1St Issue 1990

Total Page:16

File Type:pdf, Size:1020Kb

1St Issue 1990 SECREt- GJUlUVLDUJUll1 ~15I]l!l[EVU~ Ul(B15UJI]~ (r~(1iV ~l5m(1il]l5 ~ __ 00 l5(iJ lDl5 f OO£D(1i\?I1GJWlD 1st Issue 1990 BRAVE NEW WORLD .•....... Gerald R. You~g; . 1 CRYSCOM '89 RECOMMENDATIONS ... If·· . 3 THE COLUMBUS DAY VIRUS. •.... C3l3. 5 THE CRYPTOLOGIC LINGUIST PROGRAM. If.!L . 9 TO NEW AUTHORS. ...•.... •.••. .10 A NOTE ON THE LINGUIST PROBLEM. :.~ f. /1' .11 THE ROLE OF OPSEC ••.•• ! I .13 DEPUTY DAWG •.•..... .15 KRYPTOS ESSAY COMPETITION • •......• .• .. 17 DAVID HARRIS: IN MEMORIAM. .....•••..18 BULLETIN BOARD. .....• . .......•..20 THE MYSTERIES OF GAMMA. .• • Richard Sylvester .21 SORTING, ORDERING, AND HEAPING ON CRAY. .1 I. .22 TECHNICAL LITERATURE REPORT. ..• .. David Harris !. .24 BOOK REVIEWS: THE CUCKOO'S EGG. .• .. .I I. .25 ....•.• REFLECTIONS ON INTELLIGENCE . Vera Filby.. .29 SOFTWARE REVIEW: MATHEMATICA. ..• . Robert Ward . .31 LETTERS. ............. ...... .. .32 HANDLE VIA GOMIN' CHANNELS ONLY CLASSIFIED BY NSAlCSSM 123 2 -sEGRH- DECLASSIFY ON: Ofi~iFlatiR~ Age~(:l"§ Deterl'T'li~8tio~ Required NOT RELEASABLE TO CONTRACTORS Declassified and Approved for Release by NSA on 10-17-2012 pursuant to E.O. 13526. MDR Case # 54779 DocrD: 4019716 ,\f'P.L. 86-36 Published by Pl, Techniques and Standards A L~~::~~$.&(::AN ARCHEOLOGIST VOL XvII, No.1 : ', , .. ,1st Issue 1990 At ll"r,E!~~~t'~e~n~~/~f archeologists a foremost me;n~rot~lj\lttri¥made some pronouncements that PUBLISHER. ,,,,;,,,,,. :. '" .1 I::8sf9~ii~~:d,fri~Je'il~w prof,essionals: BOARD OF EDITORS{' H:~'::.w~~ld 06* appoint anyone to head a dig who ..... ,' I..-----~1963.'.·-1.1. 03.).••• ,<~.::, 60ul.ci::rio~~rite and communicate with the public; Editor . ,An8rch~ologist who fails to publish (and in good .... / .... / ··/ti~e.).:::-"is a destructive treasure hunter, not a Computer Systems I (963:J103» ~cil" CryptanaIystS· ................1'963'~., '.:52''"... /..' ..'/ sch.,o,·.lar; Cryptolinguistics J 9li3:43S5)/1'Ile one-man-one site philosophy is obsolete. Index 1 96H&14) ..' Information Science r 9637 3;456) .. Language ........... 963-3(57) .Then he announced that he was stepping down as the Mathematics I 963-5566) head of his dig to devote himself to writing up earlier Puzzles. ...... .r 963-643()~/ excavations. Science and Technology .. I 963-4958) Special Research ,,. Vera R. Filby (968-S043) Now this is bound to have a stunning impact on the Traffic Analysis , Robert J. Hanyok (963~4j51) conduct of all archeology, for this man directed the excavation of one of the most glamorous finds of Illustrators , I __---k963-62341 .........: .I 1963:6423) recent times. As well as being one of the most respected archeologists ever and the author of seven books and over 100 articles -- all eminently readable - he has appeared on ·television and is al~ost a To submit ,articles or letters by mail, send to: Editor, CRYPTOLOG. Pl, NORTH 2N018 household name. He could have stayed on, as most others have done, to bask in glory as monarch of a If you used a word processor, please include the mag' prestigious site. card, floppy or diskette along with your hard copy, with a notation as to what equipment, operating system, Instead, he is using his standing to set an 'example for and software you used. others, to write up what he had done as a junior when via PLATFORM mail. send to: he was not in control of his endeavors. cryptlg@bar1cOS (bar-one-c-zero"five) He emphasized that the head of a dig must be able to (note: no '0') communicate, 'both orally and in writing, with the via ALLIANCE, send to: pUblic as well as fellow archeologists, for it is the PLBROWN [note: all caps) public who supports archeology. And it does not do to attn: CRYPTOLOG hoard your findings to write up upon retirement -- you Always include your full name, organization,and secure might die before then (this has happened) -- and In any phone; also building and room numbers. case, the Information you are withholding until perfection is reached may be just what's needed elsewhere, and right now. And you certainly shouldn't For Change of Address spend 40 years refining references and footnotes. mail name and old and new organizations to: Editor, CRYPTOLOG, p!. NORTH 2N018 As for one-man,.one-site-- teamwork is what is needed Please do not phone. by a number of specialists-botanists, anthropologists, epigraphists, geologists, pathologists, and so on. No one person knows it all; Contents of CRYPTOLOG may not be reproduced or disseminated outside the National Security Agency without A good example for us all.' the permission of the Publisher. Inquiries regarding repro- duction a'nd dissemination'should be directed to the Editor. All opinions expressed in CRYPTOLOG are those of the authors. They do not represent the official views of the National Security Agency/Central Security Service. POR OFPIGfAh "fFSB OHb¥ DOCID: 4019716 CO~fI9E~1'ffAL This article is classified Se.JFIQi.I:rUU.. In its entirety l3f1f1lJE IlEW W[)f'lllJ Historically, the need for computers to do ,----------------,I This article is based on the keynote I I address delivered at the CRYSCO '89 I cryptanalysis has been well recognized, and as a Conference, 19 June 1989 consequence, the cryptanalytic community has L ~ continually encouraged the computer industry to produce ever faster machines with more computa­ CRYSCO-89 is the sixth annual Cryptanalytic tional power. We have also asked for increasingly Software Conference, Its theme is "Brave New "user-friendly" systems with ease ofaccess and World," This represents one ofour more data transfer. In fact, for some previous genera­ important efforts to exploit the potential of a new tions ofcomputing machines, NSA needs have been computer environment for cryptanalytic work, the primary driving force for development. Very early on, we used punched cards and paper tape But before I speak about computing, let me first for both program code and data media. This was say a few words about the importance of followed by the use ofdumb terminals for pro­ cryptanalysis to this Agency, gramming and magnetic tape for data, and now Since becoming Deputy Director, I have spent a we have progressed to smart terminals and elec­ considerable amount of time working with the tronic links for moving data from machine to cryptanalytic community as Chairman ofthe machine. Each change brought an improvement Cryptanalysis Council. I echo and applaud Vice in some aspect 'of our computer resources - some­ Admiral Studeman's characterizations of the times in the form ofbetter response time, some­ disciplines ofcryptanalysis and cryptomathe­ times in the form ofa more flexible input"output matics, along with their primary support scenario. discipline ofcomputer science, as the bedrock of I th t 'th te hn lIt' 1 ' 1 n e pas , WI c 0 ogy re a Ive y SImp e this Agency's mission. I further believe that the d to t d ' t d d dId compare 0 ay s s an ar s, we eve ope way we in the CA community meet the challenge of 1 I. our own operat'mg system, spec'fica11y working in this "Brave New World" is critical to L-----th.... .... alyt... · h 11 1 .....1 ' ,. to meet e crypwin . IC C a enge. L.-__~"";" thIS mISSIOn, has proVl'dedou ts tand'Ing....ed't' .lIng and 1st Issue 1990· CRYPTOLOG· page 1 CONFtBEf('f'fAL P.L. 86-36 P.L. 86-36 DOCID: 4019716 EO 1.4. (c) C8P1FHUiNU/..b computational capabilities since its inception in sources are currently diverted temporarily from 970. traditional cryptanalysis to learning the C programming language and the UNIX operating L IThe differ- system and to converting applications programs. ences caused great difficulties in software exchange I realize that this is a cumbersome process. But and maintenance, and for years we had an environ- I encourage you to look to the advantages that ment in which this exchange was very complicated the new environment offers, and to devise ways and sometimes impossible to implement. So with to