Instruments of Science and Technology

Total Page:16

File Type:pdf, Size:1020Kb

Instruments of Science and Technology Instruments of Science and Technology Montpelier Street, London I 2 December 2020 Bonhams © 2020 Bonhams & Butterfields Auctioneers Corp. All rights reserved. Instruments of Science and Technology Montpelier Street, London | Wednesday 2 December 2020, at 2pm BONHAMS ENQUIRIES SYMBOLS KEY: REGISTRATION Montpelier Street Jon Baddeley † VAT 20% on hammer price and IMPORTANT NOTICE Knightsbridge +44 (0) 20 7393 3872 buyer’s premium Please note that all customers, London SW7 1HH [email protected] irrespective of any previous activity bonhams.com * VAT on imported items at with Bonhams, are required to Claire Tole-Moir a preferential rate of 5% on complete the Bidder Registration BIDS +44(0) 20 7393 3984 hammer price and the prevailing Form in advance of the sale. The [email protected] rate on buyer’s premium form can be found at the back of +44 (0) 20 7447 7447 every catalogue and on our To bid via the internet please visit Laurel Kemp Y These lots are subject to website at www.bonhams.com www.bonhams.com +44 (0) 20 7393 3855 CITES regulations, please read and should be returned by email or [email protected] the information in the back of post to the specialist department Please note that bids should be the catalogue. or to the bids department at submitted no later than 24 hours [email protected] before the sale. SALE NUMBER 25978 IMPORTANT INFORMATION To bid live online and / or New bidders must also provide The United States Government leave internet bids please go to proof of identity when submitting PRESS ENQUIRIES has banned the import of ivory www.bonhams.com/auctions/25978 bids. Failure to do this may result into the USA. Lots containing [email protected] and click on the Register to bid link in your bids not being processed. ivory are indicated by the symbol Ф printed beside the lot number at the top left of the page. CUSTOMER SERVICES Bidding by telephone will only be in this catalogue. Monday to Friday accepted on a lot with a lower 8.30am – 6pm estimate in excess of £500. +44 (0) 20 7447 7447 Live online bidding is Please see back of catalogue available for this sale for important notice to bidders Please email [email protected] with “Live bidding” in the subject ILLUSTRATIONS line 48 hours before the auction Front cover: Lot 86 to register for this service. Back cover: Lot 33 Inside front cover: Lot 103 Inside back cover: Lot 12 Bonhams © 2020 Bonhams & Butterfields Auctioneers Corp. All rights reserved. Sale Information BIDS BUYERS COLLECTION & VAT +44 (0) 20 7447 7447 STORAGE AFTER SALE The following symbols are used To bid via the internet please visit All sold lots will remain in the to denote that VAT is due on www.bonhams.com collections department at the hammer price and buyer’s Bonhams Knightsbridge premium. PAYMENTS without charge until Tuesday Buyers 15 December 2020 lots † VAT 20% on hammer price Not collected by this time and buyer’s premium Buyers will be returned to the department +44 (0) 20 7447 7447 storage charges may apply * VAT on imported items at a preferential rate of 5% on Sellers Please note that Bonhams will hammer price and the prevailing Payment of sale proceeds be closed from 1pm Thursday rate on buyer’s premium +44 (0) 20 7447 7447 24 December 2020 until 9am Monday 4 January 2021 Y These lots are subject to VALUATIONS, TAXATION CITES regulations, please read & HERITAGE the information in the back of +44 (0) 20 7468 8340 the catalogue. +44 (0) 20 7468 5860 fax [email protected] Payment