HOME
*



picture info

US Signals Intelligence In The Cold War
After the end of World War II, all the Western allies began a rapid drawdown of military forces, including those of signals intelligence. At the time, the US still had a COMINT organization split between the Army and Navy. A 1946 plan listed Russia, China, and a edactedcountry as high-priority targets. Each service ran independent agreements with foreign counterparts, some of which, especially the British, had already formed a central communications intelligence organization (e.g., the Government Code and Cypher School at Bletchley Park, now the Government Communications Headquarters). Lack of centralization bothered these allies. The vital British-US cooperation was, at this point, one of the strongest incentives to the US Army and Navy to form a centralized organization. US movement to centralization in SIGINT The military services formed a "Joint Operating Plan" to cover 1946-1949, but this had its disadvantages. The situation became a good deal more complex with the passage o ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Signals Intelligence
Signals intelligence (SIGINT) is intelligence-gathering by interception of '' signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly used in communication (electronic intelligence—abbreviated to ELINT). Signals intelligence is a subset of intelligence collection management. As classified and sensitive information is usually encrypted, signals intelligence in turn involves the use of cryptanalysis to decipher the messages. Traffic analysis—the study of who is signaling whom and in what quantity—is also used to integrate information again. History Origins Electronic interceptions appeared as early as 1900, during the Boer War of 1899–1902. The British Royal Navy had installed wireless sets produced by Marconi on board their ships in the late 1890s, and the British Army used some limited wireless signalling. The Boers captured some wireless sets and used them to make vital tran ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Electro-optical MASINT
Electro-optical MASINT is a subdiscipline of Measurement and Signature Intelligence, (MASINT) and refers to intelligence gathering activities which bring together disparate elements that do not fit within the definitions of Signals Intelligence (SIGINT), Imagery Intelligence (IMINT), or Human Intelligence (HUMINT). Electro-optical MASINT and IMINT have some similarities, but is distinct from it. IMINT's primary goal to create a picture, composed of visual elements understandable to a trained user. Electro-optical MASINT helps validate that picture, so that, for example, the analyst can tell if an area of green is vegetation or camouflage paint. Electro-optical MASINT also generates information on phenomena that emit, absorb, or reflect electromagnetic energy in the infrared, visible light, or ultraviolet spectra, phenomena where a "picture" is less important than the amount or type of energy reported. For example, a class of satellites, originally intended to give early warning of ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Ryan Firebee
The Ryan Firebee is a series of target drones developed by the Ryan Aeronautical Company beginning in 1951. It was one of the first jet-propelled drones, and remains one of the most widely used target drones ever built. Development Ryan Firebee I Q-2/KDA-1 Firebee The Firebee I was the result of a 1948 U.S. Air Force request and contract to Ryan for a jet-powered gunnery target. The first flight of the XQ-2 Firebee prototype took place in early 1951. The drone featured swept flight surfaces and a circular nose inlet. The initial models had distinctive "arrowhead" shaped endplates on the tailplane. The Firebee could be air-launched from a specially modified launch aircraft ( Douglas A-26 Invader was first to be used for this), or ground-launched with a single RATO booster. Following successful evaluation the target was ordered into production for the USAF as the Q-2A, powered by a Continental J69-T-19B turbojet engine with of thrust. The Air Force then obtained small numb ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Ryan Aeronautical
The Ryan Aeronautical Company was founded by T. Claude Ryan in San Diego, California, in 1934. It became part of Teledyne in 1969, and of Northrop Grumman when the latter company purchased Ryan in 1999. Ryan built several historically and technically significant aircraft, including four innovative V/STOL designs, but its most successful production aircraft was the Ryan Firebee line of unmanned drones used as target drones and unmanned air vehicles. Early history In 1922, T.C. Ryan founded a flying service in San Diego that would lead to several aviation ventures bearing the Ryan name, including Ryan Airline Company founded in 1925. T.C. Ryan, whose previous companies were best known for building Charles Lindbergh's transatlantic '' Spirit of St. Louis'', actually had no part in building the famous aircraft. Ryan had been owner or partner in several previous companies, one of which also bore the name Ryan Aeronautical. The '' Spirit of St. Louis'' was not built by the fina ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Operation Aphrodite
Aphrodite and Anvil were the World War II code names of United States Army Air Forces and United States Navy operations to use Boeing B-17 Flying Fortress and Consolidated PB4Y bombers as precision-guided munitions against bunkers and other hardened/reinforced enemy facilities, such as "Crossbow" operations against German long range missiles. The missions were not generally successful, and the intended targets in Europe were either overrun by the ground advance of Allied troops or disabled by conventional attacks by aircraft. Proposal The plan called for B-17E/Fs that had been taken out of operational service (various nicknames existed such as "robot", "baby", "drone" or "weary Willy") to be loaded to capacity with explosives, and flown by radio control into bomb-resistant fortifications such as German U-boat pens and V-weapon sites. By late 1943, General Henry H. Arnold had directed Brigadier General Grandison Gardner's electronic engineers at Eglin Field, Florida, to out ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Project MINARET
Project MINARET was a domestic espionage project operated by the National Security Agency (NSA), which, after intercepting electronic communications that contained the names of predesignated US citizens, passed them to other government law enforcement and intelligence organizations. Intercepted messages were disseminated to the FBI, CIA, Secret Service, Bureau of Narcotics and Dangerous Drugs (BNDD), and the Department of Defense. The project was a sister project to Project SHAMROCK. History Starting in 1962, the NSA had a "watch list" of Americans travelling to Cuba, expanded to include narcotic traffickers. Then, from 1967 onwards, President Lyndon B. Johnson included the names of activists in the anti-war movement. President Richard Nixon further expanded the list to include civil rights leaders, journalists and two senators. The NSA included David Kahn. The names were on "watch lists" of American citizens, generated by Executive Branch law enforcement and intelligence agen ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Project SHAMROCK
Project SHAMROCK was the sister project to Project MINARET, an espionage exercise started in August 1945. Project MINARET involved the accumulation of all telegraphic data that entered or exited the United States. The Armed Forces Security Agency (AFSA) and its successor, the National Security Agency (NSA), were given direct access to daily microfilm copies of all incoming, outgoing, and transiting telegrams via the Western Union and its associates RCA and ITT. NSA did the operational interception, and, if there was information that would be of interest to other intelligence agencies, the material was passed to them. Intercepted messages were disseminated to the FBI, CIA, Secret Service, Bureau of Narcotics and Dangerous Drugs (BNDD), and the Department of Defense. No court authorized the operation and there were no warrants. According to Stephen Budiansky, the precursor to the project occurred in 1940: "In January 1940 the Army's adjutant general sent a letter to the president ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