exploit its potential. the arrival ofCray machines, a conscious decision You are already beginning to do some CA work was made to keep the NSA an~ I systems compatible. The formal accord stated that on the High Performance Workstations, and the two Agencies should jointly develop the operat­ special boards are being deployed to do even ing system and utility software. more complex tasks on the SUNs. As you gain UNIX experience, ifyou see inefficiencies or deficiencies, point them out to your manage­ I believe that the success "---':"'"':"''''''---T'''::-":''''''' of the ffort is a prime example of skilled ment and work with the T organization to people working together~operatively toward a correct them. Together, we should be able to common goal. P.L.86-36 meet this challenge and refine the system to do an even hetter job than we have in the past The introduction of stand-alone personal computers removed the need to access mainframes for word With.the variety ofcomputer resources available processing tasks, but cryptanalytic work on the PCs to you, I challenge you to find appropriate uses ea~h was less successful owing to an inability to load data for ofthe capabilities, to identify the right easily and to access data bases. However, PCs did machines for a particular task, and to maximize point the way forward, demonstrating facilities such the use ofthis vital, versatHc wealth of com­ as graphics displays, color displays, and local quality puter po",er. To that end, I fully support the printing. goals ofthe Cryptanalytic Software Conference, together with the year-round work ofits spon­ Now let me move to on the present challenge. soring org~ization, the Cryptanalytic Software Committee. We can no longer afford the manpower resources to modify and maintain our own operating system for I also see that the conference agenda includes a each individual computer type.
Recommended publications
  • Pdf Softwarebasis Für Viele Weitere Forschungsarbeiten Auf 273 Frank F
    Mathematisch-naturwissenschaftliche Klasse Abhandlungen München, Neue Folge 178 Mathematisch-naturwissenschaftliche Klasse Abhandlungen München 2014, Neue Folge 178 Anpassung, Unbotmäßigkeit und Widerstand Karl Küpfmüller, Hans Piloty, Hans Ferdinand Mayer – Drei Wissenschaftler der Nachrichtentechnik im «Dritten Reich» Joachim Hagenauer Martin Pabst Vorgetragen in der Gesamtsitzung der BAdW am 19. Oktober 2012 ISSN 0005 6995 ISBN 978 3 7696 2565 3 © Bayerische Akademie der Wissenschaften München, 2014 Layout und Satz: a.visus, München Druck und Bindung: Pustet, Regensburg Vertrieb: Verlag C. H. Beck, München Gedruckt auf säurefreiem, alterungsbeständigem Papier (hergestellt aus chlorfrei gebleichtem Zellstoff) Printed in Germany www.badw.de www.badw.de/publikationen/index.html Später sagte er mir einmal, daß sich ein Eintritt in die Partei wohl früher oder später nicht vermeiden liesse, um seine Fähigkeiten in den Dienst der Technik zu stellen. Man könne sich «nicht in den Schmollwinkel zurückziehen». Ein Kollege über Karl Küpfmüller Prof. Piloty ist der Typ des Intellektuellen, der bewusst mit seiner Kritik zersetzend und herabsetzend wirken will. Er versucht dabei, diese Kritik mit seiner Besorgnis um die Zukunft zu tarnen. Unter Bezugnahme auf die Besorgnis bringt er ständig Bedenken gegen die Politik des Führers und seiner Mitarbeiter vor. Der Gauführer des NSD-Dozentenbunds über Hans Piloty Eine Bestie wie Hitler sollte den Krieg nicht gewinnen. Hans Ferdinand Mayer Inhalt 1. Verhaltensoptionen in der NS-Zeit – eine vergleichende Betrachtung am Beispiel von drei Wissenschaftlern der Nachrichtentechnik 7 2. Lebensläufe und Karrieren: Karl Küpfmüller, Hans Piloty, Hans Ferdinand Mayer 11 3. Die wissenschaftlichen Leistungen der drei Nachrichtentechniker 41 4. Technik und Ingenieure im Nationalsozialismus 50 5. Gemeinsame Wege in Wissenschaft und Forschung – getrennte Wege in der Politik: Das Verhalten von Küpfmüller, Mayer und Piloty im NS-Staat und Krieg 58 6.
