Well that was fast…
One of the most interesting aspects of Cold War intelligence history is whether the spies recruited by the Western intelligence agencies (mainly CIA and MI6) were supplying real information or whether...
View ArticlePresentation on solution of historical ciphers
Here is a recent presentation on new methods of solution of historical cipher systems by mr George Lasry.
View ArticleUpdate on OSS communications from Bern, Switzerland
After going through my files I’ve discovered more documents that have information on the compromise of OSS communications in WWII. Thus the following paragraphs are added in Allen Dulles and the...
View ArticleCryptoCellar Tales is active again
My friend Frode Weierud has started adding material in his site CryptoCellar Tales. Frode is an expert on WWII crypto history and few people know more on the subject. Let’s hope that he continues to...
View ArticleUpdate
I added the following information in The Irish Government Telegraph Code:Translated Pers Z reports from 1941 and 1942 confirm these statements (3). The 1941 report says that ‘all the Irish telegrams...
View ArticleDid the German codebreakers solve the Japanese Purple cipher machine? –...
In the late 1930’s the Japanese Foreign Ministry distributed the Purple cipher machine to its most important embassies and it was used to encipher high level messages to and from Tokyo. Unfortunately...
View ArticleOverview of reports on compromise of Allied communications in WWII
When researching WWII signals intelligence and codebreaking operations it is important to track down all the available sources of information, from POW interrogations and captured documents to detailed...
View ArticleThe value of teamwork
Recently I mentioned that I’ve been trying to locate the report ‘Dopady lúštenia šifrovacieho systému čs. londýnskeho MNO z rokov 1940-1945 na domáci odboj’.After contacting the Czech Defense...
View ArticleCrypto World articles on the ciphers of Czechoslovakia’s government in exile
Information on Czechoslovak ciphers of WWII is available from a series of articles written for crypto world. Jozef Krajcovic has added links to these articles at katkryptolog.These were hand systems...
View ArticleThe ciphers of Czechoslovakia’s government in exile
At the end of the First World War the multiethnic Austro-Hungarian Empire collapsed and out of its ruins emerged several new countries. One of these was Czechoslovakia, containing the Czech areas of...
View ArticleInformation on the German Lorenz SZ42 cipher teleprinter
Frode Weierud has created a webpage with links to original German documents on the Lorenz SZ42 cipher teleprinter, used by the German military in WWII.
View ArticleUpdate on Case Wicher
The following paragraph has been added in Case ‘Wicher’ – Information from the war diary of Inspectorate 7/VI.The war diary of Inspectorate 7/VI, in the report of February 1942, says that an...
View ArticleNew developments in the strip cipher case
During WWII the US State Department used several cryptosystems in order to protect its radio communications from the Axis powers. The main systems used were the unenciphered Gray and Brown codebooks...
View ArticleEinzeldarstellungen aus dem Gebiet der Kryptologie - Hüttenhain’s statements...
During WWII the US State Department used several cryptosystems in order to protect its radio communications from the Axis powers. The main systems used were the unenciphered Gray and Brown codebooks...
View ArticleUpdate
I added information and pics in New developments in the strip cipher case.I also made a correction. I had written that the strips 60-1 were used for intercommunication between Bern, London, Lisbon,...
View ArticleNSA releases TICOM material to the US National Archives
According to an NSA press release:More than 29,000 pages of declassified material related to the World War II-era Target Intelligence Committee (TICOM) are now publicly available following a recent...
View ArticleCompromise of US KG-13 cipher machine?
The KG-13 was a cipher device used by the United States during the Cold War period. The Crypto museumpage says:‘KG-13 was a universal digital fully-transistorised full-duplex key generator, developed...
View ArticleInteresting articles on US policy in Cambodia during the Eisenhower era
The following articles present information from the recently published book Eisenhower and Cambodia: Diplomacy, Covert Action, and the Origins of the Second Indochina War:The Cambodia daily: Author...
View Article6 June 1944 – Allied plans, German intelligence and allocation of German units
On June 6 1944 the Western Allies invaded occupied France, in the area of Normandy, established a beachhead and eventually defeated the German forces opposing them.Operation Overlord started with a...
View Article