Introduction 1 the Origins and Development of SOE's Security

Total Page:16

File Type:pdf, Size:1020Kb

Introduction 1 the Origins and Development of SOE's Security Notes Introduction 1. Mark Wheeler, ‘The SOE Phenomenon’, Journal of Contemporary History, 16(1) (1981), p. 515. 2. Author’s interview with A.A. Fyffe, 05.11.2001. 3. All references are to documents held at The National Archives (TNA): Public Record Office (PRO), Kew, unless otherwise stated. HS8/840, D/CE.6 to D/CE, 28.10.42. 4. HS9/23/3, Report by Lt. Turnbull, STS 6, 23.04.43. 5. Imperial War Museum Sound Archive (hereafter IWMSA), Interview with Peter Murray Lee (7493/10), Reel 5. 6. In a desperate attempt to bolster the staff of the code department, Marks sent a memo to the Ministry of Labour. The memo, in which Marks referred to SOE, had been written on ISRB headed notepaper, and was quickly brought to the attention of Boyle and Senter, who confronted Marks: ‘Brandishing my memo as if it were scorching his fingers, he [Senter] informed me that no one in his right mind would make any reference to SOE on a sheet of notepaper headed INTER SERVICES RESEARCH BUREAU, thereby blowing Baker Street’s cover! I’d committed a major breach of security.’ (Leo Marks, Between Silk and Cyanide: A Codemaker’s War, p. 333.) 7. IWMSA Interview with Lee, Reel 5. 8. W.J.M. Mackenzie, The Secret History of SOE, p. 382. 9. KV4/171, Senter to O.A. Harker (JS/3304), 08.05.45. 1 The origins and development of SOE’s Security Section 1. HS8/334, CD to All Sections (CD/OR/513/ADZ), 27.06.41. 2. Denis Rigden, Kill the Fuhrer, p. 102. 3. HS8/336, AD/S to S.O. (F/7406/138/1), 27.02.43. 4. HS8/903, Selborne to Anderson, 08.03.43. 5. J.C. Masterman, The Double-Cross System, p. 101. 6. HS9/196/3, CD to CEO (CD/OR/430), 10.06.41. See also HS8/334, CD to All Sections (CD/OR/513/ADZ), 27.06.41. 7. Imperial War Museum Sound Archive (hereafter IWMSA), Interview with Aonghais Adamson Fyffe (23100/10), Reel 8. 8. M.R.D. Foot, SOE: An Outline History of the Special Operations Executive 1940– 1946,p.59. 218 Notes 219 9. Nigel West, Secret War, p. 129. 10. HS7/31, History: Security Section, p. 1. 11. HS9/1580/9, Papers in Whetmore’s Personnel File. 12. Marks, Between Silk and Cyanide, pp. 89–90. 13. HS9/1244/1, Papers in O’Reilly’s Personnel File. 14. See his Who Was Who entry (1941–1950); Obituary in The Times, Friday, 05.02.43, p. 7. 15. KV4/171, Petrie to Lakin, 23.09.42. 16. HS9/1580/9, AD/P to C.D. Copy to D/CE (ADP/KV/304), 27.11.41. 17. HS9/1580/9, , SIS, to Calthrop, 09.12.44. 18. IWMSA Interview with Lee, Reel 4. 19. IWMSA Interview with Fyffe, Reel 8. 20. See his Who Was Who entry (1961–1970). 21. HS9/1341/9, Papers in Senter’s Personnel File. 22. Obituary in The Times, 18 February 1987. 23. IWMSA Interview with Lee, Reel 6. 24. HS9/1653, Papers in Mott’s Personnel File. 25. Peter Lee, in The Role of the Intelligence Services in the Second World War, Centre for Contemporary British History seminar, 09.11.94. 26. HS7/31, FSP Interim Report, p. 1, citing Whetmore to Under Secretary of State, War Office (ECW/KV/51), 19.12.40. 27. HS7/31, FSP Interim Report, pp. 1–2. 28. HS7/31, FSP Interim Report, p. 3. 29. HS6/961, D/T to All Country Sections, 08.02.41. 