Annotated Bibliography Images/Media

Total Page:16

File Type:pdf, Size:1020Kb

Annotated Bibliography Images/Media Annotated Bibliography Images/Media: Ann Caracristi. n.d. National Cryptologic Museum. ​ ​ ​ https://cryptologicfoundation.org/what-we-do/commemorate/in-memoriam-re gistry-honoree-pages/ann-caracristi.html. This image is a portrait of Cryptanalyst Veteran Ann Caracristi when she was being interviewed about her WWII code-breaking experiences. Associated Press. Intelligence Analysts Work to Decipher Coded Japanese ​ Messages at the Headquarters of the Army Cryptanalysis Service in Arlington, Va., in 1944. n.d. The Washington Post. ​ ​ ​ https://www.washingtonpost.com/outlook/the-brilliance-of-the-women-code- breakers-of-world-war-ii/2017/10/06/ec64ca8a-9e2c-11e7-9c8d-cf053ff30921_s tory.html. With this image, I was able to get a closer look at how the work of a Cryptanalyst was done, and what machinery they used to decode messages. Bedell-Burke, Margie. “Barracks Life of World War II WAVES.” Women of World War II, August 27, 2017. https://www.womenofwwii.com/navy/navy-waves/barracks-life-of-world-war-ii -waves/. This website is all about the WAVES time living in barracks while serving in WWII. I was able to retrieve an image here showing what the women did to have fun in their rare free time. Bill Nye: Science Guy. Accessed January 12, 2021. https://www.billnyefilm.com/. This website is all about Bill Nye and provides a portrait image of him in recent years. Bill Nye is the son of Jaqueline Jenkins Nye who was a WWII WAVE Cryptanalyst. The Flea Market Enigma Machine. n.d. Smithsonian Magazine. ​ ​ ​ https://www.smithsonianmag.com/smart-news/wwii-enigma-machine-found-f lea-market-sells-51000-180964053/. The enigma machine, as displayed in this image, was a crucial device that allowed the Code Girls to successfully track and decipher messages coming from their enemies. Gordon, Meryl. Ann Caracristi, Far Right, Oversaw an Army Code Breaking ​ Unit When She Was 23. 2017. The New York Times. ​ ​ https://www.nytimes.com/2017/11/06/books/review/liza-mundy-code-girls-wor ld-war-ii.html. Ann Caracristi was one of the head women cryptanalysts of WWII and often oversaw a group of women in Arlington Hall. Hatchette Books. "Code Girls" Helped Win WWII. n.d. Daily Press. ​ ​ ​ ​ https://www.dailypress.com/news/dp-nws-code-girls-nasa-20180214-story.ht ml. This image captures a group of “Code Girls” as shown on the cover of Liza Mundy’s Code Girls. ​ It'sTheirPointofView. ​ https://revolutionbuddies.weebly.com/woman-of-the-revolution.html. This image is a depiction of a woman sewing during the Revolutionary War proving that they had the role of staying at home and doing housework. “Jaqueline Nye.” geni_family_tree, August 15, 2019. https://www.geni.com/people/Jaqueline-Nye/6000000013372889246. This website gave me information about Jaqueline Jenkin Nye’s life as a cryptanalyst; before and after. I used the image of Nye from her WAVE times to display on my website. The Marginalization of Women in STEM. Accessed 2020. ​ https://www.cavsconnect.com/opinion/2014/09/11/the-marginalization-of-wo men-in-stem/. With this image of Rosie the Riveter holding tools with “Women in STEM” written above her, I was able to demonstrate that the women code breakers of WWII allowed a breakthrough of women in the STEM field. Mundy, Liza. The U.S. Navy Took Possession of Mount Vernon Seminary, a ​ Girls' School in Tony Upper Northwest Washington, D.C., Adding Hastily Erected Barracks to House Four Thousand Female Code Breakers. Courtesy of D.C. Department of Transportation. n.d. Liza Mundy. ​ ​ ​ https://www.lizamundy.com/code-girls/gallery-2/. With this image, I was able to see the women cryptanalysts walking towards their coding areas at Arlington Hall and how they were transferred between different sections of Washington, D.C. “209.” M. Accessed January 12, 2021. https://www.cryptomuseum.com/crypto/hagelin/m209/index.htm. This source from the Crypto Museum allowed me to get a glimpse of what the 1515 Crypto Machine was and how it was used in WWII. I used the image as a demonstration on my website. 1945: May 15: Surrender of German U-boat, U-805. Accessed January 12, 2021.https://www.history.navy.mil/content/history/museums/nmusn/explore/ photography/wwii/wwii-atlantic/battle-of-the-atlantic/surrender-german-uboat s/1945-may-15-u-805.html. This source was all about the German surrender on May 15, 1945 during WWII. The women Cryptanalysts intercepted and decoded codes from German U-Boats, as I have pictured in my website thanks to this source. National Cryptologic Museum, Lou Leto and Jen Wilcox. WWII Women ​ Cracking the Code. n.d. ​ https://airandspace.si.edu/stories/editorial/wwii-women-cracking-code. This image is a great representation of the Bombe Machine being used by women cryptanalysts. National US Intelligence Seal. n.d. Office of the