Books Pages 10/2

Total Page:16

File Type:pdf, Size:1020Kb

Books Pages 10/2 book reviews when conditions were right, selection plus establishing with whom one is communicat- replied, and all were caught and executed. recombination would restore the original ing and verifying that their messages have Much of Between Silk and Cyanide con- genetic message. But this is to assume that not been altered en route. Indeed, some of cerns the unfortunate consequences of the selection can act simultaneously at many loci, the earliest forms of writing may have origi- ‘poem code’ initially used by the SOE, and which requires that each of the multitude of nated as a side effect of an authentication Marks’ effort to substitute more secure codes, genetic changes should be separately advan- device — the Sumerian bulla, a sealed clay including the provably unbreakable ‘one- tageous. This is precisely the assumption he vessel containing loose tokens representing time pad’. The poem code was insecure has rejected in order to conclude that inter- the kinds and quantities of goods in an because it depended on having the agent vention from outer space is needed. accompanying shipment. memorize a poem. If the Germans could It is sad to see such a creative mind devot- Users of secret codes have often been guess the poem, or force a captured agent to ed to reaching such an absurd conclusion. It lulled into a false sense of security, with reveal it, they could read all the agent’s previ- might have been better for the reputation of a regard to both secrecy and authentication. A ous messages as well as forging new ones to great scientist if this book had been left to the famous example described by Singh is the their liking, which would be accepted by the decent obscurity of a facsimile edition. ■ encrypted correspondence implicating Mary SOE as authentic. To guard against such forg- John Maynard Smith is in the School of Biological Queen of Scots in Anthony Babington’s plot eries, agents were told to apply certain ‘secu- Sciences, University of Sussex, Falmer, Brighton to assassinate Queen Elizabeth I of England. rity checks’ to their legitimate messages, such BN1 9QG, UK. Trusting the code’s security, Mary used words as a deliberate pattern of misspellings. But that left no doubt of her guilt. Elizabeth’s these security checks were often forgotten, cryptanalyst Thomas Phelippes not only and in any case could also be obtained by broke the code of the intercepted correspon- interrogating the captured agent, who would dence, but even tricked the plotters into have to give some answer consistent with pre- Secrets, codes naming the planned assassins by forging, in viously intercepted transmissions. Many Mary’s hand, an encrypted request for this agents chose to carry an SOE-provided and decoders damning information. Babington, believing cyanide tablet to forestall such interrogation. The Code Book the coded message to be from Mary, duly The improved codes that Marks eventual- by Simon Singh ly put into effect resided not in an agent’s Fourth Estate/Doubleday: 1999. 416 pp. memory but on a piece of silk fabric con- £16.99/$24.95 cealed in their clothing or personal effects. Between Silk and Cyanide: A On the silk was printed a list of random keys, Codemaker’s War 1941–1945 each of which was to be used to encrypt only by Leo Marks one message, then cut off and destroyed. The Free Press/HarperCollins: 1999. 622 pp. security check consisted essentially of a secret $27.50 (hbk)/£6.99 (pbk) password, agreed on between the agent and Charles H. Bennett SOE, which the agent would include in each message before encryption. Cryptography, in its narrow meaning the art Because each message was encrypted by a of secret communication, has always been different random key, the previously inter- the stuff of intrigue, of military campaigns cepted transmissions revealed no informa- and assassinations that succeed or fail tion about the password itself, so a captured depending on whether encrypted messages agent would be free to lie about it without survive the scrutiny of eavesdroppers. being caught in any inconsistency. The Simon Singh’s The Code Book, a popular his- remaining unused part of the silk was, of tory in the tradition of David Kahn’s classic, course, also likely to be captured along with The Codebreakers (Simon & Schuster, 1997), the agent, but, lacking its cut-off portions, it covers the subject from Julius Caesar neither compromised the previously trans- through medieval Arab cryptanalysis, Euro- mitted messages nor enabled the agent’s pean military and diplomatic ciphers of the captors to forge legitimate-seeming new past few centuries, the Second World War’s messages without knowing the password. Enigma and Navajo Code-Talkers, to today’s Meanwhile, the weaknesses of poem code struggles over encryption on the Internet. had contributed to a major guessing game, Basic techniques of cryptography and with the British suspecting that many agents cryptanalysis are carefully explained, as are had fallen into enemy hands, but continuing the archaeological cryptanalyses of Egyptian radio correspondence with them anyway to hieroglyphs and Minoan Linear B. The tech- avoid alerting the Germans of their suspi- nical and historical material is enlivened by cions. In one instance the Germans appar- just the right amount of biographical detail, Ancient Egypt’s ently decided they wanted the British to much of it gleaned from Singh’s interviews know that a certain agent had been captured, with living cryptographers. cryptic hieroglyphs and so staged a Morse code radio drama in Leo Marks’ Between Silk and Cyanide is which the agent, whom Marks believes had far narrower in scope, being a memoir of This ‘praenomen’, or throne name, of Ramses II actually been captured much earlier, was the author’s work between 1942 and 1945 is probably describing him as strong, the chosen heard to begin a normal Morse transmis- in Britain’s Special Operations Executive one of the sun god Re. Many more forms of sion, which then became incoherent, finally (SOE), in charge of communications with writing — from cuneiform to Japanese phonetic breaking off abruptly with a sound like that secret agents in occupied Europe. scripts — are featured in The Story of Writing: of a lifeless hand resting on a telegraph key. An older and perhaps even more impor- Alphabets, Hieroglyphs & Pictograms by The two authors’ styles could scarcely be tant branch of cryptography than secret Andrew Robinson (Thames & Hudson, £9.95). more different. Singh approaches each of communication is authentication: the art of his many topics carefully, balancing human © 2000 Macmillan Magazines Ltd NATURE | VOL 403 | 10 FEBRUARY 2000 | www.nature.com 595 book reviews interest with enough technical detail to make the basic cryptographic principles intelligi- ble to a lay reader. My only regret is that he did not give more weight to authentication and other aspects of cryptography besides secrecy, for example the role of digital signa- tures in electronic commerce. By contrast, Marks’ technical explana- tions are not always intelligible, and are sometimes buried in a torrent of colourful ARCHIVE/CORBIS PICTURE HISTORICAL language: “The ladies of the First Aid Nurs- ing Yeomanry, otherwise known as the coders of Grendon, had force-fed their eight indecipherables with a diet of transposition keys and all but one of the invalids had responded to treatment. The malingerer was waiting on my desk with a curt note from the A heroic national achievement, or an object lesson in taste, mostly bad? Grendon supervisor acknowledging defeat.” Nonetheless, Marks’ book makes exciting involvement in the soft-drinks industry. popular, especially working exhibits. Visitors reading, and is full of information and opin- A reassessment is timely. In 1950, Charles could watch the entire process of cotton ions one cannot find elsewhere. Much of the Gibbs-Smith viewed it as a heroic national production from spinning to finished information in Singh’s book can be found achievement; Nikolaus Pevsner saw it as an cloth. Scientific instruments were found in elsewhere, but not in such an accessible and object lesson in taste, mostly bad; Asa Briggs class X, and included electric telegraphs, enjoyable form. ■ argued in 1954 that it was a defining moment microscopes, air pumps and barometers, as Charles H. Bennett is at the IBM T. J. Watson in the formation of middle-class political and well as musical, horological and surgical Research Center, PO Box 218, Yorktown Heights, economic values, although his later work in instruments. New York 10598, USA. 1988 viewed it as a compendium of ‘things’, Both authors tally the number of medals of Victorian material culture. Others see it as awarded, either for workmanship (Prize the birthplace of modern consumer culture. medals) or for novelty of invention or appli- Both authors here take much from previ- cation (Council medals). They conclude, as ous studies, but have their own perspectives. did some scientific contemporaries, that the A compendium of John Davis is particularly concerned with the British had few reasons for complacency. political and economic context in which the Auerbach is better informed about relevant Victorian culture exhibition evolved, and the way that exhibi- work in scientific history, but perhaps he The Great Exhibition tions could help transform people’s ideas accepts Charles Babbage’s ‘decline of science’ by John R. Davis about industrialization and modernity. His view too readily. Sutton: 1999. 238 pp. £20, $36 analysis of the “modernizing agenda” of The arguments both before and after the The Great Exhibition of 1851: A the organizers has a distinctly familiar feel. exhibition about the role of scientific and Nation on Display Jeffrey Auerbach, on the other hand, is more technical education in industrial progress are by Jeffrey A.
