James Gannon (author)

Last updated
James Gannon
Born
James Gannon
Nationality American
Occupation(s)Author, producer

James Gannon is a freelance writer and producer of documentaries for NBC News. He has published many articles on a variety of subjects. [1]

Contents

Life

James Gannon is the author of Stealing Secrets, Telling Lies: How Spies and Codebreakers Helped Shape the Twentieth century (2001). The book discusses key episodes of 20th-century espionage and cryptology involving the Zimmermann telegram; Enigma decryption and "Ultra"; the Battle of the Atlantic; Erwin Rommel; the Colossus computer; Frank Rowlett and Japan's Purple cipher; Allied Operation Overlord deceptions; World War II spies and spy organizations; Rudolf Roessler and the Lucy Spy Ring; Takeo Yoshikawa and Japan's attack on Pearl Harbor; Joseph J. Rochefort and the Battle of Midway; Richard Sorge; Donald Maclean; Klaus Fuchs; Venona; Oleg Penkovsky; and Ryszard Kukliński. [2]

A thread running through Gannon's book is the ubiquity of distortions in accounts of espionage and cryptology, and the readiness of unscrupulous individuals, agencies and countries to take credit for the achievements of others. [3]

Notes

  1. James Gannon, Stealing Secrets, Telling Lies, dust-cover "author" note.
  2. James Gannon, Stealing Secrets, Telling Lies, chaps 1-16.
  3. James Gannon, Stealing Secrets, Telling Lies, passim.

Related Research Articles

Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence). A person who commits espionage is called an espionage agent or spy. Any individual or spy ring, in the service of a government, company, criminal organization, or independent operation, can commit espionage. The practice is clandestine, as it is by definition unwelcome. In some circumstances, it may be a legal tool of law enforcement and in others, it may be illegal and punishable by law.

Spy fiction is a genre of literature involving espionage as an important context or plot device. It emerged in the early twentieth century, inspired by rivalries and intrigues between the major powers, and the establishment of modern intelligence agencies. It was given new impetus by the development of fascism and communism in the lead-up to World War II, continued to develop during the Cold War, and received a fresh impetus from the emergence of rogue states, international criminal organizations, global terrorist networks, maritime piracy and technological sabotage and espionage as potent threats to Western societies. As a genre, spy fiction is thematically related to the novel of adventure, the thriller and the politico-military thriller.

<span class="mw-page-title-main">Ultra (cryptography)</span> British designation for intelligence from decrypted enemy communications

Ultra was the designation adopted by British military intelligence in June 1941 for wartime signals intelligence obtained by breaking high-level encrypted enemy radio and teleprinter communications at the Government Code and Cypher School (GC&CS) at Bletchley Park. Ultra eventually became the standard designation among the western Allies for all such intelligence. The name arose because the intelligence obtained was considered more important than that designated by the highest British security classification then used and so was regarded as being Ultra Secret. Several other cryptonyms had been used for such intelligence.

<span class="mw-page-title-main">William F. Friedman</span> American cryptologist (1891–1969)

William Frederick Friedman was a US Army cryptographer who ran the research division of the Army's Signal Intelligence Service (SIS) in the 1930s, and parts of its follow-on services into the 1950s. In 1940, subordinates of his led by Frank Rowlett broke Japan's PURPLE cipher, thus disclosing Japanese diplomatic secrets before America's entrance into World War II.

<span class="mw-page-title-main">John Cairncross</span> British intelligence officer and Soviet spy (1913–1995)

John Cairncross was a British civil servant who became an intelligence officer and spy during the Second World War. As a Soviet double agent, he passed to the Soviet Union the raw Tunny decryptions that influenced the Battle of Kursk. He was alleged to be the fifth member of the Cambridge Five. He was also notable as a translator, literary scholar and writer of non-fiction.

<span class="mw-page-title-main">Fish (cryptography)</span>

Fish was the UK's GC&CS Bletchley Park codename for any of several German teleprinter stream ciphers used during World War II. Enciphered teleprinter traffic was used between German High Command and Army Group commanders in the field, so its intelligence value (Ultra) was of the highest strategic value to the Allies. This traffic normally passed over landlines, but as German forces extended their geographic reach beyond western Europe, they had to resort to wireless transmission.

