UNCLASSIFIED Accession Folder Doc Ref ID Filename Doc Title Date

Total Page:16

File Type:pdf, Size:1020Kb

UNCLASSIFIED Accession Folder Doc Ref ID Filename Doc Title Date UNCLASSIFIED Accession Folder Doc Ref ID Filename Doc Title Date No. of Pages 21609 ACC21609 A101014 41768429080752 CODES AND CIPHERS (CRYPTOLOGY); REPRINT OF FRIEDMAN'S ARTICLE IN ENCYCLOPEDIA BRITANNICA 1/1/1961 9 27475 ACC27475 A101100 41769269080836 INVESTIGATION OF SYSTEM INDICATOR ENCIPHERMENT; FRIEDMAN'S CRITIQUE OF A PAPER 5/2/1945 20 34839 ACC34839 A101106 41769069080816 PATENT APPLICATIONS NOS. 107,244 AND 682,096 OF WILLIAM F. FRIEDMAN RE PROPOSED MOTION CONTROL MEANS 9/19/1949 6 35225 ACC35225 A101154 41768689080778 LISBONIAN SELECTION OF ROOTS AND TERMINALS 1/1/1911 76 35288 ACC35288 A101155 41768919080801 COMMENT BY FRIEDMAN ON THE PREFACE TO "INVARIANTENTHEORIE" 4/30/1954 3 37006 ACC37006 A101157 41768509080760 DESCRIPTION OF THE SOLUTION OF A SPANISH DIPLOMATIC CODE IN 1918-19; CONTAINS NOTE BY FRIEDMAN DATED JANUARY 15 1932 1/15/1932 111 9407 ACC9407 A101175 41768489080758 INFORMAL MEMORANDUM NOTING M02 HAS CORRESPONDENCE DEALING WITH THE FRIEDMAN BILL 8/16/1963 1 9407 ACC9407 A101177 41768609080770 JOB DESCRIPTION FOR W.F. FRIEDMAN AS CHIEF OF THE COMMUNICATIONS RESEARCH SECTION 1/1/1949 1 9407 ACC9407 A101178 41768459080754 W.F. FRIEDMAN'S MILITARY SERVICE; INFORMAL NOTE LISTING PERIODS OF ACTIVE DUTY 1/1/1950 3 9407 ACC9407 A101180 41768539080762 POSITION AND GRADE SUMMARY FOR W.F. FRIEDMAN, 1918-1949 1/1/1950 6 9407 ACC9407 A101194 41768599080769 SIGNAL CORPS PATENT BOARD, MEETING NO. 2; CONVENED TO CONSIDER FRIEDMAN'S PATENT FOR MODIFICATION OF M-134-T1 AND M-134-T2 4/17/1936 2 9407 ACC9407 A101198 41768559080765 CONDITIONS OF FRIEDMAN'S EMPLOYMENT IN THE OFFICE OF THE CHIEF SIGNALS OFFICER; PERTAINING TO INVENTIONS AND PATENTS 4/25/1936 2 9407 ACC9407 A101205 41768789080788 LETTER TO W.F. FRIEDMAN FROM THE LEGAL DIVISION, ARMY SERVICE FORCES; REFERS TO 1942 PATENT FILED BY FRANK ROWLETT AND FRIEDMAN 6/10/1946 1 9407 ACC9407 A101210 41768479080757 COURT OF APPEALS, FOURTH CIRCUIT, DECISION IN KOBER V. UNITED STATES; SUIT BY THE SIGNAL CORPS TO RETAIN RIGHTS TO AN INVENTION 11/8/1948 7 9407 ACC9407 A101216 41768639080773 CORRESPONDENCE BETWEEN THE OFFICE OF THE SECRETARY OF DEFENSE AND HENRY G. FISCHER; REFERS TO FRIEDMAN'S INVENTIONS AND POSSIBLE LEGISLATION TO PURCHASE RIGHTS4/6/1950 3 9407 ACC9407 A101220 41768649080774 JAG (ARMY) CONFERENCE RELATIVE TO INVENTIONS OF WILLIAM F. FRIEDMAN 6/15/1950 3 9407 ACC9407 A101224 41768669080776 RELEASE OF CRYPTOGRAPHIC PRINCIPLES; EARLIER POLICY OF 29 APRIL 1946 RESCINDED 7/7/1950 1 9407 ACC9407 A101227 41768629080772 AUTHENTICATING DEVICE; PATENT BY W.F. FRIEDMAN FOR AUTHENTICATING DEVICE (PATENT NUMBER 2,518,458) 8/15/1950 4 9407 ACC9407 A101234 41768729080782 PRIVATE BILL TO BE SUBMITTED TO THE CONGRESS; SUMMARY FOR DIRAFSA OF FRIEDMAN'S CASE 8/25/1950 31 