Female Code Breakers
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Untold Story of the American Women Code Breakers of World War II by Liza Mundy
2018-046 1 June 2018 Code Girls: The Untold Story of the American Women Code Breakers of World War II by Liza Mundy . New York: Hachette, 2017. Pp. xiv, 416. ISBN 978–0–316–35253–6. Review by Chris Christensen, Northern Kentucky University ([email protected]). In September 1941, as war with Japan was on the horizon and the United States was becoming more involved in the war in Europe, Admiral Leigh Noyes, Director of Naval Communications, wrote to Ada Comstock, president of Radcliffe College, 1 that the Navy was looking for female codebreakers. For over a year, the Navy had been quietly recruiting male intelligence officers from leading colleges and now was embarking on the same experiment with women. Noyes confided that the Navy wanted bright, closed-mouth native students …. Evidence of a flair for languages or for mathematics could be advantageous … [while] any intense sociological quirks would, of course, be undesirable…. In the event of total war, women will be needed for this work, and they can probably do it better than men. (12–13) Thus began the Navy’s recruitment of women into a secret proctored correspondence course in elementary cryptanalysis. By late spring 1942, the first wave of women had completed the course and reported for duty in Washington, DC. The US Army soon followed the Navy in recruiting college women. During World War II, the two services employed some twenty thousand codebreakers; about eleven thousand of whom were women (30). The contributions of these individuals have, till now, gone mostly unrecog- nized. 2 In Code Girls , author Liza Mundy 3 highlights the work and personal stories of many of these women. -
Collegiate Codebreakers: Winthrop, Women, and War
Winthrop University Digital Commons @ Winthrop University Graduate Theses The Graduate School Spring 5-2020 Collegiate Codebreakers: Winthrop, Women, and War Marlana Mayton Follow this and additional works at: https://digitalcommons.winthrop.edu/graduatetheses Part of the Military History Commons, United States History Commons, and the Women's History Commons May, 2020 To the Dean of the Graduate School: We are submitting a thesis written by Marlana Mayton entitled Collegiate Codebreakers: Winthrop, Women, and War. We recommend acceptance in partial fulfillment of the requirements for the degree of Master of Arts in History. _____________________________ Dr. Eddie Lee, Thesis Advisor _____________________________ Dr. Virginia Williams, Committee Member _____________________________ Dr. Catherine Chang, Committee Member _____________________________ Dr. Takita Sumter, Dean, College of Arts and Sciences _____________________________ Dr. Jack E. DeRochi, Dean, Graduate School COLLEGIATE CODEBREAKERS: WINTHROP, WOMEN, AND WAR A Thesis Presented to the Faculty Of the College of Arts and Sciences In Partial Fulfillment Of the Requirements for the Degree Of Master of Arts In History Winthrop University May, 2020 By Marlana Mayton Abstract During World War II, college-aged women from across the nation filled United States Army and Navy secretive cryptanalysis facilities to help win the war. For many women, colleges facilitated involvement in codebreaking. Through information gathered in oral histories, this thesis primarily explores war related programs at American colleges and the young women that became cryptanalysts. Academic institutions, like Winthrop College, became the nuclei for colligate codebreakers. They acted as early crypt education centers, through the offering of cryptology classes, functioned as recruitment centers, and operated as essential training hubs. -
Project VENONA: Breaking the Unbreakable Code
