Query Result Set
Skip Navigation Links
   ActiveUsers:316Hits:18062183Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
SIGNALS INTELLIGENCE (12) answer(s).
 
SrlItem
1
ID:   137241


Attributing cyber attacks / Rid, Thomas; Buchanan, Ben   Article
Rid, Thomas Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? — This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges.
        Export Export
2
ID:   047625


Decoding history: the battle of the Atlantic and Ultra / Gardner, W J R 1999  Book
Gardner, W J R Book
0 Rating(s) & 0 Review(s)
Publication Houndmills, Macmillan Press Ltd, 1999.
Description xvii, 263p.Hbk
Standard Number 0333693035
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
043539909/GAR 043539MainOn ShelfGeneral 
3
ID:   151105


Gross inefficiency and criminal negligence: the services reconnaissance department in Timor in 1943–45 and the Darwin war crimes trials in 1946 / Morris, Narrelle   Journal Article
Morris, Narrelle Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The post-World War II Australian military war crimes trials of Japanese from 1945–51 have been criticised for using a rule of evidence considerably relaxed from the ordinary requirements of a criminal trial, one that did not require witnesses to give evidence in person. Circumstantial evidence suggests that, in relation to a trial held in Darwin in March 1946 for war crimes committed in Timor, the secretive Special Operations Australia, otherwise known as the Services Reconnaissance Department (SRD), took advantage of the rule. This article argues that the SRD did not allow their members to give evidence in person in an attempt to control and limit the dissemination of information about their operational and security failures in Timor from 1943–45. The SRD operation was adjudged by its own official historian as displaying ‘gross inefficiency and criminal negligence’. While the SRD’s failures were known to select personnel at the time, access restrictions to archival records in the post-war period, including the war crimes trials, meant that the extent of its failures and how it appeared to manage knowledge of them has not been widely known.
        Export Export
4
ID:   073524


In the right place at the right time: US signals intelligence relations with Scandinavia, 1945-1960 / Aid, Matthew M   Journal Article
Aid, Matthew M Journal Article
0 Rating(s) & 0 Review(s)
Publication 2006.
Summary/Abstract This paper demonstrates that US-Scandinavian intelligence relations in general, and Signals Intelligence (Sigint) relations in particular, during the period 1945 through 1960 were more extensive and complicated than had previously been believed. Bilateral US intelligence liaison relations with nominally neutral Sweden were of particular importance in the early years of the Cold War given its geographic location adjacent to the northwestern portion of the USSR. Moreover, the importance of Sigint received from the three principal Scandinavian countries covered by this paper (Norway, Denmark, and Sweden) proved to be quite important to the US intelligence community during the early years of the Cold War, when the US Sigint infrastructure was relatively weak and stretched thin by commitments in Asia and elsewhere. This paper covers the quantity, quality, and types of intelligence information provided to the US by each of the Scandinavian nations, demonstrating that the nature of US intelligence relations with these countries changed substantially as time went by.
        Export Export
5
ID:   111612


Intelligence exchange through interIntel / Wippl, Joseph W   Journal Article
Wippl, Joseph W Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
        Export Export
6
ID:   149192


Jane's C4ISR and mission systems 2016-2017: maritime / Ewing, David; Fuller, Malcolm; Griffith, Hugh; Williamson, John 2016  Book
Williamson, John Book
0 Rating(s) & 0 Review(s)
Publication Surrey, Jane's Information Group, 2016.
Description 920p.hbk
Standard Number 9780710631824
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
058883623.7305/EWI 058883MainOn ShelfGeneral 
7
ID:   164305


Jane's C4ISR and mission systems 2018-2019 / Ebbutt, Giles (et al.) 2019  Book
Ebbutt, Giles (et al.) Book
0 Rating(s) & 0 Review(s)
Publication Surrey, IHS Markit and IHS Global Limited, 2019.
Description 1265p.hbk
Standard Number 9780710632890
        Export Export
Copies: C:1/I:0,R:1,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
059603623.7305/EBB 059603MainOn ShelfReference books 
8
ID:   156599


Japan and Poland in Joint Intelligence against the U.S.S.R. (1919-1945) / Polutov, Andrei   Journal Article
POLUTOV, Andrei Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article is based on documents from Japanese archives and works of Japanese and Polish historians and experts, most of which have been introduced to Russian circulation for the first time. It examines cooperation between Japan and Poland in military intelligence and cryptanalysis aimed against the U.S.S.R. in 1919-1945.
        Export Export
9
ID:   124570


Making of Bletchley Park and signals intelligence 1939–42 / Grey, Christopher   Journal Article
Grey, Christopher Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract The article argues that signals intelligence was an organizational accomplishment in the sense of requiring a) the establishment of an independent organization and b) that this organization combine cryptanalysis with intelligence analysis, traffic analysis and interception. This was not pre-ordained but the outcome of specific conflicts and decisions at Bletchley Park during the first three years of the Second World War which transformed the Government Code and Cypher School from a cryptanalytical bureau to a fully-fledged signals intelligence agency. Detailed archival evidence is presented in support of this claim.
        Export Export
10
ID:   172916


Operation Rubicon: sixty years of German-American success in signals intelligence / Aldrich, Richard J   Journal Article
Aldrich, Richard J Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The story of Operation Rubicon provides a ‘missing link’ in the history signals intelligence. It connects the period of the Second World War, dominated by Bletchley Park and Arlington Hall, with the Snowden era. This special section examines signals intelligence in the latter decades of the twentieth century, arguing that the processes of covert interference that were used help us to understand sources and methods in our present times. It examines new material that has emerged in Europe that expands our comprehension of the intelligence co-operation between the United States, Germany, Switzerland and Sweden, focusing on the control of technology corporations, especially Crypto AG. It argues that, as a result of Operation Rubicon, all states with high-grade computing, even the Soviet Union, were probably secret beneficiaries of this process and derived substantial flow of intelligence as a result, mostly from the global south. However, the task of exploring the material generated by Operation Rubicon has only just begun, since most of the product remains classified.
        Export Export
11
ID:   073652


Signals intelligence and Pearl Harbor: the state of the question / Villa, Brian; Wilford, Timothy   Journal Article
Villa, Brian Journal Article
0 Rating(s) & 0 Review(s)
Publication 2006.
Summary/Abstract In recent times, Pearl Harbor historiography has shifted towards the question of whether or not the Pearl Harbor attack could have been predicted through intercepted signals. The recent prodigious output of books and articles on this subject makes it necessary to reflect upon how the debate has developed. Some traditionalists (who believe that the Pearl Harbor attack surprised US and Allied authorities) continue to criticize revisionists (who believe that intercepted signals may have provided foreknowledge of the attack) using a blend of polemics and ad hominem criticism. That adversarial template began long ago with the first sharp criticisms of the work of revisionist historian Charles Beard. Similar criticisms of revisionists continue to the present day, but such criticisms are unfounded as relevant evidence concerning pre-Pearl Harbor signals intelligence, drawn from both archival and anecdotal sources, suggests that the revisionist thesis merits further scholarly attention.
        Export Export
12
ID:   008600


Signals intelligence(SIGINT) in Pakistan / Ball, Desmond May 1995  Article
Ball, Desmond Article
0 Rating(s) & 0 Review(s)
Publication May 1995.
Description 195-214
        Export Export