All charges due to Cadogan SHIPPING Tate must be paid by the time of For information and estimates collection from their warehouse. on domestic and international shipping as well as export Payment in Advance licenses please contact Alban (Telephone to ascertain amount Shipping on: due) by: cash, credit, or debit +44 (0) 1582 493 099 card. [email protected] Payment at time of collection Please note that Alban Shipping will be closed from by: 1pm Thursday 24 December cash, credit, or debit card 2020 until 9am Monday 4 January 2021 1 3 2 4 1 3 THREE LEICA CAMERAS, ROLLEI 2.8F CAMERA, comprising; a Leica IIIA no.281132, 5cm f2 Summitar lens and a non- no.2411397, with 80mm f2.8 Planar lens no. 3253007, in makers case Leitz lens; a Leica III no.297920 with 5cm f2 Summar lens no.89517, with lens hood, filter and instructions, filter and a Hektor 13.5cm f4.5 lens no.172214; and Leica IIC no.445792 with 5cm f2 Summar lens no.229836, (Qty) £500 - 800 €560 - 890 £400 - 600 US$660 - 1,100 €450 - 670 US$530 - 790 4 HASSELBLAD GOLD 500CM, 2 special camera no.0341, body no. RU140717, back no. 3300717, NIKON GOLD “CAMERA GRAND PRIX ‘84”, Planar 80mm f2.8 lens no. 6954020, in maker’s box with papers, no. 2002889, with Nikkor 50mm f1.4 lens, no. 5508431, in makers wooden presentation box with papers, £1,500 - 2,000 €1,700 - 2,200 £1,500 - 2,000 US$2,000 - 2,600 €1,700 - 2,200 US$2,000 - 2,600 For details of the charges payable in addition to the final Hammer Price of each Lot please refer to paragraphs 7 & 8 of the Notice to Bidders at the back of the catalogue. INSTRUMENTS OF SCIENCE | 3 5 (another view) 5 6 7 5 7 A PRESENTATION LEICA PLATINUM M6, 1992, HASSELBLAD 205 TCC, no. 2177024 HB-024, with 50mm f1.4 lens, in presentation wooden body no. 15EV10322, back no. 30EV 90237, 80mm f2.8 lens Planar case with certificate and guarantee cards, lens, no. 7207933, £8,000 - 12,000 £1,000 - 1,500 €8,900 - 13,000 €1,100 - 1,700 US$11,000 - 16,000 US$1,300 - 2,000 This presentation camera was produced in 1992 to celebrate the Silver Jubilee of the Sultan of Brunei. 6 HASSELBLAD 500C WITH PLANAR, body no. UUC202810, back no. UU523945, 80mm f 2.8 Planar lens no. 6069489, £300 - 500 €330 - 560 US$390 - 660 For details of the charges payable in addition to the final Hammer Price of each Lot 4 | BONHAMS please refer to paragraphs 7 & 8 of the Notice to Bidders at the back of the catalogue. 8 8 (another view) 9 8 (another view) 8 9 A RARE LEICA MILITARY M3, 1957, A RARE 35MM F1.4 SUMMILUX LENS, no. 910577, engraved BUNDESEIGENTUM 12-121-5418, finished in no. 2166557, complete with Leitz UV filter and back cap, olive green, £2,000 - 3,000 £9,000 - 12,000 €2,200 - 3,300 €10,000 - 13,000 US$2,600 - 3,900 US$12,000 - 16,000 Produced in 1964 in a batch of just 200 units from 2166501 to This military camera was supplied by Leitz for the Bundeseigentum 2166701. in 1957 from batch 910501 to 910600. In virtually mint condition this camera was rebuilt in the Leitz factory in the late 1980’s at the request of a then Leitz director. For details of the charges payable in addition to the final Hammer Price of each Lot please refer to paragraphs 7 & 8 of the Notice to Bidders at the back of the catalogue. INSTRUMENTS OF SCIENCE | 5 10 11 10 11 A RARE LEICA IIF BLACK DIAL, 1954, A RARE LEICA IF BLACK DIAL “BETRIEBSK”, 1952, no. 713842, with delayed action and 5cm f2 Summicron lens no. engraved BETRIEBSK 374, 1155714, Compur shutter and matching operating lever, £3,500 - 5,000 £7,500 - 10,000 €3,900 - 5,600 €8,400 - 11,000 US$4,600 - 6,600 US$9,900 - 13,000 The Leica