NSA Newsletter, March 1999

Total Page:16

File Type:pdf, Size:1020Kb

NSA Newsletter, March 1999 become available, the exhibits are Designed for small groups, the cen­ Showcasing Technology updated or changed. Just one of the ter has limited seating and standing many hands-on demonstrations cur­ room available. A wireless audio system badge swipe and a fingerprint rendy being showcased in the center is and wireless headsets for demonstra­ identification device greet visi­ on biometrics. The explosion in infor­ tions allow visitors and presenters to Ators upon entry into a world of mation technology has increased the comfortably and effectively interact. the unknown-the NSNCSS Demon­ demand for quick, accurate, and user­ The center is located in OPS 2B, stration Center. Once friendly means Room 2B8036 and is staffed by inside, displays on leading­ for personal employees specialized in multimedia. edge technologies capture authentication. Often, they run the show behind the visitors' energy and enthusi­ Biometrics uses scenes by operating the workstations, asm. Exhibits, demonstra­ automated meas­ VCR's, digital and video cameras, tions, and simulations from urements of the video teleconferencing systems, elec­ the key components allow biological charae­ tronic switchers, and projectors. The guests to experience the tenstlcs (finger­ staff assist briefers by displaying data, reality of providing informa­ print, face, and providing audio on cue, and connect­ tion superiority for the voice) of humans ing laptop computers to the system for Nation in the information for the purpose screen projection. In conjunction with age. of authentication various offices and organizations, they Established in 1997, the center is or identification. Biometrics is cur­ coordinate the schedules of all the cen­ designed to showcase NSA's significant rendy in place in some areas of the ter's presentations and visitors. technologies in one centralized loca­ Agency. The NSNCSS Demonstration Cen­ tion. The center's success is a result of The facility features a three-screen ter is a valuable resource for all taking the most advanced technology theater environment for high-definition Agency key components. It is playing from inside the Agency's labs-anechoic display of videotape and data. Through an important role in providing distin­ chambers and research areas. The connectivity to all major NSNDOD guished visitors a clear appreciation of information is presented in laymen's video teleconferencing and crisis man­ how NSNCSS will provide and pro­ terms using a balance of multimedia agement networks, the center allows tect information in the 21st century. and product demonstrations. Agency the Agency to broadcast the world to For more information, send an visitors have the opportunity to Agency visitors and has the capability E-mail to [email protected] observe the latest technologies and to serve as a crisis room. receive a tailored technical presentation of NSA's capabilities through the NSNCSS Demonstration Center. Using flexible trade show display components, presentations can be modified or designed to meet specific customer needs. No longer do visitors have to travel from building to build­ ing to see demonstrations and listen to briefings, the center offers all these opportunities and experiences in one location. Biometrics Various demonstrations are located throughout the center; however, as newer and more powerful technologies The NSNCSS Demonstration Center offers a variety of technological briefings for Agency visitors. 2 NSA Newsletter March 1999 I I -I I - -:;;fi;- ! ..~ I I DIRNSA'S DESK 1 j A Farewell Note Saying goodbye to everyone at NSNCSS is an emotional, but not sad event. You have not only allowed Barb and me to be a part of this great family, but you have all welcomed and supported us far above any reasonable expectation. We would like to personally thank all of you for your exceptional dedication and hard work in support of the Agency and in defense of this Nation we all so dearly love. The past 3 years presented us with a myriad of operational and organizational challenges that could only have been resolved by a work force as richly diverse in gender, ethnicity, age, experi­ ence, capabilities, and military and civilian cultures as the NSNCSS family. While doing the "undoable" operationally you have been a part of these noteworthy accomplishments-the National Cryptologic Strategy for the 21st century; the NSA Technology Plan; establishment of the Senior Cryptologic Corporate Orientation Program; the Diversity Program; the Modeling and Simulation Pro­ gram; Future Days . 