Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jan Bury is active.

Publication


Featured researches published by Jan Bury.


Cryptologia | 2011

From the Archives: Breaking OTP Ciphers

Jan Bury

Abstract A former Cold War Polish SIGINT document suggests that the Poles were aware that their OTP ciphers could be broken by an adversary under specific circumstances.


Cryptologia | 2008

From the Archives: Inside a Cold War Crypto Cell. Polish Cipher Bureau in the 1980s

Jan Bury

Abstract A late Cold War document depicting the Polish Ministry of Interior Cipher Bureaus organization and duties is presented.


Cryptologia | 2011

Operation Stonka. An Ultimate Deception Spy Game

Jan Bury

Abstract The article discusses a Cold War counterintelligence operation conducted by Polish and Soviet secret services against the Stepan Bandera Faction of the Ukrainian Nationalists Organization between 1959 and 1961. It emphasizes the methods implemented and used by communist security services, including signals intelligence, as well as the mistakes committed by the Ukrainian party. The article also briefs the measures related to code breaking employed during the operation.


Cryptologia | 2010

Operation Lotos: An Unsuccessful Attempt on U.S. Government Communications

Jan Bury

Abstract The article discusses the late Cold War joint Polish security and East German Stasi signals intelligence operation against U.S. wireless communications lines in light of the files available at the Polish Institute of National Remembrance. It emphasizes the factors that contributed to the unsuccessful outcome of their efforts. The text also briefs measures related to signals intelligence and operational security applied by the communist secret services.


Cryptologia | 2007

From the Archives: The U.S. and West German Agent Radio Ciphers

Jan Bury

Abstract The translation of an in-house research paper of the communist Polish counterintelligence depicting the ciphers and the one-way radio communications patterns used by the U.S. and West German intelligence services against Poland in the 1960s and early 1970s is presented.


Cryptologia | 2014

Pinpointing the Mark: On the Cold War SIGINT Capability

Jan Bury

Abstract This article discusses a 1961 East German Stasi operation, which culminated in detecting a West German agent. It emphasizes the capabilities of Cold War signals intelligence in counterintelligence work. The material also briefs the measures related to operational security of the assets.


Cryptologia | 2012

Polish Cold War Codebreaking of 1959–1989: A Preliminary Assessment

Jan Bury

Abstract This article is an attempt to assess the broad scope of communist Polish code breaking during the middle and late periods of the Cold War. Based on the recently released documents available now at the Polish Institute of National Remembrance, it portrays the ‘civilian’ intelligence codebreaking sections achievements and challenges, particularly between 1959 and 1989. The text suggests numerous successes of communist Polish codebreakers in defeating cryptosystems used by various European and non-European countries, particularly the Hagelin CX-52, and details the possible methods and tools utilized by Cold War Poles that facilitated the exploits. It proves that even a country with limited resources from behind the Iron Curtain can easily defeat strong cryptography.


Cryptologia | 2012

Assembling the Puzzle Game: The Jacek Jurzak Spy Case

Jan Bury

Abstract This article discusses a late Cold War espionage case involving a Polish citizen. It emphasizes the communications matters including the ciphers and secret writing techniques. The analysis also elaborates on the reasons for compromise, which led to the calamitous fate of the asset.


Cryptologia | 2012

Project Kalina: The Lotos Operation Conundrum

Jan Bury

Abstract The article discusses the late 1980s aftermath of a Cold War Polish and East German signals intelligence operation against US covert communications lines. The release of new files available now at the Polish Institute of National Remembrance allowed broader analysis of the problems and challenges encountered by Cold War Poles with respect to the then advanced technology used by their adversary. The text also briefs the measures undertaken by Cold War Polish security and its capabilities, also in the budget sphere.


Cryptologia | 2009

Breaking Unbreakable Ciphers. The Asen Georgiyev Spy Case

Jan Bury

Abstract The article discusses a Cold War spy case involving a Bulgarian national according to the documents preserved at the Polish Institute of National Remembrance. It details the modus operandi of both the US and Eastern Block secret services and the mistakes committed by both parties, which led to an agents disclosure. The article also details measures and conclusions drawn by the Eastern Block services in the aftermath of the case.

Collaboration


Dive into the Jan Bury's collaboration.

Top Co-Authors

Avatar

Brian J. Winkel

United States Military Academy

View shared research outputs
Top Co-Authors

Avatar

Chris Christensen

Northern Kentucky University

View shared research outputs
Top Co-Authors

Avatar

Craig P. Bauer

York College of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ronald L. Rivest

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Russell Atkinson

United States Military Academy

View shared research outputs
Top Co-Authors

Avatar

Yvo Desmedt

University of Texas at Dallas

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge