The Many Lives of Herbert O. Yardley

Total Page:16

File Type:pdf, Size:1020Kb

The Many Lives of Herbert O. Yardley UNCLASSIFIED (b) (3)-P.L. 86-36 The Many Lives of Herbert O. Yardley This story may be only 80 percent true. The rest is State Department codes, and he began to try to solve somewhat doubtful because of incomplete records and them. According to his own account, written later,2 it the fallibility of human memory, and because the took him less than two hours to solve a 500-word story attempts to trace the career of a man who was message to President Wilson from Colonel Edward M. by all odds the most colorful, controversial, enigmatic House, the president's adviser and confidant, then in figure in the history of American cryptology. He Europe. That he, a mere dabbler in cryptology, could worked as a cryptanalyst for three countries, was so easily read the president's private communications commended by the U.S. government for his cryptan­ both amazed and appalled Yardley. He was now more alytic achievements, then saw the same government than ever determined to become a cryptologist: he summarily abolish his organization and, with it, his would devote his life to improving the security of job. For later publicly revealing his successes in America's communications and solving the codes of cryptanalysis and secret writing, he was generally other countries. Studying U.S. codes was, of course, acclaimed by the press but reviled by the cryptologic a simple matter, since they passed through his hands community. every day. As for foreign codes, they came to him 3 He wrote melodramatic spy novels and radio pro­ through "friendly connections previously established. " grams, and traveled the country speaking on cryptology He later explained what that meant: "I knew most of and espionage. He hobnobbed with movie stars, famous the telegraph operators in Washington, and got some authors, a future presidential candidate, and a future of them to steal a few coded diplomatic messages of 4 prime minister and winner of the Nobel Peace Prize. various governments; these I practiced on. " In 1917, He played championship golf; he played winning poker he submitted a 100-page memorandum titled" Solution all his life and wrote a best-selling book on the subject. of American Diplomatic Codes," which resulted in a Motivated, probably, by bitterness and a need for new method of encoding State Department messages. money, he apparently sold cryptanalytic secrets to a This system, too, he solved, but by then the United foreign power, with results that, together with his States had declared war on Germany, and Yardley was other exposes, affected the course of U.S. cryptology preparing for bigger things. for the next decade. Maven of the American Black Chamber Herbert Osborn Yardley 1 was born on 13 April 1889 in Worthington, Indiana, the second of four children. On 29 June 1917, Yardley was commissioned a first After graduation from high school, where he excelled lieutenant in the Signal Officers' Reserve Corps. On 5 in sports and debate and was president of his class, July he was ordered to active duty as head of M.1.8, he became, like his father, a railroad telegraph oper­ the cryptologic organization of Military Intelligence. ator. He took a year of English at the University of Known both as the Code and Cipher Section and the Chicago before becoming, in late 1912, a $900-per­ Cipher Bureau, M.1.8 (Military Intelligence Branch, year code clerk and telegrapher in the State Depart­ Section 8) operated initially at the Army War College ment's code room. There, while working the night in Washington with only Yardley and two civilian shift, he became interested in the construction of clerks. During the next two years, as it gradually UNCLASSIFIED 5 UNCLASSIFIED for the record shows a steady flow of decipherments back to the State Department. Many of these mes­ sages, as well as those intercepted by Army radio units, were to and from Mexico, a fact reflecting America's preoccupation with that country during the early 1900s. From the Navy came morse traffic from the powerful longwave station at Nauen, near Berlin. Some of this was intercepted by ships, for example, the U.S. S. San Diego, and some by the quaintly named "Listening-In Stations," one of which was located at City College in New York. The FBI sent Yardley such things as a suspicious message written on a postcard addressed to San Francisco. Similar material was forwarded to M.I.8 by the U.S. Postal Censorship organization. As its responsibilities increased, the Cipher Bureau was organized into five subsections-Code and Cipher Compilation, Communications, Shorthand, Secret Ink, and Code and Cipher Solution. At its peak-in No­ \ vember 1918, the last month of the war-M.1.8 had 151 people: 18 officers, 24 civilian cryptographers, and 109 typists and stenographers. 