2Nd Issue 1991

Total Page:16

File Type:pdf, Size:1020Kb

2Nd Issue 1991 NSA on 10-17-2012 ursuantto E .0. 13526 MDR Case # 54 77 TOP SECRET UlaJUUCDUlaJl1 ~l3CBC!JU1VU\? £ilffil3WCB~ lTUJU1U ~C$C!JU1~C$ ~~ OOC$0J~C$ ~ 00(iJU1~t1UiWC!l 2nd Issue 1991 SEA HUNT . • . • • . • • . !.. 1 BOOKBREl\KERS' FORUM ON Ml\CHINE l\IDS . ....___ ___, ·. 4 TEXTURE REPORTING . • . • -----·· • • 5 THE TEN MOST WANTED . • . L .. >·. ·7. MILLIMETER WAVE DETECTION SYSTEMS . j· ·· 9· ON BECOMING A WELL-ROUNDED CHINESE LINGUIST ______.l· -·- ~ - ~ ·· : - 1J .. CRYSCOM REQUIREMENTS FOR UNIX-TO-UNIX DATA €NCRYPTION-OECRYPTION EXCHANGE. 1 ---~---- ~ .. -~ "20 .L. 86-36 DATA FUSION • • • . 22 ON THE LIGHTER SIDE . • . • • • . • . 22. · FINGERTie INTELLIGENCE. • • • • . • . : I :23 COMMENT ON GI STER • • . • . • •. I v .24 . USING CH FOR COMPUTE-INTENSIVE CODE. • ,, •. _.25 BOOK REVIEW : SEI ZING THE EN IGMA . ...V.... er_a_F ... il'""b-y - . .... •.. 26 BULLETIN BOARD . • . • . 30 ON THE ENlGMll . • . • . ._j_____ ___,!. 31 BREAKING INTO OUR PAST: AN ENIGMA OF ANOTHER KIND .. .. Da v id Gaddy. 33 EDITORIAL .. ......... 36 LETTER . ... .36 TO CONTRIBUTE . • •.•••.••• 37 Tiii~ 90Cl:/~41SNT CONTAINS C09EWORB MA~ERIAL CLASSIFl~D BY ~~SA/€SSM 123 2 TOP SECRET DECLASSIFY ON: Ori9iAatiAg AgeAey's DeterJlfliAatieA ReEf~ireg NOT RELEASABLE TO CONTRACTORS DOCID: 4010108 CRYPTOLOG Published by Pl, Techniques and Standards VOL. XVIII, No. 2 ........................................... ....2nd Issue 1991 PUBLISHER ....................................... ....... ·._I _______.I BOARD OF EDITORS EDITOR ............................................. ._I____ .... ks63-1103) Computer Systems ................................... I ~963-1103) Cryptanalysis......................................... 1(9~3.-.···5·.. 2~8). C:ryptolinguistics ..................................... .I . 963-4382} Information Resources ................................... I K963-3ZS8) Information Science ................................ k963,3456) I F P.L. 86-36 Information Security . .I IJ72,2350 Intelligence Reporting ................................. I (96if5068} Language ............................................ I '963-3057) · · Linguistics ...................................... I (963"4814Y Mathematics..................................... ~ {963-5566) / .. >. Puzzles ......................................... I {96301601). / Research and Engineering............................. J 9.61-8362) Science and Technology ............................ I (963-4958) Special Research ........................................Vera R. Filby (968-5043) Classification Officer .................................I (963·B463) Bardolph Support.................................. l-------i(963c3369) Clover Support ..................... ·................... I (963-1103) Macintosh Support................ ................... I (961-8362) Illustrntor. .. I (963-3360) To submit articles and letters, please see inside back cover. For New Subscription or Change of Address or Name MAIL name and old and new organizations and building to: Distribution, CRYPTOLOG, Pl, NORTH or via PLATFORM: cryptlg@ barlc05 via CLOVER: cryptlg@ bloomfield Please DO NOT PHONE about your subscription or matters pertaining to distribution Contents ofCRYPTOLOG may not be reproduced or disseminated outside the National Security Agency without the permission of the Publisher. Inquiries regarding reproduction and dissemination should be directed to the Editor. All opinions expressed in CRYPTOLOG are those of the authors. They do not represent the official views of the National Security Agency/Central Security Service. FOR OPPIOI*L USE ONiH 4010108 ~p SEOHl!l'f' UMBRA P .L . 