Recommended publications
  • Special Operations Executive - Wikipedia
    12/23/2018 Special Operations Executive - Wikipedia Special Operations Executive The Special Operations Executive (SOE) was a British World War II Special Operations Executive organisation. It was officially formed on 22 July 1940 under Minister of Economic Warfare Hugh Dalton, from the amalgamation of three existing Active 22 July 1940 – 15 secret organisations. Its purpose was to conduct espionage, sabotage and January 1946 reconnaissance in occupied Europe (and later, also in occupied Southeast Asia) Country United against the Axis powers, and to aid local resistance movements. Kingdom Allegiance Allies One of the organisations from which SOE was created was also involved in the formation of the Auxiliary Units, a top secret "stay-behind" resistance Role Espionage; organisation, which would have been activated in the event of a German irregular warfare invasion of Britain. (especially sabotage and Few people were aware of SOE's existence. Those who were part of it or liaised raiding operations); with it are sometimes referred to as the "Baker Street Irregulars", after the special location of its London headquarters. It was also known as "Churchill's Secret reconnaissance. Army" or the "Ministry of Ungentlemanly Warfare". Its various branches, and Size Approximately sometimes the organisation as a whole, were concealed for security purposes 13,000 behind names such as the "Joint Technical Board" or the "Inter-Service Nickname(s) The Baker Street Research Bureau", or fictitious branches of the Air Ministry, Admiralty or War Irregulars Office. Churchill's Secret SOE operated in all territories occupied or attacked by the Axis forces, except Army where demarcation lines were agreed with Britain's principal Allies (the United Ministry of States and the Soviet Union).
    [Show full text]
  • Jataka Tales: Layers of Meaning from the Universal to the Personal
    Jataka Tales: Layers of Meaning from the Universal to the Personal Grade Level or Course Type: English, Social Studies, adaptable for grades 6 through 10 Overview of the Lesson Jataka Tales: Birth Stories of the Buddha are among the world’s oldest collection of stories. Many, about endearing animals who misbehave – and then learn to behave better – are appealing to children throughout the world. In this lesson students compare an Aesop’s fable to a Jataka Tale to see what they share in common. Students then learn about the Buddhist context of the tales, through which they deepen their appreciation of what makes a Jataka Tale unique. Finally, students approach a Jataka Tale through the meaning it held in the life of Noor Inayat Khan (1914-1944), whose classic collection Twenty Jataka Tales is still in print. She was a Muslim who worked as a covert agent for the British in Occupied France. She died at Dachau in 1944. In all three activities, students gain insight into what makes stories important in our lives. Learning Outcomes: • Identify stories by genre as fable, parable, folktale and fairy tale. • Decipher the moral of a story. • Understand Buddhist concepts (Ten Perfections, cycle of death and rebirth) • Learn about the life and appreciate the artistry of Noor Inayat Khan. Materials Needed • This lesson and the handouts included with it. They include: Handout 1. Life of Noor Inayat Khan with photos and scrapbook activity Handout 2. The Monkey and the Dolphin credited to Aesop and genre definitions Handout 3. The Patient Buffalo, a Jataka Tale Handout 4.
