Who Broke the Wartime Codes?
()
About this ebook
Read more from Nicola Barber
Who Journeyed on the Mayflower? Rating: 1 out of 5 stars1/5Lost Cities Rating: 0 out of 5 stars0 ratingsChurchill and the Battle of Britain: Days of Decision Rating: 0 out of 5 stars0 ratingsTomb Explorers Rating: 0 out of 5 stars0 ratings
Related to Who Broke the Wartime Codes?
Related ebooks
Deceiving Hitler: Double-Cross and Deception in World War II Rating: 4 out of 5 stars4/5Before Bletchley Park: The Codebreakers of the First World War Rating: 0 out of 5 stars0 ratingsX, Y and Z: The Real Story of How Enigma Was Broken Rating: 5 out of 5 stars5/5Colossus: Bletchley Park's Greatest Secret Rating: 3 out of 5 stars3/5Voices of the Codebreakers: Personal Accounts of the Secret Heroes of World War II Rating: 4 out of 5 stars4/5Undercover Tales of World War II Rating: 4 out of 5 stars4/5Letters from the Blitz: Telling America the Truth about the British Experience of War Rating: 0 out of 5 stars0 ratingsBritain's Best Kept Secret: Ultra's Base at Bletchley Park Rating: 4 out of 5 stars4/5Hitler's Secret Army Rating: 4 out of 5 stars4/5Enigma: The Battle for the Code Rating: 4 out of 5 stars4/5Fugitives: A History of Nazi Mercenaries During the Cold War Rating: 0 out of 5 stars0 ratingsHollywood’s Spies: The Undercover Surveillance of Nazis in Los Angeles Rating: 0 out of 5 stars0 ratingsM: MI5's First Spymaster Rating: 4 out of 5 stars4/5RMS Queen Mary: Classic Liners Rating: 4 out of 5 stars4/5Xenophobe's Guide to the Estonians Rating: 4 out of 5 stars4/5Empire of Sand: A Novel Based on the Life of T. E. Lawrence Rating: 3 out of 5 stars3/5Predicting Pearl Harbor: Billy Mitchell and the Path to War Rating: 0 out of 5 stars0 ratingsBerlin Command Rating: 0 out of 5 stars0 ratingsFortitude: The D-Day Deception Campaign Rating: 3 out of 5 stars3/5The Traitor: A Novel Rating: 0 out of 5 stars0 ratingsThe Radio Boys on the Mexican Border Rating: 0 out of 5 stars0 ratingsA Taste for Treason: The Letter That Smashed a Nazi Spy Ring Rating: 0 out of 5 stars0 ratingsThe Last Cambridge Spy: John Cairncross, Bletchley Park Mole and Soviet Agent Rating: 4 out of 5 stars4/5The Spy Who Spent the War in Bed: And Other Bizarre Tales from World War II Rating: 0 out of 5 stars0 ratingsRegina Diana: Seductress, Singer, Spy Rating: 0 out of 5 stars0 ratingsFortnight of Infamy: The Collapse of Allied Airpower West of Pearl Harbor, December 1941 Rating: 5 out of 5 stars5/5Operations Pastorius: Eight Nazi Spies Against America Rating: 0 out of 5 stars0 ratingsEmpire of Secrets: British Intelligence, the Cold War, and the Twilight of Empire Rating: 4 out of 5 stars4/5Five Past Midnight Rating: 2 out of 5 stars2/5Operation Whisper: The Capture of Soviet Spies Morris and Lona Cohen Rating: 4 out of 5 stars4/5
Children's Historical For You
Little House on the Prairie Rating: 4 out of 5 stars4/5Fever 1793 Rating: 4 out of 5 stars4/5Little House in the Big Woods Rating: 4 out of 5 stars4/5Alice In Wonderland: The Original 1865 Unabridged and Complete Edition (Lewis Carroll Classics) Rating: 0 out of 5 stars0 ratingsNumber the Stars: A Newbery Award Winner Rating: 5 out of 5 stars5/5The Witch of Blackbird Pond: A Newbery Award Winner Rating: 5 out of 5 stars5/5The Night Before Christmas Rating: 4 out of 5 stars4/5A Long Walk to Water: Based on a True Story Rating: 4 out of 5 stars4/5The Secret Garden: The 100th Anniversary Edition with Tasha Tudor Art and Bonus Materials Rating: 4 out of 5 stars4/5On the Banks of Plum Creek Rating: 4 out of 5 stars4/5By the Shores of Silver Lake Rating: 4 out of 5 stars4/5D'Artagnan and the Three Musketeers: For Crown and Glory! Rating: 4 out of 5 stars4/5Farmer Boy Rating: 5 out of 5 stars5/5Sarah, Plain and Tall: A Newbery Award Winner Rating: 4 out of 5 stars4/5Anne of Green Gables: A Graphic Novel Rating: 4 out of 5 stars4/5One Crazy Summer Rating: 4 out of 5 stars4/5Dinosaurs from Head to Tail Rating: 4 out of 5 stars4/5Walk Two Moons Rating: 4 out of 5 stars4/5The Wednesday Wars: A Newbery Honor Award Winner Rating: 5 out of 5 stars5/5Thunder Rolling in the Mountains Rating: 4 out of 5 stars4/5The First Four Years Rating: 4 out of 5 stars4/5Changeling Rating: 4 out of 5 stars4/5A Single Shard: A Newbery Award Winner Rating: 0 out of 5 stars0 ratingsThe Long Winter Rating: 4 out of 5 stars4/5Lincoln: A Photobiography Rating: 4 out of 5 stars4/5A Dweller on Two Planets Rating: 0 out of 5 stars0 ratingsWe March Rating: 4 out of 5 stars4/5
Reviews for Who Broke the Wartime Codes?