86-36 . I I /ii/ 2nd Issue 1991 * CRYPI'OLOG *page 1 P .L. 86- 36 'f6P SECltE'f' UMBH:A: EO 1 . 4 . ( c) P.L. 86-36 DOCID: 4010108 EO 1.4. (c) 'f'OP SHCM'f U.MIUtA 2nd Issue 1991 * CRYPTOLOG *page 2 't'OP SHCH:H'f UMBRA P.L. 86- 36 DOCID: 4010108 EO 1.4. (c) 'f6P Sl!!Cft:E'f tJ'MftltA \ 2nd Issue 1991 * CRYPTOLOG •page 3 'J.:QP iJ~C~'J.: IJMRBl.t DOCID: 4010108 BOOKBREAKERS' FORUM ON MACHINE AIDS c I I ) 1971 * 20th ANNIVERSARY * 1991 Wednesday, Thursday, Friday 30 Octobel"-'-1 November 1991 Infonnal Seminars on Computer Aids to B'ookbreaking I Who should attend? Anyone working on codes or code charts: Linguists Cryptanalysts Bookbreakers Cryptolinguists Providers of computer support to ~ode problems Managers of code problems For more information and to get on the mailing list, please fill out the coupon below, or write your name, organization, and building on a piece of paper and send it to: I lcbairnu1n. Bookbreakers' Forum on Machine Aids P15 P.L. 86-36 Ops-lNORTH Organization _______ Building_: _______ 2nd Issue 1991 * CRYPTOLOG *page 4 POR OPFl€1M:i USE Om.¥ DOCID: 4010108 SIGINT with Feeling P.L. 86-36 /// ..... .............· 2nd Issue 1991 * CRYPI'OLOG * p~ge 5 'f6t' SEeftift' UMIHl:li EO 1 . 4 . ( c) P.L. 86- 36 J;:o 1. 4 . ( c) DOCID: 4010108 E\ . L. 86- 36 'TOP S13GR:l3'1' UMBB:t\ 2nd Issu~991 * CRYPTOLOG *page 6 'FOP S~GH:E'F UM-BB:!z DOCID: 4010108 SEORF.l~ THE TEN MOST WANTED byl lw33Z P.L. 86-36 ·--~,""' P.L. 86-36 - ' ,_ ' ' ~- '-..... \ ' 2nd Issue 1991 • CRYPl'OLOG •page 7 SECRE'f H~:bK VII. COMIP'TT CH.~~FEl!.8 OP'TI!.¥ EO 1. 4. ( c) P.L. 86-36 6 36 DC>"CI 6 :- 4 010108 P.L. 86-36 ! / • i (FOUO) The staff of W332 will be very happy to brief any audience. The number to.call is 963- 6388 (secure); ask forl I .I I Rnd the hiddearnessage! ·The first five sofutions win CRYPTOLOG mugs. (P1 members and ,(;RYPTOLOG / Board members are not eligible for a pri~e.) 2nd Issue 1991 • CRYPTOLOG • page 8 EO 1. 4. ( c) /SB0RE'f P.L. 86-36 EO 1. 4. ( c) 1 IIMfDLB l+A 9?t~Hf'6Q~ffiBLO OUirY P.L. 86-36 DOCID: 4010108 SF.lCRE'f .L. 86-36 NEW MILLIMETER WAVE DETECTION SYSTEMS ..______ __.I R541 (U) One of the st:r:-ongest images of the recent spur further research in this direction. One of war in the Midd]e East was that of reporters the most promising proposals in the continuing broadcasting seeming]y effortlessly from rooftops search for battlefield superiority is the use of in Baghdad or the sands of Kuwait. But this millimeter-wave guided weapons. This kind of mobile reporting is really not so easy wavelength region is very well suited for such a because the equipment needed is quite heavy, mission. Metal targets stand out well from any the antennas are about 7-8 feet in diameter, natural background, and the target is not and several technicians are necessary to operate obscured by dust, fog, rain, or the smoke of the equipment. This may change quite rapidly burning oil wells. The small antenna would fit in the future, however, as the push to higher into a modest missile of only 3-6 inches in frequencies in the millimeter range, conven­ diameter, yet it would provide both sufficient tionally, 30-300 GHz, will make truly suitcase­ gain and small