National Intelligence Estimate
National Intelligence Estimates (NIEs) are United States federal government documents that are the authoritative assessment of the Director of National Intelligence (DNI) on intelligence related to a particular national security issue. NIEs are produced by the National Intelligence Council and express the coordinated judgments of the United States Intelligence Community, the group of 18 U.S. intelligence agencies. NIEs are classified documents prepared for policymakers. General overview NIEs are considered to be "estimative" products, in that they present what intelligence analysts estimate may be the course of future events. Coordination of NIEs involves not only trying to resolve any inter-agency differences, but also assigning confidence levels to the key judgments and rigorously evaluating the sourcing for them. Each NIE is reviewed and approved for dissemination by the National Intelligence Board (NIB), which comprises the DNI and other senior leaders within the Intelli ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Joint Chiefs Of Staff
The Joint Chiefs of Staff (JCS) is the body of the most senior uniformed leaders within the United States Department of Defense, that advises the president of the United States, the secretary of defense, the Homeland Security Council and the National Security Council on military matters. The composition of the Joint Chiefs of Staff is defined by statute and consists of a chairman (CJCS), a vice chairman (VJCS), the service chiefs of the Army, Marine Corps, Navy, Air Force, Space Force, and the chief of the National Guard Bureau. Each of the individual service chiefs, outside their JCS obligations, work directly under the secretaries of their respective military departments, e.g. the secretary of the Army, the secretary of the Navy, and the secretary of the Air Force. Following the Goldwater–Nichols Act in 1986, the Joint Chiefs of Staff do not have operational command authority, either individually or collectively, as the chain of command goes from the president t ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

French Indochina
French Indochina (previously spelled as French Indo-China),; vi, Đông Dương thuộc Pháp, , lit. 'East Ocean under French Control; km, ឥណ្ឌូចិនបារាំង, ; th, อินโดจีนฝรั่งเศส, officially known as the Indochinese Union; vi, Liên bang Đông Dương, , lit. 'East Ocean Federation'; km, សហភាពឥណ្ឌូចិន; lo, ສະຫະພາບອິນໂດຈີນ and after 1947 as the Indochinese Federation,; vi, Liên đoàn Đông Dương; km, សហព័ន្ធឥណ្ឌូចិន; lo, ສະຫະພັນອິນດູຈີນ was a grouping of French colonial empire, French colonial territories in Southeast Asia until its demise in 1954. It comprised French Protectorate of Cambodia, Cambodia, French Protectorate of Laos, Laos (from 1899), the Chinese territory of Guangzhouwan (from 1898 until 1945), and the Vietnamese regions of Tonkin (French protectorate), Tonkin in the north, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Traffic Analysis
Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication, it can be performed even when the messages are encrypted. In general, the greater the number of messages observed, the greater information be inferred. Traffic analysis can be performed in the context of military intelligence, counter-intelligence, or pattern-of-life analysis, and is also a concern in computer security. Traffic analysis tasks may be supported by dedicated computer software programs. Advanced traffic analysis techniques which may include various forms of social network analysis. Traffic analysis has historically been a vital technique in cryptanalysis, especially when the attempted crack depends on successfully seeding a known-plaintext attack, which often requires an inspired guess based on how specific the operational context might likely influence what an adversary communicates, which may be sufficient to establish a short cr ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Joseph Stalin
Joseph Vissarionovich Stalin (born Ioseb Besarionis dze Jughashvili; – 5 March 1953) was a Georgian revolutionary and Soviet Union, Soviet political leader who led the Soviet Union from 1924 until his death in 1953. He held power as General Secretary of the Communist Party of the Soviet Union (1922–1952) and Premier of the Soviet Union, Chairman of the Council of Ministers of the Soviet Union (1941–1953). Initially governing the country as part of a Collective leadership in the Soviet Union, collective leadership, he consolidated power to become a dictator by the 1930s. Ideologically adhering to the Leninism, Leninist interpretation of Marxism, he formalised these ideas as Marxism–Leninism, while his own policies are called Stalinism. Born to a poor family in Gori, Georgia, Gori in the Russian Empire (now Georgia (country), Georgia), Stalin attended the Tbilisi Spiritual Seminary before joining the Marxist Russian Social Democratic Labour Party. He edited the par ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]