Report of Flintlock Operation

Total Page:16

File Type:pdf, Size:1020Kb

Report of Flintlock Operation Uto. ER J^IFTH AMPHIBIOUS FORCE REPORT OF FLINTLOCK OPERATION DOWNGRADED AT 3 YERR INTERVALS; RE©: L-Ui Uvii.W COMBINED ARMS RESEARCH LIBRARY FORT LEAVENWORTH, KS 3 1695 00839 7424 GENCENTPAC AG. Dato— 19 April 1944. HEADQUARTERS UNITED ^TATFg ARMY EOJ ircc rcLLXRAJL PACIFIC AREA ****** toasts mm mm mm AG 052/285 19 April 1944. SUBJECT: 'Transmittal Of Report of FlintJock Operation - 5thPhibFor. TO : Commandant, Command and General Staff School, Fort Leavenworth, Kansas. The inclosed report is forwarded for your information: For the Commanding General: 0. M. THOMPSONJ Colonel, AGD, 1 Incl: Adjutant General. Report of Flintlock Operation (Reg. No. 30) rrn.«n£ instroictGrs (pile Ho Sign Below _ _ Date ^air.s --- -55W?55i£T* naj Dun i/iB f ^ - )• ft UUidU Cii 'w -LASIIPikC * In^ ^st %- AG. PS&1P1 ft 19 Asfil 19AL. HEADQUARTERS jfe^TfS ARMVfPi## CENl^LfflJnC AREA APO 958 AG (£2/285 19 April 1944. SUBJECT! Transmittal of Keport of Flintlock Operation - 5tiPhibFor. TO i Commandant, Coomsnd end General Staff School, Fort Leavenworth, Kansas. The inclosed report is forwarded for your information: For the Commanding Generals O.'I. THOMPSON, Colonel, A CD, 1 IBCIJ Adjutant General. Keport of Flintlock Operation C^®S« No. 30} C5A/A16--3(3) . JOINT 'EXPEDITE jiRY-'FORCE- (TF 51) V. OFFICE OF TEE COMMANDER, - .' Serial 00189 U.S.S. ROCKY MOUNT, Flagship, February 25, 1944 f% $ T5 8 IT *<• . « h 3 Qfi i '1 '4J * ... K a;V ¥ ... J . ^ i ' From: Commander Joint Expeditionary Force, FLDTTLOCK, (Commander FIFTH Amphibious Force, U.S. Pacific Fleet); To: Commander in Chief, U. S. Pacific Fleet. Via: Commander Central Pacific Force, U, S. Pacific Fleet. • • ••• I' Subject: Report of Amphibious Operations for the capture of the MARSHALL ISLANDS (FLDTTLOCK and CATCKPOLE Operations). , • t . \ Reference: (a) C oiiiFIFTHPhibFor C ire. Ltr. No. 5AL-43. Enclosures: (A) Narrative of the Operation (with Code IIaide Chart). •••,•• - (B) /Intelligence Report. • (C) Resume.of Troop Landings and Shore Operations. (D) Operation of Control, Beach, and Shore Parties .(E). Naval and Air Bombardment and Beach Demol- - itions. / . F) Copy of Report of Commander Support Aircraft. G) Communications. (H) Employment of LVT's and DUIGT's by SEVENTH Infantry Division. I) Medical Report. •. J) Ship Loadings for FLINTL0C& Operations. (K) Important Recommendations. (A) ORGANIZATION OF TASK FORCE 51 1. This report includes a description of the major features of' the operations of Task Force 51, which was the Joint Expedit­ ionary Force assigned the task of capturing the 1IASSHALL ISLANDS; and the details of the operations of Task Force 52 (Southern Attack Force). 2. Task Force 51 comprised: | (a) Task Force 52 (Southern Attack Force), under Rear rAdmiral RJC. TUH7ER, U.S.N., charged with the capture of the 'southern half of KWAJ^LEIN Atoll. | (b) Task Forces J?|U(Northern Attack Force), under Rear I Admiral RcLc CCfiT0lM$ Jf .'tl cBarged* l&iyi the capture of the I northern, half Atoll\ ?