June 11, 2013

Blog Syntesis

An introductive note to this blog at the link: LET'S GET TO IT


Too look at the image in full dimension open the link below:
FULL DIMENSION IMAGE

1 Interdisciplinar
1.1. Music[LINK] 
1.2. Patent[LINK]
1.3. If It Was[LINK]
1.4. Masterpiece[LINK]
1.5. Postage Stamp[LINK]
1.6. Comics[LINK]
1.7. Maps[LINK]

2. Books
2.1. Winter of the World - Ken Follet
2.2. Gravity's Rainbow - Thomas Pynchon
   2.2.1. The Author[LINK]
   2.2.2. Let's Get to It[LINK]
   2.2.3. Map of Ideas[LINK]
   2.2.4. ABC[LINK]
2.3. The Code Book -Simon Singh
   2.3.1. Secrecy...Pros &Cons[LINK]


3. Course Programme
3.1. La Piazza Universale
   3.1.1. Ciphers[LINK]
   3.1.2. Spies[LINK]
3.2. Spy Story about Silk[LINK]


4. Cryptography
4.1. Coded Messages[LINK]
4.2. Glossary[LINK]

5. Devices
5.1. Code & Decode
   5.1.1. Enigma[LINK]
   5.1.2. Bombe[LINK]
   5.1.3. Cipher Machines Collection[LINK]
5.2. Comunication
   5.2.1. Radio[LINK]
  5.2.2. Telegraph & Morse Code[LINK]
5.3. Spy
   5.3.1. Minicameras
      5.3.1.1. Micro Optic[LINK]
      5.3.1.2. Gallery[LINK]
   5.3.2. Spy Sets[LINK]

6. Espionage
6.1. Agencies
   6.1.1. SIS
      6.1.1.1. Book Point of View[LINK]
      6.1.1.2. History[LINK]
      6.1.1.3. Art in the Agency[LINK]
   6.1.2. National Organizations[LINK]

June 9, 2013

Telegraph & Morse Code


WAVES recruting poster

Even though they had been known already for one hundred years telegraph and morse code were, in conjunction with radio, the most common methods of comunication during war time...In some cases there were entire units dedicated to the listening and the receiving of messages like for the GCHQ and the SIGINT in the UK,the FRA in Sweden, the NSA in the USA or the AT in Netherlands.
To be more precise the telegraph is way older than the morse code, there were in fact already multiple examples of this device:





  • 4th century. BC, greek hydarulic telegraph descibed by Aeneas Tacticus, and in the 3rd century by the hystorian Polybious
  • In the1792 the optical telegraph made its entrance in the world technological scene thanks to the french Claude Chappe and it was a precursor of its electrical version.
  • It is 1832 is the when the electrical telegraph makes  its first steps into history, with the prototype presented by Schilling von Canstatt.  From that moments a lot of different evolutions of the Electrical telegraph were presented, like the Gauss-Weber (1933) or the Cooke & Weatstone (1837) 
  •  But a the gratest step was made by Samuel Morse, with the development of the electro-magnetic telegraph, whose patent was registered by Morse itself on June, 20th 1940 and improved in the following years, because he didn't create just the machine, but he also introduced a specifically designed comunication method: The Morse Code. It consisted in the rappresentation of letters and numbers with a series of dots and lines properly alternated as presented in the photo below, and in the one under it (in a more grafical way which makes it easier to learn). The disposition of the characters differs in base of the language considered, but few rules stay the same, like the relative time that passes between the different letters (3 time units) or between the words (7 time units), where the time unit is defined by the gap between the different elements of the same letter.


The Morse Code Alphabet The Morse Code in Graphical Version



Art by Ward Cunningham


"The situation is now stable, the Adenoid occupies all of St. James's, the historic buildings are no more, Government offices have been relocated, but so dispersed that communication among them is highly uncertain—postmen are being snatched off of their rounds by stiff-pimpled Adenoid tentacles of fluorescent beige, telegraph wires are apt to go down at any whim of the Adenoid."