30. HS9/23/3, Report by Lt Turnbull, STS 6, 23.04.43. 31. IWMSA Interview with Lee, Reel 3. 32. HS7/31, FSP Interim Report, p. 5. 33. HS9/236/3, Report by C.S.M. Thomas, STS 41, 16.10.43. 34. HS7/31, FSP Interim Report, pp. 3–6. 35. IWMSA Interview with Lee, Reel 3. 36. HS7/31, FSP Interim Report, p. 4. 37. IWMSA Interview with Lee, Reel 3. 38. HS7/31, FSP Interim Report, p. 5. 39. IWMSA Interview with Peter Lee, Reel 5. 40. HS9/69/4, MZ2 to OC STS 6, 04.11.41. 41. HS9/69/4, D/CE 3 to D/Air, 24.12.41. 42. HS9/69/4, D/CE 3 to D/CE, 26.01.42. 43. HS9/69/4, D/CE 1 to M, 24.01.42. 44. HS9/69/4, N to D/R (N/HO/56), 31.01.42. 45. M.R.D. Foot, SOE in the Low Countries, p. 121, citing Schreieder, Das war das Englandspiel (Munich: Walter Stutz, 1950), pp. 124–8. 46. KV4/171, Hambro to Petrie (CH/2823), 28.02.42. 47. KV4/171, Petrie to Hambro (SF.51/30/65/DG), 31.08.42. 48. HS9/1274/3, Papers in Roche’s Personnel File. 49. KV4/171, Hambro to Petrie (CH/2823), 28.08.42. 50. HS7/31, History: Security Section, p. 5. 51. HS7/286, SOE War Diary, August 1942, p. 9. 52. A.A. Fyffe, ‘Group 26 at Aviemore’ (Private paper). 220 Notes 53. HS9/394/5, Papers in Darby’s Personnel File. 54. IWMSA Interview with Fyffe, Reel 8. 55. HS7/31, History: Security Section, p. 15. 56. HS7/31, History: Security Section, pp. 15–16. 57. HS8/840, D/CE.6 to D/CE, 28.10.42. 58. HS7/31, History: Security Section, p. 4. 59. HS9/1034/7, Papers in Miller’s Personnel File; FO371/79558, Cyril T. Miller to Under-Secretary of State, Foreign Office, 29.09.49; Conversations between Messrs Senter and Miller and Dr Donker, 05.10.49. 60. HS8/852, D/CE.G to D/CE ONLY (DCEG/KV/30), 21.11.42. 61. KV6/10, ‘Report on Manfriday and Intersection (S.O.E. Blown Transmitters)’, C.P. Harvey, B.1.A., 28.11.42. 62. KV6/10, Robertson to ADB1, DB, 02.12.42. 63. HS8/857, Routine Order No. 320, 15.01.43. 64. HS7/31, History: Security Section, p. 12. 65. HS7/26, SOE War Diary, March 1943, pp. 105–6, citing DCE/OR/2775, 19.03.43. 66. HS7/31, History: Security Section, p. 9. During its existence, the Section conducted some 454 interrogations (until June 1945). FO371/79558, Cyril T. Miller to Under-Secretary of State, Foreign Office, 29.09.49. 67. HS7/31, History: Security Section, p. 10. 68. HS8/857, Routine Order 472 (ADE/154), 02.07.43. 69. HS6/430, D/CE/SS to D/CE, 07.08.43. 70. HS2/188, BSS to A/CD (BSS/KV/1189), 27.03.44. 71. HS8/336, Selborne to Cadogan (F/7449/138/1), 05.03.43; HS7/286, SOE War Diary, March 1943, p. 105, citing CD circular to All Directors, Regional and Section Heads, 06.03.43. 72. HS7/31, Security History, p. 14; HS8/336, ‘Re-organisation Intelligence, Security, Personal Services & Liaison Division’, 10.07.43; KV4/171, Boyle to Harker, 17.08.43. 73. HS9/1274/3, Papers in Roche’s Personnel File. 74. HS9/1145/1, Papers in Park’s Personnel File. 75. HS8/857, AD/P to BSS, Copies to D/CE and D/CE.5 (ADP/35/2/757), 11.12.43. 76. HS8/857, AD/P to AD/E (ADP/Q/934), 04.01.44. 77. HS8/857, Extract from Draft Routine Order. 78. HS8/857, AD/E to AD/P (ADE/830), 07.01.44; AD/P to CD through A/CD, Copy to D/CE (ADP/10/7/1047), 14.01.44; AD/P to AD/P.PA, 14.01.44. 79. HS8/336, SOE Routine Order 624, 30.12.43. 80. F.H. Hinsley, British Intelligence in the Second World War (Abridged Edition), p. 442, ft. 1. 