Quantcast
Channel: Christos military and intelligence corner
Browsing all 542 articles
Browse latest View live

Update

1). I’ve added a link to “The historical truth” of Beria and Suvorov about cryptography and radio intelligence in Compromise of Soviet codes in WWII.2). I’ve added Australian tanker’s criticism of the...

View Article


Interesting article on Greek wiretapping scandal

The Intercept has investigated, together with the Greek newspaper Kathimerini, the Vodafone wiretapping scandal of 2004. The article ’A DEATH IN ATHENS Did a Rogue NSA Operation Cause the Death of a...

View Article


More T-34 reliability problems…

In WWII Myths - T-34 Best Tank of the war I made a correction. I had written that:‘Still there are examples of T-34’s breaking down during assaults even late in the war (17). For instance the 5th...

View Article

Image may be NSFW.
Clik here to view.

Seeing is Believing

In WWII Myths - T-34 Best Tank of the war I added the following pics under the paragraph:‘The transmission had by American standards already failed, although with extreme care it could have been used...

View Article

Bletchley Park versus British bureaucracy

In the course of WWII both the Allies and the Axis powers were able to gain information of great value from reading their enemies secret communications. In Britain the codebreakers of Bletchley Park...

View Article


Image may be NSFW.
Clik here to view.

The OWI telegram from Bern

In Compromise of OWI - Office of War Information communications I had written that: The book ‘Hitler, the Allies, and the Jews’, p265 says about Mayer:‘Gerald Mayer was officially OWI’s man in Bern but...

View Article

Comrade Stalin on the T-34 tank

I said previously that I was going to add information in WWII Myths - T-34 Best Tank of the war from a new source. The book ‘Неизвестный T-34’ (Unknown T-34) has information in pages 52-54 on T-34...

View Article

NSA success with Diffie-Hellman algorithm?

How is NSA breaking so much crypto? is a summary of how the NSA might be able to exploit a large part of encrypted internet traffic and link to scientific paper here.

View Article


Image may be NSFW.
Clik here to view.

The British SYKO cipher device

During WWII the British Armed Forces used several cipher systems for their low/mid level traffic, such as the Syllabic cipher, Slidex, Syko/Rekoh cards, Bomber code etc. Unfortunately it is difficult...

View Article


Image may be NSFW.
Clik here to view.

Compromise of the State Department’s M-138-A strip cipher and the traffic of...

During WWII the US State Department used several cryptosystems in order to protect its radio communications from the Axis powers. The main systems used were the unenciphered Gray and Brown codebooks...

View Article

Image may be NSFW.
Clik here to view.

Report on the solution and processing of the Soviet Army’s 5-figure code

The use of signals intelligence and codebreaking by the Germans and Soviets in the Eastern front is a subject that has received very little attention by historians so far. The main reason was the lack...

View Article

C.G.McKay’s website ‘Intelligence Past’

Craig McKay, author of ‘From Information to Intrigue’, ‘Swedish Signal Intelligence’ and contributor to journals such as Intelligence and National Security, Journal of Intelligence History and...

View Article

Toivo or Karl? – To err is human vol3

In WWII the Finnish codebreakers solved the codes and ciphers of several countries. In the diplomatic field their greatest success was achieved against the State Department’s M-138-A strip cipher. One...

View Article


Image may be NSFW.
Clik here to view.

Intelligence operations in Switzerland - Hans von Pescatore, Captain...

In WWII Poland fought on the side of the Allies and suffered for it since it was the first country occupied by Nazi Germany. In the period 1940-45 the Polish Government in Exile and its military forces...

View Article

Update

1). In Polish Stencil codes and secret agent ‘’Knopf’’ I’ve added a link to Intelligence operations in Switzerland - Hans von Pescatore, Captain Choynacki and General Barnwell R. Legge.2). In The...

View Article


Overview of 2015

In 2014 I was able to copy a lot of material from government archives in the US, UK, Finland and Germany. At the end of the year I was thinking that i had covered all of the important cases so there...

View Article

Unanswered questions of WWII cryptology – progress report

In January 2015 I wrote a summary of the progress I had made in researching some very interesting cases of cryptologic history. What is the state of these cases now? Let’s see.1). US State Department...

View Article


Image may be NSFW.
Clik here to view.

Compromise of US cipher teleprinter in 1944

When the United States entered WWII several cryptosystems were in use by its armed forces and diplomatic service. The Army and Navy used a small number of SIGABA cipher machines for their high level...

View Article

Interesting articles from academic journals

There are several journals that deal with military and intelligence history and I try to follow some of them in case they publish articles that deal with signals intelligence. Here are some interesting...

View Article

Image may be NSFW.
Clik here to view.

German signals intelligence files in the Russian national archives

At the end of WWII parts of the German state archives were captured by the Soviet forces and taken to the Soviet Union. There they were placed in various Soviet state archives and kept out of reach of...

View Article
Browsing all 542 articles
Browse latest View live