<% a? flj- C5A/A;fe3(3) Serial 001SQ' Subject Report of Amphibious Oj-jerations for the capture of the L'JJ£EALL I3LALTDS (FLINTLOCK and CATCEPOLE Operations) 0 (c) Task Group 51.1, (Expeditionary Force Reserve Group), carrying the'Corps Reserve of troops, under Captain D»W* LOOMIS, U.S.N; (d) Task Group 51.2 (MATURO Attack Group, under Rear Admiral HILL, U.S.IT., charged with the capture of MA3TJR0 Atoll; ' * • (e) Task Groups 51.3 to 51.9, transporting the Garrison Forces to IS/AJALEIN.and HAJURO Atolls; T (f) Task Group 51.11 (ENIW^TOK Expeditionary Group) under Rear Admiral H»W. HILL, U.S.1I,, charged with, the capture of ENH7ET0K Atoll. This group included Task Groups 51/1 and 51*2 , certain elements of Task Forces 52 and 53 and Tas?s Group 58,,4" The group was organized at EV/AJALEIN after the capture of that atoll had been assured: ' > (g) Task 'Group 51»19j comprising a series of task units transporting Garrison Forces to SN1VJET0K Atoll. , 3. Commander Task Force 51' Operation Plans A6-43 and A9-44 give the major organization of the naval vessels and principal troop units included in Task Fores 51 for the FLINTLOCK and CATC'HFCLE Operations„ Enclosure: (J) gives the details of loadings of trocp-3- and . supplies in transports and cargo vessels included in Task Force 51« Summary tab3.es of the total numbers and types of vessels and nrjabe.ra and distribution of troops attached to the v Joint Expeditionary Force during the period of this report are as follows: I. Summary of Vessels of Joint Expeditionary Force: AGO 2 PD 8 OEB •16 • CY 45 CYL fe fl;'2- |i -j, AE»f: 15 • CVE rgQ,: 12 CA 8 Ti'3 8 CL 4 AT 6 Total 297 APA 28 APD 4 MA 7 AP 6 LSD 5 AK 4 C5A/Al6-3(3) M /,•: A **3% U-* • til ft *•' >• ^ F-t P>'i f>6\ «P> i" «_ Serial 0018(7 ^ H j 1 ' ' 1 - 14' ' J • •• ;v 'v ?' - v Subject: Report of Amphibious Operations for the capture of the MARSHALL.ISLANDS (JL3NEL0CK and CATCEPOLE ' > Operations). 11• Summary of Troops of Joint Expeditionary Force: :Assault : Garrison Troops. ; Troops:(including Initial : : Defense Forces) Tot al : Army :Marine: Army :Marine Navy .Southern Attack Force :21,76a; : 21768 • • • ;Northern Attack Force : :20778 : 20778 • • • \ MAJURO Attack Force : 1459: 136 : 1595 * • • Corps Reserve : 3701: 5624 : J 9325 • « » ENIWETOK Attack Force j 4509: 5760 : 10269 :(4509):(5760): Southern Garrison Force 8553 : 1832 2936 13326 :(4554):(1154) (5708) * • Northern Garrison Force i : 7710 3175 10885 : , :(4124) (4124) • • MAJURO Garrison Force. : 1459 : 1978 3728 7165 :(1459): (1459) • « EtOTffCK Garrison Force : 5990*: 3212 5439 14641 :(3777): (3777) Force Aggregates :31437 :32298::16007 :14732:1527S 109752 Total duplications t(4509):(5760):(9790):(5278) (25337) Net Total Troops employed :26928 :26538 6217 : 9454 15278: 84415 NOTE: (1) figures siio-wn in parenthesis represent duplication - 3 - H rk / f?,ss -i \%j C5A/Al6-3( 3) Serial 0018(3 ft * * I '"V Subject: Report of Amphibious Operations for the capture of the MARSHALL ISL&ID3 (FLI1ITL0CK and CACCEPOLS Operations)• resulting from the.- re-employment of certain troops for successive missions. Examples: (a) Some assault troops reemployed for garrison defense. (b) Corps Reserve reemployed for EITIIJETOIC Attack. These duplications are deducted to show Het Total Troops Employed, (2) Figures do not include garrison troops ivhich ti/ere sent forward in later echelons not assigned to TF 51. 4« The commanders of the major elements of Assault Troops and Garrison Forces of the FLI17£L0CIC and CATCIIP0L1 Operations were as follows: . • • -(a) Commander Expeditionary Troops, FLIiTTLOCK Operation ' {Assault and Garrison Forces), Ivlajor. General Holland LI, SMITH, USI.IC, Commanding General, FIFTH Amphibious Corps j. 1 .