ANNOTATED BIBLIOGRAPHY on CRYPTOGRAPHY in AUSTRALIA in WW2 Peter Donovan, School of Mathematics, University of NSW, Sydney 2052
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Chancellor's Speech to GCHQ on Cyber Security
Speech Chancellor's speech to GCHQ on cyber security From: HM Treasury, Government Communications Headquarters and The Rt Hon George Osborne MP Delivered on: 17 November 2015 (Original script, may differ from delivered version) Location: GCHQ First published: 17 November 2015 Part of: Spending Review and Autumn Statement 2015 Chancellor lays out new plan for £1.9 billion cyber investment, and details seven more departments that have settled ahead of the Spending Review. Before I start my speech, I want to say a few words about the heart-breaking events that unfolded in Paris on Friday evening. This was an assault not just on the people of France, but on all of us who value freedom and democracy. We stand with the people of France. We know that we must act as one, just as our enemies see us as one. As David Cameron has said, we will do everything we possibly can to help the French at this moment of national trauma. That includes making available to them the sharpest of our own national capability, which includes the skills and capabilities of GCHQ. Before the dreadful events of the weekend we had already indicated that we would be increasing substantially the resources we dedicate to countering the terrorist threat posed by ISIL. The Prime Minister has made clear that across the agencies a further 1,900 staff will be recruited to keep Britain safe from terrorist attack. This was going to be an important outcome of the Spending Review. What has unfolded in Paris has reminded us all that it is a vital one too. -
How I Learned to Stop Worrying and Love the Bombe: Machine Research and Development and Bletchley Park
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CURVE/open How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park Smith, C Author post-print (accepted) deposited by Coventry University’s Repository Original citation & hyperlink: Smith, C 2014, 'How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park' History of Science, vol 52, no. 2, pp. 200-222 https://dx.doi.org/10.1177/0073275314529861 DOI 10.1177/0073275314529861 ISSN 0073-2753 ESSN 1753-8564 Publisher: Sage Publications Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders. This document is the author’s post-print version, incorporating any revisions agreed during the peer-review process. Some differences between the published version and this version may remain and you are advised to consult the published version if you wish to cite from it. Mechanising the Information War – Machine Research and Development and Bletchley Park Christopher Smith Abstract The Bombe machine was a key device in the cryptanalysis of the ciphers created by the machine system widely employed by the Axis powers during the Second World War – Enigma. -
Taking Into Consideration All Other Factors, Evaluate the Extent to Which Bletchley Park Contributed to Victory in Europe, 1939-45
Taking into consideration all other factors, evaluate the extent to which Bletchley Park contributed to victory in Europe, 1939-45. (2,199 words) “ULTRA was essential to victory in the battle of the Atlantic, the war in Africa and the landings in Sicily and Normandy.”1 “ULTRA, in my humble opinion, has been exaggerated in importance.”2 “… [ULTRA] shortened the war by not less than two years and probably by four years.”3 Debate over the importance of the decryption of high-level Axis signals traffic, particularly the Enigma and Fish cyphers, at Bletchley Park (codenamed ULTRA) - began as soon as the secret was revealed in 1974 and continues today. The Battle of Britain, the North African campaign and the Battle of the Atlantic have all been particularly credited as depending on ULTRA4. The air campaign in the summer of 1940 is the easiest to address: ULTRA provided useful confirmation of the German order of battle, but little more5. Indeed, Dowding was not even cleared for ULTRA until after the battle6: the key intelligence asset for the Battle of Britain was the listening posts of the “Y Service” monitoring the working chatter of the Luftwaffe’s frontline7. 1 Deutsch H, “The Influence of Ultra on World War II”, Parameters, December 1978 2 Frankland N, “Some Thoughts About and Experience Of Official Military History”, The Journal Of The Royal Air Force Historical Society No. 17 3 Hinsley H, “The Influence of ULTRA in the Second World War”, Security Group Seminar, 19 Oct 1993 4 Deutsch. 5 Bungay S, “The Most Dangerous Enemy”, 2000 Aurum 6 Lewin R, “Ultra Goes to War”, 1978 Grafton 7 Jones R V, “Most Secret War”, 1978 Hamish Hamilton Even before the revelation of ULTRA, historians such as Roskill8 and Taylor9 credited attacks on Axis shipping – particularly those based from Malta – as decisive in containing, then defeating, the Deutsche Afrika Korps (DAK), citing Rommel’s warning in May 1941 that “without Malta the Axis will end by losing control of North Africa”. -
