Pub Date : 2023-12-20DOI: 10.1080/16161262.2023.2295655
John Gilmour
{"title":"Intelligence liaison in practice; service attachés in the Swedish Legation in London 1939-45","authors":"John Gilmour","doi":"10.1080/16161262.2023.2295655","DOIUrl":"https://doi.org/10.1080/16161262.2023.2295655","url":null,"abstract":"","PeriodicalId":37890,"journal":{"name":"Journal of Intelligence History","volume":"126 21","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138953667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-15DOI: 10.1080/16161262.2023.2279408
Christopher R. Moran, Kate Vigurs, Richard J. Aldrich, Andrew Hammond, James Lockhart, Ronan P. Mainprize
{"title":"CIA at 75: roundtable on the past, present and future of the Central Intelligence Agency","authors":"Christopher R. Moran, Kate Vigurs, Richard J. Aldrich, Andrew Hammond, James Lockhart, Ronan P. Mainprize","doi":"10.1080/16161262.2023.2279408","DOIUrl":"https://doi.org/10.1080/16161262.2023.2279408","url":null,"abstract":"","PeriodicalId":37890,"journal":{"name":"Journal of Intelligence History","volume":"BME-27 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139275847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-05DOI: 10.1080/16161262.2023.2237793
Gregory J. Nedved
ABSTRACTA Japanese cryptologist claimed that he attended a meeting between Japanese diplomats and controversial US cryptologist Herbert O. Yardley in 1929 at the Japanese Embassy. Since this eyewitness account has not been previously known to Yardley researchers, it deserves to be reviewed objectively to see if it contributes anything of substance to the further shaping of the Yardley legacy. This article scrutinizes the written evidence as provided in two accounts of the meeting, one of which is recorded in the memoirs of senior Japanese diplomat Kase Toshikazu. The author of this article, who had been skeptical of a Yardley-Japan meeting, now believes that it most likely did occur.KEYWORDS: David KahnHerbert O. yardleythe American black chamberthe broken sealKase Toshikazu Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1 Ladislas Farago, The Broken Seal: The Story of “Operation Magic”and the Pearl Harbor Disaster, New York: Random House (1967), 56–60; J. F. Dooley, “Was Herbert O. Yardley a Traitor?” Cryptologia 35, no. 1 (2010): 1–3.2 Dooley, 4–5; National Security Agency, Herbert O. Yardley Document Collection, Memo to D33 from J.R. Chiles, S1, “State Department Messages. 3 January 1968,” Publication Number 6,650,860, https://www.nsa.gov/Helpful-Links/NSA-FOIA/Declassification-Transparency-Initiatives/Historical-Releases/Yardley-Collection/, accessed February 22, 2023; Theodore M. Hannah, “The Many Lives of Herbert O. Yardley,” Spectrum [of the National Security Agency] (fall 1981): 26, https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/cryptologic-spectrum/many_lives.pdf, accessed February 22, 2023.3 Gregory J. Nedved, “The Impact of Herbert O. Yardley: A Glass Half Full,” The Intelligencer: Journal of U.S. Intelligence Studies 28, no. 1 (Winter-Spring 2023), 55.4 Kase Toshikazu, Kase Toshikazu Kaisōroku, Tōkyō: Yamate Shobō, Shōwa 61 (1986), https://lccn.loc.gov/86209603, author’s translated copy; S. Tomokiyo, “Japanese Reaction to Yardley’s The American Black Chamber,” http://cryptiana.web.fc2.com/code/yardley_jp.htm, accessed February 22, 2023.5 Tomokiyo.6 Kase.7 Farago, 56–60; Tomokiyo, Kase.8 Kase.9 Tomokiyo; Kase.10 Tomokiyo; Kase.11 Dooley, 3–4; Herbert O. Yardley Material, Doc. #207, Herbert O. Yardley Collection, Record Group (RG) 457, Box 100, Accession Number 47,079, National Archives, College Park, MD.12 Dooley, 12–13.13 Dooley, 4; Hannah, 26; Memo to D33 from J.R. Chiles.14 Kase, Farago, 56.15 Dooley, 12–13.16 Dooley, 12; Kahn, 95; Author correspondence with J.F. Dooley, April 14, 2023.17 Kase, Tomokiyo.18 Farago, 56.19 L. Kruh, letter, Cryptologia 19, no. 4 (1995): 378.20 “Gregory J. Nedved, “Herbert O. Yardley Revisited: What Does the New Evidence Say?,” Cryptologia 45, no. 2 (2021): 113.21 Author correspondence with J.F. Dooley, April 14, 2023; Nedved, “Herbert O. Yardley Revisited,” 110.Additional informationNotes on contributorsGregory J. NedvedGregory J.