9407 ACC9407 A101252 41768699080779 PROPOSED BILL FOR THE RELIEF OF MR. WILLIAM F. FRIEDMAN - CRYPTOGRAPHIC INVENTIONS; LETTER FROM JUDGE ADVOCATE GENERAL TO DIRAFSA 7/5/1951 6 9407 ACC9407 A101253 41768739080783 REQUEST FOR TWO COPIES OF H.R. 5276, 77TH CONGRESS, FIRST SESSION (1941) 7/25/1951 1 9407 ACC9407 A101254 41768709080780 REQUEST FOR JOB DESCRIPTIONS; REQUEST FOR 1921 AND 1930 JOB DESCRIPTIONS FOR W.F. FRIEDMAN 8/28/1951 1 9407 ACC9407 A101262 41768759080785 PROPOSED BILL FOR THE RELIEF OF MR. WILLIAM F. FRIEDMAN AND POTENTIAL CLAIM - CRYPTOGRAPHIC INVENTIONS; LETTER FROM JAGC TO DIRAFSA NOTING THAT FURTHER INVESTIGATION8/29/1951 IS NOT NEEDED1 UNTIL A BILL IS PRESENTED 9407 ACC9407 A101270 41768719080781 PROPOSED BILL FOR THE RELIEF OF MR. WILLIAM F. FRIEDMAN AND POTENTIAL CLAIM - CRYPTOGRAPHIC INVENTIONS; CORRESPONDENCE BETWEEN FRIEDMAN'S ATTORNEYS AND THE8/31/1951 JAG FORWARDED TO DIRAFSA4 9407 ACC9407 A101280 41768749080784 REQUEST FOR JOB DESCRIPTIONS; SIGNAL CORPS, CIVILIAN PERSONNEL BRANCH, LETTER TO AFSA 8/28/1951 8 9407 ACC9407 A101286 41769229080832 LETTER FROM HENRY FISCHER TO W.F. FRIEDMAN; FORWARDS COPIES OF THE BILL AND A LETTER FROM WAYNE MORSE TO PAT MCCARRAN 10/23/1951 2 9407 ACC9407 A101298 41768809080790 H.R. 5728, 82D CONGRESS, 1ST SESSION, A BILL "FOR THE RELIEF OF WILLIAM F. FRIEDMAN" AND S. 2283, 82D CONGRESS, 1ST SESSION, A BILL, "FOR THE RELIEF OF WILLIAM F. FRIEDMAN";12/20/1951 LETTER FROM JAG 6TO DIRAFSA NOTING THAT INVESTIGATION MUST BE COMPLETED 9407 ACC9407 A101303 41768889080798 PENDING FRIEDMAN BILLS; LISTS MACHINES AND DEVICES COVERED BY FRIEDMAN'S APPLICATIONS 2/21/1952 2 9407 ACC9407 A101311 41768819080791 UNCLASSIFIED JOB DESCRIPTION, SIGNAL CORPS MEMORANDA REGARDING FRIEDMAN'S PATENTS; LIST OF DOCUMENTS HAND DELIVERED TO JAG ON 17 MARCH 1952 3/17/1952 3 9407 ACC9407 A101313 41768829080792 H.R. 5728 "FOR THE RELIEF OF WILLIAM F. FRIEDMAN"; QUESTIONS FOR NSA FROM THE PATENTS DIVISION OF THE JAGC 12/18/1952 1 9407 ACC9407 A101324 41768859080795 DRAFT LETTER FROM AFSA TO THE JUDGE ADVOCATE GENERAL; RESPONDS TO QUERIES REGARDING FRIEDMAN'S WORK RAISED BY JAG LETTER OF 5 JULY 1951 1/25/1952 5 9407 ACC9407 A101330 41768779080787 DRAFT OPINION REGARDING FRIEDMAN'S CLAIMS FOR COMPENSATION 1/1/1952 2 9407 ACC9407 A101332 41768969080806 DRAFT STATEMENT REGARDING FRIEDMAN'S INVENTIONS, H.R. 5728, AND EXECUTIVE ORDER 10096 1/7/1952 2 9407 ACC9407 A101339 41769169080826 H.R. 1152, 83RD CONGRESS, 1ST SESSION, A BILL "FOR THE RELIEF OF WILLIAM F. FRIEDMAN"; JAGC REQUEST FOR COMMENTS FROM DIRNSA 2/25/1953 1 9407 ACC9407 A101343 41769139080823 H.R. 1152, 83RD CONGRESS, 1ST SESSION, A BILL "FOR THE RELIEF OF WILLIAM F. FRIEDMAN"; DIRNSA REPLY TO JAGC LETTER OF 25 FEBRUARY 1953 3/6/1953 1 9407 ACC9407 A101355 41769029080812 H.R. 5728 "FOR THE RELIEF OF WILLIAM F. FRIEDMAN"; LETTER FROM DIRNSA ANSWERING QUESTIONS IN JAGC LETTER OF 18 DECEMBER 1952 1/8/1953 5 9407 ACC9407 