3 Overcoming Archival Obstacles 38 3. Literature Review 49 3.1 Introduction 49 3.2 Definitional Debate – What is Intelligence? 51 3.3 The Special Relationship 63 3.4 The Special Intelligence Relationship in Asia 71 4. Historical Overview 80 4.1 The Special Intelligence Relationship in Asia 80 4.2 The Remnants of Empire 81 4.3 China, Hong Kong, and Taiwan 84 4.4 Burma 87 4.5 India 88 4.6 Indonesia 91 5. The Watchtower: British Intelligence in Hong Kong 95 5.1 Intelligence and Chaos in Hong Kong 101 5.2 Failed Networks and Blind Spots 106 5.3 British Intelligence and the Residue of Empire 112 4 5.4 Sino-Soviet Tensions and Espionage 128 5.5 The Special Intelligence Relationship in Hong Kong 132 6.
    [Show full text]
  • Secure Communications One Time Pad Cipher
    Cipher Machines & Cryptology Ed. 7.4 – Jan 22, 2016 © 2009 - 2016 D. Rijmenants http://users.telenet.be/d.rijmenants THE COMPLETE GUIDE TO SECURE COMMUNICATIONS WITH THE ONE TIME PAD CIPHER DIRK RIJMENANTS Abstract : This paper provides standard instructions on how to protect short text messages with one-time pad encryption. The encryption is performed with nothing more than a pencil and paper, but provides absolute message security. If properly applied, it is mathematically impossible for any eavesdropper to decrypt or break the message without the proper key. Keywords : cryptography, one-time pad, encryption, message security, conversion table, steganography, codebook, covert communications, Morse cut numbers. 1 Contents 1. Introduction………………………………. 2 2. The One-time Pad………………………. 3 3. Message Preparation…………………… 4 4. Encryption………………………………... 5 5. Decryption………………………………... 6 6. The Optional Codebook………………… 7 7. Security Rules and Advice……………… 8 8. Is One-time Pad Really Unbreakable…. 16 9. Legal Issues and Personal Security…... 18 10. Appendices………………………………. 19 1. Introduction One-time pad encryption is a basic yet solid method to protect short text messages. This paper explains how to use one-time pads, how to set up secure one-time pad communications and how to deal with its various security issues. Working with one-time pads is easy to learn. The system is transparent and you do not need a computer, special equipment or any knowledge about cryptographic techniques or mathematics. One-time pad encryption is an equation with two unknowns, which is mathematically unsolvable. The system therefore provides truly unbreakable encryption when properly used. It will never be possible to decipher one-time pad encrypted data without having the proper key, regardless any existing or future cryptanalytic attack or technology, infinite computational power or infinite time.
    [Show full text]
  • Report of the U.K./U.S. Communications Security
    ---· ~SEGRET 1~ Office Memorandum • uNITED sTATEs Go~MENT ' TO AFSA-()(1! DATE 17 August 1951 • FROM ~ o1: Staff . SUBJECT Report. o1: the U.K./U.S. C<,.nn1cat1ons Securit;y Ccmf'erence held . :I.D LoDchm :I.D Jul7 1951 J The inclosures are forwarded tor JOUr 1Df'ormat1on B.Dd retention. Inclosures - 2 (bolmd together) A. C. NJ!:BSOI' 1. COPf BO. 13 ot "Report to the Colonel, Artiller,r BritiSh Ch1ets ot Statt aDd ActiDg Chiet ot Staff to the U.s. Chiefs ot Staff' ~· ot the U.K./U.S. Canmm1cat1cma Securi't7 Ccmf'erence Held 1D LoDdoD 1D Juq1 1951n 2. COPf RO. 13 ot R~s ot the Wor~ Parties (J£8/Wl/R tbru J£S/W12/R) BEPORT ot the U.K./u.s. ~IS SEC1JRl'.1'!' COIFERDCE BLD D LOIDOB D JULY, 1951 ' •••. REF ID:A6.716~. ~ ' ... ·~ .... .. - ~ TOP SECRET ms/P/R, Couy No: 1,5 REPORT 1. In their en.aorsement of the report of the u.K./U.s. Ocmnunicat1ons Security Oo:nf'erenoe which was held in washington in September 19.50 the British and the u.s. Cbiefs o:f' Staff' agreed: "That there be axmual ccmf'.erences on tlBse SUbJects tor the next four years to be held altemate~ in IDndan and Washington, the first of tmse to be hBld :ln London :ln approx::lma.teq nllle months t:fme". 2. In accordance "'t'l.'th tbe above directive tlB 1951 Conference was opened in London on 6th Jul.¥ am closed on .}1st July. The following items were aisoussed:- On-line Cypmr Ma,obines.
