CODEBREAKING Suggested Reading List (Can Also Be Viewed Online at Good Reads)

Total Page:16

File Type:pdf, Size:1020Kb

CODEBREAKING Suggested Reading List (Can Also Be Viewed Online at Good Reads) MARSHALL LEGACY SERIES: CODEBREAKING Suggested Reading List (Can also be viewed online at Good Reads) NON-FICTION • Aldrich, Richard. Intelligence and the War against Japan. Cambridge: Cambridge University Press, 2000. • Allen, Robert. The Cryptogram Challenge: Over 150 Codes to Crack and Ciphers to Break. Philadelphia: Running Press, 2005 • Briggs, Asa. Secret Days Code-breaking in Bletchley Park. Barnsley: Frontline Books, 2011 • Budiansky, Stephen. Battle of Wits: The Complete Story of Codebreaking in World War Two. New York: Free Press, 2000. • Churchhouse, Robert. Codes and Ciphers: Julius Caesar, the Enigma, and the Internet. Cambridge: Cambridge University Press, 2001. • Clark, Ronald W. The Man Who Broke Purple. London: Weidenfeld and Nicholson, 1977. • Drea, Edward J. MacArthur's Ultra: Codebreaking and the War Against Japan, 1942-1945. Kansas: University of Kansas Press, 1992. • Fisher-Alaniz, Karen. Breaking the Code: A Father's Secret, a Daughter's Journey, and the Question That Changed Everything. Naperville, IL: Sourcebooks, 2011. • Friedman, William and Elizebeth Friedman. The Shakespearian Ciphers Examined. Cambridge: Cambridge University Press, 1957. • Gannon, James. Stealing Secrets, Telling Lies: How Spies and Codebreakers Helped Shape the Twentieth century. Washington, D.C.: Potomac Books, 2001. • Garrett, Paul. Making, Breaking Codes: Introduction to Cryptology. London: Pearson, 2000. • Hinsley, F. H. and Alan Stripp. Codebreakers: the inside story of Bletchley Park. Oxford: Oxford University Press, 1993. • Hodges, Andrew. Alan Turing: The Enigma. New York: Walker and Company, 2000. • Kahn, David. Seizing The Enigma: The Race to Break the German U-boat Codes, 1939-1943. New York: Barnes and Noble Books, 2001. • Kahn, David. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. New York: Scribner, 1996. • Kippenhahn, Rudolph. Code Breaking: A History and Explanation. New York: Overlook Books, 2000. • Lewin, Ronald. The American Magic: Codes, Ciphers, and the Defeat of Japan. London: Penguin Books, 1983. • Lewin, Ronald. Ultra Goes to War. Barnsley: Pen and Sword Military, 2008. • Marks, Leo. Between Silk and Cyanide: A Codemaker's War, 1941-1945. New York: Free Press, 2000. • McKay, Sinclair. The Secret Listeners. London: Aurum Press Ltd., 2012. • McKay, Sinclair. The Secret Lives of Codebreakers: The Men and Women Who Cracked the Enigma Code at Bletchley Park. London: Aurum Press Ltd., 2010. • Melinsky, Hugh. A Code-breaker’s Tale. Dereham: Lark’s Press, 1998. • Nez, Chester. Code Talker: The First and Only Memoir By One of the Original Navajo Code Talkers of WWII. New York: Berkley, 2011. • Pincock, Stephen. Codebreaker: The History of Codes and Ciphers, from the Ancient Pharaohs to Quantum Cryptography. New York: Walker & Company, 2006. • Pratt, Fletcher. Secret and Urgent, the story of Codes and Ciphers. London: Robert Hale, 1939. • Rowlett, Frank B. The Story of Magic: Memoirs of an American Cryptologic Pioneer, with Foreword and Epilogue by David Kahn. Laguna Hills, CA: Aegean Press, 1999. • Singh, Simon. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. New York: Anchor, 2000. • Smith, Bradley. The Ultra-Magic Deals and the Most Secret Special relationship 1940– 1946. Shrewsbury: Airlife Publishing, 1993. • Smith, Michael. Action This Day. Ealing: Bantam Press, 2003. • Smith, Michael. Station X: The Codebreakers of Bletchley Park. London: Channel 4 Books, 1998. • Smith, Michael. The Emperor's Codes: The Thrilling Story of the Allied Code Breakers Who Turned the Tide of World War II. New York: Arcade Publishing, 2014. • Tuckman, Barbara W. The Zimmermann Telegram. New York: Random House, 1966. • Urban, Mark. The Man Who Broke Napoleon's Codes. London: Faber, 2001. • Winterbotham, F. The Ultra Secret. London: Weidenfeld and Nicholson, 1974. • Yardley, Herbert O. The American Black Chamber. Indianapolis: The Bobbs-Merrill Co., 1931. FICTION • Brown, Dan. Digital Fortress. London: Corgi Books, 2004. • Harris, Robert. Enigma. London: Hutchinson, 1995. • Innis, Pauline B. Gold in the Blue Ridge: the true story of the Beale treasure. Washington: R.B. Luce, 1973. • Nichols, Mary. We’ll Meet Again. London: Allison and Busby, 2015. • Stephenson, Neal. Cryptonomicon. New York: Avon, 2002. • Sutton, Roger J. A Need To Know. Leicester: Troubador Publishing, 2011. CHILDREN AND YOUNG ADULT • Child, Lauren. Ruby Redfort: Look Into My Eyes. New York: Harper Collins Children’s Books, 2011. • Cosby, Andrew and Michael Alan Nelson. Enigma Cipher. Los Angeles: Boom Studios, 2009 • Gardner, Martin. Codes, Ciphers and Secret Writing. New York: Dover Publications, 1984. • Gilbert, Adrain D. Codes And Ciphers (Spy Files). London: QEB Publishing, 2008. • Jenkins, Gerald and Magadalene Bear. Codes & Ciphers: Clever Devices for Coding & Decoding to Cut Out and Make. St. Albans: Tarquin, 2003. • Keene, Carolyn. The Clue in the Crossword Cipher. New York: Grosset & Dunlap, 1967. • Mitchell, Susan K. Spy Codes and Ciphers. New York: Enslow Publishers, 2013. • Platt, Richard. Code Making, Code Breaking. London: Harper Collins UK, 2011. • Poe, Edgar Allan. The Gold-Bug. London: Hesperus Press, 2007. • Smith, Becca C. Alexis Tappendorf and the Search for Beale's Treasure. New York: Createspace, 2012. FILM AND TELEVISION SERIES • The Imitation Game (2014) • National Treasure (2004) • Windtalkers (2002) • Enigma (2001) • A Beautiful Mind (2001) • Mercury Rising (1998) • Breaking the Code (1997) • Sneakers (1992) ONLINE RESOURCES • Masked Dispatches: Cryptograms and Cryptology in American History, 1775–1900. • Center for Cryptologic History Historical Publications • National Museum of the Air Force - Cyber Missions Annotated Bibliography • National Security Agency - UNITED STATES CRYPTOLOGIC HISTORY - The Friedman Legacy: A Tribute to William and Elizebeth Friedman • Library of Congress Science Tracer Bullet on Cryptology .
