Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Half-title Page Title Page Contents Foreword Introduction 1 The Origins of Modern British Sigint, 1844–1914
Comint and Empire Victorian Intelligence and the Information Revolution The Edwardian Roots of British Sigint Cryptography The Comint Revolution
2 Britain and the Birth of Signals Intelligence, 1914–18
The Emergence of Sigint The Emergence of Comint Sigint at Sea Military Sigint Blockade and Diplomatic Comint Siginters Women Siginters Sigint Alliances Sigint and British Victory
3 Whitehall’s Black Chamber: British Cryptology and the Government Code & Cypher School, 1919–39
The Politics of Sigint Sigint Between the Wars The Government Code & Cypher School Interwar Siginters Military Sigint Defence Attack Codebreaking
4 Cryptanalysis and British Foreign Policy, 1919–39
Comint and Naval Arms Limitation, 1921–36 Judging the Effect of Diplomatic Comint Comint and British Policy in the Middle East, 1919–23 Conspiracies and Conspirators: 1919–22 The Chanak Crisis Comint at Chanak Lausanne and Later Comint and the Main Enemy, 1919–39 Intelligence, Appeasement and the Road to War, 1933–39 The Anti-Comintern Pact Comint and Strategy Conclusions
5 Bletchley
Decline of a Black Chamber The Road to Bletchley Park The Limits to Preadaptation Diversity and Union The Turing Test Craft to Industry The Struggle for Sigint Sigint and Intelligence A Crisis in Comint The Problem of the Trinity Acting on Intelligence
6 Ultra and the Second World War, 1939–45
Axis Swords, British Shield The Turning Point Ultra and Its Enemies Sigint and Strike Warfare Sigint at Sea, 1940–43 Ultra and the Mediterranean Strategy Stormy Weather Tsunami Ultra and the Strategy of Overthrow Ultra and Overlord British Sigint and the Pacific War Conclusion
7 Cheltenham: GCHQ, Britain and Whitehall, 1945–92
Strategy and Power Cryptology and Intelligence Politics and Path Dependency Autonomy on a Margin Masters and Commanders The Directors Rise and Stagnation High Tide Decline Rise Again Coming in from the Cold War
8 UKUSA and the International Politics of Sigint, 1941–92
The Path Dependency of Politics The Emergence of UKUSA Getting to Know You Friendships and Frictions Towards a Gentleman’s Agreement UKUSA: Secrets and Rules UKUSA in Practice Hands Across the Water Two Eyes Three Eyes UKUSA: Crises and Friction
The Suez Crisis, 1956 Exchange during the Middle Cold War Personalities and Friction
Lessons Learned Enemies and Third Parties
9 ‘We Want to Be Cheltonians’: The Department
Recruitment and Retention After Avowal The Department Specialists Linguists Comint and Technology How Computers Came to Cheltenham The Birth of Computerised Cryptanalysis in Britain GCHQ and the British Computing Industry The Rise of Computerised Cryptanalysis in Britain
10 Just Who Are These Guys, Anyway? A Historical-Sociological Analysis of GCHQ, 1939–89
Women at GCHQ British or Not? Character Defects? Outstations Strife and Strikes The Union Ban
11 Intercept to End Product: the Collection, Processing and Dissemination of Sigint, 1945–92
Forms of Collection The Story of H Codebreakers Modes of Analysis Consumers and Consumption End Product and Its Effect
12 GCHQ vs the Main Enemy: Signals Intelligence and the Cold War, 1945–92
The Echo of Ultra, 1945–53 British Sigint and NATO Strategy Sanitisation and Strategy Formal and Informal Estimates Strategic Forces Economic and Technological Intelligence The Early Cold War: Challenge and Response GCHQ and Crises in the Early Cold War GCHQ and the Middle Cold War The Test of Czechoslovakia Living in the Force: the High Cold War GCHQ and Crises during the Later Cold War At the Cold War’s End
13 Comint and the End of Empire, 1945–82: Palestine, Konfrontasi and the Falkland Islands
Sigint and the End of the Palestine Mandate, 1944–48
The Anglo-Zionist Divorce An Intelligence Struggle Comint in Palestine Operation Agatha Attlee and Irgun After the Fall
Konfrontasi: Living Dangerously
Sigint Preparation of the Battlefield
Comint and Claret
Reconsidering Konfrontasi So What?
Sigint and the Falklands Conflict
Origins and Impulse Wrong-footing to War GCHQ and the Outbreak of the Falklands Conflict GCHQ and the Falklands Conflict Crisis and Recalibration Approaching a New Age of Sigint The General Belgrano To San Carlos Sound To Port Stanley Professional Deformations
14 Secrecy, Translucency and Oversight, 1830–2019
Comsec and Communications-Electronic Security, 1945–92 The Contradictions of Secrecy Coming Out: Scandal and Avowal
15 GCHQ and the Second Age of Sigint, 1990–2020
Coming in from the Cold War Reinvention On the Cyber Commons Cyber Intelligence, Terrorism and Strife From Secrecy to Translucency The National Cyber Security Centre and the Cyber Commons
Conclusion Appendix: GCHQ by the Numbers, 1960–95 Notes Acknowledgements Index A Note on the Author Images Copyright Page
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion