636
Views
1
CrossRef citations to date
0
Altmetric
Article

Cryptography and the Global South: secrecy, signals and information imperialism

&
Pages 1900-1917 | Received 02 Apr 2020, Accepted 06 Jul 2020, Published online: 03 Aug 2020

Bibliography

  • Aid, M. M. The Secret Sentry: The Untold History of the NSA. New York: Bloomsbury, 2009.
  • Aldrich, R. J. GCHQ: The Uncensored Story of Britain's Most Secret Intelligence Agency – Centenary Edition. London: Collins, 2019.
  • Andrew, C. M., and Dilks D. The Missing Dimension: Governments and Intelligence Communities in the Twentieth Century. London: Macmillan, 1984.
  • Annan, K. “Speech at the ITU Opening Ceremony.” 1999. http://www.itu.int/telecom-wt99/press_service/information_for_the_press/press_kit/speeches/annan_ceremony.html
  • Bamford, J. The Puzzle Palace: Inside the National Security Agency, America's Most Secret Intelligence Organization. New York: Granite Hill, 1983.
  • Barrett, David M. “Secrecy, Security, and Sex: The NSA, Congress, and the Martin–Mitchell Defections.” International Journal of Intelligence and Counter Intelligence 22, no. 4 (2009): 699–729. doi:10.1080/08850600903143320.
  • Bauman, Z., D. Bigo, P. Esteves, E. Guild, V. Jabri, D. Lyon, and R. B. J. Walker. “After Snowden: Rethinking the Impact of Surveillance.” International Political Sociology 8, no. 2 (2014): 121–144. doi:10.1111/ips.12048.
  • Berger, M. T. “The Real Cold War Was Hot: The Global Struggle for the Third World.” Intelligence and National Security 23, no. 1 (2008): 112–126. doi:10.1080/02684520701798171.
  • Boone, Catherine. “Trade, Taxes, and Tribute: Market Liberalizations and the New Importers in West Africa.” World Development 22, no. 3 (1994): 453–467. doi:10.1016/0305-750X(94)90135-X.
  • Borger, Julian. “CIA Controlled Global Encryption Company for Decades.” Guardian, February 11, 2020.
  • Budiansky, Stephen. Code Warriors: NSA’s Codebreakers and the Secret Intelligence War against the Soviet Union. New York: Knopf, 2016.
  • Castells, M. The Rise of the Networked Society. Oxford: Blackwells, 2000.
  • CIA (Central Intelligence Agency). Minerva: A History. Langley: CIA, 2004.
  • Clark, Ronald. The Man Who Broke Purple. London: Penguin, 1977.
  • Cole, Ronald H. “Operation Just Cause: Planning and Execution of Joint Operations in Panama February 1988–January 1990.” Joint History Office, Office of the Chairman of the JCS 1995. Accessed May 21, 2020. https://nsarchive2.gwu.edu/NSAEBB/NSAEBB443/docs/area51_22.PDF
  • Corera, Gordon. Intercept: The Secret History of Computers and Spies. London: Hachette, 2015.
  • Cormac, Rory. Disrupt and Deny: Spies Special Forces and the Secret Pursuit of British Foreign Policy. Oxford: Oxford University Press, 2018.
  • Davies, P. H. J. “Spies as Informants: Triangulation and the Interpretation of Elite Interview Data in the Study of the Intelligence and Security Services.” Politics 21, no. 1 (2001): 73–80. doi:10.1111/1467-9256.00138.
  • Davies, P. H. J. and K. C. Gustafson, eds. Intelligence Elsewhere: Spies and Espionage outside the Anglosphere. Washington, DC: Georgetown University Press, 2016.
  • Foulkes, Imogen. “Swiss Crypto AG Spying Scandal Shakes Reputation for Neutrality.” BBC News, February 16, 2020. Accessed 27 March 2020. https://www.bbc.co.uk/news/world-europe-51487856
  • Goodman, M. S. The Official History of the Joint Intelligence Committee: Vol. I. London: Routledge, 2014.
  • Halliday, Fred. Cold War, Third World: An Essay on Soviet American Relations. London: Hutchinson, 1989.
  • Herrington, Lewis. “The Debatable Land: Spies, Secrets and Persistent Shadows.” International Affairs 94, no. 3 (2018): 645–655. doi:10.1093/ia/iiy061.
  • Heuser, Angsar. “Head of Division for Technical Reconnaissance.” Operation Thesaurus/Rubicon, BND Oral History, 2009.
  • Karabell, Zachary. Architects of Intervention: The United States, the Third World, and the Cold War, 1946–1962. Baton Rouge: Louisiana State University Press, 1999.
  • Kolko, Gabriel. Confronting the Third World: United States Foreign Policy 1945–1980. New York: Pantheon, 1988.
  • Kothari, Uma, and Rorden Wilkinson. “Colonial Imaginaries and Postcolonial Transformations: Exiles, Bases, Beaches.” Third World Quarterly 31, no. 8 (2010): 1395–1412. doi:10.1080/01436597.2010.538239.
  • Krasner, S. D. Structural Conflict: The Third World against Global Liberalism. Berkeley: University of California Press, 1985.
  • Lockhart, James. Chile, the CIA and the Cold War: A Transatlantic Perspective. Edinburgh: Edinburgh University Press, 2019.
