Who Broke the Wartime Codes?
()
About this ebook
Read more from Nicola Barber
Who Journeyed on the Mayflower? Rating: 1 out of 5 stars1/5Lost Cities Rating: 0 out of 5 stars0 ratingsChurchill and the Battle of Britain: Days of Decision Rating: 0 out of 5 stars0 ratingsTomb Explorers Rating: 0 out of 5 stars0 ratings
Related to Who Broke the Wartime Codes?
Related ebooks
Before Bletchley Park: The Codebreakers of the First World War Rating: 0 out of 5 stars0 ratingsX, Y and Z: The Real Story of How Enigma Was Broken Rating: 5 out of 5 stars5/5Colossus: Bletchley Park's Greatest Secret Rating: 3 out of 5 stars3/5Voices of the Codebreakers: Personal Accounts of the Secret Heroes of World War II Rating: 4 out of 5 stars4/5The Enigma Traitors: The Struggle to Lose the Cipher War Rating: 0 out of 5 stars0 ratingsDeceiving Hitler: Double-Cross and Deception in World War II Rating: 4 out of 5 stars4/5Undercover Tales of World War II Rating: 4 out of 5 stars4/5Britain's Best Kept Secret: Ultra's Base at Bletchley Park Rating: 4 out of 5 stars4/5I Was a Spy!: The Classic Account of Behind-the-Lines Espionage in the First World War Rating: 0 out of 5 stars0 ratingsEnigma: The Battle for the Code Rating: 4 out of 5 stars4/5Predicting Pearl Harbor: Billy Mitchell and the Path to War Rating: 0 out of 5 stars0 ratingsMorehead City on the Waterfront Rating: 4 out of 5 stars4/5The Partnership: George Marshall, Henry Stimson, and the Extraordinary Collaboration That Won World War II Rating: 0 out of 5 stars0 ratingsHitler's Secret Army Rating: 4 out of 5 stars4/5Churchill's Spy Files: MI5's Top-Secret Wartime Reports Rating: 0 out of 5 stars0 ratingsHollywood’s Spies: The Undercover Surveillance of Nazis in Los Angeles Rating: 0 out of 5 stars0 ratingsThe Little Third Reich on Lake Superior: A History of Canadian Internment Camp R Rating: 0 out of 5 stars0 ratingsAmerica Goes to War: A Social History of the Continental Army Rating: 4 out of 5 stars4/5Letters from the Blitz: Telling America the Truth about the British Experience of War Rating: 0 out of 5 stars0 ratingsThe Atlas of Special Operations of World War II Rating: 0 out of 5 stars0 ratingsThe US Navy's On-the-Roof Gang: Volume 2 - War in the Pacific Rating: 0 out of 5 stars0 ratingsChurchill's Triumph: A Novel of Betrayal Rating: 4 out of 5 stars4/5The Last Cambridge Spy: John Cairncross, Bletchley Park Mole and Soviet Agent Rating: 4 out of 5 stars4/5Regina Diana: Seductress, Singer, Spy Rating: 0 out of 5 stars0 ratingsThe Admirals' Advantage: U.S. Navy Operational Intelligence in World War II and the Cold War Rating: 3 out of 5 stars3/5The Rebecca Code: Rommel's Spy in Africa and Operation Condor Rating: 0 out of 5 stars0 ratingsA Clear Case of Genius: Room 40's Code-Breaking Pioneer Rating: 0 out of 5 stars0 ratingsRoute 15:: The Road to Hartford Rating: 0 out of 5 stars0 ratingsConfessions of a Special Agent: Wartime Service in the Small Scale Raiding Force and SOE Rating: 0 out of 5 stars0 ratingsThe Radio Boys on the Mexican Border Rating: 0 out of 5 stars0 ratings
Children's Historical For You
Fever 1793 Rating: 4 out of 5 stars4/5Sarah, Plain and Tall: A Newbery Award Winner Rating: 4 out of 5 stars4/5Number the Stars: A Newbery Award Winner Rating: 5 out of 5 stars5/5The Witch of Blackbird Pond: A Newbery Award Winner Rating: 5 out of 5 stars5/5Alice In Wonderland: The Original 1865 Unabridged and Complete Edition (Lewis Carroll Classics) Rating: 0 out of 5 stars0 ratingsAnne of Green Gables: A Graphic Novel Rating: 4 out of 5 stars4/5A Long Walk to Water: Based on a True Story Rating: 4 out of 5 stars4/5The Night Before Christmas Rating: 4 out of 5 stars4/5The Secret Garden: The 100th Anniversary Edition with Tasha Tudor Art and Bonus Materials Rating: 4 out of 5 stars4/5Little House on the Prairie Rating: 4 out of 5 stars4/5Little House in the Big Woods Rating: 4 out of 5 stars4/5Farmer Boy Rating: 5 out of 5 stars5/5Walk Two Moons Rating: 4 out of 5 stars4/5A Kid's Guide to Native American History: More than 50 Activities Rating: 0 out of 5 stars0 ratingsStrawberry Girl Rating: 4 out of 5 stars4/5The Long Winter Rating: 4 out of 5 stars4/5On the Banks of Plum Creek Rating: 4 out of 5 stars4/5The Bronze Bow: A Newbery Award Winner Rating: 5 out of 5 stars5/5One Crazy Summer Rating: 4 out of 5 stars4/5The Sign of the Beaver: A Newbery Honor Award Winner Rating: 5 out of 5 stars5/5A Dweller on Two Planets Rating: 0 out of 5 stars0 ratingsA Single Shard: A Newbery Award Winner Rating: 0 out of 5 stars0 ratingsThunder Rolling in the Mountains Rating: 4 out of 5 stars4/5Fairest Rating: 4 out of 5 stars4/5The War That Saved My Life Rating: 4 out of 5 stars4/5The First Four Years Rating: 4 out of 5 stars4/5Johnny Tremain: A Newbery Award Winner Rating: 5 out of 5 stars5/5
Reviews for Who Broke the Wartime Codes?