    [Show full text]
  • The Current-Source Equivalent
    Scanning Our Past Origins of the Equivalent Circuit Concept: The Current-Source Equivalent I. INTRODUCTION technical work, Mayer’s personal life perhaps had more im- As described in my previous paper [1], the voltage-source pact. As described in [8], [10], [11], Mayer secretly leaked equivalent was first derived by Hermann von Helmholtz to the British in November 1939 all he knew of Germany’s (1821–1894) in an 1853 paper [2]. Exactly thirty years later warfare capabilities, particularly concerning electronic war- in 1883, Léon Charles Thévenin (1857–1926) published fare. Because he represented Siemens as a technical expert the same result [3], [4] apparently unaware of Helmholtz’s in negotiations with companies outside Germany, he had the work. The generality of the equivalent source network was opportunity to travel widely about Europe. While in Oslo, not appreciated until forty-three years later. Then, in 1926, Norway, he typed and mailed a two-page report of what he Edward Lawry Norton (1898–1983) wrote an internal Bell knew and mailed it to the British Embassy in Oslo. Because Laboratory technical report [5] that described in passing the Mayer wrote it anonymously, the British, led by Reginald usefulness in some applications of using the current-source Jones, had to determine the report’s accuracy. Jones found form of the equivalent circuit. In that same year, Hans what became known as the Oslo Report to be a technically Ferdinand Mayer (1895–1980) published the same result [6] knowledgeable person’s description of what he/she knew (al- and detailed it fully. As detailed subsequently, these people though it contains some errors) [11].
    [Show full text]
  • ITW2015 2015 IEEE Information Theory Workshop October 11~15, 2015 / Lotte City Hotel Jeju, Jeju Island, Korea
    IEEE Information Theory Society Newsletter Vol. 65, No. 1, March 2015 Editor: Tara Javidi ISSN 1059-2362 Editorial committee: Frank Kschischang, Giuseppe Caire, Meir Feder, Tracey Ho, Joerg Kliewer, Anand Sarwate, Andy Singer, and Sergio Verdú President’s Column Michelle Effros It is an honor and a privilege to take on the reaching out to other research communities, role of 2015 President of the Information working with the popular press, or develop- Theory Society. This community has been ing materials for children and their teachers, an intellectual home to me throughout my I believe that we should spend more time career, and I am grateful for the opportu- sharing the questions and results that inspire nity to serve. us with people who are not already similarly inspired. Every school child learns the name To me, the Information Theory Society is of Albert Einstein; his most famous equation characterized by the beauty of its questions has somehow entered the realm of popular and answers, the brilliance of its partici- culture. Why is it that so few people know the pants, the intellectual rigor and honesty of name or have heard about the contributions of its technical activities, and the warmth of Claude Elwood Shannon? Clearly the respec- its community. The society stands on solid tive fame of these two men is not a measure footing today because of the leaders who of the direct impact that each man’s results came before me. We are fiscally sound. Our have had on the substance of those school Transactions remain a model of excellence.
    [Show full text]
  • Traditions and Transformations in the History of Quantum Physics Max Planck Research Library for the History and Development of Knowledge
    Traditions and Transformations in the History of Quantum Physics Max Planck Research Library for the History and Development of Knowledge Series Editors Jürgen Renn, Robert Schlögl, Bernard F. Schutz. Edition Open Access Development Team Lindy Divarci, Jörg Kantel, Nina Ruge, Matthias Schemmel, Kai Surendorf. Scientific Board Markus Antonietti, Ian Baldwin, Antonio Becchi, Fabio Bevilacqua, William G. Boltz, Jens Braarvik, Horst Bredekamp, Jed Z. Buchwald, Olivier Darrigol, Thomas Duve, Mike Edmunds, Yehuda Elkana†, Fynn Ole Engler, Robert K. Englund, Mordechai Feingold, Rivka Feldhay, Gideon Freudenthal, Paolo Gal- luzzi, Kostas Gavroglu, Mark Geller, Domenico Giulini, Günther Görz, Gerd Graßhoff, James Hough, Manfred Laubichler, Glenn Most, Klaus Müllen, Pier Daniele Napolitani, Alessandro Nova, Hermann Parzinger, Dan Potts, Sabine Schmidtke, Circe Silva da Silva, Ana Simões, Dieter Stein, Richard Stephenson, Mark Stitt, Noel M. Swerdlow, Liba Taub, Martin Vingron, Scott Walter, Norton Wise, Gerhard Wolf, Rüdiger Wolfrum, Gereon Wolters, Zhang Baichun. Proceedings 5 Edition Open Access 2017 Traditions and Transformations in the History of Quantum Physics HQ–3: Third International Conference on the History of Quantum Physics, Berlin, June 28 – July 2, 2010 Shaul Katzir, Christoph Lehner, Jürgen Renn (eds.) Edition Open Access 2017 Max Planck Research Library for the History and Development of Knowledge Proceedings 5 Communicated by: Olivier Darrigol Edited by: Shaul Katzir, Christoph Lehner, Jürgen Renn Editorial Coordination: Nina Ruge