Director of National ​ ​ Intelligence. https://www.dni.gov/. ​ The U.S. National Intelligence was the branch of the Navy and Army that recruited the women cryptanalysts and I used their seal to represent the officiality of this crucial U.S. branch. Notable Women of the Suffrage Movement. The Frick Pittsburgh. Accessed ​ ​ ​ 2020. https://www.thefrickpittsburgh.org/Story-Notable-Women-of-the-Suffrage-Mo vement-Alice-Paul. The Frick Pittsburgh provided me with an image of women Suffragettes protesting in front of the White House to get their need of suffrage and representation in the government. The Suffragettes set an important precedent for the women of WWII who proved that they are strong and capable of handling a man's job. “NSG WAVES During WWII 2 of 3.” Station HYPO, September 4, 2016. https://stationhypo.com/2016/07/20/nsg-waves-during-wwii-2-of-3/. Through this website, I got a glimpse of the WWII Code Girls. I used the group image of the WAVES to display on my website. PearlHarbor.n.d.History. https://www.history.com/topics/world-war-ii/pearl-harbor. This image portrays the surprise Japanese attack on Pearl Harbor, Hawaii catalyzing the U.S. fight with Japan during WWII. After Pearl Harbor, the American nation realized they needed a heftier intelligence unit to collect enemy codes before they attack. Preserve Johns Creek Happy Independence Day, America. Preserve Johns ​ ​ Creek.Accessed2020. ​ https://www.preservejohnscreek.com/pjc-news/happy-4th-of-july-2020. With this image, I was able to develop the argument that women were not involved in national representation of the U.S., and the work of women in WWII allowed the ability of women to be shown, proving they can be a huge impact on the nation. President Franklin D. Roosevelt Approved Legislation Establishing the Women’s Army Auxiliary Corps. Politico. Accessed 2020. ​ ​ https://www.politico.com/story/2009/05/fdr-signs-waac-act-may-14-1942-0224 78. This is an image of Franklin D. Roosevelt during the time of WWII. I was able to use his image to demonstrate that as the president of the U.S. he signed bills of legislation creating the WAVES and WAACS programs. Truman Library Institute. Picturing History-Japan Surrenders. n.d. Truman ​ ​ ​ LibraryInstitute. ​ https://www.trumanlibraryinstitute.org/picturing-history-japan-surrenders/. This image displays the excitement and celebration of American V-Day on August 14, 1945 when Japan surrendered to the U.S. Vianello, Laura. Joan Clarke, the Cryptanalyst War-Heroine, and the Women ​ of Bletchley Park (You Never Heard of). n.d. Laura Vianello. ​ ​ ​ https://medium.com/@LauraVianello/joan-clarke-the-cryptanalyst-war-heroin e-and-the-women-of-bletchley-park-you-never-heard-of-2dec97ed6752. Joan Clarke was an American woman cryptanalyst during WWII and was a major contributor to the war. Here, she is pictured with other women using the Bombe machine to decode messages. VirginiaDareAderholt.n.d.WikiMedia. ​ ​ ​ https://en.wikipedia.org/wiki/Virginia_Dare_Aderholdt. This image was a great portrait of Virginia Dare Aderholt who was the women cryptanalyst that broke the last Japanese code to claim victory for the U.S. WAACS. Women's Auxiliary Corps. Accessed 2020. ​ ​ ​ https://womensauxiliaryarmycorps.files.wordpress.com/2012/09/imagescap8 ar80.jpg. This image is another representation of a WAAC poster displayed in the U.S. during WWII to promote the enrollment of women in the U.S. Army branch. Women in Classroom, Arlington Hall Station. n.d. Arlington Public Library. ​ ​ ​ https://library.arlingtonva.us/2017/10/24/code-girls-and-arlington-hall-a-diver se-history/. This image demonstrates what the code training was like inside of the Arlington Hall classrooms and highlights the complexity and length of the training courses. Women in the Army. A World War II Recruiting Poster for the Women's Army ​ Corp (WAC). Women in the Army. Accessed 2020. ​ ​ https://www.army.mil/women/history/wac.html. This is an image of a WAAC poster used to advertise the recruitment of women during WWII. “The Women of Collington – A National Treasure.” Secrets of a Signal Intelligence WAC, March 21, 2014. https://secretsofasigintwac.wordpress.com/2014/03/20/women-of-collington- a-national-treasure/. This is an article about WAACS and WAVES during WWII where I was able ot get an image of Susan Embree. The Women of World War I. n.d. The Week. ​ ​ ​ https://theweek.com/captured/690302/women-world-war. With these images, I was able to discover what some jobs of women were during WWI which developed into an expansion of opportunities for women. Primary Sources: Video: Ann Ellicott Madeira collection: Veterans History Project (Library of Congress.AccessedSeptember30,2020. https://memory.loc.gov/diglib/vhp/story/loc.natlib.afc2001001.07563/?loclr=bl ogflt. In this interview, Madeira is recalling the type of codes she had to break and when she did break them.