    [Show full text]
  • The Science of Cryptology
    Page 1 of 5 The Science of Cryptology A section from the book UMTS Security by Valtteri Niemi and Kaisa Nyberg, to appear in November 2003, published by Wiley@Co. Cryptographic systems Cryptology is the science of information security and privacy. Mathematical techniques are investigated and developed to provide authenticity confidentiality, integrity and other security services for information that is communicated, stored or processed in an information system. Also the strength of cryptographic designs and protocols are evaluated from the point of view of mathematics, systems theory and complexity theory. The design part of the science is called cryptography, while the security investigations and analysis is known as cryptanalysis. The naming convention reflects the two sides of the science of cryptology. This division is also apparent in the practical cryptographic development work, where the best practise has become to split the development resources into two teams. The team of cryptographers make proposals for cryptographic designs, which the team of cryptanalysts try to break. A cryptographic system in its basic form is often depicted as a communication system involving three entities. Two of the entities are exchanging messages over an insecure communication channel. It has become customary to call these entities Alice and Bob. The third entity has access to the communication channel. She is called Carol, as the third letter to the alphabet, or Eve, as the eavesdropper. But Eve is allowed to perform all kind of malicious actions on the communicated messages, not just passive eavesdropping. All parties are also assumed to have certain computation resources. Different theoretical models vary a lot with respect to the amount computation resources the entities have and what kind of tampering Eve is performing on the communication channel.
    [Show full text]
  • FYS 146 Cryptography Fall 2010 What Next? December 13Th
    FYS 146 Cryptography Fall 2010 What next? December 13th Congratulations! You have made it to the end of the course on cryptography. We have talked about many different ideas this semester, but we have only scratched the surface and there are many many more topics related to secrecy. I have compiled below a list of books, some serious and some not-so-serious, that I recommend you check out. Fiction • Cryptonomicon by Neal Stephenson. Probably the quintessential crypto novel. Alternates between a storyline in WWII and a storyline in current day, with parallels and discussion of the cryptosystems used all along. A great story and very well-written. But long. HIGHLY Recommended. • The Company by Robert Littell. This is a fictionalized account of a group of spies working for the CIA and KGB through the coldwar. The story spans 50 or so years, and has a wonderful cast of characters. This was also made into a decent miniseries last summer which is now out on DVD starring Chris O'Donnell and Michael Keaton. Littell has several other novels about spies, but this is the best of the ones that I have read. • Enigma by Robert Harris. This novel tells the story of some of the codebreakers at Bletchley Park. The movie, starring Kate Winslet and Dougray Scott, is above average as well. • Good News, Bad News by David Wolstencroft. I don't actually think there is any crypto in this novel, but it is one of my favorite spy novels. Set in contemporary London, it deals with two coworkers who are both undercover spies and are ordered to kill each other.
    [Show full text]
  • GCSE (9-1) English Language
    GCSE (9-1) English Language Sample Assessment Materials Pearson Edexcel Level 1/Level 2 GCSE (9 - 1) in English Language (1EN0) First teaching from September 2015 First certifi cation from June 2017 Issue 1 Pearson Edexcel Level 1/Level 2 GCSE (9–1) in English Language (1EN0) Sample Assessment Materials First certification 2017 Edexcel, BTEC and LCCI qualifications Edexcel, BTEC and LCCI qualifications are awarded by Pearson, the UK’s largest awarding body offering academic and vocational qualifications that are globally recognised and benchmarked. For further information, please visit our qualification websites at www.edexcel.com, www.btec.co.uk or www.lcci.org.uk. Alternatively, you can get in touch with us using the details on our contact us page at www.edexcel.com/contactus About Pearson Pearson is the world's leading learning company, with 40,000 employees in more than 70 countries working to help people of all ages to make measurable progress in their lives through learning. We put the learner at the centre of everything we do, because wherever learning flourishes, so do people. Find out more about how we can help you and your learners at: www.pearson.com/uk References to third party material made in these sample assessment materials are made in good faith. Pearson does not endorse, approve or accept responsibility for the content of materials, which may be subject to change, or any opinions expressed therein. (Material may include textbooks, journals, magazines and other publications and websites.) All information in this document
