Topic: Military history/Intelligence

You are looking at all articles with the topic "Military history/Intelligence". We found 22 matches.

Hint: To view all topics, click here. Too see the most popular topics, click here instead.

πŸ”— The Thing

πŸ”— Espionage πŸ”— Military history πŸ”— Military history/Military science, technology, and theory πŸ”— Military history/Intelligence

The Thing, also known as the Great Seal bug, was one of the first covert listening devices (or "bugs") to use passive techniques to transmit an audio signal. It was concealed inside a gift given by the Soviet Union to W. Averell Harriman, the United States Ambassador to the Soviet Union, on August 4, 1945. Because it was passive, needing electromagnetic energy from an outside source to become energized and activate, it is considered a predecessor of Radio-Frequency Identification (RFID) technology.

Discussed on

πŸ”— The German tank problem

πŸ”— Mathematics πŸ”— Germany πŸ”— Military history πŸ”— Statistics πŸ”— Military history/Intelligence πŸ”— Military history/World War II πŸ”— Military history/German military history πŸ”— Military history/European military history

In the statistical theory of estimation, the German tank problem consists of estimating the maximum of a discrete uniform distribution from sampling without replacement. In simple terms, suppose we have an unknown number of items which are sequentially numbered from 1 to N. We take a random sample of these items and observe their sequence numbers; the problem is to estimate N from these observed numbers.

The problem can be approached using either frequentist inference or Bayesian inference, leading to different results. Estimating the population maximum based on a single sample yields divergent results, whereas estimation based on multiple samples is a practical estimation question whose answer is simple (especially in the frequentist setting) but not obvious (especially in the Bayesian setting).

The problem is named after its historical application by Allied forces in World War II to the estimation of the monthly rate of German tank production from very few data. This exploited the manufacturing practice of assigning and attaching ascending sequences of serial numbers to tank components (chassis, gearbox, engine, wheels), with some of the tanks eventually being captured in battle by Allied forces.

Discussed on

πŸ”— The Buzzer

πŸ”— Russia πŸ”— Russia/technology and engineering in Russia πŸ”— Russia/mass media in Russia πŸ”— Military history πŸ”— Military history/Military science, technology, and theory πŸ”— Military history/Intelligence πŸ”— Military history/Russian, Soviet and CIS military history πŸ”— Radio Stations

UVB-76, also known as "The Buzzer", is a nickname given by radio listeners to a shortwave radio station that broadcasts on the frequencies 4625 and 4810 kHz. It broadcasts a short, monotonous buzz toneΒ , repeating at a rate of approximately 25 tones per minute, 24 hours per day. Sometimes, the buzzer signal is interrupted and a voice transmission in Russian takes place. The first reports were made of a station on this frequency in 1973.

Discussed on

πŸ”— Project MKUltra

πŸ”— United States/U.S. Government πŸ”— United States πŸ”— Human rights πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Medicine πŸ”— Skepticism πŸ”— Psychology πŸ”— Military history/Intelligence πŸ”— Alternative Views πŸ”— Psychoactive and Recreational Drugs πŸ”— Drug Policy πŸ”— Science Policy

Project MKUltra (or MK-Ultra), also called the CIA mind control program, is the code name given to a program of experiments on human subjects that were designed and undertaken by the U.S. Central Intelligence Agency, some of which were illegal. Experiments on humans were intended to identify and develop drugs and procedures to be used in interrogations in order to weaken the individual and force confessions through mind control. The project was organized through the Office of Scientific Intelligence of the CIA and coordinated with the United States Army Biological Warfare Laboratories. Code names for drug-related experiments were Project Bluebird and Project Artichoke.

The operation was officially sanctioned in 1953, reduced in scope in 1964 and further curtailed in 1967. It was officially halted in 1973. The program engaged in many illegal activities, including the use of U.S. and Canadian citizens as its unwitting test subjects, which led to controversy regarding its legitimacy. MKUltra used numerous methods to manipulate its subjects' mental states and brain functions. Techniques included the covert administration of high doses of psychoactive drugs (especially LSD) and other chemicals, electroshocks, hypnosis, sensory deprivation, isolation, verbal and sexual abuse, as well as other forms of torture.

The scope of Project MKUltra was broad, with research undertaken at more than 80 institutions, including colleges and universities, hospitals, prisons, and pharmaceutical companies. The CIA operated using front organizations, although sometimes top officials at these institutions were aware of the CIA's involvement.

Project MKUltra was first brought to public attention in 1975 by the Church Committee of the United States Congress and Gerald Ford's United States President's Commission on CIA activities within the United States (also known as the Rockefeller Commission).

