A Trend Analysis of Reporting from Defense Industry

Total Page:16

File Type:pdf, Size:1020Kb

A Trend Analysis of Reporting from Defense Industry Produced by Defense Security Service Counterintelligence Directorate Contributors: Ms. Sara DeWitz, Mr. Joseph O’Brien, Mr. Timothy Deerr, Mr. John Parsons, and Mrs. Erika Souliere http://www.dss.mil A TREND ANALYSIS OF REPORTING FROM DEFENSE INDUSTRY Tables andFigures . ......... ....... 2 Prefaca e . 3 Executive Summary A. Key Findings .... ....... 4 B. Regional Collection Trends ........... 4 C. Cyber Trends . ........... .. 6 D. Collector Affiliations..... ....... 6 E.E Methods of Operations. ... 6 F.F Targeted Technologies . 7 Background A. Scope/Methodollogy ... 8 B. Exxplanation of Estimative Language . 9 Cyber TrT endss . ... 111 Regional Collection Trends A. EaE st Asia and thhe PaP cific . 155 B. Neaar East . 19 C. Europo e and Euraasis a . 23 D. South andd Cene trala Asia... 27 E. Case Sttudu iees . 313 OuOutlt ooo k A.A CoConccluussionn . 343 B.B Foreecacasstt . 3535 RReefeereencn e Maap . 3636 FeFeededbab ck / Commmementnts Formm . 393 In the interests of readability and ease of comprehension, the editors have deferred the conventional stylistic use of repeated acronyms in favor of a full exposition of terms as they are fi rst used within each specifi c section. 11 TARGETING U.S. TECHNOLOGIES TAT BLE S FIGURES CYBER CYBER Regiono s of Origin . ...... 12 Affi liations....... 13 Targeted Technologies . ...... 14 Methods of Operation .......13 EAST ASIA AND THE PACIFIC EAST ASIA AND THE PACIFIC Targeted Technologies . ... ... 18 Affi liations. ... ... 16 Methods of Operation . 17 NEAR EAST Targeted Tecchnologies . .. 22 NEAR EAST Affiliationss. 220 EUE ROOPEPE ANDD EURASIA Methods ofo Operation . 221 Taarggeeted Technologies . ... 26 EUROPE AND EURU ASIAA SOUTH AND CEENTRAR L ASA IAI Affiliationss. 24 TaT rgeted Tecchnologgies . 30 Methods ofo Operar ttiono . 255 SOS UTH ANND CENTRAAL ASIA Affiliationsn . 288 Methods of Operation . 299 2 A TREND ANALYSIS OF REPORTING FROM DEFENSE INDUSTRY Ta r g eting U.S. Technolo g ies: A Trend Analysis of Reporting f rom Def ense Industry The Deefense Security Service (DSS) is chartered to work in partnership with defensse industs ry to prp otect critical technologies and information. An essential component of that effort is a requirement for defense contractors, who have access to classified matere ial or “Cleared Defense Contracctors,” to identify and report suspiciouss contacts and potential collection attempts, as outlinedd in thhe National Industtrial SeS curity Program Operating MaM nual (NISPOM). DSS publishes this annual report based on an analysis of those Suspicious Contact Reports (SCRs) that DSS considers indicative of efforts by entities to target defene se-related information and personnel. This publication is intended to assist security officials, cleared defense contractors, intelligence profeessionalsl , and Department of Defense policymakers and decision makers assess the techhnologyg collection threat and implement appp ropriate security coounnteermeasures. Based on analysis s of SCRs received from defense industry, thhis ppublication iddene tifies the most frequently targeted UU.SS. technologies, refl ectc s the most commmon collel ction methods utilized, identifies entities attempting the collecttion, and identifies the regionsn wherer theese collection efforts originate. DSS ene courages all Facilitty Security Offif cerrs to use infforo mation in this report to sus ppp lement security awareness and education programs at their facilities. In additiono to inncreaasis ngg threat awareness within theh industrial base, the additionnal SCRs geenen raateed by rorobbust training effforts furtheh r coc ntn ribute to the integrity off this annual anan lylytical prodducu t.t Timely subbmisss ion of SCRs to DSSS fi eldd offif ces is criticala to ann effecctive Industriaal SeS curityy Progrg am. ThThisi doco ummenent wowoulu d nnot be poosssiiblb e wwithouut the strorongg supu port of FaF ciciliityy Sececuru itty OfOfficecersrs withih n thhe UU.S.S. clleearred deefene see indn usu trry.y DSSS thhana ksk thee empm looyeyees of the U.U SS. cleeara edd defene ses indusu trt y ffor ththeiir coc nnttinnueued susupppporrt off the NISPOM and tht eir coc ntribubutit ons too this ana nun al