IF black dial is a rare camera with a total production of some This camera was produced in 1954 from batch 713001-729000 and 1200 units in 1952, only a very few of these were engraved with the lens produced in the same year. It is estimated that only 60 such Betriebsk mark which indicated that they were factory cameras and lenses were sold and even fewer with the lever, only a few have not for resale. survived with the release arm. For details of the charges payable in addition to the final Hammer Price of each Lot 6 | BONHAMS please refer to paragraphs 7 & 8 of the Notice to Bidders at the back of the catalogue. 12 A VERY RARE BLACK LEICA M3, 1956, no.839537, with double wind shutter mechanism, £12,000 - 15,000 €13,000 - 17,000 US$16,000 - 20,000 Double stroke black M’s are extremely rare as few were produced and most were subsequently modified to single stroke by the factory when they returned there for servicing. In the late 1980’s this camera was rebuilt in the Leitz factory at the request of a then Leitz director. For details of the charges payable in addition to the final Hammer Price of each Lot please refer to paragraphs 7 & 8 of the Notice to Bidders at the back of the catalogue. INSTRUMENTS OF SCIENCE | 7 13 A FINE RILEY BROTHERS LTD BI-UNIAL MAGIC LANTERN, ENGLISH, LATE 19TH CENTURY, in virtually unused condition complete with a pair of 6 inch and a pair of 10 inch lenses, lacquered brass throughout with rack and pinion focusing, two pairs of side doors with inspections windows and galvanised chimney above on mahogany platform and in original stained pine carrying case, together with slides and accessories, lantern 27in (69cm) high £3,000 - 5,000 €3,300 - 5,600 US$3,900 - 6,600 For details of the charges payable in addition to the final Hammer Price of each Lot 8 | BONHAMS please refer to paragraphs 7 & 8 of the Notice to Bidders at the back of the catalogue.
Recommended publications
  • The Enigma Encryption Machine and Its Electronic Variant
    The Enigma Encryption Machine and its Electronic Variant Michel Barbeau, VE3EMB What is the Enigma? possible initial settings, making the total number of initial settings in the order of 10 power 16. The The Enigma is a machine devised for encrypting initial setting, taken from a code book, indicates plain text into cipher text. The machine was which pairs of letters (if any) are switched with each invented in 1918 by the German engineer Arthur other. The initial setting is called the secret key. Scherbius who lived from 1878 to 1929. The German Navy adopted the Enigma in 1925 to secure World War II was fought from 1939 to 1945 their communications. The machine was also used between the Allies (Great Britain, Russia, the by the Nazi Germany during World War II to cipher United States, France, Poland, Canada and others) radio messages. The cipher text was transmitted in and the Germans (with the Axis). To minimize the Morse code by wireless telegraph to the destination chance of the Allies cracking their code, the where a second Enigma machine was used to Germans changed the secret key each day. decrypt the cipher text back into the original plain text. Both the encrypting and decrypting Enigma The codes used for the naval Enigmas, had machines had identical settings in order for the evocative names given by the germans. Dolphin decryption to succeed. was the main naval cipher. Oyster was the officer’s variant of Dolphin. Porpoise was used for The Enigma consists of a keyboard, a scrambling Mediterranean surface vessels and shipping in the unit, a lamp board and a plug board.