The Forgotten Fronts the First World War Battlefield Guide: World War Battlefield First the the Forgotten Fronts Forgotten The
Ed 1 Nov 2016 1 Nov Ed The First World War Battlefield Guide: Volume 2 The Forgotten Fronts The First Battlefield War World Guide: The Forgotten Fronts Creative Media Design ADR005472 Edition 1 November 2016 THE FORGOTTEN FRONTS | i The First World War Battlefield Guide: Volume 2 The British Army Campaign Guide to the Forgotten Fronts of the First World War 1st Edition November 2016 Acknowledgement The publisher wishes to acknowledge the assistance of the following organisations in providing text, images, multimedia links and sketch maps for this volume: Defence Geographic Centre, Imperial War Museum, Army Historical Branch, Air Historical Branch, Army Records Society,National Portrait Gallery, Tank Museum, National Army Museum, Royal Green Jackets Museum,Shepard Trust, Royal Australian Navy, Australian Defence, Royal Artillery Historical Trust, National Archive, Canadian War Museum, National Archives of Canada, The Times, RAF Museum, Wikimedia Commons, USAF, US Library of Congress. The Cover Images Front Cover: (1) Wounded soldier of the 10th Battalion, Black Watch being carried out of a communication trench on the ‘Birdcage’ Line near Salonika, February 1916 © IWM; (2) The advance through Palestine and the Battle of Megiddo: A sergeant directs orders whilst standing on one of the wooden saddles of the Camel Transport Corps © IWM (3) Soldiers of the Royal Army Service Corps outside a Field Ambulance Station. © IWM Inside Front Cover: Helles Memorial, Gallipoli © Barbara Taylor Back Cover: ‘Blood Swept Lands and Seas of Red’ at the Tower of London © Julia Gavin ii | THE FORGOTTEN FRONTS THE FORGOTTEN FRONTS | iii ISBN: 978-1-874346-46-3 First published in November 2016 by Creative Media Designs, Army Headquarters, Andover. -
Pioneers in U.S. Cryptology Ii
PIONEERS IN U.S. CRYPTOLOGY II This brochure was produced by the Center for Cryptologic History Herbert 0. Yardley 2 Herbert 0. Yardley Herbert 0 . Yardley was born in 1889 in Worthington, Indiana. After working as a railroad telegrapher and spending a year taking an English course at the University of Chicago, he became a code clerk for the Department of State. In June 1917, Yardley received a commission in the Signal Officers Reserve Corps; in July Colonel Ralph Van Deman appointed him chief of the new cryptanalytic unit, MI-8, in the Military Intelligence division. MI-8, or the Cipher Bureau, consisted of Yardley and two clerks. At MI-8's peak in November 1918, Yardley had 18 officers, 24 civilians, and 109 typists. The section had expanded to include secret inks, code and cipher compilation, communications, and shorthand. This was the first formally organized cryptanalytic unit in the history of the U.S. government. When World War I ended, the Army was considering disbanding MI-8. Yardley presented a persuasive argument for retaining it for peacetime use. His plan called for the permanent retention of a code and cipher organization funded jointly by the State and War Departments. He demonstrated that in the past eighteen months MI-8 had read almost 11,000 messages in 579 cryptographic systems. This was in addition to everything that had been examined in connection with postal censorship. On 17 May Acting Secretary of State Frank L. Polk approved the plan, and two days later the Army Chief of Staff, General Peyton C. -
Corp Bro Inside Layout
Message from the Director, NSA The National Security Agency’s rich legacy of cryptologic success serves not only as a reminder of our past triumphs, but also as an inspiration for our future. Harry Truman, the man responsible for signing the legislation that brought our Agency into existence, was once quoted as saying, “There is nothing new in the world except the history you do not know.” Like all truisms, it is only partially accurate. Each generation of Americans must at some point deal with unforeseen problems and issues that transcend the status quo. Most would agree that the challenges faced by NSA in today’s war against terrorism are far different from those of World War II, Vietnam, or Desert Storm. Even so, President Truman was correct in his assertion that there is much to be learned from the past. The history of the National Security Agency has in many respects been based on and characterized by feats of intellectual brilliance. Pioneers like William Friedman, Frank Rowlett, Dr. Louis Tordella, and Agnes Meyer Driscoll, to name but a few, were able to build on past successes and do whatever was necessary to meet the challenges of their time. We should not forget, however, that NSA’s success is due not just to the efforts of the well- known legends of the cryptologic past, but also to the dedicated work of thousands of men and women whose names will never be noted in any history book. History tells us that both genius and hard work are required to ensure success. -