(b) Commander Southern Landing Force, Major General C.H. CORLSTT, U.S.A., Commanding General, SEVJHTH Infantry Division; (c) Commander northern Landing Force, Major General H. SCHMIDT, USMC, Commanding General, FOURTH Marine Division; (d) Commander IGJ&TALEIU Garrison Forces (Atoll Commander), Rear Admiral A«D. K3MHARD, U.S. Havy; . (e) Commander Advance Base,'ROI ISL/1TD, Captain E.C. EWEH, U.S. Il-Javy; CRUISE, U.S. lUavy, later relieved by Captain V.F. GRikUT, USN; i- 4 - * $$ C5A/Al6-3(3) Serial 0018:' sa&wi • & *»> Subject: Report of Amphibious Operations for the capture of the MARSHAL l" ISLANDS (FLINTLOCK and CATCIIPOLE Operations). (h) Commander Expeditionary Troops, CATCIIPOLE Operation (Assault and Garrison Forces), Brigadier General I.E. WATSON, USIIC, Commanding General, 22nd Harines; (i) Commander 3IUVJET0E- Garrison Force (Atoll _ Commander) and Commander Advance Base, ilir.JETOK ISLAND, Captain E.A. CRUISE, U.S.N; (j) Commander Advance Base, ENGEBI ISLAND, Colonel C.R. JOKES, U.S. Army. ^ (B) STRATEGIC FEATURES OF FLINTLOCK PLAIT 5. The principal strategic features of the FLINTLOCK Plan were as follows: (a) An intensified bonking by Central Pacific shore-based aircraft of all defended islands of the UAE8IIA1IS, beginning Dog minus FIFTHS! Day;, (b) Destruction of all enemy aircraft in the HARSHALLS by carrier attacks on the airfields on KWAJALEIN, ENIi/ETOE^ WCTJE, and MALOELAP Atolls, beginning Dog minus TWO Day, Thereafter, continued interdiction of enemy airfields -on ENIWETGE by carrier, aircraft, and enemy airfields on V.'OTJS and IIALOELAP by carrier aircraft and by ship bombardment; (c) Destruction by friendly.shore-based aircraft of enemy aircraft, and interdiction of enemy airfields, on MILLS, JALU IT, NAUHJ, WOTJE, IIALOELAP, and WAKE; (d) Softening up of enemy defenses, and destruction of supplies on KWAJALEIN Atoll, by carrier and shore-based - air attacks and* by bombardment by new battleships on. Dog minus ONE Day. Destruction of enemy supplies on IviALOSLAP .and WOTJE by cruiser and destroyer bombardment on Dog minus TWO and Dog minus 0113 Daysj filial p (e) Attacks <sfi ini&M 3iaMl%fM -ii&rcliljaercpisiTB ysnip^mg i > W — J&-r- cancentration of su' ?-afi§gr^f - 5 - C5A/Al6-3(3) Serial 001CO. mrj. 'Subject: Report 'of ^£mphibi.©i*si'TOpefraifipipf f or the capture of the LIAI^Il^US ISLl^DS and GATCIIPCL2 Operations), (f) The operation of four large carrier groups in covering , positions with respect to ISTAfALSIK Atoll, and the direct 5 support of landing operations by two of these groups, begin­ ning Dog Day; (g) The simultaneous capture, by three naval attack forces, of the southern, and northern portions of EnAJALSIH Atoll, and of MAJTJRQ Atoll; (h) The consolidation of the defenses of the captured^ , positions, and the construction or rehabilitation of airfields for offensive and defensive uses. / . 6, Capture of iETIwIiiTOIv as a part: of the ILBELOdC Operation was considered, but owing to uncertainties as to what part of the available troops the capture of would absorb, the oper­ ation against .27ISET0E was not prescribed in the major directives• However, tentative plans were arawn up and directives prepared for issue should success' at £J*JAI»3IK prove rapid enough to justify the extension of the operation* t'o.
