Gateways to Bletchley

Total Page:16

File Type:pdf, Size:1020Kb

Gateways to Bletchley Special Section Goes Here GATEWAYS to BLETCHLEY Gair Dunlop letchley Park is a former country estate, with a large Bhouse in an undistinguished late Victorian style. During its time as the headquarters of UK cryptanalysis efforts in World War II, its grounds began to fill with huts, followed by massive information- processing blocks. In the postwar era, elements of the intelligence services remained until much of it became a telecommunications training school. It is located in the Home Counties of England, equidistant between Oxford and Cam- bridge, about an hour north of London, now encroached upon by archetypal developer- speculative suburbia, at the edge of the New Town of Milton Keynes. It can be seen as an under- acknowledged cauldron of information- processing experimen- tation, a cinematic cypher, and a prism through which we can view British senses of wartime, class, transatlantic power, stunted modernity, the military roots of the information age, and relations to ruin and redevelopment (fig. 1). There are a series of binaries at work in representations of Bletchley: revelation and coyness display and absence depth and surface Different approaches to a site of myth — redevelopment, nostalgia, mystery, and technology — are here explored in a primarily photographic journey. 151 Cultural Politics, Volume 10, Issue 2, © 2014 Duke University Press DOI: 10.1215/17432197-2651747 Downloaded from http://read.dukeupress.edu/cultural-politics/article-pdf/10/2/151/404209/0100151.pdf by guest on 25 September 2021 Gair Dunlop on 25 September 2021 by guest Downloaded from http://read.dukeupress.edu/cultural-politics/article-pdf/10/2/151/404209/0100151.pdf 152 CULTURAL POLITICS • 10:2 July 2014 Figure 1 Reception area, Block Photo: D. Gair Dunlop GATEWAYS to BLETCHLEY Background Londoner, his voice was returned to the Codebreaking relied on finding a “depth,” lower orders after the war. a sequence repeated nearly, but not quite identically, across messages, allowing Logistics intuition and computing power a space to The mythology of Bletchley Park is all pry apart the logic of the underlying mech- about the small: small huts, small huddles, anisms. Different approaches to our experi- a few initiates. The real Bletchley Park ence of the site might function similarly. grew to a complement of over nine thou- There were two main code systems sand staff. Codebreaking was an indus- broken at Bletchley: Enigma, which was trial, not artisanal, process. Bletchley as based on a (relatively) straightforward dreamtime, as place of public imagination, mechanical system, and Lorenz, a much is paradoxical. Half- known and constantly more complicated proposition. With recirculated legends persist in public Enigma, code wheel settings could in the- discourse alongside factual accounts, ory have been broken by hand, but it would interspersed with significant silences and have taken far too long to go through all gaps. Enigma stories have more traction the possibilities. Alan Turing suggested a than Colossus stories, despite the latter’s means of mechanization of the attack on greater significance. Vagueness persisted; the codes (the Turing “bombes”). as late as 1996, writers could still refer to The Lorenz cipher was considerably “Turing’s Colossus” (Edwards 1996). tougher; the answer was the world’s first Postwar uses of the site included a semiprogrammable computer, Colossus, Diplomatic Wireless Service transmission run on thousands of valves for high- speed station, as well as a telecommunications switching. While Turing’s theoretical training school for the General Post Office, insights suggested general approaches which would subsequently become pri- to the problem, and indicated desirable vatized as British Telecom. The site was qualities and capabilities of a computing abandoned in 1992, and the Bletchley Park machine, the device was, in fact, sug- Trust began operations to work with the gested and designed by a Post Office engi- remains. neer named Thomas Flowers, influenced In terms of the remaining structure by the mathematical intuitions of Bill Tutte. and its consequences for understand- Flowers’s prototype met with skepticism ing, the master plan document puts it and some resistance from the theorists, succinctly: “Whilst a central area of the but it worked the first time out and broke site has operated as a museum for the its first code settings in less than an hour. past decade, a lack of resources and sale Flowers never received due recog- of outlying parts of the site for develop- CS nition for his work; he had to watch the ment — without controls to capture some I T of the value created to effectively contrib- I glory showered on the ENIAC (Electronic L Numerical Integrator and Computer) sys- ute to conservation of the historic assets O P tem as the world’s first computer and of the whole — has limited