  • Maddrell, Paul. “What We Have Discovered about the Cold War Is What we Already Knew.” Cold War History 5, no. 2 (2005): 235–258. doi:10.1080/14682740500062127.
  • Maguire, T. The Intelligence–Propaganda Nexus: British and American Covert Action in Cold War Southeast Asia. Oxford: Oxford University Press, 2020.
  • Matin, Kamran. “Uneven and Combined Development in World History: The International Relations of State-Formation in Premodern Iran.” European Journal of International Relations 13, no. 3 (2007): 419–447. doi:10.1177/1354066107080132.
  • McGarr, P. “‘Quiet Americans in India’: The CIA and the Politics of Intelligence in Cold War South Asia.” Diplomatic History 38, no. 5 (2014): 1046–1082. doi:10.1093/dh/dht131.
  • Melman, Seymour. Pentagon Capitalism: The Political Economy of War. New York: McGraw, 1970.
  • Miller, Greg. “The Intelligence Coup of the Century: For Decades, the CIA Read the Encrypted Communications of Allies and Adversaries.” Washington Post, February 10, 2020.
  • Moran, C. Classified: Secrecy and the State in Modern Britain. Cambridge: Cambridge University Press, 2016.
  • Müller, Peter F., David Ridd, Erich Schmidt-Eenboom, and Richard J. Aldrich. “Operation Rubicon: Sixty Years of German–American Success in Signals Intelligence.” Intelligence and National Security 35, no. 5 (2020): 603–604. doi:10.1080/02684527.2020.1774849.
  • NSA (US National Security Agency). “Draft Report of Visit to Crypto AG (Hagelin) by William F. Friedman.” Top Secret, March 15, 1955. https://nsarchive2.gwu.edu//dc.html?doc=6773844-National-Security-Archive-Doc-6-NSA-Draft-Report
  • Phythian, Mark. The Politics of British Arms Sales since 1964. Manchester: Manchester University Press, 2000.
  • Rabe, Stephen G. The Most Dangerous Area in the World: John F. Kennedy Confronts Communist Revolution in Latin America. Chapel Hill: University of North Carolina Press, 1999.
  • Rezk, Dina. “Egypt’s Spy Chiefs: Servants or Leaders?” In Intelligence Leaders in Europe, the Middle East, and Asia, edited by Paul Maddrell. Washington, DC: Georgetown University Press, 2018.
  • Richterova, Daniela, Mikuláš Pešta and Natalia Telepnava. “Banking on Military Assistance: Czechoslovakia’s Struggle for Influence and Profit in the Third World 1955–1968.” The International History Review, 2020. doi:10.1080/07075332.2020.1763422.
  • Riek, Herbert. “Minerva.” BND Oral History, June, 2011.
  • Rosenberg, Justin. “The ‘Philosophical Premises’ of Uneven and Combined Development.” Review of International Studies 39, no. 3 (2013): 569–597. doi:10.1017/S0260210512000381.
  • Shane, Scott, and Tom Bowman. “Rigging the Game: Spy Sting.” Baltimore Sun, December 10, 1995.
  • Sherman, David. “The National Security Agency and the William F. Friedman Collection.” Cryptologia 41, no. 3 (2017): 195–238. doi:10.1080/01611194.2016.1169458.
  • Shiraz, Zakia. “Drugs and Dirty Wars: Intelligence Cooperation in the Global South.” Third World Quarterly 34, no. 10 (2013): 1749–1766. doi:10.1080/01436597.2013.851886.
  • SM-2721-52, Memo of the Reps. of the British COS. “Report of the UK/US Communications Security Conference, 1952.” JCS.1951-3, CCS311 (1-10-42) Sec.15, RG218, NARA, 1953.
  • Smidt, Wolbert. BND Oral History, Operation Thesaurus, Experiences of the Party Responsible of BND Operations 1973–80, 2009.
  • Smith, Michael. The Secrets of Station X. London: Biteback, 2011.
  • Stockton, B. Flawed Patriot: The Rise and Fall of CIA Legend Bill Harvey. Washington: Potomac, 2006.
  • T225/2074. “Provision of On-Line Cryptographic Equipment for NATO.” Note of a Meeting in Mr Trend's Room at the Treasury, 73/155/01, UKTNA, July 07, 1962.
  • T225/2074. “Provision of On-Line Cryptographic Equipment for NATO.” Note of a Meeting July 10, 1962. TNA.
  • T225/2074. “Stephenson to Trend.” UKTNA, June 29, 1962
  • Theveßen, Elmar, P. F. Müller, and Ulrich Stoll. “#Cryptoleaks: How BND and CIA Deceived Everyone.” “Operation ‘Rubikon’” February 11, 2020.
  • van derPijl, Kees. Global Rivalries from the Cold War to Iraq. London: Pluto, 2006.
  • Voegele, Nicole, and Endres Fiona. “Cryptoleaks.” SRF. February 12, 2020. https://www.srf.ch/news/schweiz/geheimdienstaffaere-cryptoleaks-wie-seid-ihr-an-die-cia-dokumente-gekomme.
  • Walton, Calder. Empire of Secrets: British Intelligence, the Cold War, and the Twilight of Empire. London: Collins, 2014.
  • Willmetts, Simon. “The CIA and the Invention of Tradition.” Journal of Intelligence History 14, no. 2 (2015): 112–128. doi:10.1080/16161262.2015.1032499.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.