"Shots from uphill—then, maybe from Närrisch in reply, a burst of automatic fire. Otto
is holding his Hilde close. "Anybody read Morse Code?" the girl next to Slothrop wants to
know, "because there's been a light going over there, see, at the tip of that little island? for
a few minutes now." It's three dots, dot, dot, three more dots. Over and over.
"Hmm, SEES," ponders Felix.
"Maybe they're not dots," sez the tenor-sax player, "maybe they're dashes.""

[Gravity's Rainbow, Thomas Pynchon]


"In Napoléon’s time nothing could move faster than a horse,’ said Erik. ‘Today we have motor
vehicles and wireless telegraphy. Modern communications have enabled us to succeed where
Napoléon failed."

"The signals were in Morse Code, but the dots and dashes of naval signals translated into five-digit
number groups, each representing a letter, word or phrase in a code book. The apparently random
numbers were relayed by secure cable to teleprinters in the basement of the Old Administration
Building. Then the difficult part began: cracking the code.""

[Winter of the WorldI, Ken Follet]

This post argument is connected to the previous posts Secret Services & National Oganizations and SIS, aka MI6...A little bit of History, but also to the one related to Radio (Secret Services & Radio)

As usual for more specific information ccheck out both the links and the sources reported below...

Sources:

Multiples articles on both Theoretical (Foundamentals of Electromagnetism ) and Practical (Railway or Military Telegraphs) arguments
http://mysite.du.edu/~jcalvert/tel/telhom.htm

Other sources:
http://web.ics.purdue.edu/~smatei/435/techwiki/index.php?title=Morse_Code_and_the_Telegraph
http://cw.hfradio.org/
http://en.wikipedia.org/wiki/Morse_code
http://www.cryptomuseum.com/radio/morse/index.htm
https://en.wikipedia.org/wiki/Telegraphy
http://www.nearfieldcommunicationnfc.net/nfc-telegraph-history.html

June 6, 2013

Secret Services & Music


After digging for quite a while in The Lester S. Levy Sheet Music Collection I finally found a matching music sheet...It took me so long because I had to convince my friends to play and register it for me since there was no trace of it online!! (Thanks Giorgio and Jacopo for the music)



For listening to the song click on the following link:

June 5, 2013

Secret Services & Bombe 2.0

"The Poles had proved that Enigma was not a perfect cipher, and they had also demonstrated to the Allies the value of employing mathematicians as codebreakers." 

The room 40, which was shortely substituted by the GC&CS settled in Bletchley Park, 80 kilometers (50 miles) north of London, started to recrute new operator especially between mathematicians and scientists, and one of them, who deserves to be singled
out, it is the mathematician Alan Turing, who identified Enigma’s greatest weakness and ruthlessly exploited it. Thanks to Turing, it became possible to crack the Enigma cipher under even the most difficult circumstances.

The basic idea was that many messages sent would consist of some short piece of predictable text such as "The weather today will be...."  for the morning weather report, or "Heil Hitler" as closure of each text. Using those cribs the cryptoanalyst were able to create a menu  like the one in the photo below


The menu, in the form of an electric circuit, was ‘plugged up’ on the panel of sockets located on the back of the Bombe by means of 26-way cables. It must be underlined that, for the correct functioning of the British Bomb,  it was essential that the structure of the menu included multiple ‘closures’ or loops.
In the given menu the sequence of letters: S → A → X → V form one such loop, and the diagram below gives the details of the Enigma enciphering processes that correspond to the four links in this loop. In this diagram the four unknown stecker partners of the letters S, A, X and V are respectively represented by the Greek letters: α, β, γ and δ. (The Enigma rotor systems and their equivalents on the Bombe will subsequently be referred to as the ‘scramblers’. The scrambler connections were made with 26-way cables.)


The American Bombe was in its structure similar to its british correspondent, although it was way faster because it was designed to find the key of a 4 (instead of only 3) rotors Enigma, which was the one employed by the Kriegsmarine, the German Naval Army, the safest one.

The capability of the Allies to read the Axis messages allowed them to win importants battles of the Second World War, like for the Battle of the Atlantic, and the war itself.

The Entire argument of Cracking the Enigma Machine started in the last post Secret Services & Cracking Enigma: The Bombe,

Sources:
The Code BookSimon Singh
http://www.rutherfordjournal.org/article030108.html
http://www.bletchleypark.org.uk/content/machines.rhtm
http://www.vectorsite.net/ttcode_08.html#m1
http://en.wikipedia.org/wiki/Bombe
http://ciphermachines.com/enigma.html#break

June 4, 2013

Secret Services & Cracking Enigma: The Bombe

"In the years that followed the First World War, the British cryptanalysts in Room 40 continued to monitor German communications. In 1926 they began to intercept messages that baffled them completely. Enigma had arrived, and as the number of Enigma machines increased, Room 40’s ability to gather intelligence diminished rapidly.[...]The speed with which the Allied cryptanalysts abandoned hope of breaking Enigma was in sharp contrast to their perseverance just a decade earlier in the First World War.[...]One nation, however, could not afford to relax. After the First World War, Poland reestablished itself as an independent state, but it was concerned about threats to its newfound sovereignty. To the east lay Russia,[...] and to the west lay Germany[...]Sandwiched between these two enemies, the Poles were desperate for intelligence information, and they formed a new cipher bureau, the Biuro Szyfrów. If necessity is the mother of invention, then perhaps adversity is the mother of cryptanalysis."

[The Code Book, Simon Singh]

The whole process started indeed in Polland in the Biuro Szyfrówwhere the disappointed German Hans-Thilo Schmidt, a public dependent of the Chiffrierstelle, brought the papers in which was represented the general structure of the Enigma machine and thanks to a machine intercepted in the Polish mail (They then bought a commercial Enigma machine and used the gathered information to convert it into a military one)
This was actually a great step since, before these info, they only had mathematical analysis data, which, let's be honest here, were more or less useless without the machine. But even in this case "The strength of the cipher depends not on keeping the machine secret, but on keeping the initial setting of the machine (the key) secret"...an expedient that by itself was capable to lay approximately 1.58 x 10^20 possible keys between the Allies and the solution...a result which was more or less impossible to reach in useful time...
This was true untill the matematician Marian Rejewski found a leak in the comunication system: the repetition. The German infact used to comunicate with the daily key the message one (3 letters, one for each rotor) twice (for a total of 6)...Rejewski tabulated the relationships between the first and fourth characters as follows:

   ABCDEFGHIJKLMNOPQRSTUVWXYZ
      O                                   L                K
Given enough messages intercepted in one day, he could complete this table, giving him something like:

   ABCDEFGHIJKLMNOPQRSTUVWXYZ
   FOXPVBUNWYACRIZELDTQGJMKHS

I know that it seems to be leading nowhere, but Rejewski kept playing at it and discovered a property which was going to overturn their work.
He noticed that "A" in the top row was related to "F" in the bottom. He went to "F" in the top row and saw that it was related to "B" in the bottom. He went to "B" in the top row and saw that it was related to "O" in the bottom. He continued this search until he ended up with the "A" in the top row again, and then repeated this game through the rest of the table until there were no more characters left. The example above gives:

   A -> F -> B -> O -> Z -> S -> T -> Q -> L -> C -> X -> K -> A
   D -> P -> E -> V -> J -> Y -> H -> N -> I -> W -> M -> R -> D
   G -> U -> G

Rejewski did the same operationd with different sets of messages sent on different days, and noticed that the pattern of the number of chains and the number of links in the chains varied widely from day to day and he cleverly realized that this pattern provided a fingerprint characteristic of the initial rotor setup. The important thing about it is that it dependeds only on the number of chains and on the number of links in the chains; the exact characters in the chains were irrelevant.