the potential to endure humiliations from his employers, to bring forward a considered and holistic as he could not reveal the true source plan for conservation and renewal at the of his certainty that electronics and not Park” (EDAW Consultants 2005). CULTURAL analog servos were the communication Cramped suburban terraces, in tools of the future. As a working- class standard UK developers’ idiom, subsidized 153 Downloaded from http://read.dukeupress.edu/cultural-politics/article-pdf/10/2/151/404209/0100151.pdf by guest on 25 September 2021 Gair Dunlop Figure 2 New-build suburbia, on the site of Colossus facilities, Bletchley Park. Photo: Gair Dunlop with tax breaks, have been built over the Cinematics margins of the site and now cover the site Between Blocks B and D, to the north of the famous Block F: the true origin- site of the site, a large model submarine sits of the computer age (fig. 2). The end of in front of the TS Invincible, which is a the Cold War meant the abandonment of Portakabin- style structure that is home the site by the intelligence agencies, while to the Milton Keynes Naval Cadet Corps the privatization of the General Post Office (Milton Keynes is over sixty miles from and its transformation into British Telecom the sea). meant that the link to a historic sense of This twenty- five- foot model of a VIIC ownership was broken. Telephone training U- boat carries no markings or identifica- moved, and the site margins were parceled tion. There is no interpretation or con- up and sold off. This process continued textualization. Depending on the cultural into the era of the trust; conflicts of interest baggage of the visitor, it can represent led to senior resignations, and the current either U- 571 or U- 559. The former is a trust has to plan and build within limited fictitious film (2000), set in the Atlantic parameters. Block G is inside the conserva- in 1942, in which American sailors battle tion area but not within the site perimeter: this submarine and recover an Enigma a limbo. Paradoxically, this in- between machine and codebooks, thus shortening state makes it peculiarly valuable as a site the war. The incident fictionalized in the for reverie, historical musing, and experi- film was, in reality, an attack on submarine encing an analogue structure to the U- 559, which was forced to the surface “Ur- site,” the now- vanished Block F (fig. 3). in the Mediterranean by HMS Petard. Figure 3 More new-build suburbia; ultra was the code word for intelligence material from Bletchley Park. Photo: Gair Dunlop Downloaded from http://read.dukeupress.edu/cultural-politics/article-pdf/10/2/151/404209/0100151.pdf by guest on 25 September 2021 GATEWAYS to BLETCHLEY The submarine crew attempted to sink (Kate Winslet) waits for moody protagonist the U- 559 and then abandoned it without and tormented codebreaker Tom Jeri- destroying their codebooks, which were cho (Dougray Scott) on the steps of the retrieved by two Royal Navy officers from National Gallery. War is over, normality is HMS Petard, at the cost of their lives, and restored, and finally real love, as opposed by a ship’s boy, who survived. A museum to obsessive, delusional love, is celebrated. allowing an uninflected and fictionalized Codebreakers are now once again civilians. reading of its own origin myth may be The “ordinary Britons” of Jennings’s film considered unusual (fig. 4). are foregrounded as the story reaches Figure 4 Submarine model, built for the filmEnigma (2001). Photo: Gair Dunlop Behind the submarine in the left- hand toward its exit scene. The acid yellow photograph is Block D, now used as stor- colors of its finale — as the lovers drive into age for the National Museum of Comput- their cinematic future through fields of ing collection. It is not currently accessible rapeseed (barely grown in England before to the public. the 1970s) places our sense of genetically modified, technologically determined Anachronistic Yellow: Listen to Britain springtime into theirs. The indeterminate submarine and its CS competing national narratives of conquest Splitting: Half a Past I T floats as a metaphor for the relationship You are inside the gates. In theory, sites I L between the United States and the United of wonder await. But not all doors are O P Kingdom, in the same way in which the open. Decisions involving access, health Trafalgar Square sequence of the film and safety issues, managed decline, and Enigma (2001) places us in relation to the restoration priorities have left their mark idealistic, longed- for nation of Humphrey on the visitor experience. Simulations CULTURAL Jennings’s Listen to Britain (1942). In stand in for artifacts. Hut 11 uses props Enigma, Bletchley worker Hester Wallace for the Enigma film in re- creations of the 155 Downloaded from http://read.dukeupress.edu/cultural-politics/article-pdf/10/2/151/404209/0100151.pdf by guest on 25 September 2021 Gair Dunlop Figure 5 Hut 11, a.k.a.