    [Show full text]
  • A Complete Bibliography of Publications in Cryptologia
    A Complete Bibliography of Publications in Cryptologia Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 04 September 2021 Version 3.64 Title word cross-reference 10016-8810 [?, ?]. 1221 [?]. 125 [?]. 15.00/$23.60.0 [?]. 15th [?, ?]. 16th [?]. 17-18 [?]. 18 [?]. 180-4 [?]. 1812 [?]. 18th (t; m)[?]. (t; n)[?, ?]. $10.00 [?]. $12.00 [?, ?, ?, ?, ?]. 18th-Century [?]. 1930s [?]. [?]. 128 [?]. $139.99 [?]. $15.00 [?]. $16.95 1939 [?]. 1940 [?, ?]. 1940s [?]. 1941 [?]. [?]. $16.96 [?]. $18.95 [?]. $24.00 [?]. 1942 [?]. 1943 [?]. 1945 [?, ?, ?, ?, ?]. $24.00/$34 [?]. $24.95 [?, ?]. $26.95 [?]. 1946 [?, ?]. 1950s [?]. 1970s [?]. 1980s [?]. $29.95 [?]. $30.95 [?]. $39 [?]. $43.39 [?]. 1989 [?]. 19th [?, ?]. $45.00 [?]. $5.95 [?]. $54.00 [?]. $54.95 [?]. $54.99 [?]. $6.50 [?]. $6.95 [?]. $69.00 2 [?, ?]. 200/220 [?]. 2000 [?]. 2004 [?, ?]. [?]. $69.95 [?]. $75.00 [?]. $89.95 [?]. th 2008 [?]. 2009 [?]. 2011 [?]. 2013 [?, ?]. [?]. A [?]. A3 [?, ?]. χ [?]. H [?]. k [?, ?]. M 2014 [?]. 2017 [?]. 2019 [?]. 20755-6886 [?, ?]. M 3 [?]. n [?, ?, ?]. [?]. 209 [?, ?, ?, ?, ?, ?]. 20th [?]. 21 [?]. 22 [?]. 220 [?]. 24-Hour [?, ?, ?]. 25 [?, ?]. -Bit [?]. -out-of- [?, ?]. -tests [?]. 25.00/$39.30 [?]. 25.00/839.30 [?]. 25A1 [?]. 25B [?]. 26 [?, ?]. 28147 [?]. 28147-89 000 [?]. 01Q [?, ?]. [?]. 285 [?]. 294 [?]. 2in [?, ?]. 2nd [?, ?, ?, ?]. 1 [?, ?, ?, ?]. 1-4398-1763-4 [?]. 1/2in [?, ?]. 10 [?]. 100 [?]. 10011-4211 [?]. 3 [?, ?, ?, ?]. 3/4in [?, ?]. 30 [?]. 310 1 2 [?, ?, ?, ?, ?, ?, ?]. 312 [?]. 325 [?]. 3336 [?, ?, ?, ?, ?, ?]. affine [?]. [?]. 35 [?]. 36 [?]. 3rd [?]. Afluisterstation [?, ?]. After [?]. Aftermath [?]. Again [?, ?]. Against 4 [?]. 40 [?]. 44 [?]. 45 [?]. 45th [?]. 47 [?]. [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?]. Age 4in [?, ?]. [?, ?]. Agencies [?]. Agency [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?].
    [Show full text]
  • Bletchley Park and the Development of the Rockex Cipher Systems: Building a Technocratic Culture, 1941–1945
    Bletchley Park and the Development of the Rockex Cipher Systems: Building a Technocratic Culture, 1941–1945 Smith, C Author post-print (accepted) deposited by Coventry University’s Repository Original citation & hyperlink: Smith, C 2017, 'Bletchley Park and the Development of the Rockex Cipher Systems: Building a Technocratic Culture, 1941–1945' War in History, vol 24, no. 2, pp. 176-194 https://dx.doi.org/10.1177/0968344515613539 DOI 10.1177/0968344515613539 ISSN 0968-3445 ESSN 1477-0385 Publisher: Sage Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders. This document is the author’s post-print version, incorporating any revisions agreed during the peer-review process. Some differences between the published version and this version may remain and you are advised to consult the published version if you wish to cite from it. 1 Bletchley Park and the Development of the Rockex Cipher Systems: Building a Technocratic Culture, 1941–1945 The Government Code and Cypher School (GC&CS), housed at Bletchley Park during the Second World War, has widely been acknowledged to have been a major hub of wartime technological research. Despite its reputation for technocracy, until relatively late in the war the design and construction of technology by the agency was conducted in an ad hoc and piecemeal fashion to address specific problems.
