{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,4]],"date-time":"2026-01-04T22:52:42Z","timestamp":1767567162715},"reference-count":47,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Cryptologia"],"published-print":{"date-parts":[[2024,5,3]]},"DOI":"10.1080\/01611194.2022.2156311","type":"journal-article","created":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T11:01:57Z","timestamp":1673866917000},"page":"252-281","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":1,"title":["Review of\n            <i>Behind the Enigma<\/i>\n            by John FerrisFerris, John.\n            <i>Behind the Enigma. The Authorized History of GCHQ, Britain\u2019s Secret Cyber-Intelligence Agency<\/i>\n            . Bloomsbury Publishing, New York, NY, 2020. 823 pages, Hardcover, $36. ISBN 978-1-63557-465-4."],"prefix":"10.1080","volume":"48","author":[{"given":"Philip","family":"Marks","sequence":"first","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2023,1,16]]},"reference":[{"key":"e_1_3_3_2_1","volume-title":"The secret sentry: The untold history of the National Security Agency","author":"Aid M. M.","year":"2009","unstructured":"Aid, M. M. 2009. The secret sentry: The untold history of the National Security Agency. New York: Bloomsbury Press."},{"key":"e_1_3_3_3_1","volume-title":"GCHQ: The uncensored history of Britain\u2019s most secret intelligence agency","author":"Aldrich R. J.","year":"2010","unstructured":"Aldrich, R. J. 2010. GCHQ: The uncensored history of Britain\u2019s most secret intelligence agency. London: HarperPress."},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/02684527.2021.1899636"},{"key":"e_1_3_3_5_1","unstructured":"Alexander C. H. O. 1945. Cryptographic history of work on the German Naval Enigma. The National Archives HW 25\/1."},{"key":"e_1_3_3_6_1","unstructured":"Anderson D. 2016. QC. Report of the bulk powers review. https:\/\/www.gov.uk\/government\/publications\/investigatory-powers-bill-bulk-powers-review (accessed Jan 27th 2022)."},{"key":"e_1_3_3_7_1","volume-title":"Defend the realm","author":"Andrew C.","year":"2009","unstructured":"Andrew, C. 2009. Defend the realm. New York: Alfred A. Knopf. Originally published in Great Britain as The defence of the realm by Allen Lane, London. ISBN 978-0-71399-885-6."},{"key":"e_1_3_3_8_1","volume-title":"Dilly: The man who broke enigmas","author":"Batey M.","year":"2009","unstructured":"Batey, M. 2009. Dilly: The man who broke enigmas. London: Biteback Publishing."},{"key":"e_1_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2020.1736205"},{"key":"e_1_3_3_10_1","volume-title":"Code warriors: NSA\u2019s codebreakers and the secret intelligence war against the Soviet Union","author":"Budiansky S.","year":"2016","unstructured":"Budiansky, S. 2016. Code warriors: NSA\u2019s codebreakers and the secret intelligence war against the Soviet Union. New York: Alfred A. Knopf."},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780192840554.001.0001"},{"key":"e_1_3_3_12_1","volume-title":"Machine cryptography and modern cryptanalysis","author":"Deavours C. A.","year":"1985","unstructured":"Deavours, C. A., and L. Kruh. 1985. Machine cryptography and modern cryptanalysis. Norwood, MA: Artech House."},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119091864814"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/02684527.2020.1774853"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611190008984234"},{"key":"e_1_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-110391891793"},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611190600920944"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-110391891928"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118791862063"},{"key":"e_1_3_3_20_1","volume-title":"Intelligence and strategy, selected essays","author":"Ferris J.","year":"2005","unstructured":"Ferris, J. 2005. Intelligence and strategy, selected essays. Oxford and New York: Routledge."},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1057\/9780230510142"},{"key":"e_1_3_3_22_1","volume-title":"Gordon Welchman: Bletchley Park\u2019s architect of Ultra intelligence","author":"Greenberg J.","year":"2014","unstructured":"Greenberg, J. 2014. Gordon Welchman: Bletchley Park\u2019s architect of Ultra intelligence. Barnsley: Frontline Books."},{"key":"e_1_3_3_23_1","volume-title":"Herivelismus and the German military enigma","author":"Herivel J.","year":"2008","unstructured":"Herivel, J. 2008. Herivelismus and the German military enigma. Kidderminster, UK: M&M Baldwin."},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119691884997"},{"key":"e_1_3_3_25_1","volume-title":"British intelligence in the Second World War: Its influence on strategy and operations","author":"Hinsley H.","year":"1979","unstructured":"Hinsley, H., et\u00a0al. 1979. British intelligence in the Second World War: Its influence on strategy and operations. Vol. 1. New York: Cambridge University Press."},{"key":"e_1_3_3_26_1","volume-title":"Codebreakers: The inside story of Bletchley Park","author":"Hinsley F. H.","year":"1994","unstructured":"Hinsley, F. H., and A. Stripp. 1994. Codebreakers: The inside story of Bletchley Park. Oxford: Oxford University Press."