Quantcast
Channel: Christos military and intelligence corner
Browsing all 542 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Decoded US diplomatic messages from 1944

In the US National Archives, in collection RG 457 ‘Records of the National Security Agency’ - Entry 9032 - boxes 205-213 ‘German decrypts of US diplomatic messages 1944’ one can find many decoded...

View Article


Mishaps at the front

During WWII visits to the front by important officials needed to be planned in advance so there would be no mishaps. However things didn’t always work out as planned…Close to the front it was difficult...

View Article


NSA in the news - yet again!

Q&A with Edward SnowdenReport on NSA spying by Privacy and Civil Liberties Oversight Board

View Article

Update

I made the following changes:1). Added pics from Foreign Military Studies B-644 in The RAF Cypher 2). Added the following paragraph in Polish Stencil codes and secret agent ‘’Knopf’’The person who was...

View Article

Image may be NSFW.
Clik here to view.

General Onodera’s intelligence bazaar

In the course of WWII all the participants tried to gather secret intelligence using spies. For example the Brits had their Secret Intelligence Service and the Special Operations Executive plus they...

View Article


Image may be NSFW.
Clik here to view.

State Department’s strip cipher – reuse of alphabet strips and key lists

During WWII the US State Department used several cryptosystems in order to protect its radio communications from the Axis powers. For low level messages the unenciphered Gray and Brown codebooks were...

View Article

GCHQ versus Anonymous?

According to NBC news: A secret British spy unit created to mount cyber attacks on Britain’s enemies has waged war on the hacktivists of Anonymous and LulzSec, according to documents taken from the...

View Article

Image may be NSFW.
Clik here to view.

British cryptologic security failures in WWII

Signals intelligence and codebreaking played an important role in WWII. British and American codebreakers solved many important Axis crypto systems, such as the German Enigma machine and the Japanese...

View Article


Image may be NSFW.
Clik here to view.

RAF Strength Far East Command – January 1942

In December 1941 Japan entered WWII on the side of the Axis by attacking the forces of the USA and UK stationed in the Pacific. The most audacious attack was against the US fleet in Pearl Harbor but in...

View Article


Update

I added a reconstructed British Slidex card in The Slidex code.

View Article

James Bamford NSA video

Interesting presentation on the history of the NSA by author James Bamford

View Article

In the news

Should the NSA be broken into separate parts?The NSA and GCHQ use the internet To 'Manipulate, Deceive And Destroy Reputations'

View Article

Image may be NSFW.
Clik here to view.

Recommended reading on the Eastern Front

Every year countless books dealing with WWII are published worldwide. Many cover the fighting in the East between Nazi Germany and the Soviet Union. This conflict was the largest land campaign of the...

View Article


Update

I added pics in German exploitation of Soviet radio-facsimile traffic

View Article

Update

I added pics from the report E-Bericht 7/44 of FNAST 9 in Swedish Army codes and Aussenstelle Halden.

View Article


The secrets of room 6527

Interesting files are available from site room6527.comThe project is described as:The FBI has been hiding sensitive records of American eavesdropping operations from parliamentary scrutiny for decades....

View Article

Image may be NSFW.
Clik here to view.

United States cryptologic security failures in WWII

Signals intelligence and codebreaking played an important role in WWII. British and American codebreakers solved many important Axis crypto systems, such as the German Enigma machine and the Japanese...

View Article


Image may be NSFW.
Clik here to view.

The US AN/GSQ-1 (SIGJIP) speech scrambler

During WWII all the major participants used a number of speech privacy systems in order to protect their confidential voice communications sent over landline or radio-telephone links.The US authorities...

View Article

Image may be NSFW.
Clik here to view.

New books on Soviet cryptology in WWII

The role of signals intelligence and codebreaking in WWII has received a lot of attention from historians, especially after the release of new information in the 1970’s (ULTRA story). Information on...

View Article

In the news

NSA can collect and store an entire country’s phone callsNSA targets Chinese telecommunications company HuaweiNSA targets system administrators

View Article
Browsing all 542 articles
Browse latest View live