Quantcast
Channel: Christos military and intelligence corner
Browsing all 540 articles
Browse latest View live

Correction for Jellyfish article

I added information in the Jellyfish article. Specifically the reasons for changing the landing sites for the airborne operation on D-day and the effect of the daily change of internal settings for the...

View Article


Image may be NSFW.
Clik here to view.

US Military Strip Ciphers

The US Armed forces made extensive use of the strip ciphers M-94 and M-138 in the 1930’s and during WWII. Although authors focus on the SIGABA machine initially only a handful of these were available....

View Article


Image may be NSFW.
Clik here to view.

Book review - Strategic Bombing by the United States in World War II: The...

This short but very interesting book covers the USAAF strategic bombing effort in WWII. The author looks into the beginnings of strategic bombing in WWI, the interwar theories and the history and...

View Article

Master of Homeland Security award

The site Master of Homeland Security has posted the 100 best sites on national security. This weblog is included in the list as number 15. Not bad for an amateur historian like myself!

View Article

Update

I added information on Emile Bollaert, Pierre Brossolette and Forest Yeo-Thomas in German counterintelligence operations in occupied France.

View Article


Swedish Army codes and Aussenstelle Halden

During WWII Sweden was neutral but maintained close economic relations with Germany. The German signal intelligence agencies were interested in Swedish communications and they tried to solve their...

View Article

Image may be NSFW.
Clik here to view.

Insecure traffic of Soviet GHQ units

During WWII the radio traffic of Soviet units was one of the most reliable sources of information for the German Command. Through traffic analysis and D/F the numbers and location of units could be...

View Article

Update

Added information on the Christie suspension and made some corrections in WWII Myths - T-34 Best Tank of the war.

View Article


Image may be NSFW.
Clik here to view.

Compromise of OSS codes in WWII – Part 2

In my piece on the compromise of OSS codes during WWII it was stated that Allen Dulles occasionally used diplomatic ciphers when his own systems where overloaded. In 1943 the Germans were apparently...

View Article


Update

Added information and made some changes in A who’s who of German signals intelligence.

View Article

Image may be NSFW.
Clik here to view.

Russian Fish intelligence – A case of quantity over quality

As I’ve mentioned before the internal Soviet radioteletype network was intercepted during the 1930’s and 1940’s by the Germans and postwar by the Americans. The intercepted plaintext traffic concerned...

View Article

Update

Added Stein, Hasenjaeger, Aumann, Weber, Witt, Schultze and Grunsky in German mathematicians in the cryptologic service.

View Article

Don’t trust the fax comrade!

The wireless transmission of imageswas used by WWII participants for military purposes and by their news agencies. However radio-fax communications could be intercepted…During WWII the Soviet Union had...

View Article


Image may be NSFW.
Clik here to view.

Report on the war industry of the Soviet Union

There is a file at NARA called SOVIET UNION, SURVEY OF THE RECORDS OF THE BAND I (NR 3708 CBTM13 20293A 19420201). It is a German estimate of Soviet industrial production in 1942. I assume that some of...

View Article

New hacking scandal

It seems that the Americans were able to hack into the French President’s office. Oh mon dieu!

View Article


Image may be NSFW.
Clik here to view.

Book review- Behind the Urals: An American Worker in Russia's City of Steel

In the 1930’s the main goal of the communist regime in the Soviet Union was the rapid industrialization of the country. New factories were built all over the country and farmers were brought in to work...

View Article

Update

Time for some new TICOM reports:I-54 ‘Second interrogation of five members of the RLM/Forschungsamt’ - 1945I-82 ‘POW Interrogation report Dr Werner Liebknecht of Wa Pruef 7 of the Heereswaffenamt’ -...

View Article


Image may be NSFW.
Clik here to view.

Typex operational procedures

A file in HW 40/89 ‘Investigation into POW reports that German Sigint authorities exploited TYPEX (British cypher machine)’ has details on the use of the Typex cipher machine. Specifically the...

View Article

Update

I added a lot of new information in WWII Myths - T-34 Best Tank of the war.

View Article

The British War Office Cypher

At the start of WWII and for most of the conflict the standard crypto system used by the British for high level messages was the codebook enciphered with subtractor tables. Both the Foreign Office and...

View Article
Browsing all 540 articles
Browse latest View live