},{"key":"e_1_3_3_27_1","unstructured":"Hosgood S. 2007. All you wanted to know about Banburismus but were afraid to ask. Accessed May 6 2022. https:\/\/web.archive.org\/web\/20160309155544\/http:\/\/stoneship.org.uk\/\u223csteve\/banburismus.html"},{"key":"e_1_3_3_28_1","first-page":"T2755","volume-title":"Bestand R\u00fcckgabe TICOM, Politisches Archiv des Ausw\u00e4rtigen Amts","author":"In\/7 War Diaries.","year":"1941","unstructured":"In\/7 War Diaries. 1941. Bestand R\u00fcckgabe TICOM, Politisches Archiv des Ausw\u00e4rtigen Amts, T2755\u2013T2767. Berlin: Archive Signature."},{"key":"e_1_3_3_29_1","volume-title":"The secret history of MI6","author":"Jeffery K.","year":"2010","unstructured":"Jeffery, K. 2010. The secret history of MI6. The Penguin Press, New York."},{"key":"e_1_3_3_30_1","volume-title":"Seizing the enigma: The race to break the German U-Boat Codes, 1939\u20131943","author":"Kahn D.","year":"1991","unstructured":"Kahn, D. 1991. Seizing the enigma: The race to break the German U-Boat Codes, 1939\u20131943. Boston: Houghton Mifflin."},{"key":"e_1_3_3_31_1","volume-title":"Enigma","author":"Kozaczuk W.","year":"1979","unstructured":"Kozaczuk, W. 1979. Enigma. Lanham, MD: University Publications of America."},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MAHC.2006.34"},{"key":"e_1_3_3_33_1","volume-title":"The history of Hut 8. TNA HW 25\/2. Also at NARA","author":"Mahon A. P.","year":"1945","unstructured":"Mahon, A. P. 1945. The history of Hut 8. TNA HW 25\/2. Also at NARA. College Park, MD: RG457, Historic Cryptographic Collection, NR4685. http:\/\/www.ellsbury.com\/hut8\/hut8-000.htm."},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-110191889842"},{"key":"e_1_3_3_35_1","unstructured":"Miller G. 2020. The intelligence coup of the century. Washington Post February 11. (Project Rubicon formerly Thesaurus)."},{"key":"e_1_3_3_36_1","volume-title":"Breaking Teleprinter Ciphers at Bletchley Park: An edition of I. J. Good, D. Michie and G. Timms: General Report on Tunny with Emphasis on Statistical Methods (1945)","author":"Reeds J. A.","year":"2015","unstructured":"Reeds, J. A., W. Diffie, and J. V. Field. 2015. Breaking Teleprinter Ciphers at Bletchley Park: An edition of I. J. Good, D. Michie and G. Timms: General Report on Tunny with Emphasis on Statistical Methods (1945). Hoboken, NJ: Wiley."},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118291856867"},{"key":"e_1_3_3_38_1","unstructured":"Small A. W. 1944. Capt. Walter J. Fried reports\/SSA liaison With GCCS. NARA College Park Maryland RG457 Historic Cryptographic Collection: NR4612. See Fried Report #116. https:\/\/catalog.archives.gov\/id\/2809159"},{"key":"e_1_3_3_39_1","doi-asserted-by":"crossref","unstructured":"Travis E. 1943. Memorandum dated February 18 1943. TNA HW 14\/67.","DOI":"10.1002\/j.1834-4461.1943.tb00398.x"},{"key":"e_1_3_3_40_1","unstructured":"Turing A. M. 1939\u20131942. Mathematical theory of ENIGMA machine. TNA HW 25\/3."},{"key":"e_1_3_3_41_1","unstructured":"Tutte. 1998. Fish and I. https:\/\/uwaterloo.ca\/combinatorics-and-optimization\/sites\/ca.combinatorics-and-optimization\/files\/uploads\/files\/corr98-39.pdf. Accessed March 13 2022."},{"key":"e_1_3_3_42_1","unstructured":"Volmers E. 2020. U of C professor takes a look Behind the Enigma with first authorized history of Britain\u2019s secret cyber-intelligence agency. Calgary Herald December 4."},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-59663-6_3"},{"key":"e_1_3_3_44_1","volume-title":"The Hut 6 story","author":"Welchman G.","year":"1982","unstructured":"Welchman, G. 1982. The Hut 6 story. London: Allen Lane."},{"key":"e_1_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1080\/02684528608431842"},{"key":"e_1_3_3_46_1","volume-title":"The Sigint secrets","author":"West N.","year":"1986","unstructured":"West, N. 1986. The Sigint secrets. New York: William Morrow and Company."},{"key":"e_1_3_3_47_1","volume-title":"The Ultra secret","author":"Winterbotham F.","year":"1974","unstructured":"Winterbotham, F. 1974. The Ultra secret. London: Weidenfeld & Nicolson."},{"key":"e_1_3_3_48_1","volume-title":"Spycatcher: The candid autobiography of a senior intelligence officer","author":"Wright P.","year":"1987","unstructured":"Wright, P. 1987. Spycatcher: The candid autobiography of a senior intelligence officer. New York: Viking Penguin."}],"container-title":["Cryptologia"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01611194.2022.2156311","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,21]],"date-time":"2024-03-21T09:18:08Z","timestamp":1711012688000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01611194.2022.2156311"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,16]]},"references-count":47,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,5,3]]}},"alternative-id":["10.1080\/01611194.2022.2156311"],"URL":"https:\/\/doi.org\/10.1080\/01611194.2022.2156311","relation":{},"ISSN":["0161-1194","1558-1586"],"issn-type":[{"value":"0161-1194","type":"print"},{"value":"1558-1586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,16]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-01-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}