81. HS8/874, D/CE to D/H.143 (DCE/5537), 29.06.44. 82. HS8/837, ‘Security of Overlord – Special Operations By Sea’, 10.04.44. 83. HS8/837, Boyle to King-Salter (ARB/132/5130), 11.04.44. 84. HS8/837, A/CD to AD/P (ACD/133/5135), 11.04.44. 85. KV4/76, Minute 56, 09.03.44. 86. HS8/837, A/CD to AD/P (ACD/133/5135), 11.04.44. 87. HS8/837, ‘Security Panel’, attached to A/CD to AD/P (ACD/133/5135), 11.04.44. 88. HS8/837, A/CD to AD/E (Copy to AD/P) (ACD/133/5173), 14.04.44. Notes 221 89. HS8/837, A/CD to AD/P (ACD/132/5165), 14.04.44. 90. HS7/31, History: Security Section, Appendix A: Operation Overlord – The Special Security Panel. 91. HS8/837, ‘Draft Minute of S.O.E. Council Meeting’ attached to AD/P to V/CD (Copies to A/CD, AD/E) (ADP/9/4/1291), 17.04.44. 92. HS8/837, Minutes of Meeting of Special Security Panel, 18 April 1944. 93. HS8/837, Boyle to Findlater Stewart (ARB/132A/5225), 24.04.44. 94. HS8/837, Minutes of Meeting of Special Security Panel, 25.04.44. 95. HS8/837, Boyle to Findlater Stewart (ARB/132A/5257) (Copy AD/P, D/CE), 27.04.44. 96. HS8/837, A/CD to All Members of the Council (ACD/133/5219), 19.04.44. 97. HS8/837, D/CE to Directors and All Section Heads (DCE/5198), 20.04.44. 98. HS8/837, Boyle to Findlater Stewart (ARB/132A/5257) (Copy to AD/P, D/CE), 27.04.44. 99. HS8/837, Boyle to Sir Findlater Stewart (Copy AD/P, D/CE) (ARB/132A/5257), 27.04.44.
Recommended publications
  • Special Operations Executive - Wikipedia
    12/23/2018 Special Operations Executive - Wikipedia Special Operations Executive The Special Operations Executive (SOE) was a British World War II Special Operations Executive organisation. It was officially formed on 22 July 1940 under Minister of Economic Warfare Hugh Dalton, from the amalgamation of three existing Active 22 July 1940 – 15 secret organisations. Its purpose was to conduct espionage, sabotage and January 1946 reconnaissance in occupied Europe (and later, also in occupied Southeast Asia) Country United against the Axis powers, and to aid local resistance movements. Kingdom Allegiance Allies One of the organisations from which SOE was created was also involved in the formation of the Auxiliary Units, a top secret "stay-behind" resistance Role Espionage; organisation, which would have been activated in the event of a German irregular warfare invasion of Britain. (especially sabotage and Few people were aware of SOE's existence. Those who were part of it or liaised raiding operations); with it are sometimes referred to as the "Baker Street Irregulars", after the special location of its London headquarters. It was also known as "Churchill's Secret reconnaissance. Army" or the "Ministry of Ungentlemanly Warfare". Its various branches, and Size Approximately sometimes the organisation as a whole, were concealed for security purposes 13,000 behind names such as the "Joint Technical Board" or the "Inter-Service Nickname(s) The Baker Street Research Bureau", or fictitious branches of the Air Ministry, Admiralty or War Irregulars Office. Churchill's Secret SOE operated in all territories occupied or attacked by the Axis forces, except Army where demarcation lines were agreed with Britain's principal Allies (the United Ministry of States and the Soviet Union).