Recommended publications
  • To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?
    Portland State University PDXScholar Young Historians Conference Young Historians Conference 2016 Apr 28th, 9:00 AM - 10:15 AM To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology? Hayley A. LeBlanc Sunset High School Follow this and additional works at: https://pdxscholar.library.pdx.edu/younghistorians Part of the European History Commons, and the History of Science, Technology, and Medicine Commons Let us know how access to this document benefits ou.y LeBlanc, Hayley A., "To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?" (2016). Young Historians Conference. 1. https://pdxscholar.library.pdx.edu/younghistorians/2016/oralpres/1 This Event is brought to you for free and open access. It has been accepted for inclusion in Young Historians Conference by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. To what extent did British advancements in cryptanalysis during World War 2 influence the development of computer technology? Hayley LeBlanc 1936 words 1 Table of Contents Section A: Plan of Investigation…………………………………………………………………..3 Section B: Summary of Evidence………………………………………………………………....4 Section C: Evaluation of Sources…………………………………………………………………6 Section D: Analysis………………………………………………………………………………..7 Section E: Conclusion……………………………………………………………………………10 Section F: List of Sources………………………………………………………………………..11 Appendix A: Explanation of the Enigma Machine……………………………………….……...13 Appendix B: Glossary of Cryptology Terms.…………………………………………………....16 2 Section A: Plan of Investigation This investigation will focus on the advancements made in the field of computing by British codebreakers working on German ciphers during World War 2 (1939­1945).
    [Show full text]
  • How I Learned to Stop Worrying and Love the Bombe: Machine Research and Development and Bletchley Park
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CURVE/open How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park Smith, C Author post-print (accepted) deposited by Coventry University’s Repository Original citation & hyperlink: Smith, C 2014, 'How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park' History of Science, vol 52, no. 2, pp. 200-222 https://dx.doi.org/10.1177/0073275314529861 DOI 10.1177/0073275314529861 ISSN 0073-2753 ESSN 1753-8564 Publisher: Sage Publications Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders. This document is the author’s post-print version, incorporating any revisions agreed during the peer-review process. Some differences between the published version and this version may remain and you are advised to consult the published version if you wish to cite from it. Mechanising the Information War – Machine Research and Development and Bletchley Park Christopher Smith Abstract The Bombe machine was a key device in the cryptanalysis of the ciphers created by the machine system widely employed by the Axis powers during the Second World War – Enigma.