Investigative efforts were hampered by CIA Director Richard Helms' order that all MKUltra files be destroyed in 1973; the Church Committee and Rockefeller Commission investigations relied on the sworn testimony of direct participants and on the relatively small number of documents that survived Helms's destruction order. In 1977, a Freedom of Information Act request uncovered a cache of 20,000 documents relating to project MKUltra which led to Senate hearings later that year. Some surviving information regarding MKUltra was declassified in July 2001. In December 2018, declassified documents included a letter to an unidentified doctor discussing work on six dogs made to run, turn and stop via remote control and brain implants.

Discussed on

πŸ”— Sweden warrantlessly wiretaps all Internet traffic crossing its borders

πŸ”— Espionage πŸ”— Military history πŸ”— Military history/Intelligence πŸ”— Sweden πŸ”— Military history/Nordic military history πŸ”— Military history/National militaries πŸ”— Military history/European military history

The National Defence Radio Establishment (Swedish: FΓΆrsvarets radioanstalt, FRA) is a Swedish government agency organised under the Ministry of Defence. The two main tasks of FRA are signals intelligence (SIGINT), and support to government authorities and state-owned companies regarding computer security.

The FRA is not allowed to initialize any surveillance on their own, and operates purely on assignment from the Government, the Government Offices, the Armed Forces, the Swedish National Police Board and Swedish Security Service (SΓ„PO). Decisions and oversight regarding information interception is provided by the Defence Intelligence Court and the Defence Intelligence Commission; additional oversight regarding protection of privacy is provided by the Swedish Data Protection Authority.

Discussed on

πŸ”— NOBUS (Nobody but Us)

πŸ”— Computing πŸ”— Computing/Computer hardware πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Military history/Military science, technology, and theory πŸ”— Computer Security πŸ”— Computer Security/Computing πŸ”— Computing/Software πŸ”— Military history/Intelligence πŸ”— Computing/Computer Security πŸ”— Computing/Networking

NOBUS ("nobody but us") are security vulnerabilities which the United States National Security Agency (NSA) believes that only it can exploit. As such, NSA sometimes chooses to leave such vulnerabilities open if NSA finds them, in order to exploit them against NSA's targets. More broadly, it refers to the notion that some signals intelligence capabilities are so powerful or otherwise inaccessible that only the NSA will be able to deploy them, though recent analyses suggest that this advantage may be under stress.

Discussed on

πŸ”— List of military tactics

πŸ”— Military history πŸ”— Military history/Military science, technology, and theory πŸ”— Military history/Weaponry πŸ”— Lists πŸ”— Military history/Intelligence πŸ”— Military history/Military land vehicles

This page contains a list of military tactics.

The meaning of the phrase is context sensitive, and has varied over time, like the difference between "strategy" and "tactics".

Discussed on

πŸ”— Crypto AG

πŸ”— United States πŸ”— Mass surveillance πŸ”— Espionage πŸ”— Companies πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Military history/Military science, technology, and theory πŸ”— Military history/Intelligence πŸ”— Cryptography πŸ”— Cryptography/Computer science πŸ”— Switzerland πŸ”— Military history/Cold War πŸ”— Sweden

Crypto AG was a Swiss company specialising in communications and information security. It was secretly jointly owned by the American Central Intelligence Agency (CIA) and West German Federal Intelligence Service (BND) from 1970 until about 1993, with the CIA continuing as sole owner until about 2018. With headquarters in Steinhausen, the company was a long-established manufacturer of encryption machines and a wide variety of cipher devices.

The company had about 230 employees, had offices in Abidjan, Abu Dhabi, Buenos Aires, Kuala Lumpur, Muscat, Selsdon and Steinhausen, and did business throughout the world. The owners of Crypto AG were unknown, supposedly even to the managers of the firm, and they held their ownership through bearer shares.

The company has been criticised for selling backdoored products to benefit the American, British and German national signals intelligence agencies, the National Security Agency (NSA), the Government Communications Headquarters (GCHQ), and the BND, respectively. On 11 February 2020, The Washington Post, ZDF and SRF revealed that Crypto AG was secretly owned by the CIA in a highly classified partnership with West German intelligence, and the spy agencies could easily break the codes used to send encrypted messages. The operation was known first by the code name "Thesaurus" and later "Rubicon".

Discussed on

πŸ”— Mass Surveillance in the United States

πŸ”— United States/U.S. Government πŸ”— United States πŸ”— Human rights πŸ”— Mass surveillance πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Freedom of speech πŸ”— Military history/Intelligence πŸ”— Law Enforcement

The practice of mass surveillance in the United States dates back to World War I wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First World War and the Second World War, the surveillance continued, via programs such as the Black Chamber and Project SHAMROCK. The formation and growth of federal law-enforcement and intelligence agencies such as the FBI, CIA, and NSA institutionalized surveillance used to also silence political dissent, as evidenced by COINTELPRO projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists then deemed subversive. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.

