Wissen Ist Menschlich. Der Stellenwert Der Human Intelligence in Der Britischen Kriegsführung 1939–1945

Total Page:16

File Type:pdf, Size:1020Kb

Wissen Ist Menschlich. Der Stellenwert Der Human Intelligence in Der Britischen Kriegsführung 1939–1945 Bell, Falko (2014) Wissen ist menschlich. Der Stellenwert der Human Intelligence in der britischen Kriegsführung 1939–1945. PhD thesis. https://theses.gla.ac.uk/5382/ Copyright and moral rights for this work are retained by the author A copy can be downloaded for personal non-commercial research or study, without prior permission or charge This work cannot be reproduced or quoted extensively from without first obtaining permission in writing from the author The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the author When referring to this work, full bibliographic details including the author, title, awarding institution and date of the thesis must be given Enlighten: Theses https://theses.gla.ac.uk/ [email protected] Wissen ist menschlich. Der Stellenwert der Human Intelligence in der britischen Kriegsführung 1939–1945 Inauguraldissertation zur Erlangung des Akademischen Grades eines Dr. phil., vorgelegt dem Fachbereich 07 – Geschichts- und Kulturwissenschaften der Johannes Gutenberg-Universität Mainz von Falko Bell aus Limburg an der Lahn 2014 Referent: Prof. Dr. Sönke Neitzel Korreferent: PD Dr. Alaric Searle (University of Salford) Tag des Prüfungskolloquiums: 10. Februar 2014 Summary This thesis examines the use of prisoners of war (POWs), agents and other groups of persons as source of information in the British conduct of war against Germany during the Second World War and demonstrates its significance. While the successes of Bletchley Park in decrypting German wireless traffic are well-known, human intelligence (HUMINT) has received considerably less scholarly attention. During the years 1939 to 1945, the British used an extensive espionage network, maintained informal contacts in neutral cities, and questioned refugees, convicted enemy spies and soldiers who had escaped from German captivity. Most notably, the military services established a far-reaching system of interrogation facilities to obtain intelligence from German prisoners of war in all theatres of war. These activities provided a valuable amount of intelligence on German weaponry, tactics, plans and mentality, which not only constituted useful background information in rapidly changing war conditions but also improved decision-making processes and resulting actions. During the past decades, the main focus of academic research lay on signals intelligence and its influence on British strategy and operations which resulted in a neglect of other forms of intelligence. Recent academic research has not only emphasised a more holistic view of intelligence and its impact on warfare but also points to several successful HUMINT operations such as the international cooperation in espionage and the so-called Combined Services Detailed Interrogation Centre, United Kingdom (CSDIC(UK)). At the same time, studies in intelligence provide an extensive framework dealing with various theoretical, practical and ethical aspects which facilitates the analysis of intelligence in historical context. In light of these developments and the unprecedented access to archival material, a re- evaluation of the role of human intelligence in Great Britain during the Second World War is necessary. This thesis combines the theoretical approaches of intelligence with an examination of the organisation of human intelligence during wartime. It utilises three case studies covering the tactical, operational and strategic level of war. First, it offers a model of “main areas”, collection, analysis, dissemination and use, to examine the intelligence process in historical context. These elements constitute a set of interacting steps which describe the way from a iii specific piece of raw material to its use as human intelligence in decision-making. The human origin influences the characteristics of the intelligence process such as the interaction of individuals during collection, the inherent problem of reliability and accuracy, and the question of acceptance by potential users. The model also serves as a basis for an evaluation scheme: the internal value addresses the intelligence process itself, whereas the external value measures the effect within decision-making and its impact on resulting actions. Regarding the organisational aspect, the intelligence agencies responsible for human intelligence used their previous experience from the last war and grew significantly in size during the Second World War. The interrogation of prisoners of war consisted of a multi-step process with the CSDIC(UK) at the top, which over 10 000 POWs passed through. The combination of interrogation techniques – such as the omniscient trick and friendly approach, concealed microphones, and former refugees or prisoners acting as stool pigeons – resulted in a high output of accurate and appreciated HUMINT. The Secret Service (SIS) recovered after some setbacks at the beginning of the war and – supported by contacts in occupied territory – it was able to deliver reports covering a wide range of topics. In addition, the Security Service (MI5) and the Special Operations Executive (SOE) supplemented the work of the SIS – besides their primary objectives. In addition to the use of enemy prisoners and agents in the field, there were three other sources for HUMINT: the questioning of refugees in the specifically designed London Reception Centre, regular contacts with interned British soldiers and individual arrangements in neutral countries, most