    [Show full text]
  • I3?O SUPPLEMENT to the LONDON GAZETTE, 23 MARCH, 1943
    I3?o SUPPLEMENT TO THE LONDON GAZETTE, 23 MARCH, 1943 Stoker Petty Officer Robert Stanley Connor, Chief Engine .-.Room Artificer Francis Frederick P/KX.82526. '.','' -Claud Nelmes, D/M.628i. Engine Room Artificer Fourth Class Harry Chief Petty Officer Cook Frederick Bertram Lees, C/MX.92I23. • • Bowen, D/MX.46140. Engine Room Artificer Fourth Class Cecil Neill, , Acting Yeoman of Signals Frederick Sidney D/MX.73053. Street, ,D/SSX.204i3. Leading Steward Woodrow Craig Douglas, Marine John Joseph Cook, Ply/X.2746. D/LX.24527. Leading Stoker Ronald George '-\Vard, D/KX. • 85717. • ' ' , . For gallantry in air operations during the Leading Stoker Cyril Edwin Vickerstaff, P/ JX. passage of an important Convoy to Malta: 91812. ' The Distinguished Service Cross. Acting Leading Stok;er 'Robert Stanley Vines, D/KX.90328. Temporary Acting Sub-Lieutenant (A) Peter Leading Telegraphist George William Henry James Hutton, R.N.V.R. Wyatt, P/JX.I37938. Acting Leading Telegraphist Josiah Wilde, , Mention in Despatches (Posthumous). <P/JX.i7836i. : Temporary Sub-Lieutenant (A) Michael Able Seaman Henry 'Dunn, C/TD/X.2084- ; Hankey, R.N.V.R. Able Seaman Edwin George King, P/J. 101393. ; Telegraphist James Gordon Hibbert, D/SSX. i Mention in Despatches. ' 29430. Acting Sub-Lieutenant (A) Douglas John Stoker First Class Harry Palliaser, -C/KX. ! McDonald, Royal Navy. For skill and determination in action For distinguished services:' against enemy Submarines while serving in H.M. Ships Crocus and Fame: To be a Companion of the Distinguished Service Order: ' J The Distinguished Service Cross. Lieutenant-Commander Redvers Michael Prior, Temporary Lieutenant John Ferdinand Holm, D.S.C., Royal Navy.
    [Show full text]
  • Cryptography in a Quantum World
    Cryptography in a Quantum World ⋆ Gilles Brassard 1,2 1 D´epartement d’informatique et de recherche op´erationnelle Universit´ede Montr´eal, C.P. 6128, Succursale Centre-ville Montr´eal (QC), H3C 3J7 Canada 2 Canadian Institute for Advanced Research [email protected] http://www.iro.umontreal.ca/~brassard/en/ Abstract. Although practised as an art and science for ages, cryptog- raphy had to wait until the mid-twentieth century before Claude Shannon gave it a strong mathematical foundation. However, Shannon’s approach was rooted is his own information theory, itself inspired by the classical physics of Newton and Einstein. But our world is ruled by the laws of quantum mechanics. When quantum-mechanical phenomena are taken into account, new vistas open up both for codemakers and codebreakers. Is quantum mechanics a blessing or a curse for the protection of privacy? As we shall see, the jury is still out! Keywords: Cryptography, Quantum mechanics, Quantum computa- tion, Post-quantum cryptography, Quantum communication, Quantum key distribution, Edgar Allan Poe 1 Introduction For thousands of years, cryptography has been an ongoing battle between code- makers and codebreakers [1,2], who are more formally called cryptographers and cryptanalysts. Naturally, good and evil are subjective terms to designate code- makers and codebreakers. As a passionate advocate for the right to privacy, my allegiance is clearly on the side of codemakers. I admit that I laughed hyster- ically when I saw the Zona Vigilada warning that awaits visitors of the Pla¸ca de George Orwell near City Hall in Barcelona [3]. Nevertheless, I recognize that codebreakers at Bletchley Park during the Second World War were definitely on the side of good.
    [Show full text]
  • War Machines: Women's Computing Work and the Underpinnings of the Data-Driven State, 1930-1946
    Programmed Inequality How Britain Discarded Women Technologists and Lost Its Edge in Computing Marie Hicks HD 6135 H53 2017 The Library Mt. St. Vincent Univ. Halifax, N.S. B3M 2J6 The MIT Press Cambridge, Massachusetts London, England 1 War Machines: Women's Computing Work and the Underpinnings of the Data-Driven State, 1930-1946 In recent years, the restoration of Bletchley Park has attracted worldwide attention. The country estate in Milton Keynes, United Kingdom, was the site of the most important codebreaking operations of World War II and home to the first digital, electronic, programmable computer: the Colossus. The British-designed and manufactured Colossus computers, of which there were ten in all by war's end, were critical to the conduct of Allied wartime operations. Unlike their better-known U.S. counter­ part, the ENIAC, the Colossus computers were actually deployed during the war, actively changing its outcome. Kept secret for decades, the full import of the developments at Bletchley has only recently become widely known.1 Yet while popular culture has begun to recognize the importance of Bletchley's wartime operations, misunderstandings persist about the nature of the information work performed there. The 2014 blockbuster The Imitation Game, for instance, cleaves the Colossus computers from the narrative entirely in favor of building a "great man" narrative for a single codebreaker.2 Hidden within the story of Bletchley is a less popular narrative that cannot leverage the appeal of a lone genius and his accomplishments. Thousands of women worked at Bletchley during the war-most in tech­ nical roles.3 Although it is generally accepted that the striking and wide­ ranging roles of the mostly women workers within Bletchley Park give lie to stereotypes about computing as a traditionally masculine field, the contributions of these women have not been analyzed as constitutive of larger trends in the history of computing.
