Codes, Ciphers and Spies : Tales of Military Intelligence in World War I


John F. Dooley
Bok Engelsk 2016 · Electronic books.
Omfang
1 online resource (284 p.)
Opplysninger
Description based upon print version of record.. - Preface; Acknowledgments; Photo Credits; Contents; Chapter 1: Introduction; 1.1 John Matthews Manly: Early Life; 1.2 Manly and Chaucer; 1.3 Manly and Cryptology; 1.4 Manly in MI-8; 1.5 Manly After the War; 1.6 The Collier's Articles; 1.7 A Few Words on Codes and Ciphers; 1.8 Codes; 1.9 Ciphers; 1.10 Substitution Ciphers; 1.11 Transposition Ciphers; References; Part I: The AEF; Chapter 2: The Americans Embark; 2.1 America Stumbles into War; 2.2 The Americans Arrive; 2.3 American Military Intelligence Awakens; 2.4 Herbert Yardley and MI-8; References. - 13.5 Failure and RecallReferences; Chapter 14: Spies Among Us: Baltimore, Germs, Black Tom, and Kingsland (1916-1917); 14.1 Baltimore Heats Up; 14.2 Germs; 14.3 Herrmann and Hinsch Divide the Work; 14.4 Black Tom Explodes; 14.5 Kingsland Burns; References; Chapter 15: John Manly and the Waberski Cipher Solution; References; Chapter 16: Madame Victorica Arrives in New York; References; Chapter 17: Madame Victorica and German Agents in the United States; References; Chapter 18: More German Spies; 18.1 The Journalist; 18.2 The Turkish Beauty; 18.3 Fraülein Doktor; References. - 8.5 Aisne-Marne8.6 St. Mihiel; 8.7 Meuse-Argonne; References; Part II: MI-8 and the Home Front; Chapter 9: MI-8 and Civilian Messages; References; Chapter 10: Civilian Correspondence: Foreign Letters and Hoaxes; Reference; Chapter 11: Civilian Correspondence: Families and Love Letters; Chapter 12: Civilian Correspondence: Prisoners and Spies; References; Part III: German Spies in America, 1914-1918; Chapter 13: Spies Among Us: The New York Cell, 1914-1915; 13.1 Bernstorff Builds a Spy Network; 13.2 von Papen Tries - and Fails; 13.3 The Dark Invader Arrives; 13.4 The Minister without Portfolio. - Chapter 19: Madame Victorica and Invisible InksReferences; Chapter 20: Madame Victorica: Captured!; References; Part IV: Epilogue; Chapter 21: Epilogue; References; Bibliography and Further Reading; Index. - Chapter 3: Overview of Cryptology and the ArmyReferences; Chapter 4: The AEF and Colonel Moorman; 4.1 Ciphers ; 4.2 Codes; References; Chapter 5: Cryptology at the Front and at Home; 5.1 Allied Codes and Ciphers in France; 5.2 Cryptanalyzing a Playfair Cipher; 5.3 American Codes and Ciphers in France; 5.4 German Codes and Ciphers in France; References; Chapter 6: American Codes and Ciphers in France; References; Chapter 7: Painvin Breaks a Cipher; References; Chapter 8: The AEF Fights; 8.1 Germany's Final Offensives; 8.2 Cantigny; 8.3 Belleau Wood; 8.4 Chateau Thierry and the Marne. - When the United States declared war on Germany in April 1917, it was woefully unprepared to wage a modern war. Whereas their European counterparts already had three years of experience in using code and cipher systems in the war, American cryptologists had to help in the building of a military intelligence unit from scratch. This book relates the personal experiences of one such character, providing a uniquely American perspective on the Great War. It is a story of spies, coded letters, plots to blow up ships and munitions plants, secret inks, arms smuggling, treason, and desperate battlefield messages. Yet it all begins with a college English professor and Chaucer scholar named John Mathews Manly. In 1927, John Manly wrote a series of articles on his service in the Code and Cipher Section (MI-8) of the U.S. Army’s Military Intelligence Division (MID) during World War I. Published here for the first time, enhanced with references and annotations for additional context, these articles form the basis of an exciting exploration of American military intelligence and counter-espionage in 1917-1918. Illustrating the thoughts of prisoners of war, draftees, German spies, and ordinary Americans with secrets to hide, the messages deciphered by Manly provide a fascinating insight into the state of mind of a nation at war. John F. Dooley is the William and Marilyn Ingersoll Professor of Computer Science at Knox College in Galesburg, Illinois. Before returning to teaching in 2001, he spent more than 15 years in the software industry as a developer, designer, and manager working for companies such as Bell Telephone Laboratories, McDonnell Douglas, IBM, and Motorola. Since 2004 his main research interest has been in the history of American cryptology, particularly during the inter-war period. His previous publications include the Springer titles A Brief History of Cryptology and Cryptographic Algorithms and Software Development and Professional Practice.
Emner
Sjanger
Dewey
ISBN
9783319294148 (pbk.) : : £22.00

Bibliotek som har denne