notably in Sweden and Switzerland, which provided the Foreign Office with news of varying quality. The outcome of these extensive efforts is discussed in the three case studies. The tactical example deals with the defence against German attacks during the Battle of Britain and the Blitz in 1940/1941. POW Intelligence supplemented the other sources of intelligence with the perspective of the enemy: it provided actual data on armament, armour and equipment of German bomber and fighter aircraft; it added details on the order of battle and combat readiness of the German Luftwaffe; and it gave insight into enemy tactics, targeting and the effectiveness of British countermeasures. Therefore, HUMINT made a valuable contribution to the overall intelligence picture which supported and optimised the efforts of Fighter Command. It helped to prepare fighter pilots for their engagements with the enemy and to counter new tactics and technologies such as navigational aids for night bombing. The operational case study covers the detection of the German plans to use a liquid rocket and cruise missile (the so called V-weapons V1 and V2) against British cities, where human intelligence played a key role. In early 1943, SIS reports and secret records of conversations iv between German POWs convinced the authorities in London of the danger of a long range weapon of a new type. HUMINT later gave indications of the existence of two distinct weapons and the V1 firing system in Northern France. In 1944, it provided details on the characteristics and launching procedures of the V2. These contributions enabled the British not only to direct other intelligence resources such as aerial reconnaissance towards the new threat but also to develop effective offensive and defensive countermeasures. These delayed the deployment of the two weapons and significantly reduced the inflicted damage. The strategic example deals with the British efforts to assess the state of morale of the German military and civilian population. This aspect was primarily covered by human intelligence. Although the amount of raw material gradually expanded and the analytical methods became more sophisticated – especially after the drastic increase of prisoner of war interrogations after D-Day –, the impact of HUMINT remained ambivalent. Until 1943, preconceived opinions about an inferior German morale and an especially vulnerable civilian population were not altered by intelligence products provided by the Joint Intelligence Sub- Committee and a separate “morale committee”. The conviction in the second half of 1943 that Germany would collapse from within as it had happened in 1918 was the most visible result. In the following months, intelligence analysis improved considerably and finally falsified previous hopes; however, that development did not restrain British authorities from over- enthusiastic expectations of a rapid end of war in the summer of 1944. Ultimately, human intelligence provided a considerable insight into the inner state of the enemy, but the intelligence task to detect a predefined collapse and the attempt to conceive an elaborated concept of morale overburdened the intelligence services. This thesis combines theoretical approaches with a historical analysis and shows that human intelligence was a powerful force multiplier which the British early recognized and successfully utilized. Therefore, this thesis offers a new perspective on British intelligence and military history during the Second World War. Furthermore, it seeks to contribute to general discussions about the relevance of intelligence in decision-making up to the present day. v Inhaltsverzeichnis 1 Einleitung ....................................................................................................................................... 1 1.1 Thema und Fragestellung ........................................................................................................ 1 1.2 Quellenlage und Forschungsstand ..........................................................................................
Recommended publications
  • Chancellor's Speech to GCHQ on Cyber Security
    Speech Chancellor's speech to GCHQ on cyber security From: HM Treasury, Government Communications Headquarters and The Rt Hon George Osborne MP Delivered on: 17 November 2015 (Original script, may differ from delivered version) Location: GCHQ First published: 17 November 2015 Part of: Spending Review and Autumn Statement 2015 Chancellor lays out new plan for £1.9 billion cyber investment, and details seven more departments that have settled ahead of the Spending Review. Before I start my speech, I want to say a few words about the heart-breaking events that unfolded in Paris on Friday evening. This was an assault not just on the people of France, but on all of us who value freedom and democracy. We stand with the people of France. We know that we must act as one, just as our enemies see us as one. As David Cameron has said, we will do everything we possibly can to help the French at this moment of national trauma. That includes making available to them the sharpest of our own national capability, which includes the skills and capabilities of GCHQ. Before the dreadful events of the weekend we had already indicated that we would be increasing substantially the resources we dedicate to countering the terrorist threat posed by ISIL. The Prime Minister has made clear that across the agencies a further 1,900 staff will be recruited to keep Britain safe from terrorist attack. This was going to be an important outcome of the Spending Review. What has unfolded in Paris has reminded us all that it is a vital one too.
