Book Read Free

The Secret in Building 26

Page 31

by Jim DeBrosse


  Naval Security Group Command, Washington, D.C.

  Princeton University Alumni Center and Archives, Princeton, N.J.

  Public Record Office, Kew, England

  Rockefeller Archives, Pocantico Hills, N.Y.

  Smithsonian Institution, Washington, D.C.

  U.S. Army Record Center, St. Louis, Mo.

  U.S. Bureau of Prisons, Washington, D.C.

  U.S. Centennial of Flight Commission, Washington, D.C.

  U.S. Central Intelligence Agency, Washington, D.C.

  U.S. Department of Justice, Washington, D.C.

  U.S. National Archives, College Park, Md., Suitland, Md., and Washington, D.C.

  U.S. Navy Legal Branch, Washington, D.C.

  U.S. Patent Office, Washington, D.C.

  U.S. Selective Service Administration, Arlington, Va.

  U.S. Social Security Administration, Baltimore, Md.

  University of Wyoming, American Heritage Center, Laramie, Wy.

  Interviews

  Debbie Desch Anderson, by author, January, November, and December 2000; January and November 2001; January, May, June, and August 2002; and June 2003

  Phil Bochicchio, by author, January and October 2001

  Dorothy Braswell, by author, January 2001

  Carmelita Ford Bruce, by author, August 12, 2002

  Ralph E. Cook, by author, August 2002

  Joan Bert Davis, by author, June 2002

  Joseph Desch and Robert Mumma, by Henry Tropp for the Smithsonian Institution, January 17–18, 1973

  Harold L. Ditmer, by author, June 8, 2002

  Joseph J. Eachus, by author, February 22 and August 9, 2002

  Evelyn Urich Einfeldt, by author, January 2001 and July 2002

  Kristina Engstrom, self-interview, November 29, 1992, American Heritage Center, University of Wyoming, Laramie, Wy., Clay Blair Papers, Box 168, File 15

  Susan Unger Eskey, by author, January 2001 and April 2002

  Peg Fiehtner, by author, January 2002 and July 2002

  Dorothy Firor, by author, January 2001

  Vince Gulden, by Frederik Nebeker for IEEE, September 16, 1995

  John R. Hamilton, by author, August 2002

  Robert Hogan, by author, April 2002

  Lou Holland, by author, 1999–2000

  John Hourigan, by author, June 2003

  Veronica M. Hulick, by author, October 2001

  Mary Lorraine Johnson, by U.S. Naval Cryptologic Veterans Association, 1985

  Jack Kern, by Frederik Nebeker for IEEE, September 14, 1995

  Alvida Lockwood, by author, July 2002

  Don Lowden, by Frederik Nebeker for IEEE, September 17, 1995; by author, January 2002

  Alexander C. “Goose” McAuslun, by author, November 2000

  Gilman McDonald, by author, July and August 2002

  Bruce Meader, by Clay Blair, n.d., American Heritage Center, University of Wyoming, Laramie, Wy., Clay Blair Papers, Box 160

  Son of James Montgomery, Jr. (who asked not to be identified), by author, January 1989

  Mike Moran, by author, December 2000

  Robert Mumma, by Frederik Nebeker for IEEE, September 15, 1995; by author, November 2000

  Carrell I. Pinnell, by author, September 2002

  Catherine Racz, by author, December 2000 and January 2001

  Edward P. Rego, by author, February 2002

  Carl Rench, by Frederik Nebeker for IEEE, September 16, 1995; by author, November 2000

  Betty Bemis Robarts, by author, January 2001

  George M. Robb, by author, August 2002

  Lou Sandor, by author, November 2000

  Raymond Torchon, by author, October 2001

  Evelyn Vogel, by author, January 2001 and July 2002

  James Henry Wakelin, Jr., by Arthur L. Norberg for the Charles Babbage Institute, February 27, 1986

  Jeffrey Wenger, by author, January 2002

  Books and Dissertations

  Alsmeyer, Marie Bennett. The Way of the WAVES: Women in the Navy. Conway, Ark.: HAMBA Press, 1981.