    [Show full text]
  • The Mathemathics of Secrets.Pdf
    THE MATHEMATICS OF SECRETS THE MATHEMATICS OF SECRETS CRYPTOGRAPHY FROM CAESAR CIPHERS TO DIGITAL ENCRYPTION JOSHUA HOLDEN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright c 2017 by Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TR press.princeton.edu Jacket image courtesy of Shutterstock; design by Lorraine Betz Doneker All Rights Reserved Library of Congress Cataloging-in-Publication Data Names: Holden, Joshua, 1970– author. Title: The mathematics of secrets : cryptography from Caesar ciphers to digital encryption / Joshua Holden. Description: Princeton : Princeton University Press, [2017] | Includes bibliographical references and index. Identifiers: LCCN 2016014840 | ISBN 9780691141756 (hardcover : alk. paper) Subjects: LCSH: Cryptography—Mathematics. | Ciphers. | Computer security. Classification: LCC Z103 .H664 2017 | DDC 005.8/2—dc23 LC record available at https://lccn.loc.gov/2016014840 British Library Cataloging-in-Publication Data is available This book has been composed in Linux Libertine Printed on acid-free paper. ∞ Printed in the United States of America 13579108642 To Lana and Richard for their love and support CONTENTS Preface xi Acknowledgments xiii Introduction to Ciphers and Substitution 1 1.1 Alice and Bob and Carl and Julius: Terminology and Caesar Cipher 1 1.2 The Key to the Matter: Generalizing the Caesar Cipher 4 1.3 Multiplicative Ciphers 6
    [Show full text]
  • Historical Ciphers Systems Top 10 Open Problems May 5, 2016 George Lasry [email protected] Open Problems - Criteria
    Historical Ciphers Systems Top 10 Open Problems May 5, 2016 George Lasry [email protected] Open Problems - Criteria • Generic method vs. deciphering a document • System details are known – For many there are simulators • Published methods vs. classified • General vs. special case solutions – Ciphertext only vs. known plaintext – Single message vs. in-depth messages – Short vs. long messages – Long vs. short keys • Brute force not feasible – But computer most likely required George Lasry May 2016 2 Top 10 Open Problems 1. SIGABA 2. KL-7 3. Siemens T52D “Sturgeon” 4. Hagelin CX-52 5. Fialka 6. Lorenz SZ42 “Tunny” – Ψ1 limitation 7. Hagelin M-209 – short messages 8. Double Transposition – long random keys 9. Enigma – short message 10. Chaocipher – single message George Lasry May 2016 3 Problem 1: SIGABA (US) • Possible keys (WWII): 2 96 = 10 29 • Best published: known-plaintext 2 60 = 10 18 steps George Lasry May 2016 4 Problem 2: KL-7 (US) • Details of the machine known (+ simulator) • Best published cryptanalytic method: None! George Lasry May 2016 5 Problem 3: Siemens & Halske T52D • Successor of T52a/b/c: Irregular wheel stepping • Possible key settings: 2 73 = 10 24 • Best published method: > 5 messages in depth George Lasry May 2016 6 Problem 4: Hagelin CX-52 • Successor of C38/M209: Irregular wheel stepping • Possible key settings: 2 439 = 10 132 • Best published method: Known-plaintext George Lasry May 2016 7 Problem 5: Fialka M-125 (Russia) • Possible key settings: 2 250 = 10 75 • Best published method: None! George
    [Show full text]
  • An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext
    An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext By Isaac Quinn DuPont A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Faculty of Information University of Toronto © Copyright by Isaac Quinn DuPont 2017 ii An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext Isaac Quinn DuPont Doctor of Philosophy Faculty of Information University of Toronto 2017 Abstract Tis dissertation is an archeological study of cryptography. It questions the validity of thinking about cryptography in familiar, instrumentalist terms, and instead reveals the ways that cryptography can been understood as writing, media, and computation. In this dissertation, I ofer a critique of the prevailing views of cryptography by tracing a number of long overlooked themes in its history, including the development of artifcial languages, machine translation, media, code, notation, silence, and order. Using an archeological method, I detail historical conditions of possibility and the technical a priori of cryptography. Te conditions of possibility are explored in three parts, where I rhetorically rewrite the conventional terms of art, namely, plaintext, encryption, and ciphertext. I argue that plaintext has historically been understood as kind of inscription or form of writing, and has been associated with the development of artifcial languages, and used to analyze and investigate the natural world. I argue that the technical a priori of plaintext, encryption, and ciphertext is constitutive of the syntactic iii and semantic properties detailed in Nelson Goodman’s theory of notation, as described in his Languages of Art. I argue that encryption (and its reverse, decryption) are deterministic modes of transcription, which have historically been thought of as the medium between plaintext and ciphertext.
