The case of the Rote Kapelle
I have uploaded the British report KV 3/349‘The case of the Rote Kapelle’ (only parts 1 and 2).Google drive link.
View ArticleInteresting Russian articles on their WWII cryptology/codebreaking operations
На Волге широкой"Мы вернулись домой в Севастополь родной..."Радиомолчание порой дороже золотаЗавод Кулакова
View ArticleHistorical overview of the Enigma G cipher machine
‘Enigma G: The counter Enigma’ by David Kenyon & Frode WeierudThe article also has a reference to this interesting history of Abwehr radio communications:‘Technik und Verfahren der...
View ArticleGCHQ official history delayed?
It seems that the upcoming book ‘Behind the Enigma: The Authorised History of GCHQ, Britain’s Secret Cyber Intelligence Agency’ has been delayed till October 2020.
View ArticleUpdate
In the essay The French War Ministry’s FLD code I’ve added the following information:Identifying the FLD codesWe can try to identify the cryptosystems used in the FLD radio network by looking at...
View ArticleFrode’s Biafran Ciphers
Frode Weierud has posted copies of cleartext and enciphered radio messages transmitted during the Nigerian civil war (also called the Biafran war).
View ArticleInteresting essay by Coldspur
Another interesting essay by Coldspur on Cold war espionage.
View ArticleFacebook page of the Greek Signal Corps museum
Interesting posts from the page of the Greek Signal Corps museum.For example the Greek DE-59 OTP teleprinter.
View ArticleOverview of 2019
In 2019 I was able to research some cases of cryptologic history plus there were some interesting articles and presentations that presented new information.Specifically:1). In The American M-209 cipher...
View ArticleThe plan for 2020
When I started researching cryptologic history in 2010 I didn’t expect I’d still be doing it 10 years later. It just goes to show you that life is unpredictable.During the year I’ll keep an eye out for...
View ArticleEmperor of spies
Craig McKay has written a book on General Onodera, the Japanese military attaché to Sweden during WWII, and his intelligence gathering activities.Like all the neutral capitals in Europe, Stockholm...
View ArticleList of TICOM I reports
Here is a list of the TICOM I reports 1-213. Thanks to Dermot Turing, who copied the lists from NARA, it was possible to find the titles for almost all of the reports.I-1 Final Report on TICOM Team 3...
View ArticleList of TICOM M reports
Again thanks to Dermot Turing, who copied the TICOM report M-15, it was possible to identify the titles of the TICOM M reports 1-15.M-1 Vierling's Laboratory at Ebermannastadt M-2 Major Barlow's Report...
View ArticleCompromise of Cold War era cipher machines by the US and Allied countries
1). Interesting story about the compromise of the cipher machines produced by the Crypto AG company.2). Article on the compromise of the export version of the Phillips Aroflex cipher machine.
View ArticleInteresting article on Japanese intelligence operations
International Journal of Intelligence and CounterIntelligence: ‘Japanese Navy’s Tactical Intelligence Collection on the Eve of the Pacific War’ by Naoki Saito.
View ArticleInteresting Enigma article
Cryptologia: Enigma: the spoils of Gustave Bertrand, or “par où tout a commencé” by Jean-François BouchaudyAbstractAs early as 1931, Gustave Bertrand of the French intelligence services received from...
View ArticleHistocrypt 2020 proceedings
The proceedings of the International Conference on Historical Cryptology 2020 are available here.
View ArticleNew articles on Soviet cryptology
"Слушают или нет?.."Путь советской секретной телефонии во время ВОВКриптографический фронт в документах времён ВОВ
View ArticleCancellation of my FOIA cases
My two remaining FOIA cases were filed in 2015 and 2018. I decided to cancel both of them because so much time has passed that this material is no longer of use to me.
View ArticleMy experience with the US FOIA program
Since I no longer have any active cases I think it’s time to write a summary of my experience with the US freedom of information act program.The good: 1). Everyone can request files using the FOIA...
View ArticleEnd of the road
I’ve been posting here since 2011 and during that time I have covered a variety of subjects on military and intelligence history.From the economics of war, to strength and loss statistics for the...
View ArticleThe American M-209 cipher machine
At the start of WWII, the US armed forces used various means for enciphering their confidential traffic. At the lowest level were hand ciphers. Above that were the M-94 and M-138 strip ciphers and at...
View ArticleUpdate 2024
Recently new information was published on the M-209 cipher machine and this information coupled with all the material that I have collected over the years led me to write a new essay on the M-209...
View Article