    [Show full text]
  • Naval Section – Hut 4
    The Mansion. Photo: © the2xislesteam The Enigma cipher was the backbone of German military and intelligence communications. First invented in 1918, it was designed to secure banking communications where it achieved little success. However the German military were quick to see its potential, they thought it to be unbreakable, and not without good reason. Enigma's complexity was bewildering. The odds against anyone who did not know the settings being able to break Enigma were a staggering 150 million, million, million, to one. Back in 1932 the Poles had broken Enigma, at a time when the encoding machine was undergoing trials with the German Army., the Poles even managed to reconstruct a machine. At that time, the cipher altered every few months but with the advent of war it changed at least once a day effectively locking the Poles out. July 1939, the Poles had passed on their knowledge to the British and the French. This enabled the code-breakers to make critical progress in working out the order in which the keys were attached to the electrical circuits, a task that had been impossible without an Enigma machine in front of them. Armed with this knowledge, the code-breakers were then able to exploit a chink in Enigma's armour. A fundamental design flaw meant that no letter could ever be encrypted as itself; an A in the original message, for example, could never appear as an A in the code. This gave the code breakers a toehold. Errors in messages sent by tired, stressed or lazy German operators also gave clues.
    [Show full text]
  • Colossus: the Missing Manual
    Colossus: The Missing Manual Mark Priestley Research Fellow, The National Museum of Computing — Bletchley Park, UK Thomas Haigh University of Wisconsin—Milwaukee & Siegen University 1 serialized ciper text English Cipher text of one message plain text 1 0 0 1 1 (5 channel tape) 0 1 0 1 0 0 1 0 0 0 They were already 1 0 1 1 0 1 0 0 1 0 looking at him as approached in the distance, because he just stood out. He had quite an old face, 01101 11101 01011 0010 Knockolt Newmanry Newmanry Testery Testery Hut 3 Outstation Set Chi Wheels Generate Set Psi & Decrypt Translate Intercept, & Verify Counts “dechi” Motor Wheels Message Message Record & Verify Message (Colossus) (Tunny analog (Hand methods) (Tunny analog (Bilingual machine) machine) humans) dechi 1 0 0 1 1 0 27, 12, 30, 43, 8 Chi wheel 0 1 0 1 0 1 Psi & 55, 22 Sie sahen ihn schon 0 1 0 0 0 von weitem auf sich start posns. 1 0 1 1 0 1 0 0 1 0 motor start posns. zukommen, denn er for msg el auf. Er hatte ein 31, 3, 25, 18, 5 ganz altes Gesicht, aber wie er ging, German 1 0 0 1 1 0 0 1 0 1 0 1 0110001010... plain text 0 1 0 0 0 Newmanry 1 0 1 1 0 0011010100... 1 0 0 1 0 10011001001... 01100010110... 1 0 0 1 1 0 Break Chi 01011001101... 0 1 0 1 0 1 0110001010... 0 1 0 0 0 Wheels 1 0 1 1 0 Chi wheel 0011010100..
    [Show full text]
  • Code Breaking at Bletchley Park
    Middle School Scholars’ CONTENTS Newsletter A Short History of Bletchley Park by Alex ​ Lent Term 2020 Mapplebeck… p2-3 Alan Turing: A Profile by Sam Ramsey… ​ Code Breaking at p4-6 Bletchley Park’s Role in World War II by ​ Bletchley Park Harry Martin… p6-8 Review: Bletchley Park Museum by ​ Joseph Conway… p9-10 The Women of Bletchley Park by Sammy ​ Jarvis… p10-12 Bill Tutte: The Unsung Codebreaker by ​ Archie Leishman… p12-14 A Very Short Introduction to Bletchley Park by Sam Corbett… p15-16 ​ The Impact of Bletchley Park on Today’s World by Toby Pinnington… p17-18 ​ Introduction A Beginner’s Guide to the Bombe by Luca ​ “A gifted and distinguished boy, whose future Zurek… p19-21 career we shall watch with much interest.” This was the parting remark of Alan Turing’s Headmaster in his last school report. Little The German Equivalent of Bletchley could he have known what Turing would go on Park by Rupert Matthews… 21-22 ​ to achieve alongside the other talented codebreakers of World War II at Bletchley Park. Covering Up Bletchley Park: Operation Our trip with the third year academic scholars Boniface by Philip Kimber… p23-25 this term explored the central role this site ​ near Milton Keynes played in winning a war. 1 intercept stations. During the war, Bletchley A Short History of Bletchley Park Park had many cover names, which included by Alex Mapplebeck “B.P.”, “Station X” and the “Government Communications Headquarters”. The first mention of Bletchley Park in records is in the Domesday Book, where it is part of the Manor of Eaton.
    [Show full text]
  • Notes and References Documents Held at the Public Record Office, London, Are Crown Copyright and Are Reproduced by Permission of the Controller Ofhm Stationery Office
    Notes and References Documents held at the Public Record Office, London, are crown copyright and are reproduced by permission of the Controller ofHM Stationery Office. I NTRODUCTION Christopher Andrew and David Dilks I. David Dilks (ed.), The Diaries rifSir Alexander Cadogan O.M. 1938-1945 (Lon­ don , (971) , p. 21. 2. Interview with Professor Hinsley in Part 3 of the BBC Radio 4 documentary series 'T he Profession of Intelligence', written and presented by Christopher Andrew (producer Peter Everett); first broadcast 16 Aug 1981. 3. F. H. Hinsleyet al., British Intelligencein the Second World War (London, 1979-). The first two chapters of volume I contain a useful retrospect on the pre-war development of the intelligence community. Curiously, despite the publication of Professor Hinsley's volumes, the government has decided not to release the official histories commissioned by it on wartime counter-espionage and deception. The forthcoming (non-official) collection of essays edited by Ernest R. May, Knowing One's Enemies: IntelligenceAssessment before the Two World Wars (Princeton) promises to add significantly to our knowledge of the role of intelligence on the eve of the world wars. 4. House of Commons Education, Science and Arts Committee (Session 1982-83) , Public Records: Minutes ofEvidence, pp . 76-7. 5. Chapman Pincher, Their Trade is Treachery (London, 1981). Nigel West, A Matter of Trust: MI51945-72 (London, 1982). Both volumes contain ample evidence of extensive 'inside information'. 6. Nigel West , MI5: British Security Operations /90/-/945 (London, 1981), pp . 41, 49, 58. One of the most interesting studies of British peacetime intelligence which depends on a substantial amount of inside information is Antony Verrier's history of post-war British foreign policy , Through the Looking Glass (London, 1983) .
    [Show full text]
  • Enigma Machine and Its U-Boat Codes
    U-559 - U-BOAT CODES ARE BROKEN 0. U-559 - U-BOAT CODES ARE BROKEN - Story Preface 1. THE UNBREAKABLE CODE 2. THE U-BOATS 3. U-110 IN TROUBLE 4. U-110 CAPTURED 5. U-110 SINKS 6. THE CODE IS BROKEN (TEMPORARILY) 7. U-559 - U-BOAT CODES ARE BROKEN 8. U-505 IN PERIL 9. THE CAPTURE OF U-505 10. ENIGMA TODAY Two young British seamen lost their lives when they boarded the German U-boat depicted in this image: U-559. What Lt. Tony Fasson, Able Seaman Colin Grazier and Canteen Assistant Tommy Brown recovered from the sinking vessel helped Alan Turing and his colleagues at Bletchley Park to turn the tide of WWII against Hitler. Even when Bletchley Park began to decipher encrypted Nazi messages, the U-boat version of Enigma proved much more difficult. Not until 1943, after British sailors drowned trying to recover current Enigma-code documents from a captured German vessel, were U-boat codes broken on a regular basis. It wasn't an easy chase on October 30, 1942. HMS HMS Petard and three other British destroyers were pursuing a Nazi sub in the Mediterranean Sea, not far from the Egyptian shore. U-559 was proving why U-boats were so dangerous. She was elusive. The chase lasted 16 hours before U-559's commander decided to scuttle his damaged submarine about 70 miles north of the Nile Delta. (Follow this link to a map where U-559 went down. Look in the lower right-hand corner.) Demonstrating courage that is hard to comprehend, three young sailors swam from Petard to U-559.
    [Show full text]
  • Colossus and the Origins of Programmability
    Colossus and the Origins of Programmability Draft for discussion at the 2016 SIGCIS Workshop. Do not quote or cite without permission of the authors. Thomas Haigh ([email protected]) and Mark Priestley ([email protected]) This is an initial draft of some material from our ongoing project to explore the history of Tommy Flowers, the ways in which Colossus was used and configured, and its place in the history of information technology. This work is sponsored by Mrs. L.D. Rope’s Second Charitable Trust. The current draft is very preliminary, so please do not quote, cite, or distribute without our permission. If names and references are confusing to you our apologies! Fortunately the basics of Colossus and Bletchley Park are well covered in Wikipedia. Colossus was a codebreaking device built by the British General Post Office at the end of 1943, under the direction of career telecommunications engineer Tommy Flowers. It entered use at Bletchley Park in 1944 to speed the work of codebreakers targeting what was then codenamed “fish,” a family of Lorenz teleprinter codes used for high level German military communication. Colossus was not a one‐off machine, like most early electronic computers, but the prototype for a family of ten “colossi,” in which later models incorporated some significant improvements. The machines were used by the Newmanry, a group under mathematician Max Newman, where ingenious codebreaking users discovered new applications for them which, in turn, shaped the provision of additional controls and capabilities in the later models. Unlike ENIAC, which began in modest secrecy but soon graced the front page of the New York Times, Colossus was highly classified and remained unknown to the public until the 1970s.
    [Show full text]
  • Parallel Computing Prehistory
    Parallel Computing Prehistory John Burkardt Information Technology Department Virginia Tech .......... FDI Summer Track V: Using Virginia Tech High Performance Computing http://people.sc.fsu.edu/∼jburkardt/presentations/... history 2009 vt.pdf 26-28 May 2009 1 / 43 How Did We Get Here? [date uncertain] I don't know where I am, but I'm making record time! Last transmission from a Navy pilot, somewhere in the Pacific... 2 / 43 What Happens if You Don't Know Where You Are In 1707, Admiral Sir Cloudesly Shovell sank his fleet by sailing directly into the Scilly Islands, which weren't where he thought they were...because he didn't know where he was. 3 / 43 Fine Clockwork Can Tell You Where You Are The British Admiralty put out an RFP, seeking a reliable means of determining longitude. John Harrison's "superclock" solved the problem...though of course he had much trouble getting reimbursed! 4 / 43 Babbage Shows Calculation is Like Clockwork The Navy still had plenty of navigational problems in the 19th century, and (partially) funded Charles Babbage's Difference Engine and his Analytical Engine. 5 / 43 Hollerith Automates Data Processing Hermann Hollerith, inspired by an automatic weaving device, developed a machine to tabulate the 1890 census - later a big seller for the International Business Machine Corporation, aka IBM. 6 / 43 Numerical Calculations Were Done by "Computers" Computing was done by computers, that is, people. This is the computer lab for the Harvard Astronomical Observatory in 1890. 7 / 43 Richardson Forecasts the Weather Lewis Richardson attempted the first weather forecast in 1917.
    [Show full text]