Mercury of the Waves: Modern Cryptology and U.S

Total Page:16

File Type:pdf, Size:1020Kb

Mercury of the Waves: Modern Cryptology and U.S Mercury of the Waves: Modern Cryptology and U.S. Literature by Henry Veggian B.A. in English, Montclair State University, 1994 M.A. in English, Montclair State University, 1996 Submitted to the Graduate Faculty of Department of English in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Pittsburgh 2005 UNIVERSITY OF PITTSBURGH FACULTY OF ARTS AND SCIENCES This dissertation was presented By Henry Veggian It was defended on 12.1.2005 and approved by Eric O. Clarke Marcia Landy Jonathan Arac Dissertation Advisor: Paul A. Bove` ii Copyright © by Henry Veggian 2005 iii Mercury of the Waves: Modern Cryptology and U.S. Literature Henry Veggian, PhD University of Pittsburgh, 2005 The doctoral dissertation examines United States literary and institutional history during the period 1900-1973. The study demonstrates how cryptology was detached from its philological residence over three phases (the amateur, institutional, and professional). In the amateur phase, which was regionally specific to the Midwest, the science was characterized by social reformist debate. In the second, institutional phase, the amateur version of cryptology was institutionalized by the United States federal government following WWI to imitate a specific institutional model (that of the French Bureau du Chiffre). During the third, professional phase, the prior two were enhanced during the interwar period by linguists, mechanical engineers, literary modernists, and cryptologists. Running parallel to this narrative is a modern American literary genealogy that, beginning with Henry Adams and extending through Thomas Pynchon, engaged cryptology during that same era. The dissertation locates their discourse within Vichian humanism, and in doing so it first explains how modern literature (and the American novel in particular), its practices, and institutions contributed discursive rhetoric, hermeneutical methods, and institutional models to the emergent 20th century U.S. security state; secondly, it argues that a particular genealogical style that spans the writings of Henry Adams, T.S. Eliot, William Faulkner, Raymond Chandler, and Thomas Pynchon elaborated an diverse rhetorical discourse by which to respond to that assemblage of new institutional entities, and without which that assemblage would be incoherent. iv TABLE OF CONTENTS PREFACE....................................................................................................................................VI 1. HENRY ADAMS AND THE INSTITUTIONS OF AGGREGATE INTELLIGENCE.......................................................................................................................... 1 2. THE DOUBLE SCIENCE ................................................................................................ 65 3. THE SLAYER OF ARGUS: FIGURES OF A NEW INTELLIGENCE AND THOMAS PYNCHON’S “ENTROPY”............................................................................... 141 4. ALLEGORIES OF THE INANIMATE: PYNCHON’S V........................................... 194 5. THE HERMETIC DIVIDE............................................................................................. 260 6. THE HERMETIC TURN: FAULKNER, PYNCHON AND THE PULPS ................ 358 7. A VOCABULARY OF CURVES: GRAVITY’S RAINBOW...................................... 437 APPENDIX A ........................................................................................................................... 494 BIBLIOGRAPHY..................................................................................................................... 504 v PREFACE Run for we are discovered. I am forced to write this.1 I. The following study follows two divergent and occasionally convergent lines of a single discourse. Francis Bacon characterized the lines as a dual mission for the science of grammar in The Advancement of Learning (1605). The first outlined a study of the “popular” languages and literatures which congealed during the 19th century into scientific disciplines such as anthropology, archeology, and philology. Each of these sustained schools or methods dedicated to the study of “popular” languages and literatures; each was later institutionalized by the modern nations, thus assuring a continuation and longevity that reached beyond the individual scientists or schools and guaranteed that “popular” languages and literatures would reinforce national ambition with epistemological valence, among other things. The second mission of Bacon’s proposal differed from the first insofar as it was to be a speculative mission, a science that would be “philosophical, examining the power and nature of words, as they are the footsteps and prints of reason.” (The Advancement of Learning 138). The Elizabethan philosopher deemed the philosophical branch neglected and worthy of further development. The second branch, while less easily integrated into the modern national institutions, also assumed more distinct forms during the 19th 1 Elizabeth Wells Gallup “The Mercury Example.” Note dated July 23, 1919 (The Bacon Cipher Collection, New York Public Library). vi century (the most persistent being the Anglophone and Germanic schools of modern logic). The two missions proposed by Bacon were not necessarily segregated. Baconian empiricism unleashed a tremendous challenge to modern thought: could the “popular,” anthropological branch, and the speculative, logical branch be combined in a single science? Anglophone intellectuals developed what is perhaps the most influential response to this question over the following centuries. Marcel Danesi has noted