Abbreviations, Codenames and Technical Terms

Total Page:16

File Type:pdf, Size:1020Kb

Abbreviations, Codenames and Technical Terms ABBREVIATIONS, CODENAMES AND TECHNICAL TERMS 3A Air Section within Hut 3 at Bletchley Park 3G Research Section within Hut 3 at Bletchley Park 3L Liaison Section within Hut 3 at Bletchley Park, responsible for links to external customers 3M Military Section within Hut 3 at Bletchley Park 3N Naval Section within Hut 3 at Bletchley Park 6IS No. 6 Intelligence School, based at Beaumanor Abwehr Amt Auslandsnachrichten und Abwehr – the German military intelligence service ANCXF Allied Naval Commander Expeditionary Force – the commander of the naval elements of the invasion force, post held on D-Day by Admiral Ramsay Ast Abwehrstellung – a regional office of the Abwehr in Germany or occupied countries xvi ABBREVIATIONS, CODENAMES AND TECHNICAL TERMS BEETLE Bletchley Park codename for Enigma key used by Luftwaffe Command on the Eastern Front BODYGUARD The overall Allied codename for deception operations prior to the invasion Bombe The key-finding machine devised by Alan Turing and Gordon Welchman, fundamental to the successful decryption of Enigma messages BP Common wartime nickname for Bletchley Park BREAM Bletchley codename for the Lorenz teleprinter link between Berlin and O.B. Südwest (q.v.) in Rome C The head of the Secret Intelligence Service (SIS/MI6), post occupied by Hugh Sinclair and Stewart Menzies during the Second World War CIS Combined Intelligence Section – joint group of British army and naval intelligence Colossus Codename for the key-finding machine developed to assist in decrypting German teleprinter traffic (see FISH) COMINT See SIGINT CORAL Allied codename for cipher used by Japanese naval attaches COSSAC Chief of Staff to Supreme Allied Commander – organisation led by Lt Gen. F.E. Morgan, tasked with planning the Allied invasion during 1943 xvii ABBREVIATIONS, CODENAMES AND TECHNICAL TERMS Crib A portion of the plaintext (q.v.) of an encrypted message which could be guessed, and used to assist in the decryption process CX/MSS File prefix allocated to high-level (q.v.) intercepts (see also ULTRA) DAFFODIL Bletchley codename for Enigma key used by Luftgau XI (Westfront) (q.v.) D-Day 6 June 1944, the day on which the invasion of Normandy began. The ‘D’ has no significance other than as the initial letter of ‘Day’ (similarly ‘H-Hour’, etc.). Dates before and after the invasion were expressed in days, for example ‘D-20’ or ‘D+10’ – twenty days before or ten days after the invasion, respectively Depth In codebreaking several messages composed using the same cipher key D/F Direction finding – identification of the location of enemy wireless transmitters by use of bearings taken at intercept stations DOLPHIN Bletchley codename for Enigma key used by Kriegsmarine (q.v.) surface vessels and by U-boats in ‘home waters’ DTN Defence Teleprinter Network – a military cable network which connected Bletchley Park with its outstations and customers via telephone and teleprinter E-boat Allied designation for German fast attack craft Enigma A family of rotor-based electro-mechanical encryption machines used by Axis forces xviii ABBREVIATIONS, CODENAMES AND TECHNICAL TERMS FALCON Bletchley codename for Enigma key used by the German military administrative districts (Wehrkreis) FHO Fremde Heere Ost – the German intelligence organisation tasked with the study of Allied armies in the eastern (Soviet) theatre FHW Fremde Heere West – the German intelligence organisation tasked with the study of Allied armies in the western theatre FISH Codename given at Bletchley to German teleprinter traffic encrypted using the Lorenz SZ40/42 cipher machines Flivo Fliegerverbindungsoffizier – air liaison officer FORTITUDE Allied codename for the deception operations mounted prior to D-Day in 1944 FUSAG First US Army Group – the title given to the fictional force created as part of the Operation FORTITUDE deception operation GADFLY Bletchley codename for Enigma key used by X. Fliegerkorps in the Mediterranean GAF German Air Force (Luftwaffe) GANNET Bletchley codename for Enigma key used by German High Command in Norway GC&CS Government Code and Cipher School – the codebreaking organisation at Bletchley Park during the Second World War GCHQ Cover name applied to GC&CS, latterly adopted post-war as the formal name of the organisation Gold Codename for British invasion