pubblliicacatiiono . KAKATHTHLELEENEN M. WAWATSTSONON DiD rerecttoror Defensn e Secucurir tyty Sererviv cece 3 TARGETING U.S. TECHNOLOGIES A. Key Findings suggest a concerted effort to exploit In response to Department of Defense (DoD) contact for competitive, economic, and guidance, DSS publishes this report to detail military advantage. and analyze possible foreign targeting of information and technologies developed • DSS identifi ed a shift in the affi liation of or maintained within the Cleared Defense the entities making suspicious contacts. Contractor (CDC) community. The principal In most region-specifi c analyses, the substance of this report is drawn from DSS majority of contacts originated from analysis of suspicious contacts with foreign commercial entities vice those affi liated entities as reported by the CDC community with governmental entities. This is during fi scal years 2006 and 2007 (FY06-FY07). likely a purposeful attempt to make the The following constitutes key fi ndings based on contacts seem more innocuous by using DSS analysis of data received from the defense non-governmental entities as surrogate industry during FY06-FY07: collectors for interested government or government affi liated entities. It also likely refl ects the growing and increasingly • The number of reports DSS receives interconnected global economy. from CDCs detailing foreign contacts evaluated as “suspicious” continues • Exploitation of cyberspace as a vehicle to grow exponentially. This is likely for surreptitious access to information attributable in part to the explosive resident on CDC data systems is a growth of the Internet and the ever- growing concern, and it constitutes a increasing opportunity it affords for signifi cant portion of contacts that DSS uninhibited and unfi ltered global contact, deems “suspicious.” The ability to fi eld but it is also likely indicative of hostile effective security countermeasures to entities’ increased exploitation of oppose this persistent threat and to the Internet to target critical defense mitigate the ability of hostile elements to technologies. Enhanced CDC threat control the information battlefi eld requires awareness is also partially responsible constant diligence. for increased recognition and reporting of suspicious incidents. B. Regional Collection Trends • Contacts originating from the East Asia and the Pacifi c region constitute, by According to the U.S. State Department, there far, the greatest number of suspicious are 200 independent countries in the world. In contacts attributable to a specifi c FY06-FY07, entities within over half of these region of origin. The nature and countries attempted, at least once, to acquire disproportionate extent of these contacts U.S. defense technologies or information in a suspicious manner. DSS organized these 4 A TREND ANALYSIS OF REPORTING FROM DEFENSE INDUSTRY attempts into the State Department’s six historically the most active collector. This area regional groupings (See Reference Map for had the largest portion of overall reporting with information about the countries within the State a slight increase from 30 percent to 36 percent Department’s regional bureaus). For FY06- from previous years. Although reporting from FY07, the six regions DSS most frequently “East Asia and the Pacifi c” increased, reporting affi liated with Suspicious Contact Reports were from the other regions either stayed constant or in descending order of occurrence: slightly decreased. Once again, in FY06-FY07, the “Near East” region was the second most active area East Asia and the Pacific with 20 percent of the reporting, followed by “Europe and Eurasia” and “South and Central Asia” with 17 and 16 percent respectively. Near East (Note: The minimal number suspicious Europe and contacts reports from the remaining two Eurasia regions, Africa and the Western Hemisphere regions, did not justify inclusion in this year’s South and report of most prolifi c collectors.) Central Asia Additionally throughout FY06-FY07, the most suspicious cyber entities had Internet Protocol Western (IP) addresses suggesting origination in the Hemisphere following regions, listed in descending order: Africa East Asia and the Pacific Also, fi ve percent of traditional collection Europe and attempts were from entities of unknown origin. Eurasia It