Collegiate Codebreakers: Winthrop, Women, and War
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
CODEBREAKING Suggested Reading List (Can Also Be Viewed Online at Good Reads)
MARSHALL LEGACY SERIES: CODEBREAKING Suggested Reading List (Can also be viewed online at Good Reads) NON-FICTION • Aldrich, Richard. Intelligence and the War against Japan. Cambridge: Cambridge University Press, 2000. • Allen, Robert. The Cryptogram Challenge: Over 150 Codes to Crack and Ciphers to Break. Philadelphia: Running Press, 2005 • Briggs, Asa. Secret Days Code-breaking in Bletchley Park. Barnsley: Frontline Books, 2011 • Budiansky, Stephen. Battle of Wits: The Complete Story of Codebreaking in World War Two. New York: Free Press, 2000. • Churchhouse, Robert. Codes and Ciphers: Julius Caesar, the Enigma, and the Internet. Cambridge: Cambridge University Press, 2001. • Clark, Ronald W. The Man Who Broke Purple. London: Weidenfeld and Nicholson, 1977. • Drea, Edward J. MacArthur's Ultra: Codebreaking and the War Against Japan, 1942-1945. Kansas: University of Kansas Press, 1992. • Fisher-Alaniz, Karen. Breaking the Code: A Father's Secret, a Daughter's Journey, and the Question That Changed Everything. Naperville, IL: Sourcebooks, 2011. • Friedman, William and Elizebeth Friedman. The Shakespearian Ciphers Examined. Cambridge: Cambridge University Press, 1957. • Gannon, James. Stealing Secrets, Telling Lies: How Spies and Codebreakers Helped Shape the Twentieth century. Washington, D.C.: Potomac Books, 2001. • Garrett, Paul. Making, Breaking Codes: Introduction to Cryptology. London: Pearson, 2000. • Hinsley, F. H. and Alan Stripp. Codebreakers: the inside story of Bletchley Park. Oxford: Oxford University Press, 1993. • Hodges, Andrew. Alan Turing: The Enigma. New York: Walker and Company, 2000. • Kahn, David. Seizing The Enigma: The Race to Break the German U-boat Codes, 1939-1943. New York: Barnes and Noble Books, 2001. • Kahn, David. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. -
PENTAGON OFFICE BUILDING COMPLEX Other Name/Site Number: the Pentagon
NATIONAL HISTORIC LANDMARK NOMINATION NFS Form 10-900 USDI/NPS NRHP Registration Form (Rev. 8-86) OMB No. 1024-0018 THE PENTAGON Page 1 United States Department of the Interior, National Park Service National Register of Historic Places Registration Form 1. NAME OF PROPERTY Historic Name: PENTAGON OFFICE BUILDING COMPLEX Other Name/Site Number: The Pentagon 2. LOCATION Street & Number: U.S. 1, Va. 110, and Not for publication: Interstate 395 City/Town: Arlington Vicinity:__ State: Virginia County: Arlington Code: 013 Zip Code: 20301 3. CLASSIFICATION Ownership of Property Category of Property Private:__ Building(s): X Public-local:__ District:__ Public-State:__ Site:__ Public-Federal: X Structure:__ Object:__ Number of Resources within Property Contributing Noncontributing 1 ____ buildings 1 sites (helipad) ____ structures ____ objects 1 Total Number of Contributing Resources Previously Listed in the National Register: 4 Name of related multiple property listing: NFS Form 10-900 USDI/NPS NRHP Registration Form (Rev. 8-86) OMB No. 1024-0018 THE PENTAGON Page 2 United States Department of the Interior, National Park Service______National Register of Historic Places Registration Form 4. STATE/FEDERAL AGENCY CERTIFICATION As the designated authority under the National Historic Preservation Act of 1986, as amended, I hereby certify that this ___ nomination ___ request for determination of eligibility meets the documentation standards for registering properties in the National Register of Historic Places and meets the procedural and professional requirements set forth in 36 CFR Part 60. In my opinion, the property ___ meets ___ does not meet the National Register Criteria. -
The First Americans the 1941 US Codebreaking Mission to Bletchley Park