The vulnerability of Japanese naval codes and ciphers was crucial to the conduct of World War II, and had an important influence on foreign relations between Japan and the west in the years leading up to the war as well. Every Japanese code was eventually broken, and the intelligence gathered made possible such operations as the victorious American ambush of the Japanese Navy at Midway in 1942 and the shooting down of Japanese admiral Isoroku Yamamoto a year later in Operation Vengeance.

<span class="mw-page-title-main">Books on cryptography</span>

Books on cryptography have been published sporadically and with highly variable quality for a long time. This is despite the tempting, though superficial, paradox that secrecy is of the essence in sending confidential messages — see Kerckhoffs' principle.

<span class="mw-page-title-main">Herbert Yardley</span> American cryptologist (1889–1958)

Herbert Osborn Yardley was an American cryptologist. He founded and led the cryptographic organization the Black Chamber. Under Yardley, the cryptanalysts of The American Black Chamber broke Japanese diplomatic codes and were able to furnish American negotiators with significant information during the Washington Naval Conference of 1921–1922. Recipient of the Distinguished Service Medal. He wrote The American Black Chamber (1931) about his experiences there. He later helped the Nationalists in China (1938–1940) to break Japanese codes. Following his work in China, Yardley worked briefly for the Canadian government, helping it set up a cryptological section of the National Research Council of Canada from June to December 1941. Yardley was reportedly let go due to pressure either from the Secretary of War Henry L. Stimson or from the British.

<span class="mw-page-title-main">Frank Rowlett</span> American cryptographer (1908–1998)

Frank Byron Rowlett was an American cryptologist.

Intelligence assessment, or simply intel, is the development of behavior forecasts or recommended courses of action to the leadership of an organisation, based on wide ranges of available overt and covert information (intelligence). Assessments develop in response to leadership declaration requirements to inform decision-making. Assessment may be executed on behalf of a state, military or commercial organisation with ranges of information sources available to each.

<span class="mw-page-title-main">David Kahn (writer)</span> American historian, journalist and writer (born 1930)

David Kahn is an American historian, journalist, and writer. He has written extensively on the history of cryptography and military intelligence.

Commander Alexander "Alastair" Guthrie Denniston was a Scottish codebreaker in Room 40, deputy head of the Government Code and Cypher School (GC&CS) and hockey player. Denniston was appointed operational head of GC&CS in 1919 and remained so until February 1942.

Michael Smith is a British author who specializes in spies and espionage. He is also a former member of the board of the Bletchley Park Trust.

Giovanni Soro was an Italian professional code-cracker. He was the Renaissance's first outstanding cryptanalyst and the Western world's first great cryptanalyst. Soro is known as the father of modern cryptography.

<span class="mw-page-title-main">Cryptography</span> Practice and study of secure communication techniques

Cryptography, or cryptology, is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security are also central to cryptography. Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.

<span class="mw-page-title-main">Branko Vukelić (spy)</span>

Branko Vukelić was a Yugoslav spy working for Richard Sorge's spy ring in Japan.

<span class="mw-page-title-main">History of espionage</span>

Spying, as well as other intelligence assessment, has existed since ancient history. In the 1980s scholars characterized foreign intelligence as "the missing dimension" of historical scholarship." Since then a largely popular and scholarly literature has emerged. Special attention has been paid to World War II, as well as the Cold War era (1947–1989) that was a favorite for novelists and filmmakers.

Mlecchita Vikalpa is one of the 64 arts listed in Vatsyayana's Kamasutra. The list appears in Chapter 3 of Part I of Kamasutra and Mlecchita Vikalpa appears as the 44th item in the list. The term Mlecchita Vikalapa has been translated into English as "the art of understanding writing in cypher, and the writing of words in a peculiar way".

<span class="mw-page-title-main">Otto Pünter</span> Swiss journalist and anti-Nazi resistance fighter

Otto Pünter was a Swiss journalist and anti-Nazi resistance fighter. During the Second World War, his codename was Pakbo, and he was a member of the Red Orchestra.

References