Military History Anniversaries 16 Thru 31 Oct
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Chinese Civil War (1927–37 and 1946–49)
13 CIVIL WAR CASE STUDY 2: THE CHINESE CIVIL WAR (1927–37 AND 1946–49) As you read this chapter you need to focus on the following essay questions: • Analyze the causes of the Chinese Civil War. • To what extent was the communist victory in China due to the use of guerrilla warfare? • In what ways was the Chinese Civil War a revolutionary war? For the first half of the 20th century, China faced political chaos. Following a revolution in 1911, which overthrew the Manchu dynasty, the new Republic failed to take hold and China continued to be exploited by foreign powers, lacking any strong central government. The Chinese Civil War was an attempt by two ideologically opposed forces – the nationalists and the communists – to see who would ultimately be able to restore order and regain central control over China. The struggle between these two forces, which officially started in 1927, was interrupted by the outbreak of the Sino-Japanese war in 1937, but started again in 1946 once the war with Japan was over. The results of this war were to have a major effect not just on China itself, but also on the international stage. Mao Zedong, the communist Timeline of events – 1911–27 victor of the Chinese Civil War. 1911 Double Tenth Revolution and establishment of the Chinese Republic 1912 Dr Sun Yixian becomes Provisional President of the Republic. Guomindang (GMD) formed and wins majority in parliament. Sun resigns and Yuan Shikai declared provisional president 1915 Japan’s Twenty-One Demands. Yuan attempts to become Emperor 1916 Yuan dies/warlord era begins 1917 Sun attempts to set up republic in Guangzhou. -
Bicentennial Source Book, Level I, K-2. INSTITUTION Carroll County Public Schools, Westminster, Md
--- I. DOCUMENT RESUME ED 106 189 S0,008 316 AUTHOR _Herb, Sharon; And Others TITLE Bicentennial Source Book, Level I, K-2. INSTITUTION Carroll County Public Schools, Westminster, Md. PUB DATE 74 NOTE 149p.; For related guides, see CO 008'317-319 AVAILABLE FROM .Donald P. Vetter, Supervisor of Social Studies, Carroll County Board of Education, Westsinister, Maryland 21157 ($10.00; Set of guides.I-IV $50:00) EDRS PRICE MF-$0..76 HC-Not Available from EDRS..PLUS POSTAGE DESCRIPTORS *American Studies; Class Activities; *Colonial History (United States); Cultural Activities; Elementary Education; I structionalMaterials; *Learning Activities; Muc Activities; Resource Materials; Revolutionary Wa (United States); Science Activities; *Social Studies; Icher Developed Materials; *United States History IDENTIFIERS *Bicentennial ABSTRACT This student activities source book ii'one of a series of four developed by the Carroll County Public School System, Maryland, for celebration of the Bicentennial. It-is-specifically designed to generate ideas integrating the Bicentennial celebration into various disciplines, classroom activitiese.and school -vide 4vents at the kindergarten through second grade levels. The guide contains 81 activities related to art, music, physical-education, language arts, science, and social studies. Each activity includes objectives, background information, materials and resources, recommended instructional proce ures,and possible variations and modifications. The activities are organized around the Bicentennial themes of Heritage, Horizons, and Festival. Heritage. activities focus on events, values, traditionp, and historical objects of the past. Horizon activities stress challenging the problems of the present and future. Festival activities include such activities as community craft shows, workshops, folk music, and dance performances. (Author /ICE) C BICENTENNIAL SOURCE BOOK LEVEL I . -
In This Issue Upcoming Events Revolutionary War Battles in June
