Search

Station HYPO

Celebrating the Past, Present and Future of Navy Cryptology

Remembering China Hainon Island Incident

Lt. Shane Osborn:
Looking at a Miracle

“Standing in the sweltering heat of the Lingshui taxi ramp, I realized
I was looking at a miracle!” —Lt. Shane Osborn

Continue reading “Remembering China Hainon Island Incident”

Easter on Mount Suribachi, Iwa Jima, April 1, 1945

The Battle of Iwo Jima, fought between February 19 and March 26, 1945, stands as one of the most intense and iconic confrontations of World War II. Located approximately 750 miles south of Tokyo, Iwo Jima was a small, volcanic island strategically important to both the United States and Japan. For the U.S., capturing the island meant securing a vital forward base for air operations in the Pacific, while for Japan, it represented a key defensive outpost guarding the home islands. The ensuing battle would become one of the bloodiest and most fiercely contested of the entire war.

Pictured are Marines and Navy Seabees attending Easter services atop Mount Suribachi on blood-stained Iwo Jima, while fellow Marines and Soldiers were assaulting Okinawa a few hundred miles away.

Sundown for Fleet Air Reconnaissance Squadron One

Fleet Air Reconnaissance Squadron One (VQ-1), known as the World Watchers, deactivate on 31 March 2025. A deactivation ceremony was held at Naval Air Station (NAS) Whidbey Island (WA) on 28 March 2025.

Continue reading “Sundown for Fleet Air Reconnaissance Squadron One”

The Loss—and the Mysteries—of the K-129

The disappearance of a Soviet submarine in the Pacific—and the CIA’s clandestine effort to retrieve the wreck—remains one of the most intriguing chapters in the story of the Cold War. Here is an inside account from a former submarine officer who was there.

By Captain Jack G. Newman, U.S. Navy Reserve (Retired)

Continue reading “The Loss—and the Mysteries—of the K-129”

End-to-End Encryption: A Secure Form of Asymmetric Encryption

In an era where data privacy is a major concern, End-to-End Encryption (E2EE) has become a crucial technology to protect user communications from unauthorized access. At its core, E2EE relies on asymmetric encryption, which uses a pair of cryptographic keys—one public and one private—to ensure secure communication between parties. Because the Signal app has been in the news recently, this article explores how asymmetric encryption works in E2EE, how public and private keys function, and some of the most popular applications implementing this security measure.

Continue reading “End-to-End Encryption: A Secure Form of Asymmetric Encryption”

Remembering LCDR Stephen R. Harris, OIC of USS Pueblo’s COMINT Mission

LCDR Stephen R. Harris USN (Ret.)
March 31, 1938 – May 18, 2020

Continue reading “Remembering LCDR Stephen R. Harris, OIC of USS Pueblo’s COMINT Mission”

Website Powered by WordPress.com.

Up ↑