enough beam width to readily size earth terminals possible. With antennas as find tank-size targets. Together with some small as a foot or so in diameter and with modest processing capability such as "fire and enough bandwidth to accommodate all the forget," warheads delivered from long range reporters of a future operation (a truly large could provide an enormous advantage on the numbert), such millimeter wave systems will future battlefield. really "wire" the global village. The military is already studying the use of this wavelength region for communication satellites which would use much smaller, much less complex ground sites, yet provide an enormous increase in channel capacity. Can the commercial world be far behind? (U) Another image left with us from DESERT STORM was of smart bombs that homed in on their targets with surprising accuracy. Although these weapons were hardly news to even the most casual reader of Aviation Week, their actual successful use in combat will surely..._____________________ ___. 2nd Issue 1991 * CRYPTOLOG * page 9 SECRE't' IIAMDLE VIA COMH'ff CIIA?UfFJ~ l!Nif~~~ DOCID: 4010108 SE€RECf EO 1. 4. ( c) DOCID: 4010108 P.L. 86-36 2nd Issue 1991* CRYPTOLOG • page 11 SFlCJRET HKiq'Ot~ VIA COM'Hff CIIAHH~LS Ot~LY DOCID: 4010108 SE6RE'I' (U) Figure 3 shows a mi11imeter quasi-optic configuration that will be used in this new design. The detector is of a planar design which also incorporates an antenna placed at the focus of the quasi-optic system. There are several candidates for the detectors; two will be discussed in detail: superconducting tunnel junctions and Si/Ge superlattices. rlcm=J?.L. 86- 36 EO 1. 4 . ( c) SIS in Planar Antenna Quartz Hypertlemisphere Teflon Lens Figure 3: Quas1-opt1ca system Detectors (U) The superconducting detector depends on the quantum mechanical tunneling between two Quasi-optics superconductors. This effect is best understood (U) Quasi-optical concepts treat millimeter from studies of tunnel junctions consisting of radiation as one would optical radiation in that two thin superconducting films separated by a lenses and other focusing elements are used to several-nanometer-thick tunnel barrier made concentrate the energy to be detected. The main from the oxide of one of the metals or from advantage over standard parabolic reflectors is some other insulating material. that the system can be designed so that an (U) Superconducting receivers for infrared and array of detectors can be in focus and at the millimeter waves depend on the nonlinear same time allow a "staring" nonscanning system response of the tunneling currents when they to cover a whole sector without any need for are driven by constant and RF voltages. In fact, mechanical movement. To take full advantage it has been· said that this current-v-0ltage of this new capability implies that a detector nonlinearity is the strongest known in physics. array is available that has dimensions no larger than the wavelength of the radiation. In the (U) Figure 4 shows an experimental I-V curve millimeter wave region this means that the for a tunnel junction. The time-dependent detectors must be made by some photolithogaphical process. 2nd Issue 1991 • CRYPTOLOG • page 12 SECRE'f IWfDLE vu, 60M~ll" mwmELS OHLY DOCID: 4010108 SE6RE'I' involve photon assisted tunneling leading to an enhancement or reduction of quasi-particle 60 current on a voltage-energy scale of the ~ millimeter wave photon.
