Premium

20.500.12592/dghxcj

Use of Special Intelligence by Official Historians. Report by the J.I.C.

1 Jul 1945

(c) To select and write histories of certain important battles, showing the extra information which our Special Intelligence Organisation gave to Commanders to complete their knowledge of the enemy. This, we consider, would be a manageable task which could be completed by our present indoctrinated staffs before they are dispersed. It would need to be done on an inter-Service basis in conjunction with the Government Code and Cipher school. Approach to Americans 8. We have no knowledge of the action the Americans propose to take in this matter, or if indeed they have yet considered it.
security germany historians signals second world war weapons development signals intelligence secrecy intelligence gathering joint staff mission joint intelligence sub-committee chiefs of staff anglo-american relations british domestic security intelligence reports communications interception victor cavendish-bentinck code-breaking john sinclair cyphers francis inglis edmund rushbrooke intelligence requirements official histories classified documents captured documents german archives
Collection ID
CAB81
Conflict
Second World War
Countries
Germany
Document Reference
CAB 81/130/10
Document Types
Report Directive Correspondence
File Reference
CAB 81/130
Identifier
10.1080/swwf.cab81.0130.010
Keywords
Historians Official Histories Intelligence Reports Classified Documents Security Captured Documents Secrecy German Archives Signals Communications Interception Intelligence Gathering Weapons Development Cyphers Intelligence Requirements Anglo-american Relations
Languages
English
Organizations
Chiefs of Staff Joint Intelligence Sub-Committee Joint Staff Mission
Pages
6
Persons Discussed
Victor Cavendish-Bentinck Francis Inglis Edmund Rushbrooke John Sinclair
Published in
United Kingdom
Series
War Cabinet Joint Intelligence Sub-Committee Memoranda. July - September 1945. Papers Numbers. JIC 216-280. Volume XL
Themes
British Domestic Security Signals Intelligence Code-breaking

Related Topics

All