96 and .98; the Ethics Policy; implementation of the Information Operations Technology Center (lOTC); the examiners visit for the Presidential Quality Award (PQA); establish­ ment of the Unified Cryptologic Architecture; completion of the EEO Employee Satisfaction Survey; 1 Am An American Festival; dedication of the National Vigilance Park and expansion of the Nation­ al Cryptologic Museum; the National Information Assurance Strategy; the Administration Encryption Policy; the Intelligence Community Senior Leadership Program; the National Information Assurance Partnership; implementation of a Y2K policy/strategy; the NSOC Strategic Architecture; and participa­ tion in the Discovery Channel's episode on NSA. It's been an amazing 3 years! Through these and many other efforts, the NSNCSS team came together with a common goal, and despite tremendous obstacles, sharing a common vision, were able to work as a single entity to accomplish the mission. It is difficult to express the pride of being part of your team. No team has worked harder to ensure our Nation's security, no team has stood watch longer to prevent operational and technological surprise, and no team has been more innovative in pursuit of techno­ I logical advantage for our success in the 21st century. i Thank you for helping me give the Nation my best and for letting me be part of a team J i that so diligently endeavors to provide the security of our Nation. We have accomplished a great I deal and we all have reason to be proud. From the newest employees to the most senior, each of you is essential to the future. I know that I leave the National Security Agency in good hands ­ your hands, the exemplary work force of NSA. Stay with NSA, the country needs you. Barb and I wish each of you the best of the brilliant future that awaits you. It has been an honor and truly humbling experience serving with all of you. Thank you for the supreme sup­ port given these past 3 years. May God bless each of you and this great Nation we are all so privi­ i leged to serve. One Team-One Mission! / L((). LI---- I I I I March 1999 I NSA NeWSletter 3 .--....._---- THE NATIONAL SECURITY Picture This AGENCY NEWSLETTER March 1999 • Vol. XLVIII No. 3 NSAer Gloria Criss Receives Prestigious Community Award: On January 15, many gathered at the Annapolis Marriot Waterfront to participate in the 11th Annual Dr. Martin Luther King, Jr. Awards Dinner for Anne Arundel County residents. During this annual commemoration, community residents were recognized Ll'NNE YATES for their significant contributions within the community. Award categories includ- Editor ed the Dr. Martin Luther BETH HADDLE Assistant Editor King, Jr. Drum Major Award, MICHELE HYRE the Peacemaker Associate Editor Award, the BRUCE WARREN Special Recog­ Publisher nition Award, The NSA Newsletter is published and the Morris monthly by the Office of Human H. Blum Resources Services for the information Humanitarian and enjoyment of NSA employees and Award. their families. Items submitted for publication Gloria Criss, should be typed double-spaced and a security spe­ marked with the name, organization, cialist in the and phone number of the sender. For­ ward all items to: NSA Newsletter, Fort OPS 2B Visi:­ George G. Meade, MD 20755-6000. (1. to r.) Lewis A. Bracy; Mayor Dean L. Johnson, Annapolis; tor Control Feature articles are due 2 weeks before Gloria 1. Criss; and Janet S. Owens, County Executive Center, the first day of the month preceding the month the article is intended to be received the published. All other items are due on Drum Major Award. It is awarded to individuals who keep the dream of Dr. or before the first day of the month King alive through their actions, deeds, and words. Criss is devoted to serving preceding the month in which the item others through her church, work, and community. She was awarded the 1999 Dr. is intended to be published. For exam­ ple, feature articles for the May Newslet­ Martin Luther King, Jr. Drum Major Award for her many contributions to those ter must be submitted on or before the in need. 16th day of March. AIl other items must be submitted on or before the first day of ApriL AIl submissions to Foreign Language Videos Available the Newsletter are subject to editing for space, clarity, and classification; there The Cryptolinguistic Association (CLA) film library has more than 100 videos are no exceptions to this policy. Newslet­ ter office phones are 963-1848(s) and (VHS) in approximately 40 foreign languages. These films may be borrowed by 301-688-6610 (TDD); E-mail address is Agency organizations, instructors, and CLA members. CiA membership is open nsanews@nsa; and location is OPS I, to all, at nominal cost. For film listings and information on borrowing, con­ South Cafeteria, Room 2. tact Ken Quatdander at 9634733(s), 301-688-4019, or kpquatt@nsa. This publication does not necessarily reflect the official views of the Depart­ The CLA Film Committee is now accepting donations of foreign language ment of Defense. videos (VHS) for their film library_ Donors will receive a free 1999 CLA mem­ The Newsletter is printed by the Pub­ bership_ Films should be of good technical quality, with English subtides and lication and Reproduction Division. Printing of this publication was cased in their original tape jackets. For more information, contact Drage Vukce­ approved by the Director, National vich (dvukceV®nsa) at 963-7770(s) or 301-688-1073.