    [Show full text]
  • Making Speech-Matter: Recurring Mediations in Sound Poetics and Its Contemporary Practice
    ORBIT - Online Repository of Birkbeck Institutional Theses Enabling Open Access to Birkbecks Research Degree output Making Speech-Matter: Recurring Mediations in Sound Poetics and its Contemporary Practice http://bbktheses.da.ulcc.ac.uk/35/ Version: Full Version Citation: Pester, Holly (2013) Making Speech-Matter: Recurring Mediations in Sound Poetics and its Contemporary Practice. PhD thesis, Birkbeck, University of London. c 2013 The Author(s) All material available through ORBIT is protected by intellectual property law, including copyright law. Any use made of the contents should comply with the relevant law. Deposit guide Contact: email 1 Making Speech-Matter: Recurring Mediations in Sound Poetics and its Contemporary Practice Holly Pester Birkbeck, University of London PhD 2013 2 I, Holly Pester, confirm that the work presented in this thesis is my own. Where information has been derived from other sources, I confirm that this has been indicated in the thesis. ---------------------------------------------- 3 Abstract This thesis produces a critical and creative space for new forms of sound poetics. Through a reflective process combining theoretical research and poetic practice – performances, text-scores and installations – the thesis tests the contemporary terms of intermedial poetics and sound poetry, establishing a conceptual terminology for speech-matter. Beginning with a study of 1960s sound poet Henri Chopin and his relation to the tape machine, I argue that this technological mediation was based on a poetics of analogue sound hinged on bodily engagement. Social and physical properties of the tape machine contribute to a mode of practice that negotiates the body, machine, and effort. Exploring Michel Serres’s concept of parasitic noise and the relation of interference to lyric appeal, via the work of Denise Riley and Hannah Weiner, I understand sound poetics as a product of lyrically active noise.
    [Show full text]
  • Dear Ken, Here's a List Ofbooks About the SOE That Might Interest You
    Dear Ken, Here's a list ofbooks about the SOE that might interest you. These lists are not exhaustive, but contain the most prominent books. In particular, additional biographies and personal narratives are available could be added to these lists. I've compiled these lists from a variety of sources, including annotated bibliographies. The comments about some books are taken from these annotations (usually published reviews), and are not my own. When I make a comment, it is preceded by "KEN:" Although mostly out ofprint, I should be able to buy used copies of anything. Virtually all are also available at the New York Public Library, so I can photocopy the tables ofcontents or pages on certain topics, ifyou prefer. Books in English about the SOE in France. All are available for purchase or photocopying. Ruby, Marcel. F section, SOE : the Buckmaster networks / Marcel Ruby. London: Leo Cooper, 1988. 227 pages Subject Great Britain. Special Operations Executive. World War, 1939-1945 -- Underground movements -- France. World War, 1939-1945 -- Personal narratives, French. ~ain, Pierre. v'CI~destine operations: the arms and techniques ofthe Resistance, 1941-1944 / text and drawings by Pierre Lorain; English adaptation by David Kahn. New York : Macmillan, c1983. 185 p. : ill., maps; 21 x 24 cm. Translation of: Arrnement clandestin, S.O.E., 1941-1944, France. Subject Great Britain. Special Operations Executive. World War, 1939-1945 -- Secret service -- Great Britain. World War, 1939-1945 -- Underground movements -- Europe. World War, 1939-1945 -- Equipment and supplies. Nicolson, David, 1940­ Aristide : the story of Roger Landes / David Nicolson. London: Leo Cooper, 1994.
