International Spy Museum

Total Page:16

File Type:pdf, Size:1020Kb

International Spy Museum SPY-BIBLIOGRAPHY Page 1 of7 DUCATE Bibliography Permanent Exhibition Nazi Espionage • Breuer, William B. Nazi Spies in America: Hitler's Undercover Martin's, 1990. • Farago, Lad is las. The Game of the Foxes: The Untold Story c the United States and Great Britain During World War II. f'l McKay, 1971. • Kahn, David. Hitler's Spies: German Military Intelligence in W< Macmillan, 1978. • MacDonnell, Francis. Insidious Foes: The Axis Fifth Column a Front. New York: Oxford University Press, 1996. • Paine, Lauran. German Military Intelligence in World War II: T Hale, 1984. • Waller, John H. The Unseen War in Europe: Espionage and C Second World War. New York: Random House, 1996. • Wires, Richard. The Cicero Spy Affair: German Access to Brit War II. Westport, CT: Praeger, 1999. • See also: http://www.fbi.gov/libref/historic/famcases/nazi/nazi. Soviet Espionage Lucy Ring/maroon Orchestra • Accoce, Pierre, and Pierre Quet. A Man Called Lucy, 1939-19 McCann, 1967. • Foote, Alexander. Handbook for Spies. London: Museum Pre! • H?ne, Heinz. Codeword: Direktor: The Story of the maroon 01 Coward, McCann, & Geoghegan, 1971. • Kesaris, Paul. The Rote Kapelle. Lanham, MD: University Put 1979. • Kilzer, Louis. Hitler's Traitor. Novato, CA: Presidio, 2000. • Perrault, Gilles [pseud., Jacques Peyroles]. The maroon Orch 1968. • Read, Anthony, and David Fisher. Operation Lucy: Most Secfi Second World War. New York: Coward, McCann & Gheo~ • Tarrant, V.E. The maroon Orchestra: Soviet Spy Network lnsi1 London: Arms & Armour Press, 1995. http://www. spymuseum. org/educate/resources/resources_ wwii. asp 11123/2005 SPY-BIBLIOGRAPHY Page 2 of7 • Trepper, Leopold. The Great Game: Memoirs of the Spy Hitle ~ York: McGraw-Hill, 1977. • U.S. Central Intelligence Agency. Counterintelligence Staff. TJ CIA's History of Soviet Intelligence and Espionage Networ 1936-1945. Washington, DC: University Publications of Ar • Whymant, Robert. Stalin's Spy: Richard Sorge and the Tokyo London:Tauris, 1996. Venona • Benson, Robert Louis, and Michael Warner, eds. VENONA: S the American Response, 1939-1957. Washington, DC: Na Agency/Central Intelligence Agency, 1996. • Breindel, Eric M., and Herbert Romerstein. The Venona Secre World War II Espionage Campaign against the United Sta. Fought Back: A Story of Espionage, Counterespionage, aJ Basic Books, 1999. • Haynes, John Earl, and Harvey Klehr. Venona: Decoding Sov America. New Haven, CT: Yale University Press, 1999. • Lamphere, Robert J., and Tom Shachtman. The FBI-KGB Wa Story. New York: Random House, 1986. • Romerstein, Herbert, and Eric Breindel. The Venona Secrets: Espionage and America's Traitors. Washington, DC: Regr • Weinstein, Allen, and Alexander Vassiliev. The Haunted Woo' America-- the Stalin Era. New York: Random House, 199' • West, Nigel. Venona: The Greatest Secret of the Cold War. L< 1999. Codebreaking General • Barker, Wayne G., ed. The History of Codes and Ciphers in tt the Period between the World Wars. 2 vols. Laguna Hills, • Beckhough, Harry. Secret Communications: The Hidden Sow through the Ages... From the Sumerians to the Cold War. 1995. • Deavours, Cipher A., and Louis Kruh. Machine Cryptography Cryptanalysis. Dedham, MD: Artech House, 1985. • Kahn, David. The Codebreakers: The Story of Secret Writing. 