is noteworthy that the regions affi liated with Unknown Region the suspicious requests may not always be the ultimate end user of the targeted technology. Near East Collectors may use anonymous proxies or base their collection activity in another region South and to conceal their intentions or the identity of the Central Asia ultimate end-user. Reporting and analysis indicated “East Asia Western and the Pacifi c” as the region of the world Hemisphere most actively attempting to illegally acquire U.S. defense technologies. This region was responsible for 36 percent of traditional Africa collection attempts in FY06-FY07 and is 5 TARGETING U.S. TECHNOLOGIES C. Cyber Trends means the suspicious activity is affi liated with or acting on behalf of a foreign government In recognition of an increasingly pervasive or agency. Other collector affi liations include threat, this report includes a section specifi c to “Commercial,” “Individual,” and “Government the use of cyberspace as a collection medium. Associated” entities. In FY06-FY07, DSS Of the cyber incidents
Recommended publications
  • THE BATTLE of the CORAL SEA — an OVERVIEW by A.H
    50 THE BATTLE OF THE CORAL SEA — AN OVERVIEW by A.H. Craig Captain Andrew H. Craig, RANEM, served in the RAN 1959 to 1988, was Commanding officer of 817 Squadron (Sea King helicopters), and served in Vietnam 1968-1979, with the RAN Helicopter Flight, Vietnam and No.9 Squadroom RAAF. From December 1941 to May 1942 Japanese armed forces had achieved a remarkable string of victories. Hong Kong, Malaya and Singapore were lost and US forces in the Philippines were in full retreat. Additionally, the Japanese had landed in Timor and bombed Darwin. The rapid successes had caught their strategic planners somewhat by surprise. The naval and army staffs eventually agreed on a compromise plan for future operations which would involve the invasion of New Guinea and the capture of Port Moresby and Tulagi. Known as Operation MO, the plan aimed to cut off the eastern sea approaches to Darwin and cut the lines of communication between Australia and the United States. Operation MO was highly complex and involved six separate naval forces. It aimed to seize the islands of Tulagi in the Solomons and Deboyne off the east coast of New Guinea. Both islands would then be used as bases for flying boats which would conduct patrols into the Coral Sea to protect the flank of the Moresby invasion force which would sail from Rabaul. That the Allied Forces were in the Coral Sea area in such strength in late April 1942 was no accident. Much crucial intelligence had been gained by the American ability to break the Japanese naval codes.
    [Show full text]
  • Coral Sea: Saviour Or Stepping Stone?
    Coral Sea: Saviour or Stepping Stone? The Battles Role in Australia’s Safety During World War II Stephen dos Santos Student No: 30877406 Thesis for Honours Degree of Bachelor of Arts (History) School of Social Sciences and Humanities Murdoch University November 2011 This thesis is presented for the Honours degree of History of Murdoch University Submitted November 2011 This thesis is my own work containing, to the best of my knowledge, no material published or written by another person except as referred to. None of the material submitted as part of this thesis has been accepted for the award of any degree in any tertiary institution. Signed: Stephen dos Santos Date: 12/12/11 Stephen dos Santos COPYRIGHT ACKNOWLEDGEMENT I acknowledge that a copy of this thesis will be held at the Murdoch University Library. I understand that, under the provisions of s51.2 of the Copyright Act 1968, all or part of this thesis may be copied without infringement of copyright where such a reproduction is for the purposes of study and research. This statement does not signal any transfer of copyright away from the author. Signed: Stephen dos Santos Full Name of Degree: Bachelor of Arts with Honours in History e.g. Bachelor of Science with Honours in Chemistry. Thesis Title: Coral Sea: Saviour or Stepping Stone? The Battle’s Role in Australia’s Safety During World War II Author: Stephen dos Santos Year: 2011 Abstract A Japanese plan to invade Australia during World War Two has been much disputed. Nevertheless, the safety of Australia throughout the Pacific campaign, especially during 1942, was far from assured.