that beginning with Hobbes, modern British and American thinkers “believed that thinking was essentially a mechanical process and that, in principle, machines could be built that were capable of thought” (47). Following Cartesian principles, a school of Anglophone thought that included Boole, Russell, Whitehead, and Turing theoretically separated the mind’s operations from the human body. This mechanistic tradition, with its abstract model of the human mind, extended through the American Information theorist Claude Shannon, whose work demonstrated that “the brain could finally be studied as an information-processing device” (47), thus returning the mechanistic model to its corporeal habitus (yet with significant alterations). There is another less familiar tradition (particularly to Anglophone readers) that elaborated the popular and speculative branches proposed by Bacon with The Advancement of Learning. This tradition begins with the Neapolitan philosopher Giambattista Vico who studied Bacon (or Lord Verulam, as Vico referred to him) and proposed that human history, rather than an abstract study of the rational mind, was the only possible field that could unite the two missions into a coherent entity. Vico loosely followed the four types of history proposed in Book Two of The Advancement of Learning, those being “Natural, Civil, Ecclesiastical, and Literary,” with an eye, however, towards considering “Literary History” in the greatest detail. Beginning with the first edition of La Scienza Nuova (1725), Vico argued that the vii “theological poets” of antiquity had founded the civilized nations (19). Over the two successive editions of La Scienza Nuova, the study of the ancient customs and the origins of institutions would depend increasingly upon the study of the origins and development of words and languages. Where Bacon had perceived “poesy” as a historical ornament, Vico had raised etymology, rhetoric, and grammar, to a privileged position: the “popular” languages and literatures of the ancient world, studied in the speculative manner, opened the door to a new endeavor: the human science of history. Vico deployed the speculative component of Bacon’s system in a historical register against one of the most important philosophers of the previously cited mechanistic tradition, Rene` Descartes.2 Vico posed the historical science in direct opposition to the Cartesian philosophy of “mind,” a theory which Vico objected to because it failed to explain the processes by which human individuals and their institutions developed (Vico was, after all, also a professor of Roman law). Without certain customs, rituals, and laws, Vico noted, human minds would not develop towards civilization and history. The conduit of that motion was the metaphorical potential of the language that expressed it, and which in turn formed dynamic patterns of institutional, cultural, and legal development. These were, as Edward W. Said noted in an eloquent essay on Vico, inseparable from the human body.3 In the words of Marcel Danesi: Vico’s approach to the study of mind has always stood in diametrical opposition to the mechanical view. For Vico, the study of rational thought was not a point of departure; it was its point of arrival. Modern computational theories of mind would be seen to be products of the metaphorical imagination. (47) Vico’s argument that metaphor was the source of human thought and history effectively amplified Bacon’s empirical philosophy of grammar in a historical key. 2 For the most explicit critique of Descartes, see Vico’s On the Study Methods of Our Time. 3 See “Vico on the Discipline of Bodies and Texts.” Reflections on Exile and Other Essays. 83-93. viii Metaphor was the key to a scientific understanding of complex linguistic processes such as the relationship between words and things, which in turn suggested the origins of other creative historical processes. Vico afforded
Recommended publications
  • Center for Cryptologic History Publications Lili33-P.L
    I) 1 > 1 -F.L. gt-?P D@@Z& 3021101 REF ID:. Center for Cryptologic History Brochures Use this form to order a copy of any of these publications. [All brochures are unclassified] Solving the Enigma: History of the Cryptanalytic Bombe Traces the history of the development of the cryptanalytic Bombe during WWII. It discusses the history of the Bombe from the time the Poles solved the Enigma, through the British involvement in developing the machine, the Navy contract with National Cash Register Corp. to build an American version, and, finally, the Allied successes against German U-boats in the North Atlantic. The Start of the Digital Revolution: SIGSALY - Secure Digital Voice Communications in World War I1 A brief overview of the revolutionary effort to provide secure voice communications for high-level government officials. Army Security Agency Aerial Reconnaissance: Mission and Sacrifice. Describes the use of Army aircraft for DIF and ELlNT collection, primarily during the Vietnam War. Sharing the Burden: Women in Cryptology during World War 11. A brief look at the contributions and sacrifices made by women as civilian and military cryptologists during WWII. American Cryptology: Two Centuries of Tradition A synopsis of the role of cryptology in the American Revolution, Civil War, interwar period, and World Wars, and concluding with the establishment of the National Security Agency. The Cipher Disk ppproved for Release by NSA on 08-1 7-2006, FOlA Case # - - d.2848 -- -- - - -- - - -- - - -- - - Invented in Italy sometime before 1470, the cipher disk represented a breakthrough in ease of encipherment and decipherment. This basic invention survived to be used until several years after the First World War.
