{"title":"Intelligence liaison in practice; service attachés in the Swedish Legation in London 1939-45","authors":"John Gilmour","doi":"10.1080/16161262.2023.2295655","DOIUrl":"https://doi.org/10.1080/16161262.2023.2295655","url":null,"abstract":"","PeriodicalId":37890,"journal":{"name":"Journal of Intelligence History","volume":"126 21","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138953667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christopher R. Moran, Kate Vigurs, Richard J. Aldrich, Andrew Hammond, James Lockhart, Ronan P. Mainprize
{"title":"CIA at 75: roundtable on the past, present and future of the Central Intelligence Agency","authors":"Christopher R. Moran, Kate Vigurs, Richard J. Aldrich, Andrew Hammond, James Lockhart, Ronan P. Mainprize","doi":"10.1080/16161262.2023.2279408","DOIUrl":"https://doi.org/10.1080/16161262.2023.2279408","url":null,"abstract":"","PeriodicalId":37890,"journal":{"name":"Journal of Intelligence History","volume":"BME-27 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139275847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Herbert O. Yardley: eyewitnessing a legacy","authors":"Gregory J. Nedved","doi":"10.1080/16161262.2023.2237793","DOIUrl":"https://doi.org/10.1080/16161262.2023.2237793","url":null,"abstract":"ABSTRACTA Japanese cryptologist claimed that he attended a meeting between Japanese diplomats and controversial US cryptologist Herbert O. Yardley in 1929 at the Japanese Embassy. Since this eyewitness account has not been previously known to Yardley researchers, it deserves to be reviewed objectively to see if it contributes anything of substance to the further shaping of the Yardley legacy. This article scrutinizes the written evidence as provided in two accounts of the meeting, one of which is recorded in the memoirs of senior Japanese diplomat Kase Toshikazu. The author of this article, who had been skeptical of a Yardley-Japan meeting, now believes that it most likely did occur.KEYWORDS: David KahnHerbert O. yardleythe American black chamberthe broken sealKase Toshikazu Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1 Ladislas Farago, The Broken Seal: The Story of “Operation Magic”and the Pearl Harbor Disaster, New York: Random House (1967), 56–60; J. F. Dooley, “Was Herbert O. Yardley a Traitor?” Cryptologia 35, no. 1 (2010): 1–3.2 Dooley, 4–5; National Security Agency, Herbert O. Yardley Document Collection, Memo to D33 from J.R. Chiles, S1, “State Department Messages. 3 January 1968,” Publication Number 6,650,860, https://www.nsa.gov/Helpful-Links/NSA-FOIA/Declassification-Transparency-Initiatives/Historical-Releases/Yardley-Collection/, accessed February 22, 2023; Theodore M. Hannah, “The Many Lives of Herbert O. Yardley,” Spectrum [of the National Security Agency] (fall 1981): 26, https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/cryptologic-spectrum/many_lives.pdf, accessed February 22, 2023.3 Gregory J. Nedved, “The Impact of Herbert O. Yardley: A Glass Half Full,” The Intelligencer: Journal of U.S. Intelligence Studies 28, no. 1 (Winter-Spring 2023), 55.4 Kase Toshikazu, Kase Toshikazu Kaisōroku, Tōkyō: Yamate Shobō, Shōwa 61 (1986), https://lccn.loc.gov/86209603, author’s translated copy; S. Tomokiyo, “Japanese Reaction to Yardley’s The American Black Chamber,” http://cryptiana.web.fc2.com/code/yardley_jp.htm, accessed February 22, 2023.5 Tomokiyo.6 Kase.7 Farago, 56–60; Tomokiyo, Kase.8 Kase.9 Tomokiyo; Kase.10 Tomokiyo; Kase.11 Dooley, 3–4; Herbert O. Yardley Material, Doc. #207, Herbert O. Yardley Collection, Record Group (RG) 457, Box 100, Accession Number 47,079, National Archives, College Park, MD.12 Dooley, 12–13.13 Dooley, 4; Hannah, 26; Memo to D33 from J.R. Chiles.14 Kase, Farago, 56.15 Dooley, 12–13.16 Dooley, 12; Kahn, 95; Author correspondence with J.F. Dooley, April 14, 2023.17 Kase, Tomokiyo.18 Farago, 56.19 L. Kruh, letter, Cryptologia 19, no. 4 (1995): 378.20 “Gregory J. Nedved, “Herbert O. Yardley Revisited: What Does the New Evidence Say?,” Cryptologia 45, no. 2 (2021): 113.21 Author correspondence with J.F. Dooley, April 14, 2023; Nedved, “Herbert O. Yardley Revisited,” 110.Additional informationNotes on contributorsGregory J. NedvedGregory J. ","PeriodicalId":37890,"journal":{"name":"Journal of Intelligence History","volume":"301 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135480833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Timely memoirs and the ‘British invasion’: two trends in the historiography of the