A101361 41769199080829 NOTE TO FRIEDMAN FROM HENRY STAUFFER; FORWARDS COPY OF A 24 MARCH 1949 COMPTROLLER GENERAL LETTER 12/9/1955 7 9407 ACC9407 A101371 41768999080809 PRIVATE LAW 625 - 84TH CONGRESS CHAPTER 264 - 2D SESSION H.R. 2068; ACT FOR THE RELIEF OF WILLIAM F. FRIEDMAN 5/10/1956 1 9407 ACC9407 A101375 41768929080802 RECORD OF REQUEST BY FRIEDMAN FOR COPY OF FEBRUARY 1952 AFSA LETTER TO THE JAG 11/27/1953 1 9407 ACC9407 A101383 41769089080820 COURT DECISIONS PERTAINING TO FRIEDMAN'S CLAIMS 1/1/1951 73 47270 FOLDER 074 A104568 41712169075146 UNITED STATES-UNITED KINGDOM PATENT AGREEMENTS 10/25/1950 1 47270 FOLDER 074 A104576 41712219075152 SIGNAL CORPS CLEARANCE OF RELEASE OF TECHNICAL INFORMATION TO FOREIGN NATIONALS 8/3/1950 7 47270 FOLDER 074 A104588 41712249075155 POLICY FOR BRUSA COMSEC CONFERENCE IN REGARD TO CONDITIONS OF RELEASE OF INFORMATION; DRAFT POLICY STATEMENTS 9/11/1950 4 47270 FOLDER 074 A104591 41713459075276 POLICY FOR BRUSA COMSEC CONFERENCE IN REGARD TO CONDITIONS OF RELEASE OF INFORMATION; DRAFT OF PROPOSED POLICY STATEMENT 9/7/1950 9 47270 FOLDER 074 A104601 41712869075217 UNITED STATES - UNITED KINGDOM SECURITY AGREEMENT 9/12/1950 10 47270 FOLDER 074 A104605 41713639075294 PROPOSED LEGISLATION "TO PROVIDE FOR THE WITHHOLDING OF CERTAIN PATENTS THAT MIGHT BE DETRIMENTAL TO THE NATIONAL SECURITY, AND FOR OTHER PURPOSES 1/1/1951 14 47270 FOLDER 074 A104609 41713879075319 SECRECY ORDERS ON PATENT APPLICATIONS 6/23/1953 3 47270 FOLDER 074 A104610 41712309075162 INTERPRETATIONS AND OPINIONS NO. 4 OF THE GOVERNMENT PATENTS BOARD 3/11/1954 16 47270 FOLDER 074 A104613 41714149075345 GOVERNMENT INCENTIVES, AWARDS AND REWARDS PROGRAM PAMPHLET 9/25/1952 1 UNCLASSIFIED 1 UNCLASSIFIED 47270 FOLDER 074 A104618 41712749075206 PART II OF FINAL REPORT OF ARMED SERVICES PATENT POLICY REVIEW BOARD 7/21/1953 67 47270 FOLDER 074 A104621 41712389075169 COMMENTS ON PROPOSED AFSA REGULATION ON PATENTS 12/18/1950 1 47270 FOLDER 074 A104680 41712559075185 DRAFT OF PROPOSED LEGISLATION REGARDING PATENTS 5/1/1951 6 47270 FOLDER 074 A104681 41712289075159 DRAFT OF PROPOSED AFSA REGULATION REGARDING GOVERNMENT PATENTS BOARD 12/13/1950 7 47270 FOLDER 074 A104682 41712369075166 EXECUTIVE ORDER 10096 7/5/1950 1 47270 FOLDER 074 A104683 41713409075271 EXECUTIVE ORDER 10096 4/24/1950 2 47270 FOLDER 074 A104684 41712349075165 QUERY REGARDING EFFECTS OF EXECUTIVE ORDER 10096 ON AFSA 5/22/1950 1 47270 FOLDER 074 A104686 41712629075193 NOTE FROM FRIEDMAN TO CAPTAIN WENGER REGARDING EXECUTIVE ORDERS 9865 AND 10096 5/19/1950 1 47270 FOLDER 074 A104687 41714179075348 POLICY RELATING TO EMPLOYEE-MADE INVENTIONS 9/15/1950 23 47270 FOLDER 074 A104692 41712929075223 CORRESPONDENCE BETWEEN FRIEDMAN, CHIEF ASA, AND PATENTS SECTION, ASA R&D DIVISION REGARDING GOVERNMENT PATENT POLICY 3/4/1949 19 47270 FOLDER 074 A104693 41714239075354 ARMY SERVICE FORCES, OFFICE OF THE CHIEF SIGNAL OFFICER, PATENT MEMORANDUM