Breaking Japanese Diplomatic Codes David Sissons and D Special Section During the Second World War
Breaking Japanese Diplomatic Codes David Sissons and D Special Section during the Second World War Breaking Japanese Diplomatic Codes David Sissons and D Special Section during the Second World War Edited by Desmond Ball and Keiko Tamura ASIAN STUDIES SERIES MONOGRAPH 4 Published by ANU E Press The Australian National University Canberra ACT 0200, Australia Email: [email protected] This title is also available online at http://epress.anu.edu.au National Library of Australia Cataloguing-in-Publication entry Title: Breaking Japanese diplomatic codes : David Sissons and D Special Section during the Second World War / edited by Desmond Ball and Keiko Tamura. ISBN: 9781925021073 (paperback) 9781925021080 (ebook) Subjects: Sissons, D. C. S. (David Carlisle Stanley), 1925-2006. Allied Forces. Southwest Pacific Area. Allied Intelligence Bureau World War, 1939-1945--Cryptography. World War, 1939-1945--Secret service--Australia. World War, 1939-1945--Electronic intelligence--Australia. World War, 1939-1945--Military intelligence--Australia. World War, 1939-1945--Japan. Cryptography--Australia--History. Military intelligence--Australia--History--20th century. Other Authors/Contributors: Ball, Desmond, 1947- editor. Tamura, Keiko, editor. Dewey Number: 940.548694 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying or otherwise, without the prior permission of the publisher. Cover design and layout by ANU E Press Cover image: David Sissons about 18 years old before joining the Army in 1944. Photo courtesy of Mrs Bronwen Sissons. Printed by Griffin Press This edition © 2013 ANU E Press Contents Preface . ix Acknowledgements . xi Acronyms and Abbreviations . -
Considering the Creation of a Domestic Intelligence Agency in the United States
HOMELAND SECURITY PROGRAM and the INTELLIGENCE POLICY CENTER THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Homeland Security Program RAND Intelligence Policy Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. -
The War Room Managed North Sea Trap 1907-1916
Michael H. Clemmesen 31‐12‐2012 The War Room Managed North Sea Trap 1907‐1916. The Substance, Roots and Fate of the Secret Fisher‐Wilson “War Plan”. Initial remarks In 1905, when the Royal Navy fully accepted the German High Seas Fleet as its chief opponent, it was already mastering and implementing reporting and control by wireless telegraphy. The Admiralty under its new First Sea Lord, Admiral John (‘Jacky’) Fisher, was determined to employ the new technology in support and control of operations, including those in the North Sea; now destined to become the main theatre of operations. It inspired him soon to believe that he could centralize operational control with himself in the Admiralty. The wireless telegraph communications and control system had been developed since 1899 by Captain, soon Rear‐Admiral Henry Jackson. Using the new means of communications and intelligence he would be able to orchestrate the destruction of the German High Seas Fleet. He already had the necessary basic intelligence from the planned cruiser supported destroyer patrols off the German bases, an operation based on the concept of the observational blockade developed by Captain George Alexander Ballard in the 1890s. Fisher also had the required The two officers who supplied the important basis for the plan. superiority in battleships to divide the force without the risk of one part being To the left: George Alexander Ballard, the Royal Navy’s main conceptual thinker in the two decades defeated by a larger fleet. before the First World War. He had developed the concept of the observational blockade since the 1890s. -
The Origination and Evolution of Radio Traffic Analysis: the World War I Era