Official Publication of the WA State, Alexander Hamilton Chapter, SAR Volume V, Issue 6 (June 2019) Editor Dick Motz In This Issue Upcoming Events Revolutionary War Battles in June .................. 2 Alexander Hamilton Trivia? ............................ 2 Message from the President ........................... 2 What is the SAR? ............................................ 3 Reminders ..................................................... 3 Do you Fly? .................................................... 3 June Birthdays ............................................... 4 Northern Region Meeting Activities & Highlights ....................... 4 Chapter Web Site ........................................... 5 20 July: West Seattle Parade Member Directory Update ............................. 5 Location: West Seattle (Map Link). Wanted/For Sale ............................................ 6 Southern Region Battles of the Revolutionary War Map ............ 6 4 July: Independence Day Parade Location: Steilacoom (Map Link). Plan ahead for these Special Dates in July 17 Aug: Woodinville Parade 4 Jul: Independence Day Location: Woodinville (Map Link) 6 Jul: International Kissing Day 6 Jul: National fried Chicken Day 2 Sep: Labor Day Parade (pending) 17 Jul: National Tattoo Day Location: Black Diamond (Map Link) 29 Jul: National Chicken Wing Day 15-16 Sep: WA State Fair Booth Location: Puyallup 21 Sep: Chapter meeting Johnny’s at Fife, 9:00 AM. 9 Nov: Veterans Day Parade Location: Auburn (Map Link) 14 Dec: Wreaths Across America Location: JBLM (Map -
Guides to German Records Microfilmed at Alexandria, Va
GUIDES TO GERMAN RECORDS MICROFILMED AT ALEXANDRIA, VA. No. 32. Records of the Reich Leader of the SS and Chief of the German Police (Part I) The National Archives National Archives and Records Service General Services Administration Washington: 1961 This finding aid has been prepared by the National Archives as part of its program of facilitating the use of records in its custody. The microfilm described in this guide may be consulted at the National Archives, where it is identified as RG 242, Microfilm Publication T175. To order microfilm, write to the Publications Sales Branch (NEPS), National Archives and Records Service (GSA), Washington, DC 20408. Some of the papers reproduced on the microfilm referred to in this and other guides of the same series may have been of private origin. The fact of their seizure is not believed to divest their original owners of any literary property rights in them. Anyone, therefore, who publishes them in whole or in part without permission of their authors may be held liable for infringement of such literary property rights. Library of Congress Catalog Card No. 58-9982 AMERICA! HISTORICAL ASSOCIATION COMMITTEE fOR THE STUDY OP WAR DOCUMENTS GUIDES TO GERMAN RECOBDS MICROFILMED AT ALEXAM)RIA, VA. No* 32» Records of the Reich Leader of the SS aad Chief of the German Police (HeiehsMhrer SS und Chef der Deutschen Polizei) 1) THE AMERICAN HISTORICAL ASSOCIATION (AHA) COMMITTEE FOR THE STUDY OF WAE DOCUMENTS GUIDES TO GERMAN RECORDS MICROFILMED AT ALEXANDRIA, VA* This is part of a series of Guides prepared -
Naval Section – Hut 4
The Mansion. Photo: © the2xislesteam The Enigma cipher was the backbone of German military and intelligence communications. First invented in 1918, it was designed to secure banking communications where it achieved little success. However the German military were quick to see its potential, they thought it to be unbreakable, and not without good reason. Enigma's complexity was bewildering. The odds against anyone who did not know the settings being able to break Enigma were a staggering 150 million, million, million, to one. Back in 1932 the Poles had broken Enigma, at a time when the encoding machine was undergoing trials with the German Army., the Poles even managed to reconstruct a machine. At that time, the cipher altered every few months but with the advent of war it changed at least once a day effectively locking the Poles out. July 1939, the Poles had passed on their knowledge to the British and the French. This enabled the code-breakers to make critical progress in working out the order in which the keys were attached to the electrical circuits, a task that had been impossible without an Enigma machine in front of them. Armed with this knowledge, the code-breakers were then able to exploit a chink in Enigma's armour. A fundamental design flaw meant that no letter could ever be encrypted as itself; an A in the original message, for example, could never appear as an A in the code. This gave the code breakers a toehold. Errors in messages sent by tired, stressed or lazy German operators also gave clues. -