0 ratings0 reviews
Book preview
Who Broke the Wartime Codes? - Nicola Barber
CONTENTS
A DARING RAID
WHAT WERE WARTIME CODES?
WHO WANTED TO BREAK THEM?
WHAT KIND OF PEOPLE WERE THEY?
WHAT DID THEY DO TO BREAK THE CODES?
WHO USED THE INFORMATION THEY FOUND?
WHAT HAPPENED TO THE CODE-BREAKERS AFTER THE WAR?
WHY WAS THEIR WORK SIGNIFICANT?
TIMELINE
GLOSSARY
FIND OUT MORE
INDEX
Some words are shown in bold, like this. You can find out what they mean by looking in the glossary.
A DARING RAID
It is spring 1941, in the midst of World War II (1939–1945). At a secret location in the United Kingdom, thousands of men and women are working desperately to intercept and understand the wireless messages transmitted every day by the German armed forces. The Germans use a secret code—Enigma—to protect the information in their messages. Breaking this code allows the Allies to know what the Germans are planning—it is invaluable information. However, it is also very difficult to do.
RAIDS
The British code-breakers need to crack the German navy’s codes, because the German U-boats (submarines) are a deadly threat to Allied merchant ships in the Atlantic Ocean. One of the code-breakers comes up with a plan to seize the settings sheets and one of the machines used to generate the code—an Enigma machine. These trophies would give them the clues they desperately need. In May 1941, in a highly secret operation, the Royal Navy manages to capture a German weather ship and seizes its settings sheets. They sink the weather ship, to avoid letting the Germans find out that the setting sheets have been taken. Then, only a few days later, British destroyers force a U-boat (U-110) to surface. Believing the U-boat to be sinking, the commander does not destroy his Enigma machine or its codes. They, too, are seized by the British.
HISTORY DETECTIVES: KEEPING SECRETS
The activities of the code-breakers remained secret far beyond the end of World War II. It was only in the 1970s that the true story began to emerge. Thousands of people kept their wartime jobs a complete secret from everyone, including friends and family. This book looks at how and when those secrets began to come out, and the story of what has happened since.
This Enigma machine was used by the German military during World War II to encode wireless messages.
ULTRA SECRET
These are just two episodes in the secret world of code-breaking in World War II. Of course, all sides used codes, and all were trying to break each other’s codes. This book, however, mainly examines the work of the Allied code-breakers in the two most significant operations. The first of these was Ultra, the name given to information obtained from the messages intercepted and deciphered by the British. The second was Magic, which was information gained by American code-breakers by intercepting and unscrambling Japanese signals. The huge value of both operations was that Germany, Italy, and Japan remained unaware that their codes were being broken. The name Ultra suggests this—it was considered even more secret than top secret! This was important and, as we will see, the Allies went to huge lengths to disguise and protect their code-breaking activities.
WHAT WERE WARTIME CODES?
Codes and ciphers have been used since ancient times. We know of secret codes used by the ancient Egyptians, Greeks, and Romans. The oldest known military cipher was the scytale, which dates back at least 2,500 years. Imagine a long piece of leather (or papyrus), which is wrapped around a piece of wood. A message is written on the leather along the length of the wood. Then the leather strip is unwound. It contains a meaningless jumble of letters—until it is wound around a piece of wood of exactly the same width, when the message is suddenly revealed.
The advantages of not giving away your plans to your enemy were also well understood by the ancient Roman military leader Julius Caesar. The Caesar cipher substituted letters by shifting the whole alphabet along, often by three places. So a
became d,
b
became e,
and so on. We know about this cipher and about the scytale from descriptions by ancient writers.