Recommended publications
  • STRATEGIC PLAN Funding in the US (Circa 1980) MANAGING RISK to ENSURE INTELLIGENCE ADVANTAGE
    Intelligence Reform And Terrorism Prevention Act of 2004 FY2016-2020 IC S&T Executive Order 12333 (1981) Industrial R&D Funding Begins Exceeding Government R&D STRATEGIC PLAN Funding in the US (Circa 1980) MANAGING RISK TO ENSURE INTELLIGENCE ADVANTAGE National Security Act of 1947 Office of Strategic Services Disbanded (1945) 1 About the Cover: The cover uses a red and blue double helix to represent multiple concepts relating to the Intelligence Community’s (IC’s) science and technology (S&T) efforts. For example, starting at the bottom and moving up the image on the cover one observes—in chronological order—a number of key “red” challenges and “blue” technological achievements in the history of the IC. The use of this construct was not chosen randomly, however. Akin to how the base pairs in strands of deoxyribonucleic acid (DNA) correspond to one another, researchers and technologists within the IC S&T enterprise aspire to create capabilities that link to the threat environment of today—and in the future. Lastly, and perhaps most importantly, the choice of a DNA strand is meant to convey the critical importance of basic research to the IC’s mission. Contents Foreword ............................................................................................................................................ iii Vision, Mission, and Guiding Principles for Intelligence Community Science and Technology Enterprise Investments ........................................................................... v Chapter 1 — Introduction ............................................................................................................
    [Show full text]
  • Sir Andrew J. Wiles
    ISSN 0002-9920 (print) ISSN 1088-9477 (online) of the American Mathematical Society March 2017 Volume 64, Number 3 Women's History Month Ad Honorem Sir Andrew J. Wiles page 197 2018 Leroy P. Steele Prize: Call for Nominations page 195 Interview with New AMS President Kenneth A. Ribet page 229 New York Meeting page 291 Sir Andrew J. Wiles, 2016 Abel Laureate. “The definition of a good mathematical problem is the mathematics it generates rather Notices than the problem itself.” of the American Mathematical Society March 2017 FEATURES 197 239229 26239 Ad Honorem Sir Andrew J. Interview with New The Graduate Student Wiles AMS President Kenneth Section Interview with Abel Laureate Sir A. Ribet Interview with Ryan Haskett Andrew J. Wiles by Martin Raussen and by Alexander Diaz-Lopez Allyn Jackson Christian Skau WHAT IS...an Elliptic Curve? Andrew Wiles's Marvelous Proof by by Harris B. Daniels and Álvaro Henri Darmon Lozano-Robledo The Mathematical Works of Andrew Wiles by Christopher Skinner In this issue we honor Sir Andrew J. Wiles, prover of Fermat's Last Theorem, recipient of the 2016 Abel Prize, and star of the NOVA video The Proof. We've got the official interview, reprinted from the newsletter of our friends in the European Mathematical Society; "Andrew Wiles's Marvelous Proof" by Henri Darmon; and a collection of articles on "The Mathematical Works of Andrew Wiles" assembled by guest editor Christopher Skinner. We welcome the new AMS president, Ken Ribet (another star of The Proof). Marcelo Viana, Director of IMPA in Rio, describes "Math in Brazil" on the eve of the upcoming IMO and ICM.