    [Show full text]
  • Priceless Advantage 2017-March3.Indd
    United States Cryptologic History A Priceless Advantage U.S. Navy Communications Intelligence and the Battles of Coral Sea, Midway, and the Aleutians series IV: World War II | Volume 5 | 2017 Center for Cryptologic History Frederick D. Parker retired from NSA in 1984 after thirty-two years of service. Following his retirement, he worked as a reemployed annuitant and volunteer in the Center for Cryptologic History. Mr. Parker served in the U.S. Marine Corps from 1943 to 1945 and from 1950 to 1952. He holds a B.S. from the Georgetown University School of Foreign Service. This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other U.S. govern- ment entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: (l to r) Admiral Isoroku Yamamoto, Commander in Chief, Japanese Combined Fleet, 1942; aircraft preparing for launch on the USS Enterprise during the Battle of Midway on 4 June 1942 with the USS Pensacola and a destroyer in distance; and Admiral Chester W. Nimitz, Commander in Chief, Pacific Fleet, ca. 1942-1944 A Priceless Advantage: U.S. Navy Communications Intelligence and the Battles of Coral Sea, Midway, and the Aleutians Frederick D. Parker Center for Cryptologic History National Security Agency Reissued 2017 with a new introduction First edition published 1993.
    [Show full text]
  • Coral Sea: Saviour Or Stepping Stone? the Battles Role In
    Coral Sea: Saviour or Stepping Stone? The Battles Role in Australia’s Safety During World War II Stephen dos Santos Student No: 30877406 Thesis for Honours Degree of Bachelor of Arts (History) School of Social Sciences and Humanities Murdoch University November 2011 This thesis is presented for the Honours degree of History of Murdoch University Submitted November 2011 This thesis is my own work containing, to the best of my knowledge, no material published or written by another person except as referred to. None of the material submitted as part of this thesis has been accepted for the award of any degree in any tertiary institution. Signed: Stephen dos Santos Date: 12/12/11 Stephen dos Santos COPYRIGHT ACKNOWLEDGEMENT I acknowledge that a copy of this thesis will be held at the Murdoch University Library. I understand that, under the provisions of s51.2 of the Copyright Act 1968, all or part of this thesis may be copied without infringement of copyright where such a reproduction is for the purposes of study and research. This statement does not signal any transfer of copyright away from the author. Signed: Stephen dos Santos Full Name of Degree: Bachelor of Arts with Honours in History e.g. Bachelor of Science with Honours in Chemistry. Thesis Title: Coral Sea: Saviour or Stepping Stone? The Battle’s Role in Australia’s Safety During World War II Author: Stephen dos Santos Year: 2011 Abstract A Japanese plan to invade Australia during World War Two has been much disputed. Nevertheless, the safety of Australia throughout the Pacific campaign, especially during 1942, was far from assured.