1967. • Rubin, Samuel. The Secret Science of Covert Inks. Port Towr Loompanics Unlimited, 1987. • Singh, Simon. The Code Book: The Evolution of Secrecy fror. to Quantum Cryptography. New York: Doubleday, 1999. • Weber, Ralph E. Masked Dispatches: Cryptograms and Crypt History, 1775-1900. Ft. George G. Meade, MD: Center of National Security Agency, 1993. • Wrixon, Fmaroon B. Codes, Ciphers & Other Cryptic & Clandt http://www. spymuseum.org/educate/resources/resources_ wwii. asp 11123/2005 SPY-BIBLIOGRAPHY Page 3 of7 Making and Breaking Secret Messages from Hieroglyphs to t1 Black Dog & Leventhal, 1998. • Yardley, Herbert 0. The American Black Chamber. [Reprint]~ Amereon, 1999. ULTRA and MAGIC • Alvarez, David. Secret Messages: Codebreaking and Americc 1945. Lawrence, KS: University Press of Kansas, 2000. • Bennett, Ralph. Intelligence Investigations: How Ultra Change Frank Cass, 1996. • Boyd, Carl. Hitler?s Japanese Confidant: General Oshima Hir Intelligence, 1941-1945. Lawrence, KS: University Press c • Budiansky, Stephen. Battle of Wits: The Complete Story of Cc War II. New York: Free Press, 2000. • Calvocoressi, Peter. Top Secret Ultra. London: Cassell, 1980. • Clark, Ronald W. The Man Who Broke Purple: The Life of Col Friedman, Who Deciphemaroon The Japanese Code in V\ Little, Brown, 1977. • Enever, Ted. Britain's Best Secret: Ultra's Base at Bletchley F Sutton, 1994. • Freedman, Maurice. Unravelling Enigma: Winning the Code V Barnsley, South Yorkshire, UK: Leo Cooper/Pen & Sword • Harper, Stephen. Capturing Enigma: How HMS Petard Seize< Codes. New York: Sutton, 1999. • Hinsley, F.H., and Alan Stripp, eds. Codebreakers: The Inside Park. New York: Oxford University Press, 1993. • Hodges, Andrew. Alan Turing: The Enigma of Intelligence. Lo1 Schuster, 1987. • Kahn, David. Seizing the Enigma: The Race to Break the Ger, 1939-1943. Boston: Houghton Mifflin, 1991. • Parrish, Thomas. The Ultra Americans: The U.S. Role in Brea New York: Stein & Day, 1986. • Rowlett, Frank B. The Story of Magic: Memoirs of an America Laguna Hills, CA: Aegean Park Press, 1998. • Sebag-Montefiore, Hugh. Enigma: The Battle for the Code. Lc Nicolson, 2000. • Sexton, Donald J., camp. Signals Intelligence in World War II: Westport, CT: Greenwood, 1996. • Sexton, Donald J., and Myron J. Smith, Jr. Electronic lntellige ~ ULTRA and MAGIC-- A Bibliography. London: Meckler, 1· • Smith, Michael. The Emperor's Codes: The Role of Bletchley . Japan's Secret Ciphers. London: Bantam, 2001. • Smith, Michael. Station X: The Codebreakers of Blethchley Pc Books/Macmillan, 1998. • Welchman, Gordon. The Hut Six Story: Breaking the Enigma http://www. spymuseum.org/educate/resources/resources_ wwii. asp 11/23/2005 SPY -BIBLIOGRAPHY Page 4 of7 McGraw-Hill, 1982. • Winterbotham, F. W. The Ultra Spy: An Autobiography. Londc Codetalkers • Bixler, Margaret T. Winds of Freedom: The Story of the Navaj World War II. Darien, CT: Two Bytes Pub. Co., 1992. • Franco, Jere Bishop. Crossing the Pond: The Native America1 Denton TX: University of North Texas Press, 1999. • Kawano, Kenji. Warriors: Navajo Code Talkers. Flagstaff, AZ: 1990. • Meadows, William. The Comanche Code Talkers of World We: University of Texas Press, 2002. • See also Navajo Code Talkers? Dictionary, at: http://www.history.navy.mil/faqs/faq61-4.htm Celebrity Spies Josephine Baker • Baker, Jean-Claude and Chris Chase, Josephine Baker: The . York: Random House, 1993. • Baker, Josephine. Josephine, translated from the French by 1\ New York: Harper & Row, 1977. • Haney, Lynn. Naked at the Feast: A Biography of Josephine t Mead, 1981. • Wood, Ean. The Josephine Baker Story. London: Sanctuary,: Moe Berg • Dawidoff, Nicholas. The Catcher Was A Spy: The Mysterious York; Pantheon Books, 1994. • Kaufman, Lewis. Moe Berg: Athlete, Scholar, Spy. Boston: Lit Julia Child • Fitch, Noel Riley. Appetite for Life: The Biography of Julia Chi1 Doubleday, 1997. Marlene Dietrich • Bach, Steven. Marlene Dietrich: Life and Legend. New York: r • Dietrich, Marlene. Marlene, translated from the German by Sa York: Grove Press, 1989. • Riva, Maria. Marlene Deitrich. New York: Knopf, 1993. • Spoto, Donald. maroon Angel: The Life of Marlene Dietrich. N 1992. • Wood, lan. Dietrich: A Biography. London: Sanctuary, 2002. John Ford • Eyman, Scott. Print the Legend: The Life and Times of John f & Schuster, 1999. • Gallagher, Tag. John Ford: The Man and His Films. Berkeley: Press, 1986. http://www. spymuseum.org/educate/resources/resources_ wwii. asp 11/23/2005 SPY -BIBLIOGRAPHY Page 5 of7 • McBride, Joseph. Searching for John Ford: A Life. New York: 2001. • See also Ford?s documentary, Battle of Midway (1942) Pearl Harbor • Clausen, Henry C., and Bruce Lee. Pearl Harbor: Final Judge Crown Publishing, 1992. • Costello, John. Days of Infamy: MacArthur, Roosevelt, Churcl Revealed: How Their Secret Deals and Strategic Blunder~ Pearl Harbor and the Philippines. New York: Pocket Book: • Popov, Dusko. Spy/Counterspy; The Autobiography of Dusko Grosse & Dunlap, 1974. • Prange, Gordon W. At Dawn We Slept: The Untold Story of P1 McGraw-Hill, 1981. • Prange, Gordon W. Pearl Harbor: The Verdict of History. New 1986. • Wohlstetter, Roberts. Pearl Harbo;: Warning and Decision. St University Press, 1962. Tokyo Rose: • http://www.fbi.gov/libref/historic/famcases/rose/rose.htm OSS (Office of Strategic Services) • Smith, Bradley F. The Shadow Warriors: O.S.S. and the Origi, York: Basic Books, 1983. • Casey, William J. The Secret War Against Hitler. New York: R 1988. • Mauch, Christof. The Shadow War Against Hitler: The Covert America's Wartime Secret Intelligence Service. New York: Press, 2003. • Mcintosh, Elizabeth P. Sisterhood of Spies: The Women ofth, Naval Institute Press, 1998. • Persico, Joseph E. Piercing the Reich: The Penetration of Na; American Secret Agents during World War II. New York: \i • Petersen, Neal H. From Hitler?s Doorstep: The Wartime Intel/ Dulles, 1942-1945. University Park, PA: Pennsylvania Sta 1996. • Smith, Harris. OSS: The Secret History of America?s First Ce Agency. • Troy, Thomas F. Wild Bill and Intrepid: Bill Donovan, Bill Step ~ of CIA. New Haven, CT: Yale University Press, 1996. • Winks, Robin W. Cloak & Gown: Scholars in the Secret War, Morrow & Co., Inc., 1987. SOE (Special Executive Operation) http://www