{"title":"Herbert O. Yardley: eyewitnessing a legacy","authors":"Gregory J. Nedved","doi":"10.1080/16161262.2023.2237793","DOIUrl":"https://doi.org/10.1080/16161262.2023.2237793","url":null,"abstract":"ABSTRACTA Japanese cryptologist claimed that he attended a meeting between Japanese diplomats and controversial US cryptologist Herbert O. Yardley in 1929 at the Japanese Embassy. Since this eyewitness account has not been previously known to Yardley researchers, it deserves to be reviewed objectively to see if it contributes anything of substance to the further shaping of the Yardley legacy. This article scrutinizes the written evidence as provided in two accounts of the meeting, one of which is recorded in the memoirs of senior Japanese diplomat Kase Toshikazu. The author of this article, who had been skeptical of a Yardley-Japan meeting, now believes that it most likely did occur.KEYWORDS: David KahnHerbert O. yardleythe American black chamberthe broken sealKase Toshikazu Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1 Ladislas Farago, The Broken Seal: The Story of “Operation Magic”and the Pearl Harbor Disaster, New York: Random House (1967), 56–60; J. F. Dooley, “Was Herbert O. Yardley a Traitor?” Cryptologia 35, no. 1 (2010): 1–3.2 Dooley, 4–5; National Security Agency, Herbert O. Yardley Document Collection, Memo to D33 from J.R. Chiles, S1, “State Department Messages. 3 January 1968,” Publication Number 6,650,860, https://www.nsa.gov/Helpful-Links/NSA-FOIA/Declassification-Transparency-Initiatives/Historical-Releases/Yardley-Collection/, accessed February 22, 2023; Theodore M. Hannah, “The Many Lives of Herbert O. Yardley,” Spectrum [of the National Security Agency] (fall 1981): 26, https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/cryptologic-spectrum/many_lives.pdf, accessed February 22, 2023.3 Gregory J. Nedved, “The Impact of Herbert O. Yardley: A Glass Half Full,” The Intelligencer: Journal of U.S. Intelligence Studies 28, no. 1 (Winter-Spring 2023), 55.4 Kase Toshikazu, Kase Toshikazu Kaisōroku, Tōkyō: Yamate Shobō, Shōwa 61 (1986), https://lccn.loc.gov/86209603, author’s translated copy; S. Tomokiyo, “Japanese Reaction to Yardley’s The American Black Chamber,” http://cryptiana.web.fc2.com/code/yardley_jp.htm, accessed February 22, 2023.5 Tomokiyo.6 Kase.7 Farago, 56–60; Tomokiyo, Kase.8 Kase.9 Tomokiyo; Kase.10 Tomokiyo; Kase.11 Dooley, 3–4; Herbert O. Yardley Material, Doc. #207, Herbert O. Yardley Collection, Record Group (RG) 457, Box 100, Accession Number 47,079, National Archives, College Park, MD.12 Dooley, 12–13.13 Dooley, 4; Hannah, 26; Memo to D33 from J.R. Chiles.14 Kase, Farago, 56.15 Dooley, 12–13.16 Dooley, 12; Kahn, 95; Author correspondence with J.F. Dooley, April 14, 2023.17 Kase, Tomokiyo.18 Farago, 56.19 L. Kruh, letter, Cryptologia 19, no. 4 (1995): 378.20 “Gregory J. Nedved, “Herbert O. Yardley Revisited: What Does the New Evidence Say?,” Cryptologia 45, no. 2 (2021): 113.21 Author correspondence with J.F. Dooley, April 14, 2023; Nedved, “Herbert O. Yardley Revisited,” 110.Additional informationNotes on contributorsGregory J. NedvedGregory J. ","PeriodicalId":37890,"journal":{"name":"Journal of Intelligence History","volume":"301 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135480833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-02DOI: 10.1080/16161262.2022.2051920
R. Jeffreys‐jones, R. G. Hughes
ABSTRACT The 9/11 and WMD controversies have encouraged new trends in CIA historiography. The writing of timely leadership memoirs means that in-house viewpoints now tend to precede outside assessment, eliminating one of intelligence historiography’s distinctive quirks. At the same time, former CIA personnel are far more willing to go on the record with journalists and scholars thus ensuring that their version of events reaches the widest possible audience. Finally, an invasion of British scholars into the field comes with the promise of objectivity conferred by distance. It is argued that, because of that distance, there has been a disposition to rely on the kind of source material that lends itself to a cultural approach to CIA history.
