General Overviews

I - M

Kahn, David.

1. How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code. Boca Raton, FL: CRC Press, 2014,

From "Foreword" (p. XII): this work is a "collection of essays, all o]previously published but never before collected in a single volume."

2. "Intelligence." American Committee on the History of the Second World War Newsletter 11 (Dec. 1973): 6-8. [Petersen]

3. "Intelligence in World War II: A Survey." Journal of Intelligence History 1, no. 1 (Summer 2001). []

From abstract: "Kahn provides an overview of the strengths and weaknesses, successes and failures of various intelligence activities and their impact on the outcome of World War II.... During the war, the Anglo-Americans increasingly intensified their intelligence activities while the more hierarchically organized German services proved to be less and less efficient. Intelligence ... unquestionably played a decisive part in winning the war."

4. "The Significance of Codebreaking and Intelligence in Allied Strategy and Tactics." Cryptologia 1, no. 3 (Jul. 1977): 209-222.

According to Sexton, the author "downplays the idea of ULTRA as the decisive factor in the Allies' victory over Germany."

5. ed. "From the Archives: Codetalkers Not Wanted." Cryptologia 29, no. 1 (Jan. 2005): 76-87.

Kahn introduces and presents some documents pertaining to the use (or non-use) of Native Americans as codetalkers for secrecy in radiotelephonic communications by the military in World War II.

Kahn, Martin. "Assessing an Ally and Potential Enemy: U.S. Estimates of Soviet War Potential During World War II." International Journal of Intelligence and CounterIntelligence 27, no. 4 (Winter 2014): 720-751.

Kern, Gary. "The Lessons of History: How 'Uncle Joe' Bugged FDR." Studies in Intelligence 47, no. 1 (2003): 19-31.

At the conference in Teheran in November 1943 and at the conference at Yalta in February 1945, President Roosevelt "stayed in Soviet quarters and was bugged like no other American president in history."

Kimball, Warren F., ed. America Unbound: World War II and the Making of a Superpower. New York: St. Martin's, 1992.

Surveillant 2.6: Of the nine papers in this book, two discuss intelligence organizations: Bradley F. Smith, "America and Wartime Changes in Intelligence"; and Hayden B. Peake, "Soviet Espionage in the Office of Strategic Services."

Kirkpatrick, Lyman B., Jr. Captains Without Eyes: Intelligence Failures in World War II. New York: Macmillan, 1969. London: Rupert Hart-Davis, 1969.

Clark comment: This book presents cases studies of Barbarossa, Pearl Harbor, Dieppe, Arnhem, and the Battle of the Bulge. According to Pforzheimer, much of this "is now more comprehensively presented by later declassified information." Similarly, Constantinides refers readers to more recent accounts of each of the failures Kirkpatrick discusses.

Lawson, Don. The Secret World War II. New York: Watts, 1978. "Discusses World War II espionage activities including intelligence personnel, codes and ciphers, and propaganda."

Leshuk, Leonard. US Intelligence Perceptions of Soviet Power, 1921-1946. London: Frank Cass, 2002.

Hanyok, I&NS 18.3, notes that the author concentrates on U.S. perceptions of "the development of the Soviet military power" from the end of World War I to the beginning of the Cold War. The story presented "is one of almost constant and large-scale failure."

McRaven, William H. [ADM/USN] Special Operations -- Case Studies in Special Operations Warfare: Theory and Practice. Novato, CA: Presidio, 1995.

Mehl, Donald E.

1. The Green Hornet: America's Unbreakable Code for Secret Telephony -- The Untold Story of World War II, The U.S. Army Signal Corps SIGALY System. Kansas City, MO: D.E. Mehl, 1997.

Kruh, Cryptologia 24.2, finds this to be "a marvelously detailed look at a little known aspect of WWII cryptologic history." According to the reviewer, the Green Hornet was the nickname for the U.S. Signal Corps' Sigaly secret communications system, also called Project X by Bell Laboratories and the "X" System by the Army General Staff. Based on a new digital technology, the system was used for telephone conversations between President Roosevelt and Prime Minister Churchill and by the top levels of military and civilian officials for conferences between Washington and the theaters of war.

2. Top Secret Communications of World War II: Unbreakable Encryption for Secret High-Level Conferences; SISALY - The Green Hornet: Secure Telephone Conferences; SIGTOT: Teletype Cryptographic System; The Beginning of the Digital Age. Raymore, MO: D.E. Mehl, 2002.

Kruh, Cryptologia 28.1, says that the author "provides a comprehensive history of ... two of the most top-secret communications systems of World War II.... This is an outstanding, detailed book."

Mercier-Bernadet, Fabienne, ed. 1939-1945: La Guerre des Intelligences. [1939-1945: The Intelligence War] Panazol: LaVauzelle, 2002. [Kahn, I&NS 23.2 (Apr. 2008)]

Murphy, Robert. Diplomat among Warriors. New York: Doubleday, 1964. Westport, CT: Greenwood Reprint, 1976.

Murphy served as President Roosevelt's plenipotentiary in French North Africa during World War II.

Return to WWII General Table of Contents