    [Show full text]
  • Golden Fish an Intelligent Stream Cipher Fuse Memory Modules
    Golden Fish: An Intelligent Stream Cipher Fuse Memory Modules Lan Luo 1,2,QiongHai Dai 1,ZhiGuang Qin 2 ,ChunXiang Xu 2 1Broadband Networks & Digital Media Lab School of Information Science & Technology Automation Dep. Tsinghua University ,BeiJing, China,100084 2 School of Computer Science and Technology University of Electronic Science Technology of China, ChengDu, China, 610054 E-mail: [email protected] Abstract Furthermore, we can intelligent design the ciphers according to different network environments [4-5]. In In this paper, we use a high-order iterated function order to demonstrate our approach, we construct a generated by block cipher as the nonlinear filter to simple synchronous stream cipher, which provides a improve the security of stream cipher. Moreover, by significant flexibility for hardware implementations, combining the published rounds function in block with many desirable cryptographic advantages. The cipher and OFB as the nonlinear functional mode with security of the encryption and decryption are based on an extra memory module, we enable to control the the computational complexity, which is demonstrated nonlinear complexity of the design. This new approach by AES and NESSIE competition recently, where all fuses the block cipher operation mode with two the finalists fall into the category “no attack or memory modules in one stream cipher. The security of weakness demonstrated”, in which people can go for this design is proven by the both periodic and the simplest, and most elegant design comparing an nonlinear evaluation. The periods of this structure is more complicate and non-transparent one. To guaranteed by the traditional Linear Feedback Shift implement the idea above, we take output feedback Register design and the security of nonlinear mode (OFB) of the block cipher as the nonlinear filter characteristic is demonstrated by block cipher in stream cipher design.
    [Show full text]
  • A Review Analysis of Two Fish Algorithm Cryptography Quantum Computing
    IJCSN International Journal of Computer Science and Network, Volume 6, Issue 1, February 2017 ISSN (Online) : 2277-5420 www.IJCSN.org Impact Factor: 1.5 A Review Analysis of Two Fish Algorithm Cryptography Quantum Computing 1 Sukhvandna Abhi, 2 Umesh Sehgal 1, 2 GNA University Phagwara Abstract - In this analysis paper we tend to describe the evolution of cryptography ranging from the start of the twentieth century and continued into this day. Last 10 years quantum computing can begin to trounce everyday computers, resulting in breakthroughs in computer science. Specifically within the cryptography used from 1900 till the tip of war II.Quantum technologies supply immoderate secure communication sensors of unprecedented exactness and computers that square measure exponentially a lot of powerful than any mainframe for a given task. We compare the performance of the 5 AES finalists one kind of common software package platforms current 32-bit CPUs and high finish sixty four bit CPUs. Our intent is to indicate roughly however the algorithm’s speeds compare across a range of CPUs.The future of cryptography primarily based within the field of natural philosophy and by analyzing the hope to supply a allot of complete image of headed the 2 mail algorithms utilized in cryptography world. Keywords - Cryptography ancient secret writing system 1. Introduction regulated wherever the primary letter is substituted by the last letter, the second letter by the second to last letter then ryptography may be a subject that has been studied on. as a result of it's a monoalphabetic cipher and may and applied since ancient Roman times, and have only 1 doable key, this cipher is comparatively weak; Canalysis into higher coding ways continues to the but this wasn't a viable concern throughout its time as current day.