Seeschlachten Im Atlantik (Zusammenfassung)
Seeschlachten im Atlantik (Zusammenfassung) U-Boot-Krieg (aus Wikipedia) 07_48/U 995 vom Typ VII C/41, der meistgebauten U-Boot-Klasse im Zweiten Weltkrieg Als U-Boot-Krieg (auch "Unterseebootkrieg") werden Kampfhandlungen zur See bezeichnet, bei denen U-Boote eingesetzt werden, um feindliche Kriegs- und Frachtschiffe zu versenken. Die Bezeichnung "uneingeschränkter U-Boot-Krieg" wird verwendet, wenn Schiffe ohne vorherige Warnung angegriffen werden. Der Einsatz von U-Booten wandelte sich im Laufe der Zeit vom taktischen Blockadebrecher zum strategischen Blockademittel im Rahmen eines Handelskrieges. Nach dem Zweiten Weltkrieg änderte sich die grundsätzliche Einsatzdoktrin durch die Entwicklung von Raketen tragenden Atom- U-Booten, die als Träger von Kernwaffen eine permanente Bedrohung über den maritimen Bereich hinaus darstellen. Im Gegensatz zum Ersten und Zweiten Weltkrieg fand hier keine völkerrechtliche Weiterentwicklung zum Einsatz von U-Booten statt. Der Begriff wird besonders auf den Ersten und Zweiten Weltkrieg bezogen. Hierbei sind auch völkerrechtliche Rahmenbedingungen von Bedeutung. Anfänge Während des Amerikanischen Bürgerkrieges wurden 1864 mehrere handgetriebene U-Boote gebaut. Am 17. Februar 1864 versenkte die C.S.S. H. L. Hunley durch eine Sprengladung das Kriegsschiff USS Housatonic der Nordstaaten. Es gab 5 Tote auf dem versenkten Schiff. Die Hunley gilt somit als erstes U-Boot der Welt, das ein anderes Schiff zerstört hat. Das U-Boot wurde allerdings bei dem Angriff auf die Housatonic durch die Detonation schwer beschädigt und sank, wobei auch seine achtköpfige Besatzung getötet wurde. Auftrag der Hunley war die Brechung der Blockade des Südstaatenhafens Charleston durch die Nordstaaten. Erster Weltkrieg Die technische Entwicklung der U-Boote bis zum Beginn des Ersten Weltkrieges beschreibt ein Boot, das durch Dampf-, Benzin-, Diesel- oder Petroleummaschinen über Wasser und durch batteriegetriebene Elektromotoren unter Wasser angetrieben wurde. -
A “POW Rolex” Recalls the Great
A “POW Rolex” Recalls the Great Escape by Alan Downing Click the images to view larger versions On May 12-13 th, Antiquorum Geneva will hold its second auction of 2007, in which nearly 696 watches and clocks will be auctioned off. On this occasion, two lots, No 311 and 312 will be sold and we are proud to share with you the wonderful story of lot No. 311. We warmly thank Mr Alan Downing, who we met at our Antiquorum Office in Geneva three weeks ago, for sharing with us the exceptional story of this Pow Rolex. Following a very interesting discussion with Mr Downing and thanks to the rich illustrative material he provided us with, we hereby present the story of this Rolex Oyster which belonged to Mr Clive James Nutting, Corporal in the Royal Corps of Signals, who was a prisoner in Stalag Luft III from 1939 to 1945. This essay written by Alan tells us the story of Clive Nutting and shows how Rolex (and other watch factories) were engaged in the regular supply of watches to men incarcerated in Prisoner of War camps like Stalag Luft III (located at Sagan, 100 miles southeast of Berlin, at present Poland). This camp is probably the most famous of all Prisoner of War Camps due to it being the scene of the great escape of march 1944 and the subsequent making of the 1962 film of the same name. We are pleased to share this story, provided by Alan, and photos with the TimeZone community in advance of the catalog's publication. -
Appendix I War of 1812 Chronology