Recommended publications
  • • • • • FIELD SURVEY of JAPANESE DEFENSES On
    4 rri mmm* L. UNITED STATES PACIFIC FLEET AND PACIFIC OCEAN AREAS 25' 30' 35' 55' I52°O" • 40' TRUK • • • FIELD SURVEY ULALU.S of DUBLONIS PARAM IS. ETEN IS i / TARIK IS / .FEFAN JAPANESE DEFENSES •. L FALCAI AA BEGUETS IS on 10" MESEGON IS 5" TRUK KUOP ATOLL 7°0' KEY MAP 55 I52°O 5 PART ONE-THE REPORT CINCPAC-CINCPOA BULLETIN NO. 34 6 15 MARCH 1946 Eforofu Kaikyo fu Sluma (ioflhhti, % "-*" . K.in I.. Slu Kiiziin Hitt o , Minium I (THAILAND \ > ; (SIAM) A'.I.V (SOUTH CHINA SEA) .rfilrhongR !*«> C<iQdor« Sfrath- SVZV SEA Amfxmi a ( H\ SwnlWR/' ./ I ,;i.\TUlSulll . \ AfMun&ma V Arnjmka 3 Tg.S.-lataa ./.ll'.l SEA K unnuyii I)j a m Is BAJNDA SKA , ^7 V r.Van Dumoi. TIMOA SJM/cm NAME RANK ORGANIZATION REPRESENTINq HEADQUARTERS, FLEET MARINE FORCE, PACIFIC WEINTRAUB, Daniel J. Captain, USN PHIBSPAC PHIBSPAC C/O FLEET POST OFFICE, SAN FRANCISCO. GUTHRIE, James T. Lt.. USC & GS PHIBSPAC PHIBSPAC HELANDER, Melvin Lt (jg), USNR INTERPRON 2 COMMARIANAS Confidential 1 March, 1946 ZIRKELBACH, Harry W. Ensign, USNR MEIU 4 MEIU 4 From : Officer in Charge, Japanese Defense Study Group. (4) Signal Communications. To : The Commander in Chief, Pacific Fleet and Pacific Ocean Areas, ORGANIZATION REPRESENTING Via : The Commanding General, Fleet Marine Force, Pacific, NAME RANK POPE, Albert L. Captain, USMC Hdqts, FMF PAC FMF,PAC Subject: TRUK, transmittal of Japanese defense study of. CLARK, John A. Lt (Jg), USNR JICPOA JICPOA HURLBUT, Franklin C. Ensign, USNR COMMARIANAS COMMARIANAS References: (a) CinCPOA dispatch 162329 of November, 1945.
    [Show full text]
  • The Da Vinci Code
    The Da Vinci Code Dan Brown FOR BLYTHE... AGAIN. MORE THAN EVER. Acknowledgments First and foremost, to my friend and editor, Jason Kaufman, for working so hard on this project and for truly understanding what this book is all about. And to the incomparable Heide Lange—tireless champion of The Da Vinci Code, agent extraordinaire, and trusted friend. I cannot fully express my gratitude to the exceptional team at Doubleday, for their generosity, faith, and superb guidance. Thank you especially to Bill Thomas and Steve Rubin, who believed in this book from the start. My thanks also to the initial core of early in-house supporters, headed by Michael Palgon, Suzanne Herz, Janelle Moburg, Jackie Everly, and Adrienne Sparks, as well as to the talented people of Doubleday's sales force. For their generous assistance in the research of the book, I would like to acknowledge the Louvre Museum, the French Ministry of Culture, Project Gutenberg, Bibliothèque Nationale, the Gnostic Society Library, the Department of Paintings Study and Documentation Service at the Louvre, Catholic World News, Royal Observatory Greenwich, London Record Society, the Muniment Collection at Westminster Abbey, John Pike and the Federation of American Scientists, and the five members of Opus Dei (three active, two former) who recounted their stories, both positive and negative, regarding their experiences inside Opus Dei. My gratitude also to Water Street Bookstore for tracking down so many of my research books, my father Richard Brown—mathematics teacher and author—for his assistance with the Divine Proportion and the Fibonacci Sequence, Stan Planton, Sylvie Baudeloque, Peter McGuigan, Francis McInerney, Margie Wachtel, André Vernet, Ken Kelleher at Anchorball Web Media, Cara Sottak, Karyn Popham, Esther Sung, Miriam Abramowitz, William Tunstall-Pedoe, and Griffin Wooden Brown.
