翻訳と辞書
Words near each other
・ "O" Is for Outlaw
・ "O"-Jung.Ban.Hap.
・ "Ode-to-Napoleon" hexachord
・ "Oh Yeah!" Live
・ "Our Contemporary" regional art exhibition (Leningrad, 1975)
・ "P" Is for Peril
・ "Pimpernel" Smith
・ "Polish death camp" controversy
・ "Pro knigi" ("About books")
・ "Prosopa" Greek Television Awards
・ "Pussy Cats" Starring the Walkmen
・ "Q" Is for Quarry
・ "R" Is for Ricochet
・ "R" The King (2016 film)
・ "Rags" Ragland
・ ! (album)
・ ! (disambiguation)
・ !!
・ !!!
・ !!! (album)
・ !!Destroy-Oh-Boy!!
・ !Action Pact!
・ !Arriba! La Pachanga
・ !Hero
・ !Hero (album)
・ !Kung language
・ !Oka Tokat
・ !PAUS3
・ !T.O.O.H.!
・ !Women Art Revolution


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Signal Intelligence Service : ウィキペディア英語版
Signals Intelligence Service

The Signal Intelligence Service (SIS) was the United States Army codebreaking division, headquartered at Arlington Hall. It was a part of the Signal Corps so secret that outside the office of the Chief Signal officer, it did not officially exist. SIS was an early predecessor to the NSA and later appropriated by the National Security Council who reappointed the resources into the modern National Security Agency. William Friedman began the division with three "junior cryptanalysts" in April 1930. Their names were Frank Rowlett, Abraham Sinkov, and Solomon Kullback. Before this, all three of them had been mathematics teachers with no cryptanalysis background. Friedman was a geneticist who developed his expertise in cryptology at George Fabyan's Riverbank Laboratories Cipher Department during 1915 to 1917. Besides breaking foreign codes,〔(Bernard A. Weisberger ) "Eavesdropping on the Rising Sun," ''American Heritage'', Fall 2009.〕 they were responsible for just about anything to do with the War Department's code systems. The SIS initially worked on an extremely limited budget, lacking the equipment it needed to even intercept messages to practice decrypting.
In 1943, the Army Signal Intelligence Service (later the Army Security Agency) began intercepting Soviet intelligence traffic sent mainly from New York City—assigning the code name Venona to the project. By 1945, some 200,000 messages had been transcribed, a measure of Soviet activity. On 20 December 1946, Meredith Gardner made the first break into the Venona code, revealing the existence of Soviet espionage at the Los Alamos National Laboratory.
:"After intense study of the Japanese language, I was stationed at Arlington Hall as part of the 2nd Sig Serv Bn. I was given training in cryptography at Vint Hills Farms before the stint at Arlington Hall. We were reading the 1944 Japanese Army General Codebook. There were always glitches, both from faulty reception and failure to break the monthly cyphers. It was our job to fill these in (guess at them) and get the translated messages to McArthur's HQ in the Pacific. We were aided by several two-story barracks filled with IBM computers (then called punch-card tabulators). In January, the new 1945 codebook was published by the Japanese and we were pretty much back to square one. Myself and another expendable Lt. were sent to the Pacific looking for captured code equipment. Our knowledge of what it looked like would supposedly qualify us to find such. No luck on Saipan. 1st Marines did find the code books in the catacombs under Shuri Castle. Back at AH we translated and decrypted, until one day I got a message with a new word: Genshi Bakudan...atom bomb. War ended. From there it was to Japan to interview civilians and military (USSBS). Then discharge and back to Texas."
== See also ==

* Signals intelligence

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Signals Intelligence Service」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.