    [Show full text]
  • 1925-1926 Baconiana No 68-71.Pdf
    m ■ lilSl « / , . t ! i■ i J l Vol. XVIII. Third Series. Comprising March & Dec. 1925, April & Dec., 1926. BACONIAN A -A ^Periodical ^ttagazine 1 5 [ T ) ) l l 7 LONDON: > GAY & HANCOCK, Limited, \ 12 AND 13, HENRIETTA ST., STRAND, W .C. I927 ‘ ’ Therefore we shall make our judgment upon the things themselves as they give light one to another and, as we can, dig Truth out of the mine.”—Francis Bacon r '■ CONTENTS. MARCH, 1925. page. The 364th Anniversary Dinner 1 Who was Shakespeare ? 10 The Eternal Controversy about Shakespeare 15 Shakespeare’s ‘ 'Augmentations’'. 18 An Historical Sketch of Canonbury Tower. 26 Shakespeare—Bacon’s Happy Youthful Life 37 ' 'Notions are the Soul of Words’' 43 Cambridge University and Shakespeare 52 Reports of Meetings 55 Sir Thomas More Again .. 60 George Gascoigne 04 Book Notes, Notes, etc. 67 DECEMBER, 1925. Biographers of Bacon 73 Bacon the Expert on Religious Foundations S3 ‘ ‘Composita Solvantur’ ’ . 90 Notes on Anthony Bacon’s Passports of 1586 93 The Shadow of Bacon’s Mind 105 Who Wrote the “Shakespeare” play, Henry VIII ? 117 Shakespeare and the Inns of Court 127 Book Notices 133 Correspondence .. 134 Notes and Notices 140 APRIL, 1926. Introduction to the Tercentenary Number r45 Introduction by Sir John A. Cockburn M7 The “Manes Verulamiani’' (in Latin and English), with Notes 157 Bacon and Seats of Learning 203 Francis Bacon and Gray’s Inn 212 Bacon and the Drama 217 Bacon as a Poet 227 Bacon on Himself 230 Bacon’s Friends and Critics 237 Bacon in the Shadow 259 Bacon as a Cryptographer 267 Appendix 269 Pallas Athene 272 Book Notices, Notes, etc.
    [Show full text]
  • 9 Purple 18/2
    THE CONCORD REVIEW 223 A VERY PURPLE-XING CODE Michael Cohen Groups cannot work together without communication between them. In wartime, it is critical that correspondence between the groups, or nations in the case of World War II, be concealed from the eyes of the enemy. This necessity leads nations to develop codes to hide their messages’ meanings from unwanted recipients. Among the many codes used in World War II, none has achieved a higher level of fame than Japan’s Purple code, or rather the code that Japan’s Purple machine produced. The breaking of this code helped the Allied forces to defeat their enemies in World War II in the Pacific by providing them with critical information. The code was more intricate than any other coding system invented before modern computers. Using codebreaking strategy from previous war codes, the U.S. was able to crack the Purple code. Unfortunately, the U.S. could not use its newfound knowl- edge to prevent the attack at Pearl Harbor. It took a Herculean feat of American intellect to break Purple. It was dramatically intro- duced to Congress in the Congressional hearing into the Pearl Harbor disaster.1 In the ensuing years, it was discovered that the deciphering of the Purple Code affected the course of the Pacific war in more ways than one. For instance, it turned out that before the Americans had dropped nuclear bombs on Japan, Purple Michael Cohen is a Senior at the Commonwealth School in Boston, Massachusetts, where he wrote this paper for Tom Harsanyi’s United States History course in the 2006/2007 academic year.