Example of fingerprints structure
  1 chain with 10 characters
  2 chains with 5 characters
  1 chain with 6 characters      rotor order ACB rotor                                 position XHJ

  1 chain with 13 characters
  1 chain with 5 characters
  2 chains with 4 characters     rotor order BAC rotor                                 position FCD

Once the catalog containing all fingerprints was finished, the Poles could then identify the right key and decode all intercepted messages sent during the day, and start over again the day after knowing that most of the work was already done...at least until the Germans altered their usual way of transmitting messages, but Rejewski fought back. Even if his old fingerprints catalog was useles,but instead of rewriting it, he devised a mechanized version of it, which could automatically search for the correct scrambler settings. Rejewski’s invention was an adaptation of the Enigma machine, able to rapidly check each of the 17,576 settings until it spotted a match. Because of the six possible scrambler arrangements, it was necessary to have six of Rejewski’s machines working in parallel, each one representing one of the possible arrangements. Together, they formed a unit that was about three feet high, capable of finding the day key in roughly two hours. The units were called bombes, a name that might reflect the ticking noise they made while checking scrambler settings.

Bomba kryptologiczna  drawing 
from M.Rejewski’s papers

"The bombes effectively mechanized the process of decipherment. It was a natural response to Enigma, which was a mechanization of encipherment"

If you feel like you've missed something go on and check the previous posts related to this one, which are Secret Services & Patents: The Enigma Machine and Technology & The Enigma Machine
If you wanna dig deeper,you can satisfy your thirst for knowledge, you can click on the word links  or on the links of my sources.


Continues...

Sources:
The Code Book, Simon Singh
http://www.bletchleypark.org.uk/content/machines.rhtm
http://www.vectorsite.net/ttcode_08.html#m1
http://en.wikipedia.org/wiki/Bombe
http://en.wikipedia.org/wiki/Cryptanalysis_of_the_Enigma




June 3, 2013

Secret Services & Gravity's Rainbow: The Author

One of the greatest mistery about the Gravity's Rainbow book is infact the Author itself...We know his name, and few biographical information but his face is a real mistery. Only a few photos of him are known to exist, nearly all from his high school and college days, and his whereabouts have often remained undisclosed. Pynchon's personal absence from mass media is one of the notable features of his life, and it has generated many rumors and apocryphal anecdotes, like its behaviour has been considered as both marketing and writing strategy.

According to the first one, all the secrecy will make the audience even more curious about him, creating a legend, a mysterious halo around the Glen Cove writer. This thory is supported by his appereance in two Simpson episode, pictured with a bag on his head but dubbed with the author real voice.

(terrible definition but it is the only one that I've found)


Here's your quote: "Thomas Pynchon loved this book. Almost as much as he loves cameras!" (Angrily Shouted)


The second one, on the other hand, affirme that Pynchon choice of not appearing on mass medias, not releasing photos and interviews is due to the fact that he wants to comunicate with his readers only through his works, books and introductions, avoiding to influence their vision them. Evidences in agreement with this second theory are the numerous lines and references to critical discussion about his fiction.


Now is up to you to choose which opinion you agree with!!


Sources





June 2, 2013

Secret Services & Masterpiece

This is the masterpiece that I choose to represent my blog...Kryptos. It is a sculpure realized by Jim Sanborn on four large copper plates with other elements made of red and green granite, white quartz, and petrified wood, sitting in the grounds of the CIA headquarters in Virginia. It contains a message, which hasn't been decoded yet, even if, after 20 years of study, the solution is starting to materialize, thanks also to few hints given by the author. It is divided in 4 sections, three of the four coded sections of the sculpture had been cracked (solutions) by a CIA analyst, who was estimated to have spent 400 lunch-hours pondering it with a pencil and paper.