    [Show full text]
  • 0714685003.Pdf
    CONTENTS Foreword xi Acknowledgements xiv Acronyms xviii Introduction 1 1 A terrorist attack in Italy 3 2 A scandal shocks Western Europe 15 3 The silence of NATO, CIA and MI6 25 4 The secret war in Great Britain 38 5 The secret war in the United States 51 6 The secret war in Italy 63 7 The secret war in France 84 8 The secret war in Spain 103 9 The secret war in Portugal 114 10 The secret war in Belgium 125 11 The secret war in the Netherlands 148 12 The secret war in Luxemburg 165 ix 13 The secret war in Denmark 168 14 The secret war in Norway 176 15 The secret war in Germany 189 16 The secret war in Greece 212 17 The secret war in Turkey 224 Conclusion 245 Chronology 250 Notes 259 Select bibliography 301 Index 303 x FOREWORD At the height of the Cold War there was effectively a front line in Europe. Winston Churchill once called it the Iron Curtain and said it ran from Szczecin on the Baltic Sea to Trieste on the Adriatic Sea. Both sides deployed military power along this line in the expectation of a major combat. The Western European powers created the North Atlantic Treaty Organization (NATO) precisely to fight that expected war but the strength they could marshal remained limited. The Soviet Union, and after the mid-1950s the Soviet Bloc, consistently had greater numbers of troops, tanks, planes, guns, and other equipment. This is not the place to pull apart analyses of the military balance, to dissect issues of quantitative versus qualitative, or rigid versus flexible tactics.
    [Show full text]
  • Jataka Tales: Layers of Meaning from the Universal to the Personal
    Jataka Tales: Layers of Meaning from the Universal to the Personal Grade Level or Course Type: English, Social Studies, adaptable for grades 6 through 10 Overview of the Lesson Jataka Tales: Birth Stories of the Buddha are among the world’s oldest collection of stories. Many, about endearing animals who misbehave – and then learn to behave better – are appealing to children throughout the world. In this lesson students compare an Aesop’s fable to a Jataka Tale to see what they share in common. Students then learn about the Buddhist context of the tales, through which they deepen their appreciation of what makes a Jataka Tale unique. Finally, students approach a Jataka Tale through the meaning it held in the life of Noor Inayat Khan (1914-1944), whose classic collection Twenty Jataka Tales is still in print. She was a Muslim who worked as a covert agent for the British in Occupied France. She died at Dachau in 1944. In all three activities, students gain insight into what makes stories important in our lives. Learning Outcomes: • Identify stories by genre as fable, parable, folktale and fairy tale. • Decipher the moral of a story. • Understand Buddhist concepts (Ten Perfections, cycle of death and rebirth) • Learn about the life and appreciate the artistry of Noor Inayat Khan. Materials Needed • This lesson and the handouts included with it. They include: Handout 1. Life of Noor Inayat Khan with photos and scrapbook activity Handout 2. The Monkey and the Dolphin credited to Aesop and genre definitions Handout 3. The Patient Buffalo, a Jataka Tale Handout 4.
    [Show full text]
  • The Science of Cryptology
    Page 1 of 5 The Science of Cryptology A section from the book UMTS Security by Valtteri Niemi and Kaisa Nyberg, to appear in November 2003, published by Wiley@Co. Cryptographic systems Cryptology is the science of information security and privacy. Mathematical techniques are investigated and developed to provide authenticity confidentiality, integrity and other security services for information that is communicated, stored or processed in an information system. Also the strength of cryptographic designs and protocols are evaluated from the point of view of mathematics, systems theory and complexity theory. The design part of the science is called cryptography, while the security investigations and analysis is known as cryptanalysis. The naming convention reflects the two sides of the science of cryptology. This division is also apparent in the practical cryptographic development work, where the best practise has become to split the development resources into two teams. The team of cryptographers make proposals for cryptographic designs, which the team of cryptanalysts try to break. A cryptographic system in its basic form is often depicted as a communication system involving three entities. Two of the entities are exchanging messages over an insecure communication channel. It has become customary to call these entities Alice and Bob. The third entity has access to the communication channel. She is called Carol, as the third letter to the alphabet, or Eve, as the eavesdropper. But Eve is allowed to perform all kind of malicious actions on the communicated messages, not just passive eavesdropping. All parties are also assumed to have certain computation resources. Different theoretical models vary a lot with respect to the amount computation resources the entities have and what kind of tampering Eve is performing on the communication channel.