beach on D-Day xix ABBREVIATIONS, CODENAMES AND TECHNICAL TERMS GPO General Post Office GRAMPUS Bletchley codename for the Enigma key used in the Black Sea GRILSE Bletchley codename for the Lorenz teleprinter link between Berlin and Heeresgruppe B (Army Group B) in France (grilse is a type of young salmon) GURNARD Bletchley codename for the Lorenz teleprinter link between Berlin and O.B. Südost (q.v.) in Greece Heer German army High-level machine-enciphered Hollerith machine A device for processing data via punched cards, used as part of the decryption process HUMINT Human intelligence – information gained by human agents behind enemy lines, either members of the Allied secret services or local inhabitants and members of resistance organisations, or by interrogation of prisoners of war Hut 3 German Army and Air Force Enigma Reporting Section responsible for processing and distributing decrypted German army and air force Enigma traffic Hut 6 German Army and Air Force Enigma Processing and Decryption Section responsible for breaking army and air force Enigma messages Hut 8 German Naval Enigma Processing and Decryption Section responsible for breaking naval Enigma messages xx ABBREVIATIONS, CODENAMES AND TECHNICAL TERMS IMINT Imagery intelligence – aerial photography of enemy forces and installations Indoctrinated recipient An individual who had been let in on the secret of Bletchley Park ISK Illicit Signals Knox – section at Bletchley Park dealing with high-level (q.v.) communications using the Abwehr (q.v.) variants of Enigma ISOS Illicit Signals Oliver Strachey – section at Bletchley Park dealing with lower-level hand ciphers used by German intelligence agents JADE Allied codename for a Japanese diplomatic cipher system used particularly by Japanese attachés JELLYFISH Bletchley codename for the Lorenz teleprinter link between Berlin and O.B. West (q.v.) in Paris JMA Allied codename for code used by Japanese military attachés Juno Codename for Canadian invasion beach on D-Day Key The specific settings for a particular encryption machine KO Kriegsorganisation – Abwehr (q.v.) outstations in neutral countries Kriegsmarine German navy Lorenz SZ40/42 Cipher machine used by German forces to encrypt wireless teleprinter traffic (see FISH) Luftgau Luftwaffe regional command Luftwaffe German air force xxi ABBREVIATIONS, CODENAMES AND TECHNICAL TERMS MAGIC Allied codename for traffic intercepted using the Japanese PURPLE cipher Martian Codename applied to reports from the Combined Intelligence Section (q.v.) concerning German defences in France MI14 Department of Military Intelligence at the War Office tasked with investigation of the German armed forces MULLET Bletchley codename for the Lorenz teleprinter link between Berlin and Norway NEPTUNE Allied codename for the naval part of the OVERLORD invasion operation Newmanry Machine Section – named after Max Newman, responsible for machine breaking of German Lorenz-enciphered teleprinter traffic NUTHATCH Bletchley codename for Enigma key connecting Berlin with Belgrade O.B. Südost Oberbefehlshaber Südost – the German commander-in-chief in Greece, a position held on D-Day by Generalfeldmarschall Maximilian von Weichs O.B. Südwest Oberbefehlshaber Südwest – the German commander-in-chief in Italy, a position held on D-Day by Generalfeldmarschall Albert Kesselring O.B. West Oberbefehlshaber West – the German commander-in-chief in France and the Low Countries, a position held on D-Day by Generalfeldmarschall Gerd von Rundstedt xxii ABBREVIATIONS, CODENAMES AND TECHNICAL TERMS OIC Operational Intelligence Centre – the planning headquarters of the Royal Navy at the Admiralty in London OKH Oberkommando des Heeres – the Army High Command of Nazi Germany OKM Oberkommando der Marine – the Naval High Command of Nazi Germany OKW Oberkommando der Wehrmacht – the High Command of the armed forces of Nazi Germany Omaha Codename for US invasion beach on D-Day OCELOT Bletchley codename for Enigma key used by army–air liaison officers (known as a Flivo (q.v.) key after the Fliegerverbindungsoffizier, air liaison officer) ORANGE Bletchley codename for Enigma key used by Waffen SS OVERLORD Codename for the allied invasion of Europe in 1944 Plaintext The original text of a message prior to its encryption; or equally, the same text after decryption by the recipient PORPOISE Bletchley codename for Enigma key used by German Mediterranean shore installations PURPLE