Monday, December 09, 2024

Podcast Nuggets Episode 11

Click for more

We're back with Podcast Nuggets, but this time only two podcasts due to some radio silence. You're nevertheless in for a treat. The first one is from Katerina Urban Richterova, the Slovak award-winning radio journalist and reporter who also worked for the New York Times, CNN, BBC, ARTE, and many more. She's well informed and a joy to listen to. Unlike usual, we don't suggest an episode, but recommend listening to her full podcast series. Somehow, I managed to miss the start of this series in 2020 but it's never too late to discover podcast gems. There's also a fascinating Spycraft 101 episode on Area 51.


The Secret Struggle for Cold War Dominance is a Cold War podcast series, but not about the usual main opponents, although they might be involved in some cases. If we talk about the Cold War, most people know the rivalry between the Unites States, Russia, and later China. However, many lesser known Asian, African and South American countries were also affected and, willingly or not, actively involved in the Cold War. Yet they are barely mentioned in the archives. Katarina interviews researchers about those unknown people and their stories. You can listen to the complete series, including bonus episodes, on Apple Podcast, Spotify or Katarina's podcast page, but make sure to go back to the Episode 1 introduction, and start with the first interviews of the series. Bonus episodes are also available, and it took a while, but Season 2 is underway...

SPYCRAFT 101 The Real Secrets of Area 51. Peter Merlin is an author, historian, freelance researcher, and writer. He also worked as historian and archivist at NASA for more than 30 years and has been researching and writing about Area 51 for many years and compiled all his knowledge in his book Dreamland: The Secret History of Area 51, a massive 560 pages work with more than 700 images. In the podcast he talks about the early beginnings of the CIA's Area 51, the development of cutting-edge aircraft technology, and some of the most iconic airplanes ever built. Peter also debunks some of the conspiracy theories. He documented Area 51 from its early beginnings, when it was little more than a dry lakebed, through its growth as CIA facility to develop and test cutting-edge aircraft technology. Great interview with new insights and facts.

Friday, September 27, 2024

Ralph Simpson on Cracking the Enigma

Ralph Simpson was speaker of the month at the California Historical Radio Society where he gave a talk on the early development of encryption devices. He focused on the Enigma cipher machine, its inventors and patents, and its use by the German military during the Second World War. He also explains why the machine was considered unbreakable, but eventually proved to be the Achilles' heel of the German armed forces during the Second World War.

Ralph had a career in the computer industry but also developed a passion for old cipher machines and their history. He is a respected member of the cryptologic history community and runs a website with a wealth of historical crypto devices and equipment for secret communications, all accompanied by technical details and relevant historical information. Be sure to visit his website Cipher History.

Monday, July 08, 2024

A Call to Former KL-7 and KL-47 Operators

TSEC/KL-7 © Dirk Rijmenants

The TSEC/KL-7 crypto machine was developed by the Army Security Agency (ASA) and Armed Forces Security Agency (AFSA) under the name AFSAM-7, and introduced in 1953 by the National Security Agency (NSA) into the U.S. Army and Air Force, and later also into the CIA and FBI. The machine also served in all NATO forces, their embassies and some state departments. The U.S. Navy AFSAM-47B, later known as TSEC/KL-47, was compatible with the KL-7. The last machines  retired in the early 1980s. It's been little over 40 years ago that the last machines left the service and time is running out to document first-hand accounts on these machines.

If you are a retired signals veteran with experience on the KL-7 or KL-47 as operator or technician, a member of a signals association or organization, or worked in the communications section of a state department that used the KL-7, then contact us through our website to document your story. The KL-7 is fully declassified and we're not interested in classified information, we only want to preserve the cryptologic history of these Cold War icons.

Besides the United States, the KL-7 was also used by its NATO allies Australia, Belgium, Canada, Denmark, England, France, Germany, Greece, Italy, Luxemburg, the Netherlands, Norway, New Zealand, Portugal and Turkey. Outside NATO, the KL-7 was also on loan to South Korea, South Vietnam and Taiwan. If you're a signals veteran from any of these countries, a state department or embassy in the 1950s to 1980s era, then contact us, or spread the word.