Georgia Southern University Digital Commons@Georgia Southern University Honors Program Theses 2020 Project VENONA: Breaking the Unbreakable Code Cassandra Hankin Georgia Southern University Follow this and additional works at: https://digitalcommons.georgiasouthern.edu/honors-theses Part of the History Commons Recommended Citation Hankin, Cassandra, "Project VENONA: Breaking the Unbreakable Code" (2020). University Honors Program Theses. 471. https://digitalcommons.georgiasouthern.edu/honors-theses/471 This thesis (open access) is brought to you for free and open access by Digital Commons@Georgia Southern. It has been accepted for inclusion in University Honors Program Theses by an authorized administrator of Digital Commons@Georgia Southern. For more information, please contact [email protected]. Project VENONA: Breaking the Unbreakable Code An Honors Thesis submitted in partial fulfillment of the requirements for Honors in History. By Cassandra Hankin Under the mentorship of Dr. Bill Allison ABSTRACT Project VENONA was a top-secret counterintelligence program initiated by the United States Army Signals Intelligence Service during World War II. VENONA was established to decipher intercepted Soviet communications and break the “unbreakable” Soviet code system. Examining Project VENONA and its discoveries is vital to understanding the history of the early Cold War. Thesis Mentor:________________________ Dr. Bill Allison Honors Director:_______________________ Dr. Steven Engel April 2020 Department of History University Honors Program Georgia Southern University 2 Acknowledgements There are many people I’d like to thank for helping me during the year and a half I worked on this project. For helping me through the research and writing process, I would like to thank Dr. Bill Allison, who never gave up on me or my project. -
Annotated Bibliography Images/Media
Annotated Bibliography Images/Media: Ann Caracristi. n.d. National Cryptologic Museum. https://cryptologicfoundation.org/what-we-do/commemorate/in-memoriam-re gistry-honoree-pages/ann-caracristi.html. This image is a portrait of Cryptanalyst Veteran Ann Caracristi when she was being interviewed about her WWII code-breaking experiences. Associated Press. Intelligence Analysts Work to Decipher Coded Japanese Messages at the Headquarters of the Army Cryptanalysis Service in Arlington, Va., in 1944. n.d. The Washington Post. https://www.washingtonpost.com/outlook/the-brilliance-of-the-women-code- breakers-of-world-war-ii/2017/10/06/ec64ca8a-9e2c-11e7-9c8d-cf053ff30921_s tory.html. With this image, I was able to get a closer look at how the work of a Cryptanalyst was done, and what machinery they used to decode messages. Bedell-Burke, Margie. “Barracks Life of World War II WAVES.” Women of World War II, August 27, 2017. https://www.womenofwwii.com/navy/navy-waves/barracks-life-of-world-war-ii -waves/. This website is all about the WAVES time living in barracks while serving in WWII. I was able to retrieve an image here showing what the women did to have fun in their rare free time. Bill Nye: Science Guy. Accessed January 12, 2021. https://www.billnyefilm.com/. This website is all about Bill Nye and provides a portrait image of him in recent years. Bill Nye is the son of Jaqueline Jenkins Nye who was a WWII WAVE Cryptanalyst. The Flea Market Enigma Machine. n.d. Smithsonian Magazine. https://www.smithsonianmag.com/smart-news/wwii-enigma-machine-found-f lea-market-sells-51000-180964053/. -
ADST ORAL HISTORY LESSON PLAN: Female Code Breaker Betty Allan Middle School Grades 6‐8 High School Grades 9-12
Association for Diplomatic Studies and Training (ADST) ©2018 ADST ORAL HISTORY LESSON PLAN: Female Code Breaker Betty Allan Middle School Grades 6‐8 High School Grades 9-12 Big Idea: Oral history is a tool for learning about people, places, and events. Diplomats have a front- seat perspective on many international historical events. Topics Diplomatic Oral Histories U.S. Foreign Policy th 20 Century U.S. and World History Description: Students explore how historians use primary source oral histories to understand events, people, and places from the past. They will read the oral history of Betty Allan, a female code-breaker from WWII from the Association of Diplomatic Studies and Training (ADST) diplomatic oral history collection, and conduct a critical analysis of the interview in order to better understand her experiences described. Students are encouraged to make connections between the experiences described in the oral history and their own lives. [Teachers: Please