THE WAR OF 1812 MAGAZINE ISSUE 26 December 2016 Appendix I War of 1812 Chronology Compiled by Ralph Eshelman and Donald Hickey Introduction This War of 1812 Chronology includes all the major events related to the conflict beginning with the 1797 Jay Treaty of amity, commerce, and navigation between the United Kingdom and the United States of America and ending with the United States, Weas and Kickapoos signing of a peace treaty at Fort Harrison, Indiana, June 4, 1816. While the chronology includes items such as treaties, embargos and political events, the focus is on military engagements, both land and sea. It is believed this chronology is the most holistic inventory of War of 1812 military engagements ever assembled into a chronological listing. Don Hickey, in his War of 1812 Chronology, comments that chronologies are marred by errors partly because they draw on faulty sources and because secondary and even primary sources are not always dependable.1 For example, opposing commanders might give different dates for a military action, and occasionally the same commander might even present conflicting data. Jerry Roberts in his book on the British raid on Essex, Connecticut, points out that in a copy of Captain Coot’s report in the Admiralty and Secretariat Papers the date given for the raid is off by one day.2 Similarly, during the bombardment of Fort McHenry a British bomb vessel's log entry date is off by one day.3 Hickey points out that reports compiled by officers at sea or in remote parts of the theaters of war seem to be especially prone to ambiguity and error. -
The Darkest Red Corner Matthew James Brazil
The Darkest Red Corner Chinese Communist Intelligence and Its Place in the Party, 1926-1945 Matthew James Brazil A thesis submitted in partial fulfillment of the requirements for a Doctor of Philosophy Department of Government and International Relations Business School University of Sydney 17 December 2012 Statement of Originality This is to certify that to the best of my knowledge, the content of this thesis is my own work. This thesis has not been submitted previously, either in its entirety or substantially, for a higher degree or qualifications at any other university or institute of higher learning. I certify that the intellectual content of this thesis is the product of my own work and that all the assistance received in preparing this thesis and sources has been acknowledged. Matthew James Brazil i ACKNOWLEDGEMENTS Before and during this project I met a number of people who, directly or otherwise, encouraged my belief that Chinese Communist intelligence was not too difficult a subject for academic study. Michael Dutton and Scot Tanner provided invaluable direction at the very beginning. James Mulvenon requires special thanks for regular encouragement over the years and generosity with his time, guidance, and library. Richard Corsa, Monte Bullard, Tom Andrukonis, Robert W. Rice, Bill Weinstein, Roderick MacFarquhar, the late Frank Holober, Dave Small, Moray Taylor Smith, David Shambaugh, Steven Wadley, Roger Faligot, Jean Hung and the staff at the Universities Service Centre in Hong Kong, and the kind personnel at the KMT Archives in Taipei are the others who can be named. Three former US diplomats cannot, though their generosity helped my understanding of links between modern PRC intelligence operations and those before 1949. -
Ship Covers Relating to the Iran/Iraq Tanker War
THE IRAN/IRAQ TANKER WAR AND RENAMED TANKERS ~ Lawrence Brennan, (US Navy Ret.) SHIP COVERS RELATING TO THE IRAN/IRAQ TANKER WAR & REFLAGGED KUWAITI TANKERS, 1987-881 “The Kuwaiti fleet reads like a road map of southern New Jersey” By Captain Lawrence B. Brennan, U.S. Navy Retired2 Thirty years ago there was a New Jersey connection to the long-lasting Iran-Iraq War. That eight years of conflict was one of the longest international two-state wars of the 20th century, beginning in September 1980 and effectively concluding in a truce in August 1988. The primary and bloody land war between Iran and Iraq began during the Iranian Hostage Crisis. The Shah had left Iran and that year the USSR invaded Afghanistan. The conflict expanded to sea and involved many neutral nations whose shipping came under attack by the combatants. The parties’ intent was to damage their opponents’ oil exports and revenues and decrease world supplies. Some suggested that Iran and Iraq wanted to draw other states into the conflict. An Iranian source explained the origin of the conflict at sea. The tanker war seemed likely to precipitate a major international incident for two reasons. First, some 70 percent of Japanese, 50 percent of West European, and 7 percent of American oil imports came from the Persian Gulf in the early 1980s. Second, the assault on tankers involved neutral shipping as well as ships of the belligerent states.3 The relatively obscure first phase began in 1981, and the well-publicized second phase began in 1984. New Jersey, half a world away from the Persian (Arabian) gulf, became involved when the United States agreed to escort Kuwait tankers in an effort to support a friendly nation and keep the international waters open. -
