Decoded US diplomatic messages from 1944
In the US National Archives, in collection RG 457 ‘Records of the National Security Agency’ - Entry 9032 - boxes 205-213 ‘German decrypts of US diplomatic messages 1944’ one can find many decoded...
View ArticleMishaps at the front
During WWII visits to the front by important officials needed to be planned in advance so there would be no mishaps. However things didn’t always work out as planned…Close to the front it was difficult...
View ArticleNSA in the news - yet again!
Q&A with Edward SnowdenReport on NSA spying by Privacy and Civil Liberties Oversight Board
View ArticleUpdate
I made the following changes:1). Added pics from Foreign Military Studies B-644 in The RAF Cypher 2). Added the following paragraph in Polish Stencil codes and secret agent ‘’Knopf’’The person who was...
View ArticleGeneral Onodera’s intelligence bazaar
In the course of WWII all the participants tried to gather secret intelligence using spies. For example the Brits had their Secret Intelligence Service and the Special Operations Executive plus they...
View ArticleState Department’s strip cipher – reuse of alphabet strips and key lists
During WWII the US State Department used several cryptosystems in order to protect its radio communications from the Axis powers. For low level messages the unenciphered Gray and Brown codebooks were...
View ArticleGCHQ versus Anonymous?
According to NBC news: A secret British spy unit created to mount cyber attacks on Britain’s enemies has waged war on the hacktivists of Anonymous and LulzSec, according to documents taken from the...
View ArticleBritish cryptologic security failures in WWII
Signals intelligence and codebreaking played an important role in WWII. British and American codebreakers solved many important Axis crypto systems, such as the German Enigma machine and the Japanese...
View ArticleRAF Strength Far East Command – January 1942
In December 1941 Japan entered WWII on the side of the Axis by attacking the forces of the USA and UK stationed in the Pacific. The most audacious attack was against the US fleet in Pearl Harbor but in...
View ArticleJames Bamford NSA video
Interesting presentation on the history of the NSA by author James Bamford
View ArticleIn the news
Should the NSA be broken into separate parts?The NSA and GCHQ use the internet To 'Manipulate, Deceive And Destroy Reputations'
View ArticleRecommended reading on the Eastern Front
Every year countless books dealing with WWII are published worldwide. Many cover the fighting in the East between Nazi Germany and the Soviet Union. This conflict was the largest land campaign of the...
View ArticleUpdate
I added pics from the report E-Bericht 7/44 of FNAST 9 in Swedish Army codes and Aussenstelle Halden.
View ArticleThe secrets of room 6527
Interesting files are available from site room6527.comThe project is described as:The FBI has been hiding sensitive records of American eavesdropping operations from parliamentary scrutiny for decades....
View ArticleUnited States cryptologic security failures in WWII
Signals intelligence and codebreaking played an important role in WWII. British and American codebreakers solved many important Axis crypto systems, such as the German Enigma machine and the Japanese...
View ArticleThe US AN/GSQ-1 (SIGJIP) speech scrambler
During WWII all the major participants used a number of speech privacy systems in order to protect their confidential voice communications sent over landline or radio-telephone links.The US authorities...
View ArticleNew books on Soviet cryptology in WWII
The role of signals intelligence and codebreaking in WWII has received a lot of attention from historians, especially after the release of new information in the 1970’s (ULTRA story). Information on...
View ArticleIn the news
NSA can collect and store an entire country’s phone callsNSA targets Chinese telecommunications company HuaweiNSA targets system administrators
View Article