5 One of the civilian employees was the poet Stephen Vincent Benet, who served in November 1918 for seven days. 6 He was but one of many famous people with whom Yardley would Lieutenant Yardley in 1917 or early 1918. be associated during the next forty years. Captain Yardley spent the last few months of the war in Europe, observing the work of the British and French cipher bureaus and learning their methods of expanded, Yardley's organization moved several times solving enemy codes and ciphers. After the Armistice, to various locations in Northwest Washington, D. C. he remained in Paris to head a small cryptologic M.l.8 was responsible for examining and, if possible, support group attached to the American delegation to reading all secret communications corning to the at­ the Peace Conference. On his return to the United tention of the War, Navy, State, and Just ice Depart­ ments, Postal Censorship, and other official and semi­ States, in April 1919, he found demobilization in full official agencies. In addition, Yardley began a course swing and M.1.8 being rapidly dismantled. Convinced of inst ruction in cryptology for new people roming into of the necessity of maintaining a peacetime cryptologic the organization. capability in the government, Yardley encouraged the Most of M.l.8's material came from the War and Director of Military Intelligence in his efforts to State Departments. The latter, under provisions of establish a "permanent organization for code and the wartime censorship laws, had access to all messages cipher work" to be funded jointly by the War and carriPd by the commercial telegraph and cable com­ State Departments. The supporting arguments-prob­ panies. The rest of Yardley's material camp from radio ably written by Yardley-claimed that M.1.8 had, intercept and surveillance of overseas and domestic during the past eighteen months, read almost 11, 000 muil. Typical of the requests made of "Yardley's messages in 579 systems. This was in addition to "the bureau," as it was later known, is a letter of 8 enormous number of personal codes and ciphers sub­ February 1918 from Leland Harrison, Ottlce of the mitted by the Postal Censorship" and the letters Counselor at the State Department, which reads: examined for secret writing; these were said to number "Dear Mr. Yardley: I beg to enclose herewith copies 2,000 per week for several months. The section was of two ~uspicious telegrams, and would appreciate your also said to have compiled cipher tables and code making an effort to ascertain their content,;." In most books and to have trained military attaches, code cases. lw was apparently able to read th<· messages, clerks, and cryptographers. 6 LJNCLASSIFIED UNCLASSIFIED The arguments for a permanent cryptologic organi- Acting Secretary of State Frank L. Polk approved the zation were summed up this way: plan on 17 May 1919, followed two days later by Army If it is worth while to know exactly what instructions foreign Chief of Staff Peyton C. March. M. I. 8, later to become powers give to their representatives at Washington, it is famous as the American Black Chamber, 8 was now important to maintain M.I.8 with a sufficient personnel in time of peace. If the impressions and opinions of diplomatic repre­ officially in business as a permanent, peacetime sentatives at other capitals and the instructions they receive as organization. to attitudes and actions are of importance for the maintenance of peace, the cheapest, indeed the only, way to keep constantly The Move to New York and promptly informed on these matters is to preserve M.1.8 During the summer of 1919, Yardley, now a major, 9 with a suitable personnel. Intimate knowledge of the true sentiments and intentions of other nations may often be an moved his organization to a four-story brownstone at important factor in determining whether we are to have peace 3 East 38th Street, just off Fifth Avenue and across or war. 7 the street from the Bonwit Teller department store. The plan called for a code and cipher bureau to be Just why he left Washington is not known with headed by Yardley and staffed by fifty civilians. certainty. The generally accepted reason was given by Yardley's salary was to be ~,000 per year. There Yardley: "I was told," he said, "that there was a joker would be twenty-five "code and cipher experts," ten of in the Department of State special funds: they could whom would be paid $3,000 each; the other fifteen not legally be expended within the District of Colum­ would each receive $2,000. There would be twenty-five bia. " 10 Nothing in the existing records confirms this, clerks at $1,200. The proposed annual budget was and Yardley himself later gave another reason for the $100,000, of which $40,000 would come from the State move: it was necessary, he said, to get away from Department.