    [Show full text]
  • NIDS Forum EN.Indd
    From Opportunity to Strategic Necessity: The Japanese in the South Pacific, 1942-43 Hiroyuki Shindo For over two years, from January 1942 through the spring of 1944, the Japanese fought an intense ground, naval, and air campaign against the Americans and Australians in the South Pacific, on, around, or over eastern New Guinea, New Ireland, New Britain, and the Solomon Islands. The losses the Japanese suffered there affected their ability to fight effectively in the latter half of 1944 and in 1945. The South Pacific campaign therefore played an important role in determining the outcome of the Pacific War. However, the Japanese had not expected to fight such an extended campaign in the South Pacific when planning the opening operations of the Pacific War.1 Broadly speaking, the South Pacific campaign was essentially an Allied counteroffensive against a Japanese thrust into the area. A review of the process and chain of events by which the Japanese extended their reach into the South Pacific will therefore help to better understand the conduct of war by the Japanese in the Pacific War. For the purposes of this conference, the Japanese South Pacific campaign is a good example of a campaign that expanded beyond expectations in intensity and length, to a degree that the entire outcome of the war was affected. This paper will therefore explore the various factors behind the South Pacific strategy of the Japanese. The focus will be on the Imperial Japanese Navy (IJN) in 1942, since the IJN took the initiative for expanding the war into the South Pacific.
    [Show full text]
  • Shipwrecks-Friends-A
    Friends across the Pacific Shared WWII maritime heritage of Australia and the United States Cover images: l to r. Rescuing USS Lexington survivors during the Battle of the Coral Sea (US Navy/National Archives); Australian Prime Minister John Curtin meeting with US General Douglas Macarthur in 1944 (courtesy National Archives of Australia); USS Yorktown (US Navy/National Archives) Friends across the Pacific Shared WWII maritime heritage of Australia and the United States A message from Heritage Minister Tony Burke The Australian Government is pleased to declare the wrecks of The battle began on the morning of 4 May, when US aircraft the USS Lexington, USS Sims and USS Neosho, sunk during carriers launched their first air strike on the Japanese, starting the Battle of the Coral Sea, as protected historic shipwrecks an encounter that lasted four days and ranged across the under the Historic Shipwreck Act 1976. breadth of the Coral Sea. The declarations recognise the exceptional heritage significance Just before noon on 7 May aircraft from USS Yorktown and of the wrecks and will ensure that these remarkable relics of USS Lexington sank the Japanese aircraft carrier Shoho. the Battle of the Coral Sea receive the highest protection under At about the same time, and in a separate engagement, dive Australian law. I am delighted that we have been able to make bombers from the Japanese carriers Shokaku and Zuikaku this announcement as we mark the 70th anniversary of the sank the destroyer Sims and left the US fleet oiler Neosho a Battle of the Coral Sea. crippled wreck.
    [Show full text]
  • Trial by Fire in the Coral Sea
    Trial by Fire in the Coral Sea Adm. Chester W. Nimitz turned to his staff, blue eyes blazing, and said: “Remember this, we don’t know how badly [the enemy] is hurt. You can bet your boots he’s hurt, too!” The Battle of the Coral Sea, the first significant clash between aircraft carrier forces in history, entered its climactic phase on the morning of May 8, 1942. At 0820, Lt. j.g. Joseph G. Smith flew his Navy SBD Dauntless dive-bomber out of a towering cloud bank and caught his breath at the sudden sight of a dozen telltale ship wakes far below — the Japanese striking force. Quickly he radioed the aircraft carrier Lexington: “Contact! Two enemy carriers, four heavy cruisers, many destroyers. Exactly two minutes later, and roughly 200 miles to the south, Imperial Japanese Navy Petty Officer 1st Class Kenzo Kanno banked his Nakajima 97 “Kate” torpedo plane and was exalted to discover a similar scene on the ocean surface. “Have sighted the enemy carriers!” he reported to the fleet carrier Shokaku. The opposing carrier forces had searched for each other in vain throughout the previous four days. Both sides had drawn blood the day before. Now came the main event. Adm. Chester William Nimitz Thirty-five hundred miles away in Pearl Harbor, Adm. Chester W. Nimitz, commanding the Pacific Fleet and the Pacific Ocean areas, stared at the sprawling map of the Coral Sea laid out on sawhorses in “Operations Plot,” his hillside command center, and waited uneasily for his task-force commander, Rear Adm.