United States Cryptologic History The First Americans The 1941 US Codebreaking Mission to Bletchley Park Special series | Volume 12 | 2016 Center for Cryptologic History David J. Sherman is Associate Director for Policy and Records at the National Security Agency. A graduate of Duke University, he holds a doctorate in Slavic Studies from Cornell University, where he taught for three years. He also is a graduate of the CAPSTONE General/Flag Officer Course at the National Defense University, the Intelligence Community Senior Leadership Program, and the Alexander S. Pushkin Institute of the Russian Language in Moscow. He has served as Associate Dean for Academic Programs at the National War College and while there taught courses on strategy, inter- national relations, and intelligence. Among his other government assignments include ones as NSA’s representative to the Office of the Secretary of Defense, as Director for Intelligence Programs at the National Security Council, and on the staff of the National Economic Council. This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other US government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: (Top) Navy Department building, with Washington Monument in center distance, 1918 or 1919; (bottom) Bletchley Park mansion, headquarters of UK codebreaking, 1939 UNITED STATES CRYPTOLOGIC HISTORY The First Americans The 1941 US Codebreaking Mission to Bletchley Park David Sherman National Security Agency Center for Cryptologic History 2016 Second Printing Contents Foreword ................................................................................ -
Female Code Breakers
Association for Diplomatic Studies and Training (ADST) ADST ORAL HISTORY LESSON PLAN: Female Code Breaker Betty Allan Middle School Grades 6‐8 High School Grades 9-12 Big Idea: Oral history is a tool for learning about people, places, and events. Diplomats have a front- seat perspective on many international historical events. Topics x Diplomatic Oral Histories x U.S. Foreign Policy th x 20 Century U.S. and World History Description: Students explore how historians use primary source oral histories to understand events, people, and places from the past. They will read the oral history of Betty Allan, a female code-breaker from WWII from the Association of Diplomatic Studies and Training (ADST) diplomatic oral history collection, and conduct a critical analysis of the interview in order to better understand her experiences described. Students are encouraged to make connections between the experiences described in the oral history and their own lives. [Teachers: Please note that this sample unit is for the Female Code Breakers during WWII but this lesson and format can be used with any historical events on our site, adst.org, by searching the event in Fascinating Figures or our Country Reader Series by country.] Objectives: Students will: − Understand oral history as a primary source as a way of gathering detailed information that helps us understand a specific time, place, person, or event. − Connect past and present experiences. − Understand that perspectives of events change over time. − Understand that all of us have important stories to tell and perspectives to share. Skills: − Identify, analyze, and interpret primary sources to make generalizations about events and life in world history − Evaluate the authenticity, authority, and credibility of sources − Develop perspectives of time and place Standards This unit is aligned with the following Virginia Department of Education History and Social Science Standards of Learning: x World History and Geography: 1500 A.D. -
Historic Context for Department of Defense Facilities World War Ii Permanent Construction
DEPARTMeNT OF DEFENSE FACILITIES- WORLD WAR II PERMANENT CONSTRUhttp://aee-www.apgea.army.mil:8080/prod/usaee!eqlconserv/ww2pel.htm ~ - Delivery Order 21 Contract No. DACW31-89-D-0059 US Army Corps of Engineers-Baltimore District HISTORIC CONTEXT FOR DEPARTMENT OF DEFENSE FACILITIES WORLD WAR II PERMANENT CONSTRUCTION May 1997 R. Christopher Goodwin and Associates, Inc. 241 E. Fourth Street Suite 100 Frederick, Maryland 21701 FINAL REPORT June 1997 EXECUTIVE SUMMARY The Historic Context for Department of Defense (DoD) World War H Permanent Construction combines two previous reports: Historic Context for Department of Defense Facilities World War H Permanent Construction (Hirrel et al., draft June 1994) and Methodology for World War H Permanent Construction (Whelan, draft August 1996). This project was designed to meet the following objectives: • To analyze and synthesize historical data on the military's permanent construction program during World War H. • To assist DoD cultural resource managers and other DoD personnel with fulfilling their responsibilities under the National Historic Preservation Act (NHP A) of 1966, as amended. Section 110 of the NHPA requires federal agencies to identity, evaluate, and nominate to the National Register of Historic Places historic properties under their jurisdiction. Section 110 Guidelines, developed by the National Park Service, U.S. Department ofthe Interior, direct federal agencies to establish historic contexts to identifY and evaluate historic properties (53FR 4727-46). • To develop a consistent historic context framework that provides comparative data and background information in a cost-effective manner, which will allow DoD personnel to assess the relative significance of World War II military construction. -
