1 / 16

Intelligence Training I

Intelligence Training I. Between World War I and World War II, intelligence training schools were founded in the United States. Signal Intelligence School (1929) Signal Corps School (1933). Intelligence Training II.

omana
Télécharger la présentation

Intelligence Training I

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Intelligence Training I Between World War I and World War II, intelligence training schools were founded in the United States. • Signal Intelligence School (1929) • Signal Corps School (1933)

  2. Intelligence Training II Then, with the outbreak of World War II, there was a corresponding boom in U. S. intelligence training. • Military Intelligence Service Language School (1941) • Military Intelligence Training Center (1942) • Vint Hill Farms School (1942)

  3. Cryptologist: Edward Hebern • U.S. Navy rejected his cipher machine • His machine was then taken and used by the Japanese during WWII In World War II: In World War I: • Developed the Mark II (SIGABA) • Most secure U.S. cipher system during the WWII conflict

  4. Worked for the U.S. Navy Cryptologic Office, 1918 - 1959 • One of three key U.S. cryptanalysts during World War I • 1930, solved Japanese “Grand Maneuvers” system • Later, broke Japanese “Blue Book” • Along with Mrs. Friedman, paved the way for scores of women to join them in the cryptological field during W. War II Cryptologist: Agnes Driscoll

  5. President FDR authorized women to take noncombatant military roles • Thousands of women volunteered • Freed men to fill fighting positions • The women cryptologists: Cryptologists: U.S. Women in WWII • Dorothy Blum • Barbara Clark • Wilma Davis • Juanita Moody • Katharine Swift • Juliana Mickwitz • Velva Klaessy • Marie Meyer • Agnes Meyer Driscoll • Genevieve Grotjan Feinstein • Mary “Polly” Budenbach • Mary Louise Prather

  6. Cryptologists: Polish Cipher Bureau • In late 1932, Rejewski applied group theory to the Enigma machine ciphers; later solved a crucial structure question • In 1939, Bureau leaders revealed their latest achievements to France & England • Provided details “in the nick of time” for the British Ultra operation • Many members died and / or were captured, but none gave up their secrets

  7. Cryptologist: Alan Turing • He was a young British mathematician • He invented the “Turing Bombe” • This machine was used to crack Enigma codes • It also laid the foundation for modern computing • Without it, computers would not have developed until sometime later

  8. Headquarters of the British Military Intelligence Government Code and Cipher School during World War II • Employed 12,000 code breakers & staff • Recruited heavily all college disciplines, especially at Oxford and at Cambridge • Produced impressive results from limited resources • Significantly aided the Allied war effort and saved thousands of lives Cryptologists: Bletchley Park

  9. Enigma (Germany) • Invented by Arthur Scherbius in 1918 • Used for commercial use in banks • German Navy adapted it for military Composed of: • Motors, keyboard, and electrical wires • Cipher was a series of substitutions • Substitutions by electrical connections

  10. Combination of ciphers • ex: Substitution cipher  • Caesar cipher  • Substitution cipher • 26 x 26 = 676 possible alphabets Enigma Complexity • Willi Korn added a reflector 26³=17,576 • A swap of letters of the output in pairs • Then the ciphertext was fed back through the rotors, yet again

  11. Enigma Weaknesses • No letter could be enciphered as itself • ex: A = A • Wiring was seldom changed • Use of predictable introductions • ex: “To General Puttkammer ” • Reflector made Enigma reciprocal • ex: if A = Q, Q=A • Limitation to three rotors

  12. Cracking Enigma • Polish made some advances: 1930s • A British "Y Station" intercepted a repeat transmission that used the same settings!! • Alan Turing built the Turing Bombe • Computer-like machine • Could crack an Enigma code in about 15 hours

  13. Purple Code (Japan) • Similar to the Enigma • Cracked by U. S. before Pearl Harbor • U. S. then built their own machines Two key cryptologists for breaking Purple: • William Friedman • Genevieve Grotjan Feinstein

  14. Navajo Code Talkers • Philip Johnston in 1942 • Idea to use Navajo native Americans for secure communications • In a combat simulation, Navajos could transmit, and decode a three-line English message in 20 s • Machines took 30 minutes • Marine Corps recruits 200 Navajos

  15. Navajo Code Advantages • Little known Medium (Navajo) • Most letters had more than one Navajo word to represent them • 450 military terms had direct word representation • ex: “besh- lo” (iron fish) = “submarine” • Code was never cracked by Japan

  16. Looking Forward • WWII was a turning point in the advancement of cryptology – it was the beginning of the modernization of the field. • The machines made in WWII revolutionize cryptology as well as laid the foundation for the modern computer.

More Related