    [Show full text]
  • The Battle of the Coral Sea, May 1942
    INSTITUTE PROCEEDINGS The Battle of the Coral Sea, May 1942 An address to the Institute on 27 June 2017 by Peter J. Sweeney Royal United Services Institute for Defence and Security Studies, New South Wales Special Interest Group on Military History1 The Battle of the Coral Sea, 4-8 May 1942, was fought between combined United States and Australian naval forces and the Imperial Japanese Navy. It was the world’s first sea battle between aircraft carriers – literally ‘fought in the air’. It was also the first naval battle in which opposing ships neither saw nor fired on each other. It resulted in the Japanese Port Moresby invasion fleet being turned back to Rabaul. Key words: World War II; Australia; Japan; United States; Coral Sea; Imperial Japanese Navy; Royal Australian Navy; United States Navy. The Battle of the Coral Sea was the first joint Aust - confusion by a surprise bombing raid on Japan on 18 ralian/American military operation after John Curtin’s April 1942 carried out by Lieutenant-Colonel Jimmy article ‘The Task Ahead’ was published in The Herald Doolittle of the United States Army Air Force. (Melbourne) on 27 December 1941. In that article, Lieutenant-Colonel Doolittle's daring bombing raid, Curtin wrote: besides raising American morale so soon after Pearl “The Australian Government, therefore, regards Harbour, caused great consternation for Japan’s senior the Pacific struggle as primarily one in which the military leaders. As a result, instead of invading India at United States and Australia must have the fullest say this time, they decided first to expand eastward across in the direction of the democracies’ fighting plan.
    [Show full text]
  • Semaphore Newsletter of the Sea Power Centre Australia Issue 2, April 2003
    SEMAPHORE NEWSLETTER OF THE SEA POWER CENTRE AUSTRALIA ISSUE 2, APRIL 2003 NEW GUINEA WW2 – A MARITIME CAMPAIGN To most Australians the campaign fought against the Failure to take Port Moresby by amphibious assault did Japanese in New Guinea during WW2 is typified by not deter the Japanese. They immediately commenced images of Australian diggers and ‘fuzzy-wuzzy angels’ planning to take Port Moresby by assault from the land. struggling along the Kokoda Track or fighting hand to This would entail a landing at Buna, which was hand at Milne Bay. Very few would consider this to have undertaken on 21 July, and an advance across the Owen been a maritime campaign, yet this is exactly what it Stanley Ranges. All the logistics required by the was, for the final arbiter of victory or defeat in the jungles Japanese to support this assault, and the Allies to of New Guinea was maritime power. oppose it, had to be carried by ships. So began the struggle for control of the sea-lanes. Following Japan’s attack on the United States Pacific Fleet at Pearl Harbour on 7 December 1941, the sinking of Force Z (HMS Prince of Wales and HMS Repulse), and the subsequent defeat of Allied naval forces in the Battles of the Java Sea and Sunda Strait, the Imperial Japanese Navy had achieved control of the seas in the South Pacific. This enabled her to project her military forces into the islands north of Australia. By 23 January 1942 Rabaul had fallen and became the location of the Japanese forward headquarters.
    [Show full text]
  • INSTRUMENT of SURRENDER We, Acting by Command of and in Behalf
    INSTRUMENT OF SURRENDER We, acting by command of and in behalf of the Emperor of Japan, the Japanese Government and the Japanese Imperial General Headquarters, hereby accept the provisions set forth in the declaration issued by the heads of the Governments of the United States, China, and Great Britain on 26 July 1945 at Potsdam, and subsequently adhered to by the Union of Soviet Socialist Republics, which four powers are hereafter referred to as the Allied Powers. We hereby proclaim the unconditional surrender to the Allied Powers of the Japanese Imperial General Headquarters and of all Japanese armed forces and all armed forces under the Japanese control wherever situated. We hereby command all Japanese forces wherever situated and the Japanese people to cease hostilities forthwith, to preserve and save from damage all ships, aircraft, and military and civil property and to comply with all requirements which my be imposed by the Supreme Commander for the Allied Powers or by agencies of the Japanese Government at his direction. We hereby command the Japanese Imperial Headquarters to issue at once orders to the Commanders of all Japanese forces and all forces under Japanese control wherever situated to surrender unconditionally themselves and all forces under their control. We hereby command all civil, military and naval officials to obey and enforce all proclamations, and orders and directives deemed by the Supreme Commander for the Allied Powers to be proper to effectuate this surrender and issued by him or under his authority and we direct all such officials to remain at their posts and to continue to perform their non-combatant duties unless specifically relieved by him or under his authority.