Recommended publications
  • Reflections from the Developments of School Science Curricula
    Imitation game: Reflections from the developments of school science curricula SONG, Jinwoong (宋眞雄) Department of Physics Education, Seoul National University What will fulfill this need can be stated in equally simple terms. It is, ironically enough, that science be taught as science. (Joseph J. Schwab, 1962: 188-9) 1.Introduction The Imitation Game is a 2014 British historical drama film directed by Morten Tyldu m and written by Graham Moore, based on the biography Alan Turing: The Enigma by A ndrew Hodges. It stars Benedict Cumberbatch as British cryptanalyst Alan Turing, who dec rypted German intelligence codes for the British government during the Second World War (https://en.wikipedia.org/wiki/The_Imitation_Game). The ’Imitation Game’ refers to so-calle d ‘Turing Test’ which is a test for artificial intelligence suggested by a famous British ma thematician, Alan Turing (1912-54), who is known as the father of the computer. Through his paper, “Computing machinery and intelligence” (1950), Tuning gave a conceptual fou ndation of AI (Artificial Intelligence), by suggesting the Turing Test, “a test of a machine’ s ability to exhibit intelligent behavior equivalent to, or indistinguishable from, that of a h uman.” (https://en.wikipedia.org/wiki/Turing_test) Science is now considered as one of the core (often three of them) subjects across th e world, together with the national language and mathematics. For example, in PISA studi es, science is included in the three main areas, with literacy and mathematics (e.g. OECD, 2018). And, in TIMSS studies, science and mathematics are the two main subjects for th e international comparison (https://timssandpirls.bc.edu/timss2015/).
    [Show full text]
  • Edsger Dijkstra: the Man Who Carried Computer Science on His Shoulders
    INFERENCE / Vol. 5, No. 3 Edsger Dijkstra The Man Who Carried Computer Science on His Shoulders Krzysztof Apt s it turned out, the train I had taken from dsger dijkstra was born in Rotterdam in 1930. Nijmegen to Eindhoven arrived late. To make He described his father, at one time the president matters worse, I was then unable to find the right of the Dutch Chemical Society, as “an excellent Aoffice in the university building. When I eventually arrived Echemist,” and his mother as “a brilliant mathematician for my appointment, I was more than half an hour behind who had no job.”1 In 1948, Dijkstra achieved remarkable schedule. The professor completely ignored my profuse results when he completed secondary school at the famous apologies and proceeded to take a full hour for the meet- Erasmiaans Gymnasium in Rotterdam. His school diploma ing. It was the first time I met Edsger Wybe Dijkstra. shows that he earned the highest possible grade in no less At the time of our meeting in 1975, Dijkstra was 45 than six out of thirteen subjects. He then enrolled at the years old. The most prestigious award in computer sci- University of Leiden to study physics. ence, the ACM Turing Award, had been conferred on In September 1951, Dijkstra’s father suggested he attend him three years earlier. Almost twenty years his junior, I a three-week course on programming in Cambridge. It knew very little about the field—I had only learned what turned out to be an idea with far-reaching consequences. a flowchart was a couple of weeks earlier.
    [Show full text]
  • The Turing Approach Vs. Lovelace Approach
    Connecting the Humanities and the Sciences: Part 2. Two Schools of Thought: The Turing Approach vs. The Lovelace Approach* Walter Isaacson, The Jefferson Lecture, National Endowment for the Humanities, May 12, 2014 That brings us to another historical figure, not nearly as famous, but perhaps she should be: Ada Byron, the Countess of Lovelace, often credited with being, in the 1840s, the first computer programmer. The only legitimate child of the poet Lord Byron, Ada inherited her father’s romantic spirit, a trait that her mother tried to temper by having her tutored in math, as if it were an antidote to poetic imagination. When Ada, at age five, showed a preference for geography, Lady Byron ordered that the subject be replaced by additional arithmetic lessons, and her governess soon proudly reported, “she adds up sums of five or six rows of figures with accuracy.” Despite these efforts, Ada developed some of her father’s propensities. She had an affair as a young teenager with one of her tutors, and when they were caught and the tutor banished, Ada tried to run away from home to be with him. She was a romantic as well as a rationalist. The resulting combination produced in Ada a love for what she took to calling “poetical science,” which linked her rebellious imagination to an enchantment with numbers. For many people, including her father, the rarefied sensibilities of the Romantic Era clashed with the technological excitement of the Industrial Revolution. Lord Byron was a Luddite. Seriously. In his maiden and only speech to the House of Lords, he defended the followers of Nedd Ludd who were rampaging against mechanical weaving machines that were putting artisans out of work.