    [Show full text]
  • The Important Posthumous George Cross Group to Violette Szabó 22
    £25 The Important Posthumous Second World War George Cross group awarded to Violette Szabó, Women’s Transport Service (F.A.N.Y.) and ‘F’ Section, Special Operations Executive (S.O.E.), late Auxiliary Territorial Service (A.T.S.) www.dnw.co.uk 16 Bolton Street Mayfair London W1J 8BQ WEDNESDAY 22 JULY 2015 Telephone 020 7016 1700 Fax 020 7016 1799 at 10:00am E-mail [email protected] INTRODUCTION Just four direct examples of the George Cross (G.C.) have been awarded to women, three of them members of the Special Operations Executive (S.O.E.): Violette Szabó, Odette and Noor Inayat Khan. The fourth example was awarded to Barbara Harrison, a B.O.A.C. stewardess, who died as a result of gallant rescue work at Heathrow airport in April 1968; her G.C. is owned by British Airways. Violette, Odette and Noor Inayat Khan have all been the subject of biographies, in Violette’s case Carve Her Name With Pride, by R. J. Minney (1956), Violette Szabo - The Life That I Have, by Susan Ottaway (2002), and Young, Brave and Beautiful, by her daughter, Tania Szabó (2007); two have been the subject of films, Odette being portrayed by Anna Neagle in the film of the same name in 1950 and Violette by Virginia McKenna in Carve Her Name With Pride in 1958. As a consequence, their lives have been the subject of ongoing study and media coverage, evidence - if it were needed - of their sublime gallantry and example. Odette, whose G.C. is owned by the Imperial War Museum, survived Ravensbrück; owing to her then married name of ‘Churchill’, the camp commandant used her in a failed attempt to save his own skin on surrendering to the Allies.
    [Show full text]
  • In World War II, Famous Poems Were Used to Encrypt Messages
    In World War II, famous poems were used to encrypt messages (that is to put messages in a code so if they were intercepted by an enemy, the enemy couldn’t easily read the message). This was, however, found to be insecure because enemies quickly cracked this code and learned which famous poems were being used to encrypt the messages. In 1943, the Head of the English codes office, Leo Marks, wrote his own poem ‘The Life That I Have’ about his girlfriend. This was used by a female British Agent, Violette Szabo, to encrypt messages to send back to England as she was working in France during the War. This method of using poems written by normal people was then used more, as the enemy would not know the poem and therefore not be able to decipher the message. This was a hard method of encrypting messages as it was quite time-consuming but more importantly, the soldiers and agents had to memorise the poems as they wouldn’t be allowed to carry a copy around with them. Imagine having to learn a whole poem off by heart! There are instructions over the page to help you create your own coded message! You could write a poem about anything you want to - the world war, lockdown, your favourite hobby, your favourite sports team, a make believe animal, your dream three course meal - let your imagination go wild! Perhaps you could ask a family member or friend to do the same and you could swap messages! Wildlife Poem (written by Dylan Kristiansen, aged 9) Wildlife beautiful with lush green leaves Incredible bugs of different sizes underground and in the sky Loveable pandas hairy and squidgy eating bamboo Dreadful pollution in the water,animals getting trapped Leopards, jaguars and tigers look so alike, maybe cousins In the jungle the predator pounces at its prey Fresh air everywhere coming from the trees Exciting views on top of Everest, biggest of all Pick 5 or 6 words from your poem and the number of where the words appear in the poem (try to include every letter of the alphabet).