Recommended publications
  • 1 Introduction
    Notes 1 Introduction 1. Donald Macintyre, Narvik (London: Evans, 1959), p. 15. 2. See Olav Riste, The Neutral Ally: Norway’s Relations with Belligerent Powers in the First World War (London: Allen and Unwin, 1965). 3. Reflections of the C-in-C Navy on the Outbreak of War, 3 September 1939, The Fuehrer Conferences on Naval Affairs, 1939–45 (Annapolis: Naval Institute Press, 1990), pp. 37–38. 4. Report of the C-in-C Navy to the Fuehrer, 10 October 1939, in ibid. p. 47. 5. Report of the C-in-C Navy to the Fuehrer, 8 December 1939, Minutes of a Conference with Herr Hauglin and Herr Quisling on 11 December 1939 and Report of the C-in-C Navy, 12 December 1939 in ibid. pp. 63–67. 6. MGFA, Nichols Bohemia, n 172/14, H. W. Schmidt to Admiral Bohemia, 31 January 1955 cited by Francois Kersaudy, Norway, 1940 (London: Arrow, 1990), p. 42. 7. See Andrew Lambert, ‘Seapower 1939–40: Churchill and the Strategic Origins of the Battle of the Atlantic, Journal of Strategic Studies, vol. 17, no. 1 (1994), pp. 86–108. 8. For the importance of Swedish iron ore see Thomas Munch-Petersen, The Strategy of Phoney War (Stockholm: Militärhistoriska Förlaget, 1981). 9. Churchill, The Second World War, I, p. 463. 10. See Richard Wiggan, Hunt the Altmark (London: Hale, 1982). 11. TMI, Tome XV, Déposition de l’amiral Raeder, 17 May 1946 cited by Kersaudy, p. 44. 12. Kersaudy, p. 81. 13. Johannes Andenæs, Olav Riste and Magne Skodvin, Norway and the Second World War (Oslo: Aschehoug, 1966), p.
    [Show full text]
  • The Allied D-Day Deception Campaign and Media Use
    UNIVERSITY OF WISCONSIN-EAU CLAIRE OPERATION FORTITUDE: THE ALLIED D-DAY DECEPTION CAMPAIGN AND MEDIA USE THESIS SUBMITTED TO THE DEPARTMENT OF HISTORY FOR CANDIDACY FOR THE BACHLEORS DEGREE OF ARTS BY LUKE E. ANDERSON EAU CLAIRE, WI MAY 2010 Copyright for this work is owned by the author. This digital version is published by McIntyre Library, University of Wisconsin-Eau Claire with the consent of the author. For my grandfather, and all others who served Abstract Throughout the Second World War, the Allies focused much of their war effort on Operation Fortitude, a campaign strictly for the purpose of misinforming the Axis Powers. One extensive use of misinformation came before and after the assault on Normandy in June of 1944, more popularly known as D-Day. The Allies’ goal was to make the Germans believe the attack would be coming at Pas de Calais, much further east and closer to England. The Allies used a number of different strategies to accomplish this, including extensively bombing the Calais area, using General George Patton as a commander “decoy,” and even creating a fake invasion force. This paper examines how the media was used to carry misinformation. The Allies used both newspapers and radio broadcasts to influence the Germans into believing an attack would be coming at Calais, not Normandy. By withholding the secret details of the invasion, the American public was also led to believe an attack was coming at Calais. I argue, although double-agents were also an important way to transmit false information, without the use of media an effective campaign would have been much more difficult.