Recommended publications
  • Corp Bro Inside Layout
    Message from the Director, NSA The National Security Agency’s rich legacy of cryptologic success serves not only as a reminder of our past triumphs, but also as an inspiration for our future. Harry Truman, the man responsible for signing the legislation that brought our Agency into existence, was once quoted as saying, “There is nothing new in the world except the history you do not know.” Like all truisms, it is only partially accurate. Each generation of Americans must at some point deal with unforeseen problems and issues that transcend the status quo. Most would agree that the challenges faced by NSA in today’s war against terrorism are far different from those of World War II, Vietnam, or Desert Storm. Even so, President Truman was correct in his assertion that there is much to be learned from the past. The history of the National Security Agency has in many respects been based on and characterized by feats of intellectual brilliance. Pioneers like William Friedman, Frank Rowlett, Dr. Louis Tordella, and Agnes Meyer Driscoll, to name but a few, were able to build on past successes and do whatever was necessary to meet the challenges of their time. We should not forget, however, that NSA’s success is due not just to the efforts of the well- known legends of the cryptologic past, but also to the dedicated work of thousands of men and women whose names will never be noted in any history book. History tells us that both genius and hard work are required to ensure success.
    [Show full text]
  • NSA Newsletter, April 1999
    .The commencement exercises for the Honoring Those Who Serve-Armed Forces Week Community College of the Air Force-a special guest speaker has been invited to address the graduat­ "The 21st century, notthe 20th cen­ Service Color Guard will hoist the ing class. tury, will prove to be the brightest era Colors. A joint military formation fea­ for NSA/CSS and our people. As we turing each of the Services will be rep­ In remembrance of the Agency's fall­ stand on the frontier ofmany oppor­ resented at the ceremony. The Director en heroes, the Army and Air Force tunities, we must all remember: it is will hold a joint wreath-laying ceremo­ the Marine, not the reporter, who ny at the National Vigilance Park. gives us freedom of speech; it is the Thanks to the assistance offered by Sailor, not the poet, who gives us free­ the National Cryptologic Museum, and dom of expression; it is the Airman, other groups, displays will be set up not the campus demonstrator, who throughout the NSA/CSS campus to gives us the freedom to commemorate draw attention to the contributions of events, such as Armed Forces Week; military coworkers to the defense of and it is the Soldier, who at the dark­ the Nation. est hour, stands by the flag and says The Armed Services feature a num­ 'this we'll defend,' who gives us the ber of professional-caliber musical promise ofthe future." groups, and NSA has invited several to -Lt Gen Minihan participate in this year's celebration. Armed Forces Week (A1-''"'W) is not 5KRun simply a time to recognize the service The annual CWF/AFW 5K Run provided by the men and women of will take place Thursday, May 13.