    [Show full text]
  • A Cipher Based on the Random Sequence of Digits in Irrational Numbers
    https://doi.org/10.48009/1_iis_2016_14-25 Issues in Information Systems Volume 17, Issue I, pp. 14-25, 2016 A CIPHER BASED ON THE RANDOM SEQUENCE OF DIGITS IN IRRATIONAL NUMBERS J. L. González-Santander, [email protected], Universidad Católica de Valencia “san Vicente mártir” G. Martín González. [email protected], Universidad Católica de Valencia “san Vicente mártir” ABSTRACT An encryption method combining a transposition cipher with one-time pad cipher is proposed. The transposition cipher prevents the malleability of the messages and the randomness of one-time pad cipher is based on the normality of "almost" all irrational numbers. Further, authentication and perfect forward secrecy are implemented. This method is quite suitable for communication within groups of people who know one each other in advance, such as mobile chat groups. Keywords: One-time Pad Cipher, Transposition Ciphers, Chat Mobile Groups Privacy, Forward Secrecy INTRODUCTION In cryptography, a cipher is a procedure for encoding and decoding a message in such a way that only authorized parties can write and read information about the message. Generally speaking, there are two main different cipher methods, transposition, and substitution ciphers, both methods being known from Antiquity. For instance, Caesar cipher consists in substitute each letter of the plaintext some fixed number of positions further down the alphabet. The name of this cipher came from Julius Caesar because he used this method taking a shift of three to communicate to his generals (Suetonius, c. 69-122 AD). In ancient Sparta, the transposition cipher entailed the use of a simple device, the scytale (skytálē) to encrypt and decrypt messages (Plutarch, c.
    [Show full text]
  • The First Americans the 1941 US Codebreaking Mission to Bletchley Park
    United States Cryptologic History The First Americans The 1941 US Codebreaking Mission to Bletchley Park Special series | Volume 12 | 2016 Center for Cryptologic History David J. Sherman is Associate Director for Policy and Records at the National Security Agency. A graduate of Duke University, he holds a doctorate in Slavic Studies from Cornell University, where he taught for three years. He also is a graduate of the CAPSTONE General/Flag Officer Course at the National Defense University, the Intelligence Community Senior Leadership Program, and the Alexander S. Pushkin Institute of the Russian Language in Moscow. He has served as Associate Dean for Academic Programs at the National War College and while there taught courses on strategy, inter- national relations, and intelligence. Among his other government assignments include ones as NSA’s representative to the Office of the Secretary of Defense, as Director for Intelligence Programs at the National Security Council, and on the staff of the National Economic Council. This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other US government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: (Top) Navy Department building, with Washington Monument in center distance, 1918 or 1919; (bottom) Bletchley Park mansion, headquarters of UK codebreaking, 1939 UNITED STATES CRYPTOLOGIC HISTORY The First Americans The 1941 US Codebreaking Mission to Bletchley Park David Sherman National Security Agency Center for Cryptologic History 2016 Second Printing Contents Foreword ................................................................................