UNCLASSI Fl ED The Origination and Evolution of Radio Traffic Analysis: The World War I Era (b )(3)-P. L. 86-36 Not unlike the telegraph and ita influence on the American Civil War, the invention of radio had a profound affect on World War I military operations and in all conflicts since 1901. Signals intelligence, a new form. of intelligence produced from. the intercept of radio traffic, developed on a parallel course with radio during the early years of the twentieth century. Although signals intelligence was identified as a method to produce useful and critical information during war, it did not mature as a significant tool until after the ,.War to End All Wars." Radio traffic analysis, a branch of signals intelligence, was not even recognized as a separate technique until long after the First World War ended. Nevertheless, traffic analysis, or TIA, existed as a function in that era and made significant contributions to military operations and to the development ofsignals intelligence. For the American signals intelligence service, radio traffic analysis originated as a technique in the codebreaking section and with the clerks in the goniometric or Direction Finding (DF) service of the American Expeditionary Force. The early cryptanalysts developed TIA techniques to identify the originator and receiver of radio messages and to determine the more important encoded or enciphered messages to attack. TIA also evolved in the DF service with the clerks who discovered ways to produce intelligence from analysis of the externals of messages and from the location ofthe radio transmitters. The increasingly more complex communications systems which defied cryptanalytic attack provided the impetus for these developments. -
The First Americans the 1941 US Codebreaking Mission to Bletchley Park
United States Cryptologic History The First Americans The 1941 US Codebreaking Mission to Bletchley Park Special series | Volume 12 | 2016 Center for Cryptologic History David J. Sherman is Associate Director for Policy and Records at the National Security Agency. A graduate of Duke University, he holds a doctorate in Slavic Studies from Cornell University, where he taught for three years. He also is a graduate of the CAPSTONE General/Flag Officer Course at the National Defense University, the Intelligence Community Senior Leadership Program, and the Alexander S. Pushkin Institute of the Russian Language in Moscow. He has served as Associate Dean for Academic Programs at the National War College and while there taught courses on strategy, inter- national relations, and intelligence. Among his other government assignments include ones as NSA’s representative to the Office of the Secretary of Defense, as Director for Intelligence Programs at the National Security Council, and on the staff of the National Economic Council. This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other US government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: (Top) Navy Department building, with Washington Monument in center distance, 1918 or 1919; (bottom) Bletchley Park mansion, headquarters of UK codebreaking, 1939 UNITED STATES CRYPTOLOGIC HISTORY The First Americans The 1941 US Codebreaking Mission to Bletchley Park David Sherman National Security Agency Center for Cryptologic History 2016 Second Printing Contents Foreword ................................................................................ -
Code Breaking at Bletchley Park
Middle School Scholars’ CONTENTS Newsletter A Short History of Bletchley Park by Alex Lent Term 2020 Mapplebeck… p2-3 Alan Turing: A Profile by Sam Ramsey… Code Breaking at p4-6 Bletchley Park’s Role in World War II by Bletchley Park Harry Martin… p6-8 Review: Bletchley Park Museum by Joseph Conway… p9-10 The Women of Bletchley Park by Sammy Jarvis… p10-12 Bill Tutte: The Unsung Codebreaker by Archie Leishman… p12-14 A Very Short Introduction to Bletchley Park by Sam Corbett… p15-16 The Impact of Bletchley Park on Today’s World by Toby Pinnington… p17-18 Introduction A Beginner’s Guide to the Bombe by Luca “A gifted and distinguished boy, whose future Zurek… p19-21 career we shall watch with much interest.” This was the parting remark of Alan Turing’s Headmaster in his last school report. Little The German Equivalent of Bletchley could he have known what Turing would go on Park by Rupert Matthews… 21-22 to achieve alongside the other talented codebreakers of World War II at Bletchley Park. Covering Up Bletchley Park: Operation Our trip with the third year academic scholars Boniface by Philip Kimber… p23-25 this term explored the central role this site near Milton Keynes played in winning a war. 1 intercept stations. During the war, Bletchley A Short History of Bletchley Park Park had many cover names, which included by Alex Mapplebeck “B.P.”, “Station X” and the “Government Communications Headquarters”. The first mention of Bletchley Park in records is in the Domesday Book, where it is part of the Manor of Eaton.