Allied codename for a Japanese diplomatic cipher system used particularly by the Japanese ambassador in Berlin QUINCE Bletchley codename for Enigma key used by the Waffen SS RED Bletchley codename for Enigma key used by the German air force xxiii ABBREVIATIONS, CODENAMES AND TECHNICAL TERMS RSS Initially the Radio Security Section (later the Radio Security Service) – body tasked with the interception of Abwehr wireless traffic SCU Special Communications Unit – unit attached to a field headquarters tasked with the reception of ULTRA messages from Bletchley Park SD Sicherheitsdienst – the security branch of the SS SHAEF Supreme Headquarters Allied Expeditionary Force – the headquarters led by Gen. Eisenhower responsible for planning and carrying out the invasion of north-west Europe in 1944 SHARK Bletchley codename
Recommended publications
  • To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?
    Portland State University PDXScholar Young Historians Conference Young Historians Conference 2016 Apr 28th, 9:00 AM - 10:15 AM To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology? Hayley A. LeBlanc Sunset High School Follow this and additional works at: https://pdxscholar.library.pdx.edu/younghistorians Part of the European History Commons, and the History of Science, Technology, and Medicine Commons Let us know how access to this document benefits ou.y LeBlanc, Hayley A., "To What Extent Did British Advancements in Cryptanalysis During World War II Influence the Development of Computer Technology?" (2016). Young Historians Conference. 1. https://pdxscholar.library.pdx.edu/younghistorians/2016/oralpres/1 This Event is brought to you for free and open access. It has been accepted for inclusion in Young Historians Conference by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. To what extent did British advancements in cryptanalysis during World War 2 influence the development of computer technology? Hayley LeBlanc 1936 words 1 Table of Contents Section A: Plan of Investigation…………………………………………………………………..3 Section B: Summary of Evidence………………………………………………………………....4 Section C: Evaluation of Sources…………………………………………………………………6 Section D: Analysis………………………………………………………………………………..7 Section E: Conclusion……………………………………………………………………………10 Section F: List of Sources………………………………………………………………………..11 Appendix A: Explanation of the Enigma Machine……………………………………….……...13 Appendix B: Glossary of Cryptology Terms.…………………………………………………....16 2 Section A: Plan of Investigation This investigation will focus on the advancements made in the field of computing by British codebreakers working on German ciphers during World War 2 (1939­1945).
    [Show full text]
  • Georgetown University in Partial Fulfillment of the Requirements for the Degree of Master of Arts in Security Studies
    THE BATTLE FOR INTELLIGENCE: HOW A NEW UNDERSTANDING OF INTELLIGENCE ILLUMINATES VICTORY AND DEFEAT IN WORLD WAR II A Thesis submitted to the Faculty of the Graduate School of Arts and Sciences of Georgetown University in partial fulfillment of the requirements for the degree of Master of Arts in Security Studies By Edward J. Piotrowicz III, B.A. Washington, DC April 15, 2011 Copyright 2011 by Edward J. Piotrowicz III All Rights Reserved ii THE BATTLE FOR INTELLIGENCE: HOW A NEW UNDERSTANDING OF INTELLIGENCE ILLUMINATES VICTORY AND DEFEAT IN WORLD WAR II Edward J. Piotrowicz III, B.A. Thesis Advisor: Jennifer E. Sims, PhD. ABSTRACT Does intelligence make a difference in war? Two World War II battles provide testing grounds for answering this question. Allied intelligence predicted enemy attacks at both Midway and Crete with uncanny accuracy, but the first battle ended in an Allied victory, while the second finished with crushing defeat. A new theory of intelligence called “Decision Advantage,”a illuminates how the success of intelligence helped facilitate victory at Midway and how its dysfunction contributed to the defeat at Crete. This view stands in contrast to that of some military and intelligence scholars who argue that intelligence has little impact on battle. This paper uses the battles of Midway and Crete to test the power of Sims‟s theory of intelligence. By the theory‟s standards, intelligence in the case of victory outperformed intelligence in the case of defeat, suggesting these cases uphold the explanatory power of the theory. Further research, however, could enhance the theory‟s prescriptive power.