    [Show full text]
  • This Story Begins Sometime in the Early 1930S, When the Poles And
    XYZ Prof. Włodzimierz Zawadzki Institute of Physics, Polish Academy of Sciences [email protected] Mathematicians are important, and not just in wartime. his story begins sometime in the early 1930s, developing programmable computers. Knox informed when the Poles and the French first took an Turing about the progress made by the Poles, and Tur- T interest in breaking the code generated by the ing built a sophisticated machine of his own that was Enigma encryption machines. The Enigma was a Ger- capable of cracking the increasingly complex Wehr- man-made electro-mechanical device that looked a bit macht codes. In a nod to the Polish pioneers, Turing like a typewriter with little lights, and prior to WWII too called his device “the bomb.” Despite the urgings they were available commercially. The decision to of British intelligence, Bertrand was reluctant to get crack the Enigma code proved far-sighted when the the Polish team out of Nazi-occupied France and into machines underwent a complex and classified rede- Bletchley Park. The team ended up in southern France sign for military purposes in the run-up to the war. and, at one point, in North Africa. Despite their con- Codebreaking challenges had earlier been handled tinuing insights, the Polish team’s direct contribution by linguists, but the Enigma’s rotor-encrypted codes to the breaking of the Enigma code diminished. required codebreakers with a mathematical back- When the United States joined the war, one of the ground. The Polish Cipher Bureau, an intelligence out- most difficult aspects of Enigma decryption focused fit located near Warsaw, set up a task force consisting on the communications of the German U-boat fleet, of Marian Rejewski, Henryk Zygalski and Jerzy Róży- which harassed American supply convoys crossing cki.
    [Show full text]
  • A Counterintelligence Reader, Volume 2 Chapter 1, CI in World
    CI in World War II 113 CHAPTER 1 Counterintelligence In World War II Introduction President Franklin Roosevelts confidential directive, issued on 26 June 1939, established lines of responsibility for domestic counterintelligence, but failed to clearly define areas of accountability for overseas counterintelligence operations" The pressing need for a decision in this field grew more evident in the early months of 1940" This resulted in consultations between the President, FBI Director J" Edgar Hoover, Director of Army Intelligence Sherman Miles, Director of Naval Intelligence Rear Admiral W"S" Anderson, and Assistant Secretary of State Adolf A" Berle" Following these discussions, Berle issued a report, which expressed the Presidents wish that the FBI assume the responsibility for foreign intelligence matters in the Western Hemisphere, with the existing military and naval intelligence branches covering the rest of the world as the necessity arose" With this decision of authority, the three agencies worked out the details of an agreement, which, roughly, charged the Navy with the responsibility for intelligence coverage in the Pacific" The Army was entrusted with the coverage in Europe, Africa, and the Canal Zone" The FBI was given the responsibility for the Western Hemisphere, including Canada and Central and South America, except Panama" The meetings in this formative period led to a proposal for the organization within the FBI of a Special Intelligence Service (SIS) for overseas operations" Agreement was reached that the SIS would act
    [Show full text]
  • Orme) Wilberforce (Albert) Raymond Blackburn (Alexander Bell
    Copyrights sought (Albert) Basil (Orme) Wilberforce (Albert) Raymond Blackburn (Alexander Bell) Filson Young (Alexander) Forbes Hendry (Alexander) Frederick Whyte (Alfred Hubert) Roy Fedden (Alfred) Alistair Cooke (Alfred) Guy Garrod (Alfred) James Hawkey (Archibald) Berkeley Milne (Archibald) David Stirling (Archibald) Havergal Downes-Shaw (Arthur) Berriedale Keith (Arthur) Beverley Baxter (Arthur) Cecil Tyrrell Beck (Arthur) Clive Morrison-Bell (Arthur) Hugh (Elsdale) Molson (Arthur) Mervyn Stockwood (Arthur) Paul Boissier, Harrow Heraldry Committee & Harrow School (Arthur) Trevor Dawson (Arwyn) Lynn Ungoed-Thomas (Basil Arthur) John Peto (Basil) Kingsley Martin (Basil) Kingsley Martin (Basil) Kingsley Martin & New Statesman (Borlasse