Military History Anniversaries 0101 Thru 0131
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Frontiers of American Grand Strategy: Settlers, Elites, and the Standing Army in America’S Indian Wars
THE FRONTIERS OF AMERICAN GRAND STRATEGY: SETTLERS, ELITES, AND THE STANDING ARMY IN AMERICA’S INDIAN WARS A Dissertation submitted to the Faculty of the Graduate School of Arts and Sciences of Georgetown University in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Government By Andrew Alden Szarejko, M.A. Washington, D.C. August 11, 2020 Copyright 2020 by Andrew Alden Szarejko All Rights Reserved ii THE FRONTIERS OF AMERICAN GRAND STRATEGY: SETTLERS, ELITES, AND THE STANDING ARMY IN AMERICA’S INDIAN WARS Andrew Alden Szarejko, M.A. Thesis Advisor: Andrew O. Bennett, Ph.D. ABSTRACT Much work on U.S. grand strategy focuses on the twentieth and twenty-first centuries. If the United States did have a grand strategy before that, IR scholars often pay little attention to it, and when they do, they rarely agree on how best to characterize it. I show that federal political elites generally wanted to expand the territorial reach of the United States and its relative power, but they sought to expand while avoiding war with European powers and Native nations alike. I focus on U.S. wars with Native nations to show how domestic conditions created a disjuncture between the principles and practice of this grand strategy. Indeed, in many of America’s so- called Indian Wars, U.S. settlers were the ones to initiate conflict, and they eventually brought federal officials into wars that the elites would have preferred to avoid. I develop an explanation for settler success and failure in doing so. I focus on the ways that settlers’ two faits accomplis— the act of settling on disputed territory without authorization and the act of initiating violent conflict with Native nations—affected federal decision-making by putting pressure on speculators and local elites to lobby federal officials for military intervention, by causing federal officials to fear that settlers would create their own states or ally with foreign powers, and by eroding the credibility of U.S. -
Military History Anniversaries 1 Thru 15 January
Military History Anniversaries 1 thru 15 January Events in History over the next 15 day period that had U.S. military involvement or impacted in some way on U.S military operations or American interests Jan 00 1944 – WW2: USS Scorpion (SS–278). Date of sinking unknown. Most likely a Japanese mine in Yellow or East China Sea. 77 killed. Jan 00 1945 – WW2: USS Swordfish (SS–193) missing. Possibly sunk by Japanese Coast Defense Vessel No. 4 on 5 January or sunk by a mine off Okinawa on 9 January. 89 killed. Jan 01 1781 – American Revolution: Mutiny of the Pennsylvania Line – 1,500 soldiers from the Pennsylvania Line (all 11 regiments under General Anthony Wayne’s command) insist that their three-year enlistments are expired, kill three officers in a drunken rage and abandon the Continental Army’s winter camp at Morristown, New Jersey. Jan 01 1883 – Civil War: President Abraham Lincoln signs the final Emancipation Proclamation, which ends slavery in the rebelling states. The proclamation freed all slaves in states that were still in rebellion as of 1 JAN. Jan 01 1915 – WWI: The 15,000-ton British HMS class battleship Formidable is torpedoed by the German submarine U-24 and sinks in the English Channel, killing 547 men. The Formidable was part of the 5th Battle Squadron unit serving with the Channel Fleet. Jan 01 1942 – WW2: The War Production Board (WPB) ordered the temporary end of all civilian automobile sales leaving dealers with one half million unsold cars. Jan 01 1942 – WW2: United Nations – President Franklin D. -
Settlement's Secret
SETTLEMENT’S SECRET AUDRA SIMPSON CColumbia UniversityA In the spirit of Orin Starn’s piece for Cultural Anthropology “Here Come the Anthros (Again): The Strange Marriage of Anthropology and Native America,” I offer the following response that orients to three periodizations within his review of the literature. These periodizations are marked by an anthropological (1) depen- dence on Native peoples, (2) estrangement from Native peoples, and (3) (tentative) rapprochement with Native peoples. I depart from the premise of settler colonialism to meet Starn in the history he has mapped out for us. Settler colonialism is predicated on a territorial possession by some and, thus, a dispossession of others. In this model of colonialism, “the settler never leaves,” so the possession of territory requires the disappearance of “the native” (Wolfe 1999, 2006). The