    [Show full text]
  • United States Navy Carrier Air Group 12 History
    CVG-12 USN Air 1207 October 1945 United States Navy Carrier Air Group 12 (CVG-12) Copy No. 2 History FOR OFFICIAL USE ONLY This document is the property of the Government of the United States and is issued for the information of its Forces operating in the Pacific Theatre of Operations. 1 Original (Oct 45) PDF created with pdfFactory trial version www.pdffactory.com CVG-12 USN Air 1207 October 1945 Intentionally Blank 2 Original (Oct 45) PDF created with pdfFactory trial version www.pdffactory.com CVG-12 USN Air 1207 October 1945 CONTENTS CONTENTS........................................................................................................................................3 INTRODUCTION.............................................................................................................................3 USS Saratoga Embarkation..............................................................................................4 OPERATION SHOESTRING 2 ....................................................................................................4 THE RABAUL RAIDS .....................................................................................................................5 First Strike - 5 November 1943............................................................................................................5 Second Strike - 11 November 1943......................................................................................................7 OPERATION GALVIN....................................................................................................................7
    [Show full text]
  • The Unforgettable Years : a Record of the Activities of the First
    DUKE UNIVERSITY LIBRARY Digitized by the Internet Archive in 2014 https://archive.org/details/unforgettableyeaOOmatt_0 The Unforgettable Years by Clara Pugh Matthis Div.Sch. 285.1756 U561W DUKE UNIVERSITY LIBRARY THE UNFORGETTABLE YEARS by CLARA PUGH MATTHIS A Record of the Activities of the First Presbyterian Church Durham, North Carolina, During the War Years, 1941 -- 1945° 3 / cl2 Y 5. (7 5k u q it \*\Ml DEDICATION To the Nation's Finest the Service Men of the First Presbyterian Church both sons and visitors, this volume is affectionately dedicated. Getting into it. Everything has a beginning and it is an old custom to have an introduction: While to those familiar with the war work of the First Presby- terian Church this book needs no introduction, there are others to whom its title will have little or no meaning, so for their benefit a brief explanation is in order. There were a number of friends who beguiled me in to writing this story. Their arguments were that while I was con- stantly on the scene of action I could give them an eye witness account of the work done by the First Presbyterian Church for Service men in those epochal years 19^1-19^5° For the past year as I have worked long but pleasant hours on this Manuscript I have forgiven them, but I have also realiz- ed that writing is a profession and it is not mine, however in- stead of attempting to acquire a literary style I have tried to tell in an informal way of our efforts for the Service men.
    [Show full text]
  • An Introduction to Cryptography, Second Edition Richard A
    DISCRETE MATHEMATICS AND ITS APPLICATIONS Series Editor KENNETH H. ROSEN An INTRODUCTION to CRYPTOGRAPHY Second Edition © 2007 by Taylor & Francis Group, LLC DISCRETE MATHEMATICS and ITS APPLICATIONS Series Editor Kenneth H. Rosen, Ph.D. Juergen Bierbrauer, Introduction to Coding Theory Kun-Mao Chao and Bang Ye Wu, Spanning Trees and Optimization Problems Charalambos A. Charalambides, Enumerative Combinatorics Henri Cohen, Gerhard Frey, et al., Handbook of Elliptic and Hyperelliptic Curve Cryptography Charles J. Colbourn and Jeffrey H. Dinitz, The CRC Handbook of Combinatorial Designs Steven Furino, Ying Miao, and Jianxing Yin, Frames and Resolvable Designs: Uses, Constructions, and Existence Randy Goldberg and Lance Riek, A Practical Handbook of Speech Coders Jacob E. Goodman and Joseph O’Rourke, Handbook of Discrete and Computational Geometry, Second Edition Jonathan L. Gross and Jay Yellen, Graph Theory and Its Applications, Second Edition Jonathan L. Gross and Jay Yellen, Handbook of Graph Theory Darrel R. Hankerson, Greg A. Harris, and Peter D. Johnson, Introduction to Information Theory and Data Compression, Second Edition Daryl D. Harms, Miroslav Kraetzl, Charles J. Colbourn, and John S. Devitt, Network Reliability: Experiments with a Symbolic Algebra Environment Leslie Hogben, Handbook of Linear Algebra Derek F. Holt with Bettina Eick and Eamonn A. O’Brien, Handbook of Computational Group Theory David M. Jackson and Terry I. Visentin, An Atlas of Smaller Maps in Orientable and Nonorientable Surfaces Richard E. Klima, Neil P. Sigmon, and Ernest L. Stitzinger, Applications of Abstract Algebra with Maple™ and MATLAB®, Second Edition Patrick Knupp and Kambiz Salari, Verification of Computer Codes in Computational Science and Engineering William Kocay and Donald L.