    [Show full text]
  • KV 2/961 – 962, Part I Englandspieland Nordpolaffair
    Reference abstracts of KV 2/961 – 962, Part I As to prevent for a too extensive document, I have decided to divide it into two sections. Englandspiel and Nordpol affair This document contains materials derived from these latter files Its purpose: is to be used as a kind of reference document, containing my personal selection of report sections; considered being of relevance. My input: I have in almost every case created transcripts of the just reproduced file content. However, adding my personal opinion; always accompanied by: (AOB, My comment) Please do not multiply this document Remember: that the section-copies still do obey to Crown Copyright This document is of an extraordinary content; in which personal fates of many brave men have been brought at stake, due to severe ignorance on the British S.O.E. side. Please consider before studying this file: https://en.wikipedia.org/wiki/Englandspiel English version https://de.wikipedia.org/wiki/Englandspiel German language version https://nl.wikipedia.org/wiki/Englandspiel Dutch language version As to confront you with a wider spectrum in this intriguing complex matter, I would like to proceed, after Giskes’ second chapter, in due course, with: Huntemann’s Case and Schreieder’s case By Arthur O. Bauer Giskes, Obstlt. Herman (Nordpol Spiel)(England Spiel) PF 601712 KV 2/961-1, page 2 6.5.45 To S.O.E. re Oberstleutnant (Obstlt.)Giskes and Uffz. Huntemann 16.5.45 Extract from report on Huntemann re Giskes, Filed 2.6.45. KV 2/961, page 3 20.5.45 To 12th AG asking for Giskes to be sent to UK as Category A case KV 2/961, page 8 Extract from OSS X-2 Paris report dated 22.5.45 on Edmund Grosskopf (PF 601671), former member of Abwehr III F (AOB, counter espionage) Lyons and FAK 313 (Front Aufklärungskommando 307 ‘Bonn’) (AOB, where the first ‘3’ points at, of course, the operational Abwehr section III; and the third number onto the European region) This Kommando performed only line crossings and hardly brought any information.
    [Show full text]
  • FYS 146 Cryptography Fall 2010 What Next? December 13Th
    FYS 146 Cryptography Fall 2010 What next? December 13th Congratulations! You have made it to the end of the course on cryptography. We have talked about many different ideas this semester, but we have only scratched the surface and there are many many more topics related to secrecy. I have compiled below a list of books, some serious and some not-so-serious, that I recommend you check out. Fiction • Cryptonomicon by Neal Stephenson. Probably the quintessential crypto novel. Alternates between a storyline in WWII and a storyline in current day, with parallels and discussion of the cryptosystems used all along. A great story and very well-written. But long. HIGHLY Recommended. • The Company by Robert Littell. This is a fictionalized account of a group of spies working for the CIA and KGB through the coldwar. The story spans 50 or so years, and has a wonderful cast of characters. This was also made into a decent miniseries last summer which is now out on DVD starring Chris O'Donnell and Michael Keaton. Littell has several other novels about spies, but this is the best of the ones that I have read. • Enigma by Robert Harris. This novel tells the story of some of the codebreakers at Bletchley Park. The movie, starring Kate Winslet and Dougray Scott, is above average as well. • Good News, Bad News by David Wolstencroft. I don't actually think there is any crypto in this novel, but it is one of my favorite spy novels. Set in contemporary London, it deals with two coworkers who are both undercover spies and are ordered to kill each other.