NO. 5 1/1/1940 3 47270 FOLDER 074 A104694 41714339075364 SIGNAL CORPS GENERAL DEVELOPMENT LABORATORY, PATENT MEMORANDUM NO. 4 1/1/1939 2 47270 FOLDER 074 A104695 41712699075200 SIGNAL CORPS GENERAL DEVELOPMENT LABORATORY, PATENT MEMORANDUM NO. 3 1/1/1939 1 47270 FOLDER 074 A104696 41712589075189 SIGNAL CORPS PATENT MEMORANDUM NO. 1 4/25/1936 1 47270 FOLDER 074 A104697 41714369075367 MEMORANDUM CONCERNING EXECUTIVE ORDER 10096 10/27/1950 1 47270 FOLDER 073 A104698 41713349075266 BRIEF HISTORY OF STEPS AND ACTIONS TAKEN LEADING TO SUBMISSION OF PRIVATE BILL S.2283 9/11/1952 15 47270 FOLDER 073 A104704 41713769075307 WILLIAM F. FRIEDMAN - CIVILIAN EMPLOYEE OF ARMY SECURITY AGENCY 11/16/1949 3 47270 FOLDER 073 A104708 41713699075301 NOTE TO CHIEF, ASA WITH DRAFT OF PROPOSED 3D ENDORSEMENT 9/8/1949 5 47270 FOLDER 073 A104710 41714059075337 FIRST AND SECOND ENDORSEMENTS REGARDING FRIEDMAN'S LETTER OF 8 DECEMBER 1947 5/23/1949 2 47270 FOLDER 073 A104716 41714449075376 RETURN OF PAPERS IN RE PATENT APPLICATION SERIAL NO. 443,320 3/3/1949 30 47270 FOLDER 073 A104721 41714009075331 PATENT APPLICATION SERIAL NO. 443,320 12/8/1947 7 47270 FOLDER 073 A104726 41714489075379 RELEASE OF PATENT APPLICATION SERIAL NO. 443,320 8/6/1947 9 47270 FOLDER 073 A104736 41714559075386 RELEASE OF PATENT APPLICATION SERIAL NO.
Recommended publications
  • SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM
    SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM HEINEMANN: AUSTRALIA First published in 1987 by HEINEMANN PUBLISHERS AUSTRALIA (A division of Octopus Publishing Group/Australia Pty Ltd) 85 Abinger Street, Richmond, Victoria, 3121. Copyright (c) 1987 by Peter Wright ISBN 0-85561-166-9 All Rights Reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. TO MY WIFE LOIS Prologue For years I had wondered what the last day would be like. In January 1976 after two decades in the top echelons of the British Security Service, MI5, it was time to rejoin the real world. I emerged for the final time from Euston Road tube station. The winter sun shone brightly as I made my way down Gower Street toward Trafalgar Square. Fifty yards on I turned into the unmarked entrance to an anonymous office block. Tucked between an art college and a hospital stood the unlikely headquarters of British Counterespionage. I showed my pass to the policeman standing discreetly in the reception alcove and took one of the specially programmed lifts which carry senior officers to the sixth-floor inner sanctum. I walked silently down the corridor to my room next to the Director-General's suite. The offices were quiet. Far below I could hear the rumble of tube trains carrying commuters to the West End. I unlocked my door. In front of me stood the essential tools of the intelligence officer’s trade - a desk, two telephones, one scrambled for outside calls, and to one side a large green metal safe with an oversized combination lock on the front.