    [Show full text]
  • Weapon of Denial: Air Power and the Battle for New Guinea
    Weapon of Denial Air Power and the Battle for New Guinea Gen. Douglas MacArthur, commander of Pacific forces in World War 11, viewed the Battle of the Bismarck Sea as a disaster for the Japanese and a triumph for the Allies. In that great air-sea confrontation, U.S. and Australian air for- ces proved that air power could be decisive in preventing the resupply of ground troops by sea. Months of torturous war- fare in the jungles of New Guinea had left Japanese troops vulnerable to disease and starvation. In the end, Allied air- men were able to break Japan’s grip on New Guinea and end its threat to Australia through the innovative and aggressive use of air power. MacArthur’s strength lay in a dedicated and courageous band of airmen who could attack enemy ships from all directions at any time. The Japanese Onslaught The infamous attack on Pearl Harbor by Japan marked the beginning of a protracted and grueling war in the Pacific. Having dealt a stunning blow to the U.S. Pacific Fleet on De- cember 7, 1941, Japan moved quickly to seize the oil-rich Netherlands East Indies and establish a large defensive pe- rimeter of islands between itself and Hawaii. Seemingly un- stoppable at first, it had by late December gained a foothold in the Philippines. During the first three months of 1943, Japanese naval and ground units increased their attacks, consolidated their gains, and moved deeper into the south- west Pacific. New Guinea was their next target. From there, Imperial Forces planned to expand throughout the area, perhaps into Australia itself.
    [Show full text]
  • 1942, the Pacific War, and the Defence of New Zealand
    Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only. The thesis may not be reproduced elsewhere without the permission of the Author. 1942, the Pacific War, and the Defence of New Zealand A thesis presented in fulfilment of the requirements for the degree of Master of Philosophy in Defence and Strategic Studies at Massey University, New Zealand. Peter C. Wilkins 2016 The author Peter Cyril Wilkins reserves the moral right to be identified as the author of this work. Copyright is owned by the author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only. The thesis may not be reproduced elsewhere without the permission of the author. TABLE OF CONTENTS Table of Contents 3 Acknowledgements 5 Abstract 6 Abbreviations and Code Names 7 Introduction 11 Chapter 1 The view across Port Jackson 15 Chapter 2 Walsingham’s children 34 Chapter 3 The view across Tokyo Bay 47 Chapter 4 The view across three waters 71 Chapter 5 A second look across Port Jackson 97 Conclusion The concluding view 120 Bibliography 125 Appendix A Expenditure on NZ armed forces 1919-1939 140 Appendix B ‘Magic’ summary, issued April 18, 1942 141 Appendix C Potential air domination of Australia and NZ 147 Appendix D USN and IJN fleet carrier operational availability 150 Appendix E Pre-Pearl Harbor attitude on Japan’s forces 152 Map 1: The Political Map of the Pacific - 1939 10 Map 2: Pacific Air Routes, 1941-42 32 Map 3: Pacific Ocean Areas, 1942 80 Image 1: ‘He’s Coming South’ (Australian wartime propaganda poster) 11 Image 2: Cartoon, financial freeze of Japan (US political cartoon 1941) 84 ACKNOWLEDGEMENTS This thesis is part of the process of an old man’s journey to fulfil an education missed as a youth.
    [Show full text]