    [Show full text]
  • The American Legion [Volume 129, No. 6 (December 1990)]
    WHO WAS I I i . WANSa j«U. ^ GOOD looking; Shovel your driveway on a bitter cold morning, then drive Importil straight to the office! Haband's impeccably tailored dress slacks DO IT ALL thanks to these features! t/The same permanent press gabardine | polyester as our regular Dress Slacks. (^100% preshrunk cotton flannel lining throughout. Stitched in to stay put! J^TWO button-thru security back pockets! t/ Razor sharp crease & hemmed bottoms. ]/ Extra comfortable gentleman's FULL CUT' ]/ 100% home machine WASH & DRY easy care The world sees a well-dressed gentleman in neat executive slacks. You feel TOASTY WARM and COMFORTABLE! Try them today. Shop at Home. On Approval, NO RISK. USE THIS ORDER FORM. FLANNEL LINED 95* per pair j EXECUTIVE 2 pairs for $37.95 Winter Slacks19 j Haband WE'VE GOT YOUR EXACT SIZE! 32 34 35 36 37 38 39 40 41 42 43 44 265 North 9th St. WAISTS: 30 WAISTS: ado uoo per pair for 46 48 50 52 54 Paterson, NJ 07530 •BUS MEN'S | INSEAMS: SI27-28) MI29-30) LI31-32) XK33-34! YES SIR! 7B4-04X Send me pairs of slacks. plus $2.45 I enclose $ toward postage & handling. GREY [ l CHECK ENCLOSED MasterCard [ i Visa 100% SATISFACTION GUARANTEED OR YOUR MONEY BACK ANY TIME! Name (PLEASE PRINT! Apt. I Street Haband ! ///, M VII ',tf<;«:l Wjter.ori, NJ 07530 State 1 | City . RDGAIRfl The Magazine for a Strong America Vol. 129, No. 6 December 1990 AGENT ORANGE COVER-UP A House report says the White House manipulated study.
    [Show full text]
  • South Pacific Destroyers: the United States Navy and the Challenges of Night Surface Combat
    East Tennessee State University Digital Commons @ East Tennessee State University Electronic Theses and Dissertations Student Works 8-2009 South Pacific esD troyers: The nitU ed States Navy and the Challenges of Night Surface Combat in the Solomons Islands during World War II. Johnny Hampton Spence East Tennessee State University Follow this and additional works at: https://dc.etsu.edu/etd Part of the Military History Commons Recommended Citation Spence, Johnny Hampton, "South Pacific eD stroyers: The nitU ed States Navy and the Challenges of Night Surface Combat in the Solomons Islands during World War II." (2009). Electronic Theses and Dissertations. Paper 1865. https://dc.etsu.edu/etd/1865 This Thesis - Open Access is brought to you for free and open access by the Student Works at Digital Commons @ East Tennessee State University. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons @ East Tennessee State University. For more information, please contact [email protected]. South Pacific Destroyers: The United States Navy and the Challenges of Night Surface Combat in the Solomons Islands During World War II ____________________________ A thesis presented to the faculty of the Department of History East Tennessee State University In partial fulfillment of the requirements for the degree Master of Arts in History ____________________________ by Johnny H. Spence, II August 2009 ____________________________ Dr. Ronnie Day, Chair Dr. Emmett Essin Dr. Stephen Fritz Keywords: Destroyers, World War II, Pacific, United States Navy, Solomon Islands ABSTRACT South Pacific Destroyers: The United States Navy and the Challenges of Night Surface Combat in the Solomons Islands during World War II by Johnny H.