    [Show full text]
  • Hall of Remembrance Library Holdings WORLD WAR II 'Against
    Hall Of Remembrance Library Holdings WORLD WAR II ‘Against all odds’: The British Army of 1939-40. National Army Museum, 1990. Aircraft of World War 2. Jade Bks., 1984. Aline, Countess of Romanones. The spy went dancing. Century, 1991. Are we at war? Letters to The Times. Times Bks, 1989. Arnold, Gladys. One woman’s war: A Canadian reporter with the Free French. Lorimer, 1987. Badsey, Stephen. D-Day: from the Normandy beaches to the liberation of France. Colour Library, 1993. Barnett, Corelli. Engage the enemy more closely: the Royal Navy in the Second World War. Norton, 1991. Barnett, Corelli. The desert generals. Indiana Univ. , 1960 Barris, Ted. Behind the glory: the plan that won the allied air war. Macmillan, 1992. Bartov, Omer. Hitler’s army: soldiers, Nazis, and war in the Third Reich. Oxford Univ. 1991. Bailey, Chris Howard. The battle of the Atlantic; the Corvettes and their crews: an oral history. Sutton, 1994. Barker, Ralph. The RAF at war. Time-Life, 1981. Barnett, Corelli. (ed).Hitler’s Generals. Grove Weidenfeld, 1989. Barris, Ted. Days of victory: Canadians remember: 1939-1945. Macmillan, 1995. Bell, Ken. Not in vain. Univ. of Toronto, 1973. Bell, Ken.The way we were. Univ. of Toronto, 1988. 1 Bell, Ken.100 years: the Royal Canadian Regiment 1883-1983. Collier Macmillan, 1983. Belote, James H. Titans of the seas. Harper & Row, 1975. Bennett, Ralph. Ultra in the West: TheNormandy campaign 1944-45. Scribner’s, 1979. Bernadac, Christian. The naked puppets: Auschwitz. Ferni Pub., 1972. Bishop, Arthur. Our bravest and our best: the stories of Canada’s Victoria Cross winners.
    [Show full text]
  • Art of Deception: Selling a Story to the German Army
    NATIONAL EISENHOWER MEMORIAL EDUCATIONAL MATERIALS LESSON Art of Deception: Selling a Story to the German Army Duration One 45-minute period Grades 7–12 Cross-curriculum Application U.S. History, World History, Geography, English, Media Arts NATIONAL EISENHOWER MEMORIAL LESSON: ART OF DECEPTION | 1 EDUCATIONAL MATERIALS Historical Background As Supreme Allied Commander Dwight D. Eisenhower later remarked, “Plans are worthless, but planning is everything.” Operation Overlord, also known as D-Day, was a massive undertaking involving unprecedented planning and meeting challenges in execution. The operation consisted of 2,700 ships manned by 195,000 sailors. The fleet carried 156,000 troops, 12,000 vehicles, 2,000 tanks, and nearly 10,000 tons of stores across the English Channel. In addition, thousands of military aircraft supported the amphibious invasion. The success of the Normandy invasion also depended on the element of surprise. All the plan- ning and effort that went into the operation could have been undone if German military leaders knew the location and timing of the landing ahead of time. German military leaders worked hard to determine what General Eisenhower and the Allies planned to do. In order to keep this important information secret, Eisenhower and his advisors initiated Operation Bodyguard (part of a larger deception plan called Operation Fortitude) to confuse the German forces about the exact location of the landing. Objective Students will examine primary sources related to some of the Allied plans to deceive the German Army as to the time and location of the invasion of northern Europe. What techniques of decep- tion were used? What role does deception play in military strategy? What can these deceptions tell us about how the German military viewed the Allies? Students will take on the role of documentary filmmaker and develop a plan for a short video promotion for a film on Allied military deceptions during World War II.
