20151019-Website TICOM and the INTELLIGENCE CORPS CIGY

Total Page:16

File Type:pdf, Size:1020Kb

20151019-Website TICOM and the INTELLIGENCE CORPS CIGY 1 TICOM and the Intelligence Corps DRAMATIS PERSONAE TICOM TEAM 1 PERSONNEL *Oeser, O. Wing Commander RAFVR. (Chief TRO) A Cambridge psychologist and friend of Winterbotham, he had joined Hut 3 in the summer of 1940. In 1941 he was Hut 3 Dep. Air Advisor. By June 1942 was Head of Hut 3(Air) and by late 1942 he was head of the newly formed Hut 3(L) where he made Enigma and Fish priority decisions. He became professor of psychology at the University of Melbourne. By the age of 27 he had graduated from four universities in three countries and had gained doctorates in two disciplines. *Campaigne, H. Lieutenant Commander USNR (Deputy Chief) As a young man with a PhD in mathematics he had sent the navy a homemade design for an encryption device which was rejected. He gained his commission in December 1941. He was eventually to become NSA research chief as head of REMP (Research, Engineering, Math & Physics). Barringer, H. Capt AUS. (US Army). Carter, T. Captain IC (Intelligence Corps) A Lieutenant though there was a Captain TM Carter at the time in the Corps working in ‘Special employment’ which usually referred to serving in MI5, MI6, MI8; there is no record of his working at B.P.. Cockerell, H. Lieutenant RNVR He served in the Naval Section of B.P. where he was department head of N.S.111J Administration and Manning. After TICOM, he and Pickering stayed on in Germany in search of various wanted persons Coolidge, J. Lieutenant (J.G) USNR Crowe, R. Major AUS. Donahue, O. Major AUS From Yale, Sent to B.P.. together with Gwynne Evans from Harvard and Howard Porter from Columbia he worked in Hut 3 Eldridge, J. Major AUS Together with Formantak (below) he accompanied Major Tester to Pfunds 40 miles SW Tester had single-mindedly been trying to track down the actual equipment after all his efforts to break it blind. Formantak, C. Capt. AUS Lawrance, I. Captain IC. Again, a Lieutenant although there was a Captain LW Lawrance at the time in the Corps working in ‘special employment’ there is no record of his serving at B.P.. He is not listed in Special Duties & the Intelligence Corps Levensen, A. 1st Lieutenant. AUS. A New Yorker and mathematician he had spent time on code problems before transferring to the UK and Bletchley Park As a cryptographer, He was in Block D(6) and Block F, & Hut 6 in the research sub- section. Later he was in both the Testery and Newmanry. Together with Whitaker, Norland and seven other cryptologic officers he had come to the UK in July 1943 on 1 2 the Aquitania, the first US codebreakers to be assigned to B.P. where he worked from July 1943 to Jan 1946. He was secretary of the B.P.. chess club. B.P..’s chess and bridge clubs must have been awesome, including as it did, at one time, the entire British bridge team and the leading chess player. Lively, J. First Lieutenant AUS. Maxwell, I. Pilot Officer. RAFVR. Pilot Officer Maxwell worked in Hut 6 at B.P. *McIntosh, A. Major IC Originally coming to B.P. from the Tank Corps, a linguistics expert whose speciality was Middle English, he held degrees from both Oxford and Harvard. He worked at B.P.. in the Newmanry & Testery 1941–1945 where he was involved in the design of the Dragon machine for testing cribs against enciphered messages. He was later to have a distinguished academic career in English language and linguistics. *Norland, S. 1st Lieutenant AUS. He was one of the earliest US recruits to B.P. Before entering the Army in 1942 he taught history and German in a local high school. He worked in Hut 3 with Whitaker as a translator Pickering; F. Lieutenant Colonel IC. There is no Lieutenant Colonel Pickering shown as working at B.P. nor in the Army List of that time in the Intelligence Corps. It is 100% certain that it was Dr Frederick Pickering who was at B.P.. 1941–46. He worked in Hut 3, Block D(3) and specialised in the analysis of the German Signal Intelligence organisation. Porter Howard. He came from Columbia University. A notable linguistics scholar, he worked in Hut 3. He returned to become professor of linguistics in the Department of Greek & Latin at Columbia University Rood, l. Lieutenant Colonel AUS. He was with the SLU* at the first Tactical Airforce and was critical of B.P. strategy post-D-Day in ‘Piercing the Fog Intelligence and Army Air Force Operations in WWII which he co-authored. He was very critical of *Winterbotham’s ‘Special Liaison Units’ *Rushworth, E. Major IC. Major Edward (Rush) Rushwort worked in Hut 3 and Hut 6 Fusion Room & SIXTA on the long-term analyses of enemy order of battle and operations *Sayres, G. Flight Lieutenant RAFVR. It is possible but unlikely that this is Pilot Officer P.N. Sayers who worked in Hut 3 seconded from Air Section. There is no one of the name Sayres recorded as being at B.P. *Stone, l. Capt AUS Capt (Lou) Stone represented the US Special Branch. By this time, US Military Intelligence was presenting a far more unified picture than previously with G-2 having won the fight to take over the Signal Security Agency from the Signal Corps *Tester, R. Major IC. Major Ralph Tester worked in Hut 5 and then the ‘Testery’ and was one of the very few heads of departments to have it named after him (the other was Newman and the Newmanry) He had joined the Military Research team in 1940, becoming head of Testery, breaking Fish codes by hand methods, the only method available until the arrival of Heath Robinson and Colossus 2 3 *Whitaker, P. 1st Lieutenant AUS. For two years he had been assigned to Hut 3. Before joining the army in 1942 he had studied and taught German in the USA, Germany and Austria. At 38 he was considerably older than his fellow junior officers. It is thanks to his diaries and photographs that we know so much detail about TICOM teams other than from the NSA report. * Original Team 1 personnel, the others were attached for varying periods. TICOM Team 2 personnel: Major Charles J. Donahue, AUS (chief TRO) See above Team 1 Capt Thomas M. Carter, IC (deputy chief) He worked at B.P. in the Military Section and then SIXTA. Lieutenant Hugh A. L. Cockerell, RNVR This is presumably the same person as served in Team 1 Capt Leslie W. Lawrence, IC Capt L.W. Lawrence is not recorded as having been employed at B.P. but he served in Special Employment. See above Team 1 Capt Henry C. Barringer, AUS Dr Barringer went on to serve with the US Foreign Service in Burundi, Colombia, Congo, Denmark, Germany and Greece. In 1970 he founded the US National Peace Academy and was the co-creator of the Center for Conflict Resolution Captain James K. Lively, AUS First Lieutenant Arthur J. Levenson, AUS See above Team 1 Pilot Officer Ian C.M. Maxwell, RAFVR He worked in Hut 6 Corporal J.W. Biggin, w/t operator Lance Corporal l. Tyler, w/t operator Corporal Ralph H. Brazel, driver T/5 Fredrick Muzer, driver TICOM Team 3 personnel: Lieutenant Colonel Paul E. Neff Major Paul E Neff had worked at B.P. 1943-44 in the Military Section specialising in Italian traffic Lieutenant Colonel Geoffrey H. Evans Almost certainly this was Major G.H. Evans of the Intelligence Corps who worked in Military Section B.P.. from1940. He was head of No 4 Intelligence School and then sub-section B. In Feb 1945 he was head of the German police sub-section. Post-war he went on to write the ‘History of Interception’. Major William P. Bundy 3 4 He trained as a lawyer at Harvard but left to join the Army Signal Corps, working at B.P.. During the 50’she worked as an analyst for the CIA and was chief of staff at the Office of National Estimates. Captain R.W. Adams Captain D. M. MacIntyre A US Army officer. He worked at B.P. in the Military Section and SIXTA Sergeant I. Loram Sergeant F.A. Marx Corporal Schnabel TICOM Team 4 personnel: Lieutenant Commander Howard Campaigne, USNR. Lieutenant Evelyn Talbot-Ponsonby, RNVR Served at B.P. 1940-45 in Hut 4 and Block B. In Naval Section IV(GO), Block B, Room 7 and Hut 4 (Naval Section(historical) Lieutenant Christopher Huntington, USNR He worked in B.P. Naval Section Corporal A.G. Abel. Royal Signals, SCU. 8. SCU units were MI6’s main radio conduits Captain M.A.G. Wingate, of the Intelligence Corps, later joined them. He worked in Hut 6, Block D(6) SIXTA and the Military Section whilst at B.P. until 1945 TICOM Team 6 personnel: Commander A.M.S. Mackenzie, RNVR, C.O. Lieutenant Commander served at B.P. from June 1940 to 1946 46, He worked in Hut 4 & Block B Naval Section NS VIII, Records and NS IV submarines and hydrography. Lieutenant John Nuelsen, USNR, X.O. He worked at B.P. in the naval section. Lieutenant Commander Leonard A. Griffiths Lieutenant Commander RNVR joined B.P. in the spring 1941 to 1946 and worked in Hut 4 and Block A. In late 1943 he was Head of NS VII (surface vessels & General Intelligence), by mid-1944 was Head of Naval Section Research. Post-war he joined the Foreign Office and continued to work at GCHQ Lieutenant Howard J.