Elward) Wyndham Childs (Cecil Frederick) Nevil Macready (Cecil George) Graham Hayman (Charles Edward) Howard Vincent (Charles Henry) Collins Baker (Charles) Alexander Harris (Charles) Cyril Clarke (Charles) Edgar Wood (Charles) Edward Troup (Charles) Frederick (Howard) Gough (Charles) Michael Duff (Charles) Philip Fothergill (Charles) Philip Fothergill, Liberal National Organisation, N-E Warwickshire Liberal Association & Rt Hon Charles Albert McCurdy (Charles) Vernon (Oldfield) Bartlett (Charles) Vernon (Oldfield) Bartlett & World Review of Reviews (Claude) Nigel (Byam) Davies (Claude) Nigel (Byam) Davies (Colin) Mark Patrick (Crwfurd) Wilfrid Griffin Eady (Cyril) Berkeley Ormerod (Cyril) Desmond Keeling (Cyril) George Toogood (Cyril) Kenneth Bird (David) Euan Wallace (Davies) Evan Bedford (Denis Duncan)
    [Show full text]
  • The First Americans the 1941 US Codebreaking Mission to Bletchley Park
    United States Cryptologic History The First Americans The 1941 US Codebreaking Mission to Bletchley Park Special series | Volume 12 | 2016 Center for Cryptologic History David J. Sherman is Associate Director for Policy and Records at the National Security Agency. A graduate of Duke University, he holds a doctorate in Slavic Studies from Cornell University, where he taught for three years. He also is a graduate of the CAPSTONE General/Flag Officer Course at the National Defense University, the Intelligence Community Senior Leadership Program, and the Alexander S. Pushkin Institute of the Russian Language in Moscow. He has served as Associate Dean for Academic Programs at the National War College and while there taught courses on strategy, inter- national relations, and intelligence. Among his other government assignments include ones as NSA’s representative to the Office of the Secretary of Defense, as Director for Intelligence Programs at the National Security Council, and on the staff of the National Economic Council. This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other US government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: (Top) Navy Department building, with Washington Monument in center distance, 1918 or 1919; (bottom) Bletchley Park mansion, headquarters of UK codebreaking, 1939 UNITED STATES CRYPTOLOGIC HISTORY The First Americans The 1941 US Codebreaking Mission to Bletchley Park David Sherman National Security Agency Center for Cryptologic History 2016 Second Printing Contents Foreword ................................................................................
    [Show full text]
  • Román Ceano © Román Ceano
    La máquina enigma Román Ceano © Román Ceano. Todos los derechos reservados. El libro fue compilado de http://www.kriptopolis.org/enigma La fotografía sacada de http://enigma.wikispaces.com/file/view/enigma.jpg/30598271 Preludio En el verano de 1938, una pequeña localidad del condado de Buckingham vio perturbada su tranquilidad por la llegada de unos estrafalarios visitantes. Se trataba de hombres de aspecto próspero pero descuidado, acompañados por chicas que los lugareños juzgaron sospechosamente guapas y alegres. Estaban dirigidos al parecer por un tal Capitán Ridley, y decían que el motivo de su presencia era la caza. Ninguna de las camareras que les servían la cena en los hotelitos de la zona les oyó comentar anécdota cinegética alguna, lo cual era congruente con el hecho de que faltaban meses para la temporada. Lo que sí les oyeron comentar eran los opíparos almuerzos con que se obsequiaban. Estos debían tener lugar en la propiedad llamada Bletchley Park, puesto que allí se dirigían todos en sus coches cada mañana y de allí volvían cada tarde. Todo el mundo en Bletchley conocía la finca, sin duda la mejor de la comarca. La había creado sesenta años antes un exitoso corredor de bolsa de Londres llamado Herbert Leon, deseoso de disfrutar de la vida rural de las clases altas victorianas. Presidía la finca una mansión cuya fachada lucía una grotesca mezcla de estilos, que imitaba los palacios de las grandes familias rurales que habían sido reformados varias veces durante centurias. En la parte trasera había un gran patio, separado del edificio principal, donde estaban las cuadras, una enorme despensa donde guardar fruta fresca para el invierno y varias edificaciones auxiliares que recreaban de manera muy fidedigna el centro de operaciones de una propiedad rural.