  Alvarez, David. Secret Messages: Codebreaking and American Diplomacy, 1930–1945. Lawrence: University of Kansas Press, 2000.

  Alvarez, David, ed. Allied and Axis Signals Intelligence in World War II. London: Frank Cass, 1999.

  Bamford, James. The Puzzle Palace: A Report on America’s Most Secret Agency. New York: Penguin, 1983.

  Bath, Alan Harris. Tracking the Axis Enemy: The Triumph of Anglo-American Naval Intelligence. Lawrence: University of Kansas Press, 1998.

  Bauer, Friedrich L. Decrypted Secrets: Methods and Maxims of Cryptology. 2d ed. New York: Springer, 2000.

  Benson, Robert Louis. A History of U.S. Communications Intelligence During World War II: Policy and Administration. United States Cryptologic History, Series 4, World War II, vol. 8. Fort Meade, Md.: NSA, Center for Cryptologic History, 1997.

  Benson, Robert Louis, and Michael Warner, eds. Venona: Soviet Espionage and the American Response, 1939–1957. Washington, D.C.: NSA and CIA, 1996.

  Bernstein, Mark. Grand Eccentrics: Dayton and the Invention of America. Wilmington, Ohio: Orange Frazer Press, 1996.

  Blair, Clay. Hitler’s U-boat War: The Hunters, 1939–1942. New York: Random House, 1996.

  ———. Hitler’s U-boat War: The Hunted, 1942–1945. New York: Random House, 1998.

  Bray, Jeffrey. Ultra in the Atlantic. Vol. 1, Allied Communication Intelligence and the Battle of the Atlantic. Laguna Hills, Calif.: Aegean Park Press, 1994.

  ———, ed. Ultra in the Atlantic. Vol. 2, U-boat Operations. Laguna Hills, Calif.: Aegean Park Press, 1994.

  ———, ed. Ultra in the Atlantic. Vol. 3, German Naval Communication Intelligence. Laguna Hills, Calif.: Aegean Park Press, 1994.

  ———, ed. Ultra in the Atlantic. Vol. 4, Technical Intelligence from Allied Communications Intelligence. Laguna Hills, Calif.: Aegean Park Press, 1994.

  Budiansky, Stephen. Battle of Wits: The Complete Story of Codebreaking in World War II. New York: Free Press, 2000.

  Burke, Colin. Information and Secrecy: Vannevar Bush, Ultra, and the Other Memex. Lanham, Md.: Scarecrow Press, 1994.

  Bush, Vannevar. Pieces of the Action. New York: William Morrow, 1970.

  Butler, Elizabeth Allen. Navy WAVES. Charlottesville, Va.: Wayside Press, 1988.

  Campbell-Kelly, Martin, and William Aspray. Computer: A History of the Information Machine. New York: Basic Books, 1996.

  Dalton, Curt. Home Sweet Home Front: Dayton During World War II. Dayton, Ohio: self-published, 2000.

  Deavours, Cipher A., and Louis Kruh. Machine Cryptography and Modern Cryptanalysis. Dedham, Mass.: Artech House, 1985.

  ———. Cryptology: Yesterday, Today, and Tomorrow. Boston: Artech House, 1987.

  Descriptive Dictionary of Cryptologic Terms, Including Foreign Terms. Laguna Hills, Calif.: Aegean Park Press, 1997.

  Dorwart, Jeffery M. Conflict of Duty: The U.S. Navy’s Intelligence Dilemma, 1919–1945. Annapolis, Md.: Naval Institute Press, 1983.

  Drea, Edward J. MacArthur’s ULTRA: Codebreaking and the War Against Japan, 1942–1945. Lawrence: University of Kansas Press, 1992.

  Ebbert, Jean, and Marie-Beth Hall. Crossed Currents: Navy Women from WWI to Tailhook. Washington, D.C.: Brassey’s, 1993.

  Enever, Ted. Britain’s Best Kept Secret: Ultra’s Base at Bletchley Park. Stroud, England: A. Sutton, 1994.

  Ensign, Eric S. Intelligence in the Rum War at Sea, 1920–1933. Washington, D.C.: Joint Military College, 2001.