condition of Indigeneity in North America is to have survived this acquisitive and genocidal process and thus to have called up the failure of the project itself. In my reading of Starn’s piece and my admittedly particular rereading of the anthropological literature offered here, I respond to what I see as his central claims but do so with this reframing of the work of anthropology within the ongoing historical and political process of settlement. I organize my discussion in three parts that respond to the organization of Starn’s article: (1) spectacle, (2) anthropology, and (3) sovereignty. THE SPECTACLE Starn starts with a discussion of James Cameron’s blockbuster film Avatar (2009), a contemporary narrative caught up with desires and discourses that, as he C CULTURAL ANTHROPOLOGY, Vol. -
Historical Dictionary of Air Intelligence
Historical Dictionaries of Intelligence and Counterintelligence Jon Woronoff, Series Editor 1. British Intelligence, by Nigel West, 2005. 2. United States Intelligence, by Michael A. Turner, 2006. 3. Israeli Intelligence, by Ephraim Kahana, 2006. 4. International Intelligence, by Nigel West, 2006. 5. Russian and Soviet Intelligence, by Robert W. Pringle, 2006. 6. Cold War Counterintelligence, by Nigel West, 2007. 7. World War II Intelligence, by Nigel West, 2008. 8. Sexspionage, by Nigel West, 2009. 9. Air Intelligence, by Glenmore S. Trenear-Harvey, 2009. Historical Dictionary of Air Intelligence Glenmore S. Trenear-Harvey Historical Dictionaries of Intelligence and Counterintelligence, No. 9 The Scarecrow Press, Inc. Lanham, Maryland • Toronto • Plymouth, UK 2009 SCARECROW PRESS, INC. Published in the United States of America by Scarecrow Press, Inc. A wholly owned subsidiary of The Rowman & Littlefield Publishing Group, Inc. 4501 Forbes Boulevard, Suite 200, Lanham, Maryland 20706 www.scarecrowpress.com Estover Road Plymouth PL6 7PY United Kingdom Copyright © 2009 by Glenmore S. Trenear-Harvey All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of the publisher. British Library Cataloguing in Publication Information Available Library of Congress Cataloging-in-Publication Data Trenear-Harvey, Glenmore S., 1940– Historical dictionary of air intelligence / Glenmore S. Trenear-Harvey. p. cm. — (Historical dictionaries of intelligence and counterintelligence ; no. 9) Includes bibliographical references. ISBN-13: 978-0-8108-5982-1 (cloth : alk. paper) ISBN-10: 0-8108-5982-3 (cloth : alk. paper) ISBN-13: 978-0-8108-6294-4 (eBook) ISBN-10: 0-8108-6294-8 (eBook) 1. -
A Counterintelligence Reader, Volume 2 Chapter 1, CI in World
CI in World War II 113 CHAPTER 1 Counterintelligence In World War II Introduction President Franklin Roosevelts confidential directive, issued on 26 June 1939, established lines of responsibility for domestic counterintelligence, but failed to clearly define areas of accountability for overseas counterintelligence operations" The pressing need for a decision in this field grew more evident in the early months of 1940" This resulted in consultations between the President, FBI Director J" Edgar Hoover, Director of Army Intelligence Sherman Miles, Director of Naval Intelligence Rear Admiral W"S" Anderson, and Assistant Secretary of State Adolf A" Berle" Following these discussions, Berle issued a report, which expressed the Presidents wish that the FBI assume the responsibility for foreign intelligence matters in the Western Hemisphere, with the existing military and naval intelligence branches covering the rest of the world as the necessity arose" With this decision of authority, the three agencies worked out the details of an agreement, which, roughly, charged the Navy with the responsibility for intelligence coverage in the Pacific" The Army was entrusted with the coverage in Europe, Africa, and the Canal Zone" The FBI was given the responsibility for the Western Hemisphere, including Canada and Central and South America, except Panama" The meetings in this formative period led to a proposal for the organization within the FBI of a Special Intelligence Service (SIS) for overseas operations" Agreement was reached that the SIS would act -
The American Legion [Volume 124, No. 5 (May 1988)]