Recommended publications
  • CODEBREAKING Suggested Reading List (Can Also Be Viewed Online at Good Reads)
    MARSHALL LEGACY SERIES: CODEBREAKING Suggested Reading List (Can also be viewed online at Good Reads) NON-FICTION • Aldrich, Richard. Intelligence and the War against Japan. Cambridge: Cambridge University Press, 2000. • Allen, Robert. The Cryptogram Challenge: Over 150 Codes to Crack and Ciphers to Break. Philadelphia: Running Press, 2005 • Briggs, Asa. Secret Days Code-breaking in Bletchley Park. Barnsley: Frontline Books, 2011 • Budiansky, Stephen. Battle of Wits: The Complete Story of Codebreaking in World War Two. New York: Free Press, 2000. • Churchhouse, Robert. Codes and Ciphers: Julius Caesar, the Enigma, and the Internet. Cambridge: Cambridge University Press, 2001. • Clark, Ronald W. The Man Who Broke Purple. London: Weidenfeld and Nicholson, 1977. • Drea, Edward J. MacArthur's Ultra: Codebreaking and the War Against Japan, 1942-1945. Kansas: University of Kansas Press, 1992. • Fisher-Alaniz, Karen. Breaking the Code: A Father's Secret, a Daughter's Journey, and the Question That Changed Everything. Naperville, IL: Sourcebooks, 2011. • Friedman, William and Elizebeth Friedman. The Shakespearian Ciphers Examined. Cambridge: Cambridge University Press, 1957. • Gannon, James. Stealing Secrets, Telling Lies: How Spies and Codebreakers Helped Shape the Twentieth century. Washington, D.C.: Potomac Books, 2001. • Garrett, Paul. Making, Breaking Codes: Introduction to Cryptology. London: Pearson, 2000. • Hinsley, F. H. and Alan Stripp. Codebreakers: the inside story of Bletchley Park. Oxford: Oxford University Press, 1993. • Hodges, Andrew. Alan Turing: The Enigma. New York: Walker and Company, 2000. • Kahn, David. Seizing The Enigma: The Race to Break the German U-boat Codes, 1939-1943. New York: Barnes and Noble Books, 2001. • Kahn, David. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet.
    [Show full text]
  • Center for Cryptologic History Publications Lili33-P.L
    I) 1 > 1 -F.L. gt-?P D@@Z& 3021101 REF ID:. Center for Cryptologic History Brochures Use this form to order a copy of any of these publications. [All brochures are unclassified] Solving the Enigma: History of the Cryptanalytic Bombe Traces the history of the development of the cryptanalytic Bombe during WWII. It discusses the history of the Bombe from the time the Poles solved the Enigma, through the British involvement in developing the machine, the Navy contract with National Cash Register Corp. to build an American version, and, finally, the Allied successes against German U-boats in the North Atlantic. The Start of the Digital Revolution: SIGSALY - Secure Digital Voice Communications in World War I1 A brief overview of the revolutionary effort to provide secure voice communications for high-level government officials. Army Security Agency Aerial Reconnaissance: Mission and Sacrifice. Describes the use of Army aircraft for DIF and ELlNT collection, primarily during the Vietnam War. Sharing the Burden: Women in Cryptology during World War 11. A brief look at the contributions and sacrifices made by women as civilian and military cryptologists during WWII. American Cryptology: Two Centuries of Tradition A synopsis of the role of cryptology in the American Revolution, Civil War, interwar period, and World Wars, and concluding with the establishment of the National Security Agency. The Cipher Disk ppproved for Release by NSA on 08-1 7-2006, FOlA Case # - - d.2848 -- -- - - -- - - -- - - -- - - Invented in Italy sometime before 1470, the cipher disk represented a breakthrough in ease of encipherment and decipherment. This basic invention survived to be used until several years after the First World War.