    [Show full text]
  • The Cultural Contradictions of Cryptography: a History of Secret Codes in Modern America
    The Cultural Contradictions of Cryptography: A History of Secret Codes in Modern America Charles Berret Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy under the Executive Committee of the Graduate School of Arts and Sciences Columbia University 2019 © 2018 Charles Berret All rights reserved Abstract The Cultural Contradictions of Cryptography Charles Berret This dissertation examines the origins of political and scientific commitments that currently frame cryptography, the study of secret codes, arguing that these commitments took shape over the course of the twentieth century. Looking back to the nineteenth century, cryptography was rarely practiced systematically, let alone scientifically, nor was it the contentious political subject it has become in the digital age. Beginning with the rise of computational cryptography in the first half of the twentieth century, this history identifies a quarter-century gap beginning in the late 1940s, when cryptography research was classified and tightly controlled in the US. Observing the reemergence of open research in cryptography in the early 1970s, a course of events that was directly opposed by many members of the US intelligence community, a wave of political scandals unrelated to cryptography during the Nixon years also made the secrecy surrounding cryptography appear untenable, weakening the official capacity to enforce this classification. Today, the subject of cryptography remains highly political and adversarial, with many proponents gripped by the conviction that widespread access to strong cryptography is necessary for a free society in the digital age, while opponents contend that strong cryptography in fact presents a danger to society and the rule of law.
    [Show full text]
  • Codebreakers
    1 Some of the things you will learn in THE CODEBREAKERS • How secret Japanese messages were decoded in Washington hours before Pearl Harbor. • How German codebreakers helped usher in the Russian Revolution. • How John F. Kennedy escaped capture in the Pacific because the Japanese failed to solve a simple cipher. • How codebreaking determined a presidential election, convicted an underworld syndicate head, won the battle of Midway, led to cruel Allied defeats in North Africa, and broke up a vast Nazi spy ring. • How one American became the world's most famous codebreaker, and another became the world's greatest. • How codes and codebreakers operate today within the secret agencies of the U.S. and Russia. • And incredibly much more. "For many evenings of gripping reading, no better choice can be made than this book." —Christian Science Monitor THE Codebreakers The Story of Secret Writing By DAVID KAHN (abridged by the author) A SIGNET BOOK from NEW AMERICAN LIBRARV TIMES MIRROR Copyright © 1967, 1973 by David Kahn All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, without permission in writing from the publisher. For information address The Macmillan Company, 866 Third Avenue, New York, New York 10022. Library of Congress Catalog Card Number: 63-16109 Crown copyright is acknowledged for the following illustrations from Great Britain's Public Record Office: S.P. 53/18, no. 55, the Phelippes forgery, and P.R.O. 31/11/11, the Bergenroth reconstruction.
    [Show full text]
  • List of Glossary Terms
    List of Glossary Terms A Ageofaclusterorfuzzyrule 1054 A correlated equilibrium 3064 Agent 58, 76, 105, 1767, 2578, 3004 Amechanism 1837 Agent architecture 105 Anearestneighbor 790 Agent based models 2940 A social choice function 1837 Agent (or software agent) 2999 A stochastic game 3064 Agent-based computational models 2898 Astrategy 3064 Agent-based model 58 Abelian group 2780 Agent-based modeling 1767 Absolute temperature 940 Agent-based modeling (ABM) 39 Absorbing state 1080 Agent-based simulation 18, 88 Abstract game 675 Aggregation 862 Abstract game of network formation with respect to Aggregation operators 122 irreflexive dominance 2044 Aging 2564, 2611 Abstract game of network formation with respect to path Algebra 2925 dominance 2044 Algebraic models 2898 Accuracy 161, 827 Algorithm 2496 Accuracy (rate) 862 Algorithmic complexity of object x 