Last Chance Final Year for this Incredible Low Price on the Most Popular Summer Shirt in America! Men, if you act at once while my one remaining boatload of genuine imported Guayabera Summer Shirts is still in stock, I promise you will be the Best Dressed, Smartest, Coolest, Most Comfortable man around town this summer and still pay only • 4 POCKETS ! • Tailored to Fit! • NO JACKET REQUIRED! Details! Details! Details! Real f a button side vents, f ® JOW YOU MUST HURRY! 1: Quality like this probably will cost twice ^the price anywhere else, but I bought these Wfearfy and my ship has just come in. All sizes, all colors in cool, crisp, polyester/cotton I NO IRON summer shirting. BUT HURRY! Once these are gone, there are no more at this price ever! Use this coupon: /A quality Haband Import 'Shirts 3for NO-IRON for W MM 37.25 4/49.50 Summer Shirts SAVE $2: All 5 for $60.35 ^ HABANDuAQAiin COMPANYrn SIZES: S(14-14y2) M(15-15'/2) 265 N. 9th Street L(16-16y2) XL(17-17'/2) Paterson, N.J. 07530 PLEASE ADD $2.50 PER SHIRT FOR 2XL(18-18'/2)* 3XL(19-19y2)* Si, Senor! Send _ shirts COLOR SIZE? QTY.7 GUARANTEE: If I do not choose ^ _A_ WHITE to wear the shirts, I may return them within 30 days for a full B BLUE refund of every penny I paid you. _c_ TAN lament enclosed or _f_ YELLOW Charge: DVisa DMC _L BURGUNDY PRICE Exp. Date: / POSTACE/HANDUNC $ 2.75 Acct. -
Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide -
International Spy Museum
International Spy Museum Searchable Master Script, includes all sections and areas Area Location, ID, Description Labels, captions, and other explanatory text Area 1 – Museum Lobby M1.0.0.0 ΚΑΤΆΣΚΟΠΟΣ SPY SPION SPIJUN İSPİYON SZPIEG SPIA SPION ESPION ESPÍA ШПИОН Language of Espionage, printed on SCHPION MAJASUSI windows around entrance doors P1.1.0.0 Visitor Mission Statement For Your Eyes Only For Your Eyes Only Entry beyond this point is on a need-to-know basis. Who needs to know? All who would understand the world. All who would glimpse the unseen hands that touch our lives. You will learn the secrets of tradecraft – the tools and techniques that influence battles and sway governments. You will uncover extraordinary stories hidden behind the headlines. You will meet men and women living by their wits, lurking in the shadows of world affairs. More important, however, are the people you will not meet. The most successful spies are the unknown spies who remain undetected. Our task is to judge their craft, not their politics – their skill, not their loyalty. Our mission is to understand these daring professionals and their fallen comrades, to recognize their ingenuity and imagination. Our goal is to see past their maze of mirrors and deception to understand their world of intrigue. Intelligence facts written on glass How old is spying? First record of spying: 1800 BC, clay tablet from Hammurabi regarding his spies. panel on left side of lobby First manual on spy tactics written: Over 2,000 years ago, Sun Tzu’s The Art of War. 6 video screens behind glass panel with facts and images. -
Risk of Public Disclosure: Learning from Willy Wonka
Issue 20, 16 December 2014 WhiteNews Global corporate espionage news Editorial: WhiteRock Updates: All About Privacy 2 Threat: Are LinkedIn Contacts Trade Secrets? 3 News: $400 Bn Military Espionage; Code Fishing 4 News: Falcani Black List; Football Whistleblower 5 Feature: Willy Wonka’s Lessons in Espionage 6-7 Technology: Hearing Aid for Corporate Spies 8-9 Extra: FBI’s Untold Story; Spy on Your Rival 10-11 Letter From America: Spying Breakfast Club 12 Exclusive Reporting for WhiteRock’s Clients Risk of Public Disclosure: Learning from Willy Wonka Our feature story is seemingly seasonal and light-hearted, but the film ‘Charlie and the Chocolate Factory’ carries a very strong espionage message that is relevant even 50 years later. Willy Wonka was a brilliant CEO who knew that the only person who could protect his trade was himself. Wonka’s story translates superbly into today’s corporate world, and in this issue we are discussing how the contemporary big players are maintaining their edge and success over their competitors. This is equally relevant for small and medium-sized businesses, who really don’t prioritise their trade secrets, making their advantage extremely vulnerable. In the technology section we analyse the delicate matter of hearing aid systems. They’re everywhere, including in corporate meeting rooms, and nobody really considers these as a threat. We’re examining how to achieve a balance between protecting valuable corporate information without creating an embarrassing situation that in turn could lead to reputational damage! Our extra section may give you a wrong impression this time. No, we’re not teaching you how to spy, this is not our bag. -
Counterintelligence in the Kingdom and the States