    [Show full text]
  • An Early Program Proof by Alan Turing F
    An Early Program Proof by Alan Turing F. L. MORRIS AND C. B. JONES The paper reproduces, with typographical corrections and comments, a 7 949 paper by Alan Turing that foreshadows much subsequent work in program proving. Categories and Subject Descriptors: 0.2.4 [Software Engineeringj- correctness proofs; F.3.1 [Logics and Meanings of Programs]-assertions; K.2 [History of Computing]-software General Terms: Verification Additional Key Words and Phrases: A. M. Turing Introduction The standard references for work on program proofs b) have been omitted in the commentary, and ten attribute the early statement of direction to John other identifiers are written incorrectly. It would ap- McCarthy (e.g., McCarthy 1963); the first workable pear to be worth correcting these errors and com- methods to Peter Naur (1966) and Robert Floyd menting on the proof from the viewpoint of subse- (1967); and the provision of more formal systems to quent work on program proofs. C. A. R. Hoare (1969) and Edsger Dijkstra (1976). The Turing delivered this paper in June 1949, at the early papers of some of the computing pioneers, how- inaugural conference of the EDSAC, the computer at ever, show an awareness of the need for proofs of Cambridge University built under the direction of program correctness and even present workable meth- Maurice V. Wilkes. Turing had been writing programs ods (e.g., Goldstine and von Neumann 1947; Turing for an electronic computer since the end of 1945-at 1949). first for the proposed ACE, the computer project at the The 1949 paper by Alan M.
    [Show full text]
  • Turing's Influence on Programming — Book Extract from “The Dawn of Software Engineering: from Turing to Dijkstra”
    Turing's Influence on Programming | Book extract from \The Dawn of Software Engineering: from Turing to Dijkstra" Edgar G. Daylight∗ Eindhoven University of Technology, The Netherlands [email protected] Abstract Turing's involvement with computer building was popularized in the 1970s and later. Most notable are the books by Brian Randell (1973), Andrew Hodges (1983), and Martin Davis (2000). A central question is whether John von Neumann was influenced by Turing's 1936 paper when he helped build the EDVAC machine, even though he never cited Turing's work. This question remains unsettled up till this day. As remarked by Charles Petzold, one standard history barely mentions Turing, while the other, written by a logician, makes Turing a key player. Contrast these observations then with the fact that Turing's 1936 paper was cited and heavily discussed in 1959 among computer programmers. In 1966, the first Turing award was given to a programmer, not a computer builder, as were several subsequent Turing awards. An historical investigation of Turing's influence on computing, presented here, shows that Turing's 1936 notion of universality became increasingly relevant among programmers during the 1950s. The central thesis of this paper states that Turing's in- fluence was felt more in programming after his death than in computer building during the 1940s. 1 Introduction Many people today are led to believe that Turing is the father of the computer, the father of our digital society, as also the following praise for Martin Davis's bestseller The Universal Computer: The Road from Leibniz to Turing1 suggests: At last, a book about the origin of the computer that goes to the heart of the story: the human struggle for logic and truth.