The Untold Story of the American Women Code Breakers of World War II by Liza Mundy
2018-046 1 June 2018 Code Girls: The Untold Story of the American Women Code Breakers of World War II by Liza Mundy . New York: Hachette, 2017. Pp. xiv, 416. ISBN 978–0–316–35253–6. Review by Chris Christensen, Northern Kentucky University ([email protected]). In September 1941, as war with Japan was on the horizon and the United States was becoming more involved in the war in Europe, Admiral Leigh Noyes, Director of Naval Communications, wrote to Ada Comstock, president of Radcliffe College, 1 that the Navy was looking for female codebreakers. For over a year, the Navy had been quietly recruiting male intelligence officers from leading colleges and now was embarking on the same experiment with women. Noyes confided that the Navy wanted bright, closed-mouth native students …. Evidence of a flair for languages or for mathematics could be advantageous … [while] any intense sociological quirks would, of course, be undesirable…. In the event of total war, women will be needed for this work, and they can probably do it better than men. (12–13) Thus began the Navy’s recruitment of women into a secret proctored correspondence course in elementary cryptanalysis. By late spring 1942, the first wave of women had completed the course and reported for duty in Washington, DC. The US Army soon followed the Navy in recruiting college women. During World War II, the two services employed some twenty thousand codebreakers; about eleven thousand of whom were women (30). The contributions of these individuals have, till now, gone mostly unrecog- nized. 2 In Code Girls , author Liza Mundy 3 highlights the work and personal stories of many of these women. -
Before the Washington Metropolitan Area Transit
BEFORE THE WASHINGTON METROPOLITAN AREA TRANSIT COMMISSION WASHINGTON, D. C. ORDER NO. 367 IN THE MATTER OF: Served June 17, 1964 Applications for Certificates ) of Public Convenience and ) Necessity by: ) ) • D. C. Transit System, Inc. ) Application No. 64 Washington, D. C. ) ) Alexandria, Barcroft and Washington ) Application No. 43 Transit Company ) Alexandria, Virginia ) ) Washington, Virginia and Maryland ) Application No. 60 Coach Company, Inc. ) Arlington, Virginia ) ) W M A Transit Company ) Application No. 23 Bradbury Heights, Maryland ) ) The Gray Line, Inc. ) Application No. 65 Washington, D. C. ) APPEARANCES: As shown in the Conference Report attached hereto and made a part hereof. Applications for certificates of public convenience and neces- sity authorizing continuance of operations being conducted on the ef- fective date of the Compact and on the effective date of the Compact as amended, pursuant to Section 4(a), Article XII, Title II, of the Washington Metropolitan Area Transit Regulation Compact (grandfather clause) were timely filed by D. C. Transit System, Inc.; Alexandria, Barcroft and Washington Transit Company; Washington, Virginia and Maryland Coach Company, Inc.; W M A Transit Company; and The Gray Line, Inc. Public notice of these applications was duly given and every interested party was afforded every opportunity to present its views to the Commission in the disposition of these applications. Under the Compact, no formal hearings are required in disposing of these applications. However, as noted in the attached Conference Report, numerous informal discussions and conferences were held between the Staff of the Commission and all parties of record con- cerning the issues involved. The only issues involved were whether or not the applications were timely filed and whether or not the applicants were bona fide engaged in transportation subject to this Act for which authority was sought. -