    [Show full text]
  • How I Learned to Stop Worrying and Love the Bombe: Machine Research and Development and Bletchley Park
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CURVE/open How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park Smith, C Author post-print (accepted) deposited by Coventry University’s Repository Original citation & hyperlink: Smith, C 2014, 'How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park' History of Science, vol 52, no. 2, pp. 200-222 https://dx.doi.org/10.1177/0073275314529861 DOI 10.1177/0073275314529861 ISSN 0073-2753 ESSN 1753-8564 Publisher: Sage Publications Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders. This document is the author’s post-print version, incorporating any revisions agreed during the peer-review process. Some differences between the published version and this version may remain and you are advised to consult the published version if you wish to cite from it. Mechanising the Information War – Machine Research and Development and Bletchley Park Christopher Smith Abstract The Bombe machine was a key device in the cryptanalysis of the ciphers created by the machine system widely employed by the Axis powers during the Second World War – Enigma.
    [Show full text]
  • A Practical Implementation of a One-Time Pad Cryptosystem
    Jeff Connelly CPE 456 June 11, 2008 A Practical Implementation of a One-time Pad Cryptosystem 0.1 Abstract How to securely transmit messages between two people has been a problem for centuries. The first ciphers of antiquity used laughably short keys and insecure algorithms easily broken with today’s computational power. This pattern has repeated throughout history, until the invention of the one-time pad in 1917, the world’s first provably unbreakable cryptosystem. However, the public generally does not use the one-time pad for encrypting their communication, despite the assurance of confidentiality, because of practical reasons. This paper presents an implementation of a practical one-time pad cryptosystem for use between two trusted individuals, that have met previously but wish to securely communicate over email after their departure. The system includes the generation of a one-time pad using a custom-built hardware TRNG as well as software to easily send and receive encrypted messages over email. This implementation combines guaranteed confidentiality with practicality. All of the work discussed here is available at http://imotp.sourceforge.net/. 1 Contents 0.1 Abstract.......................................... 1 1 Introduction 3 2 Implementation 3 2.1 RelatedWork....................................... 3 2.2 Description ........................................ 3 3 Generating Randomness 4 3.1 Inadequacy of Pseudo-random Number Generation . 4 3.2 TrulyRandomData .................................... 5 4 Software 6 4.1 Acquiring Audio . 6 4.1.1 Interference..................................... 6 4.2 MeasuringEntropy................................... 6 4.3 EntropyExtraction................................ ..... 7 4.3.1 De-skewing ..................................... 7 4.3.2 Mixing........................................ 7 5 Exchanging Pads 8 5.1 Merkle Channels . 8 5.2 Local Pad Security .
    [Show full text]
  • Biometrics & Security
    Biometrics & Security: Combining Fingerprints, Smart Cards and Cryptography THÈSE NO 4748 (2010) PRÉSENTÉE LE 25 AOÛT 2010 À LA FACULTÉ INFORMATIQUE ET COMMUNICATIONS LABORATOIRE DE SÉCURITÉ ET DE CRYPTOGRAPHIE PROGRAMME DOCTORAL EN INFORMATIQUE, COMMUNICATIONS ET INFORMATION ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE POUR L'OBTENTION DU GRADE DE DOCTEUR ÈS SCIENCES PAR Claude BARRAL acceptée sur proposition du jury: Prof. A. Lenstra, président du jury Prof. S. Vaudenay, Dr A. Tria, directeurs de thèse Prof. B. Dorizzi, rapporteur Dr A. Drygajlo, rapporteur Prof. A. Ross, rapporteur Suisse 2010 Acknowledgments First of all, I would like to thank David Naccache for his crazy idea to give me the opportunity to start a PhD thesis, on the late, and Serge Vaudenay for his welcoming in LASEC, for teaching me cryptography, and his incredible patience with my slow advancement in this PhD work. Many thanks to Jean-Pierre Gloton, David Naccache and Pierre Paradinas for sup- porting my Doctoral School application. I must thank all my colleagues in Gemplus, then Gemalto, for all their support. Especially Pierre Paradinas for hiring me, more than ten years ago, in his GRL team - the Gemplus Research Lab - Denis Praca, my very first mentor at Gemplus and Michel Agoyan for his precious sup- port whatever was the subject (e.g. Hardware, Software, Chip Design, Trainees management). Then Eric Brier and Cédric Cardonnel, first persons to work with me on Biometrics. Pascal Paillier and Louis Goubin for their support in cryptography. Jean-Louis Lanet for giving me the opportunity to give my very first courses at universities. Precisely, I would like to thank every person having trusted me for my teaching skills on Biomet- rics, Smart Cards and Cryptography: Traïan Muntean at Ecole Supérieure d’Ingénieurs de Lu- miny, Marseille, France.