    [Show full text]
  • SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM
    SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM HEINEMANN: AUSTRALIA First published in 1987 by HEINEMANN PUBLISHERS AUSTRALIA (A division of Octopus Publishing Group/Australia Pty Ltd) 85 Abinger Street, Richmond, Victoria, 3121. Copyright (c) 1987 by Peter Wright ISBN 0-85561-166-9 All Rights Reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. TO MY WIFE LOIS Prologue For years I had wondered what the last day would be like. In January 1976 after two decades in the top echelons of the British Security Service, MI5, it was time to rejoin the real world. I emerged for the final time from Euston Road tube station. The winter sun shone brightly as I made my way down Gower Street toward Trafalgar Square. Fifty yards on I turned into the unmarked entrance to an anonymous office block. Tucked between an art college and a hospital stood the unlikely headquarters of British Counterespionage. I showed my pass to the policeman standing discreetly in the reception alcove and took one of the specially programmed lifts which carry senior officers to the sixth-floor inner sanctum. I walked silently down the corridor to my room next to the Director-General's suite. The offices were quiet. Far below I could hear the rumble of tube trains carrying commuters to the West End. I unlocked my door. In front of me stood the essential tools of the intelligence officer’s trade - a desk, two telephones, one scrambled for outside calls, and to one side a large green metal safe with an oversized combination lock on the front.
    [Show full text]
  • How I Learned to Stop Worrying and Love the Bombe: Machine Research and Development and Bletchley Park
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CURVE/open How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park Smith, C Author post-print (accepted) deposited by Coventry University’s Repository Original citation & hyperlink: Smith, C 2014, 'How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park' History of Science, vol 52, no. 2, pp. 200-222 https://dx.doi.org/10.1177/0073275314529861 DOI 10.1177/0073275314529861 ISSN 0073-2753 ESSN 1753-8564 Publisher: Sage Publications Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders. This document is the author’s post-print version, incorporating any revisions agreed during the peer-review process. Some differences between the published version and this version may remain and you are advised to consult the published version if you wish to cite from it. Mechanising the Information War – Machine Research and Development and Bletchley Park Christopher Smith Abstract The Bombe machine was a key device in the cryptanalysis of the ciphers created by the machine system widely employed by the Axis powers during the Second World War – Enigma.
    [Show full text]
  • Stdin (Ditroff)
    Notes to accompany four Alan Turing videos 1. General The recent (mid-November 2014) release of The Imitation Game movie has caused the com- prehensive Alan Hodges biography of Turing to be reprinted in a new edition [1]. This biog- raphy was the basis of the screenplay for the movie. A more recent biography, by Jack Copeland [2], containing some new items of information, appeared in 2012. A more techni- cal work [3], also by Jack Copeland but with contributed chapters from other people, appeared in 2004. 2. The Princeton Years 1936–38. Alan Turing spent the years from 1936–38 at Princeton University studying mathematical logic with Prof. Alonzo Church. During that time Church persuaded Turing to extend the Turing Machine ideas in the 1936 paper and to write the results up as a Princeton PhD. You can now obtaing a copy of that thesis very easily [4] and this published volume contains extra chapters by Andrew Appel and Solomon Feferman, setting Turing’s work in context. (Andrew Appel is currently Chair of the Computer Science Dept. at Princeton) 3. Cryptography and Bletchley park There are many texts available on cryptography in general and Bletchley Park in particu- lar. A good introductory text for the entire subject is “The Code Book” by Simon Singh [5] 3.1. Turing’s Enigma Problem There are now a large number of books about the deciphering of Enigma codes, both in Hut 6 and Hut 8. A general overview is given by “Station X” by Michael Smith [6] while a more detailed treatment, with several useful appendices, can be found in the book by Hugh Sebag-Montefiore [7].