    [Show full text]
  • 1935 Baconiana No 83
    VoL XXII. No. 83 (Third Series.) Price 2/6 net BACONIANA OCTOBER, 1935. CONTENTS. PAGE. The Bacon Society's Annual Dinner - - - - 49 The Bacon-Marlowe Problem. By Bertram G. Theobald, B.A. - - - - - ' - 58 The Gallup Decipher. By C.L'Estrange Ewen - 60 Joseph Addison and Francis Bacon. By Alicia A. Leith - - - - - - - - - - - 80 Typographical Mistakes in Shakespeare. By Howard Bridgewater - - - - - - - - 87 Was " William Shake-speare" the Creator of the Rituals of Freemasonry? By Wor. Bro. Alfred Dodd - : - - - - - - - - - - 95 Francis Bacon—Patriot. By D. Gomes da Silva - - 102 Mrs. Elizabeth Wells Gallup (In Memoriam). By HenrySeymour - - - - - 7 106 A Calendar of the Inner Temple Records - - 110 I Bacon Society Lectures and Discussions - - Ill Jonson Talks - 112 Book Notice 115 Correspondence 116 Notes and Notices 117 LONDON: THE BACON SOCIETY INCORPORATED 47, GORDON SQUARE, W.C.l. The Bacon Society (incorporated). 47 GORDON SQUARE, LONDON, W.C.i The objects of the Society are expressed in the Memorandum of Association to be:— 1. To encourage the study of the works of Francis Bacon as philosopher, lawyer, statesman and poet; also his character, genius and life; his influence on his own and succeeding times and the tendencies and results of his writings. 2. To encourage the general study of the evidence in favour of his authorship of the plays commonly ascribed to Shakspcre, and to investigate his connection with other works of the period. Annual Subscription. For Members who receive, without further payment, two copies of Baconiana (the Society's Magazine) and are entitled to vote at the Annual General Meeting, one guinea. For Associates, who receive one copy, half-a-guinea.
    [Show full text]
  • Seventy-Second Annual Report of the Association of Graduates of the United States Military Academy at West Point, New York, June
    SEVENTY-SECOND ANNUAL REPORT of the Association of Graduates of the United States Military Academy at West Point, New York June 10, 1941 C-rinted by The Moore Printing Company, Inc. Newburgh, N. Y¥: 0 C; 42 lcc0 0 0 0 P-,.0 r- 'Sc) CD 0 ct e c; *e H, Ir Annual Report, June 10, 1941 3 Report of the 72nd Annual Meeting of the Association of Graduates, U. S. M. A. Held at West Point, N. Y., June 10, 1941 1. The meeting was called to order at 2:02 p. m. by McCoy '97, President of the Association. There were 225 present. 2. Invocation was rendered by the Reverend H. Fairfield Butt, III, Chaplain of the United States Military Academy. 3. The President presented Brigadier General Robert L. Eichel- berger, '09, Superintendent, U. S. Military Academy, who addressed the Association (Appendix B). 4. It was moved and seconded that the reading of the report of the President be dispensed with, since that Report would later be pub- lished in its entirety in the 1941 Annual Report (Appendix A). The motion was passed. 5. It was moved and seconded that the reading of the Report of the Secretary be dispensed with, since that Report would later be pub- lished in its entirety in the 1941 Annual Report (Appendix C.) The motion was passed. 6. It was moved and seconded that the reading of the Report of the Treasurer be dispensed with, since that Report would later be published in its entirety in the 1941 Annual Report (Appendix D).
    [Show full text]
  • The Dawn of American Cryptology, 1900–1917
    United States Cryptologic History The Dawn of American Cryptology, 1900–1917 Special Series | Volume 7 Center for Cryptologic History David Hatch is technical director of the Center for Cryptologic History (CCH) and is also the NSA Historian. He has worked in the CCH since 1990. From October 1988 to February 1990, he was a legislative staff officer in the NSA Legislative Affairs Office. Previously, he served as a Congressional Fellow. He earned a B.A. degree in East Asian languages and literature and an M.A. in East Asian studies, both from Indiana University at Bloomington. Dr. Hatch holds a Ph.D. in international relations from American University. This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other US government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: Before and during World War I, the United States Army maintained intercept sites along the Mexican border to monitor the Mexican Revolution. Many of the intercept sites consisted of radio-mounted trucks, known as Radio Tractor Units (RTUs). Here, the staff of RTU 33, commanded by Lieutenant Main, on left, pose for a photograph on the US-Mexican border (n.d.). United States Cryptologic History Special Series | Volume 7 The Dawn of American Cryptology, 1900–1917 David A.