Arlington National Cemetery Historic District Other Names/Site Number Arlington National Cemetery; DHR #000-0042
NPS Form 10-900 OMB No. 1024-0018 (E xpires 5/31/2012) United States Department of the Interior RECEIVED 228 National Park Service National Register of Historic Places FEB 2 4 2014 Registration Form NAT. REGISTER OF HISTORIC PLACL,· NATIONAL PARK SERVICE This form is for use in nominating or requesting determinations for individual properties and districts. See instructions n a 1 n egister Bulletin, How to Complete the National Register of Historic Places Registration Form. If any item does not apply to the property being documented, enter "N/A" for "not applicable." For functions, architectural classification, materials, and areas of significance, enter only categories and subcategories from the instructions. Place additional certification comments, entries, and narrative Items on continuation sheets if needed (NPS Form 10-900a). 1. Name of Property historic name Arlington National Cemetery Historic District other names/site number Arlington National Cemetery; DHR #000-0042 2. Location street & number One Memorial Avenue D not for publication city or town ......:..A.::.r.:..::lin:..:,g...:t:.::o.:....:n _ _______________________ U vicinity state Vir inia code VA county -'----"-'-'-'Arlin-'->L:. ton.:......;. ___ code 013 zip code 22211 ~-'---- 3. State/Federal Agency Certification As the designated authority under the National Historic Preservation Act, as amended, I hereby certify that this _x_ nomination __ request for determination of eligibility meets the documentation standards for registering properties in the National Register of Historic Places and meets the procedural and professional requirements set forth in 36 CFR Part 60. In my opinion, the property __x_meets __ does not meet the National Register Criteria. -
Executive Summary Public-Hearing-9-20-2018.Pdf 2 ES-1 Type of Report
Draft Environmental Assessment Arlington National Cemetery Southern Expansion Summary of Comments on 2018-08-00_D33S_RPT_ANC-Draft-EA-for- 1 Executive Summary Public-Hearing-9-20-2018.pdf 2 ES-1 Type of Report 3 This Environmental Assessment (EA) evaluates the potential environmental impacts associated with Page: 12 4 Arlington National Cemetery’s (ANC) Proposed Action to establish a single contiguous parcel of land south Author: sfinotti Subject: Cross-Out Date: 09/18/2018 6:31:29 AM 5 of the cemetery by closing and relocating local roadways and developing the parcel to increase interment 6 capacity and increase multimodal transportation capacity on Columbia Pike. This document simultaneously 7 addresses the establishment and development components of this action with the FHWA, VDOT, and Author: sfinotti Subject: Sticky Note Date: 09/21/2018 9:28:45 AM 8 Arlington County as cooperating agencies. The realignment of Columbia Pike is integral to a successful It should say Arlington County. If it must reference the board, then it should say "Arlington County Board", 9 ANC expansion; this EA assesses the potential impacts of the realignment to ensure that the cumulative not "Board of Arlington County" 10 effects of the collective federal actions – roadways and cemetery expansion – are considered. 11 This EA follows regulatory guidance of the National Environmental Policy Act (NEPA) of 1969; the 12 Council on Environmental Quality (CEQ) regulations implementing NEPA (40 Code of Federal 13 Regulations [CFR] 1500-1508); and Environmental Analysis of Army Actions (32 CFR 651). Arlington 14 National Cemetery, a Direct Report Unit of the Headquarters, Department of the Army (HQDA) is the lead 15 agency for the Proposed Action. -
Enigma Cipher Machine Simulator 7.0.5
ENIGMA CIPHER MACHINE SIMULATOR 7.0.5 About the Enigma Simulator The German Enigma machine is the most famous example of the battle between codemakers and codebreakers. Never before has the fate of so many lives been so influenced by one cryptographic machine, as the Enigma did in the Second World War. The story of Enigma combines technology, military history, espionage, codebreaking and intelligence into a real thriller. This software is an exact simulation of the 3-rotor Heer (Army) and Luftwaffe (Airforce) Wehrmacht Enigma I, the Kriegsmarine (wartime Navy) Enigma M3 and the famous 4-rotor Enigma M4, as they were used during World War II from 1939 until 1945. The internal