Submarine Warfare, Fiction Or Reality? John Charles Cheska University of Massachusetts Amherst
University of Massachusetts Amherst ScholarWorks@UMass Amherst Masters Theses 1911 - February 2014 1962 Submarine warfare, fiction or reality? John Charles Cheska University of Massachusetts Amherst Follow this and additional works at: https://scholarworks.umass.edu/theses Cheska, John Charles, "Submarine warfare, fiction or reality?" (1962). Masters Theses 1911 - February 2014. 1392. Retrieved from https://scholarworks.umass.edu/theses/1392 This thesis is brought to you for free and open access by ScholarWorks@UMass Amherst. It has been accepted for inclusion in Masters Theses 1911 - February 2014 by an authorized administrator of ScholarWorks@UMass Amherst. For more information, please contact [email protected]. bmbb ittmtL a zia a musv John C. Chaaka, Jr. A.B. Aaharat Collag* ThMis subnlttwi to tho Graduate Faculty in partial fulfillment of tha requlraaanta for tha degraa of Master of Arta Uoiwaity of Maaaaohuaetta Aaherat August, 1962 a 3, v TABU OF CONTENTS Hm ramp _, 4 CHAPTER I Command Structure and Policy 1 II Material III Operations 28 I? The Submarine War ae the Public Saw It V The Number of U-Boate Actually Sunk V VI Conclusion 69 APPENDXEJB APPENDIX 1 Admiralty Organisation in 1941 75 2 German 0-Boat 76 3 Effects of Strategic Bombing on Late Model 78 U-Boat Productions and Operations 4 U-Boats Sunk Off the United States Coaat 79 by United States Forces 5 U-Boats Sunk in Middle American Zone 80 inr United StatM ?bkii 6 U-Bosta Sunk Off South America 81 by United States Forces 7 U-Boats Sunk in the Atlantio in Area A 82 1 U-Boats Sunk in the Atlentio in Area B 84 9A U-Boats Sunk Off European Coast 87 by United States Forces 9B U-Bnata Sunk in Mediterranean Sea by United 87 States Forces TABLE OF CONTENTS klWDU p«g« 10 U-Boats Sunk by Strategic Bombing 38 by United States Amy Air Foreee 11 U-Boats Sunk by United States Forces in 90 Cooperation with other Nationalities 12 Bibliography 91 LIST OF MAPS AND GRAPHS MAP NO. -
Enigma Machine and Its U-Boat Codes
U-559 - U-BOAT CODES ARE BROKEN 0. U-559 - U-BOAT CODES ARE BROKEN - Story Preface 1. THE UNBREAKABLE CODE 2. THE U-BOATS 3. U-110 IN TROUBLE 4. U-110 CAPTURED 5. U-110 SINKS 6. THE CODE IS BROKEN (TEMPORARILY) 7. U-559 - U-BOAT CODES ARE BROKEN 8. U-505 IN PERIL 9. THE CAPTURE OF U-505 10. ENIGMA TODAY Two young British seamen lost their lives when they boarded the German U-boat depicted in this image: U-559. What Lt. Tony Fasson, Able Seaman Colin Grazier and Canteen Assistant Tommy Brown recovered from the sinking vessel helped Alan Turing and his colleagues at Bletchley Park to turn the tide of WWII against Hitler. Even when Bletchley Park began to decipher encrypted Nazi messages, the U-boat version of Enigma proved much more difficult. Not until 1943, after British sailors drowned trying to recover current Enigma-code documents from a captured German vessel, were U-boat codes broken on a regular basis. It wasn't an easy chase on October 30, 1942. HMS HMS Petard and three other British destroyers were pursuing a Nazi sub in the Mediterranean Sea, not far from the Egyptian shore. U-559 was proving why U-boats were so dangerous. She was elusive. The chase lasted 16 hours before U-559's commander decided to scuttle his damaged submarine about 70 miles north of the Nile Delta. (Follow this link to a map where U-559 went down. Look in the lower right-hand corner.) Demonstrating courage that is hard to comprehend, three young sailors swam from Petard to U-559.