The formation of the international UKUSA surveillance agreement of 1946 evolved into the ECHELON collaboration by 1955 of five English-speaking nations, also known as the Five Eyes, and focused on interception of electronic communications, with substantial increases in domestic surveillance capabilities.

Following the September 11th attacks of 2001, domestic and international mass surveillance capabilities grew immensely. Contemporary mass surveillance relies upon annual presidential executive orders declaring a continued State of National Emergency, first signed by George W. Bush on September 14, 2001 and then continued on an annual basis by President Barack Obama, and upon several subsequent national security Acts including the USA PATRIOT Act and FISA Amendment Act's PRISM surveillance program. Critics and political dissenters currently describe the effects of these acts, orders, and resulting database network of Fusion centers as forming a veritable American police state that simply institutionalized the illegal COINTELPRO tactics used to assassinate dissenters and leaders from the 1950s onwards.

Additional surveillance agencies, such as the DHS and the position of Director of National Intelligence have exponentially escalated mass surveillance since 2001. A series of media reports in 2013 revealed more recent programs and techniques employed by the US intelligence community. Advances in computer and information technology allow the creation of huge national databases that facilitate mass surveillance in the United States by DHS managed Fusion centers, the CIA's Terrorist Threat Integration Center (TTIC) program, and the FBI's TSDB.

Mass surveillance databases are also cited as responsible for profiling Latino Americans and contributing to "self-deportation" techniques, or physical deportations by way of the DHS's ICEGang national database.

After World War I, the US Army and State Department established the Black Chamber, also known as the Cipher Bureau, which began operations in 1919. The Black Chamber was headed by Herbert O. Yardley, who had been a leader in the Army's Military Intelligence program. Regarded as a precursor to the National Security Agency, it conducted peacetime decryption of material including diplomatic communications until 1929.

In the advent of World War II, the Office of Censorship was established. The wartime agency monitored "communications by mail, cable, radio, or other means of transmission passing between the United States and any foreign country". This included the 350,000 overseas cables and telegrams and 25,000 international telephone calls made each week. "Every letter that crossed international or U.S. territorial borders from December 1941 to August 1945 was subject to being opened and scoured for details."

With the end of World War II, Project SHAMROCK was established in 1945. The organization was created to accumulate telegraphic data entering and exiting from the United States. Major communication companies such as Western Union, RCA Global and ITT World Communications actively aided the project, allowing American intelligence officials to gain access to international message traffic. Under the project, and many subsequent programs, no precedent had been established for judicial authorisation, and no warrants were issued for surveillance activities. The project was terminated in 1975.

In 1952, President Harry S. Truman established the National Security Agency (NSA) in 1952 for the purposes of collecting, processing, and monitoring intelligence data. The existence of NSA was not known to people as the memorandum by President Truman was classified.

When the Citizens' Commission to Investigate the FBI published stolen FBI documents revealing abuse of intelligence programs in 1971, Senator Frank Church began an investigation into the programs that become known as the Church Committee. The committee sought to investigate intelligence abuses throughout the 1970s. Following a report provided by the committee outlining egregious abuse, in 1976 Congress established the Senate Select Committee on Intelligence. It would later be joined by the Foreign Intelligence Surveillance Court in 1978. The institutions worked to limit the power of the agencies, ensuring that surveillance activities remained within the rule of law.

Following the attacks of September 11, 2001, Congress passed The Patriot Act to strengthen security and intelligence efforts. The act granted the President broad powers on the war against terror, including the power to bypass the FISA Court for surveillance orders in cases of national security. Additionally, mass surveillance activities were conducted alongside various other surveillance programs under the head of President's Surveillance Program. Under pressure from the public, the warrantless wiretapping program was allegedly ended in January 2007.

Many details about the surveillance activities conducted in the United States were revealed in the disclosure by Edward Snowden in June 2013. Regarded as one of the biggest media leaks in the United States, it presented extensive details about the surveillance programs of the NSA, that involved interception of internet data and telephonic calls from over a billion users, across various countries.

Discussed on

πŸ”— Agent 355

πŸ”— Biography πŸ”— Military history πŸ”— Military history/North American military history πŸ”— Military history/United States military history πŸ”— Women's History πŸ”— Military history/Military biography πŸ”— Military history/Early Modern warfare πŸ”— Military history/American Revolutionary War πŸ”— Biography/military biography πŸ”— Military history/Intelligence

Agent 355 (died after 1780) was the code name of a female spy during the American Revolution, part of the Culper Ring. Agent 355 was one of the first spies for the United States, but her real identity is unknown. The number, 355, could be de-crypted from the system the Culper Ring used to mean "lady."

Discussed on