Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking book, The Codebreakers. Kahn, considered the dean of intelligence historians, is also the author of Hitler's Spies: German Military Intelligence in World War II and Seizing the Enigma: The Race to Break the German U-Boat Codes, 1939-1943, among other books and articles.The book includes a Foreword written by Bruce Schneier.
Kahn's latest book, How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code, provides insights into the dark realm of intelligence and code that will fascinate cryptologists, intelligence personnel, and the millions interested in military history, espionage, and global affairs. It opens with Kahn telling how he discovered the identity of the man who sold key information about Germany's Enigma machine during World War II that enabled Polish and then British codebreakers to read secret messages.
Next Kahn addresses the question often asked about Pearl Harbor: since we were breaking Japan's codes, did President Roosevelt know that Japan was going to attack and let it happen to bring a reluctant nation into the war? Kahn looks into why Nazi Germany's totalitarian intelligence was so poor, offers a theory of intelligence, explicates what Clausewitz said about intelligence, tells-on the basis of an interview with a head of Soviet codebreaking-something about Soviet Comint in the Cold War, and reveals how the Allies suppressed the second greatest secret of WWII.
Providing an inside look into the efforts to gather and exploit intelligence during the past century, this book presents powerful ideas that can help guide present and future intelligence efforts. Though stories of WWII spying and codebreaking may seem worlds apart from social media security, computer viruses, and Internet surveillance, this book offers timeless lessons that may help today's leaders avoid making the same mistakes that have helped bring at least one global power to its knees.
FOREWORD; Bruce Schneier INTRODUCTION How I Discovered World War II?s Greatest Spy The identity of the man who sold secrets of the Enigma cipher machine to the French, enabling their allies the Poles and then the British to crack that cryptosystem, letting the Allies see into German plans and helping them win the war. AMERICAN STORIES Did Roosevelt Know? A review of Robert B. Stinnett's inaccurate, tendentious Day of Deceit: The Truth about FDR and Pearl Harbor. Pearl Harbor and the Inadequacy of Intelligence The American solution of Japanese codes didn't prevent the attack because no intercepts warned of it. How the United States Viewed Germany and Japan in 1941 Intelligence played no role in evaluating America's future enemies. Prejudices did. Officials overestimated Germany and underestimated Japan. Roosevelt, MAGIC and ULTRA How the best intelligence -- codebreaking -- was refined for and presented to FDR. No traces survive, however, of how he used it in running the war. Edward Bell and His Zimmermann Telegram Memoranda Biographical details and a photograph of the American diplomat who handled history's most important decrypt in London, plus his unpublished memoranda about it. Bell was a close college friend of Franklin D. Roosevelt. Cryptography and the Origins of Spread Spectrum How a transatlantic telephone system encrypted with one-time keys was used by Roosevelt and Churchill. Film star Hedy Lamarr helped create a vocoder used in the cryptosystem. CASES The Rise of Intelligence In the 19th century, military defeats drove countries to create intelligence agencies. But only after radio interception gave intelligence speed and accuracy in the 20th century did it help win wars. Intelligence in World War II: A Survey How intelligence helped the Allies prevail. Hubris, Glory, Charisma, Fuhrer Why Nazi Germany's intelligence failed, and some comparisons with Allied intelligence. An Enigma Chronology The dates of key captures of documents, setbacks in solution, and breakthroughs. The Black Code: Rommel's "Good Source" and How It Dried Up The coded messages of the American military attache in Cairo in 1941-42 were intercepted and read by the Germans, helping Rommel win some victories, until the British cracked German Enigma messages and stopped the leak. Nothing Sacred: The Allied Solution of Vatican Codes A partial listing of the Curias codes solved by the Americans in World War II; no solved texts. Finland's Codebreaking in World War II Its origins, organization, personalities, and successes, mainly against the USSR. Soviet COMINT in the Cold War Soviet communications intelligence came more from bugs and traitors than from cryptanalysis; some details of its organization, based on interviews with a former chief and workers. How the Allies Suppressed the Second Greatest Secret of WWII The British and the Americans said nothing -- not even in official histories -- about the solution of German cryptograms enciphered in the Enigma and in other high-level systems until 1974. A THEORY, CLAUSEWITZ, AND MORE A Historical Theory of Intelligence Its biological and economic roots, its technological motor, its fundamental unavoidable human problem, its future. Clausewitz on Intelligence Why the great theoretician disdained intelligence and why generals accept it now. Surprise and Secrecy: Two Thoughts Secrecy can be quantified as Shannon quantified information; surprise is a matter not of insufficient information but of insufficient time. Intelligence Lessons in Macbeth How the usurping king dealt with predictions and intelligence he did not like -- a situation that faces all leaders. When Garbles Tickled History Mistakes in transmission or coding and their effects. The Cryptologic Origin of Braille Louis Braille got his idea from a secret communications system devised by a French officer. The Only Fake Message I Know People wonder whether generals send fake messages. Mostly they don't. It is too dangerous. In this case, the technique was abandoned after one message. The Prehistory of the General Staff It came into being after three preconditions emerged: secularization, bureaucracy, and management. PERSONALITIES Charles J. Mendelsohn and Why I Envy Him A biographical sketch of the first scholarly historian of cryptology and collector of the most antiquarian books in the field. The Man in the Iron Mask An examination of the nomenclators of Louis XIV shows none with the term masque, showing that the solution proposed by the great 19th-century French cryptanalyst Etienne Bazeries of the mysterious prisoner's identity is probably wrong. Plus a listing of other French nomenclators. Students Better Than a Pro and an Author Student cryptanalysts in 1918 solved a cipher proposed for military use by Bazeries; an independent solution was described in a charming book by architect Rosario Candela. The Old Master of Austrian Cryptology A review of the deservedly exhaustive biography of Andreas Figl by Otto J. Horak. COUNTERFACTUAL AND FUTURE Uncracked: The Allies Fail to Break Enigma Would Rommel, getting fuel past the British who could not sink his tankers because they had not solved Enigma, have enabled Hitler to shake hands with the Japanese in India and win World War II? The Future of the Past Vexing questions for scholars to resolve
Tertiary; University or College
Number Of Pages: 469
Published: 17th January 2014
Dimensions (cm): 24.638 x 16.002
Weight (kg): 0.07