0 ratings0 reviews
Book preview
Who Broke the Wartime Codes? - Nicola Barber
CONTENTS
A DARING RAID
WHAT WERE WARTIME CODES?
WHO WANTED TO BREAK THEM?
WHAT KIND OF PEOPLE WERE THEY?
WHAT DID THEY DO TO BREAK THE CODES?
WHO USED THE INFORMATION THEY FOUND?
WHAT HAPPENED TO THE CODE-BREAKERS AFTER THE WAR?
WHY WAS THEIR WORK SIGNIFICANT?
TIMELINE
GLOSSARY
FIND OUT MORE
INDEX
Some words are shown in bold, like this. You can find out what they mean by looking in the glossary.
A DARING RAID
It is spring 1941, in the midst of World War II (1939–1945). At a secret location in the United Kingdom, thousands of men and women are working desperately to intercept and understand the wireless messages transmitted every day by the German armed forces. The Germans use a secret code—Enigma—to protect the information in their messages. Breaking this code allows the Allies to know what the Germans are planning—it is invaluable information. However, it is also very difficult to do.
RAIDS
The British code-breakers need to crack the German navy’s codes, because the German U-boats (submarines) are a deadly threat to Allied merchant ships in the Atlantic Ocean. One of the code-breakers comes up with a plan to seize the settings sheets and one of the machines used to generate the code—an Enigma machine. These trophies would give them the clues they desperately need. In May 1941, in a highly secret operation, the Royal Navy manages to capture a German weather ship and seizes its settings sheets. They sink the weather ship, to avoid letting the Germans find out that the setting sheets have been taken. Then, only a few days later, British destroyers force a U-boat (U-110) to surface. Believing the U-boat to be sinking, the commander does not destroy his Enigma machine or its codes. They, too, are seized by the British.
HISTORY DETECTIVES: KEEPING SECRETS
The activities of the code-breakers remained secret far beyond the end of World War II. It was only in the 1970s that the true story began to emerge. Thousands of people kept their wartime jobs a complete secret from everyone, including friends and family. This book looks at how and when those secrets began to come out, and the story of what has happened since.
This Enigma machine was used by the German military during World War II to encode wireless messages.
ULTRA SECRET
These are just two episodes in the secret world of code-breaking in World War II. Of course, all sides used codes, and all were trying to break each other’s codes. This book, however, mainly examines the work of the Allied code-breakers in the two most significant operations. The first of these was Ultra, the name given to information obtained from the messages intercepted and deciphered by the British. The second was Magic, which was information gained by American code-breakers by intercepting and unscrambling Japanese signals. The huge value of both operations was that Germany, Italy, and Japan remained unaware that their codes were being broken. The name Ultra suggests this—it was considered even more secret than top secret! This was important and, as we will see, the Allies went to huge lengths to disguise and protect their code-breaking activities.
WHAT WERE WARTIME CODES?
Codes and ciphers have been used since ancient times. We know of secret codes used by the ancient Egyptians, Greeks, and Romans. The oldest known military cipher was the scytale, which dates back at least 2,500 years. Imagine a long piece of leather (or papyrus), which is wrapped around a piece of wood. A message is written on the leather along the length of the wood. Then the leather strip is unwound. It contains a meaningless jumble of letters—until it is wound around a piece of wood of exactly the same width, when the message is suddenly revealed.
The advantages of not giving away your plans to your enemy were also well understood by the ancient Roman military leader Julius Caesar. The Caesar cipher substituted letters by shifting the whole alphabet along, often by three places. So a
became d,
b
became e,
and so on. We know about this cipher and about the scytale from descriptions by ancient writers.