    [Show full text]
  • GCSE (9-1) English Language
    GCSE (9-1) English Language Sample Assessment Materials Pearson Edexcel Level 1/Level 2 GCSE (9 - 1) in English Language (1EN0) First teaching from September 2015 First certifi cation from June 2017 Issue 1 Pearson Edexcel Level 1/Level 2 GCSE (9–1) in English Language (1EN0) Sample Assessment Materials First certification 2017 Edexcel, BTEC and LCCI qualifications Edexcel, BTEC and LCCI qualifications are awarded by Pearson, the UK’s largest awarding body offering academic and vocational qualifications that are globally recognised and benchmarked. For further information, please visit our qualification websites at www.edexcel.com, www.btec.co.uk or www.lcci.org.uk. Alternatively, you can get in touch with us using the details on our contact us page at www.edexcel.com/contactus About Pearson Pearson is the world's leading learning company, with 40,000 employees in more than 70 countries working to help people of all ages to make measurable progress in their lives through learning. We put the learner at the centre of everything we do, because wherever learning flourishes, so do people. Find out more about how we can help you and your learners at: www.pearson.com/uk References to third party material made in these sample assessment materials are made in good faith. Pearson does not endorse, approve or accept responsibility for the content of materials, which may be subject to change, or any opinions expressed therein. (Material may include textbooks, journals, magazines and other publications and websites.) All information in this document
    [Show full text]
  • P1120793 Secret Cabinet Office
    P1120793 SECRET CABINET OFFICE HISTOMCAL SECTION HISTORY OF THE SPECIAL OPERATIONS EXECUTIVE W.J.M. MACKENZIE VOLUME I NOTE This history is bound in four volumes, of which the contents are:- VOLUME I Table of contents, Preface, Part I (Chapters 1-4) and the earlier Chapters (5-8) of Part 11. VOLUME II Remainder of Part 11 Chapters (9-15) VOLUME III The earlier Chapters (16-24) of Part III VOLUME IV Remainder of Part III (Chapters 25-29 Conclusion; and Appendices SECRET THIS DOCUMENT IS THE PROPERTY OF H.B.M. GOVERNMENT, and is issued for the information only of these officials who are con- cerned with its contents. The official in possession of the document will be responsible for Its safe custody and when not in use it is to be kept under lock and key SECRET Copy No. /5. P1120794 SECRET HISTORY OF THE SECOND WORLD WAR THE SPECIAL OPERATIONS EXECUTIVE BRITAIN and THE RESISTANCE MOVEMENTS in EUROPE BY VW.M. Mackenzie Fellow of Magdalen College, Oxford. Historical Branch Cabinet Office, London, S.W. 1. S.47699 SECRET P1120795 SECRET CONTENTS Page PREFACE 1 PART I : ORIGINS CHAPTER I 1. D. Section Major Grand seconded, April 1938 2 His directive 3 2. Electra House Sir Campbell Stuart consulted, September 1939 5 Department E.H. set up, January 1939 6 Its functions and control 6 3. M.I.(R) G.S.(R) set up, March 1938 7 Lt.Col. Holland appointed, December 1938 9 D/M Section approved, March 1939 10 D/M Section becomes M.I.(R), September 1939 11 Its duties 11 SECRET P1120796 VOLUME I (continued) SECRET PART I (continued) Page CHAPTER II THE WORK OF D.SECTION 1.
    [Show full text]
  • C:\Myfiles\Genealogy & Family\Family Books\WW2 Timeline
    A World War II Timeline A Perspective from within The Netherlands Compiled by Jo Kruithof - December 2004 01 12 April 1945 Canadian troops liberate the town of Steenwijk, where I was staying with my family at the time I was six years old then. A World War II Timeline a Perspective from within The Netherlands INTRODUCTION This document is based entirely on information and pictures found on the Internet. It is a brief illustrated timeline of the events of World War 2, as seen from within the Netherlands. When I first came across a basic timeline on the (Dutch) web site http://hetillegaleparool.nl, it occurred to me that, if I ever got around to writing up my life’s story, this would paint a good picture of the background against which I lived my first six years. However, before it would be any use to my descendants, I would either have to translate it, or find an alternative in the English language. Any writings presenting the unique view of the war by Dutch people living in the Netherlands is much more likely to be in Dutch than in English (and a quick scan of the Net supported this notion), so I decided on the translation option. In the process of checking out a few facts, events and names, I came across large amounts of other material, but I have only used those bits and pieces that helped to flesh out my timeline into a record that can be read and understood by those who weren’t there or who haven’t heard the stories from parents or older relatives.