132 Achievable mate 3235 Algorithmic self-assembly of DNA tiles 1894 Action profile 3023 Allowable set of partners 3234 Action set 3023 Almost equicontinuous CA 914, 3212 Action type 2656 Alphabet of a cellular automaton 1 Activation function 813 ˛-Level set and support 1240 Activator 622 Alternating independent-2-paths 2953 Active membranes 1851 Alternating k-stars 2953 Actors 2029 Alternating k-triangles 2953 Adaptation 39 Amorphous computer 147 Adaptive system 1619 Analog 3187 Additive cellular automata 1 Analog circuit 3260 Additively separable preferences 3235 Ancilla qubits 2478 Adiabatic switching 1998 Anisotropic elements 754 Adjacency matrix 1746, 3114 Annealed law 2564 Adjacent 2864,
    [Show full text]
  • An Introduction to Cryptography, Second Edition Richard A
    DISCRETE MATHEMATICS AND ITS APPLICATIONS Series Editor KENNETH H. ROSEN An INTRODUCTION to CRYPTOGRAPHY Second Edition © 2007 by Taylor & Francis Group, LLC DISCRETE MATHEMATICS and ITS APPLICATIONS Series Editor Kenneth H. Rosen, Ph.D. Juergen Bierbrauer, Introduction to Coding Theory Kun-Mao Chao and Bang Ye Wu, Spanning Trees and Optimization Problems Charalambos A. Charalambides, Enumerative Combinatorics Henri Cohen, Gerhard Frey, et al., Handbook of Elliptic and Hyperelliptic Curve Cryptography Charles J. Colbourn and Jeffrey H. Dinitz, The CRC Handbook of Combinatorial Designs Steven Furino, Ying Miao, and Jianxing Yin, Frames and Resolvable Designs: Uses, Constructions, and Existence Randy Goldberg and Lance Riek, A Practical Handbook of Speech Coders Jacob E. Goodman and Joseph O’Rourke, Handbook of Discrete and Computational Geometry, Second Edition Jonathan L. Gross and Jay Yellen, Graph Theory and Its Applications, Second Edition Jonathan L. Gross and Jay Yellen, Handbook of Graph Theory Darrel R. Hankerson, Greg A. Harris, and Peter D. Johnson, Introduction to Information Theory and Data Compression, Second Edition Daryl D. Harms, Miroslav Kraetzl, Charles J. Colbourn, and John S. Devitt, Network Reliability: Experiments with a Symbolic Algebra Environment Leslie Hogben, Handbook of Linear Algebra Derek F. Holt with Bettina Eick and Eamonn A. O’Brien, Handbook of Computational Group Theory David M. Jackson and Terry I. Visentin, An Atlas of Smaller Maps in Orientable and Nonorientable Surfaces Richard E. Klima, Neil P. Sigmon, and Ernest L. Stitzinger, Applications of Abstract Algebra with Maple™ and MATLAB®, Second Edition Patrick Knupp and Kambiz Salari, Verification of Computer Codes in Computational Science and Engineering William Kocay and Donald L.
    [Show full text]
  • The American Legion Magazine, a Leader Among National General-Interest Publications, Is Published Monthly by the American Legion for Its 3.1 Million Members
    HABAND CO. Wz 7 Th 8 8V2 9 9 265 North 9th Street 10 Wz 11 12 13 Paterson, NJ 07530 i Width: Add $1 per pair for 8'/a 9 9'/2 10 10'/2 11 12 Send pairs of shoes. I've enclosed 7BM-4AC $ purchase price. Add $2.70 postage & handling. 100% SATISFACTION GUARANTEED or FULL REFUND of Purchase Price at Any Time! Check Enclosed DVisa MC Exp.: cool air breezes thru! Long-wearing open weave nylon mesh has thousands of tiny air vents that let fresh air circulate with every step. Then, the soft, bouncy one-piece "Kraton®" rubber sole and heel plus luxurious foam-backed cushion insole provide even more comfort! These handsome, masculine slip-ons come in cool, smart, fresh colors to go with all your casual summer wardrobe. Imagine how great they will feel walking, driving, traveling, vacationing, or just plain relaxing. Best of all, imagine the easy low price: 3 pairs for only $19.95! Send today and be set to enjoy the summer in style and comfort! A conscientious family business serving America's businessmen by mail since 1925. 265 North 9th Street Paterson, NJ 07530 The Magazine for a Strong America Vol.133, No. 1 July 1992 ARTICLE s ALL ABOARD FOR CHICAGO Legionnairesprepare to visit the Windy Cityfor the 74th National Convention. 14 A DECADE OF REMEMBRANCE For 10years, The Wall has helped heal the wounds ofVietnam. 16 1 PLEDGE ALLEGIANCE Those31 wordsmean we respect our country and ourflag. By Fran Roberts 18 TICK...TICK... TICK... Thepopulation time bomb continues the countdown to extinction.
    [Show full text]