Continuity of government (COG) is the principle of establishing defined procedures that allow a government to continue its essential operations in case of nuclear war or other catastrophic event. COG was developed by the British government before and during World War II to counter the threat of Luftwaffe bombing during the Battle of Britain. The need for continuity-of-government plans gained new urgency with nuclear proliferation. Countries during the Cold War and afterwards developed such plans to avoid (or minimize) confusion and disorder in a power vacuum in the aftermath of a nuclear attack. In the US at least, COG is…
Author: John Greenewald
National Intelligence Estimates (NIEs) are United States federal government documents that are the authoritative assessment of the Director of National Intelligence (DNI) on intelligence related to a particular national security issue. NIEs are produced by the National Intelligence Council and express the coordinated judgments of the United States Intelligence Community, the group of 16 U.S. intelligence agencies. NIEs are classified documents prepared for policymakers. The following pages have been released, when asking for all NIE’s during a certain year. They are highly classified and are very hard to get. Declassified Documents National Intelligence Estimates (NIEs) for Calendar Year 2012, Office…
The goal of cryptanalysis is to find some weakness or insecurity in a cryptographic scheme, thus permitting its subversion or evasion. Military Cryptanalysis Part I Military Cryptanalysis Part II Military Cryptanalysis Part III Military Cryptanalysis Part IV
The following are documents from the Cryptologic Quarterly, declassified by the NSA. Disclaimer John H. Tiltman: A Reminiscence – Summer/Fall 1982-Vol. 1, Nos. 2-3 Computer Virus Infections: Is NSA Vulnerable? – Fall 1985-Vol. 4, No. 3 The Origination and Evolution of Radio Traffic Analysis: The World War I Era – Spring 1987-Vol. 6, No. 1 What Every Cryptologist Should Know About Pearl Harbor – Summer 1987 – Vol. 6, No. 2 Influence of US Cryptologic Organizations on the Digital Computer Industry – Fall/Winter 1987-1988 Vol. 8, Nos. 3-4 Third Party Nations: Partners and Targets – Winter 1989 – Vol. 7,…
The Venona project was a long-running and highly secret collaboration between intelligence agencies of the United States and United Kingdom that involved the cryptanalysis of messages sent by several intelligence agencies of the Soviet Union, mostly during World War II. There were known to be at least 13 code words for this effort used by the U.S. and UK. “Venona” was the last one used. It has no known meaning. (In the decrypted documents issued from the National Security Agency, ‘VENONA’ is written in full capitals; authors writing on the subject generally capitalize only the first letter.) Entire collection of…