Recommended publications
  • Female Code Breakers
    Association for Diplomatic Studies and Training (ADST) ADST ORAL HISTORY LESSON PLAN: Female Code Breaker Betty Allan Middle School Grades 6‐8 High School Grades 9-12 Big Idea: Oral history is a tool for learning about people, places, and events. Diplomats have a front- seat perspective on many international historical events. Topics x Diplomatic Oral Histories x U.S. Foreign Policy th x 20 Century U.S. and World History Description: Students explore how historians use primary source oral histories to understand events, people, and places from the past. They will read the oral history of Betty Allan, a female code-breaker from WWII from the Association of Diplomatic Studies and Training (ADST) diplomatic oral history collection, and conduct a critical analysis of the interview in order to better understand her experiences described. Students are encouraged to make connections between the experiences described in the oral history and their own lives. [Teachers: Please note that this sample unit is for the Female Code Breakers during WWII but this lesson and format can be used with any historical events on our site, adst.org, by searching the event in Fascinating Figures or our Country Reader Series by country.] Objectives: Students will: − Understand oral history as a primary source as a way of gathering detailed information that helps us understand a specific time, place, person, or event. − Connect past and present experiences. − Understand that perspectives of events change over time. − Understand that all of us have important stories to tell and perspectives to share. Skills: − Identify, analyze, and interpret primary sources to make generalizations about events and life in world history − Evaluate the authenticity, authority, and credibility of sources − Develop perspectives of time and place Standards This unit is aligned with the following Virginia Department of Education History and Social Science Standards of Learning: x World History and Geography: 1500 A.D.
    [Show full text]
  • The Untold Story of the American Women Code Breakers of World War II by Liza Mundy
    2018-046 1 June 2018 Code Girls: The Untold Story of the American Women Code Breakers of World War II by Liza Mundy . New York: Hachette, 2017. Pp. xiv, 416. ISBN 978–0–316–35253–6. Review by Chris Christensen, Northern Kentucky University ([email protected]). In September 1941, as war with Japan was on the horizon and the United States was becoming more involved in the war in Europe, Admiral Leigh Noyes, Director of Naval Communications, wrote to Ada Comstock, president of Radcliffe College, 1 that the Navy was looking for female codebreakers. For over a year, the Navy had been quietly recruiting male intelligence officers from leading colleges and now was embarking on the same experiment with women. Noyes confided that the Navy wanted bright, closed-mouth native students …. Evidence of a flair for languages or for mathematics could be advantageous … [while] any intense sociological quirks would, of course, be undesirable…. In the event of total war, women will be needed for this work, and they can probably do it better than men. (12–13) Thus began the Navy’s recruitment of women into a secret proctored correspondence course in elementary cryptanalysis. By late spring 1942, the first wave of women had completed the course and reported for duty in Washington, DC. The US Army soon followed the Navy in recruiting college women. During World War II, the two services employed some twenty thousand codebreakers; about eleven thousand of whom were women (30). The contributions of these individuals have, till now, gone mostly unrecog- nized. 2 In Code Girls , author Liza Mundy 3 highlights the work and personal stories of many of these women.