    [Show full text]
  • 9 Purple 18/2
    THE CONCORD REVIEW 223 A VERY PURPLE-XING CODE Michael Cohen Groups cannot work together without communication between them. In wartime, it is critical that correspondence between the groups, or nations in the case of World War II, be concealed from the eyes of the enemy. This necessity leads nations to develop codes to hide their messages’ meanings from unwanted recipients. Among the many codes used in World War II, none has achieved a higher level of fame than Japan’s Purple code, or rather the code that Japan’s Purple machine produced. The breaking of this code helped the Allied forces to defeat their enemies in World War II in the Pacific by providing them with critical information. The code was more intricate than any other coding system invented before modern computers. Using codebreaking strategy from previous war codes, the U.S. was able to crack the Purple code. Unfortunately, the U.S. could not use its newfound knowl- edge to prevent the attack at Pearl Harbor. It took a Herculean feat of American intellect to break Purple. It was dramatically intro- duced to Congress in the Congressional hearing into the Pearl Harbor disaster.1 In the ensuing years, it was discovered that the deciphering of the Purple Code affected the course of the Pacific war in more ways than one. For instance, it turned out that before the Americans had dropped nuclear bombs on Japan, Purple Michael Cohen is a Senior at the Commonwealth School in Boston, Massachusetts, where he wrote this paper for Tom Harsanyi’s United States History course in the 2006/2007 academic year.
    [Show full text]
  • A Cipher Based on the Random Sequence of Digits in Irrational Numbers
    https://doi.org/10.48009/1_iis_2016_14-25 Issues in Information Systems Volume 17, Issue I, pp. 14-25, 2016 A CIPHER BASED ON THE RANDOM SEQUENCE OF DIGITS IN IRRATIONAL NUMBERS J. L. González-Santander, [email protected], Universidad Católica de Valencia “san Vicente mártir” G. Martín González. [email protected], Universidad Católica de Valencia “san Vicente mártir” ABSTRACT An encryption method combining a transposition cipher with one-time pad cipher is proposed. The transposition cipher prevents the malleability of the messages and the randomness of one-time pad cipher is based on the normality of "almost" all irrational numbers. Further, authentication and perfect forward secrecy are implemented. This method is quite suitable for communication within groups of people who know one each other in advance, such as mobile chat groups. Keywords: One-time Pad Cipher, Transposition Ciphers, Chat Mobile Groups Privacy, Forward Secrecy INTRODUCTION In cryptography, a cipher is a procedure for encoding and decoding a message in such a way that only authorized parties can write and read information about the message. Generally speaking, there are two main different cipher methods, transposition, and substitution ciphers, both methods being known from Antiquity. For instance, Caesar cipher consists in substitute each letter of the plaintext some fixed number of positions further down the alphabet. The name of this cipher came from Julius Caesar because he used this method taking a shift of three to communicate to his generals (Suetonius, c. 69-122 AD). In ancient Sparta, the transposition cipher entailed the use of a simple device, the scytale (skytálē) to encrypt and decrypt messages (Plutarch, c.
    [Show full text]
  • The First Americans the 1941 US Codebreaking Mission to Bletchley Park
    United States Cryptologic History The First Americans The 1941 US Codebreaking Mission to Bletchley Park Special series | Volume 12 | 2016 Center for Cryptologic History David J. Sherman is Associate Director for Policy and Records at the National Security Agency. A graduate of Duke University, he holds a doctorate in Slavic Studies from Cornell University, where he taught for three years. He also is a graduate of the CAPSTONE General/Flag Officer Course at the National Defense University, the Intelligence Community Senior Leadership Program, and the Alexander S. Pushkin Institute of the Russian Language in Moscow. He has served as Associate Dean for Academic Programs at the National War College and while there taught courses on strategy, inter- national relations, and intelligence. Among his other government assignments include ones as NSA’s representative to the Office of the Secretary of Defense, as Director for Intelligence Programs at the National Security Council, and on the staff of the National Economic Council. This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other US government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: (Top) Navy Department building, with Washington Monument in center distance, 1918 or 1919; (bottom) Bletchley Park mansion, headquarters of UK codebreaking, 1939 UNITED STATES CRYPTOLOGIC HISTORY The First Americans The 1941 US Codebreaking Mission to Bletchley Park David Sherman National Security Agency Center for Cryptologic History 2016 Second Printing Contents Foreword ................................................................................