    [Show full text]
  • The Forgotten Fronts the First World War Battlefield Guide: World War Battlefield First the the Forgotten Fronts Forgotten The
    Ed 1 Nov 2016 1 Nov Ed The First World War Battlefield Guide: Volume 2 The Forgotten Fronts The First Battlefield War World Guide: The Forgotten Fronts Creative Media Design ADR005472 Edition 1 November 2016 THE FORGOTTEN FRONTS | i The First World War Battlefield Guide: Volume 2 The British Army Campaign Guide to the Forgotten Fronts of the First World War 1st Edition November 2016 Acknowledgement The publisher wishes to acknowledge the assistance of the following organisations in providing text, images, multimedia links and sketch maps for this volume: Defence Geographic Centre, Imperial War Museum, Army Historical Branch, Air Historical Branch, Army Records Society,National Portrait Gallery, Tank Museum, National Army Museum, Royal Green Jackets Museum,Shepard Trust, Royal Australian Navy, Australian Defence, Royal Artillery Historical Trust, National Archive, Canadian War Museum, National Archives of Canada, The Times, RAF Museum, Wikimedia Commons, USAF, US Library of Congress. The Cover Images Front Cover: (1) Wounded soldier of the 10th Battalion, Black Watch being carried out of a communication trench on the ‘Birdcage’ Line near Salonika, February 1916 © IWM; (2) The advance through Palestine and the Battle of Megiddo: A sergeant directs orders whilst standing on one of the wooden saddles of the Camel Transport Corps © IWM (3) Soldiers of the Royal Army Service Corps outside a Field Ambulance Station. © IWM Inside Front Cover: Helles Memorial, Gallipoli © Barbara Taylor Back Cover: ‘Blood Swept Lands and Seas of Red’ at the Tower of London © Julia Gavin ii | THE FORGOTTEN FRONTS THE FORGOTTEN FRONTS | iii ISBN: 978-1-874346-46-3 First published in November 2016 by Creative Media Designs, Army Headquarters, Andover.
    [Show full text]
  • The War Room Managed North Sea Trap 1907-1916
    Michael H. Clemmesen 31‐12‐2012 The War Room Managed North Sea Trap 1907‐1916. The Substance, Roots and Fate of the Secret Fisher‐Wilson “War Plan”. Initial remarks In 1905, when the Royal Navy fully accepted the German High Seas Fleet as its chief opponent, it was already mastering and implementing reporting and control by wireless telegraphy. The Admiralty under its new First Sea Lord, Admiral John (‘Jacky’) Fisher, was determined to employ the new technology in support and control of operations, including those in the North Sea; now destined to become the main theatre of operations. It inspired him soon to believe that he could centralize operational control with himself in the Admiralty. The wireless telegraph communications and control system had been developed since 1899 by Captain, soon Rear‐Admiral Henry Jackson. Using the new means of communications and intelligence he would be able to orchestrate the destruction of the German High Seas Fleet. He already had the necessary basic intelligence from the planned cruiser supported destroyer patrols off the German bases, an operation based on the concept of the observational blockade developed by Captain George Alexander Ballard in the 1890s. Fisher also had the required The two officers who supplied the important basis for the plan. superiority in battleships to divide the force without the risk of one part being To the left: George Alexander Ballard, the Royal Navy’s main conceptual thinker in the two decades defeated by a larger fleet. before the First World War. He had developed the concept of the observational blockade since the 1890s.