Articles about this sculpure and the halo of mistery surrounding it!
http://www.wired.com/threatlevel/2010/11/kryptos-clue/
http://www.telegraph.co.uk/news/worldnews/northamerica/usa/8149792/CIAs-Kryptos-sculpture-close-to-being-solved.html

May 31, 2013

Technology & The Enigma Machine

The Enigma machine is actually one of the best thing I ever seen in my life... I know now is just an antique, but at the time it was one of the most incredible devices ever builted for its complexity, the extreme safeness of its encrypted messages and its handiness.
Exploded structure of a rotor
Let's dig a little bit deeper into this machine: the principal compontents of the first machine presented by Arthur Scherbious consisted of  a keyboard, a plugboard, 3/4 rotors, a reflector and a lamp display pannel.
The machine workedpretty much in the following way: the operator press a character in the typewriter starting an electric impulse that is going to follow a certain pattern which is swapped when it passes into the plugbloard, then it goes trough the rotors, come back thanks to the reflector and it light a lamp wich corresponds to a certain letter (result). Explained in that way it may looks that it is an easy code to break, but there is a lot more going on in that machine... in fact the rotors are not fixed in that position, but they change at each pression like the odometer does, meaning that the first rotors moves each   time, meanwhile the second one makes a step only after the first one has done an entire cycle, and the third one does the same with respect to the second one, moreover the plugboard disposition could have been changed and the first position of the rotors choosed freely. To sum up with all those basilar elements the machine already disposed of a number of possible combinations way big to be discovered in useful time.

Schematic representation of the classic enigma operation

And that it was just the classical machine, if we also consider the additional complexity given by the appendix devoloped later in time (which you can find in the previous post Secret Services & Patents: The Enigma Machine)  the number of possible combinations increases exponentially..

Here you can find other information about what was new in each evolution of the machine:
And in this one a programme that simulates the operation


And now a little bit of humor...



The argument of this post is related to the one contained in Secret Services & Patents: The Enigma Machine

Sources:
[The Code BookSimon Sing];
http://ciphermachines.com/enigma;
http://en.wikipedia.org/wiki/Enigma_machine;
http://www.bletchleypark.org.uk/content/machines.rhtm;
http://www.codesandciphers.org.uk/enigma/;






May 30, 2013

Entire Collection of Chipher and Other

As it is well known secret services are a very well diffused practise, especially useful during war, or more generally in periods of international tension.. In the link below you can find an interesting collection of photos of devices used by various agencies in the world during the 20th century, such as chiper machines, spy equipement, radio, telegraph machines etc...

http://ciphermachines.com/photos/index.php




The argument of this post is related to the ones contained in Secret Services & Spy SetsSecret Services & Patents: The Enigma Machine, Secret Services & The Enigma Machine, Secret Services & RadioSecret Services & Cracking Enigma: The BombeSecret Services & Bombe 2.0Telegraph & Morse CodeMinicameras 2.0 and in Minicameras...micro optics at the service of the spies

May 29, 2013

Secret Services & Patents: The Enigma Machine

The patent I chose to represent my blog is the one about the Enigma Machine, because in the field of Cryptography is the first form of mechanization of this long process of encrypting messages, for its internal complexity, involving both mechanical and electronic circuits, that makes it a real artwork. The images below are taken from the first Enigma-related Patent, the one presented by Arthur Scherbius the 23 February 1918 and released the 8 July 1925.






 Later in time other patents were filed, most of them proposing implementations to the original machine: for example the possibility to use tubes fulfilled with water instead of electric wires, or to change the letter circuit with a multi-switches pannel (number of possible swaps incresing in time from 6 to 10), to remove rotors and  trade their places (UKW), to add a ring that make the rotor, on which it is applied, to do an additional movement after a key-press....

There are also two evolutions of the machine: the Enigma A and the Zahlwerk Enigma (or Enigma G), respectively filed on March, 26th, 1924 and on November, 9th, 1928. There were more developpements of the machine depending on the branch of the German army in which it was used.





Following: a family tree of the Enigma evolution created by Paul Reuvers & Frode Weierud (second link between sources for further informations) and here on the right the legend to better understand how it has been organized by the autors.
Enjoy...








Continues....