    [Show full text]
  • Polish Mathematicians Finding Patterns in Enigma Messages
    Fall 2006 Chris Christensen MAT/CSC 483 Machine Ciphers Polyalphabetic ciphers are good ways to destroy the usefulness of frequency analysis. Implementation can be a problem, however. The key to a polyalphabetic cipher specifies the order of the ciphers that will be used during encryption. Ideally there would be as many ciphers as there are letters in the plaintext message and the ordering of the ciphers would be random – an one-time pad. More commonly, some rotation among a small number of ciphers is prescribed. But, rotating among a small number of ciphers leads to a period, which a cryptanalyst can exploit. Rotating among a “large” number of ciphers might work, but that is hard to do by hand – there is a high probability of encryption errors. Maybe, a machine. During World War II, all the Allied and Axis countries used machine ciphers. The United States had SIGABA, Britain had TypeX, Japan had “Purple,” and Germany (and Italy) had Enigma. SIGABA http://en.wikipedia.org/wiki/SIGABA 1 A TypeX machine at Bletchley Park. 2 From the 1920s until the 1970s, cryptology was dominated by machine ciphers. What the machine ciphers typically did was provide a mechanical way to rotate among a large number of ciphers. The rotation was not random, but the large number of ciphers that were available could prevent depth from occurring within messages and (if the machines were used properly) among messages. We will examine Enigma, which was broken by Polish mathematicians in the 1930s and by the British during World War II. The Japanese Purple machine, which was used to transmit diplomatic messages, was broken by William Friedman’s cryptanalysts.
    [Show full text]
  • The Informant
    PRESS INFORMATION The Informant History Permanent exhibition Collection Eye-witnesses Facts AS OF 10/17 Inhalt History 4 Permanent exhibition 6 Our collection 9 Eye-witnesses 10 Our experts 11 Events 12 Facts 14 Dear members of the press, Thank you very much for your interest in our museum. We hope that the information we provide here, about our permanent exhibition focussing on the secret world of espionage from ancient times to the present, will be of use to you. This is just an overview of our activities; if you have any further questions, please do not hesitate to contact us. We are also happy to give interviews and look forward to your visit! Robert Rückel, Director Contact: [email protected] Tel: +49 (0)30 - 39 82 00 45 - 0 Further information: deutsches-spionagemuseum.de/en/press 4 HISTORY The history of espionage The Persian King Cyrus II. (6th century BC) established a wide network of spies Alberti’s cipher disc, one of the first tools for Mata Hari – a double agent in WWI The Cryptex may look medieval but was the encryption of messages (15th century) invented by the author Dan Brown Knowledge has always been power – right Espionage was profes sionalized during the gauge the strength of enemy forces and shore back to the earliest settlements and the 15th century. The counsellors of the English up various political systems. The collapse of need of every ruler to find out what his Queen Elizabeth I (1533–1603) established the Warsaw Pact in the 1990s heralded a fur- enemies were doing, thinking and planning.
    [Show full text]
  • The First Americans the 1941 US Codebreaking Mission to Bletchley Park
    United States Cryptologic History The First Americans The 1941 US Codebreaking Mission to Bletchley Park Special series | Volume 12 | 2016 Center for Cryptologic History David J. Sherman is Associate Director for Policy and Records at the National Security Agency. A graduate of Duke University, he holds a doctorate in Slavic Studies from Cornell University, where he taught for three years. He also is a graduate of the CAPSTONE General/Flag Officer Course at the National Defense University, the Intelligence Community Senior Leadership Program, and the Alexander S. Pushkin Institute of the Russian Language in Moscow. He has served as Associate Dean for Academic Programs at the National War College and while there taught courses on strategy, inter- national relations, and intelligence. Among his other government assignments include ones as NSA’s representative to the Office of the Secretary of Defense, as Director for Intelligence Programs at the National Security Council, and on the staff of the National Economic Council. This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other US government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: (Top) Navy Department building, with Washington Monument in center distance, 1918 or 1919; (bottom) Bletchley Park mansion, headquarters of UK codebreaking, 1939 UNITED STATES CRYPTOLOGIC HISTORY The First Americans The 1941 US Codebreaking Mission to Bletchley Park David Sherman National Security Agency Center for Cryptologic History 2016 Second Printing Contents Foreword ................................................................................