Recommended publications
  • Georgetown University in Partial Fulfillment of the Requirements for the Degree of Master of Arts in Security Studies
    THE BATTLE FOR INTELLIGENCE: HOW A NEW UNDERSTANDING OF INTELLIGENCE ILLUMINATES VICTORY AND DEFEAT IN WORLD WAR II A Thesis submitted to the Faculty of the Graduate School of Arts and Sciences of Georgetown University in partial fulfillment of the requirements for the degree of Master of Arts in Security Studies By Edward J. Piotrowicz III, B.A. Washington, DC April 15, 2011 Copyright 2011 by Edward J. Piotrowicz III All Rights Reserved ii THE BATTLE FOR INTELLIGENCE: HOW A NEW UNDERSTANDING OF INTELLIGENCE ILLUMINATES VICTORY AND DEFEAT IN WORLD WAR II Edward J. Piotrowicz III, B.A. Thesis Advisor: Jennifer E. Sims, PhD. ABSTRACT Does intelligence make a difference in war? Two World War II battles provide testing grounds for answering this question. Allied intelligence predicted enemy attacks at both Midway and Crete with uncanny accuracy, but the first battle ended in an Allied victory, while the second finished with crushing defeat. A new theory of intelligence called “Decision Advantage,”a illuminates how the success of intelligence helped facilitate victory at Midway and how its dysfunction contributed to the defeat at Crete. This view stands in contrast to that of some military and intelligence scholars who argue that intelligence has little impact on battle. This paper uses the battles of Midway and Crete to test the power of Sims‟s theory of intelligence. By the theory‟s standards, intelligence in the case of victory outperformed intelligence in the case of defeat, suggesting these cases uphold the explanatory power of the theory. Further research, however, could enhance the theory‟s prescriptive power.
    [Show full text]
  • How I Learned to Stop Worrying and Love the Bombe: Machine Research and Development and Bletchley Park
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CURVE/open How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park Smith, C Author post-print (accepted) deposited by Coventry University’s Repository Original citation & hyperlink: Smith, C 2014, 'How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park' History of Science, vol 52, no. 2, pp. 200-222 https://dx.doi.org/10.1177/0073275314529861 DOI 10.1177/0073275314529861 ISSN 0073-2753 ESSN 1753-8564 Publisher: Sage Publications Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders. This document is the author’s post-print version, incorporating any revisions agreed during the peer-review process. Some differences between the published version and this version may remain and you are advised to consult the published version if you wish to cite from it. Mechanising the Information War – Machine Research and Development and Bletchley Park Christopher Smith Abstract The Bombe machine was a key device in the cryptanalysis of the ciphers created by the machine system widely employed by the Axis powers during the Second World War – Enigma.
    [Show full text]
  • The Paris Apartment Is a Work of Fiction
    READI NG GROUP GU I DE PhotosOfYou_TPTextFP Epilogue 2019-11-26 15:34:54 335 AUTHOR’S NOTE The Paris Apartment is a work of fiction. While a product of my imagination, the premises and characters I’ve chosen to create are inspired by real people and real events. The characters of Sophie Seymour and Estelle Allard were shaped by the experiences and courage of Virginia Hall, Pearl Witherington Cornioley, Christine Granville, Josephine Baker, Nancy Wake, and Andrée de Jongh. Their memoirs, interviews, and stories only give us an idea of how truly extraordinary each of these women was. Sophie’s work at Bletchley Park was based on the real men and women who worked tirelessly against time and almost im- possible odds to decode Nazi encryption devices. Most of us have heard of the Enigma cipher and the remarkable work by Alan Turing and his team to break that cipher. Told less often seems to be the story of Tommy Flowers and Bill Tutte, who, together with their teams, developed Colossus—the machine that was able to break the Lorenz cipher, known as Tunny at Bletchley. The Lorenz cipher was favoured by Hitler and used by High Command—and for good reason. It was a far more powerful than the Enigma and capable of exceedingly complex en- cryptions. Additionally, unlike the Enigma, it did not depend ParisApartment_TPtext1P Author’s Note 2020-10-01 21:13:57 395 396 AUTHOR’S NOTE on Morse code. Attached to a teleprinter, it automatically encrypted outgoing messages and decrypted incoming mes- sages, allowing longer messages to be transmitted with greater ease.