    [Show full text]
  • Collegiate Codebreakers: Winthrop, Women, and War
    Winthrop University Digital Commons @ Winthrop University Graduate Theses The Graduate School Spring 5-2020 Collegiate Codebreakers: Winthrop, Women, and War Marlana Mayton Follow this and additional works at: https://digitalcommons.winthrop.edu/graduatetheses Part of the Military History Commons, United States History Commons, and the Women's History Commons May, 2020 To the Dean of the Graduate School: We are submitting a thesis written by Marlana Mayton entitled Collegiate Codebreakers: Winthrop, Women, and War. We recommend acceptance in partial fulfillment of the requirements for the degree of Master of Arts in History. _____________________________ Dr. Eddie Lee, Thesis Advisor _____________________________ Dr. Virginia Williams, Committee Member _____________________________ Dr. Catherine Chang, Committee Member _____________________________ Dr. Takita Sumter, Dean, College of Arts and Sciences _____________________________ Dr. Jack E. DeRochi, Dean, Graduate School COLLEGIATE CODEBREAKERS: WINTHROP, WOMEN, AND WAR A Thesis Presented to the Faculty Of the College of Arts and Sciences In Partial Fulfillment Of the Requirements for the Degree Of Master of Arts In History Winthrop University May, 2020 By Marlana Mayton Abstract During World War II, college-aged women from across the nation filled United States Army and Navy secretive cryptanalysis facilities to help win the war. For many women, colleges facilitated involvement in codebreaking. Through information gathered in oral histories, this thesis primarily explores war related programs at American colleges and the young women that became cryptanalysts. Academic institutions, like Winthrop College, became the nuclei for colligate codebreakers. They acted as early crypt education centers, through the offering of cryptology classes, functioned as recruitment centers, and operated as essential training hubs.
    [Show full text]
  • Project VENONA: Breaking the Unbreakable Code
    Georgia Southern University Digital Commons@Georgia Southern University Honors Program Theses 2020 Project VENONA: Breaking the Unbreakable Code Cassandra Hankin Georgia Southern University Follow this and additional works at: https://digitalcommons.georgiasouthern.edu/honors-theses Part of the History Commons Recommended Citation Hankin, Cassandra, "Project VENONA: Breaking the Unbreakable Code" (2020). University Honors Program Theses. 471. https://digitalcommons.georgiasouthern.edu/honors-theses/471 This thesis (open access) is brought to you for free and open access by Digital Commons@Georgia Southern. It has been accepted for inclusion in University Honors Program Theses by an authorized administrator of Digital Commons@Georgia Southern. For more information, please contact [email protected]. Project VENONA: Breaking the Unbreakable Code An Honors Thesis submitted in partial fulfillment of the requirements for Honors in History. By Cassandra Hankin Under the mentorship of Dr. Bill Allison ABSTRACT Project VENONA was a top-secret counterintelligence program initiated by the United States Army Signals Intelligence Service during World War II. VENONA was established to decipher intercepted Soviet communications and break the “unbreakable” Soviet code system. Examining Project VENONA and its discoveries is vital to understanding the history of the early Cold War. Thesis Mentor:________________________ Dr. Bill Allison Honors Director:_______________________ Dr. Steven Engel April 2020 Department of History University Honors Program Georgia Southern University 2 Acknowledgements There are many people I’d like to thank for helping me during the year and a half I worked on this project. For helping me through the research and writing process, I would like to thank Dr. Bill Allison, who never gave up on me or my project.
    [Show full text]
  • ADST ORAL HISTORY LESSON PLAN: Female Code Breaker Betty Allan Middle School Grades 6‐8 High School Grades 9-12
    Association for Diplomatic Studies and Training (ADST) ©2018 ADST ORAL HISTORY LESSON PLAN: Female Code Breaker Betty Allan Middle School Grades 6‐8 High School Grades 9-12 Big Idea: Oral history is a tool for learning about people, places, and events. Diplomats have a front- seat perspective on many international historical events. Topics Diplomatic Oral Histories U.S. Foreign Policy th 20 Century U.S. and World History Description: Students explore how historians use primary source oral histories to understand events, people, and places from the past. They will read the oral history of Betty Allan, a female code-breaker from WWII from the Association of Diplomatic Studies and Training (ADST) diplomatic oral history collection, and conduct a critical analysis of the interview in order to better understand her experiences described. Students are encouraged to make connections between the experiences described in the oral history and their own lives. [Teachers: Please note that this sample unit is for the Female Code Breakers during WWII but this lesson and format can be used with any historical events on our site, adst.org, by searching the event in Fascinating Figures or our Country Reader Series by country.] Objectives: Students will: − Understand oral history as a primary source as a way of gathering detailed information that helps us understand a specific time, place, person, or event. − Connect past and present experiences. − Understand that perspectives of events change over time. − Understand that all of us have important stories to tell and perspectives to share. Skills: − Identify, analyze, and interpret primary sources to make generalizations about events and life in world history − Evaluate the authenticity, authority, and credibility of sources − Develop perspectives of time and place Standards This unit is aligned with the following Virginia Department of Education History and Social Science Standards of Learning: World History and Geography: 1500 A.D.