    [Show full text]
  • Benedict Cumberbatch Talks the Imitation Game
    JANUARY 2015 | VOLUME 16 | NUMBER 1 Smart Meets Sexy BENEDICT CUMBERBATCH TALKS THE IMITATION GAME Inside HUGH BONNEVILLE LIAM NEESON PUBLICATIONS MAIL AGREEMENT NO. 41619533 THE 10 INCREDIBLE MOVIES YOU HAVE TO SEE THIS YEAR, PAGE 26 CONTENTS JANUARY 2015 | VOL 16 | Nº1 COVER STORY 40 GENIUS ROLE Benedict Cumberbatch’s fervent fans won’t be disappointed with his latest role. The Imitation Game casts the 38-year-old Brit as Alan Turing, a gay, mathematical genius who helped hasten the end of WWII. Here he talks about bringing Turing to life and his various other talents BY INGRID RANDOJA REGULARS 4 EDITOR’S NOTE 8 SNAPS 10 IN BRIEF 14 SPOTLIGHT: CANADA 16 ALL DRESSED UP 20 IN THEATRES 44 CASTING CALL 47 RETURN ENGAGEMENT 48 AT HOME 50 FINALLY… FEATURES IMAGE HARGRAVE/AUGUST AUSTIN BY PHOTO COVER 26 2015’S BIG PICS! 32 FABLED CAST 34 MAN OF ACTION 38 PAPA BEAR It’s going to be an epic year We break down which famous Taken 3 star Liam Neeson Paddington’s Hugh Bonneville at the movies. We take you actors play which well-known talks about his longtime says playing father figure to a through the 10 films you must fairy tale characters in love of action movies, and mischievous talking bear gave see, starting with the return of the musical extravaganza recent decision to get clean him the chance to revisit his Star Wars! Into the Woods and healthy own childhood BY INGRID RANDOJA BY INGRID RANDOJA BY BOB STRAUSS BY INGRID RANDOJA JANUARY 2015 | CINEPLEX MAGAZINE | 3 EDITOR’S NOTE PUBLISHER SALAH BACHIR EDITOR MARNI WEISZ DEPUTY EDITOR INGRID RANDOJA ART DIRECTOR TREVOR THOMAS STEWART ASSISTANT ART DIRECTOR STEVIE SHIPMAN VICE PRESIDENT, PRODUCTION SHEILA GREGORY CONTRIBUTORS LEO ALEFOUNDER, BOB STRAUSS ADVERTISING SALES FOR CINEPLEX MAGAZINE AND LE MAGAZINE CINEPLEX IS HANDLED BY CINEPLEX MEDIA.
    [Show full text]
  • 9 Purple 18/2
    THE CONCORD REVIEW 223 A VERY PURPLE-XING CODE Michael Cohen Groups cannot work together without communication between them. In wartime, it is critical that correspondence between the groups, or nations in the case of World War II, be concealed from the eyes of the enemy. This necessity leads nations to develop codes to hide their messages’ meanings from unwanted recipients. Among the many codes used in World War II, none has achieved a higher level of fame than Japan’s Purple code, or rather the code that Japan’s Purple machine produced. The breaking of this code helped the Allied forces to defeat their enemies in World War II in the Pacific by providing them with critical information. The code was more intricate than any other coding system invented before modern computers. Using codebreaking strategy from previous war codes, the U.S. was able to crack the Purple code. Unfortunately, the U.S. could not use its newfound knowl- edge to prevent the attack at Pearl Harbor. It took a Herculean feat of American intellect to break Purple. It was dramatically intro- duced to Congress in the Congressional hearing into the Pearl Harbor disaster.1 In the ensuing years, it was discovered that the deciphering of the Purple Code affected the course of the Pacific war in more ways than one. For instance, it turned out that before the Americans had dropped nuclear bombs on Japan, Purple Michael Cohen is a Senior at the Commonwealth School in Boston, Massachusetts, where he wrote this paper for Tom Harsanyi’s United States History course in the 2006/2007 academic year.
    [Show full text]
  • LGBTQ Guam and Hospitality of the Guamanian People
    An LGBTQ Guide to Guam Håfa Adai, Welcome! As Lieutenant Governor of Guam and proud member of the LGBTQ community, I am grateful that Guam’s residents have given me the opportunity to help direct the island’s future. Also, Guam has just elected its first female Governor, and now holds the record for the largest women majority in U.S. history. Guam’s diverse political leadership is a direct reflection JOSHUA TENORIO, of the broadening views within our island community. THE HONORABLE LT. GOVERNOR I will advocate for policy that is fair and equal for all and will positively impact LGBTQ rights. I applaud the Guam Visitors Bureau’s efforts in developing the Guam travel industry to better serve LGBTQ travelers and give my full support to their ongoing efforts. We look forward to your visit and providing you with the adventure of a lifetime! Si Yu’os Ma’åse’ 23 Håfa Adai! (Greetings!) Contents The Guam Visitors Bureau (GVB) finds great joy in welcoming LGBTQ travelers to our beautiful island. 02 Welcome As you read this guide, we hope that it inspires you to visit our home and experience the warmth 04 LGBTQ Guam and hospitality of the Guamanian people. 06 LGBTQ Resources 16 Guam strongly supports the LGBTQ community, paving 08 Visiting Guam PILAR LAGUAÑA, the way for equality, celebrating diversity, and promoting With Other LGBTQ PRESIDENT & CEO, inclusivity. The Bureau is a proud member of the Destinations 12 Things to do International Gay and Lesbian Travel Association (IGLTA), GUAM VISITORS 09 Guam + Japan 12 Outdoors BUREAU where we continue our efforts to be a reliable resource for, and to better serve the needs of, all of our visitors.