    [Show full text]
  • Foreign Intelligence Surveillance Act of 1978
    FOREIGN INTELLIGENCE SURVEILLANCE ACT OF 1978 HEARINGS BEFORE THE SUBCOMMITTEE ON INTELLIGENCE AND THE RIGHTS OF AMERICANS OF THE SELECT COMMITTEE ON INTELLIGENCE OF THE UNITED STATES SENATE NINETY-FIFTH CONGRESS SECOND SESSION ON S. 1566 FOREIGN INTELLIGENCE SURVEILLANCE ACT O1 1978 JTLY 19, 21, 1977 AND FEBRUARY 8, 24, 27, 1978 Printed for the use of the Select Committee on Intelligence U.S. GOVERNMENT PRINTING OFFICE 94-628 WASHINGTON: 1978 For sale by the Superintendent of Documents, U.S. Government Printing Office Washington, D.C. 20402 Stock Number 052-070-04477-2 SENATE SELECT COMMITTEE ON INTELLIGENCE (Established by S. Res. 400, 94th Cong., 2d sess.) DANIEL K. INOUYE, Hawaii, Chairman BARRY GOLDWATER, Arizona, Vice Chairman BIRCH BAYE, Indiana CLIFFORD P. CASE, New Jersey ADLAI E. STEVENSON, Illinois JA GMEN, Utah WILLIAM D. HATHAWAY, Maine CHARLES McC. MATHIAS, Sn., Maryland WALTER D. HUDDLESTON, Kentucky JAMES B. PEARSON, Kansas JOSEPH R. BIDEN, J., Delaware JOHN H. CHAFES, Rhode Island ROBERT MORGAN, North Carolina RICHARD G. LUGAR, Indiana GARY HART, Colorado MALCOLM WALLOP, Wyoming DANIEL PATRICK MOYNIHAN, New York ROBERT C. BYRD, West Virginia, Ew Officio Member HOWARD H. BAKER, JR., Tennessee, Ex Officio Member WILLIAM 0. MILLER, Staff Director EARL D.EIsHNHOWER, Minority Staff Director AUDREY H. HATCR, Chief Clerk SUBCOsMITTE ON INTELLIGENCE AND THE ]RIGHTS OF AMERICANS BIRCH BAYH, Indiana, Chiran SAKE GARN, Utah, Vice Chairman ROBERT MORGAN, North Carolina CLIFFORD P. CASE, New Jersey DANIEL PATRICK MOYNIHAN, New York JOHN H. CHAFEE, Rhode Island CONTENTS HEARING DAYS Page Tuesday, July 19, 1977 1----. Thursday, July 21, 1977---------------------------------------------- 45 Wednesday, February 8, 1978 ----------------------------------------- 87 Friday, February 24, 1978 ------------------------------------------- 185 Monday, February 27, 1978 ------------------------------------------- 11 LIST OF WITNESSES TUESDAY, JULY 19, 1977 Testimony of Griffin B.
    [Show full text]
  • The Battle Over Pearl Harbor: the Controversy Surrounding the Japanese Attack, 1941-1994
    W&M ScholarWorks Dissertations, Theses, and Masters Projects Theses, Dissertations, & Master Projects 1995 The Battle Over Pearl Harbor: The Controversy Surrounding the Japanese Attack, 1941-1994 Robert Seifert Hamblet College of William & Mary - Arts & Sciences Follow this and additional works at: https://scholarworks.wm.edu/etd Part of the United States History Commons Recommended Citation Hamblet, Robert Seifert, "The Battle Over Pearl Harbor: The Controversy Surrounding the Japanese Attack, 1941-1994" (1995). Dissertations, Theses, and Masters Projects. Paper 1539625993. https://dx.doi.org/doi:10.21220/s2-5zq1-1y76 This Thesis is brought to you for free and open access by the Theses, Dissertations, & Master Projects at W&M ScholarWorks. It has been accepted for inclusion in Dissertations, Theses, and Masters Projects by an authorized administrator of W&M ScholarWorks. For more information, please contact [email protected]. THE BATTLE OVER PEARL HARBOR The Controversy Surrounding the Japanese Attack, 1941-1994 A Thesis Presented to The Faculty of the Department of History The College of William and Mary in Virginia In Partial Fulfillment Of the Requirements for the Degree of Master of Arts by Robert S. Hamblet 1995 APPROVAL SHEET This thesis is submitted in partial fulfillment of the requirements for the degree of Master of Arts '-{H JxijsJr 1. Author Approved, November 1995 d(P — -> Edward P. CrapoII Edward E. Pratt TABLE OF CONTENTS Page ACKNOWLEDGEMENTS......................................................................iv ABSTRACT..............................................................................................v