    [Show full text]
  • The Physicist Rolf Widerøe – a Giant in the History of Accelerators
    Springer Biographies Obsessed by a Dream The Physicist Rolf Widerøe – a Giant in the History of Accelerators AASHILD SØRHEIM Springer Biographies Te books published in the Springer Biographies tell of the life and work of scholars, innovators, and pioneers in all felds of learning and throughout the ages. Prominent scientists and philosophers will feature, but so too will lesser known personalities whose signifcant contributions deserve greater recognition and whose remarkable life stories will stir and motivate readers. Authored by historians and other academic writers, the volumes describe and analyse the main achievements of their subjects in manner accessible to nonspecialists, interweaving these with salient aspects of the protagonists’ personal lives. Autobiographies and memoirs also fall into the scope of the series. More information about this series at http://www.springer.com/series/13617 Aashild Sørheim Obsessed by a Dream The Physicist Rolf Widerøe – a Giant in the History of Accelerators Aashild Sørheim Oslo, Norway Translated by Frank Stewart, Bathgate, UK ISSN 2365-0613 ISSN 2365-0621 (electronic) Springer Biographies ISBN 978-3-030-26337-9 ISBN 978-3-030-26338-6 (eBook) https://doi.org/10.1007/978-3-030-26338-6 Translation from the Norwegian language edition: Besatt av en drøm. Historien om Rolf Widerøe by Aashild Sørheim, © Forlaget Historie & Kultur AS, Oslo, Norway, 2015. All Rights Reserved. ISBN: 9788283230000 © Te Editor(s) (if applicable) and Te Author(s) 2020. Tis book is an open access publication. Open Access Tis book is licensed under the terms of the Creative Commons Attribution-NonCommercial- NoDerivatives 4.0 International License (http://creativecommons.org/licenses/by-nc-nd/4.0/), which permits any noncommercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if you modifed the licensed material.
    [Show full text]
  • APPENDIX Abbreviations ...388 Notes
    APPENDIX Abbreviations ........................................ 388 Notes ................................................ 389 References ............................................ 411 Index ................................................ 427 Source of Illustrations .................................. 447 ABBREVIATIONS AGB Archiv fiir Geschichte des Buchwesens (Archive for the History of the Book) AWV Arbeitsgemeinschafi wissenschaftlicher Verleger (Working Group of Scientific Publishers) BA.P Bundesarchiv, Potsdam (Federal Archive, Potsdam) Bbl. B6rsenblatt fi~r den Deutschen Buchhandel (Journal for the German Book Trade) BDC Berlin Document Center DFG Deutsche Forschungsgemeinschaft (German Research Associ- ation) FS Lebenserinnerungen Fritz Springers (Unpublished memoirs by Fritz Springer) KV Kontradiktorische Verhandlungen (Opposing Negotiations) KWG Kaiser- Wilhelm-Gesellschaft LB Lebensbericht Ferdinand Springers (Unpublished typescript of a talk by Ferdinand Springer to the Heidelberg Rotary Club in 1952) MS Marie Springer: Julius Springer. Eine Lebensskizze (Sketch of a Life) NG Notgemeinschaft der deutschen Wissenschaft (Emergency As- sociation of German Science) PPK Parteiamtliche Pri2fungskommission ([National-Socialist] Par- ty Examination Commission) PTR Physikalisch- Technische R eichsanstalt (Physical-Technical In- stitute of the Reich) RKK Reichskulturkammer (Reich Chamber of Culture) RSK Reichsschrifttumskammer (Reich Chamber of Literature) TH Technische Hochschule (Technical High School - College of Technology) VDE
    [Show full text]
  • Technologies of Intelligence and Their Relation to National Security Policy: a Case Study of the U.S
    TECHNOLOGIES OF INTELLIGENCE AND THEIR RELATION TO NATIONAL SECURITY POLICY: A CASE STUDY OF THE U.S. AND THE V-2 ROCKET John McKinney Tucker, Jr. Dissertation submitted to the faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy In Science and Technology Studies Gary Downey, Co-Chair Shannon A. Brown, Co-Chair Janet Abbate J. Dean O’Donnell Lee Zwanziger May 29, 2013 Northern Virginia Center Key Words: History, Modern, Sociology, Organizational, Anthropology, Cultural TECHNOLOGIES OF INTELLIGENCE AND THEIR RELATION TO NATIONAL SECURITY POLICY: A CASE STUDY OF THE U.S. AND THE V-2 ROCKET John McKinney Tucker, Jr. ABSTRACT While government intelligence—knowledge to support policy decision making— is often characterized as an art or science, this dissertation suggests it is more akin to what