    [Show full text]
  • A Complete Bibliography of Publications in Cryptologia
    A Complete Bibliography of Publications in Cryptologia Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 04 September 2021 Version 3.64 Title word cross-reference 10016-8810 [?, ?]. 1221 [?]. 125 [?]. 15.00/$23.60.0 [?]. 15th [?, ?]. 16th [?]. 17-18 [?]. 18 [?]. 180-4 [?]. 1812 [?]. 18th (t; m)[?]. (t; n)[?, ?]. $10.00 [?]. $12.00 [?, ?, ?, ?, ?]. 18th-Century [?]. 1930s [?]. [?]. 128 [?]. $139.99 [?]. $15.00 [?]. $16.95 1939 [?]. 1940 [?, ?]. 1940s [?]. 1941 [?]. [?]. $16.96 [?]. $18.95 [?]. $24.00 [?]. 1942 [?]. 1943 [?]. 1945 [?, ?, ?, ?, ?]. $24.00/$34 [?]. $24.95 [?, ?]. $26.95 [?]. 1946 [?, ?]. 1950s [?]. 1970s [?]. 1980s [?]. $29.95 [?]. $30.95 [?]. $39 [?]. $43.39 [?]. 1989 [?]. 19th [?, ?]. $45.00 [?]. $5.95 [?]. $54.00 [?]. $54.95 [?]. $54.99 [?]. $6.50 [?]. $6.95 [?]. $69.00 2 [?, ?]. 200/220 [?]. 2000 [?]. 2004 [?, ?]. [?]. $69.95 [?]. $75.00 [?]. $89.95 [?]. th 2008 [?]. 2009 [?]. 2011 [?]. 2013 [?, ?]. [?]. A [?]. A3 [?, ?]. χ [?]. H [?]. k [?, ?]. M 2014 [?]. 2017 [?]. 2019 [?]. 20755-6886 [?, ?]. M 3 [?]. n [?, ?, ?]. [?]. 209 [?, ?, ?, ?, ?, ?]. 20th [?]. 21 [?]. 22 [?]. 220 [?]. 24-Hour [?, ?, ?]. 25 [?, ?]. -Bit [?]. -out-of- [?, ?]. -tests [?]. 25.00/$39.30 [?]. 25.00/839.30 [?]. 25A1 [?]. 25B [?]. 26 [?, ?]. 28147 [?]. 28147-89 000 [?]. 01Q [?, ?]. [?]. 285 [?]. 294 [?]. 2in [?, ?]. 2nd [?, ?, ?, ?]. 1 [?, ?, ?, ?]. 1-4398-1763-4 [?]. 1/2in [?, ?]. 10 [?]. 100 [?]. 10011-4211 [?]. 3 [?, ?, ?, ?]. 3/4in [?, ?]. 30 [?]. 310 1 2 [?, ?, ?, ?, ?, ?, ?]. 312 [?]. 325 [?]. 3336 [?, ?, ?, ?, ?, ?]. affine [?]. [?]. 35 [?]. 36 [?]. 3rd [?]. Afluisterstation [?, ?]. After [?]. Aftermath [?]. Again [?, ?]. Against 4 [?]. 40 [?]. 44 [?]. 45 [?]. 45th [?]. 47 [?]. [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?]. Age 4in [?, ?]. [?, ?]. Agencies [?]. Agency [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?].
    [Show full text]
  • George Lasry: Modern Cryptanalysis of Historical Ciphers
    Modern Cryptanalysis of Historical Ciphers November 1, 2019 George Lasry Agenda • Introduction – Motivation – Difficulty – Generic approaches • Case studies – Hagelin M-209 – Playfair – Double transposition – SIGABA George Lasry 2 Agenda • Introduction – Motivation – Difficulty – Generic approaches • Case studies – Hagelin M-209 – Playfair – Double transposition – SIGABA George Lasry 3 Motivation • Historical cryptanalysis • Undecrypted texts • Public challenges • Fun George Lasry 4 Difficulty - Factors • System design – Diffusion – Confusion – Weaknesses • Key – Key space/length • Ciphertext – Length – Language George Lasry 5 Difficulty Easy Moderate Hard Very hard Intractable? Monoalphabetic Playfair Playfair Playfair Fialka substitution (long ciphertext) (short ciphertext) (very short) Transposition Transposition ADFGVX Double transposition Double transposition (short key) (long key) (long random key) Vigenere Enigma Enigma SIGABA (long ciphertext) (short ciphertext) (known plaintext) Hagelin M-209 Hagelin M-209 (long ciphertext) (short ciphertext) Hagelin M-209 Sturgeon T52 Sturgeon T52 (known plaintext) (regular stepping) (irregular stepping) George Lasry 6 Generic Approaches - 1 Exhaustive Combinatorial Stochastic Search Search Search ● Simple brute force ● Backtracking ● Hill climbing ● Dictionary search ● Meet in the Middle ● Simulated annealing (MITM) ● Hybrid (e.g., nested) ● Match some ● Others (e.g., genetic constraints (e.g., ● Match some algorithms) known plaintext) constraints ● Or optimize a scoring ● Optimize a fitness