    [Show full text]
  • Confidence Men the Mediterranean Double-Cross System, 1941-45 By
    Confidence Men The Mediterranean Double-Cross System, 1941-45 by Brett Edward Lintott A thesis submitted in conformity with the requirements for the Degree of Doctor of Philosophy, Graduate Department of History, in the University of Toronto © Copyright by Brett Edward Lintott, 2015 Abstract Confidence Men The Mediterranean Double-Cross System, 1941-45 Brett Edward Lintott Doctor of Philosophy Department of History University of Toronto, 2015 This dissertation provides an analysis of the Mediterranean double-cross system of the Second World War, which was composed of a number of double agents who were turned by the Allies and operated against their ostensible German spymasters. Utilizing many freshly released archival materials, this study assesses how the double-cross system was constructed, why it was an effective instrument, and how it contributed to Allied success in two areas: security and counter-intelligence, and military deception. The focus is thus on both organization and operations. The chapters cover three chronological periods. In the first — 1941-42 — the initial operational usage of a double agent is assessed, along with the development of early organizational structures to manage and operate individual cases as components of a team of spies. The second section, covering 1943, assesses three issues: major organizational innovations made early that year; the subsequent use of the double agent system to deceive the Germans regarding the planned invasion of Sicily in July; and the ongoing effort to utilize double agents to ensure a stable security and counter-intelligence environment in the Mediterranean theatre. The third and final section analyzes events in 1944, with a focus on double-cross deception in Italy and France, and on the emergence of more systematic security and counter-intelligence double-cross operations in Italy and the Middle East.
    [Show full text]
  • File 1 Overlord Cover Plan
    Overview 1943 - 1944 BIGOT BRITISH — MOST SECRET U.S. — SECRET Copy No. _______1 OVERLORD COVER PLAN1 Document BIGOT G-3 1 Document Document 2 Document Document 2 Document overlord cover plan Overview An admirer of strategic deception, convincing him that the real invasion Great Britain’s Prime Minister, Winston was just a diversion for a larger Churchill established the London imminent invasion. Controlling Section (LCS) in mid-1942. To achieve this, Bodyguard This was a secret bureau that met within proposed a war plan that was just close Churchill’s underground Cabinet War enough to the truth to seem credible to Rooms to plan stratagem against Hitler’s Hitler, but would mislead him completely Nazi regime. As Chief of the LCS in July, about the time, place, and force of the 1943, Colonel John Bevan submitted invasion. Therefore, Bodyguard created “Plan Jael,” the overall deception policy no less than 36 subordinate deception for the Overlord invasion. plans with peculiar names to keep the Plan Jael, named after a woman in Nazi forces spread out and guessing the Old Testament who committed acts of where and when the Allies would invade treachery, contained five main spheres of western Europe. For example, Operation secret activity: offensive intelligence, Ironside presented the threat of an counter-intelligence and security, special assault at Bordeaux, France, while operations, political warfare, and Operation Vendetta threatened the deception. After many revisions and region of Marseilles, France, and names, Jael became “Bodyguard” and Operation Ferdinand kept Nazi troops was presented to General Eisenhower occupied in the Genoa region of Italy.
    [Show full text]
  • The Double Cross System and MI-5'S Supremacy in World War II
    “A Game of Human Chess”: The Double Cross System and MI-5’s Supremacy in World War II By Adamya Sharma History Departmental Undergraduate Honors Thesis University of Colorado at Boulder April 7, 2015 Thesis Advisor: Dr. Thomas Zeiler Department of History and International Affairs Defense Committee: Dr. Fred Anderson Department of History Dr. Thomas Metcalf Department of Philosophy Abstract World War II featured monumental battles, such as the Normandy invasions, the Battle of the Bulge, Stalingrad, Iwo Jima, El Alamein, and Kursk. While historical scholarship of the World War II generally focuses on the war’s grand military engagements, it is imperative to note that Allied and Axis intelligence units battled for supremacy in a war of deception. The Double Cross system employed by the British military intelligence division (MI-5) was, virtually from the war’s onset, successful in overwhelming its German opponent, the Abwehr by turning its agents into supportive double agents. Traditional historiography follows the classic spy narrative and credits the success of MI-5 to its daring agents, brilliant creators, or stalwart handlers who used wit and guile to deceive their German adversary. In this thesis I will argue that the success of the Double Cross system should be attributed to more than solely the actions of the Double Cross team. Though the operatives played an invaluable role, the existence of an overriding, well-structured system determined their success. By examining the uniqueness of the Double Cross system, this thesis will seek to illustrate that the victorious outcome of the British in the intelligence war was due to their tireless effort to perfect a system of counterespionage.