    [Show full text]
  • Foreign Intelligence Surveillance Act of 1978
    FOREIGN INTELLIGENCE SURVEILLANCE ACT OF 1978 HEARINGS BEFORE THE SUBCOMMITTEE ON INTELLIGENCE AND THE RIGHTS OF AMERICANS OF THE SELECT COMMITTEE ON INTELLIGENCE OF THE UNITED STATES SENATE NINETY-FIFTH CONGRESS SECOND SESSION ON S. 1566 FOREIGN INTELLIGENCE SURVEILLANCE ACT O1 1978 JTLY 19, 21, 1977 AND FEBRUARY 8, 24, 27, 1978 Printed for the use of the Select Committee on Intelligence U.S. GOVERNMENT PRINTING OFFICE 94-628 WASHINGTON: 1978 For sale by the Superintendent of Documents, U.S. Government Printing Office Washington, D.C. 20402 Stock Number 052-070-04477-2 SENATE SELECT COMMITTEE ON INTELLIGENCE (Established by S. Res. 400, 94th Cong., 2d sess.) DANIEL K. INOUYE, Hawaii, Chairman BARRY GOLDWATER, Arizona, Vice Chairman BIRCH BAYE, Indiana CLIFFORD P. CASE, New Jersey ADLAI E. STEVENSON, Illinois JA GMEN, Utah WILLIAM D. HATHAWAY, Maine CHARLES McC. MATHIAS, Sn., Maryland WALTER D. HUDDLESTON, Kentucky JAMES B. PEARSON, Kansas JOSEPH R. BIDEN, J., Delaware JOHN H. CHAFES, Rhode Island ROBERT MORGAN, North Carolina RICHARD G. LUGAR, Indiana GARY HART, Colorado MALCOLM WALLOP, Wyoming DANIEL PATRICK MOYNIHAN, New York ROBERT C. BYRD, West Virginia, Ew Officio Member HOWARD H. BAKER, JR., Tennessee, Ex Officio Member WILLIAM 0. MILLER, Staff Director EARL D.EIsHNHOWER, Minority Staff Director AUDREY H. HATCR, Chief Clerk SUBCOsMITTE ON INTELLIGENCE AND THE ]RIGHTS OF AMERICANS BIRCH BAYH, Indiana, Chiran SAKE GARN, Utah, Vice Chairman ROBERT MORGAN, North Carolina CLIFFORD P. CASE, New Jersey DANIEL PATRICK MOYNIHAN, New York JOHN H. CHAFEE, Rhode Island CONTENTS HEARING DAYS Page Tuesday, July 19, 1977 1----. Thursday, July 21, 1977---------------------------------------------- 45 Wednesday, February 8, 1978 ----------------------------------------- 87 Friday, February 24, 1978 ------------------------------------------- 185 Monday, February 27, 1978 ------------------------------------------- 11 LIST OF WITNESSES TUESDAY, JULY 19, 1977 Testimony of Griffin B.
    [Show full text]
  • The Battle Over Pearl Harbor: the Controversy Surrounding the Japanese Attack, 1941-1994
    W&M ScholarWorks Dissertations, Theses, and Masters Projects Theses, Dissertations, & Master Projects 1995 The Battle Over Pearl Harbor: The Controversy Surrounding the Japanese Attack, 1941-1994 Robert Seifert Hamblet College of William & Mary - Arts & Sciences Follow this and additional works at: https://scholarworks.wm.edu/etd Part of the United States History Commons Recommended Citation Hamblet, Robert Seifert, "The Battle Over Pearl Harbor: The Controversy Surrounding the Japanese Attack, 1941-1994" (1995). Dissertations, Theses, and Masters Projects. Paper 1539625993. https://dx.doi.org/doi:10.21220/s2-5zq1-1y76 This Thesis is brought to you for free and open access by the Theses, Dissertations, & Master Projects at W&M ScholarWorks. It has been accepted for inclusion in Dissertations, Theses, and Masters Projects by an authorized administrator of W&M ScholarWorks. For more information, please contact [email protected]. THE BATTLE OVER PEARL HARBOR The Controversy Surrounding the Japanese Attack, 1941-1994 A Thesis Presented to The Faculty of the Department of History The College of William and Mary in Virginia In Partial Fulfillment Of the Requirements for the Degree of Master of Arts by Robert S. Hamblet 1995 APPROVAL SHEET This thesis is submitted in partial fulfillment of the requirements for the degree of Master of Arts '-{H JxijsJr 1. Author Approved, November 1995 d(P — -> Edward P. CrapoII Edward E. Pratt TABLE OF CONTENTS Page ACKNOWLEDGEMENTS......................................................................iv ABSTRACT..............................................................................................v