Sources:
http://www.cryptomuseum.com/crypto/enigma/patents/
http://www.cryptomuseum.com/crypto/enigma/tree.htm

May 27, 2013

Secret Services & Postage Stamp

The challenge this time is: choose a stamp that talks about the blog theme... and what's better than The British bombe?
It was a wonder of mechanical and electrical engineering. It's function was to figure out the rotors settings for each day's keys, and it was capable to perform that operation in at most 12 hours. From that point, all messages could be read in real time. In all, 210 British bombes were built during the war and all were destroyed at the end of the war, but few of their american evolution, used for analysing all combinations generated by 4 rotor Naval Enigma, in all 121, are still intact and they are still here, remebering us of what a great step toward artificial intelligence it has been done during that period thanks to these machines.

 




May 25, 2013

Secret Services & National Oganizations

The page of the link contains an (incomplete) overview of the various intelligence and law-enforcement agencies in the world. If possible, a link to their website is provided.

http://www.cryptomuseum.com/intel/index.htm


This argument is connected to the contents of a previous post (SIS, aka MI6...A little bit of History)

May 23, 2013

Secret Services & Spy Sets

Spy sets...I think that they're, actually, one of the most significant evidence of the technological progress of the time spell considered, which in this case is the second world war, because a spy,or more generally speaking a secret agent, doesn't have any certainty about what is going to happen to him, so he needs the best stuff to help him face all the possible scenarios and to work and report even in the most unprobable conditions...I know that now all these problems would make us laugh because of the incredible advance in tech in the last 20, but, at the time still they were a quite compelling issue to solve.



  1. Spy Radio and Receiver Sets: once again the main problem was to permit spies abroad to comunicate safely and as frequently as possible...To achieve this result all nations developed their own radio, like the RSZ, developped by US Navy around 1943, a small self-contained receiver with an external battery pack in a similar housing, that could be carried on the chest in a canvas case with two pockets; or the URSS Elektron Radio Set, characterized by a output power of 50W, suitable for ranges up to 3000 km and one of the first true spy radios to used a burst encoder in order to minimize the risk of interception and detection by the enemy (LPI). Other examples are: from UK, the Type A Mk. III (A3), a small spy radio set, manufactured by the Marconi Company in the UK in 1944, close towards the end of WWII. It was intended for clandestine operations on occupied territory, by agents, special forces and resistance units (S.O.E); or from Japan the incredible 94-6, a miniature single-valve portable transceiver that was used during WWII, as part of a series of Army radios.
  2. Covert Cameras or Minicameras: we've already spoke about this item in the posts  Minicameras...micro optics at the service of the spies and Minicameras 2.0, but if you wanna go further go on and check the web page in the crypto museum dedicated to them
  3. Covert Recorders:
    high-precision portable minature wire audio tape recorder, which could have been easily hidden under everyday cloathing. As a matter of fact this kind of Covert Equipement, like recorders and, especially bugs, belong more to the post WWII period, around 1950 and following decades, in fact their structure is much different from their precedent, because there were different needs and purposes which must had been considered during their fulfilment. Two  exemplar models are the Nagra SN (in the photo), introduced in the 1970, used by both CIA and Stasi and capable of recording in sync with a videocamera, and the Protona Minifon Attaché, a miniature tape recorder, using a magnetic tape which was organized into cassetes produced by the Protona GmbH, since the Philips Compact Cassettes weren't yet available.
  4. Burst Encoders: device that allows messages to be stored on a recording medium first. The pre-recorded message is then sent over the air at very high speed using a play-back device. Many solutions were developed, using a variety of media, such as paper, audio tape, metal tape, mechanical drums and even photographic film.   Messages that are sent this way often sound like a short tone or burst, which is why it is called a Burst Transmission.
  5. Bugs: Once again we're making a step forward in history, of 15-20 years more or less, but still its important to define them as a foundamental element of the spy set. One of the earliest sample of this incredible piece of technology is the KBG bug, a small radio bug, introduced around 1964 , with dimensions 72x23x10 mm, so  really small, as it can be inferred by the photo below... but there were smaller and more sophisticated prototypess such as the PS-006, a bollpiont bug developped in the 80's and with a small radious of action, only 25 m due to the small voltage

Click on the light blue words to link with pages where you can find more specific description about each single prototype and examples of others similar devices.