    [Show full text]
  • The Commander's Dilemma: Using Ethical Denial and Deception
    The Commanders Dilemma: Using Ethical Denial and Deception Kailah M. Murry Introduction Denial and deception have played an essential role in military operations since the inception of warfare; there is no refuting their relevance to operations and their benefit when used successfully. Seldom examined in relation to denial and deception are the ethical considerations the commander must take into account when conducting operations. Ethics is a crucial area of research and study as the military moves into a world hyper aware of political correctness, international opinion, and legal issues. When viewing denial and deception through the lens of ethics and morality, do the ends in fact justify the means? The purpose of this paper is two-fold: first, to make practitioners aware of the ethical consequences of denial and deception, and second, to suggest an ethical framework for future operations. For the purpose of this article, the definitions for denial and deception come from joint doctrine. Deception, in broad terms, is the manipulation of information and perceptions to induce the target of that deception to take or not take an action, thereby benefiting the deceiver.1 Denial includes methods used to conceal state and military secrets, particularly from foreign intelligence collection.2 John Yurechko noted, “Denial and deception are interrelated. Denial is the basis for successful deception. One cannot manipulate or blur the truth or lie convincingly unless the truth is first concealed.”3 To focus the discussion in this paper, Joint Publication 3-13.4 defines military deception as “actions executed to deliberately mislead adversary military, paramilitary, or violent extremist organization decision makers, thereby causing the adversary to take specific actions or inactions that will contribute to the accomplishment of the friendly mission.”4 In all current and previous campaigns, denial and deception are important facets of the overall strategy.
    [Show full text]
  • Allied Deceptions in WWII Shelby Mason Junior Division Individual
    Allied Deceptions in WWII Shelby Mason Junior Division Individual Exhibit Project: 497 Process paper: 500 My original topic was going to be about female spies and how they communicated to each other in World War II. When I was reading a book about spies, I came across information which interested me about a ghost army. I found out that the Allies were deceiving the Nazis with a fake army. I decided to change my topic to Allied Deceptions in World War II because the idea of the Allies tricking or deceiving the Axis powers attracted me. I liked the different ways that they communicated false information to make the Axis powers believe something that was not true even if it involved a dead body or fake dummies. I started my research by searching the public library catalog to find books on the ghost army and on WWII deceptions. I also searched for websites, videos, and pictures with information on military deceptions. At first, it was hard to find books at my level, but the information I found gave me the names of Allied deception campaigns. I used these names to search for more articles, documentaries, and online videos. I told my grandma about my project and she found a book she had on WWII covert operations. While getting information, I wrote down what I thought was interesting and this information led me to other areas to research. I also found a number of books and websites with interesting information on deception used by the U.S. military before and after WWII.