Science and Technology Studies call a “technological system” or a” sociotechnical ensemble”. Such a policy support tool is a mechanism socially constructed for the production of policy-relevant knowledge through integration of social and material components. It involves organizational and procedural innovations as much as it does specialized hardware for obtaining, manipulating, and distributing information. The development and function of American intelligence is illustrated here through a case study of how the United States and its European allies learned about Germany’s World War II secret weapons, especially the long-range liquid fueled rocket known to their military as the A4, but better known to the public as the V-2. The colonial British heritage and the unique American experiences of participating in wars taking place in domestic and foreign territories set the cultural stage for both the strengths and weaknesses with which American intelligence approached the rapidly evolving German secret weapon capabilities of World War II.
    [Show full text]
  • Wissen Ist Menschlich. Der Stellenwert Der Human Intelligence in Der Britischen Kriegsführung 1939–1945
    Bell, Falko (2014) Wissen ist menschlich. Der Stellenwert der Human Intelligence in der britischen Kriegsführung 1939–1945. PhD thesis. https://theses.gla.ac.uk/5382/ Copyright and moral rights for this work are retained by the author A copy can be downloaded for personal non-commercial research or study, without prior permission or charge This work cannot be reproduced or quoted extensively from without first obtaining permission in writing from the author The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the author When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given Enlighten: Theses https://theses.gla.ac.uk/ [email protected] Wissen ist menschlich. Der Stellenwert der Human Intelligence in der britischen Kriegsführung 1939–1945 Inauguraldissertation zur Erlangung des Akademischen Grades eines Dr. phil., vorgelegt dem Fachbereich 07 – Geschichts- und Kulturwissenschaften der Johannes Gutenberg-Universität Mainz von Falko Bell aus Limburg an der Lahn 2014 Referent: Prof. Dr. Sönke Neitzel Korreferent: PD Dr. Alaric Searle (University of Salford) Tag des Prüfungskolloquiums: 10. Februar 2014 Summary This thesis examines the use of prisoners of war (POWs), agents and other groups of persons as source of information in the British conduct of war against Germany during the Second World War and demonstrates its significance. While the successes of Bletchley Park in decrypting German wireless traffic are well-known, human intelligence (HUMINT) has received considerably less scholarly attention. During the years 1939 to 1945, the British used an extensive espionage network, maintained informal contacts in neutral cities, and questioned refugees, convicted enemy spies and soldiers who had escaped from German captivity.
    [Show full text]
  • A SHORT HISTORY of CIRCUITS and SYSTEMS CIRCUITS a SHORT HISTORYA SHORT of CIRCUITS and SYSTEMS CIRCUITS and Franco Maloberti and Anthony C
    A SHORT HISTORY OF A SHORT HISTORY OF CIRCUITS AND SYSTEMS A SHORT HISTORY OF A SHORT HISTORY CIRCUITS AND SYSTEMS CIRCUITS AND Franco Maloberti and Anthony C. Davies (Editors) SYSTEMS After an overview of major scientific discoveries of the 18th and 19th Franco Maloberti and Anthony C. Davies (Editors) centuries, which created electrical science as we know and understand it and led to its useful applications in energy conversion, transmission, manufacturing industry and communications, this Circuits and Systems History book fills a gap in published literature by providing a record of the many outstanding scientists, mathematicians and engineers who laid the foundations of Circuit Theory and Filter Design from the mid-20th Century. Additionally, the book records the history of the IEEE Circuits and Systems Society from its origins as the small Circuit Theory Group of the Institute of Radio Engineers (IRE), which merged with the American Institute of Electrical Engineers (AIEE) to form IEEE in 1963, to the large and broad-coverage worldwide IEEE Society which it is today. Many authors from many countries contributed to the creation of this book, working to a very tight time-schedule. The result is a substantial contribution to their enthusiasm and expertise which it is hoped that readers will find both interesting and useful. It is sure that in such a book omissions will be found and in the space and time available, much valuable material had to be left out. It is hoped that this book Anthony C. Davies (Editors) Franco Maloberti and will stimulate an interest in the marvellous heritage and contributions that have come from the many outstanding people who worked in the Circuits and Systems area.