wiring of all rotors is identical to those used by the Heer, Luftwaffe and Kriegsmarine. This simulator is therefore fully compatible with the real Enigma machine and you can decipher original messages and encipher your own messages. You can use the Enigma simulator in exactly the same way as a German signal trooper would have done during WW2. The hands-on approach and realistic graphics ensure an authentic feeling. You can open the machine, change the internal settings, select rotors from the spare box, preset their ring settings, insert them into the machine and set the plugboard. The sounds are recorded from an actual Enigma machine. This manual explains how to use the Enigma simulator, the message procedures as used by the German Armed Forces, including some authentic message examples, a complete technical description and a brief history of the Enigma. More information on the Enigma machine is found at the Cipher Machines & Cryptology website: http://users.telenet.be/d.rijmenants This manual is copyrighted. -
The Cultural Contradictions of Cryptography: a History of Secret Codes in Modern America
The Cultural Contradictions of Cryptography: A History of Secret Codes in Modern America Charles Berret Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy under the Executive Committee of the Graduate School of Arts and Sciences Columbia University 2019 © 2018 Charles Berret All rights reserved Abstract The Cultural Contradictions of Cryptography Charles Berret This dissertation examines the origins of political and scientific commitments that currently frame cryptography, the study of secret codes, arguing that these commitments took shape over the course of the twentieth century. Looking back to the nineteenth century, cryptography was rarely practiced systematically, let alone scientifically, nor was it the contentious political subject it has become in the digital age. Beginning with the rise of computational cryptography in the first half of the twentieth century, this history identifies a quarter-century gap beginning in the late 1940s, when cryptography research was classified and tightly controlled in the US. Observing the reemergence of open research in cryptography in the early 1970s, a course of events that was directly opposed by many members of the US intelligence community, a wave of political scandals unrelated to cryptography during the Nixon years also made the secrecy surrounding cryptography appear untenable, weakening the official capacity to enforce this classification. Today, the subject of cryptography remains highly political and adversarial, with many proponents gripped by the conviction that widespread access to strong cryptography is necessary for a free society in the digital age, while opponents contend that strong cryptography in fact presents a danger to society and the rule of law. -
Codebreakers
1 Some of the things you will learn in THE CODEBREAKERS • How secret Japanese messages were decoded in Washington hours before Pearl Harbor. • How German codebreakers helped usher in the Russian Revolution. • How John F. Kennedy escaped capture in the Pacific because the Japanese failed to solve a simple cipher. • How codebreaking determined a presidential election, convicted an underworld syndicate head, won the battle of Midway, led to cruel Allied defeats in North Africa, and broke up a vast Nazi spy ring. • How one American became the world's most famous codebreaker, and another became the world's greatest. • How codes and codebreakers operate today within the secret agencies of the U.S. and Russia. • And incredibly much more. "For many evenings of gripping reading, no better choice can be made than this book." —Christian Science Monitor THE Codebreakers The Story of Secret Writing By DAVID KAHN (abridged by the author) A SIGNET BOOK from NEW AMERICAN LIBRARV TIMES MIRROR Copyright © 1967, 1973 by David Kahn All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage and retrieval system, without permission in writing from the publisher. For information address The Macmillan Company, 866 Third Avenue, New York, New York 10022. Library of Congress Catalog Card Number: 63-16109 Crown copyright is acknowledged for the following illustrations from Great Britain's Public Record Office: S.P. 53/18, no. 55, the Phelippes forgery, and P.R.O. 31/11/11, the Bergenroth reconstruction.