ABSTRACT The 9/11 and WMD controversies have encouraged new trends in CIA historiography.及时撰写领导回忆录意味着内部观点现在往往先于外部评估,消除了情报史学的一个独特怪癖。与此同时,前中情局人员也更愿意与记者和学者进行公开交流,从而确保他们对事件的描述能够被最广泛的受众所了解。最后,英国学者进入这一领域带来了距离带来的客观性承诺。有观点认为,由于这种距离,英国学者倾向于依赖那种适合于从文化角度研究中央情报局历史的原始材料。
{"title":"Timely memoirs and the ‘British invasion’: two trends in the historiography of the CIA","authors":"R. Jeffreys‐jones, R. G. Hughes","doi":"10.1080/16161262.2022.2051920","DOIUrl":"https://doi.org/10.1080/16161262.2022.2051920","url":null,"abstract":"ABSTRACT The 9/11 and WMD controversies have encouraged new trends in CIA historiography. The writing of timely leadership memoirs means that in-house viewpoints now tend to precede outside assessment, eliminating one of intelligence historiography’s distinctive quirks. At the same time, former CIA personnel are far more willing to go on the record with journalists and scholars thus ensuring that their version of events reaches the widest possible audience. Finally, an invasion of British scholars into the field comes with the promise of objectivity conferred by distance. It is argued that, because of that distance, there has been a disposition to rely on the kind of source material that lends itself to a cultural approach to CIA history.","PeriodicalId":37890,"journal":{"name":"Journal of Intelligence History","volume":"63 1","pages":"398 - 416"},"PeriodicalIF":0.0,"publicationDate":"2023-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139343333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-02DOI: 10.1080/16161262.2022.2085940
Carleigh A. Cartmell
ABSTRACT Many scholars have pointed to intelligence sharing (also known as intelligence liaison) as one of the most closely guarded secrets within intelligence communities. The Five Eyes intelligence community is one of the biggest and most enduring multi-state intelligence sharing networks in the world. This article compares the European Union and the Five Eyes intelligence communities and identifies potential factors which foster long-standing intelligence relationships. This article argues that the decisions made by the Five Eyes, such as the creation of shared structural complementarities and existing cultural similarities, have created a path dependence between the Five Eyes powers. The same kind of path dependence has not been created when looking at the EU. A common identity has helped forge this path dependence and helped form a strong multi-state, long-term intelligence sharing relationship.
{"title":"Long term intelligence sharing: the Five Eyes and the European Union","authors":"Carleigh A. Cartmell","doi":"10.1080/16161262.2022.2085940","DOIUrl":"https://doi.org/10.1080/16161262.2022.2085940","url":null,"abstract":"ABSTRACT Many scholars have pointed to intelligence sharing (also known as intelligence liaison) as one of the most closely guarded secrets within intelligence communities. The Five Eyes intelligence community is one of the biggest and most enduring multi-state intelligence sharing networks in the world. This article compares the European Union and the Five Eyes intelligence communities and identifies potential factors which foster long-standing intelligence relationships. This article argues that the decisions made by the Five Eyes, such as the creation of shared structural complementarities and existing cultural similarities, have created a path dependence between the Five Eyes powers. The same kind of path dependence has not been created when looking at the EU. A common identity has helped forge this path dependence and helped form a strong multi-state, long-term intelligence sharing relationship.","PeriodicalId":37890,"journal":{"name":"Journal of Intelligence History","volume":"33 1","pages":"417 - 434"},"PeriodicalIF":0.0,"publicationDate":"2023-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139343312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-18DOI: 10.1080/16161262.2023.2237307
D. Chambers
{"title":"Victors’ history: Chinese retrospectives on the Hugh Redmond case","authors":"D. Chambers","doi":"10.1080/16161262.2023.2237307","DOIUrl":"https://doi.org/10.1080/16161262.2023.2237307","url":null,"abstract":"","PeriodicalId":37890,"journal":{"name":"Journal of Intelligence History","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44053618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-13DOI: 10.1080/16161262.2023.2234748
Haiyi Zhang, Qingyi Meng
{"title":"Chile, the CIA and the cold war: a transatlantic perspective","authors":"Haiyi Zhang, Qingyi Meng","doi":"10.1080/16161262.2023.2234748","DOIUrl":"https://doi.org/10.1080/16161262.2023.2234748","url":null,"abstract":"","PeriodicalId":37890,"journal":{"name":"Journal of Intelligence History","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41402963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-11DOI: 10.1080/16161262.2023.2234745
Ka-Hei Abby Ma
{"title":"See It/shoot It: The secret history of the CIA’s Lethal Drone Program","authors":"Ka-Hei Abby Ma","doi":"10.1080/16161262.2023.2234745","DOIUrl":"https://doi.org/10.1080/16161262.2023.2234745","url":null,"abstract":"","PeriodicalId":37890,"journal":{"name":"Journal of Intelligence History","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44595927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-21DOI: 10.1080/16161262.2023.2227025
Ryan Shaffer
{"title":"Crypto Wars: The fight for privacy in the digital age: A political history of digital encryption","authors":"Ryan Shaffer","doi":"10.1080/16161262.2023.2227025","DOIUrl":"https://doi.org/10.1080/16161262.2023.2227025","url":null,"abstract":"","PeriodicalId":37890,"journal":{"name":"Journal of Intelligence History","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45886399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-14DOI: 10.1080/16161262.2023.2224091
Ludo Block
{"title":"The long history of OSINT","authors":"Ludo Block","doi":"10.1080/16161262.2023.2224091","DOIUrl":"https://doi.org/10.1080/16161262.2023.2224091","url":null,"abstract":"","PeriodicalId":37890,"journal":{"name":"Journal of Intelligence History","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49132544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}