note that this sample unit is for the Female Code Breakers during WWII but this lesson and format can be used with any historical events on our site, adst.org, by searching the event in Fascinating Figures or our Country Reader Series by country.] Objectives: Students will: − Understand oral history as a primary source as a way of gathering detailed information that helps us understand a specific time, place, person, or event. − Connect past and present experiences. − Understand that perspectives of events change over time. − Understand that all of us have important stories to tell and perspectives to share. Skills: − Identify, analyze, and interpret primary sources to make generalizations about events and life in world history − Evaluate the authenticity, authority, and credibility of sources − Develop perspectives of time and place Standards This unit is aligned with the following Virginia Department of Education History and Social Science Standards of Learning: World History and Geography: 1500 A.D. -
Code Girls: the Untold Story of the American Women Codebreakers of World War II Liza Mundy (Hachette, 2017), 416 Pp., Notes, Bibliography, Index
Intelligence in Public Media Code Girls: The Untold Story of the American Women Codebreakers of World War II Liza Mundy (Hachette, 2017), 416 pp., notes, bibliography, index. Reviewed by David A. Foy When Japanese bombs and torpedoes targeted the Of the first 197 women who received letters from planes and ships of the US Navy’s Pacific Fleet anchored the Navy, 74 ultimately made their way to Washington, at Pearl Harbor on Sunday morning, 7 December 1941, hired as SP-4 “Assistant Cryptanalytic Aides,” and paid the critical value of codebreaking was already common the munificent sum of $1,620 per year. The first of these knowledge in select circles. With the US entry into the débutante decoders arrived in bustling Washington, DC war, a problem soon arose: the men (primarily) who had in the late spring of 1942, only a few months into the done that critical task put on uniforms and headed to war. Housing was extremely tight, and the women had to theaters of war around the globe. Who would step into move often—sharing bedrooms and bathrooms was de the breach and ensure that the vital job of codebreaking rigeur, and even sharing beds was not uncommon. Both would continue? As author Liza Mundy’s Code Girls the services and the women discovered, however, that ably demonstrates, the answer was, “America’s women, the professions to which the latter were often relegated naturally!” It would prove to be women who would help in 1941 America would prove ideal for codebreaking, rescue a nation “emerging from two decades of disarma- especially that of schoolteaching. -
Women Spies and Code Breakers Spring 2020
OLLI Presents Women Spies and Code Breakers Spring 2020 Alan Rubin [email protected] Women Spies and Code Breakers 1840: Augusta Ada King WWI: Elizbeth Smith Freedman Code Breaker WWII: Bletchley Park Code Breakers WWII: Agnes Meyer Driscoll Code Breaker WWII: Virginia Hall Spy WWII: Madame Fourcade Spy WWII: Odette Sansom Spy Post Cold War: Amaryllis Fox: CIA Agent Women’s Role In Espionage Women need men to direct them! Who says so? MEN! Myth or Fact? Why do women make better spies? Why are the best code breakers women? We will explore these questions! Common Traits: Women in this Course • Fantastic instincts. • Excellent organizers. • Resourceful. • Men accepted their leadership. • Modest and avoided spotlight. • Knew chance of survival was about 25%. • Most had children. • Not interested in fame or recognition. Double Cross—WWII Spies Ben Macintyre and Babs Lily Sergeyov Augusta Ada King • December 10 1815-November 27, 1852: Born in London. • Daughter of Lord Byron and mathematician Anne Isabella Milbanke. • Learned mathematics, astronomy, literature and music at an early age. • Influenced by English scientist Charles Babbage early on. • Developed a mechanical analytical machine. • Could calculate algebraic functions and store numbers. • Calculated Bernoulli numbers. • First programmer in history. • Late 1970’s—Department of Defense developed first software language—called it ADA. • First to see expanded uses for computers. • A computer visionary. What does this mean? https://www.youtube.com/watch?v=-yFZGF8FHSg Charles Babbage Babbage Differential Machine Code Machines Code Machines https://www.youtube.com/watch?v=j2jRs4EAvWM Elizbeth Smith Friedman • Elizbeth was born August 26, 1892 small town of Huntington, Indiana. -