    [Show full text]
  • Mysterious Checks from Mauborgne to Fabyan
    Mysterious Checks from Mauborgne to Fabyan Steven M. Bellovin [email protected] https://www.cs.columbia.edu/˜smb CUCS-012-14 Abstract It has long been known that George Fabyan’s Riverbank Laboratories provided the U.S. military with cryptanalytic and training services during World War I. The relationship has always be seen as voluntary. Newly discovered evidence suggests that Fabyan was in fact paid, at least in part, for his services. At the start of World War I, the United States military had no formal cryptanalytic organization. There was certainly some expertise, notably in the persons of Parker Hitt, Joseph O. Mauborgne, and Herbert Yardley [8], but three people, however capable, cannot handle the demands of a war. There was a pocket of civilian expertise at George Fabyan’s Riverbank Laboratories in Illinois. He had set up a cryptologic group to find the alleged “hidden” cipher messages in Shakespeare’s plays [8]. Fabyan offered his services to the government; his staff, led by William Friedman, did some cryptanalysis (especially of Mexican government messages) and trained Army officers [12, p. 107]. It has long been thought that Fabyan provided these services gratis. Indeed, Friedman himself said so [12, p. 109]: It should be noted, and it gives me considerable pleasure to tell you, that this instruction was conducted at Colonel Fabyan’s own expense as his patriotic contribution to the U.S. war effort. I can’t, in this lecture, say much more about this than it involved the expenditure of many thousands of dollars, never repaid by the government — not even by income-tax deduction or by some decoration or similar sort of recognition.
    [Show full text]
  • William Friedman, Geneticist Turned Cryptographer
    HIGHLIGHTED ARTICLE | PERSPECTIVES William Friedman, Geneticist Turned Cryptographer Irwin L. Goldman1 Department of Horticulture, University of Wisconsin–Madison, Wisconsin 53706 ABSTRACT William Friedman (1891–1969), trained as a plant geneticist at Cornell University, was employed at Riverbank Laboratories by the eccentric millionaire George Fabyan to work on wheat breeding. Friedman, however, soon became intrigued by and started working on a pet project of Fabyan’s involving the conjecture that Francis Bacon, a polymath known for the study of ciphers, was the real author of Shakespeare’s plays. Thus, beginning in 1916, Friedman turned his attention to the so called “Baconian cipher,” and developed decryption techniques that bore similarity to approaches for solving problems in population genetics. His most significant, indeed pathbreaking, work used ideas from genetics and statistics, focusing on analysis of the frequencies of letters in language use. Although he had transitioned from being a geneticist to a cryptographer, his earlier work had resonance in his later pursuits. He soon began working directly for the United States government and produced solutions used to solve complex military ciphers, in particular to break the Japanese Purple code during World War II. Another important legacy of his work was the establishment of the Signal Intelligence Service and eventually the National Security Agency. KEYWORDS cryptogram; cryptanalysis; Baconian cipher; Riverbank Laboratory code is a rule that governs how one piece of information of a gene. Thus, codes and coding have long been a part of Ais converted into a different representation of that in- understanding modern genetics and may be an important formation. Both language and writing are elegant examples part of the allure of this field of science.
