NSA Secrets Declassified: Eavesdropping on Hell: Historical Guide to Western Communications Intelligence and the Holocaust 1939-1945 - Enigma, Codebreakers, World War II, Jewish Refugees, Nazi Gold

Nonfiction, History, Jewish, Holocaust, Military, World War II
Cover of the book NSA Secrets Declassified: Eavesdropping on Hell: Historical Guide to Western Communications Intelligence and the Holocaust 1939-1945 - Enigma, Codebreakers, World War II, Jewish Refugees, Nazi Gold by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310272004
Publisher: Progressive Management Publication: April 6, 2015
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310272004
Publisher: Progressive Management
Publication: April 6, 2015
Imprint: Smashwords Edition
Language: English

Professionally converted for accurate flowing-text e-book format reproduction, this important NSA publication provides a historical guide to western communications intelligence and the Holocaust from 1939 to 1945.

Contents: Chapter 1: Background * The Context of European and Nazi Anti-Semitism * Previous Histories and Articles * Chapter 2: Overview of the Western Communications Intelligence System during World War II * Step 1: Setting the Requirements, Priorities, and Division of Effort * Step 2: Intercepting the Messages * Step 3: Processing the Intercept * Step 4: Disseminating the COMINT * From Intercept to Decryption - the Processing of a German Police Message * Chapter 3: Sources of Cryptologic Records Relating to the Holocaust * The National Archives and Records Administration * The Public Record Office * Miscellaneous Collections * Chapter 4: Selected Topics from the Holocaust * A. The General Course of the Holocaust and Allied COMINT * B. Jewish Refugees, the Holocaust, and the Growing Strife in Palestine * C. The Vichy Regime and the Jews * D. The Destruction of Hungary's Jews, 1944 * E. Japan and the Jews in the Far East * F. Nazi Gold: National and Personal Assets Looted by Nazis and Placed in Swiss Banks, 1943 -1945 * Chapter 5: Some Observations about Western Communications Intelligence and the Holocaust * What was Known from COMINT * When the COMINT Agencies Knew * Some Further Observations Regarding the Available Archival Records * There are limited COMINT agency records about the Holocaust * There are significant differences between the archival records holdings of the cryptologic agencies of the United States and Great Britain * The Western communications intelligence agencies collected many more intercepts than they finally processed during the War * There are pertinent uses for the available records from the COMINT agencies related to the Holocaust.

The background chapter to this guide offers brief summaries of the history of anti-Semitism in the West and the early Nazi policies in Germany, as well as a short review of the limited body of historical and memoir literature prior to 1997 that pertains to both cryptology and the Holocaust. Chapter 2 will describe the general system by which communications intelligence was produced by the Allies during World War II. This description will encompass the system from the establishment of collection priorities, through the intercept of targeted Axis and neutral communications, next to the processing or analysis of the intercept for intelligence, and finally to the dissemination of the produced intelligence. Just as importantly, this section includes observations on how the nature of the communications intelligence process affected the collection of information concerning the Holocaust. Chapter 3 will list the various locations for relevant records of the American and British cryptologic agencies held by the National Archives and Records Administration and the Public Record Office. This chapter will also include a description and some examples of other smaller relevant records holdings. Chapter 4 will briefly review the available COMINT material that is part of the historical narrative of the Holocaust. This chapter includes a brief overview of the course of the Holocaust and somewhat more detailed descriptions of specific topics that include the refugee problem and Palestine, Vichy and the Jews, the roundup of the Hungarian Jews, the situation of the Jews in the Far East under the Japanese, and German-Swiss trade and financial transactions during the war. Finally, Chapter 5 considers some important general observations about cryptology and the Holocaust. In a way, these observations are a summation of the material presented in the guide.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Professionally converted for accurate flowing-text e-book format reproduction, this important NSA publication provides a historical guide to western communications intelligence and the Holocaust from 1939 to 1945.

Contents: Chapter 1: Background * The Context of European and Nazi Anti-Semitism * Previous Histories and Articles * Chapter 2: Overview of the Western Communications Intelligence System during World War II * Step 1: Setting the Requirements, Priorities, and Division of Effort * Step 2: Intercepting the Messages * Step 3: Processing the Intercept * Step 4: Disseminating the COMINT * From Intercept to Decryption - the Processing of a German Police Message * Chapter 3: Sources of Cryptologic Records Relating to the Holocaust * The National Archives and Records Administration * The Public Record Office * Miscellaneous Collections * Chapter 4: Selected Topics from the Holocaust * A. The General Course of the Holocaust and Allied COMINT * B. Jewish Refugees, the Holocaust, and the Growing Strife in Palestine * C. The Vichy Regime and the Jews * D. The Destruction of Hungary's Jews, 1944 * E. Japan and the Jews in the Far East * F. Nazi Gold: National and Personal Assets Looted by Nazis and Placed in Swiss Banks, 1943 -1945 * Chapter 5: Some Observations about Western Communications Intelligence and the Holocaust * What was Known from COMINT * When the COMINT Agencies Knew * Some Further Observations Regarding the Available Archival Records * There are limited COMINT agency records about the Holocaust * There are significant differences between the archival records holdings of the cryptologic agencies of the United States and Great Britain * The Western communications intelligence agencies collected many more intercepts than they finally processed during the War * There are pertinent uses for the available records from the COMINT agencies related to the Holocaust.