    [Show full text]
  • Legal Studies Research Paper Series
    Unlimited War and Social Change: Unpacking the Cold War’s Impact Mary L. Dudziak USC Legal Studies Research Paper No. 10-15 LEGAL STUDIES RESEARCH PAPER SERIES University of Southern California Law School Los Angeles, CA 90089-0071 Unlimited War and Social Change: Unpacking the Cold War’s Impact Mary L. Dudziak Judge Edward J. and Ruey L. Guirado Professor of Law, History and Political Science USC Gould Law School September 2010 This paper is a draft chapter of WAR · TIME: A CRITICAL HISTORY (under contract with Oxford University Press). For more on this project, see Law, War, and the History of Time (forthcoming California Law Review): http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1374454. NOTE: This is very much a working draft, not a finished piece of work. I would be grateful for any comments and criticism. I can be reached at: [email protected]. copyright Mary L. Dudziak © 2010 Unlimited War and Social Change: Unpacking the Cold War’s Impact Abstract This paper is a draft chapter of a short book critically examining the way assumptions about the temporality of war inform American legal and political thought. In earlier work, I show that a set of ideas about time are a feature of the way we think about war. Historical progression is thought to consist in movement from one kind of time to another (from wartime to peacetime, to wartime, etc.). Wartime is thought of as an exception to normal life, inevitably followed by peacetime. Scholars who study the impact of war on American law and politics tend to work within this framework, viewing war as exceptional.
    [Show full text]
  • Military Intelligence (MI) Is Always Engaged and Always Looking Forward with an Eye to Future Threats
    July - September 2008 PB 34-O8-3 MI MISSIONS OF THE NEAR FUTURE MIPB_Jul-Sep_08_Master.indd 1 11/25/2008 10:50:34 AM FROM THE EDITOR Military Intelligence (MI) is always engaged and always looking forward with an eye to future threats. This issue takes a look at how MI is adapting to the current operational environment and developing tactics, techniques, and procedures to counter the threat today and in the near future. Two articles speak to the use of persistent surveillance to support the current fight, capabilities and lim- itations, and employment in the future modular force. An article from the 82nd Airborne Division talks about an initiative from the 1/82 BCT, the Special Weapons Exploitation Team, an internally resourced BCT capability to analyze enemy effects and counter threat weapons/tactics in today’s and tomorrow’s complex combat environments. The MI Noncommissioned Officers’ Academy has recently upgraded its automation to enhance training by adding a Thin Client to each student’s workstation. This and near future plans to take advantage of OSINT data in training are explained in the CSM Forum. Also included are articles on the Red Teaming concept, adapting Counterintelligence to counter low in- tensity collection of technology, and an introduction to the Defense Support to Civil Authorities Disaster Intelligence concept. Personal experiences from Iraq are related in two articles, one dealing with working with Coalition intel- ligence forces; and the other with border operations with the Iraqi Security Forces. A historical perspective takes a look at the causes of the resurgency of the Taliban in Afghanistan Finally, a reprint of an article from the Defense Intelligence Agency’s Communique describes that agen- cy’s efforts to provide its employees with the kind of work environment needed to successfully support the Warfighter.
    [Show full text]
  • AA-34-5 Fort George G. Meade, National Security Agency, EAGLE Health and Physical Fitness Center, Building 9810
    AA-34-5 Fort George G. Meade, National Security Agency, EAGLE Health and Physical Fitness Center, Building 9810 Architectural Survey File This is the architectural survey file for this MIHP record. The survey file is organized reverse- chronological (that is, with the latest material on top). It contains all MIHP inventory forms, National Register nomination forms, determinations of eligibility (DOE) forms, and accompanying documentation such as photographs and maps. Users should be aware that additional undigitized material about this property may be found in on-site architectural reports, copies of HABS/HAER or other documentation, drawings, and the “vertical files” at the MHT Library in Crownsville. The vertical files may include newspaper clippings, field notes, draft versions of forms and architectural reports, photographs, maps, and drawings. Researchers who need a thorough understanding of this property should plan to visit the MHT Library as part of their research project; look at the MHT web site (mht.maryland.gov) for details about how to make an appointment. All material is property of the Maryland Historical Trust. Last Updated: 05-15-2018 MARYLAND HISTORICAL TRUST NR Eligible: yes DETERMINATION OF ELIGIBILITY FORM no X Property Name: Building 9810 (EAGLE Health & Fitness Center) Inventory Number: AA-34-5 Address: 9810 Emory Road Historic district: yes X no City: Fort Meade Zip Code: 20755 County: Anne Arundel Property Owner: U.S. Government Tax Account ID Number: 90042590 Tax Map Parcel Number(s): 0372 Tax Map Number: 0029 ~~~~~~~~~~ ~~~~~~~~~ Project: East Campus Integration Program EIS, Fort Meade, MD Agency: National Security Agency (NSA) Agency Prepared By: HOR, Inc.