    [Show full text]
  • Code Girls: the Untold Story of the American Women Codebreakers of World War II Liza Mundy (Hachette, 2017), 416 Pp., Notes, Bibliography, Index
    Intelligence in Public Media Code Girls: The Untold Story of the American Women Codebreakers of World War II Liza Mundy (Hachette, 2017), 416 pp., notes, bibliography, index. Reviewed by David A. Foy When Japanese bombs and torpedoes targeted the Of the first 197 women who received letters from planes and ships of the US Navy’s Pacific Fleet anchored the Navy, 74 ultimately made their way to Washington, at Pearl Harbor on Sunday morning, 7 December 1941, hired as SP-4 “Assistant Cryptanalytic Aides,” and paid the critical value of codebreaking was already common the munificent sum of $1,620 per year. The first of these knowledge in select circles. With the US entry into the débutante decoders arrived in bustling Washington, DC war, a problem soon arose: the men (primarily) who had in the late spring of 1942, only a few months into the done that critical task put on uniforms and headed to war. Housing was extremely tight, and the women had to theaters of war around the globe. Who would step into move often—sharing bedrooms and bathrooms was de the breach and ensure that the vital job of codebreaking rigeur, and even sharing beds was not uncommon. Both would continue? As author Liza Mundy’s Code Girls the services and the women discovered, however, that ably demonstrates, the answer was, “America’s women, the professions to which the latter were often relegated naturally!” It would prove to be women who would help in 1941 America would prove ideal for codebreaking, rescue a nation “emerging from two decades of disarma- especially that of schoolteaching.
    [Show full text]
  • Women Spies and Code Breakers Spring 2020
    OLLI Presents Women Spies and Code Breakers Spring 2020 Alan Rubin [email protected] Women Spies and Code Breakers 1840: Augusta Ada King WWI: Elizbeth Smith Freedman Code Breaker WWII: Bletchley Park Code Breakers WWII: Agnes Meyer Driscoll Code Breaker WWII: Virginia Hall Spy WWII: Madame Fourcade Spy WWII: Odette Sansom Spy Post Cold War: Amaryllis Fox: CIA Agent Women’s Role In Espionage Women need men to direct them! Who says so? MEN! Myth or Fact? Why do women make better spies? Why are the best code breakers women? We will explore these questions! Common Traits: Women in this Course • Fantastic instincts. • Excellent organizers. • Resourceful. • Men accepted their leadership. • Modest and avoided spotlight. • Knew chance of survival was about 25%. • Most had children. • Not interested in fame or recognition. Double Cross—WWII Spies Ben Macintyre and Babs Lily Sergeyov Augusta Ada King • December 10 1815-November 27, 1852: Born in London. • Daughter of Lord Byron and mathematician Anne Isabella Milbanke. • Learned mathematics, astronomy, literature and music at an early age. • Influenced by English scientist Charles Babbage early on. • Developed a mechanical analytical machine. • Could calculate algebraic functions and store numbers. • Calculated Bernoulli numbers. • First programmer in history. • Late 1970’s—Department of Defense developed first software language—called it ADA. • First to see expanded uses for computers. • A computer visionary. What does this mean? https://www.youtube.com/watch?v=-yFZGF8FHSg Charles Babbage Babbage Differential Machine Code Machines Code Machines https://www.youtube.com/watch?v=j2jRs4EAvWM Elizbeth Smith Friedman • Elizbeth was born August 26, 1892 small town of Huntington, Indiana.
