Behind the enigma: the authorised history of GCHQ, Britain’s secret cyber-intelligence agency

Author(s):  
Christopher Smith
2021 ◽  
Vol 3 (3) ◽  
pp. 132-135
Author(s):  
John Ferris

On November 24th, 2020, Professor John Ferris presented Behind the Enigma: The Authorized History of GCHQ, Britain’s Secret Cyber-Intelligence Agency at the 2020 CASIS West Coast Security Conference.  The presentation was followed by a question and answer period


2018 ◽  
pp. 97-130
Author(s):  
Denzenlkham Ulambayar

Since the 1990s, when previously classified and top secret Russian archival documents on the Korean War became open and accessible, it has become clear for post-communist countries that Kim Il Sung, Stalin and Mao Zedong were the primary organizers of the war. It is now equally certain that tensions arising from Soviet and American struggle generated the origins of the Korean War, namely the Soviet Union’s occupation of the northern half of the Korean peninsula and the United States’ occupation of the southern half to the 38th parallel after 1945 as well as the emerging bipolar world order of international relations and Cold War. Newly available Russian archival documents produced much in the way of new energies and opportunities for international study and research into the Korean War.2 However, within this research few documents connected to Mongolia have so far been found, and little specific research has yet been done regarding why and how Mongolia participated in the Korean War. At the same time, it is becoming today more evident that both Soviet guidance and U.S. information reports (evaluated and unevaluated) regarding Mongolia were far different from the situation and developments of that period. New examples of this tendency are documents declassified in the early 2000s and released publicly from the American Central Intelligence Agency (CIA) in December 2016 which contain inaccurate information. The original, uncorrupted sources about why, how and to what degree the Mongolian People’s Republic (MPR) became a participant in the Korean War are in fact in documents held within the Mongolian Central Archives of Foreign Affairs. These archives contain multiple documents in relation to North Korea. Prior to the 1990s Mongolian scholars Dr. B. Lkhamsuren,3 Dr. B. Ligden,4 Dr. Sh. Sandag,5 junior scholar J. Sukhee,6 and A. A. Osipov7 mention briefly in their writings the history of relations between the MPR and the DPRK during the Korean War. Since the 1990s the Korean War has also briefly been touched upon in the writings of B. Lkhamsuren,8 D. Ulambayar (the author of this paper),9 Ts. Batbayar,10 J. Battur,11 K. Demberel,12 Balảzs Szalontai,13 Sergey Radchenko14 and Li Narangoa.15 There have also been significant collections of documents about the two countries and a collection of memoirs published in 200716 and 2008.17 The author intends within this paper to discuss particularly about why, how and to what degree Mongolia participated in the Korean War, the rumors and realities of the war and its consequences for the MPR’s membership in the United Nations. The MPR was the second socialist country following the Soviet Union (the Union of the Soviet Socialist Republics) to recognize the DPRK (Democratic People’s Republic of Korea) and establish diplomatic ties. That was part of the initial stage of socialist system formation comprising the Soviet Union, nations in Eastern Europe, the MPR, the PRC (People’s Republic of China) and the DPRK. Accordingly between the MPR and the DPRK fraternal friendship and a framework of cooperation based on the principles of proletarian and socialist internationalism had been developed.18 In light of and as part of this framework, The Korean War has left its deep traces in the history of the MPR’s external diplomatic environment and state sovereignty


2017 ◽  
Vol 21 (4) ◽  
pp. 318-342
Author(s):  
Flora Cassen

A bitter conflict between the Spanish and Ottoman empires dominated the second half of the sixteenth century. In this early modern “global” conflict, intelligence played a key role. The Duchy of Milan, home to Simon Sacerdoti (c.1540-1600), a Jew, had fallen to Spain. The fate that usually awaited Jews living on Spanish lands was expulsion—and there were signs to suggest that King Philip ii (1527-1598) might travel down that road. Sacerdoti, the scion of one of Milan’s wealthiest and best-connected Jewish families had access to secret information through various contacts in Italy and North-Africa. Such intelligence was highly valuable to Spanish forces, and Philip ii was personally interested in it. However, this required Sacerdoti to serve an empire—Spain—with a long history of harming the Jews, and to spy on the Ottomans, widely considered as the Jews’ supporters at the time. This article offers a reflection on Simon Sacerdoti’s story. Examining how a Jew became part of the Spanish intelligence agency helps us understand how early modern secret information networks functioned and sheds new light on questions of Jewish identity in a time of uprootedness and competing loyalties.


Author(s):  
Shawn M. Powers ◽  
Michael Jablonski

This chapter examines the emergence of an Information-Industrial Complex in the United States, tracking the rise of Information and Communication Technology (ICT) and the modern knowledge economy. It first outlines the origins and history of Information-Industrial Complex's antecedent, the Military-Industrial Complex, before turning to the beginnings of the Information-Industrial Complex itself. It then considers how the U.S. government has cultivated a close and codependent relationship with companies involved in information production, storage, processing, and distribution, referred to as the “information industries.” It also looks at In-Q-Tel, a corporation that would “ensure that the Central Intelligence Agency (CIA) remains at the cutting edge of information technology advances and capabilities,” along with the rise of information assurance after 9/11. The chapter concludes by highlighting the commodification of digital information in the post-9/11 environment through its securitization.


2020 ◽  
Vol 17 (5) ◽  
pp. 2388-2395
Author(s):  
M. Vivek Anand ◽  
S. Vijayalakshmi

IoT is changing the way for a world, where many of our daily objects will be connected with each other and will interact with their environment in order to collect information and automate certain tasks. IoT requires seamless authentication, data privacy, security, robustness against attacks, easy deployment, and self-maintenance. Protecting data in the internet of things is essential for making the IoT environment secure. In order to secure the data on the internet of things, the blockchain will provide distributed peer to peer networks. Blockchain-based internet of things is making a secure environment in the IoT environment. Data are stored in the form of images in IoT devices that are captured in various locations in the IoT environment for processing. Images are stored as data in the blockchain and it acts as a transaction. This paper expresses the environment of blockchain-based internet of things with image validation. This paper will explain this domain with an example of a criminal’s image identification with image processing techniques to provide better service to the cyber intelligence agency to find criminals easily. The identification of criminals is done by comparing the images of the criminals’ identification.


Sign in / Sign up

Export Citation Format

Share Document