Counterintelligence in the Kingdom and the States A Historical Comparison of the FBI and MI5 Matthew Kalkavage Master’s Thesis Advisor: Professor Arthur Hulnick Submitted: April 14, 2014 Executive Summary The United States and the United Kingdom have different kinds of organizations to defend their national security from espionage and terrorist threats. The US relies on the Federal Bureau of Investigation (FBI), a law enforcement agency with counterintelligence functions, while the UK depends on the Security Service (MI5), a purely counterintelligence agency without law enforcement powers, to meet these challenges. The purpose of this paper is to examine the benefits, detriments, and the key motivations behind each system’s development for the sake of showing that MI5 has ultimately served the UK better than the FBI has served the US in the realm of counterintelligence. The historical trajectory of the Security Service is one of constant honing of counterintelligence work from its very inception. The history of the FBI reveals an organization that was initially established for law enforcement purposes and has never completely abandoned its preference for that mission amid US governmental pressure to become more intelligence- driven in times of international crisis (especially during World War I, World War II, and parts of the Cold War). The counterintelligence practices of the Service and the Bureau throughout their histories illustrate the deficiencies and proficiencies of each, which mutually contribute to the understanding of key counterintelligence qualities that are presented in the final chapter. These attributes are an overall penchant for secrecy, an external orientation, and a preventative operational culture. -
Summer 2018 Full Issue the .SU
Naval War College Review Volume 71 Article 1 Number 3 Summer 2018 2018 Summer 2018 Full Issue The .SU . Naval War College Follow this and additional works at: https://digital-commons.usnwc.edu/nwc-review Recommended Citation Naval War College, The .SU . (2018) "Summer 2018 Full Issue," Naval War College Review: Vol. 71 : No. 3 , Article 1. Available at: https://digital-commons.usnwc.edu/nwc-review/vol71/iss3/1 This Full Issue is brought to you for free and open access by the Journals at U.S. Naval War College Digital Commons. It has been accepted for inclusion in Naval War College Review by an authorized editor of U.S. Naval War College Digital Commons. For more information, please contact [email protected]. Naval War College: Summer 2018 Full Issue Summer 2018 Volume 71, Number 3 Summer 2018 Published by U.S. Naval War College Digital Commons, 2018 1 Naval War College Review, Vol. 71 [2018], No. 3, Art. 1 Cover The Navy’s unmanned X-47B flies near the aircraft carrier USS Theodore Roo- sevelt (CVN 71) in the Atlantic Ocean in August 2014. The aircraft completed a series of tests demonstrating its ability to operate safely and seamlessly with manned aircraft. In “Lifting the Fog of Targeting: ‘Autonomous Weapons’ and Human Control through the Lens of Military Targeting,” Merel A. C. Ekelhof addresses the current context of increas- ingly autonomous weapons, making the case that military targeting practices should be the core of any analysis that seeks a better understanding of the concept of meaningful human control. -
Fleet Admiral Ernest J. King, U.S. Navy Ernest J
Fleet Admiral Ernest J. King, U.S. Navy Ernest J. King was born on 23 November 1878 in Lorain, OH. He attended the U.S. Naval Academy from 1897 until 1901, graduating fourth in his class. During his senior year at the Academy, he attained the rank of Midshipman Lieutenant Commander, the highest midshipman ranking at that time. While still at the Academy, he served on the USS San Francisco during the Spanish–American War. While at the Naval Academy, King met Martha Rankin Egerton, whom he married in a ceremony at the Naval Academy Chapel on 10 October 1905. They had six daughters, Claire, Elizabeth, Florence, Martha, Eleanor and Mildred; and then a son, Ernest Jr. After graduation, he served as a junior officer on the survey ship USS Eagle, the battleships USS Illinois, USS Alabama, and USS New Hampshire, and the cruiser USS Cincinnati. King returned to shore duty at Annapolis in 1912. He received his first command, the destroyer USS Terry in 1914, participating in the U.S. occupation of Veracruz. He then moved on to a more modern ship, USS Cassin. World War I: During the war he served on the staff of Vice Admiral Henry T. Mayo, the Commander in Chief, Atlantic Fleet. As such, he was a frequent visitor to the Royal Navy and occasionally saw action as an observer on board British ships. He was awarded the Navy Cross "for distinguished service in the line of his profession as assistant chief of staff of the Atlantic Fleet." After the war, King, now a captain, became head of the Naval Postgraduate School.