THURSDAY 19 OCTOBER 2017 Events at the Kossiakoff Center, Laurel, Maryland
PRELIMINARY PROGRAM (SUBJECT TO CHANGE) THURSDAY 19 OCTOBER 2017 Events at the Kossiakoff Center, Laurel, Maryland SESSION 1 0830 - 0915 PLENARY AUDITORIUM Welcome and Keynote. Deputy Director, NSA (invited) SESSION 2 0945 - 1115 SESSION 2A AUDITORIUM Inside Cyber Conflict: A View from the Archives Moderator: Michael Warner Craig Wiener Penetrate, Exploit, Disrupt, Destroy: The Rise of Computer Network Operations as a Major Military Innovation Richard Andres Information Operations in Operation Iraq Freedom: Implications for Future Cyber Conflict Dave Sherman Intelligence or Security? The Two Faces of William Friedman’s “Cryptologic Coin” SESSION 2B CLASSROOM A Literary and Imagined: Pre-20th Century Cryptology Moderator: Greg Nedved Katherine Ellison Cryptography and the Early Modern Literacy Counterrevolution Richard SantaColoma Is the Voynich Manuscript a Modern Forgery? (And why it matters) Benedek Lang The Codex of Rohonc: Unfounded and Well-Grounded Attempts at Breaking the Code SESSION 2C CLASSROOM B Cryptology During the Cold War Moderator: Rick Ledgett Michael Bigelow From ASA to INSCOM: Marking 40 Years of Army SIGINT John Fox Robert Lamphere, the FBI’s Cryptologic Pioneer Ivo Juurvee David Against Goliath: Estonian SIGINT and ECM against the Soviet Army During the August 1991 Coup d’Etat Attempt Chris Christensen The Evolving Relationship between Mathematics and Cryptology: 1951-1952, SCAG and the Beginnings of SCAMP and NSASAB SESSION 2D CLASSROOM C Britain: Friend or Foe? Moderator: TBD Jamie Bisher A British-Japanese Cabal Against the US? US Intelligence Suspicions in 1920-1922 David Kohnen Special Intelligence: Anglo-American Strategic Collaboration in Naval Operations in Peace and War, 1917-1945 LUNCH 1115 – 1215 SPEAKER 1145 - 1205 Anthony M. -
USS Midway Museum Library Online Catalog 07/02/2021
USS Midway Museum Library Online Catalog 07/02/2021 Author Title Pub Date Object Name Stevenson, James P. $5 Billion Misunderstanding, The : The Collapse of the Navy's A-12 Stealth Bomber 2001 Book Program Ross, Donald K. 0755 : The Heroes of Pearl Harbor 1988 Paperback Winkowski, Fredric 100 Planes, 100 Years : The First Century of Aviation 1998 Book Shores, Christopher 100 Years of British Naval Aviation 2009 Book Sweetman, Bill 100 Years of Flight 2002 Book Myers, Donald E. 101 Sea Stories : Those Tales Marines, Sailors and Others Love to Tell 2005 Paperback Bishop, Chris (ed) 1400 Days : The Civil War Day by Day 1990 Book Daughan, George C. 1812 : The Navy's War 2011 Book Werstein, Irving 1914-1918 : World War I Told with Pictures 1964 Paperback Hydrographic Office, Secretary of Navy 1931 International Code of Signals (American Edition), Vol. I - Visual 1952 Book Hydrographic Office, Secretary of Navy 1931 International Code of Signals (American Edition), Vol. II - Radio 1952 Book United States Naval Academy 1937 : The Sixty-Three Year Fix 2000 Paperback Kershaw, Andrew (ed) 1939-1945 War Planes 1973 Paperback Groom, Winston 1942 : The Year That Tried Men's Souls 2005 Book Naval Air Systems Command 2.75 Inch Airborne Rocket Launchers 1996 Manual Naval Air Systems Command 20-MM Aircraft Gun MK12 Mod 4 1980 Manual Naval Air Systems Command 20-MM Barrel Erosion Gage Kit M10(T23) 1976 Manual Merry, John A. 200 Best Aviation Web Sites 1998 Book Robinson, C. Snelling (Charles Snelling) 200,000 Miles Aboard the Destroyer Cotten 2000 Book Powell, Dick 20th Century Fox Studio Classics : 75 years, Disc 1 : On the Avenue 2006 DVD Grable, Betty 20th Century Fox Studio Classics : 75 years, Disc 2 : Pin Up Girl 2005 DVD Miranda, Carmen 20th Century Fox Studio Classics : 75 years, Disc 3 : Something for the Boys 2008 DVD Cooper, Gary 20th Century Fox Studio Classics : 75 years, Disc 4 : You're in the Navy Now 2006 DVD Murdock.