    [Show full text]
  • The Da Vinci Code
    The Da Vinci Code Dan Brown FOR BLYTHE... AGAIN. MORE THAN EVER. Acknowledgments First and foremost, to my friend and editor, Jason Kaufman, for working so hard on this project and for truly understanding what this book is all about. And to the incomparable Heide Lange—tireless champion of The Da Vinci Code, agent extraordinaire, and trusted friend. I cannot fully express my gratitude to the exceptional team at Doubleday, for their generosity, faith, and superb guidance. Thank you especially to Bill Thomas and Steve Rubin, who believed in this book from the start. My thanks also to the initial core of early in-house supporters, headed by Michael Palgon, Suzanne Herz, Janelle Moburg, Jackie Everly, and Adrienne Sparks, as well as to the talented people of Doubleday's sales force. For their generous assistance in the research of the book, I would like to acknowledge the Louvre Museum, the French Ministry of Culture, Project Gutenberg, Bibliothèque Nationale, the Gnostic Society Library, the Department of Paintings Study and Documentation Service at the Louvre, Catholic World News, Royal Observatory Greenwich, London Record Society, the Muniment Collection at Westminster Abbey, John Pike and the Federation of American Scientists, and the five members of Opus Dei (three active, two former) who recounted their stories, both positive and negative, regarding their experiences inside Opus Dei. My gratitude also to Water Street Bookstore for tracking down so many of my research books, my father Richard Brown—mathematics teacher and author—for his assistance with the Divine Proportion and the Fibonacci Sequence, Stan Planton, Sylvie Baudeloque, Peter McGuigan, Francis McInerney, Margie Wachtel, André Vernet, Ken Kelleher at Anchorball Web Media, Cara Sottak, Karyn Popham, Esther Sung, Miriam Abramowitz, William Tunstall-Pedoe, and Griffin Wooden Brown.
    [Show full text]
  • WRAP Theses Shah 2016.Pdf
    A Thesis Submitted for the Degree of PhD at the University of Warwick Permanent WRAP URL: http://wrap.warwick.ac.uk/81565 Copyright and reuse: This thesis is made available online and is protected by original copyright. Please scroll down to view the document itself. Please refer to the repository record for this item for information to help you to cite it. Our policy information is available from the repository home page. For more information, please contact the WRAP Team at: [email protected] warwick.ac.uk/lib-publications 1 2 ‘Secret Towns’: British Intelligence in Asia during the Cold War Nikita Shah A thesis submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Politics and International Studies Submitted March 2016 Department of Politics and International Studies University of Warwick 3 Table of Contents List of Abbreviations 1. Introduction 1 1.1 Chapter Outline 21 2. Methodology 25 2.1 Reading the Archive 25 2.2 A Lesson in Empire 31 2.3 Overcoming Archival Obstacles 38 3. Literature Review 49 3.1 Introduction 49 3.2 Definitional Debate – What is Intelligence? 51 3.3 The Special Relationship 63 3.4 The Special Intelligence Relationship in Asia 71 4. Historical Overview 80 4.1 The Special Intelligence Relationship in Asia 80 4.2 The Remnants of Empire 81 4.3 China, Hong Kong, and Taiwan 84 4.4 Burma 87 4.5 India 88 4.6 Indonesia 91 5. The Watchtower: British Intelligence in Hong Kong 95 5.1 Intelligence and Chaos in Hong Kong 101 5.2 Failed Networks and Blind Spots 106 5.3 British Intelligence and the Residue of Empire 112 4 5.4 Sino-Soviet Tensions and Espionage 128 5.5 The Special Intelligence Relationship in Hong Kong 132 6.