    [Show full text]
  • Stdin (Ditroff)
    Notes to accompany four Alan Turing videos 1. General The recent (mid-November 2014) release of The Imitation Game movie has caused the com- prehensive Alan Hodges biography of Turing to be reprinted in a new edition [1]. This biog- raphy was the basis of the screenplay for the movie. A more recent biography, by Jack Copeland [2], containing some new items of information, appeared in 2012. A more techni- cal work [3], also by Jack Copeland but with contributed chapters from other people, appeared in 2004. 2. The Princeton Years 1936–38. Alan Turing spent the years from 1936–38 at Princeton University studying mathematical logic with Prof. Alonzo Church. During that time Church persuaded Turing to extend the Turing Machine ideas in the 1936 paper and to write the results up as a Princeton PhD. You can now obtaing a copy of that thesis very easily [4] and this published volume contains extra chapters by Andrew Appel and Solomon Feferman, setting Turing’s work in context. (Andrew Appel is currently Chair of the Computer Science Dept. at Princeton) 3. Cryptography and Bletchley park There are many texts available on cryptography in general and Bletchley Park in particu- lar. A good introductory text for the entire subject is “The Code Book” by Simon Singh [5] 3.1. Turing’s Enigma Problem There are now a large number of books about the deciphering of Enigma codes, both in Hut 6 and Hut 8. A general overview is given by “Station X” by Michael Smith [6] while a more detailed treatment, with several useful appendices, can be found in the book by Hugh Sebag-Montefiore [7].
    [Show full text]
  • Battle Management Language: History, Employment and NATO Technical Activities
    Battle Management Language: History, Employment and NATO Technical Activities Mr. Kevin Galvin Quintec Mountbatten House, Basing View, Basingstoke Hampshire, RG21 4HJ UNITED KINGDOM [email protected] ABSTRACT This paper is one of a coordinated set prepared for a NATO Modelling and Simulation Group Lecture Series in Command and Control – Simulation Interoperability (C2SIM). This paper provides an introduction to the concept and historical use and employment of Battle Management Language as they have developed, and the technical activities that were started to achieve interoperability between digitised command and control and simulation systems. 1.0 INTRODUCTION This paper provides a background to the historical employment and implementation of Battle Management Languages (BML) and the challenges that face the military forces today as they deploy digitised C2 systems and have increasingly used simulation tools to both stimulate the training of commanders and their staffs at all echelons of command. The specific areas covered within this section include the following: • The current problem space. • Historical background to the development and employment of Battle Management Languages (BML) as technology evolved to communicate within military organisations. • The challenges that NATO and nations face in C2SIM interoperation. • Strategy and Policy Statements on interoperability between C2 and simulation systems. • NATO technical activities that have been instigated to examine C2Sim interoperation. 2.0 CURRENT PROBLEM SPACE “Linking sensors, decision makers and weapon systems so that information can be translated into synchronised and overwhelming military effect at optimum tempo” (Lt Gen Sir Robert Fulton, Deputy Chief of Defence Staff, 29th May 2002) Although General Fulton made that statement in 2002 at a time when the concept of network enabled operations was being formulated by the UK and within other nations, the requirement remains extant.
    [Show full text]
  • Polish Mathematicians Finding Patterns in Enigma Messages
    Fall 2006 Chris Christensen MAT/CSC 483 Machine Ciphers Polyalphabetic ciphers are good ways to destroy the usefulness of frequency analysis. Implementation can be a problem, however. The key to a polyalphabetic cipher specifies the order of the ciphers that will be used during encryption. Ideally there would be as many ciphers as there are letters in the plaintext message and the ordering of the ciphers would be random – an one-time pad. More commonly, some rotation among a small number of ciphers is prescribed. But, rotating among a small number of ciphers leads to a period, which a cryptanalyst can exploit. Rotating among a “large” number of ciphers might work, but that is hard to do by hand – there is a high probability of encryption errors. Maybe, a machine. During World War II, all the Allied and Axis countries used machine ciphers. The United States had SIGABA, Britain had TypeX, Japan had “Purple,” and Germany (and Italy) had Enigma. SIGABA http://en.wikipedia.org/wiki/SIGABA 1 A TypeX machine at Bletchley Park. 2 From the 1920s until the 1970s, cryptology was dominated by machine ciphers. What the machine ciphers typically did was provide a mechanical way to rotate among a large number of ciphers. The rotation was not random, but the large number of ciphers that were available could prevent depth from occurring within messages and (if the machines were used properly) among messages. We will examine Enigma, which was broken by Polish mathematicians in the 1930s and by the British during World War II. The Japanese Purple machine, which was used to transmit diplomatic messages, was broken by William Friedman’s cryptanalysts.