  Farago, Ladislas. The Tenth Fleet. New York: Ivan Obolensky, 1962.

  Gallery, Daniel V. U-505. New York: Warner Books, 1967.

  Gardner, W.J.R. Decoding History: The Battle of the Atlantic and Ultra. Annapolis, Md.: Naval Institute Press, 1999.

  Hancock, Joy Bright. Lady in the Navy: A Personal Reminiscence. Annapolis, Md.: Naval Institute Press, 1972.

  Harper, Stephan. Capturing Enigma: How HMS Petard Seized the German Naval Codes. Stroud, England: A. Sutt
on, 1999.

  Hatch, David, and Robert Louis Benson. The Korean War: The SIGINT Background. United States Cryptologic History, Series 5, The Early Postwar Period, 1945–1952, vol. 3. Fort Meade, Md.: NSA, Center for Cryptologic History, 2000.

  Haynes, John Earl. Venona: Decoding Soviet Espionage in America. New Haven: Yale University Press, 1999.

  Hinsley F. H., and Alan Stripp, eds. Codebreakers: The Inside Story of Bletchley Park. New York: Oxford University Press, 1993.

  Hinsley, F. H., et al. British Intelligence in the Second World War. Vols. 1–3. London: Her Majesty’s Stationery Office, 1979–1984.

  Historical Statistics of the United States: Colonial Times to 1951. Washington, D.C.: GPO, 1961.

  Hodges, Andrew. Alan Turing: The Enigma. New York: Walker and Company, 2000.

  Holm, Jeanne. Women in the Military: An Unfinished Revolution. Novato, Calif.: Presidio Press, 1982.

  Holmes, Wilfred Jay. Double-Edged Secret: U.S. Naval Operations in the Pacific During World War II. Annapolis, Md.: Naval Institute Press, 1979.

  Holtwick, Jack. Naval Security Group History to WWII. Part 1. Washington, D.C.: U.S. Naval Historical Center, Operational Archives.

  Intelligence Reports on the War in the Atlantic, 1942–1945. Wilmington, Del.: Michael Glazier, 1979.

  Kahn, David. Seizing the Enigma: The Race to Break the German U-boat Codes, 1939–1943. Boston: Houghton-Mifflin, 1991.

  ———. The Codebreakers: The Story of Secret Writing. New York: Scribner’s, 1996.

  Kelley, Stephen J. Big Machines. Laguna Hills, Calif.: Aegean Park Press, 2001.

  Knepper, George W. Ohio and Its People. Kent, Ohio: Kent State University Press, 1989.

  Layton, Edwin T. And I Was There: Pearl Harbor and Midway—Breaking the Secrets. New York: William Morrow, 1985.

  Leslie, Stuart W. Boss Kettering. New York: Columbia University Press, 1983.

  Lewis, Graydon, ed. A History of Communications Intelligence in the United States, with Emphasis on the United States Navy. Eugene, Oreg.: NCVA, 1982.

  Listening to the Rumrunners. Fort Meade, Md.: NSA, Center for Cryptologic History, n.d.

  Love, Robert W., Jr. History of the U.S. Navy, 1942–1991. Harrisburg, Pa.: Stackpole, 1992.

  McAfee, Mildred, et al. The Waves in World War II. Annapolis, Md.: Naval Institute Press, 1971–1979.

  ———. Recollections of Women Officers Who Served in the U.S. Navy and the U.S. Coast Guard in World War II, Including WAVES. Annapolis, Md.: Naval Institute Press, 1979.

  McGinnis, George P., ed. U.S. Naval Cryptologic Veterans Association. Paducah, Ky.: Turner Publishing, 1996.

  Marcosson, Isaac F. Colonel Deeds: Industrial Builder. New York: Dodd Mead, 1947.

  Mead, Frank Spencer. Handbook of Denominations of the United States. Nashville: Abingdon Press, 1990.

  Meigs, Montgomery C. Slide Rules and Submarines: American Scientists and Subsurface Warfare in World War II. Washington, D.C.: National Defense University Press, 1990.

  Miller, Ray A. The Cryptographic Mathematics of Enigma. Fort Meade, Md.: NSA, Center for Cryptologic History, 2001.

  Morison, Samuel Eliot. History of United States Naval Operations in World War II. Vol. 1, The Battle of the Atlantic: September 1939–May 1943. Boston: Little, Brown, 1962.

  ———. History of United States Naval Operations in World War II. Vol. 10, The Atlantic Battle Won: May 1943–May 1945. Boston: Little, Brown, 1962.

  Mulligan, Timothy. Neither Sharks nor Wolves: The Men of Nazi Germany’s U-boat Arm, 1939–1945. Annapolis, Md.: Naval Institute Press, 1999.

  NSA, Center for Cryptologic History. Solving the Enigma: History of the Cryptanalytic Bombe. Fort Meade, Md., ca. 2000.

  Obermiller, Philip J., et al. Appalachian Odyssey: Historical Perspectives on the Great Migration. Westport, Conn.: Praeger, 2000.

  Owens, Larry. “Straight Thinking: Vannevar Bush and the Culture of American Engineering.” Ph.D. thesis, Princeton University, 1987.

  Parker, Frederick D. Pearl Harbor Revisited: United States Navy Communications Intelligence, 1924–1941. United States Cryptologic History, Series 4, World War II, vol. 6. Fort Meade, Md.: NSA, Center for Cryptologic History, 1994.

  Parrish, Thomas. The Ultra Americans: The United States’ Role in Breaking the Nazi Codes. New York: Stein and Day, 1986.

  Persico, Joseph E. Roosevelt’s Secret War: FDR and World War II Espionage. New York: Random House, 2001.

  Philby, Kim. My Silent War. New York: Grove Press, 1968.

  Prados, John. Combined Fleet Decoded: The Secret History of American Intelligence and the Japanese Navy in WWII. New York: Random House, 1995.

  Rodgers, William. Think: A Biography of the Watsons and IBM. New York: Stein and Day, 1969.

  Rohwer, Jurgen. Critical Convoy Battles of March 1943: The Battle for HX229/SC122. London: Ian Allen, 1977.

  Roskill, S. W. The War at Sea, 1939–1945. Vol. 1, The Defensive. London: Her Majesty’s Stationery Office, 1954.

  ———. The Navy at War, 1939–1945. London: Collins, 1960.

  Safford, Laurance F., and J. N. Wenger. U.S. Naval Communications Intelligence Activities. Laguna Hills, Calif.: Aegean Park Press, 1993.

  Sebag-Montefiore, Hugh. Enigma: The Battle for the Code. London: Weidenfeld and Nicolson, 2000.

  Singh, Simon. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. New York: Anchor Books, 1999.

  Smith, Bradley F. The Ultra-Magic Deals: And the Most Secret Relationship, 1940–1946. Novato, Calif.: Presidio Press, 1993.

  ———. Sharing Secrets with Stalin: How the Allies Traded Intelligence, 1941–1945. Lawrence: University of Kansas Press, 1996.

  Smith, Michael. Station X: Decoding Nazi Secrets. New York: TV Books, 1999.

  ———. The Emperor’s Codes: The Breaking of Japan’s Secret Ciphers. New York: Arcade, 2000.

  Smith, Michael, and Ralph Erskine, eds. Action This Day. New York: Bantam, 2001.

  Syrett, David. The Defeat of the German U-boats: The Battle of the Atlantic. Columbia: University of South Carolina Press, 1994.

  Syrett, David, ed. The Battle of the Atlantic and Signals Intelligence: U-boat Situations and Trends, 1941–1945. Ashgate, Hampshire, England: Aldershot, 1998.

  Tidman, Keith R. The Operations Evaluation Group: A History of Naval Operations Analysis. Annapolis, Md.: Naval Institute Press, 1984.

  Tompkins, C. B., et al. Engineering Research Associates, High Speed Computing Devices. New York: McGraw-Hill, 1950.

  Treadwell, Mattie E. The Women’s Army Corps. United States Army in World War II, Special Studies. Washington, D.C.: Office of the Chief of Military History, 1954.

  West, Nigel. GCHQ: The Secret Wireless War, 1900–1986. London: Weidenfeld and Nicolson, 1986.

  West, Nigel, and Oleg Tsarev. The Crown Jewels: The British Secrets at the Heart of the KGB Archives. New Haven: Yale University Press, 1998.

  Whitehead, Don. The FBI Story: A Report to the People. New York: Random House, 1956.

  Williams, Kathleen Broome. Secret Weapon: U.S. High-Frequency Direction Finding in the Battle of the Atlantic. Annapolis, Md.: Naval Institute Press, 1996.

  Winton, John. Ultra at Sea: How Breaking the Nazi Code Affected Allied Naval Strategy During World War II. New York: William Morrow, 1988.

  ———. Ultra in the Pacific: How Breaking Japanese Codes and Cyphers Affected Naval Operations Against Japan, 1941–1945. London: Leo Cooper, 1993.

  Yardley, Herbert O. The American Black Chamber. Laguna Hills, Calif.: Aegean Park Press, 1988.

  Y’Blood, William T. Hunter-Killer: U.S. Escort Carriers in the Battle of the Atlantic. Washington, D.C.: U.S. Naval Institute, 1983.

  Zachary, G. Pascal. Endless Frontier: Vannevar Bush, Engineer of the American Century. New York: Free Press, 1997.

  Published Articles and Web Publications

  Alvarez, David. “Beyond Venona: American Signal Intelligence in the Early Cold War.” Intelligence an
d National Security 14.2 (summer 1999).

  Bowerman, Thomas R., and Agnes Bridger. “The Battle of the Atlantic.” WWII U.S. Navy Armed Guard and WW II Merchant Marine website, http://armed-guard.com.

  Buckland, Michael. “Emanuel Goldberg, Electronic Document Retrieval, and Vannevar Bush’s Memex.” Journal of the American Society for Information Science 43.4 (May 1992).

  Budiansky, Stephen. “The Difficult Beginnings of U.S.-British Codebreaking Cooperation.” Intelligence and National Security 15.2 (summer 2000).

  Burke, Colin. “An Introduction to an Historical Computer Document: The 1946 Pendergrass Report, Cryptanalysis, and the Digital Computer.” Cryptologia 17.2 (April 1993).

  Burke, Colin, and Ralph Erskine. Letters to the editor. Cryptologia 15.2 (April 1991).

  Chandler, W. W. “The Installation and Maintenance of the Colossus.” Annals of the History of Computing 5.3 (July 1983).

  Coombs, Allen W. M. “The Making of Colossus.” Annals of the History of Computing 5.3 (July 1983).

  Crawford, David J. “The Autoscritcher and the Superscritcher.” Annals of the History of Computing 14.3 (July 1992).

  Currier, Prescott. “My ‘Purple’ Trip to England in 1941.” Cryptologia 20.3 (July 1996).

  Davies, Donald W. “ ‘The Bombe’: A Remarkable Logic Machine.” Cryptologia 23.2 (April 1999).

  ———. “Effectiveness of the Diagonal Board.” Cryptologia 23.3 (July 1999).

  Deavours, Cipher A. “The Black Chamber: La Methods des Batons.” Cryptologia 4.4 (October 1980).

  ———. “The Autoscritcher.” Cryptologia 19.3 (April 1995).

  Deavours, Cipher A., and Louis Kruh. “The Turing Bombe: Was It Enough?” Cryptologia 14.4 (October 1990).

  DeBrosse, Jim. “NCR and WWII: The Untold Story.” Dayton Daily News, an eight-part series, February 25–March 4, 2001.

  Drea, Edward J. “Were the Japanese Army Codes Secure?” Cryptologia 19.2 (April 1995).

  Erskine, Ralph. “Ultra and Some U.S. Navy Carrier Operations.” Cryptologia 19.1 (January 1995).

  ———. “Naval Enigma: An Astonishing Blunder.” Intelligence and National Security 11.3 (fall 1996).

  ———. “The First Naval Enigma Decrypts of World War II.” Cryptologia 21.1 (January 1997).

  ———. “Kriegsmarine Short Signal Systems and How Bletchley Park Exploited Them.” Cryptologia 23.1 (January 1999).

 

‹ Prev