    [Show full text]
  • Serving the Reich: the Struggle for the Soul of Physics Under Hitler
    Serving the Reich Serving the Reich the struggle for the soul of physics under hitler Philip Ball the university of chicago press chicago Philip Ball is a freelance writer who lives in London. He worked for over twenty years as an editor for Nature, writes regularly in the scientific and popular media, and has written many books on the interactions of the sciences, the arts, and the wider culture. The University of Chicago Press, Chicago 60637 The University of Chicago Press, Ltd., London © 2014 by Philip Ball All rights reserved. Published 2014. Printed in the United States of America 23 22 21 20 19 18 17 16 15 14 1 2 3 4 5 ISBN-13: 978-0-226-20457-4 (cloth) ISBN-13: 978-0-226-20460-4 (e-book) DOI: 10.7208/chicago/9780226204604.001.0001 Originally published by Bodley Head, 2013. library of congress cataloging-in-publication data Ball, Philip, 1962– Serving the Reich : the struggle for the soul of physics under Hitler / Philip Ball. pages ; cm Includes bibliographical references and index. ISBN 978-0-226-20457-4 (cloth : alk. paper) — ISBN 978-0-226-20460-4 (e-book) 1. National socialism and science. 2. Nuclear physics—Germany—History—20th century. 3. World War, 1939–1945—Science—Germany. 4. Science—Moral and ethical aspects— Germany. 5. Kaiser-Wilhelm-Institut für Physik. 6. Germany—History—1933–1945. 7. Planck, Max, 1858–1947. 8. Debye, Peter J. W. (Peter Josef William), 1884–1966. 9. Heisenberg, Werner, 1901–1976. I. Title. QC773.3.G3B35 2014 530.0943’09043—dc23 2014010718 This paper meets the requirements of ANSI/NISO Z39.48-1992 (Permanence of Paper).
    [Show full text]
  • Bomber Command's Electronic Warfare Policy and Suppression of Enemy Air Defence Posture During the Second World
    BOMBER COMMAND’S ELECTRONIC WARFARE POLICY AND SUPPRESSION OF ENEMY AIR DEFENCE POSTURE DURING THE SECOND WORLD WAR By THOMAS JEAVONS WITHINGTON A thesis submitted to the University of Birmingham for the degree of DOCTOR OF PHILOSOPHY Department of History, History office, Arts Building, University of Birmingham, Edgbaston, Birmingham, September 2017. II University of Birmingham Research Archive e-theses repository This unpublished thesis/dissertation is copyright of the author and/or third parties. The intellectual property rights of the author or third parties in respect of this work are as defined by The Copyright Designs and Patents Act 1988 or as modified by any successor legislation. Any use made of information contained in this thesis/dissertation must be in accordance with that legislation and must be properly acknowledged. Further distribution or reproduction in any format is prohibited without the permission of the copyright holder. ABSTRACT This thesis will examine the Electronic Warfare [EW] policies and subsequent Suppression of Enemy Air Defence [SEAD] postures of the Royal Air Force’s Bomber Command during the Second World War. It examines how EW was applied to the Luftwaffe (German Air Force) Integrated Air Defence System [IADS] so as to reduce Bomber Command aircraft losses, and determines whether EW policies were drafted in a proactive and/or reactive fashion vis-à-vis the Luftwaffe IADS. The thesis applies air power theory regarding the levels and methods of application by which SEAD was brought to bear against the IADS as a result of these EW policies. Ultimately, the thesis will argue that Bomber Command enacted both proactive and reactive EW policies at the Campaign and Localised SEAD levels using a combination of Manoeuvrist, Mass and Stealth/Surprise approaches.
    [Show full text]