Army Command and Administrative Network, IBM Radiotype and APO numbers
The
compromise of the State Department’s strip cipher – Things that don’t add up…
State Department’s strip cipher – reuse of alphabet strips and key lists
State Department’s strip cipher – reuse of alphabet strips and key lists
Einzeldarstellungen aus dem Gebiet der Kryptologie - Hüttenhain’s statements on the State Department’s strip cipher
Professor Wolfgang Franz and OKW/Chi’s mathematical research department
The Higgs memorandum - Compromise of State Department communications by the Finnish codebreakers in WWII
The Carlson-Goldsberry report - Compromise of State Department communications by the Finnish codebreakers in WWI
The US Division Field Code
The US TELWA code
Mister David A.Salmon - The State Department’s master of ciphers
Allen Dulles and the compromise of OSS codes in WWII
Joint Chiefs of Staff evaluation of Office of Strategic Services ciphers
Staff Study on OSS Cryptographic Plan - January 1945
The OSS Bern station and the compromise of State Department codes in WWII
The compromise of the communications of General Barnwell R. Legge, US military attache to Switzerland
Compromise of OWI - Office of War Information communications
Joint Chiefs of Staff evaluation of Office of War Information ciphers
German solution of State Department A-1 Code in 1944
German special intelligence, the M-138 strip cipher and unrest in India
Soviet
codes
Compromise
of Soviet codes in WWIISoviet signals intelligence and the German Enigma cipher machine
NKVD operational and high level codes
The Forschungsamt’s biggest success
German exploitation of Soviet radio-facsimile traffic
Soviet Diplomatic Code 26 and the elusive Dr Roeder
The Soviet K-37 ‘Crystal’ cipher machine
Soviet naval codes and the Arctic convoys
Soviet cipher teleprinters of WWII
German signals intelligence and the Stalingrad offensive
British
codes
The British War Office Cypher
The British Interdepartmental Cypher
B-Dienst vs Bletchley Park - The invasion of Norway and the Battle of the Atlantic
Rommel’s Italian savior
SOE cryptosystems – The German view
The British Typex cipher machine
Typex operational procedures
Solution of prewar Polish diplomatic code by OKW/Chi
Decoding the Warsaw Uprising
Polish
Stencil codes and secret agent ‘’Knopf’’
The codes of the Polish Intelligence network in occupied France 1943-44
Forschungsamt
success with Polish diplomatic link London-WashingtonThe codes of the Polish Intelligence network in occupied France 1943-44
French Hagelin cipher machines
Normandy 1944
Normandy 1944 – What-if scenarios and the Fortitude deception
German fuel reserve - Normandy 1944
Compromise of US M-209 cipher machine prior to the invasion of Normandy
Operation Overlord and the secret messages of the BBC
A who’s who of German Signals Intelligence
Italian codebreakers of WWII
An easy target - Italian codes and German codebreakers
German mathematicians in the cryptologic service
German
success with Purple?
Reich security service and OKW/Chi reports
The codebreakers of the Hungarian General Staff
The
codebreakers of the Japanese Foreign Ministry and the compromise of US codes
prior to Pearl HarborReich security service and OKW/Chi reports
The codebreakers of the Hungarian General Staff
The Japanese FUJI diplomatic cipher 1941-43
Decoded messages in the Finnish national archives
German disinformation operations - Barbarossa 1941
Economic
intelligence
Economic Intelligence by the Forschungsamt
Neutrals and minor Allied codes
Compromise of Iranian codes in WWII
The German intercept stations in Spain
Swedish Army codes and Aussenstelle Halden
Wartime exploitation of Turkish codes by Axis and Allied powers
The Pope’s codes
Cipher machines of WWII
The IBM Codatype cipher machine
Enigma cipher machine
Case ‘Wicher’ – Information from the war diary of Inspectorate 7/VI
Enigma security measures
Specialized cryptanalytic machines of WWII
Allied
agents codes and Referat 12
The secret messages of Marshall Tito and General Mihailović
Svetova Revoluce and the codes of the Czechoslovak resistance
German counterintelligence operations in occupied France
Sonderkommando Rote Kapelle and the radio network of the French Communist Party
Intelligence operations in Switzerland - Hans von Pescatore, Captain Choynacki and General Barnwell R. Legge
An Abwehr success via Moscow
Decoded
messages of the Rote DreiThe secret messages of Marshall Tito and General Mihailović
Svetova Revoluce and the codes of the Czechoslovak resistance
German counterintelligence operations in occupied France
Sonderkommando Rote Kapelle and the radio network of the French Communist Party
Intelligence operations in Switzerland - Hans von Pescatore, Captain Choynacki and General Barnwell R. Legge
An Abwehr success via Moscow
The Abwehr’s assessment of Russian women
Leaders of the Rote Kapelle
Kurt Jahnke German saboteur, Soviet spy?
P for Philby?
Abwehr agent Marina Lee and the Norway campaign
The resistance leader ‘King Kong’ and operation Market Garden
Dienstelle Klatt – A case of Soviet deception
Exploding telephone poles in the Eastern front
German 80mm Photophone - Carl Zeiss Lichtsprechgerät
German AFV losses 1941-44
German Tank losses FMS P-059
Eastern Front Aircraft Strength and Losses 1941-45
The German response against the Soviet T-34 and KV tanks
German AFV losses in the Eastern Front
RAF Bomber Command strength 1939-45
RAF Strength Far East Command – January 1942
RAF 2nd TAF strength 1944-45
British report on German armor piercing projectiles
WWII Myths – The Me262 jet fighter and the dumb Fuehrer
German evaluation of captured Soviet tanks
Some facts on the Panzer V Panther
Was the Panther a ‘heavy’ tank?
WWII Myths – Weak Panzer Divisions after 1940
Battle of Britain 1940 - Strength reports and What If scenarios
WWII Myths – German lack of standardization
The Mortain counterattack – Effects of ULTRA and airpower
WWII Myths – Multitude of German AFV types
Book review - The triumph of Zygalski's sheets: the Polish Enigma in the early 1940
Gulf war studies
Encryptors and Radio Intelligence. Shield and Sword of Information World
C.G.McKay’s website ‘Intelligence Past’
New books on Soviet cryptology in WWII
Brute Force
War Over the Steppes - The Air Campaigns on the Eastern Front 1941-45
Strategic Bombing by the United States in World War II: The Myths and the Facts
Normandy 1944
Air Power at the Battlefront: Allied Close Air Support in Europe 1943-45
British Intelligence in the Second World War
Red Storm Rising
No comments:
Post a Comment