Update
1). I’ve added a link to “The historical truth” of Beria and Suvorov about cryptography and radio intelligence in Compromise of Soviet codes in WWII.2). I’ve added Australian tanker’s criticism of the...
View ArticleInteresting article on Greek wiretapping scandal
The Intercept has investigated, together with the Greek newspaper Kathimerini, the Vodafone wiretapping scandal of 2004. The article ’A DEATH IN ATHENS Did a Rogue NSA Operation Cause the Death of a...
View ArticleMore T-34 reliability problems…
In WWII Myths - T-34 Best Tank of the war I made a correction. I had written that:‘Still there are examples of T-34’s breaking down during assaults even late in the war (17). For instance the 5th...
View ArticleSeeing is Believing
In WWII Myths - T-34 Best Tank of the war I added the following pics under the paragraph:‘The transmission had by American standards already failed, although with extreme care it could have been used...
View ArticleBletchley Park versus British bureaucracy
In the course of WWII both the Allies and the Axis powers were able to gain information of great value from reading their enemies secret communications. In Britain the codebreakers of Bletchley Park...
View ArticleThe OWI telegram from Bern
In Compromise of OWI - Office of War Information communications I had written that: The book ‘Hitler, the Allies, and the Jews’, p265 says about Mayer:‘Gerald Mayer was officially OWI’s man in Bern but...
View ArticleComrade Stalin on the T-34 tank
I said previously that I was going to add information in WWII Myths - T-34 Best Tank of the war from a new source. The book ‘Неизвестный T-34’ (Unknown T-34) has information in pages 52-54 on T-34...
View ArticleNSA success with Diffie-Hellman algorithm?
How is NSA breaking so much crypto? is a summary of how the NSA might be able to exploit a large part of encrypted internet traffic and link to scientific paper here.
View ArticleThe British SYKO cipher device
During WWII the British Armed Forces used several cipher systems for their low/mid level traffic, such as the Syllabic cipher, Slidex, Syko/Rekoh cards, Bomber code etc. Unfortunately it is difficult...
View ArticleCompromise of the State Department’s M-138-A strip cipher and the traffic of...
During WWII the US State Department used several cryptosystems in order to protect its radio communications from the Axis powers. The main systems used were the unenciphered Gray and Brown codebooks...
View ArticleReport on the solution and processing of the Soviet Army’s 5-figure code
The use of signals intelligence and codebreaking by the Germans and Soviets in the Eastern front is a subject that has received very little attention by historians so far. The main reason was the lack...
View ArticleC.G.McKay’s website ‘Intelligence Past’
Craig McKay, author of ‘From Information to Intrigue’, ‘Swedish Signal Intelligence’ and contributor to journals such as Intelligence and National Security, Journal of Intelligence History and...
View ArticleToivo or Karl? – To err is human vol3
In WWII the Finnish codebreakers solved the codes and ciphers of several countries. In the diplomatic field their greatest success was achieved against the State Department’s M-138-A strip cipher. One...
View ArticleIntelligence operations in Switzerland - Hans von Pescatore, Captain...
In WWII Poland fought on the side of the Allies and suffered for it since it was the first country occupied by Nazi Germany. In the period 1940-45 the Polish Government in Exile and its military forces...
View ArticleUpdate
1). In Polish Stencil codes and secret agent ‘’Knopf’’ I’ve added a link to Intelligence operations in Switzerland - Hans von Pescatore, Captain Choynacki and General Barnwell R. Legge.2). In The...
View ArticleOverview of 2015
In 2014 I was able to copy a lot of material from government archives in the US, UK, Finland and Germany. At the end of the year I was thinking that i had covered all of the important cases so there...
View ArticleUnanswered questions of WWII cryptology – progress report
In January 2015 I wrote a summary of the progress I had made in researching some very interesting cases of cryptologic history. What is the state of these cases now? Let’s see.1). US State Department...
View ArticleCompromise of US cipher teleprinter in 1944
When the United States entered WWII several cryptosystems were in use by its armed forces and diplomatic service. The Army and Navy used a small number of SIGABA cipher machines for their high level...
View ArticleInteresting articles from academic journals
There are several journals that deal with military and intelligence history and I try to follow some of them in case they publish articles that deal with signals intelligence. Here are some interesting...
View ArticleGerman signals intelligence files in the Russian national archives
At the end of WWII parts of the German state archives were captured by the Soviet forces and taken to the Soviet Union. There they were placed in various Soviet state archives and kept out of reach of...
View Article