    [Show full text]
  • Female Mtis Celebrate Women's History Month
    A PUBLICATION OF THE 502nd AIR BASE WING JOINT BASE SAN ANTONIO-LACKLAND, TEXAS • Vol. 72 No. 13 • April 3, 2015 Female MTIs celebrate Women's History Month Photo by Benjamin Faske In honor of Women’s History Month, an all-female fl ight of military training instructors marched down the bomb run during the Basic Military Training graduation, March 27. All of the leadership positions for the entire parade were fi lled by female military training instructors. INSIDE | Commentary 2 News 3 Community Briefs 10 Sports 16 ONLINE | http://www.jbsa.af.mil PAGE 2 commentary TALESPINNER April 3, 2015 Joint Base San Antonio- Lackland Make a list, check it twice: Editorial Staff BRIG. GEN. BOB LABRUTTA 502ND AIR BASE WING/JBSA Ensure your day counts! COMMANDER TODD G. WHITE 502ND AIR BASE WING/JBSA By Lt. Col. David Woodley backs, and things will not always go our have given up. PUBLIC AFFAIRS DIRECTOR 71st OSS commander, Vance Air Force Base, Okla. way. It will happen more than we want. Why? Most set a goal of something like How do you overcome these obstacles? losing 50 pounds. Great goal, but it will OSCAR BAllADARES ach day is a gift, and we need to I use the 24 hour rule. not happen overnight. So most people JBSA-LacKLAND PUBLIC AFFAIRS CHIEF ensure we make every day count After a setback give yourself 24 hours will focus on losing that 50 pounds, and to the fullest. But with everything to get mad, reflect and accept. in four weeks, when they only lose eight SENIOR AIRMAN LYNSIE NICHOLS E EDITOR else in life, many people do not know Get mad that it happened.
    [Show full text]
  • Enigma Sim Manual
    ENIGMA SIM MANUAL About the Enigma Sim The program is an exact simulation of the 3-rotor Wehrmacht & Luftwaffe, the 3-rotor Kriegsmarine M3, and the famous 4-rotor Kriegsmarine M4 model of the German Enigma cipher machine, as they were used during World War II from 1939 until 1945. You can select between the three models, choose different rotors or 'Walzen', preset the rotor wiring positions or 'Ringstellung' and switch letters by using plugs or 'Stecker'. The internal wiring of all rotors is identical to those used by the Wehrmacht, Luftwaffe and Kriegsmarine. This simulator is therefore fully compatible with the real Enigma-machine and you can decipher original messages and encipher your own messages. This manual explains how to use the Enigma simulator, describes the message procedures as used by the German Armed Forces, a complete technical description and a brief history of the Enigma. For more information, please visit Cipher Machines & Cryptology http://users.telenet.be/d.rijmenants Copyright Information THE ENIGMA SIMULATOR SOFTWARE IS FREEWARE AND CAN BE USED AND DISTRIBUTED UNDER THE FOLLOWING RESTRICTIONS: IT IS STRICTLY FORBIDDEN TO USE THIS SOFTWARE OR COPIES OR PARTS OF IT FOR COMMERCIAL PURPOSES, OR TO SELL, LEASE OR MAKE PROFIT FROM THIS PROGRAM BY ANY MEANS. THIS SOFTWARE MAY ONLY BE USED IF YOU AGREE TO THESE CONDITIONS. Picture Gallery Copyrights: © Tom Perera, Enigma Museum - http://w1tp.com/mcpu.htm © KMi The Open University DISCLAIMER OF WARRANTIES THIS SOFTWARE AND THE ACCOMPANYING FILES ARE SUPPLIED "AS IS" AND WITHOUT WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, WITH RESPECT TO THIS PRODUCT, ITS QUALITY, PERFORMANCE, MERCHANTABILITY, OR FITNESS FOR ANY PARTICULAR PURPOSE.
