Talk:Operation Ivy Bells

From Wikipedia, the free encyclopedia

This article is within the scope of the Military history WikiProject. If you would like to participate, please visit the project page, where you can join the project and see a list of open tasks.
B This article has been rated as B-Class on the quality scale.

The story that a young boy made this suggestion is not supported by either of the reference links. Nor is it told in the book on the subject (Blind Mans Bluff). Nor is it believed by the people that read the US Navy newsgroup (sci.military.naval) If no one is able to support the story I suggest it's bogus Ralph 3March 06

I think this Charles A. Petrik is a fictitious person as evidenced by a Google, Scholar Google and other searches. I hope that someone how has read Blind Man's Bluff can add more to this article. (Rajah 04:01, 11 June 2006 (UTC))

[edit] Helped end the cold war?

I think the claim that this operation helped end the cold war is a bit of an exaggeration. I'm not saying it didn't contribute in some way, but was that contribution really significant in the grand scheme of things?

[edit] Why the soviets did not appear to act on peltons information.

The answer to this is obvious. One has to be very careful acting on intellegence gathered from such a source. This is because very few people know of said information so direct action can be very quickly traced back to the possible sources, thus likely compromising your source. While the soviets did not appear to take any action such as dismantling the device right away, there is no way of knowing if directives were passed along to either begin discussing erroneous data over the compromised lines to mislead the US, or at least directives to limit discussion of certain topics over unsecured lines. In reality nobody really knows what countermeasures the soviets did take. In any case, once pelton was compromised the devices were quickly removed by the soviets demonstrating clearly that the soviets were attempting to protect their source until it was certain that the source was already compromised. —The preceding unsigned comment was added by 198.31.184.166 (talk) 17:38, 20 February 2007 (UTC).