    [Show full text]
  • The Enigma History and Mathematics
    The Enigma History and Mathematics by Stephanie Faint A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Master of Mathematics m Pure Mathematics Waterloo, Ontario, Canada, 1999 @Stephanie Faint 1999 I hereby declare that I am the sole author of this thesis. I authorize the University of Waterloo to lend this thesis to other institutions or individuals for the purpose of scholarly research. I further authorize the University of Waterloo to reproduce this thesis by pho­ tocopying or by other means, in total or in part, at the request of other institutions or individuals for the purpose of scholarly research. 11 The University of Waterloo requires the signatures of all persons using or pho­ tocopying this thesis. Please sign below, and give address and date. ill Abstract In this thesis we look at 'the solution to the German code machine, the Enigma machine. This solution was originally found by Polish cryptologists. We look at the solution from a historical perspective, but most importantly, from a mathematical point of view. Although there are no complete records of the Polish solution, we try to reconstruct what was done, sometimes filling in blanks, and sometimes finding a more mathematical way than was originally found. We also look at whether the solution would have been possible without the help of information obtained from a German spy. IV Acknowledgements I would like to thank all of the people who helped me write this thesis, and who encouraged me to keep going with it. In particular, I would like to thank my friends and fellow grad students for their support, especially Nico Spronk and Philippe Larocque for their help with latex.
    [Show full text]
  • 1 British Signals Intelligence and the 1916 Easter Rising in Ireland ABSTRACT Historians for Decades Have Placed Room 40, the Fi
    British Signals Intelligence and the 1916 Easter Rising in Ireland ABSTRACT Historians for decades have placed Room 40, the First World War British naval signals intelligence organization, at the centre of narratives about the British anticipation of and response to the Easter Rising in Ireland in 1916. A series of crucial decrypts of telegrams between the German embassy in Washington and Berlin, it has been believed, provided significant advance intelligence about the Rising before it took place. This article upends previous accounts by demonstrating that Room 40 possessed far less advance knowledge about the Rising than has been believed, with most of the supposedly key decrypts not being generated until months after the Rising had taken place. INTRODUCTION A key moment in twentieth century Irish history, on Easter Monday 1916 a group of rebels launched in Dublin an uprising against British rule. Carefully prepared in advance, the Irish rebels had previously sought German assistance in providing arms and in organizing transport for famed Irish nationalist Roger Casement. The Germans agreed to provide this assistance, dispatching Casement aboard a German submarine and organizing a covert landing of munitions aboard a merchant ship masquerading as the Norwegian steamer Aud. The arms, however, were intercepted and Casement captured by the British authorities. Notwithstanding these reverses, the uprising went forward shortly thereafter on Easter Monday, 24 April 1916. Though apparently catching the British authorities in Ireland by surprise, the uprising was put down by the British in a violent crackdown. For decades, signals intelligence has been treated as the linchpin in our understanding of the British anticipation of and response to these events.
    [Show full text]
  • The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life: Plus the Secrets of Enigma
    The Essential Turing: Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life: Plus The Secrets of Enigma B. Jack Copeland, Editor OXFORD UNIVERSITY PRESS The Essential Turing Alan M. Turing The Essential Turing Seminal Writings in Computing, Logic, Philosophy, Artificial Intelligence, and Artificial Life plus The Secrets of Enigma Edited by B. Jack Copeland CLARENDON PRESS OXFORD Great Clarendon Street, Oxford OX2 6DP Oxford University Press is a department of the University of Oxford. It furthers the University’s objective of excellence in research, scholarship, and education by publishing worldwide in Oxford New York Auckland Cape Town Dar es Salaam Hong Kong Karachi Kuala Lumpur Madrid Melbourne Mexico City Nairobi New Delhi Taipei Toronto Shanghai With offices in Argentina Austria Brazil Chile Czech Republic France Greece Guatemala Hungary Italy Japan South Korea Poland Portugal Singapore Switzerland Thailand Turkey Ukraine Vietnam Published in the United States by Oxford University Press Inc., New York © In this volume the Estate of Alan Turing 2004 Supplementary Material © the several contributors 2004 The moral rights of the author have been asserted Database right Oxford University Press (maker) First published 2004 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission in writing of Oxford University Press, or as expressly permitted by law, or under terms agreed with the appropriate reprographics rights organization. Enquiries concerning reproduction outside the scope of the above should be sent to the Rights Department, Oxford University Press, at the address above.