    [Show full text]
  • Why Python for Chatbots
    Schedule: 1. History of chatbots and Artificial Intelligence 2. The growing role of Chatbots in 2020 3. A hands on look at the A.I Chatbot learning sequence 4. Q & A Session Schedule: 1. History of chatbots and Artificial Intelligence 2. The growing role of Chatbots in 2020 3. A hands on look at the A.I Chatbot learning sequence 4. Q & A Session Image credit: Archivio GBB/Contrasto/Redux History •1940 – The Bombe •1948 – Turing Machine •1950 – Touring Test •1980 Zork •1990 – Loebner Prize Conversational Bots •Today – Siri, Alexa Google Assistant Image credit: Photo 172987631 © Pop Nukoonrat - Dreamstime.com 1940 Modern computer history begins with Language Analysis: “The Bombe” Breaking the code of the German Enigma Machine ENIGMA MACHINE THE BOMBE Enigma Machine image: Photographer: Timothy A. Clary/AFP The Bombe image: from movie set for The Imitation Game, The Weinstein Company 1948 – Alan Turing comes up with the concept of Turing Machine Image CC-BY-SA: Wikipedia, wvbailey 1948 – Alan Turing comes up with the concept of Turing Machine youtube.com/watch?v=dNRDvLACg5Q 1950 Imitation Game Image credit: Archivio GBB/Contrasto/Redux Zork 1980 Zork 1980 Text parsing Loebner Prize: Turing Test Competition bit.ly/loebnerP Conversational Chatbots you can try with your students bit.ly/MITsuku bit.ly/CLVbot What modern chatbots do •Convert speech to text •Categorise user input into categories they know •Analyse the emotion emotion in user input •Select from a range of available responses •Synthesize human language responses Image sources: Biglytics
    [Show full text]
  • Certain Aspects of "Magic" in the Cryptological Background of the Various Official Investigations Into the Attack on P
    REF ID:A485355 OF 'l'.BE V.AltIOUS OFFICIAL INVEmGATIONS mo 'l!BE A'.t'.J!ACK ON PEA.BL MRBOR ··. •· . ' I-.- REF ID:A485355 --;-~·;-:;-.:- ... -~.... , ""'-·I';"~-""",~-·;,'~;~~~-~~.\,-::):t~<.""',. -.~\~=---:~-.,,-1f~': ------== ,,.--.., "t-,-.\;' .,-~,-. Certain As;pects of 1tMsgie 11 in the Ct;r:ttol~eaJ.. De.ck.ground of the V{'J."':touc; Offic!.&.1. Invest1@(1ons into the Atttlck on Pearl Harbor INDEX Section l. Introduction • • • • • • • • • • • • • • • • • • • 2. The Real Essence of the Problem • • • • • • • • • 11 A Ziev Look a.t the Revisionists Allegations of Conspiracy to Keep K:l.mmel and S'bort in the Da:rk • • • • • • • • • • • • • • • • • • • • • 18 4. Was MtlGIC Withheld from Kimmel and Short and, if so, ~ ••••••• ,, •••••••• • • 35 1 The tiWinds Code Message:B ' . ~ . .. 49 The Question of Sabota.g~f! • • • ti ~ • • • • • • • 53 Conclusions ....... ",., ....... 65 8. Epilogtte • • .. • • • • ' • ' It • Ill • • • • • • • • 60 11 11 APPENDIX 1: Pearl H&'bor in Pernpective1 by Dr. Louis Morton, Uni:ted States Na.val Institute Proceedi!!is,, Vo1. 81, No. 4, April 1955; P-.kl. 461'.:468 APPlitWIX 2: !lpea.rl Ra.rhor and the Revlsionists, 11 by Prof'. Robert H. Ferrc:Ll.. The Historian, Vol. XVII, No. 2, SprinS 19551 :Pl~· 215·233 REF ID:A485355 1. nmOD"OCTION More than 15 yea.rs have passed. since the Japanese, with unparalleled good luck, good luck that nov seem:s astoundinS, and vith a degree of skill unanticipated by the United, :3tates, executed their surprise attack on Pearl Harbor during the morning hours of 7 December 1941. It was an attack that constituted a. momentou::; disaster for the United States; it ma.de our Navy's Pacific Pleet, for all practica.l purposes, hors de combat for m.a.ny months.