CIA","authors":"R. Jeffreys‐jones, R. G. Hughes","doi":"10.1080/16161262.2022.2051920","DOIUrl":"https://doi.org/10.1080/16161262.2022.2051920","url":null,"abstract":"ABSTRACT The 9/11 and WMD controversies have encouraged new trends in CIA historiography. The writing of timely leadership memoirs means that in-house viewpoints now tend to precede outside assessment, eliminating one of intelligence historiography’s distinctive quirks. At the same time, former CIA personnel are far more willing to go on the record with journalists and scholars thus ensuring that their version of events reaches the widest possible audience. Finally, an invasion of British scholars into the field comes with the promise of objectivity conferred by distance. It is argued that, because of that distance, there has been a disposition to rely on the kind of source material that lends itself to a cultural approach to CIA history.","PeriodicalId":37890,"journal":{"name":"Journal of Intelligence History","volume":"63 1","pages":"398 - 416"},"PeriodicalIF":0.0,"publicationDate":"2023-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139343333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Long term intelligence sharing: the Five Eyes and the European Union","authors":"Carleigh A. Cartmell","doi":"10.1080/16161262.2022.2085940","DOIUrl":"https://doi.org/10.1080/16161262.2022.2085940","url":null,"abstract":"ABSTRACT Many scholars have pointed to intelligence sharing (also known as intelligence liaison) as one of the most closely guarded secrets within intelligence communities. The Five Eyes intelligence community is one of the biggest and most enduring multi-state intelligence sharing networks in the world. This article compares the European Union and the Five Eyes intelligence communities and identifies potential factors which foster long-standing intelligence relationships. This article argues that the decisions made by the Five Eyes, such as the creation of shared structural complementarities and existing cultural similarities, have created a path dependence between the Five Eyes powers. The same kind of path dependence has not been created when looking at the EU. A common identity has helped forge this path dependence and helped form a strong multi-state, long-term intelligence sharing relationship.","PeriodicalId":37890,"journal":{"name":"Journal of Intelligence History","volume":"33 1","pages":"417 - 434"},"PeriodicalIF":0.0,"publicationDate":"2023-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139343312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Victors’ history: Chinese retrospectives on the Hugh Redmond case","authors":"D. Chambers","doi":"10.1080/16161262.2023.2237307","DOIUrl":"https://doi.org/10.1080/16161262.2023.2237307","url":null,"abstract":"","PeriodicalId":37890,"journal":{"name":"Journal of Intelligence History","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44053618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chile, the CIA and the cold war: a transatlantic perspective","authors":"Haiyi Zhang, Qingyi Meng","doi":"10.1080/16161262.2023.2234748","DOIUrl":"https://doi.org/10.1080/16161262.2023.2234748","url":null,"abstract":"","PeriodicalId":37890,"journal":{"name":"Journal of Intelligence History","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41402963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"See It/shoot It: The secret history of the CIA’s Lethal Drone Program","authors":"Ka-Hei Abby Ma","doi":"10.1080/16161262.2023.2234745","DOIUrl":"https://doi.org/10.1080/16161262.2023.2234745","url":null,"abstract":"","PeriodicalId":37890,"journal":{"name":"Journal of Intelligence History","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44595927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Crypto Wars: The fight for privacy in the digital age: A political history of digital encryption","authors":"Ryan Shaffer","doi":"10.1080/16161262.2023.2227025","DOIUrl":"https://doi.org/10.1080/16161262.2023.2227025","url":null,"abstract":"","PeriodicalId":37890,"journal":{"name":"Journal of Intelligence History","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45886399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The long history of OSINT","authors":"Ludo Block","doi":"10.1080/16161262.2023.2224091","DOIUrl":"https://doi.org/10.1080/16161262.2023.2224091","url":null,"abstract":"","PeriodicalId":37890,"journal":{"name":"Journal of Intelligence History","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49132544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}