    [Show full text]
  • British Diplomatic Cipher Machines in the Early Cold War, 1945-1970
    King’s Research Portal DOI: 10.1080/02684527.2018.1543749 Document Version Peer reviewed version Link to publication record in King's Research Portal Citation for published version (APA): Easter, D. (2018). Protecting Secrets: British diplomatic cipher machines in the early Cold War, 1945-1970. Intelligence and National Security, 34(2), 157-169. https://doi.org/10.1080/02684527.2018.1543749 Citing this paper Please note that where the full-text provided on King's Research Portal is the Author Accepted Manuscript or Post-Print version this may differ from the final Published version. If citing, it is advised that you check and use the publisher's definitive version for pagination, volume/issue, and date of publication details. And where the final published version is provided on the Research Portal, if citing you are again advised to check the publisher's website for any subsequent corrections. General rights Copyright and moral rights for the publications made accessible in the Research Portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognize and abide by the legal requirements associated with these rights. •Users may download and print one copy of any publication from the Research Portal for the purpose of private study or research. •You may not further distribute the material or use it for any profit-making activity or commercial gain •You may freely distribute the URL identifying the publication in the Research Portal Take down policy If you believe that this document breaches copyright please contact [email protected] providing details, and we will remove access to the work immediately and investigate your claim.
    [Show full text]
  • 41774259081336
    eclassifi ed and a roved for release b NSA on 06-11-2014 ursuant to E .0. 1352 • ' 1"0P :s~enr - SECURI'l'Y INfl~ON SECT!ON A. U. S. COW,fiJNICATION SECURITY ~ PART I. LITERAL CIPHER MACHINm 1 • Machines Requiring No External Source of Power a. AFSAM D17 A small keyboard-operated, tape-printing literal cipher machine designed for use where electrical poi.·ier is not available. • Operates pneumatically at approxi.ma tely 15 to 20 words per minute, all power being supplied by the depression of the keyboard keys. Crypto-uni t is a reciprocal permuting maze consisting of ten 26- point rotors and a reflector. Eight of the rotors step in a single interrupted "COM" cascade. Two of the rotors and the reflector are settable, but do not step. All rotors are identically "wired" and their order in the maze is not changed. All rotors have rotatable alphabet rings and seven of the stepping rotors have settable pin- pattern rings for motion control. Size and Weight: 8" x 8" x 4"; 10 lbs. :pevelopment Status: The first engineering model developed by a cormnercial contractor has been completed and will be de­ livered to NSA by 1 Sept. 1953. 1 'POP 9EOR£'i' • b~ AFSAM D21 The AFSAM D21 is a manually operated, tape-printing, literal cipher device using a five level one-time key tape. It is intended to replace one-time pads in some limited applications. The oase, printing irechanism, and the bar drum of the M-209 are used; the key wheels are replaced by a tape reader.
    [Show full text]
  • Uk/Us Communications Security Conference 1953
    Copy No. J. LCS(53)/S/Report (Final Draft). UK/US COMMUNICATIONS SECURITY CONFERENCE 1953 REPORT OF THE SECURITY SUB-C01v!MITTE"E to the "EXECUTIVE COlVIMITTT!.'E 1. The Security Sub-Committee has ma.de security assessments of U.K. and U.S. systems which are attached at Appendix A. It should be noted that the phrase "further study required" as applied. to an equipment still under development means tb.at information is insufficient fqr a final assessment but that continued development is justified. 2. Recommendations on transmission security are attached at Appendix B, 3. An agreed method of expressing security assessments is attached at Appendix C, togetHer with proposals for the information which should be provided by users in stating their requirements from the security point of viev~ Because of the nature of the discussion in this pa.per the Security Sub-Committee recommends that only the following statement be.included in the main report of the Conference: "During the Conference the u.K. and u.s: security advisers prepared an agreed method for the technical stat~ment of security assessments. 11 4. In addition the Security Committee has the following general recommendations to make:- a. A high priority should be given to a thor~ugh investigation of: (1) the properties of quantised speech; (2) the practicability of intercepting, recording and countii:ig the output of many of the speech equipments under consideration. b. · Steps shoul~ be taken to replace as soon as possible equipments employing an additive system in .such r5.-way that there is a "i significant danger of producing a readable depth of two.
    [Show full text]
  • One-Time Pad History
    One-Time Pad A one-time pad is a form of encryption that is difficult to decipher or crack if one is not the intended recipient. If done correctly, the strength of encryption of plaintext can almost be impossible to break in a useful timeframe. The system takes each character from plaintext and uses modular addition with a character from a pad or secret key of the same length of the plaintext to create ciphertext. If the key used to create the ciphertext is really random, as large or larger than the plaintext, never reused in any form, and kept truly secret, the ciphertext is unable to be decrypted in a usable timeframe. Although one-time pads are theoretically sound, there have been a number of practical implementation issues keeping the pads from seeing widespread use. When was the One-Time Pad Discovered? The one-time pad has been invented, an re-invented several times over the years. The technique was first described in 1882 by Frank Miller, and later “re-discovered in 1917” with a successful patent claim made a few years later. The current one-time pad concept is based on the Vernam cipher created by Gilbert Vernam and other co-workers. His cipher combined a message with a key that was read from a punch tape. In the original form of the cipher, the encoded messages could eventually be cracked since the key tape was setup on a loop that resulted in the key being reused making the cipher open to cryptanalysis. The “one-time” aspect of the cipher came into play a bit later when Joseph Mauborgne discovered the fact that if they key tape was fully random, cryptanalysis would be difficult if not impossible.
    [Show full text]