Sources:
http://www.cryptomuseum.com/spy/index.htm
http://en.wikipedia.org/wiki/Low_probability_of_intercept

May 20, 2013

Secret Services & Radio

Then at the fall of Paris, a radio transmitting station was set up on the cliff, antennas aimed at the Continent, themselves heavily guarded and their landlines back mysteriously over the downs to the house patrolled night and day by dogs specially betrayed, belted, starved into reflex leaps to kill, at any human approach.


With funding available for all manner of radars, magic 
torpedoes, aircraft and missiles, where was Pointsman in the scheme of things?

"Tides, radio interference, damned little else. There is no way for changes out there to produce changes here."

On the other side of the arch is a Russian jeep with a couple officers, one talking earnestly into the mike of his radio set, and the air between quickens with spoken Russian at the speed of light weaving a net to catch Slothrop.


At first he helped out in the propulsion group. No one was specializing yet. That came later, when the bureaus and paranoias moved in, and the organization charts became plan-views of prison cells. Kurt Mondaugen, whose field was radio electronics, could come up with solutions to cooling problems.


The Russians even had a guard posted on board for a while, till the Anubian ladies vamped them off long enough to single up all lines—and so the last long reprise of Polish homeland was on, across these water-meadows of the north, radio messages following them in clear one day and code the next, an early and shapeless situation, dithering between executioner's silence and the Big Time.

Russian transmissions come crackling out of ship's radio, and the static blows like sheets of rain.


The idea was always to carry along a fixed quantity, A. Sometimes you'd use a Wìen bridge, tuned to a certain frequency A{, whistling, heavy with omen, inside the electric corridors while outside, according to the tradition in these matters, somewhere a quantity B would be gathering, building, as the Rocket gathered speed. So, up till assigned Brennschluss velocity, "v ," electric shocked as any rat into following this very narrow mazeway of clear space—yes, radio signals from the ground would enter the Rocket body, and by reflex—literally by electric signal traveling a reflex arc—the control surfaces twitch, to steer you back on course the instant you'd begin to wander off.


But the blacks don't know what else Närrisch knew:
(a) there was a radio link from the ground to the S-Gerät but not the other way round,
(b) there was an interference problem between a servo-actuator and a special oxygen line running aft to the device from the main tank,
(c) Weissmann not only coordinated the S-Gerät project at Nordhausen, but also commanded the battery that fired Rocket 00000.
Total espionage. Bit by bit this mosaic is growing. Tchitcherine, bureauless, carries it around in his brain. Every chip and scrap belongs. More precious than Ravenna, something goes erecting against this starch-colored sky. . . .
Radio link + oxygen = afterburner of some kind.


The tail-section group has been on the radio all morning, trying to get a position fix, if the skies will only clear. So the assembly of the 00001 is occurring also in a geographical way.

[Gravity's Rainbow, Thomas Pynchon]


Werner had been only fourteen years old then, but he was now eighteen, he worked at the Air Ministry, he hated the Nazis even more, and he had a powerful radio transmitter and a code book. He was resourceful and courageous, taking dreadful risks and gathering priceless information. And Volodya was his contact.


On his desk was a decrypt from the radio section, the German words pencilled letter by letter under the code groups. The message was from Werner.


Anticipating the outbreak of war, Volodya had long ago equipped his Berlin spies with clandestine radios and code books. Now it was more vital than ever that the handful of brave anti-Nazis should continue to pass information to the Soviets. Before leaving he had destroyed all records of their names and addresses, which now existed only in his head.