    [Show full text]
  • War Machines: Women's Computing Work and the Underpinnings of the Data-Driven State, 1930-1946
    Programmed Inequality How Britain Discarded Women Technologists and Lost Its Edge in Computing Marie Hicks HD 6135 H53 2017 The Library Mt. St. Vincent Univ. Halifax, N.S. B3M 2J6 The MIT Press Cambridge, Massachusetts London, England 1 War Machines: Women's Computing Work and the Underpinnings of the Data-Driven State, 1930-1946 In recent years, the restoration of Bletchley Park has attracted worldwide attention. The country estate in Milton Keynes, United Kingdom, was the site of the most important codebreaking operations of World War II and home to the first digital, electronic, programmable computer: the Colossus. The British-designed and manufactured Colossus computers, of which there were ten in all by war's end, were critical to the conduct of Allied wartime operations. Unlike their better-known U.S. counter­ part, the ENIAC, the Colossus computers were actually deployed during the war, actively changing its outcome. Kept secret for decades, the full import of the developments at Bletchley has only recently become widely known.1 Yet while popular culture has begun to recognize the importance of Bletchley's wartime operations, misunderstandings persist about the nature of the information work performed there. The 2014 blockbuster The Imitation Game, for instance, cleaves the Colossus computers from the narrative entirely in favor of building a "great man" narrative for a single codebreaker.2 Hidden within the story of Bletchley is a less popular narrative that cannot leverage the appeal of a lone genius and his accomplishments. Thousands of women worked at Bletchley during the war-most in tech­ nical roles.3 Although it is generally accepted that the striking and wide­ ranging roles of the mostly women workers within Bletchley Park give lie to stereotypes about computing as a traditionally masculine field, the contributions of these women have not been analyzed as constitutive of larger trends in the history of computing.
    [Show full text]
  • Military Tribunal, Indictments
    MILITARY TRIBUNALS Case No. 12 THE UNITED STATES OF AMERICA -against- WILHELM' VON LEEB, HUGO SPERRLE, GEORG KARL FRIEDRICH-WILHELM VON KUECHLER, JOHANNES BLASKOWITZ, HERMANN HOTH, HANS REINHARDT. HANS VON SALMUTH, KARL HOL­ LIDT, .OTTO SCHNmWIND,. KARL VON ROQUES, HERMANN REINECKE., WALTERWARLIMONT, OTTO WOEHLER;. and RUDOLF LEHMANN. Defendants OFFICE OF MILITARY GOVERNMENT FOR GERMANY (US) NORNBERG 1947 • PURL: https://www.legal-tools.org/doc/c6a171/ TABLE OF CONTENTS - Page INTRODUCTORY 1 COUNT ONE-CRIMES AGAINST PEACE 6 A Austria 'and Czechoslovakia 7 B. Poland, France and The United Kingdom 9 C. Denmark and Norway 10 D. Belgium, The Netherland.; and Luxembourg 11 E. Yugoslavia and Greece 14 F. The Union of Soviet Socialist Republics 17 G. The United states of America 20 . , COUNT TWO-WAR CRIMES AND CRIMES AGAINST HUMANITY: CRIMES AGAINST ENEMY BELLIGERENTS AND PRISONERS OF WAR 21 A: The "Commissar" Order , 22 B. The "Commando" Order . 23 C, Prohibited Labor of Prisoners of Wal 24 D. Murder and III Treatment of Prisoners of War 25 . COUNT THREE-WAR CRIMES AND CRIMES AGAINST HUMANITY: CRIMES AGAINST CIVILIANS 27 A Deportation and Enslavement of Civilians . 29 B. Plunder of Public and Private Property, Wanton Destruc­ tion, and Devastation not Justified by Military Necessity. 31 C. Murder, III Treatment and Persecution 'of Civilian Popu- lations . 32 COUNT FOUR-COMMON PLAN OR CONSPIRACY 39 APPENDIX A-STATEMENT OF MILITARY POSITIONS HELD BY THE DEFENDANTS AND CO-PARTICIPANTS 40 2 PURL: https://www.legal-tools.org/doc/c6a171/ INDICTMENT
    [Show full text]
  • STEM DISCOVERY: LONDON 8 Or 11 Days | England