The background chapter to this guide offers brief summaries of the history of anti-Semitism in the West and the early Nazi policies in Germany, as well as a short review of the limited body of historical and memoir literature prior to 1997 that pertains to both cryptology and the Holocaust. Chapter 2 will describe the general system by which communications intelligence was produced by the Allies during World War II. This description will encompass the system from the establishment of collection priorities, through the intercept of targeted Axis and neutral communications, next to the processing or analysis of the intercept for intelligence, and finally to the dissemination of the produced intelligence. Just as importantly, this section includes observations on how the nature of the communications intelligence process affected the collection of information concerning the Holocaust. Chapter 3 will list the various locations for relevant records of the American and British cryptologic agencies held by the National Archives and Records Administration and the Public Record Office. This chapter will also include a description and some examples of other smaller relevant records holdings. Chapter 4 will briefly review the available COMINT material that is part of the historical narrative of the Holocaust. This chapter includes a brief overview of the course of the Holocaust and somewhat more detailed descriptions of specific topics that include the refugee problem and Palestine, Vichy and the Jews, the roundup of the Hungarian Jews, the situation of the Jews in the Far East under the Japanese, and German-Swiss trade and financial transactions during the war. Finally, Chapter 5 considers some important general observations about cryptology and the Holocaust. In a way, these observations are a summation of the material presented in the guide.

More books from Progressive Management

Cover of the book Countering North Korean Special Purpose Forces: Vast Tunnel Network, Infiltration, Amphibious and Airborne Approaches, DPRK Submarines, Apache Attack Helicopters to the Rescue by Progressive Management
Cover of the book War in the Balkans, 1991-2002: Comprehensive History of Wars Provoked by Yugoslav Collapse: Balkan Region in World Politics, Slovenia and Croatia, Bosnia-Herzegovina, Kosovo, Greece, Turkey, Cyprus by Progressive Management
Cover of the book Climate Change and Global Warming: National Global Change Research Plan 2012-2021: A Strategic Plan For The U.S. Global Change Research Program, Carbon Dioxide, Sea Levels, Ecosystems, Models by Progressive Management
Cover of the book 21st Century FEMA Study Course: Applications of GIS for Emergency Management (IS-922) - Geographical Information Systems Database Tools, Fundamentals, History, Usefulness by Progressive Management
Cover of the book Programmatic Integration of Cyber into the Institutional Domain of Leader Development: Cyberspace and Computer Curriculum in Army Learning Institutions, Comparing Cyber to Armor or Aviation by Progressive Management
Cover of the book History of the Office of the Secretary of Defense, Volume One: The Formative Years: 1947-1950 - Fascinating Account of Post-War Decisions on Communist Threat, Atomic Weapons, Israel, NATO by Progressive Management
Cover of the book U.S. Army Medical Correspondence Course: Preservation of Foods, Microbiology, Food Spoilage, Microbial Growth, Chemical and Thermal Preservation, Additives, Canning, Meat, Fruits and Vegetables by Progressive Management
Cover of the book Operation Ajax: A Case Study on Analyst-Policy Maker Tensions and the Challenges of Estimative Intelligence – CIA Covert Operation Coup Overthrowing Iran’s Elected Prime Minister Mossadeq by Progressive Management
Cover of the book A-10s over Kosovo: The Victory of Airpower over a Fielded Army as Told by the Airmen Who Fought in Operation Allied Force - Warthogs in Battle by Progressive Management
Cover of the book 2015 House Committee Report on Obama Administration Release of Five Taliban GITMO Detainees for the Release of Captive U.S. Army Soldier Robert "Bowe" Bergdahl: Contention That Law Was Broken by Progressive Management
Cover of the book 21st Century U.S. Military Documents: Air Force Criminal Investigations, Technical Surveillance Countermeasures, Counterintelligence, Protective Service Matters - Special Investigations by Progressive Management
Cover of the book Global Trends 2030: Alternative Worlds - American Intelligence Agency Report on the Megatrends, Gamechangers, and Black Swans of the Future, the Rise of China, Alternative World Scenarios by Progressive Management
Cover of the book Encyclopedia of NASA Lessons Learned (Part 5): Thousands of Aerospace Technology Engineering Reports, Problems, Accidents, Mishaps, Ideas and Solutions - Space Shuttle, Spacecraft, Rockets, Aircraft by Progressive Management
Cover of the book 2012 Complete Guide to Iran: Authoritative Coverage of Iranian Nuclear and Missile Programs, Sanctions and Threat of War, Regime, Military, Human Rights, Terrorism, History, Economy, Oil Industry by Progressive Management
Cover of the book Transformation of the German Reichsheer: German Army After World War I, Wehrmacht, General Hans von Seeckt, Nazis and Hitler, Invasions of Poland and France, Operation Barbarossa, Second World War by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy