Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Codes, Ciphers and Spies (eBook)

Tales of Military Intelligence in World War I

(Autor)

eBook Download: PDF
2016 | 1st ed. 2016
XVII, 280 Seiten
Springer International Publishing (Verlag)
978-3-319-29415-5 (ISBN)

Lese- und Medienproben

Codes, Ciphers and Spies - John F. Dooley
Systemvoraussetzungen
32,09 inkl. MwSt
(CHF 31,35)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

When the United States declared war on Germany in April 1917, it was woefully unprepared to wage a modern war. Whereas their European counterparts already had three years of experience in using code and cipher systems in the war, American cryptologists had to help in the building of a military intelligence unit from scratch. This book relates the personal experiences of one such character, providing a uniquely American perspective on the Great War. It is a story of spies, coded letters, plots to blow up ships and munitions plants, secret inks, arms smuggling, treason, and desperate battlefield messages. Yet it all begins with a college English professor and Chaucer scholar named John Mathews Manly.

In 1927, John Manly wrote a series of articles on his service in the Code and Cipher Section (MI-8) of the U.S. Army's Military Intelligence Division (MID) during World War I. Published here for the first time, enhanced with references and annotations for additional context, these articles form the basis of an exciting exploration of American military intelligence and counter-espionage in 1917-1918. Illustrating the thoughts of prisoners of war, draftees, German spies, and ordinary Americans with secrets to hide, the messages deciphered by Manly provide a fascinating insight into the state of mind of a nation at war.



John F. Dooley is the William and Marilyn Ingersoll Professor of Computer Science at Knox College in Galesburg, Illinois. Before returning to teaching in 2001, he spent more than 15 years in the software industry as a developer, designer, and manager working for companies such as Bell Telephone Laboratories, McDonnell Douglas, IBM, and Motorola. Since 2004 his main research interest has been in the history of American cryptology, particularly during the inter-war period. His previous publications include the Springer titles A Brief History of Cryptology and Cryptographic Algorithms and Software Development and Professional Practice.

John F. Dooley is the William and Marilyn Ingersoll Professor of Computer Science at Knox College in Galesburg, Illinois. Before returning to teaching in 2001, he spent more than 15 years in the software industry as a developer, designer, and manager working for companies such as Bell Telephone Laboratories, McDonnell Douglas, IBM, and Motorola. Since 2004 his main research interest has been in the history of American cryptology, particularly during the inter-war period. His previous publications include the Springer titles A Brief History of Cryptology and Cryptographic Algorithms and Software Development and Professional Practice.

An Introduction and a Few Words on Codes and CiphersPART I: The AEFThe Americans Embark: Getting to France 1917 – 1918Introduction to Communications, Codes, and Ciphers in the AEFThe AEF and Colonel MoormanCryptology at the FrontThe AEF: Breaking Codes and CiphersThe AEF: German Codes and CiphersThe AEF Fights: 1918PART II: MI-8 and the Home FrontMI-8 and Civilian MessagesCivilian Correspondence: Foreign Letters and HoaxesCivilian Correspondence: Prisoners and SpiesCivilian Correspondence: Families and Love LettersPART III: German Spies in America, 1914 – 1918Spies Among Us: The New York Cell, 1914 – 1915Spies Among Us: Baltimore, Germs, Black Tom, and Kingsland, 1916 – 1917The Waberski Cipher: A Spy is CondemnedMadame Victorica Arrives in New YorkMadame Victorica and German Agents in the U.S.More German SpiesMadame Victorica and Invisible InksMadame Victorica – Captured!Part IV: EpilogueEpilogue

Erscheint lt. Verlag 31.3.2016
Zusatzinfo XVII, 280 p. 39 illus., 6 illus. in color.
Verlagsort Cham
Sprache englisch
Themenwelt Mathematik / Informatik Informatik
Naturwissenschaften
Technik
Schlagworte cryptography • Cryptology • Espionage • John Matthews Manly • Military Intelligence • Secret Codes and Ciphers • World War I
ISBN-10 3-319-29415-6 / 3319294156
ISBN-13 978-3-319-29415-5 / 9783319294155
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich

von Herbert Voß

eBook Download (2025)
Lehmanns Media (Verlag)
CHF 19,50
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel …

eBook Download (2024)
Carl Hanser Fachbuchverlag
CHF 68,35