    ® Learn more at Tour s for Girl Scouts eftours.com/girlscouts or call 800-457-9023 STEM DISCOVERY: LONDON 8 or 11 days | England Let STEM be your guide during your exploration of London. Uncover secret messages at Bletchley Park, the birthplace of modern information technology. Practice your sleuthing skills during a CSI-inspired forensics workshop. And plant your feet on two different hemispheres at the Royal Observatory in Greenwich, with the English capital as your backdrop. Make a special visit to Pax Lodge in Hampstead where you will participate in unique Girl Scout programming. EVERYTHING YOU GET: Full-time Tour Director Sightseeing: 2 sightseeing tours led by expert, licensed local guides (3 with extension) Entrances: London Eye, Science Museum/Natural History Museum, Tower of London, theater show, National Museum of Computing, Thames River Cruise, Royal Observatory; with extension: Louvre; Notre-Dame Cathedral Experiential learning: Forensics workshop, Stonehenge activities, Bletchley Park interactive workshop WAGGGS Centre visit: Pax Lodge All of the details are covered: Round-trip flights on major carriers; Comfortable motorcoach; Eurostar high-speed train with extension; 7 overnight stays in hotels with private bathrooms (9 with extension); European breakfast and dinner daily DAY 1: FLY OVERNIGHT TO ENGLAND DAY 2: LONDON – Meet your Tour Director at the airport in London, a city that has become one of the world’s great melting pots while maintaining a distinct character that’s all its own. – Take a walking tour of the city and ride the London Eye, a large Ferris wheel along the River Thames that offers panoramic views of the city.
    [Show full text]
  • Polish Mathematicians Finding Patterns in Enigma Messages
    Fall 2006 Chris Christensen MAT/CSC 483 Machine Ciphers Polyalphabetic ciphers are good ways to destroy the usefulness of frequency analysis. Implementation can be a problem, however. The key to a polyalphabetic cipher specifies the order of the ciphers that will be used during encryption. Ideally there would be as many ciphers as there are letters in the plaintext message and the ordering of the ciphers would be random – an one-time pad. More commonly, some rotation among a small number of ciphers is prescribed. But, rotating among a small number of ciphers leads to a period, which a cryptanalyst can exploit. Rotating among a “large” number of ciphers might work, but that is hard to do by hand – there is a high probability of encryption errors. Maybe, a machine. During World War II, all the Allied and Axis countries used machine ciphers. The United States had SIGABA, Britain had TypeX, Japan had “Purple,” and Germany (and Italy) had Enigma. SIGABA http://en.wikipedia.org/wiki/SIGABA 1 A TypeX machine at Bletchley Park. 2 From the 1920s until the 1970s, cryptology was dominated by machine ciphers. What the machine ciphers typically did was provide a mechanical way to rotate among a large number of ciphers. The rotation was not random, but the large number of ciphers that were available could prevent depth from occurring within messages and (if the machines were used properly) among messages. We will examine Enigma, which was broken by Polish mathematicians in the 1930s and by the British during World War II. The Japanese Purple machine, which was used to transmit diplomatic messages, was broken by William Friedman’s cryptanalysts.
    [Show full text]
  • Idle Motion's That Is All You Need to Know Education Pack
    Idle Motion’s That is All You Need to Know Education Pack Idle Motion create highly visual theatre that places human stories at the heart of their work. Integrating creative and playful stagecraft with innovative video projection and beautiful physicality, their productions are humorous, evocative and sensitive pieces of theatre which leave a lasting impression on their audiences. From small beginnings, having met at school, they have grown rapidly as a company over the last six years, producing five shows that have toured extensively both nationally and internationally to critical acclaim. Collaborative relationships are at the centre of all that they do and they are proud to be an Associate Company of the New Diorama Theatre and the Oxford Playhouse. Idle Motion are a young company with big ideas and a huge passion for creating exciting, beautiful new work. That is All You Need to Know ‘That Is All You Need To Know’ is Idle Motion’s fifth show. We initially wanted to make a show based on the life of Alan Turing after we were told about him whilst researching chaos theory for our previous show ‘The Seagull Effect’. However once we started to research the incredible work he did during the Second World War at Bletchley Park and visited the site itself we soon realised that Bletchley Park was full of astounding stories and people. What stood out for us as most remarkable was that the thousands of people who worked there kept it all a secret throughout the war and for most of their lives. This was a story we wanted to tell.