    [Show full text]
  • The Battle Over Pearl Harbor: the Controversy Surrounding the Japanese Attack, 1941-1994
    W&M ScholarWorks Dissertations, Theses, and Masters Projects Theses, Dissertations, & Master Projects 1995 The Battle Over Pearl Harbor: The Controversy Surrounding the Japanese Attack, 1941-1994 Robert Seifert Hamblet College of William & Mary - Arts & Sciences Follow this and additional works at: https://scholarworks.wm.edu/etd Part of the United States History Commons Recommended Citation Hamblet, Robert Seifert, "The Battle Over Pearl Harbor: The Controversy Surrounding the Japanese Attack, 1941-1994" (1995). Dissertations, Theses, and Masters Projects. Paper 1539625993. https://dx.doi.org/doi:10.21220/s2-5zq1-1y76 This Thesis is brought to you for free and open access by the Theses, Dissertations, & Master Projects at W&M ScholarWorks. It has been accepted for inclusion in Dissertations, Theses, and Masters Projects by an authorized administrator of W&M ScholarWorks. For more information, please contact [email protected]. THE BATTLE OVER PEARL HARBOR The Controversy Surrounding the Japanese Attack, 1941-1994 A Thesis Presented to The Faculty of the Department of History The College of William and Mary in Virginia In Partial Fulfillment Of the Requirements for the Degree of Master of Arts by Robert S. Hamblet 1995 APPROVAL SHEET This thesis is submitted in partial fulfillment of the requirements for the degree of Master of Arts '-{H JxijsJr 1. Author Approved, November 1995 d(P — -> Edward P. CrapoII Edward E. Pratt TABLE OF CONTENTS Page ACKNOWLEDGEMENTS......................................................................iv ABSTRACT..............................................................................................v
    [Show full text]
  • Agnes Meyer Driscoll Vs. the Enigma and the Bombe Colin Burke
    Colin Burke 1-2001 © Agnes Meyer Driscoll vs. the Enigma and the Bombe Colin Burke ABSTRACT: Documents in Britain‘s National Archives/ Public Record Office and in the U.S. National Archive‘s Record Groups RG457 and RG38 indicate that in mid-1941 the United States Navy‘s codebreaking organization, OP-20-G ignored an opportunity to gain full knowledge of Britain‘s anti-Enigma methods and machines. Spending a year and one-half working on what it felt was a unique and much more effective method– but one that failed--OP-20-G‘s, staff, at a critical time in U.S.- British relations ,did not inform America‘s decision makers of Britain‘s willingness to share its crypto-secrets . As a result, American leaders believed that England‘s GC&CS had deliberately withheld vital information that would have allowed the development of an independent American attack on Naval Enigma. That belief lasted Colin Burke 1-2001 © throughout the war and caused friction between the two nations. Other consequences of OP-20-G‘s mid-1941 decision were to delay the adoption of the British Bombe and its allied methods and to waste perhaps six months of the vital time of the new team of cryptanalysts and engineers assigned, in early 1942, to develop an American Bombe. KEYWORDS: OP-20-G, Enigma, Driscoll, Denniston, GC&CS, Bombe, Safford, Wenger, Weeks, Currier, Engstrom, catalog, Banburismus, hot-point, cold-point, Tiltman. Introduction: A Fragile British-American Crypto-Alliance By the end of World War II Great Britain and the United States had forged uniquely close relationships--even among their intelligence agencies.1 Much had to be overcome to achieve the long-lasting 1 Robert Louis Benson, A History of U.S.
