enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Book cipher - Wikipedia

    en.wikipedia.org/wiki/Book_cipher

    In John Le Carre's A Perfect Spy, the protagonist Magnus Pym uses a book cipher based on the German text Simplicissimus. In the book Red Dragon, Hannibal Lecter uses a book code to encrypt a message to the Tooth Fairy killer, with the message containing the home address of Will Graham, who is investigating the case, and the message, "Save ...

  3. CIA cryptonym - Wikipedia

    en.wikipedia.org/wiki/CIA_cryptonym

    [citation needed] TRIGON, for example, was the code name for Aleksandr Ogorodnik, a member of the Ministry of Foreign Affairs in the former Soviet Union, whom the CIA developed as a spy; [4] HERO was the code name for Col. Oleg Penkovsky, who supplied data on the nuclear readiness of the Soviet Union during the Cuban Missile Crisis of 1962. [5]

  4. David Kahn (writer) - Wikipedia

    en.wikipedia.org/wiki/David_Kahn_(writer)

    David Kahn was born in New York City to Florence Abraham Kahn, a glass manufacturer, and Jesse Kahn, a lawyer, and grew up in Great Neck, NY on Long Island. [2]Kahn said he traced his interest in cryptography to reading Fletcher Pratt's Secret and Urgent (1939) as a boy. [2]

  5. David Wise (journalist) - Wikipedia

    en.wikipedia.org/wiki/David_Wise_(journalist)

    David Wise (May 10, 1930 – October 8, 2018) was an American journalist and author who worked for the New York Herald-Tribune in the 1950s and 1960s, and published a series of non-fiction books on espionage and US politics as well as several spy novels. [1] His book The Politics of Lying: Government Deception, Secrecy, and Power (1973) won the ...

  6. Secret Coders - Wikipedia

    en.wikipedia.org/wiki/Secret_Coders

    Secret Coders is a series of graphic novels that combines logic puzzles, basic programming instruction, and a story where a group of seventh graders uncover a secret coding school. The series is written by Gene Luen Yang , illustrated by Mike Holmes, and published by First Second Books .

  7. Canary trap - Wikipedia

    en.wikipedia.org/wiki/Canary_trap

    According to the book Spycatcher [8] by Peter Wright (published in 1987), the technique is standard practice that has been used by MI5 (and other intelligence agencies) for many years, under the name "barium meal test". A barium meal test is more sophisticated than a canary trap because it is flexible and may take many different forms.

  8. Poem code - Wikipedia

    en.wikipedia.org/wiki/Poem_code

    Between Silk and Cyanide by Leo Marks, HarperCollins (1998), ISBN 0-00-255944-7.Marks was the Head of Codes at SOE and this book is an account of his struggle to introduce better encryption for use by field agents. it contains more than 20 previously unpublished code poems by Marks, as well as descriptions of how they were used and by whom.

  9. H. Keith Melton - Wikipedia

    en.wikipedia.org/wiki/H._Keith_Melton

    Melton has additionally authored many books with Jim Wiese. The Ultimate Spy Book. London: DK, 1996. Ultimate Spy. London: DK, 2002. Spycraft: The Secret History of the CIA's Spytechs, from Communism to Al-Qaeda. New York: Dutton, 2008. Audiobook available. The Spy's Guide to Escape and Evasion. New York: Scholastic, 2003.