Unfortunately, time is running out to document first-hand accounts, as the people involved are age seventy or older, and memories fade. Please share this request with all signals communities that might have former KL-7 or KL-47 operators and technicians. Those who share their story retain full control over the content and how it is published.

Let's preserve cryptologic history!

Visit the U.S. TSEC/KL-7 ADONIS & POLLUX webpage to learn more about the KL-7, its development, technical details and full history, including some first-hand accounts, also shown below, to get an idea of the kind of stories we hope to document. You can contact us through the contact page on our website Cipher Machines and Cryptology.

Enjoy reading!

Thursday, June 06, 2024

Martin Gillow's Virtual Colossus and Other Machines

The Virtual Colossus
© Image Martin Gillow

The history of crypto equipment is quite fascinating, but diving into the archives, searching for historical publications, or collecting those old machines is not everyone’s cup of tea. Luckily, we have a community, dedicated to preserving the history of old crypto equipment, research the technical details, publish their history and operational use, and bring those old crypto machines back to life, either physically, which can be quite expensive, or virtually though software simulations.

Writing software that works exactly like the real crypto machine requires extensive study of the original machine, its mechanical and/or electrical properties, and many hours to write the software that reproduces the plaintext or ciphertext exactly like the original machine. However, you could take it one step further, and make a virtual three-dimensional machine where you can manipulate all components and encrypt, decrypt or break messages, just like the wartime operators.

Martin Gillow created a website with no less than ten 3D simulations. The virtual British Colossus machine is the first ever digital computer, developed in WW2 to break the German Lorenz SZ40/42 encrypted telex, of which he also created a virtual version. There’s also the virtual Enigma machine, and the Bombe that was used by the Bletchley Park codebreakers to decrypt the German Enigma messages.

Hagelin's U.S. M-209
© Image Martin Gillow
Also the British Typex machine and the U.S. M-209, developed by the renown Swedish engineer Boris Hagelin, have their 3D version. Moreover, the collection includes the ICT 1301 ”Flossie” second-generation computer, the E.R.N.I.E electronic random number generator, and the American crib dragging machine Dragon that helped to break the Lorenz messages.

Of course, the countless hours of work by Martin to research and study those machines, and write accurate 3D versions, is just enormous, and makes this 3D collection simply unaffordable… unless you just want to preserve and share the history of old crypto machines, and make the simulations available to everyone for free. A big Thank You to Martin for creating all those virtual machines, and for being part of that small community, dedicated to preserve cryptologic history.

Make sure to scroll all the way down his main page, to find all virtual 3D simulations and read the various tutorials on how to use them. Also click the relevant "find out more" buttons to learn about each machine and its history. Visit the Virtual Colossus website.
 
Highly recommended, and no better day than D-day to share Martin's work and commemorate all codebreakers.

Thursday, March 28, 2024

Crypto's Cast with Dr. Carola Dahlke as First Guest

I'm pleased to announce the first guest on our brand new Crypto's Cast. The goal is to bring interesting bite-size stories for crypto enthusiasts, but also to tickle the interest of listeners with limited or no knowledge on cryptography.
 
The Cast is a group of crypto experts, historians and collectors that will bring fascinating stories, with topics ranging from cryptologic history, its technology and science, important historical events, influenced by cryptography, renown cryptologists, cipher machines, the making and breaking of codes and crypto algorithms, crypto and privacy, to books and websites.
 
Our first guest is Dr. Carola Dahlke. She is the curator of the department of Computer Science and Cryptology at the Deutsches Museum in Munich, Germany, and expert in historical crypto equipment. There's hardly a better guest to start our podcast, as she was instrumental in documenting and preserving the Schlüsselgerät 41, a German cipher machine, far more secure than the famous Enigma, but unknown until recently.