    [Show full text]
  • Cyber Center for Education & Innovation
    VISION FOR THE NEW CYBER CENTER FOR EDUCATION & INNOVATION Home of the National Cryptologic Museum A PUBLIC-PRIVATE PARTNERSHIP WITH UNPARALLELED CYBER DEFENSE EXPERTISE. PLEASE JOIN US AND GET INVOLVED! The Cyber Center and our participation, volunteer Yleadership and support are urgently Museum Master needed to help us conceptualize, Plan includes: capitalize and construct the new Cyber Center for Education & Innovation, n A new state-of-the-art Home of the National Cryptologic Museum. Join us now! Museum To discuss your interest in supporting our efforts to create n The Conference Center this vital new resource, please contact: n Vigilance Air Park MGEN Roderick J. Isler, USA (Ret) n Classroom facilities Vice President, Cyber Center for Education & Innovation, New Museum Project Campaign n World class research National Cryptologic Museum Foundation and rare books library P.O. Box 1563 Millersville, MD 21108 n A comprehensive site and Office: 443-292-0091 land use concept Cell: 301-785-0896 Continued strong private and [email protected] public leadership is needed to realize this challenging vision. 1 CCEI-NCM Parking 498 Spaces 2 CCEI-NCM 3 Museum and Conference Center Drop-off 4 Service Road/ Loading Dock 5 Existing Museum 6 National Vigilance Park 7 Security Check Point 8 Colony Seven Road 9 Current NSA Parking (N1) 10 Current NSA Parking (N10) 11 Future VCP-1 12 86 foot Security Set Back 13 Entrance Signage PROPOSED SITE PLAN HELP US BUILD AND COMPLETE THIS NEW NATIONAL TREASURE. THE CYBER CENTER FOR EDUCATION & INNOVATION, HOME OF THE NATIONAL CRYPTOLOGIC MUSEUM is envisioned to be an integrated multi-purpose facility serving public and private stakeholders.
    [Show full text]
  • Code Breaking in the Pacific
    Code Breaking in the Pacific Peter Donovan • John Mack Code Breaking in the Pacific 123 Peter Donovan John Mack School of Mathematics and Statistics School of Mathematics and Statistics University of New South Wales University of Sydney Sydney, NSW, Australia Sydney, NSW, Australia Additional material to this book can be downloaded from http://extras.springer.com ISBN 978-3-319-08277-6 ISBN 978-3-319-08278-3 (eBook) DOI 10.1007/978-3-319-08278-3 Springer Cham Heidelberg New York Dordrecht London Library of Congress Control Number: 2014945227 © Springer International Publishing Switzerland 2014 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer. Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution under the respective Copyright Law. The use of general descriptive names, registered names, trademarks, service marks, etc.
    [Show full text]
  • THE COMMUNICATOR NSA's Employee Publication 26 August 1997
    .pproved fo r Release by [\JS.A. o JS- 31- 200 9 FOIA Case# 827 8 THE COMMUNICATOR NSA's Employee Publication 26 August 1997 Vol V, No. 32, THE COMMUNICATOR, 26 August 1997, NSA's Employee Publication, DRV FRM : Multiple Sources DECL ON: Source Marked "OADR" Dated 3 September 1991 CEREMONY TO DEDICATE NATIONAL VIGILANCE PARK On 2 September 1997 at 1000 hours, Lt Gen Kenneth A. Minihan, Director, NSA/Chief, CSS, will dedicate the National Vigilance Park and the Aerial Reconnaissance Memorial located adjacent to the National Cryptologic Museum. This memorial has been established to honor the many aerial reconnaissance crews who lost their lives in the performance of their duties. The centerpiece of the memorial is a C-130 aircraft, refurbished to resemble the reconnaissance-configured C-130A which was downed by Soviet fighters over Soviet Armenia on 2 September 1958. The backdrop for the aircraft is a semi-circle of 18 trees, each representing the various types of aircraft downed during US aerial reconnaissance missions. On the day of the ceremony, the National Cryptologic Museum will unveil a companion exhibit examining Cold War Reconnaissance and remembering some of the lost aircrews. The ceremony will be simulcast to NSA locations and field sites on NEWSMAGAZINE and GIGSTER (channel information will be provided before the broadcast) . Agency employees are encouraged to view the ceremony on one of the many Agency broadcast outlets on the date of the event. Limited standing space at the site will be available to employees on a first come, first served basis. The Commuter Transportation Center (CTC) has taken action to minimize potential parking and traffic problems on the day of the ceremony.
