13.07.2015 Views

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CPNBKnott, Stephen F. Secret <strong>and</strong> Sanctioned: Covert Operations<strong>and</strong> the American Presidency. New York: OxfordUniversity Press, 1996.Marshall, Jonathan, Peter Dale Scott, <strong>and</strong> Jane Haapiseva-Hunter. The Iran-Contra Connection: Secret Teams <strong>and</strong>Covert Operations in the Reagan Era. Boston: South EndPress, 1987.Prados, John. President’s Secret Wars: CIA <strong>and</strong> PentagonCovert Operations since World War II. New York: WilliamMorrow, 1986.Richelson, Jeffrey T. The U.S. <strong>Intelligence</strong> Community,third edition. Boulder, CO: Westview Press, 1995.SEE ALSOBay of PigsChurch CommitteeCIA (United States Central <strong>Intelligence</strong> Agency)Vietnam WarCPNB (Chemical <strong>and</strong> Biological National<strong>Security</strong> Program).SEE NNSA (United States National Nuclear <strong>Security</strong>Administration).CribA crib is a section of an encoded or enciphered messagethat can easily be rendered into plain text, thus providing atool whereby a skilled cryptanalyst can crack the entirecode or message. A famous example of a “crib” fromoutside the world of espionage is the Rosetta Stone, usedto translate Egyptian hieroglyphics.Essentially a thank-you note from a group of priests toa magnanimous king, the stone was addressed to thesecond-century B.C. ruler Ptolemy V, who, like all thePtolemies, spoke Greek rather than Egyptian. Therefore,the priests sent the note in Greek, as well as in hieroglyphics<strong>and</strong> demotic, a simplified version of hieroglyphicwriting. Thus the French archaeologist Jean-FrançoisChampollion, who studied the Rosetta Stone in the earlynineteenth century, was able to translate the Greek portion,<strong>and</strong> from this crack the code first of demotic, <strong>and</strong> thenof hieroglyphics.Any time a force sends out a message whose contentis predictable to the enemy, this offers an opportunity for aresourceful cryptanalyst to find a crib. Thus, when theGerman high comm<strong>and</strong> in World War II sent greetings toAdolf Hitler every April 20—the Fuhrer’s birthday—it wasfairly easy for Allied cryptanalysts to guess the gist of themessage. This would have been so no matter how carefullyit had been enciphered or encoded, but the Germanssometimes made things even easier by sending the samemessage in plain text.❚ FURTHER READING:BOOKS:Kahn, David. Kahn on Codes: Secrets of the New Cryptology.New York: Macmillan, 1983.Konheim, Alan G. Cryptography: A Primer. New York:Wiley, 1981.Lubbe, J. C. A. van der. Basic Methods of Cryptography.New York: Cambridge University Press, 1998.Newton, David E. Encyclopedia of Cryptology. Santa Barbara,CA: ABC-CLIO, 1997.SEE ALSOADFGX CipherCryptology, HistoryCrime Prevention,<strong>Intelligence</strong> AgenciesThe relationship between law enforcement agencies suchas the Federal Bureau of Investigation (FBI) <strong>and</strong> intelligenceis straightforwardly recognized, as exemplified bythe fact that the FBI is regularly involved in intelligence<strong>and</strong> counterintelligence activities. Less obvious, however,is the interaction between operations such as the Central<strong>Intelligence</strong> Agency (CIA) <strong>and</strong> crime prevention or lawenforcement. Although most activities of intelligence organizationsare by definition secret, it is at least possible todiscern the outlines of a positive correlation betweenintelligence <strong>and</strong> crime prevention activities. In the case ofpolice states <strong>and</strong> terrorist organizations, the relationshipbetween intelligence <strong>and</strong> crime prevention—or, for covertoperations in enemy countries, intelligence <strong>and</strong> the promotionof crime—is even easier to demonstrate.Totalitarian societies <strong>and</strong> radical movements. One of themeans to appreciate the interaction between intelligence<strong>and</strong>/or covert operations on the one h<strong>and</strong>, <strong>and</strong> crimeprevention on the other, is to observe the example oftotalitarian nations <strong>and</strong> the radical movements associatedwith them. In nations such as those of the Soviet blocbefore the end of the Cold War, the presence of an intelligence-gatheringentity such as the KGB was so pervasivethat it had the side effect of virtually minimizing ordinarycrime. While in the last two decades of the Soviet era, the280 Encyclopedia of <strong>Espionage</strong>, <strong>Intelligence</strong>, <strong>and</strong> <strong>Security</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!