    [Show full text]
  • The Evolution of British Intelligence Assessment, 1940-41
    University of Calgary PRISM: University of Calgary's Digital Repository Graduate Studies Legacy Theses 1999 The evolution of British intelligence assessment, 1940-41 Tang, Godfrey K. Tang, G. K. (1999). The evolution of British intelligence assessment, 1940-41 (Unpublished master's thesis). University of Calgary, Calgary, AB. doi:10.11575/PRISM/18755 http://hdl.handle.net/1880/25336 master thesis University of Calgary graduate students retain copyright ownership and moral rights for their thesis. You may use this material in any way that is permitted by the Copyright Act or through licensing that has been assigned to the document. For uses that are not allowable under copyright legislation or licensing, you are required to seek permission. Downloaded from PRISM: https://prism.ucalgary.ca THE UNIVERSITY OF CALGARY The Evolution of British Intelligence Assessment, 1940-41 by Godfiey K. Tang A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FLTLFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF ARTS DEPARTMENT OF HISTORY CALGARY, ALBERTA JANUARY, 1999 O Godfiey K Tang 1999 National Library Biblioth4que nationale #*lof Canada du Canada Acquisitions and Acquisitions et Bibliographic Services services bibliographiques 395 Wellington Street 395, rue Wellington OnawaON K1AON4 Ottawa ON KIA ON4 Canada Canada The author has granted a non- L'auteur a accorde une licence non exclusive licence allowing the exclusive pernettant Pla National Library of Canada to Blbliotheque nationale du Canada de reproduce, loan, distribute or sell reproduire, preter, distciiuer ou copies of this thesis in microform, vendre des copies de cette these sous paper or electronic formats. la forme de microfiche/f&n, de reproduction sur papier ou sur format Bectronique.
    [Show full text]
  • Code Breaking at Bletchley Park
    Middle School Scholars’ CONTENTS Newsletter A Short History of Bletchley Park by Alex ​ Lent Term 2020 Mapplebeck… p2-3 Alan Turing: A Profile by Sam Ramsey… ​ Code Breaking at p4-6 Bletchley Park’s Role in World War II by ​ Bletchley Park Harry Martin… p6-8 Review: Bletchley Park Museum by ​ Joseph Conway… p9-10 The Women of Bletchley Park by Sammy ​ Jarvis… p10-12 Bill Tutte: The Unsung Codebreaker by ​ Archie Leishman… p12-14 A Very Short Introduction to Bletchley Park by Sam Corbett… p15-16 ​ The Impact of Bletchley Park on Today’s World by Toby Pinnington… p17-18 ​ Introduction A Beginner’s Guide to the Bombe by Luca ​ “A gifted and distinguished boy, whose future Zurek… p19-21 career we shall watch with much interest.” This was the parting remark of Alan Turing’s Headmaster in his last school report. Little The German Equivalent of Bletchley could he have known what Turing would go on Park by Rupert Matthews… 21-22 ​ to achieve alongside the other talented codebreakers of World War II at Bletchley Park. Covering Up Bletchley Park: Operation Our trip with the third year academic scholars Boniface by Philip Kimber… p23-25 this term explored the central role this site ​ near Milton Keynes played in winning a war. 1 intercept stations. During the war, Bletchley A Short History of Bletchley Park Park had many cover names, which included by Alex Mapplebeck “B.P.”, “Station X” and the “Government Communications Headquarters”. The first mention of Bletchley Park in records is in the Domesday Book, where it is part of the Manor of Eaton.
    [Show full text]