    [Show full text]
  • 1925-1926 Baconiana No 68-71
    ■ j- I Vol. XVIII. Third Series. Comprising March & Dec. 1925, April & Dec., 1926. BACONIANA 'A ^periodical ^Magazine 5 I ) ) I LONDON: 1 GAY & HANCOCK, Limited, I 12 AND 13, HENRIETTA ST., STRAND, W.C. I927 ► “ Therefore we shall make our judgment upon the things themselves as they give light one to another and, as we can, dig Truth out of the mine ' ’—Francis Bacon <%■ 1 % * - ■ ■ CONTENTS. MARCH, 1925. PAGE. The 364th Anniversary Dinner I Who was Shakespeare ? .. IO The Eternal Controversy about Shakespeare 15 Shakespeare’s ' 'Augmentations’'. 18 An Historical Sketch of Canonbury Tower. 26 Shakespeare—Bacon’s Happy Youthful Life 37 ' ‘Notions are the Soul of Words’ ’ 43 Cambridge University and Shakespeare 52 Reports of Meetings 55 Sir Thomas More Again .. 60 George Gascoigne 04 Book Notes, Notes, etc. .. 67 DECEMBER, 1925. Biographers of Bacon 73 Bacon the Expert on Religious Foundations 83 ' 'Composita Solvantur’ ’ .. 90 Notes on Anthony Bacon’s Passports of 1586 93 The Shadow of Bacon’s Mind 105 Who Wrote the “Shakespeare” play, Henry VIII? 117 Shakespeare and the Inns of Court 127 Book Notices 133 Correspondence .. 134 Notes and Notices 140 APRIL, 1926. Introduction to the Tercentenary Number .. 145 Introduction by Sir John A. Cockburn 147 The “Manes Verulamiani” (in Latin and English), with Notes 157 Bacon and Seats of Learning 203 Francis Bacon and Gray’s Inn 212 Bacon and the Drama 217 Bacon as a Poet.. 227 Bacon on Himself 230 Bacon’s Friends and Critics 237 Bacon in the Shadow 259 Bacon as a Cryptographer 267 Appendix 269 Pallas Athene .. 272 Book Notices, Notes, etc.
    [Show full text]
  • LONG BRANCH! John
    Board Backs Money-Saving Plan ("•• "O, SEE STORY BELOW Snow, Mild FINAL Light snow mixed with rain or sleet and mild today. Red Bank, Freehold Clearing tonight. Fair tomor- Long Branch EDITION row. 7 ,9u Detail*, X>u« 3D Monmouth Counttfs Home Newspaper for 90 Years VOL. 91, NO. 167 RED BANK, N. J., THURSDAY, FEBRUARY 20, 1969 40 PAGES 10 CENTS U. ~S.9 Israel Request Protection of Planes By ASSOCIATED PRESS of Science last night (hat Is- bound to any particular tar- Lebanon denied any part sons on the plane were wound- Israel's hawks today held raelis must be restrained and get." in the Arab commando at' ed and one guerrilla was in abeyance their demands let the diplomats fight their Dayan had just come from tack. , killed. for retaliation for the latest battles for the moment. But a top-secret ministerial secur-, , !'From the information an- Carmel, speaking to Is- . Arab attack on an Israeli ity meeting at the home of nounced about the operation,". rael's ' Parliament yesterday, airliner. They awaited the reliable sources said he Premier Levi Eshkol. Lebanese Premier Rashid Ka- cited the publication in Bei- outcome of calls from their warned Israel's Arab neigh- "We'll let the Arabs stew rami said, "there can be no rut of a statement by the Pop- government and that of the bors: for a while," said one lead excuse to deduce that any re- ular Front for the Liberation United States tor internation- "We regard all our neigh- Israeli commentator. "All sponsibility for it falls on us." of Palestine claiming respon- al action to protect civil avi- boring states as responsible their govexmnetits are cer- Karami's statement was is- sibility for the Zurich attack.
    [Show full text]