MI Corps Hall of Fame

October 1997
Military Intelligence Professional Bulletin;Oct-Dec97, Vol. 23 Issue 4, p58
Pays tribute to United States Army Master Sergeant Lorenzo Alvarado, one of the inductees to the 1997 Military Intelligence Corps Hall of Fame. Alvarado's espionage activities both as a civilian and enlisted US Army agent during World Wars I and II in the Philippines; Alvarado's receipt of the Legion of Merit for his exceptionally meritorious conduct in Bataan, the Philippines during World War II.


Related Articles

  • ZEROS OVER OZ. Severn, Fran // Aviation History;Jul2014, Vol. 24 Issue 6, p44 

    The article discusses the Technical Air Intelligence Unit (TAIU), a team of military aviators and technicians from the Allied forces who recovered, rebuilt, and flew abandoned or captured Japanese aircraft during World War II for intelligence purposes. Particular focus is given to TAIU's...

  • JICPOA: Joint intelligence during WW II. Moore, Jeff M. // Military Intelligence Professional Bulletin;Jul-Sep95, Vol. 21 Issue 3, p35 

    Reports on the role of United States military intelligence during the Second World War. Absence of effective military intelligence organization; Creation of the Joint Intelligence Center Pacific Ocean Area (JICPOA); Implementation; Operating units; Function; Sources of intelligence; Internal...

  • Signal Intelligence and World War II: The Unfolding Story. Rohwer, Jurgen // Journal of Military History;Oct99, Vol. 63 Issue 4, p939 

    Reveals the significance of signal intelligence during World War II. Successes of Admiral William James, administrative director of the British Admiralty's World War I decryption office, in breaking German naval communications; Role of James in launching Zimmermann telegram; Cryptanalysis.

  • Colossal adventures. Fox, Barry; Webb, Jeremy // New Scientist;05/10/97, Vol. 154 Issue 2081, p38 

    Focuses on the declassification of the details of the first electronic computer built in Great Britain in the early 1940s. Use of the machine in cracking the codes used by the Nazi high command during the Second World War; Former British Prime Minister Winston Churchill's orders to destroy the...

  • Germany's Venlo sting completely compromised an already shaky... Deac, Wil // World War II;Jan97, Vol. 11 Issue 5, p68 

    Focuses on a sting operation in 1939 by the Germans which compromised the British intelligence network in Europe during the beginning of World War II. Description of the operation which was the mastermind of Walter Schellenberg; Infiltration of the British intelligence by the Nazis; Effects of...

  • Heroine of diplomacy. Morin, Ann Miller // Foreign Service Journal;Sep95, Vol. 72 Issue 9, p42 

    Reports on Foreign Service Officer Constance Harvey's contributions to the Allied cause during World War II. Overseas assignments before Lyon, France; Clandestine activities as a neutral diplomat at Lyon, France which included smuggling of military information and being a messenger between...

  • The battle of the bulge: The secret offensive. Austra, Kevin R. // Military Intelligence;Jan-Mar91, Vol. 17 Issue 1, p26 

    Reports on the Battle of the Bulge, an attack made by the Germans on American forces in Belgium's Ardennes Forest on December 16, 1944. Failure of the Allies to discover preparations for the German offensive; Goal to destroy the British and Canadian armies; Success in concealing battalions...

  • A HISTORY OF VIOLENCE. Wray, Richard W. // American Conservative;8/25/2008, Vol. 7 Issue 16, p2 

    A letter to the editor in response to the articles on the involvement of the U.S. in the second World War is presented.

  • The intercepted communications of an American in Cairo provided a secret ear for the Desert Fox. Deac, Wil // World War II;Sep96, Vol. 11 Issue 3, p54 

    Describes how US military attache in Cairo Brevet Colonel Bonner Frank Fellers unwittingly became a provider of sensitive information to German Field Marshall Erwin Rommel during World War II. Break-in of American embassy in Cairo by Italian agents; Information unintentionally revealed by...


Read the Article


Sign out of this library

Other Topics