    [Show full text]
  • Ministry of Defence Acronyms and Abbreviations
    Acronym Long Title 1ACC No. 1 Air Control Centre 1SL First Sea Lord 200D Second OOD 200W Second 00W 2C Second Customer 2C (CL) Second Customer (Core Leadership) 2C (PM) Second Customer (Pivotal Management) 2CMG Customer 2 Management Group 2IC Second in Command 2Lt Second Lieutenant 2nd PUS Second Permanent Under Secretary of State 2SL Second Sea Lord 2SL/CNH Second Sea Lord Commander in Chief Naval Home Command 3GL Third Generation Language 3IC Third in Command 3PL Third Party Logistics 3PN Third Party Nationals 4C Co‐operation Co‐ordination Communication Control 4GL Fourth Generation Language A&A Alteration & Addition A&A Approval and Authorisation A&AEW Avionics And Air Electronic Warfare A&E Assurance and Evaluations A&ER Ammunition and Explosives Regulations A&F Assessment and Feedback A&RP Activity & Resource Planning A&SD Arms and Service Director A/AS Advanced/Advanced Supplementary A/D conv Analogue/ Digital Conversion A/G Air‐to‐Ground A/G/A Air Ground Air A/R As Required A/S Anti‐Submarine A/S or AS Anti Submarine A/WST Avionic/Weapons, Systems Trainer A3*G Acquisition 3‐Star Group A3I Accelerated Architecture Acquisition Initiative A3P Advanced Avionics Architectures and Packaging AA Acceptance Authority AA Active Adjunct AA Administering Authority AA Administrative Assistant AA Air Adviser AA Air Attache AA Air‐to‐Air AA Alternative Assumption AA Anti‐Aircraft AA Application Administrator AA Area Administrator AA Australian Army AAA Anti‐Aircraft Artillery AAA Automatic Anti‐Aircraft AAAD Airborne Anti‐Armour Defence Acronym
    [Show full text]
  • Carve Her Name with Pride Free
    FREE CARVE HER NAME WITH PRIDE PDF R. J. Minney | 192 pages | 01 Jul 2013 | Pen & Sword Books Ltd | 9781848847422 | English | South Yorkshire, United Kingdom Carve Her Name With Pride - Internet Movie Firearms Database - Guns in Movies, TV and Video Games Goodreads helps you keep track of books you want to read. Want to Read saving…. Want to Read Currently Reading Read. Other editions. Enlarge cover. Error rating book. Refresh and try again. Open Preview See a Problem? Details if other :. Thanks for telling us about the problem. Return to Book Page. Shortly after the birth of her daughter, Tania, her husband died at El Alamein. Her first trip to France was completed successfully even though she was arrested and then released by the French Police. On June 7th,Szabo was parachuted into Limoges. Her task was Carve Her Name with Pride co-ordinate the work of the French Resistance in the area in the first days after D-Day. From Paris, Violette Szabo was sent to Ravensbruck concentration camp where she was executed in January She was only 23 and for her courage was posthumously awarded The Carve Her Name with Pride Cross and the Croix de Guerre. Get A Copy. Kindle Editionpages. More Details Other Editions Friend Reviews. To see what your friends thought of this book, please sign up. To ask other readers questions about Carve Her Name with Prideplease sign up. Be the first to ask a question about Carve Her Name with Pride. Lists with This Book. Community Reviews. Showing Average rating 4. Rating details.
    [Show full text]
  • The Life That I Have Free
    FREE THE LIFE THAT I HAVE PDF Leo Marks,Elena Gaussen Marks | 32 pages | 07 Oct 1999 | Souvenir Press Ltd | 9780285635326 | English | London, United Kingdom The Life That I Have : A POEM by Leo Marks : Poem : English Poem Join the Neopoet online poetry workshop and community to improve as a writer, meet fellow poets, and showcase your work. Sign up, submit your poetry, and get started. A sleep I shall have A rest I shall have Yet death will be but a pause For the peace of my years In the long green grass Will be yours and yours and yours. Sat, I haven't seen the movie but I will certainly look for it I love old movies I will go through this sometime this week for the workshop. Thank you for your visit, the film is The Life That I Have Black and white I think the last time I saw it was last year it is a tearful one for big softies like me lol. Take it easy young lady, I The Life That I Have your other poem and will get back to it today sometime as it is a beaut, Yours as always Ian x. There are a million reasons to believe in yourself, So find more reasons to believe in others. Roscoe Lane. Sun, I have seen the movie, and it was a very fitting piece, if there was such a poem for what these brave women did. Regards Roscoe. Thank you, for your visit this was originally for the workshop but I should have put one of our own poets forward as a great piece.
    [Show full text]