At home, Chuck had not said much about the navy, no doubt because their parents were still angry with him for not going to Harvard. But alone with Woody he opened up a bit. ‘Hawaii is great, but I’m really disappointed to have a shore job,’ he said. ‘I joined the navy to go to sea.’
‘What are you doing, exactly?’
‘I’m part of the Signal Intelligence Unit. We listen to radio messages, mainly from the Imperial Japanese Navy.’
‘Aren’t they in code?’
‘Yes, but you can learn a lot even without breaking the codes. It’s called traffic analysis. A sudden increase in the number of messages indicates that some action is imminent. And you learn to recognize patterns in the traffic. An amphibious landing has a distinctive configuration of signals, for example.’


We can also figure out where the signal originated, by triangulation. Given locations and the call signs, we can build up a pretty good picture of where most of the ships of the Japanese navy are, even if we can’t read the messages.’
‘So we know where they are, and what direction they’re taking, but not what their orders are,’ said Gus.
‘Frequently, yes.’
‘But if they wanted to hide from us, all they would have to do is impose radio silence.’
‘True,’ said Vandermeier. ‘If they go quiet, this whole operation becomes useless, and we are well and truly fucked up the ass.’
[...]
Gus frowned. ‘Radio silence. Has that ever happened before?’
‘Yes. Aircraft carriers go quiet when they return to home waters. So we assume that’s the explanation this time.’


Chuck was assigned to the radio room, a sensible posting that made use of his experience in
handling signals.

[Winter of the World, Ken Follet]

As it appears from the quotes extracted from the books radio had a great importance during World War II under multiple aspects, like checking enemies position (triangulation and radar) and actions (traffic analysis and signal configurations), controling the coasts, comunicating with other meber of the army or with a Soviet spy in Berlin and to control a missile and keep it on the route. There where though few problems about interferences and the fact that it can be easily tracked down.

If you wanna know more about history and functioning of Marconi's creature  check the links below:
http://s194214.blogspot.it/2013/05/la-radio.html (italian version by Alessia Rosace, 'Tecnologia e Comunicazione' blog)
http://it.wikipedia.org/wiki/Radio (english version - Wikipedia page on the radio as a technology feature)



About triangulation...in the link below you can find a video about triangulation method and its aplications in time:
http://www.youtube.com/watch?v=GYBbVNpMlUU


The image presents the general idea if this tracking technique










In the links below you can find more info regarding the Traffic Analysis:
http://www.nsa.gov/public_info/_files/tech_journals/intro_traffic_analysis.pdf (NSA introduction document)
http://en.wikipedia.org/wiki/Traffic_analysis (Wikipedia presentation of its applications in the military field during WWI and WWII)


Woman radio Operator during war times



May 17, 2013

Maps & Secret Services

Our professor Vittorio Marchis  suggested to find a carthography which was coherent with our blog theme and so I've founded not one but three maps, two of which are complementary, that in my opinion are a resumè of what my blog represents:

The first map describe the Organization of the buildings in Bletchley Park in different operating areas, meanwhile the second one depict the pattern followed by not yet analyzed messages




In the link below you can find a google map which illustrates the different positions assumed, in the course of time, by the SIS' Headquartes, the neuralgic centre of all inteligence operations. Londonhttps://maps.google.it/maps/ms?msid=210910011879806218578.0004dc6e3a581c0ae61ba&msa=0




64 Victoria Street - 1909


Ashley Mansions - 1909 'till 1911


Whitehall Court - 1911 'tll 1919


Melbury Road - 1919 'till 1926


Broadway Building - 1926 'till 1964


Century House - 1964 'till 1994




Vauxhall Cross (HQ) - 1994 'till present day

Curiosity: SIS HQ features in several Bond films, like GoldenEyeThe World is Not EnoughDie Another Day and Skyfall.  The production company, Eon Productions, filmed several sequences outside Vauxhall Cross in cooperation with SIS.  The most impressive involved an explosion which causes a large hole in the side of the building and a speed boat launching into the Thames, this was actually filmed using a 50 foot high model of Vauxhall Cross constructed at Pinewood Studios.

The argument of this post is related to the ones contained in The Art in the Agency and in SIS, aka MI6...A little bit of History.


Source:
https://www.sis.gov.uk/our-history/buildings.html