    [Show full text]
  • Warning at Pearl Harbour: Leslie Grogan and the Tracking of The
    Warning at Pearl Harbor: Leslie Grogan and the Tracking of the Kido Butai Brian Villa and Timothy Wilford' While some aspects of the Japanese attack on Pearl Harbor have been studied exhaustively, it remains surprisingly true that a few elements have almost completely escaped scholarly attention. It is often obvious why these topics have been bypassed: in most cases the barest exploration reveals that they lead nowhere. Yet not all undigested bits fall in this category. A select few are both important and relatively unstudied. It was once thought that the pre- Pearl Harbor reports of Leslie Grogan, 2nd Radio Officer aboard the Matson Steamship and Navigation Company's SS Lurline (see figure 1), were unworthy of notice. Several days before Japan's Strike Force, or Kido Butai, attacked Pearl Harbor, Grogan reported that he had copied Japanese coded signals emanating from the North Pacific. It may be noted that while the United States Navy (USN) made a formal investigation of the much less credible reports of Robert Ogg, known as Seaman Z in John Toland's Infamy, there was apparently no naval investigation of Grogan's considerably more detailed reports. Nor did his account capture the attention of any of the documented Pearl Harbor inquiries, if one may judge by its omission in the thirty-nine volumes of published Pearl Harbor investigations. Moreover, Grogan's reports have not drawn any attention from the renowned expositor of the main current of Pearl Harbor historiography. Gordon Prange never mentioned Grogan's reports in any of his Pearl Harbor studies because, his principal collaborators have told us, he could attach no credence to Grogan's reports.
    [Show full text]
  • (U) Cryptologic Almanac Soth Anniversary Series (U)Madame X
    DOCID: 3575740 ~ l".AEQ/IL - --..... , • • u~t: l\J.11 V , • H UNCLASSlrl 1rOH urr1i...11u. 1.1 ..... ...... _. • (U) Cryptologic Almanac soth Anniversary Series (U)Madame X: Agnes Meyer Driscoll and U.S. Naval Cryptology, 1919 - 1940 (U) Of all the pioneer American cryptologists that we remember - William and Elizebeth Friedman, Herbert 0. Yardley (founder of the American Black Chamber), and Joseph Rochefort, whose codebreaking exploits contributed to the Midway victory - one, Agnes Meyer Driscoll, remains something of a mystery. The mystery is all the more ironic when we consider the range and number of her accomplishments as a pioneer cryptologist, and that she was a woman working in the mostly male domain of naval cryptology. (U) She was born on 24 July 1889 in Genesco, Illinois, to Dr. Gustav F. and Lucy Andrews Meyer. Jn 1911, she received an A.B. from Ohio State University, having majored in mathematics, music, physics, and foreign languages. Her curriculum was atypical of women's education in the post-Victorian era. After college, she moved to Amarillo, Texas, where she taught in various high schools. By 1918, she was the head of the mathematics department at Amarillo High School. However, events were soon to change her career completely. (U) In April 1917, as a result of the unlimited U-boat campaign and the revelations of the Zimmermann Telegram, the United States declared war on Germany. By early 1918, the U.S. Navy found that it had a serious personnel shortage as the war soaked up the pool of available manpower. To fix this problem, the secretary of the navy, Josephus Daniels, made the far-reaching decision to allow women to enlist.
    [Show full text]