    [Show full text]
  • Idle Motion's That Is All You Need to Know Education Pack
    Idle Motion’s That is All You Need to Know Education Pack Idle Motion create highly visual theatre that places human stories at the heart of their work. Integrating creative and playful stagecraft with innovative video projection and beautiful physicality, their productions are humorous, evocative and sensitive pieces of theatre which leave a lasting impression on their audiences. From small beginnings, having met at school, they have grown rapidly as a company over the last six years, producing five shows that have toured extensively both nationally and internationally to critical acclaim. Collaborative relationships are at the centre of all that they do and they are proud to be an Associate Company of the New Diorama Theatre and the Oxford Playhouse. Idle Motion are a young company with big ideas and a huge passion for creating exciting, beautiful new work. That is All You Need to Know ‘That Is All You Need To Know’ is Idle Motion’s fifth show. We initially wanted to make a show based on the life of Alan Turing after we were told about him whilst researching chaos theory for our previous show ‘The Seagull Effect’. However once we started to research the incredible work he did during the Second World War at Bletchley Park and visited the site itself we soon realised that Bletchley Park was full of astounding stories and people. What stood out for us as most remarkable was that the thousands of people who worked there kept it all a secret throughout the war and for most of their lives. This was a story we wanted to tell.
    [Show full text]
  • The First Americans the 1941 US Codebreaking Mission to Bletchley Park
    United States Cryptologic History The First Americans The 1941 US Codebreaking Mission to Bletchley Park Special series | Volume 12 | 2016 Center for Cryptologic History David J. Sherman is Associate Director for Policy and Records at the National Security Agency. A graduate of Duke University, he holds a doctorate in Slavic Studies from Cornell University, where he taught for three years. He also is a graduate of the CAPSTONE General/Flag Officer Course at the National Defense University, the Intelligence Community Senior Leadership Program, and the Alexander S. Pushkin Institute of the Russian Language in Moscow. He has served as Associate Dean for Academic Programs at the National War College and while there taught courses on strategy, inter- national relations, and intelligence. Among his other government assignments include ones as NSA’s representative to the Office of the Secretary of Defense, as Director for Intelligence Programs at the National Security Council, and on the staff of the National Economic Council. This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other US government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: (Top) Navy Department building, with Washington Monument in center distance, 1918 or 1919; (bottom) Bletchley Park mansion, headquarters of UK codebreaking, 1939 UNITED STATES CRYPTOLOGIC HISTORY The First Americans The 1941 US Codebreaking Mission to Bletchley Park David Sherman National Security Agency Center for Cryptologic History 2016 Second Printing Contents Foreword ................................................................................
    [Show full text]
  • Making Speech-Matter: Recurring Mediations in Sound Poetics and Its Contemporary Practice
    ORBIT - Online Repository of Birkbeck Institutional Theses Enabling Open Access to Birkbecks Research Degree output Making Speech-Matter: Recurring Mediations in Sound Poetics and its Contemporary Practice http://bbktheses.da.ulcc.ac.uk/35/ Version: Full Version Citation: Pester, Holly (2013) Making Speech-Matter: Recurring Mediations in Sound Poetics and its Contemporary Practice. PhD thesis, Birkbeck, University of London. c 2013 The Author(s) All material available through ORBIT is protected by intellectual property law, including copyright law. Any use made of the contents should comply with the relevant law. Deposit guide Contact: email 1 Making Speech-Matter: Recurring Mediations in Sound Poetics and its Contemporary Practice Holly Pester Birkbeck, University of London PhD 2013 2 I, Holly Pester, confirm that the work presented in this thesis is my own. Where information has been derived from other sources, I confirm that this has been indicated in the thesis. ---------------------------------------------- 3 Abstract This thesis produces a critical and creative space for new forms of sound poetics. Through a reflective process combining theoretical research and poetic practice – performances, text-scores and installations – the thesis tests the contemporary terms of intermedial poetics and sound poetry, establishing a conceptual terminology for speech-matter. Beginning with a study of 1960s sound poet Henri Chopin and his relation to the tape machine, I argue that this technological mediation was based on a poetics of analogue sound hinged on bodily engagement. Social and physical properties of the tape machine contribute to a mode of practice that negotiates the body, machine, and effort. Exploring Michel Serres’s concept of parasitic noise and the relation of interference to lyric appeal, via the work of Denise Riley and Hannah Weiner, I understand sound poetics as a product of lyrically active noise.
