Sin - Siz

 

Sinclair.

Singel, Ryan. "Point, Click ... Eavesdrop: How the FBI Wiretap Net Operates." Wired, 29 Aug. 2007. [http://www.Wired.com]

According to nearly a thousand pages of documents released under FOIA, the FBI's surveillance system, the Digital Collection System Network or DCSNet, is a "sophisticated, point-and-click surveillance system that performs instant wiretaps on almost any communications device." DCSNet "connects FBI wiretapping rooms to switches controlled by traditional land-line operators, internet-telephony providers and cellular companies. It is far more intricately woven into the nation's telecom infrastructure than observers suspected."

[FBI/00s/07]

Singer.

Singh, M.K. Indian Intelligence: Missing in Action. Delhi, India: Prashant Publishing House, 2012.

Peake, Studies 57.1 (Mar. 2013), says that in the absence of source notes, this book "must be used with caution. But for those interested in studying foreign intelligence services from an organizational and operational perspective, it provides a good starting point."

[OtherCountries/India]

Singh, V.K. [Maj. Gen.] India’s External Intelligence: Secrets of Research and Analysis Wing (RAW). New Delhi, India: Manas, 2007.

Peake, Studies 51.4 (2007), comments that the author gives us "insightful views of India's intelligence community that are worthy of serious attention and have much in common with the services of other democratic nations."

[OtherCountries/India]

Singh, Simon. "A Brief History of Cryptography from Caesar to Bletchley Park." In Colossus: The Secret of Bletchley Park's Codebreaking Computers, eds. B. Jack Copeland, et al., 9-17. Oxford & New York: Oxford University Press, 2006.

[Cryptography/Gen]

Singh, Simon. The Code Book : The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography. New York: Doubleday, 1999. London: Fourth Estate, 1999.

Steury, I&NS 15.4, says that this is "a truly remarkable history of the development of ciphers." The author "introduces some little-known incidents in the history of intelligence and does so in a fresh and interesting way." Unfortunately, "[t]he book is full of errors of fact, each of which is comparatively small, but which, taken together, call into question its general veracity.... [However,] none of the numerous errors it contains amount to a serious distortion of the history of ciphers."

Although he is bothered by the absence of footnotes, Kruh, Cryptologia 24.2, notes that the author combines "a storyteller's sense of drama with a scientist's ... appreciation for clear mathematical descriptions.... Singh offers an interesting, illustrated and up-to-date history of cryptology." Booklist, 1 Sep. 1999, finds that the author mixes "nicely balanced technical detail with vibrant storytelling." For Cohen, FA 78.6 (Nov.-Dec. 1999), the author "has done an excellent (and blessedly concise) job of retelling the history of code writing.... [H]e should be particularly commended for the book's graphics, which help explain ideas otherwise too abstruse for the lay reader."

[Cryptography/Gen]

Singlaub, John K. [MGEN/USA (Ret.)], and Malcolm McConnell. Hazardous Duty: An American Soldier in the Twentieth Century. New York: Summit, 1991. [pb] Old Tappan, NJ: Simon & Schuster, 1992.

On 20 March 2015, "[t]wo paver stones outlining the career of retired Maj. Gen. John K. Singlaub were installed outside the Airborne & Special Operations Museum" (ASOM) in Fayetteville, NC. The museum executive director "noted that ASOM policy limits veterans to be honored on only one paver, but an exception was made for Singlaub. 'We just couldn't do it,' he said of fitting Singlaub's career on one stone." Drew Brooks, "Retired Maj. Gen. John K. Singlaub Honored at Airborne & Special Operations Museum," Fayetteville Observer, 20 Mar. 2015.

Clark comment: John Singlaub is a political troglodyte of the first order, but saying that neither describes him nor does him justice. Singlaub's honesty and integrity are so real that they have an almost tangible quality. Foolish, he may have been but never false. From his jump into occupied France with the OSS (Bill Casey was his case officer) to postwar China with the CIA to Korea and Vietnam and back to Korea with two stars and an attitude, John Singlaub lived for service to the country he loves and believes in. The funny thing is that Carter's plan to withdraw U.S. ground forces from Korea really was ill-advised. His story after the end of his military career is much less interesting, even with the involvement in Iran-Contra. I would not choose to side with the General in a political discussion, but I sure would want him on my side in a fight.