    [Show full text]
  • Voices of the 20Th Century 20Th of the Voices
    Wednesday December 6, 2017 Wednesday New York VOICES OF THE 20TH CENTURY VOICES OF THE 20TH CENTURY | New York | Wednesday December 6, 2017 24254 VOICES OF THE 20TH CENTURY Wednesday, December 6, 2017 at 1pm New York BONHAMS BIDS INQUIRIES ILLUSTRATIONS 580 Madison Avenue +1 (212) 644 9001 New York Front cover: lot 1027 New York, New York 10022 +1 (212) 644 9009 fax Ian Ehling, Director Inside front cover: lot 1128 bonhams.com New York Session page 3: lot 1008 To bid via the internet please visit +1 (212) 644 9094 Session page 35: lot 1034 [email protected] PREVIEW www.bonhams.com/24254 Session page 53: lot 1074 Saturday, December 2 Darren Sutherland, Specialist Session page 71: lot 1170 12pm to 5pm Please note that telephone bids +1 (212) 461-6531 Session page 97: lot 1254 Sunday, December 3 must be submitted no later than [email protected] Inside back cover: 1180 12pm to 5pm 4pm on the day prior to the Back cover: 1068 Monday, December 4 auction. New bidders must also Tom Lamb, Director 10am to 5pm provide proof of identity and Business Development Tuesday, December 5 address when submitting bids. +1 (917) 921 7342 10am to 5pm [email protected] Wednesday, December 6 Please contact client services Tim Tezer, Junior Specialist 10am to 12pm with any bidding inquiries. +1 (917) 206-1647 [email protected] Please see pages 147 to 152 for bidder information including Mary-kate Grohoski, SALE NUMBER: 24254 Conditions of Sale, after-sale Administrator Lots 1001 - 1265 collection and shipment.
    [Show full text]
  • Operation Fortitude
    AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY OPERATION FORTITUDE: THE CLOSED LOOP D-DAY DECEPTION PLAN by Ernest S. Tavares, Jr., Major, USAF A Research Report Submitted to the Faculty In Partial Fulfillment of the Graduation Requirements Instructor: Dr. Richard Muller Maxwell Air Force Base, Alabama April 2001 Disclaimer The views expressed in this academic research paper are those of the author and do not reflect the official policy or position of the US government of the Department of Defense. In accordance with Air Force Instruction 51-303, it is not copyrighted, but is the property of the United States government. ii Contents Page DISCLAIMER ................................................................................................................... II ILLUSTRATIONS............................................................................................................IV PREFACE .......................................................................................................................... V ABSTRACT......................................................................................................................VI INTRODUCTION...............................................................................................................1 BACKGROUND.................................................................................................................3 The XX Committee......................................................................................................3 The Double Cross System............................................................................................4
    [Show full text]
  • DUDLEY W. CLARKE, the BIRTH of "A" FORCE, and ALLIED DECEPTION OPERATIONS in WORLD WAR II: the REMEMBRANCES of DAVID MURE by David Mure (1912-1986) T
    DUDLEY W. CLARKE, THE BIRTH OF "A" FORCE, AND ALLIED DECEPTION OPERATIONS IN WORLD WAR II: THE REMEMBRANCES OF DAVID MURE by David Mure (1912-1986) T. L. Cubbage II, Editor1 ___________________________________________________________________ This paper is addressed, altogether, to four subjects, all based on the Writer's experience in World War II.2 Expressed in the form of questions, these broad subjects are: 1. Do military organizations fully appreciate the contribution of deception to the support of military operations, and, if not, how can that attitude be changed? 2. Should deception operations be run by officers experienced in staff work, operations and planning, or by intelligence officers or special Commands? 3. What is the best organization for management of deception operations (Who should be responsible for organizing deception operations? Where should such a Unit be located as far as administration is concerned? Who is to be recruited?) 4. Are counter-deception operations likely to be successful: can deception be avoided? These four questions will be examined primarily in the context of the work of one man—Brigadier Dudley Wrangel Clarke, the man chosen by Lord Wavell to set up "A" Force— he military deception organization in Cairo in World War II. This author has endeavored to answer the four questions, not from a theoretical point of view, but by way of a detailed study of the manners, merits and convictions of the key man, Brigadier Clarke. It is my hope that this study will assist some future Command to seek and find, if necessary, obviously not an individual, but the kind of man who can undertake, in the future, what Wavell's choice carried out successfully from 1940 to 1945.
    [Show full text]