    [Show full text]
  • Guide to Secure Communications with the One-Time Pad Cipher
    Cipher Machines & Cryptology Ed. 7.5 – Jun 11, 2018 © 2009 - 2018 D. Rijmenants http://users.telenet.be/d.rijmenants THE COMPLETE GUIDE TO SECURE COMMUNICATIONS WITH THE ONE TIME PAD CIPHER DIRK RIJMENANTS Abstract : This paper provides standard instructions on how to protect short text messages with one-time pad encryption. The encryption is performed with nothing more than a pencil and paper, but provides absolute message security. If properly applied, it is mathematically impossible for any eavesdropper to decrypt or break the message without the proper key. Keywords : cryptography, one-time pad, encryption, message security, conversion table, steganography, codebook, covert communications, Morse cut numbers. 1 Contents 1. Introduction………………………………. 2 2. The One-time Pad………………………. 3 3. Message Preparation…………………… 4 4. Encryption………………………………... 5 5. Decryption………………………………... 6 6. The Optional Codebook………………… 7 7. Security Rules and Advice……………… 8 8. Is One-time Pad Really Unbreakable…. 16 9. Legal Issues and Personal Security…... 18 10. Appendices………………………………. 19 1. Introduction One-time pad encryption is a basic yet solid method to protect short text messages. This paper explains how to use one-time pads, how to set up secure one-time pad communications and how to deal with its various security issues. Working with one-time pads is easy to learn. The system is transparent and you do not need a computer, special equipment or any knowledge about cryptographic techniques or mathematics. One-time pad encryption is an equation with two unknowns, which is mathematically unsolvable. The system therefore provides truly unbreakable encryption when properly used. It will never be possible to decipher one-time pad encrypted data without having the proper key, regardless any existing or future cryptanalytic attack or technology, infinite computational power or infinite time.
    [Show full text]
  • Revision Date : July 10/2017 Table of Contents
    Revision Date : July 10/2017 Table of Contents 1.1 INTRODUCTION ................................................................................................................... 3 1.2 MAIN W/T OFFICE EQUIPMENT - WWII ERA ................................................................. 4 1.3 MAIN WIRELESS OFFICE EQUIPMENT DESCRIPTIONS .............................................. 6 1.4 MAIN WIRELESS OFFICE - RADIO MANIFEST IN JANUARY 1944 ............................ 12 1.5 THE HEADACHE FUNCTION............................................................................................. 14 1.6 TRAINING RCN TELEGRAPHISTS ................................................................................... 15 1.7 PROJECT ACCUMULATOR ................................................................................................ 17 1.8 DUTIES OF A TELEGRAPHIST .......................................................................................... 19 1.9 HAIDA'S RADIO EQUIPMENT - Mid 1940's ...................................................................... 20 1.10 MAIN WIRELESS OFFICE - 1946 PHOTOS .................................................................... 28 1.11 RADIO 1 EQUIPMENT - 1950’s........................................................................................ 32 1.12 RADIO 1 EQUIPMENT MANIFEST - September 1955 ................................................... 34 1.13 RADIO 1 – 1957 ................................................................................................................... 39 1.14
    [Show full text]
  • National Security Agency (NSA) Document: a History of U.S
    Description of document: National Security Agency (NSA) document: A History of U.S. Communications Security Post World-War II – released under Mandatory Declassification Review (MDR) Released date: February 2011 Posted date: 07-November-2011 Source of document: National Security Agency Declassification Services (DJ5) Suite 6884, Bldg. SAB2 9800 Savage Road Ft. George G. Meade, MD, 20755-6884 Note: Although the titles are similar, this document should not be confused with the David G. Boak Lectures available: http://www.governmentattic.org/2docs/Hist_US_COMSEC_Boak_NSA_1973.pdf The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. -----------------------------------------------------------------------~~) '; I .:· ! _k:::._,.l COMitfll A HISTORY OF U.S.
    [Show full text]