    [Show full text]
  • THURSDAY 19 OCTOBER 2017 Events at the Kossiakoff Center, Laurel, Maryland
    PRELIMINARY PROGRAM (SUBJECT TO CHANGE) THURSDAY 19 OCTOBER 2017 Events at the Kossiakoff Center, Laurel, Maryland SESSION 1 0830 - 0915 PLENARY AUDITORIUM Welcome and Keynote. Deputy Director, NSA (invited) SESSION 2 0945 - 1115 SESSION 2A AUDITORIUM Inside Cyber Conflict: A View from the Archives Moderator: Michael Warner Craig Wiener Penetrate, Exploit, Disrupt, Destroy: The Rise of Computer Network Operations as a Major Military Innovation Richard Andres Information Operations in Operation Iraq Freedom: Implications for Future Cyber Conflict Dave Sherman Intelligence or Security? The Two Faces of William Friedman’s “Cryptologic Coin” SESSION 2B CLASSROOM A Literary and Imagined: Pre-20th Century Cryptology Moderator: Greg Nedved Katherine Ellison Cryptography and the Early Modern Literacy Counterrevolution Richard SantaColoma Is the Voynich Manuscript a Modern Forgery? (And why it matters) Benedek Lang The Codex of Rohonc: Unfounded and Well-Grounded Attempts at Breaking the Code SESSION 2C CLASSROOM B Cryptology During the Cold War Moderator: Rick Ledgett Michael Bigelow From ASA to INSCOM: Marking 40 Years of Army SIGINT John Fox Robert Lamphere, the FBI’s Cryptologic Pioneer Ivo Juurvee David Against Goliath: Estonian SIGINT and ECM against the Soviet Army During the August 1991 Coup d’Etat Attempt Chris Christensen The Evolving Relationship between Mathematics and Cryptology: 1951-1952, SCAG and the Beginnings of SCAMP and NSASAB SESSION 2D CLASSROOM C Britain: Friend or Foe? Moderator: TBD Jamie Bisher A British-Japanese Cabal Against the US? US Intelligence Suspicions in 1920-1922 David Kohnen Special Intelligence: Anglo-American Strategic Collaboration in Naval Operations in Peace and War, 1917-1945 LUNCH 1115 – 1215 SPEAKER 1145 - 1205 Anthony M.
    [Show full text]
  • USS Midway Museum Library Online Catalog 07/02/2021
    USS Midway Museum Library Online Catalog 07/02/2021 Author Title Pub Date Object Name Stevenson, James P. $5 Billion Misunderstanding, The : The Collapse of the Navy's A-12 Stealth Bomber 2001 Book Program Ross, Donald K. 0755 : The Heroes of Pearl Harbor 1988 Paperback Winkowski, Fredric 100 Planes, 100 Years : The First Century of Aviation 1998 Book Shores, Christopher 100 Years of British Naval Aviation 2009 Book Sweetman, Bill 100 Years of Flight 2002 Book Myers, Donald E. 101 Sea Stories : Those Tales Marines, Sailors and Others Love to Tell 2005 Paperback Bishop, Chris (ed) 1400 Days : The Civil War Day by Day 1990 Book Daughan, George C. 1812 : The Navy's War 2011 Book Werstein, Irving 1914-1918 : World War I Told with Pictures 1964 Paperback Hydrographic Office, Secretary of Navy 1931 International Code of Signals (American Edition), Vol. I - Visual 1952 Book Hydrographic Office, Secretary of Navy 1931 International Code of Signals (American Edition), Vol. II - Radio 1952 Book United States Naval Academy 1937 : The Sixty-Three Year Fix 2000 Paperback Kershaw, Andrew (ed) 1939-1945 War Planes 1973 Paperback Groom, Winston 1942 : The Year That Tried Men's Souls 2005 Book Naval Air Systems Command 2.75 Inch Airborne Rocket Launchers 1996 Manual Naval Air Systems Command 20-MM Aircraft Gun MK12 Mod 4 1980 Manual Naval Air Systems Command 20-MM Barrel Erosion Gage Kit M10(T23) 1976 Manual Merry, John A. 200 Best Aviation Web Sites 1998 Book Robinson, C. Snelling (Charles Snelling) 200,000 Miles Aboard the Destroyer Cotten 2000 Book Powell, Dick 20th Century Fox Studio Classics : 75 years, Disc 1 : On the Avenue 2006 DVD Grable, Betty 20th Century Fox Studio Classics : 75 years, Disc 2 : Pin Up Girl 2005 DVD Miranda, Carmen 20th Century Fox Studio Classics : 75 years, Disc 3 : Something for the Boys 2008 DVD Cooper, Gary 20th Century Fox Studio Classics : 75 years, Disc 4 : You're in the Navy Now 2006 DVD Murdock.
    [Show full text]