Surveillant 1.6/2.6 says that "General Singlaub ... provides a window on four decades of overt and covert operations with personal accounts of the heroes and scoundrels of America's intelligence and military elite." For Gugliotta, WPNWE, 23-29 Sep. 1991, Singlaub is "on safe ground" as long as he sticks with narrating events, but his political commentary on events "remains shallow and one-dimensional." Despite working with most of the main characters in Iran-Contra, Singlaub "offers few fresh insights" into the affair.

[CIA/Memoirs; GenPostwar/80s/Iran-Contra; WWII/OSS/Individuals]

Sinha, Deepak [Brig.]. Beyond The Bayonet: Indian Special Operations Forces in the 21st Century. Delhi: Gyan Publishing House, 2006.

From publisher: "India has had extensive experience with [Special Operations Forces] with different Services and ministries having a vast array of such forces with no national perspective for the raising or employment of such forces. This study addresses these very aspects along with their relevance ... and suggests the way forward."

[OtherCountries/India]

Sinkov, Abraham.

1. Elementary Cryptanalysis. New York: Singer, 1968.

This is regarded as a classic work in the field of cryptology.

2. Elementary Cryptanalysis: A Mathematical Approach. 2d ed. Rev. and updated, Todd Feil. Washington, DC: Mathematical Association of America, 2009.

Christensen, Cryptologia 34.3 (Jul. 2010), finds that "[l]ittle harm" has been done to the original work, "but the added material -- two chapters at the end -- is not truly an update, and an update was not needed."

[Cryptography/Gen]

Sipress, Alan, and Vernon Loeb. "Bush Ends CIA's Role as Middle East Broker." Washington Post, 22 Mar. 2001, A25. [http://www.washingtonpost.com]

According to a senior administration official on 21 March 2001, President George W. Bush has ended "the CIA's high-profile role as a broker between Israeli and Palestinian security services." The CIA's "exceptional role ... has included passing intelligence information and complaints, pressing for closer coordination and arbitrating disputes over how to address specific threats.... But the agency's involvement had been waning even before the Bush administration decided to end it." Intelligence officials "say they are pleased to be relieved of the task."

[CIA/90s/99/Mideast; CIA/00s/01Gen]

Sipress, Alan, and Vernon Loeb. "CIA's Stealth War Centers on Eroding Taliban Loyalty and Aiding Opposition." Washington Post, 10 Oct. 2001, A1. "The CIA's Stealth War: U.S. Covert Efforts Include Winning the Loyalty of Taliban Defectors." Washington Poat National Weekly Edition, 15-21 Oct. 2001, 6.

According to administration officials, the CIA has launched an effort "in the parts of Afghanistan where the ruling Taliban is most deeply rooted in the local ethnic Pashtun community ... to win the loyalty of dissident Taliban commanders through the use of money or fear.... The success of this strategy could turn on the intelligence efforts and intimate cooperation of Pakistan.... That prospect received a crucial boost" on 7 October 2001 when Pakistani President Gen. Pervez Musharraf "ousted several influential intelligence and military leaders who remained close to the Taliban, most notably purging Gen. Mahmoud Ahmed of the Interservices Intelligence Agency."

[CIA/00s/01/Gen; OtherCountries/Pakistan; Terrorism/01/WTC]

Sirrs, Owen L. A History of the Egyptian Intelligence Service: A History of the Mukhabarat, 1910-2009. London: Routledge, 2010. 2011. [pb]

Peake, Studies 55.1 (Mar. 2011) and Intelligencer 19.1 (Winter-Spring 2012), says that this "fine, well-documented voume ... adds significantly to public knowledge" of the Egyptian intelligence service.

[OtherCountries/Egypt]

Sirseloudi, Matenia P. "How to Predict the Unpredictable: On the Early Detection of Terrorist Campaigns." Defense & Security Analysis 21 (Dec. 2005): 369-385.

[Analysis/Warning; Terrorism/00s]

Sixsmith, Martin. The Litvinenko File: The Life and Death of a Russian Spy. New York: St. Martin's Press, 2007.

Goulden, Washington Times, 24 Jun. 2007, and Intelligencer 15.3 (Summer-Fall 2007), says that Sixsmith "gives a superb picture of how Russian intrigue has spilled over into the rest of Europe as rival business factions compete for riches." For Peake, Studies 51.3 (2007), the author "does a plausible job" of explaining "how and why Litvinenko was killed." However, he leaves the answer to who was responsible "in a haze of speculation."

[Russia/Overviews/00s]

Return to S Table of Contents

Return to Alphabetical Table of Contents