    [Show full text]
  • Section Nineteen
    Fall 2006 Chris Christensen MAT/CSC 483 ADFGVX Cipher The most famous field cipher in all cryptology is the ADFGVX cipher. Fritz Nebel (1891 – 1967), a German radio staff officer, invented the cipher, and the German army began using an earlier version of it, the ADFGX cipher, on March 5, 1918, on the Western Front. The ADFGVX cipher involves both a substitution and a transposition. The substitution portion of the cipher is based on the Polybius square. Polybius Square Polybius was a Greek historian and cryptographer of the second century BC. Polybius used a 5×5 square into which he inserted the 24 letters of the Greek alphabet. If we use the English alphabet of 26 letters, we must combine 2 of the letters into one cell – say, i and j (alternatively, in older versions of the square, k and q also seemed to be common cell-mates.) 1 23 4 5 1abc d e 2f ghi/jk 3lmnop 4q rs t u 5vwx y z The square is then used for substitution -- to convert letters to numbers; e.g., h would be 23. Polybius used a torch system by which an observer could determine the row and column of the letter being transmitted. The sender would stand on a high location and hold a torch in each hand. To send an h (23), the sender 1 would raise the right-hand torch twice followed by the left-hand torch three times. An audible version of the square, called the "knock cipher," has also been used by prisoners over the centuries to transmit messages from cell to cell.
    [Show full text]
  • Collegiate Codebreakers: Winthrop, Women, and War
    Winthrop University Digital Commons @ Winthrop University Graduate Theses The Graduate School Spring 5-2020 Collegiate Codebreakers: Winthrop, Women, and War Marlana Mayton Follow this and additional works at: https://digitalcommons.winthrop.edu/graduatetheses Part of the Military History Commons, United States History Commons, and the Women's History Commons May, 2020 To the Dean of the Graduate School: We are submitting a thesis written by Marlana Mayton entitled Collegiate Codebreakers: Winthrop, Women, and War. We recommend acceptance in partial fulfillment of the requirements for the degree of Master of Arts in History. _____________________________ Dr. Eddie Lee, Thesis Advisor _____________________________ Dr. Virginia Williams, Committee Member _____________________________ Dr. Catherine Chang, Committee Member _____________________________ Dr. Takita Sumter, Dean, College of Arts and Sciences _____________________________ Dr. Jack E. DeRochi, Dean, Graduate School COLLEGIATE CODEBREAKERS: WINTHROP, WOMEN, AND WAR A Thesis Presented to the Faculty Of the College of Arts and Sciences In Partial Fulfillment Of the Requirements for the Degree Of Master of Arts In History Winthrop University May, 2020 By Marlana Mayton Abstract During World War II, college-aged women from across the nation filled United States Army and Navy secretive cryptanalysis facilities to help win the war. For many women, colleges facilitated involvement in codebreaking. Through information gathered in oral histories, this thesis primarily explores war related programs at American colleges and the young women that became cryptanalysts. Academic institutions, like Winthrop College, became the nuclei for colligate codebreakers. They acted as early crypt education centers, through the offering of cryptology classes, functioned as recruitment centers, and operated as essential training hubs.
    [Show full text]
  • Ecommunicator - Summer 2019
    eCommunicator - Summer 2019 Journal of 32 Signal Regiment eCommunicator Volume 19, Number 1 http://www.torontosignals.ca/ In this issue of the eCommunicator Change of RCCS Beret Pg 17 Commanding Officer’s Parade Pg 16 New Unit Crest Pg 19 Junior Ranks Formal Pg 13 Table of Content About the eCommunicator 3 CO’s Message This is a limited domestic publication produced with 4 RSM’s Message the permission of the Commanding Officer for the purpose of recording the activities within the 5 Honouraries Message Regiment and the Regimental family. It is intended 7 Padre to provide a wide variety of material relating to military communications and military affairs, both Features at home and abroad. 8 Awards and Promotions The views and opinions expressed in this periodical 10 DWD — Warrant Officer Lee Whalen, CD are those of the contributors and not those of the 12 Associates Dinner Department of National Defence, its Units or 13 Junior Ranks Formal Officers, including the Commanding Officer of 32 15 CAF National Women’s Volleyball Championship Signal Regiment. 16 CO’s Parade The editor and publisher are responsible for the 17 Change of Beret Parade production of the eCommunicator but not for the 18 Garrison Ball accuracy, timeliness or description of written and 19 New Unit Crest graphical material published therein. 19 Royal Canadian Logistics Service Branch and RCEME Corps The editor reserves the right to modify or re-format 20 Technology Topic: Software-Defined Radio (SDR) material received, within reason, in order to make 22 709 Signals Army Cadet Corps best use of available space, appearance and layout.
    [Show full text]