    [Show full text]
  • The First Americans the 1941 US Codebreaking Mission to Bletchley Park
    United States Cryptologic History The First Americans The 1941 US Codebreaking Mission to Bletchley Park Special series | Volume 12 | 2016 Center for Cryptologic History David J. Sherman is Associate Director for Policy and Records at the National Security Agency. A graduate of Duke University, he holds a doctorate in Slavic Studies from Cornell University, where he taught for three years. He also is a graduate of the CAPSTONE General/Flag Officer Course at the National Defense University, the Intelligence Community Senior Leadership Program, and the Alexander S. Pushkin Institute of the Russian Language in Moscow. He has served as Associate Dean for Academic Programs at the National War College and while there taught courses on strategy, inter- national relations, and intelligence. Among his other government assignments include ones as NSA’s representative to the Office of the Secretary of Defense, as Director for Intelligence Programs at the National Security Council, and on the staff of the National Economic Council. This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other US government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: (Top) Navy Department building, with Washington Monument in center distance, 1918 or 1919; (bottom) Bletchley Park mansion, headquarters of UK codebreaking, 1939 UNITED STATES CRYPTOLOGIC HISTORY The First Americans The 1941 US Codebreaking Mission to Bletchley Park David Sherman National Security Agency Center for Cryptologic History 2016 Second Printing Contents Foreword ................................................................................
    [Show full text]
  • The Magic Flute
    OCTOBER 09, 2015 THE FRIDAY | 8:00 PM OCTOBER 11, 2015 MAGIC SUNDAY | 4:00 PM OCTOBER 13, 2015 FLUTE TUESDAY | 7:00 PM FLÂNEUR FOREVER Honolulu Ala Moana Center (808) 947-3789 Royal Hawaiian Center (808) 922-5780 Hermes.com AND WELCOME TO AN EXCITING NEW SEASON OF OPERAS FROM HAWAII OPERA THEATRE. We are thrilled to be opening our 2014) conducts, and Allison Grant As always we are grateful to you, season with one of Mozart’s best- (The Merry Widow, 2004) directs this our audience, for attending our loved operas: The Magic Flute. This new translation of The Magic Flute by performances and for the support colorful production comes to us Jeremy Sams. you give us in so many ways from Arizona Opera, where it was throughout the year. Without your created by Metropolitan Opera This will be another unforgettable help we simply could not continue stage director, Daniel Rigazzi. season for HOT with three to bring the world’s best opera to Inspired by the work of the French sensational operas, including Hawaii each year. surrealist painter, René Magritte, a stunning new production of the production is fi lled with portals– Benjamin Britten’s A Midsummer But now sit back and enjoy Mozart’s doorways and picture frames–that Night’s Dream, directed by Henry The Magic Flute. lead the viewer from reality to Akina, with videography by Adam dreams. With a cast that includes Larsen (Siren Song, 2015) and a MAHALO Antonio Figueroa as Tamino and So spectacular production of Verdi’s Il Young Park as the formidable Queen Trovatore designed by Peter Dean Henry G.
    [Show full text]