    [Show full text]
  • Historical Cryptography 2
    Historical cryptography 2 CSCI 470: Web Science • Keith Vertanen Overview • Historical cryptography – WWI • Zimmerman telegram – WWII • Rise of the cipher machines • Engima • Allied encryption 2 WWI: Zimmermann Telegram • 1915, U-boat sinks Lusitania – 1,198 drown including 128 US – Germany agrees to surface 1st • 1916, new Foreign Minister – Arthur Zimmermann • 1917, unrestricted submarine warfare – Zimmermann hatches plan • Keep American busy at home • Persuade Mexico to: invade US and invite Japan to attack US as well Arthur Zimmermann 3 4 Mechanization of secret writing • Pencil and paper – Security limited by what humans can do quickly and accurately in the heat of battle • Enter the machine Thomas Jefferson's wheel cipher Captain Midnight's Code-o-Graph 5 Enigma machine • Enigma cipher machine – 1918, patented by German engineer Arthur Scherbius Arthur Scherbius – A electrical/mechanical implementation of a polyalphabetic substitution cipher 6 7 Enigma rotors • Rotor (wheel, drum) – Monoalphabetic substitution cipher implemented via complex wiring pattern – One of 26 initial positions – Geared: rotates after each letter • Rotor set – 3 rotors in 3!=6 possible orders • Eventually increased to 3 out of 5 • Navy used even more – Possible keys: • 3! * 263 = 6 * 17,576 = 105,456 8 Enigma plugboard • Plugboard – Operator inserts cables to swap letters – Initially 6 cables • Swaps 6 pairs of letters • Leaves 14 letters unswapped – Possible configurations: • 100,391,791,500 • Total keys: – 17,576 * 6 * 100,391,791,500 ≈ 10,000,000,000,000,000
    [Show full text]
  • CHAPTER 8 a History of Communications Security in New Zealand
    CHAPTER 8 A History of Communications Security in New Zealand By Eric Morgon Early Days “Admiralty to Britannia Wellington. Comence hostilities at once with Germany in accordance with War Standing Orders.” This is an entry in the cipher log of HMS Philomel dated 5 August, 1914. HMS Philomel was a cruiser of the Royal Navy and took part in the naval operations in the Dardanelles during the ill-fated Gallipoli campaign. Philomel’s cipher logs covering the period 1914 to 1918 make interesting reading and show how codes and ciphers were used extensively by the Royal Navy during World War 1. New Zealand officers and ratings served on board Philomel and thus it can be claimed that the use of codes and ciphers by Philomel are part of the early history of communications security in New Zealand. Immediately following the codes to Navy Office, the Senior Naval Officer New Zealand was advised that Cypher G and Cypher M had been compromised and that telegrams received by landline in these ciphers were to be recoded in Code C before transmission by Wireless Telegraphy (W/T) Apparently Cypher G was also used for cables between the Commonwealth Navy Board in Melbourne and he British Consul in Noumea. The Rear Admiral Commanding Her Majesty’s Australian Fleet instructed that when signalling by WT every odd numbered code group was to be a dummy. It is interesting to note that up until the outbreak of hostilities no provision had been made for the storage of code books or for precautions to prevent them from falling into enemy hands.
    [Show full text]
  • History and Modern Cryptanalysis of Enigma's Pluggable Reflector
    History and Modern Cryptanalysis of Enigma’s Pluggable Reflector Olaf Ostwald and Frode Weierud ABSTRACT: The development history of Umkehrwalze Dora (UKWD), Enigma's pluggable reflector, is presented from the first ideas in the mid-1920s to the last development plans and its actual usage in 1945. An Enigma message in three parts, enciphered with UKWD and intercepted by the British on 11 March 1945, is shown. The successful recovery of the key of this message is described. Modern computer-based cryptanalysis is used to recover the wiring of the unknown “Uncle Dick,” which the British called this field-rewirable reflector. The attack is based on the known ciphertext and plaintext pair from the first part of the intercept. After recovery of the unknown reflector wiring and the daily key the plaintext of the second part of the message is revealed. KEYWORDS: Enigma, cryptanalysis, Uncle Dick, Umkehrwalze Dora, UKWD, unsolved ciphers Address correspondence to Frode Weierud, Bjerkealleen 17, 1385 Asker, Norway. Email: [email protected] 1. Introduction Uncle Dick,1 as it was called by the codebreakers of Bletchley Park (BP), or Umkehrwalze Dora (UKWD), as designated by the Germans, was the nickname of a special pluggable reflector,2 used as the leftmost wheel within the scrambler 3 of the Enigma. The electro-mechanical cipher machine Enigma (from Greek αίνιγµα for “riddle”) was the backbone of the German Wehrmacht during World War II. Arthur Scherbius, a German promoted electrical engineer and inventor of considerable standing, invented Enigma in 1918 [14]. Subsequently it was improved and then used by all three parts of the German armed forces, namely army (Heer), air force (Luftwaffe), and military navy (Kriegsmarine), for enciphering and deciphering of their secret messages.
    [Show full text]