About: OP-20-G     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : umbel-rc:Troop_MilitaryUnit, within Data Space : dbpedia.demo.openlinksw.com associated with source document(s)
QRcode icon
http://dbpedia.demo.openlinksw.com/describe/?url=http%3A%2F%2Fdbpedia.org%2Fresource%2FOP-20-G

OP-20-G or "Office of Chief Of Naval Operations (OPNAV), 20th Division of the Office of Naval Communications, G Section / Communications Security", was the U.S. Navy's signals intelligence and cryptanalysis group during World War II. Its mission was to intercept, decrypt, and analyze naval communications from Japanese, German, and Italian navies. In addition OP-20-G also copied diplomatic messages of many foreign governments. The majority of the section's effort was directed towards Japan and included breaking the early Japanese "Blue" book fleet code. This was made possible by intercept and High Frequency Direction Finder (HFDF) sites in the Pacific, Atlantic, and continental U.S., as well as a Japanese telegraphic code school for radio operators in Washington, D.C.

AttributesValues
rdf:type
rdfs:label
  • مكتب رئيس العمليات البحرية (ar)
  • Op-20-G (de)
  • OP-20-G (fr)
  • OP-20-G (en)
rdfs:comment
  • OP-20-G أو ‹‹مكتب رئيس العمليات البحرية OPNAV، الشعبة العشرون في مكتب الاتصالات البحرية، قسم جي/ أمن الاتصالات››، مجموعة الاستخبارات وتحليل الإشارات بالبحرية الأمريكية خلال الحرب العالمية الثانية. وكانت مهمّتها اعتراض الاتصالات البحرية وفك تشفيرها وتحليلها من القوات البحرية اليابانية والألمانية والإيطالية. بالإضافة إلى ذلك، نسخ OP-20-G الرسائل الدبلوماسية للعديد من الحكومات الأجنبية. وُجِهت معظم جهود الأقسام صوب اليابان وتضمّنت فك شفرة أسطول الكتاب ‹‹الأزرق›› الياباني مبكرًا. أصبح هذا ممكنًا عن طريق مواقع اعتراض المعلومات ومواقع الباحث عن التردد العالي (HFDF) في المحيط الهادئ والأطلسي والقارة الأمريكية، فضلاً عن مدرسة تشفير البرقيات اليابانية لمشغلي الراديو في واشنطن العاصمة. (ar)
  • OP-20-G or "Office of Chief Of Naval Operations (OPNAV), 20th Division of the Office of Naval Communications, G Section / Communications Security", was the U.S. Navy's signals intelligence and cryptanalysis group during World War II. Its mission was to intercept, decrypt, and analyze naval communications from Japanese, German, and Italian navies. In addition OP-20-G also copied diplomatic messages of many foreign governments. The majority of the section's effort was directed towards Japan and included breaking the early Japanese "Blue" book fleet code. This was made possible by intercept and High Frequency Direction Finder (HFDF) sites in the Pacific, Atlantic, and continental U.S., as well as a Japanese telegraphic code school for radio operators in Washington, D.C. (en)
  • Op-20-G (gelegentlich auch geschrieben OP‑20‑G) war die Bezeichnung einer speziellen Arbeitsgruppe der US Navy, also der Kriegsmarine der Vereinigten Staaten von Amerika, deren Hauptaufgabe während der Zeit des Zweiten Weltkriegs in der Kryptanalyse und Signals Intelligence bestand. Op‑20‑G ist die Abkürzung für „Office of Chief of Naval Operations (OPNAV), 20th Division of the Office of Naval Communications, G Section / Communications Security“. Hauptsitz war das Navy Department building in der amerikanischen Hauptstadt Washington und ab 1942 ein Gebäudekomplex an der Nebraska Avenue, in starker Untertreibung als Naval Communications Annex („Marinekommunikations-Annex“) bezeichnet, in dem CSAW wirkte, die Communications Supplementary Activity (Washington). (de)
  • L'OP-20-G, abréviation de Office of Chief Of Naval Operations (OPNAV), 20th Division, Office of Naval Communications, G Section / Communications Security fut le service de renseignement électronique et de cryptanalyse de l'United States Navy pendant la Seconde Guerre mondiale. L'OP-20-G est en concurrence avec le SIS « US Army Signal Intelligence Service (Service de renseignements des Transmissions de l'armée de terre) », d'une part, les Coast Guards, le FBI et la FCC (Federal Communications Commission) d'autre part. Tous mènent leurs propres opérations de radio-interception. (fr)
foaf:name
  • OP-20-G (en)
dcterms:subject
Wikipage page ID
Wikipage revision ID
Link from a Wikipage to another Wikipage
Faceted Search & Find service v1.17_git139 as of Feb 29 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 08.03.3330 as of Mar 19 2024, on Linux (x86_64-generic-linux-glibc212), Single-Server Edition (378 GB total memory, 52 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software