    [Show full text]
  • Dear Ken, Here's a List Ofbooks About the SOE That Might Interest You
    Dear Ken, Here's a list ofbooks about the SOE that might interest you. These lists are not exhaustive, but contain the most prominent books. In particular, additional biographies and personal narratives are available could be added to these lists. I've compiled these lists from a variety of sources, including annotated bibliographies. The comments about some books are taken from these annotations (usually published reviews), and are not my own. When I make a comment, it is preceded by "KEN:" Although mostly out ofprint, I should be able to buy used copies of anything. Virtually all are also available at the New York Public Library, so I can photocopy the tables ofcontents or pages on certain topics, ifyou prefer. Books in English about the SOE in France. All are available for purchase or photocopying. Ruby, Marcel. F section, SOE : the Buckmaster networks / Marcel Ruby. London: Leo Cooper, 1988. 227 pages Subject Great Britain. Special Operations Executive. World War, 1939-1945 -- Underground movements -- France. World War, 1939-1945 -- Personal narratives, French. ~ain, Pierre. v'CI~destine operations: the arms and techniques ofthe Resistance, 1941-1944 / text and drawings by Pierre Lorain; English adaptation by David Kahn. New York : Macmillan, c1983. 185 p. : ill., maps; 21 x 24 cm. Translation of: Arrnement clandestin, S.O.E., 1941-1944, France. Subject Great Britain. Special Operations Executive. World War, 1939-1945 -- Secret service -- Great Britain. World War, 1939-1945 -- Underground movements -- Europe. World War, 1939-1945 -- Equipment and supplies. Nicolson, David, 1940­ Aristide : the story of Roger Landes / David Nicolson. London: Leo Cooper, 1994.
    [Show full text]
  • The Important Posthumous George Cross Group to Violette Szabó 22
    £25 The Important Posthumous Second World War George Cross group awarded to Violette Szabó, Women’s Transport Service (F.A.N.Y.) and ‘F’ Section, Special Operations Executive (S.O.E.), late Auxiliary Territorial Service (A.T.S.) www.dnw.co.uk 16 Bolton Street Mayfair London W1J 8BQ WEDNESDAY 22 JULY 2015 Telephone 020 7016 1700 Fax 020 7016 1799 at 10:00am E-mail [email protected] INTRODUCTION Just four direct examples of the George Cross (G.C.) have been awarded to women, three of them members of the Special Operations Executive (S.O.E.): Violette Szabó, Odette and Noor Inayat Khan. The fourth example was awarded to Barbara Harrison, a B.O.A.C. stewardess, who died as a result of gallant rescue work at Heathrow airport in April 1968; her G.C. is owned by British Airways. Violette, Odette and Noor Inayat Khan have all been the subject of biographies, in Violette’s case Carve Her Name With Pride, by R. J. Minney (1956), Violette Szabo - The Life That I Have, by Susan Ottaway (2002), and Young, Brave and Beautiful, by her daughter, Tania Szabó (2007); two have been the subject of films, Odette being portrayed by Anna Neagle in the film of the same name in 1950 and Violette by Virginia McKenna in Carve Her Name With Pride in 1958. As a consequence, their lives have been the subject of ongoing study and media coverage, evidence - if it were needed - of their sublime gallantry and example. Odette, whose G.C. is owned by the Imperial War Museum, survived Ravensbrück; owing to her then married name of ‘Churchill’, the camp commandant used her in a failed attempt to save his own skin on surrendering to the Allies.
    [Show full text]
  • Confidence Men the Mediterranean Double-Cross System, 1941-45 By
    Confidence Men The Mediterranean Double-Cross System, 1941-45 by Brett Edward Lintott A thesis submitted in conformity with the requirements for the Degree of Doctor of Philosophy, Graduate Department of History, in the University of Toronto © Copyright by Brett Edward Lintott, 2015 Abstract Confidence Men The Mediterranean Double-Cross System, 1941-45 Brett Edward Lintott Doctor of Philosophy Department of History University of Toronto, 2015 This dissertation provides an analysis of the Mediterranean double-cross system of the Second World War, which was composed of a number of double agents who were turned by the Allies and operated against their ostensible German spymasters. Utilizing many freshly released archival materials, this study assesses how the double-cross system was constructed, why it was an effective instrument, and how it contributed to Allied success in two areas: security and counter-intelligence, and military deception. The focus is thus on both organization and operations. The chapters cover three chronological periods. In the first — 1941-42 — the initial operational usage of a double agent is assessed, along with the development of early organizational structures to manage and operate individual cases as components of a team of spies. The second section, covering 1943, assesses three issues: major organizational innovations made early that year; the subsequent use of the double agent system to deceive the Germans regarding the planned invasion of Sicily in July; and the ongoing effort to utilize double agents to ensure a stable security and counter-intelligence environment in the Mediterranean theatre. The third and final section analyzes events in 1944, with a focus on double-cross deception in Italy and France, and on the emergence of more systematic security and counter-intelligence double-cross operations in Italy and the Middle East.
    [Show full text]