Quantcast
Channel: Christos military and intelligence corner
Browsing all 540 articles
Browse latest View live

Putin/Grizzly Bear hacked the US elections!!!

More on the Russian (alleged) hacking case from Eli the Computer Guy

View Article


Image may be NSFW.
Clik here to view.

Reports on the Soviet economy issued by German Army’s Leitstelle der...

In the period 1936-45 the German signal intelligence agencies were able to intercept radio traffic from the interior of the Soviet Union (both Morse and radio teletype).The information was included in...

View Article


TICOM report DF-229

The NSA’s FOIA office has released the TICOM report DF-229 ‘Three reports on the work of OKW/Chi’.The three reports in question are ‘The Cryptologic agency (Chiffrierabteilung) in OKW’, ‘Memorandum on...

View Article

Image may be NSFW.
Clik here to view.

The compromise of the Croat Enigma K cipher machine by the German Army’s...

Signals intelligence and codebreaking played an important role in WWII. British and American codebreakers solved many important Axis crypto systems and similarly their Axis counterparts also had their...

View Article

Breaking Enigma messages

Frode Weierud and Olaf Ostwald have written the interesting article ‘Modern breaking of Enigma cipher texts’ on modern techniques used in solving original Enigma messages from WWII.ABSTRACT“Breaking...

View Article


Interesting reports on the Soviet crypto problem

Two new versions of the following reports can be found at the NSA’s website.American Cryptology During the Cold War 1945-1989, Book IBOURBON to Black Friday: The Allied Collaborative COMINT Effort...

View Article

Twitter Q&A with GCHQ historian

The GCHQ historian has answered a series of questions on twitter

View Article

Image may be NSFW.
Clik here to view.

The Japanese TOKI diplomatic cipher 1943-45

During WWII Japan’s Foreign Ministry used several cryptologic systems in order to protect its diplomatic communications from eavesdroppers. In 1939 the PURPLE cipher machine was introduced for the most...

View Article


NSA Special Research Histories available for download

The following recently declassified Special Research Histories can be downloaded from the NSA website:SRH-361 ‘History of the Signal Security Agency Volume Two The General Cryptanalytic...

View Article


Update

In the essay The Japanese TOKI diplomatic cipher 1943-45 I’ve added:The report SRH-361 ‘History of the Signal Security Agency Volume Two The General Cryptanalytic Problems’, p283 says about...

View Article

TICOM D-69 ‘Correspondence between OKW/CHI and intercept stations’

I’ve uploaded TICOM report D-69 ‘Correspondence between OKW/CHI and intercept stations’ (97 pages- dated February 1946).Enjoy!

View Article

The Abwehr’s Enigma G cipher machine and Procedure 63

The Cryptologia article Mr. Twinn’s bombes is available from the Taylor and Francis website and it has some very interesting information on the Enigma G cipher machine, used in WWII by the German...

View Article

The quest for the missing NAASt 5 reports

During WWII the German Army’s signal intelligence agency operated a number of fixed intercept stations and also had mobile units assigned to Army Groups. These units were called KONA (Kommandeur der...

View Article


A misogynistic mistake!

In The Finnish cryptologic service in WWII I’ve added ‘Head of the diplomatic department was Mary Grashorn’.Mary Grashorn was mentioned in the essay ‘Finland’s codebreaking in WWII’ by David Kahn. I...

View Article

Article on Vietnamese signals intelligence successes against French and US...

The very interesting article ‘Cryptography During the French and American Wars in Vietnam’ by Phan Duong Hieu and Neal Koblitz is available online.Abstract: After Vietnam's Declaration of Independence...

View Article


Update

In The American M-209 cipher machine i’ve added notes and I’ve also added some text (analysis of German trigram technique and a list of reports on the Hagelin C-38). 

View Article

Image may be NSFW.
Clik here to view.

OKW/Chi decodes of Turkish diplomatic traffic

In Wartime exploitation of Turkish codes by Axis and Allied powers i’ve added the following decoded Turkish diplomatic messages:

View Article


Cipher machines of WWII

In the period 1939-45 most countries enciphered their communications using hand methods (codebooks, transposition etc). Only a few countries used cipher machines.The following list covers these...

View Article

Update

I’ve added information from TICOM report I-26 ‘Interrogation of Oblt. Schubert (OKH/Chef HNW/Gen.d.NA) on Russian Military and Agents’ systems at OKM Signals School, Flensburg on 17 June 1945’ in the...

View Article

Image may be NSFW.
Clik here to view.

The progress of my old NSA freedom of information act cases or alternatively...

So far my remaining cases with the NSA FOIA office can be broken into two groups. One concerns requests I made in 2015 and these seem to be progressing slowly but I expect I will get responses this...

View Article
Browsing all 540 articles
Browse latest View live