Codes, Ciphers and Spies: Tales of Military Intelligence in World War I
Autor John F. Dooleyen Limba Engleză Paperback – 7 apr 2016
In 1927, John Manly wrote a series of articles on his service in the Code and Cipher Section (MI-8) of the U.S. Army’s Military Intelligence Division (MID) during World War I. Published here for the first time, enhanced with references and annotations for additional context, these articles form the basis of an exciting exploration of American military intelligence and counter-espionage in 1917-1918. Illustrating the thoughts of prisoners of war, draftees, German spies, and ordinary Americans with secrets to hide, the messages deciphered by Manly provide a fascinating insight into the state of mind of a nation at war.
Preț: 183.57 lei
Nou
Puncte Express: 275
Preț estimativ în valută:
35.13€ • 36.49$ • 29.18£
35.13€ • 36.49$ • 29.18£
Carte disponibilă
Livrare economică 13-27 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319294148
ISBN-10: 3319294148
Pagini: 303
Ilustrații: XVII, 280 p. 39 illus., 6 illus. in color.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.42 kg
Ediția:1st ed. 2016
Editura: Springer International Publishing
Colecția Copernicus
Locul publicării:Cham, Switzerland
ISBN-10: 3319294148
Pagini: 303
Ilustrații: XVII, 280 p. 39 illus., 6 illus. in color.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.42 kg
Ediția:1st ed. 2016
Editura: Springer International Publishing
Colecția Copernicus
Locul publicării:Cham, Switzerland
Cuprins
An Introduction and a Few Words on Codes and Ciphers
PART I: The AEF
The Americans Embark: Getting to France 1917 – 1918
Introduction to Communications, Codes, and Ciphers in the AEF
The AEF and Colonel Moorman
Cryptology at the Front
The AEF: Breaking Codes and Ciphers
The AEF: German Codes and Ciphers
The AEF Fights: 1918
PART II: MI-8 and the Home Front
MI-8 and Civilian Messages
Civilian Correspondence: Foreign Letters and Hoaxes
Civilian Correspondence: Prisoners and Spies
Civilian Correspondence: Families and Love LettersPART III: German Spies in America, 1914 – 1918
Spies Among Us: The New York Cell, 1914 – 1915
Spies Among Us: Baltimore, Germs, Black Tom, and Kingsland, 1916 – 1917
The Waberski Cipher: A Spy is Condemned
Madame Victorica Arrives in New York
Madame Victorica and German Agents in the U.S.
More German Spies
Madame Victorica and Invisible Inks
Madame Victorica – Captured!
Part IV: Epilogue
Epilogue
PART I: The AEF
The Americans Embark: Getting to France 1917 – 1918
Introduction to Communications, Codes, and Ciphers in the AEF
The AEF and Colonel Moorman
Cryptology at the Front
The AEF: Breaking Codes and Ciphers
The AEF: German Codes and Ciphers
The AEF Fights: 1918
PART II: MI-8 and the Home Front
MI-8 and Civilian Messages
Civilian Correspondence: Foreign Letters and Hoaxes
Civilian Correspondence: Prisoners and Spies
Civilian Correspondence: Families and Love LettersPART III: German Spies in America, 1914 – 1918
Spies Among Us: The New York Cell, 1914 – 1915
Spies Among Us: Baltimore, Germs, Black Tom, and Kingsland, 1916 – 1917
The Waberski Cipher: A Spy is Condemned
Madame Victorica Arrives in New York
Madame Victorica and German Agents in the U.S.
More German Spies
Madame Victorica and Invisible Inks
Madame Victorica – Captured!
Part IV: Epilogue
Epilogue
Recenzii
“There is significant explanation of how codes and ciphers were constructed and solved, how the use of mathematics regulated code breaking, and the process of producing and distributing thousands of code books during the war. This volume will be of great interest to faculty and students in this specialized subject area. Summing Up: Recommended. Upper-division undergraduates through researchers and faculty.” (D. K. Blewett, Choice, Vol. 54 (3), November, 2016)
Notă biografică
John F. Dooley is the William and Marilyn Ingersoll Professor of Computer Science at Knox College in Galesburg, Illinois. Before returning to teaching in 2001, he spent more than 15 years in the software industry as a developer, designer, and manager working for companies such as Bell Telephone Laboratories, McDonnell Douglas, IBM, and Motorola. Since 2004 his main research interest has been in the history of American cryptology, particularly during the inter-war period. His previous publications include the Springer titles A Brief History of Cryptology and Cryptographic Algorithms and Software Development and Professional Practice.
Textul de pe ultima copertă
When the United States declared war on Germany in April 1917, it was woefully unprepared to wage a modern war. Whereas their European counterparts already had three years of experience in using code and cipher systems in the war, American cryptologists had to help in the building of a military intelligence unit from scratch. This book relates the personal experiences of one such character, providing a uniquely American perspective on the Great War. It is a story of spies, coded letters, plots to blow up ships and munitions plants, secret inks, arms smuggling, treason, and desperate battlefield messages. Yet it all begins with a college English professor and Chaucer scholar named John Mathews Manly.
In 1927, John Manly wrote a series of articles on his service in the Code and Cipher Section (MI-8) of the U.S. Army’s Military Intelligence Division (MID) during World War I. Published here for the first time, enhanced with references and annotations for additional context, these articles form the basis of an exciting exploration of American military intelligence and counter-espionage in 1917-1918. Illustrating the thoughts of prisoners of war, draftees, German spies, and ordinary Americans with secrets to hide, the messages deciphered by Manly provide a fascinating insight into the state of mind of a nation at war.
John F. Dooley is the William and Marilyn Ingersoll Professor of Computer Science at Knox College in Galesburg, Illinois. Before returning to teaching in 2001, he spent more than 15 years in the software industry as a developer, designer, and manager working for companies such as Bell Telephone Laboratories, McDonnell Douglas, IBM, and Motorola. Since 2004 his main research interest has been in the history of American cryptology, particularly during the inter-war period. His previous publications include the Springer titles A Brief History of Cryptology and Cryptographic Algorithms and Software Development and Professional Practice.
John F. Dooley is the William and Marilyn Ingersoll Professor of Computer Science at Knox College in Galesburg, Illinois. Before returning to teaching in 2001, he spent more than 15 years in the software industry as a developer, designer, and manager working for companies such as Bell Telephone Laboratories, McDonnell Douglas, IBM, and Motorola. Since 2004 his main research interest has been in the history of American cryptology, particularly during the inter-war period. His previous publications include the Springer titles A Brief History of Cryptology and Cryptographic Algorithms and Software Development and Professional Practice.
Caracteristici
Provides a timely addition to scholarship in the area, at the approach of the 100th anniversary of American participation in WWI
Presents many interesting stories on the work of MI-8 on the home front, on the AEF in France, and on the cryptographic work of G2.A6
Describes a fascinating set of characters and tales from the history of German spies and sabotage in the US during the war
Includes supplementary material: sn.pub/extras
Presents many interesting stories on the work of MI-8 on the home front, on the AEF in France, and on the cryptographic work of G2.A6
Describes a fascinating set of characters and tales from the history of German spies and sabotage in the US during the war
Includes supplementary material: sn.pub/extras