    [Show full text]
  • Commodity Codes
    Commodity Codes Commodity Co Commodity Code Title 005 Abrasives 005-05 Abrasive Equipment and Tools 005-14 Abrasives, Coated: Cloth, Fiber, Sandpaper, etc. 005-21 Abrasives, Sandblasting, Metal 005-28 Abrasives, Sandblasting (other Than Metal) 005-42 Abrasives, Solid: Wheels, Stones, etc. 005-56 Abrasives, Tumbling (wheel) 005-63 Grinding and Polishing Compounds: Carborundum, Diamond, etc. (for Valve Grinding Compounds See Class 075) 005-70 Pumice Stone 005-75 Recycled Abrasives Products and Supplies 005-84 Steel Wool, Aluminum Wool, Copper Wool, and Lead Wool 010 Acoustical Tile, Insulating Materials, and Supplies 010-05 Acoustical Tile, All Types (including Recycled Types) 010-08 Acoustical Tile Accessories: Channels, Grids, Mounting Hardware, Rods, Runners, Suspension Brackets, Tees, Wall Angles, and Wires 010-09 Acoustical Tile Insulation 010-11 Adhesives and Cements, Acoustical Tile 010-14 Adhesives and Cements, Insulation 010-17 Aluminum Foil, etc. 010-30 Bands, Clips, and Wires (for Pipe Insulation) 010-38 Clips, Pins, etc. (for Duct Insulation) 010-41 Cork: Blocks, Boards, Sheets, etc. 010-45 Exterior Insulation and Finish Systems 010-53 Fiberglass: Batts, Blankets and Rolls Page 1 of 344 Commodity Co Commodity Code Title 010-56 Foam Glass: Blocks, Sheets, etc. 010-57 Foam-in-place Insulation: Phenolic, Urethane, etc. 010-59 Foam Plastics: Blocks, Boards, Sheets, etc. 010-62 Insulation, Interior 010-63 Insulation, Blown Type 010-64 Insulation, Loose Fill 010-65 Jacketing (for Insulation): Canvas, Osnaburg, etc. 010-70 Magnesia: Blocks, Sheets, etc. 010-72 Mineral Wool: Blankets, Blocks, Boards 010-75 Paints, Primers, Sealers, etc. (for Insulation) 010-76 Paper Type Insulation Material (cellulose, Etc.) 010-78 Pipe and Tubing Insulation, All Types 010-81 Preformed Insulation, All Types (for Ells, Tees, Valves, Etc.) 010-83 Recycled Insulation Materials and Supplies, All Types 010-84 Rubber Insulation 015 Addressing, Copying, Mimeograph, and Spirit Duplicating Machine Supplies: Chemicals, Inks, Paper, etc.
    [Show full text]
  • German Cipher Machines of World War II This Publication Is a Product of the National Security Agency History Program
    German Cipher Machines of World War II This publication is a product of the National Security Agency history program. It presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other U.S. government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email your request to [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755-6886 David Mowry served as a historian, researching and writ- ing histories in the Cryptologic History Series. He began his Agency career as a linguist in 1957 and later (1964- 1969) held positions as a linguist and cryptanalyst. From 1969 through 1981 he served in various technical and man- agerial positions. In the latter part of his career, he was a historian in the Center for Cryptologic History. Mr. Mowry held a BA with regional group major in Germany and Cen- tral Europe from the University of California at Berkeley. He passed away in 2005. Acknowledgment. The Center for Cryptologic History is grateful to mathematician David Perry for his thoughtful and thorough review of all technical material in this edition. Cover: German soldiers using an ENIGMA cipher machine in the field German Cipher Machines of World War II David P. Mowry Center for Cryptologic History National Security Agency Revised edition 2014 Introduction Along with breaking the Japanese diplomatic cryptosystem usu- ally referred to as “PURPLE,” probably the greatest example of Allied cryptanalytic success in World War II was the breaking of the German ENIGMA machine.
    [Show full text]