    [Show full text]
  • Joan Clarke at Station X
    Joan Clarke at Station X Before Joan Clarke worked at Bletchley Park’s Hut 8, she already knew Alan Turing. He was a friend of Joan’s brother. A very intelligent young woman, Joan studied mathematics at Cambridge University’s Newnham College. Gordon Welchman, who was working for the Government Code & Cypher School in the late 1930s, recruited Joan to work at Bletchley Park. He’d been her Geometry supervisor at Cambridge. At the time, women did not typically fill important jobs at Bletchley Park (or anywhere else throughout Britain). So ... at the beginning of her work at Station X ... Joan filled a clerical slot. It took very little time, however, for Joan to get her “own table” inside Hut 8. This promotion effectively placed her on Turing’s code-breaking team. Not only did Joan do great work at Bletchley, by 1944 she was deputy-head of the Hut-8 team. During the early part of her work at Station X, Joan had been promoted to a “Linguist,” even though she wasn’t fluent in other languages. (It was just a way for her to receive better pay for her work.) She once answered a questionnaire with these words: Grade: Linguist, Languages: None. When she first became a Hut-8 code breaker, Joan worked with Alan Turing, Tony Kendrick and Peter Twinn. Their actual work focused on breaking Germany’s Naval Enigma code (which the Station X workers had codenamed “Dolphin”). Joan and Alan Turing became very close friends and, in 1941, the head of Hut 8 asked his friend to become his wife.
    [Show full text]
  • Simply Turing
    Simply Turing Simply Turing MICHAEL OLINICK SIMPLY CHARLY NEW YORK Copyright © 2020 by Michael Olinick Cover Illustration by José Ramos Cover Design by Scarlett Rugers All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior written permission of the publisher, except in the case of brief quotations embodied in critical reviews and certain other noncommercial uses permitted by copyright law. For permission requests, write to the publisher at the address below. [email protected] ISBN: 978-1-943657-37-7 Brought to you by http://simplycharly.com Contents Praise for Simply Turing vii Other Great Lives x Series Editor's Foreword xi Preface xii Acknowledgements xv 1. Roots and Childhood 1 2. Sherborne and Christopher Morcom 7 3. Cambridge Days 15 4. Birth of the Computer 25 5. Princeton 38 6. Cryptology From Caesar to Turing 44 7. The Enigma Machine 68 8. War Years 85 9. London and the ACE 104 10. Manchester 119 11. Artificial Intelligence 123 12. Mathematical Biology 136 13. Regina vs Turing 146 14. Breaking The Enigma of Death 162 15. Turing’s Legacy 174 Sources 181 Suggested Reading 182 About the Author 185 A Word from the Publisher 186 Praise for Simply Turing “Simply Turing explores the nooks and crannies of Alan Turing’s multifarious life and interests, illuminating with skill and grace the complexities of Turing’s personality and the long-reaching implications of his work.” —Charles Petzold, author of The Annotated Turing: A Guided Tour through Alan Turing’s Historic Paper on Computability and the Turing Machine “Michael Olinick has written a remarkably fresh, detailed study of Turing’s achievements and personal issues.
    [Show full text]