    [Show full text]
  • 'The Admiralty War Staff and Its Influence on the Conduct of The
    ‘The Admiralty War Staff and its influence on the conduct of the naval between 1914 and 1918.’ Nicholas Duncan Black University College University of London. Ph.D. Thesis. 2005. UMI Number: U592637 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. Dissertation Publishing UMI U592637 Published by ProQuest LLC 2013. Copyright in the Dissertation held by the Author. Microform Edition © ProQuest LLC. All rights reserved. This work is protected against unauthorized copying under Title 17, United States Code. ProQuest LLC 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, Ml 48106-1346 CONTENTS Page Abstract 4 Acknowledgements 5 Abbreviations 6 Introduction 9 Chapter 1. 23 The Admiralty War Staff, 1912-1918. An analysis of the personnel. Chapter 2. 55 The establishment of the War Staff, and its work before the outbreak of war in August 1914. Chapter 3. 78 The Churchill-Battenberg Regime, August-October 1914. Chapter 4. 103 The Churchill-Fisher Regime, October 1914 - May 1915. Chapter 5. 130 The Balfour-Jackson Regime, May 1915 - November 1916. Figure 5.1: Range of battle outcomes based on differing uses of the 5BS and 3BCS 156 Chapter 6: 167 The Jellicoe Era, November 1916 - December 1917. Chapter 7. 206 The Geddes-Wemyss Regime, December 1917 - November 1918 Conclusion 226 Appendices 236 Appendix A.
    [Show full text]
  • Download the Full PDF Here
    THE PHILADELPHIA PAPERS A Publication of the Foreign Policy Research Institute GREAT WAR AT SEA: REMEMBERING THE BATTLE OF JUTLAND by John H. Maurer May 2016 13 FOREIGN POLICY RESEARCH INSTITUTE THE PHILADELPHIA PAPERS, NO. 13 GREAT WAR AT SEA: REMEMBERING THE BATTLE OF JUTLAND BY JOHN H. MAURER MAY 2016 www.fpri.org 1 THE PHILADELPHIA PAPERS ABOUT THE FOREIGN POLICY RESEARCH INSTITUTE Founded in 1955 by Ambassador Robert Strausz-Hupé, FPRI is a non-partisan, non-profit organization devoted to bringing the insights of scholarship to bear on the development of policies that advance U.S. national interests. In the tradition of Strausz-Hupé, FPRI embraces history and geography to illuminate foreign policy challenges facing the United States. In 1990, FPRI established the Wachman Center, and subsequently the Butcher History Institute, to foster civic and international literacy in the community and in the classroom. ABOUT THE AUTHOR John H. Maurer is a Senior Fellow of the Foreign Policy Research Institute. He also serves as the Alfred Thayer Mahan Professor of Sea Power and Grand Strategy at the Naval War College in Newport, Rhode Island. The views expressed in this article are those of the author alone, and do not represent the settled policy of the Naval War College, the Department of the Navy, the Department of Defense, or the U.S. Government. Foreign Policy Research Institute 1528 Walnut Street, Suite 610 • Philadelphia, PA 19102-3684 Tel. 215-732-3774 • Fax 215-732-4401 FOREIGN POLICY RESEARCH INSTITUTE 2 Executive Summary This essay draws on Maurer’s talk at our history institute for teachers on America’s Entry into World War I, hosted and cosponsored by the First Division Museum at Cantigny in Wheaton, IL, April 9-10, 2016.
    [Show full text]
  • Defeating the U-Boat Inventing Antisubmarine Warfare NEWPORT PAPERS
    NAVAL WAR COLLEGE NEWPORT PAPERS 36 NAVAL WAR COLLEGE WAR NAVAL Defeating the U-boat Inventing Antisubmarine Warfare NEWPORT PAPERS NEWPORT S NA N E V ES AV T AT A A A L L T T W W S S A A D D R R E E C C T T I I O O L N L N L L U U E E E E G G H H E E T T I I VIRIBU VOIRRIABU OR A S CT S CT MARI VI MARI VI 36 Jan S. Breemer Color profile: Disabled Composite Default screen U.S. GOVERNMENT Cover OFFICIAL EDITION NOTICE This perspective aerial view of Newport, Rhode Island, drawn and published by Galt & Hoy of New York, circa 1878, is found in the American Memory Online Map Collections: 1500–2003, of the Library of Congress Geography and Map Division, Washington, D.C. The map may be viewed at http://hdl.loc.gov/ loc.gmd/g3774n.pm008790. Use of ISBN Prefix This is the Official U.S. Government edition of this publication and is herein identified to certify its authenticity. ISBN 978-1-884733-77-2 is for this U.S. Government Printing Office Official Edition only. The Superintendent of Documents of the U.S. Govern- ment Printing Office requests that any reprinted edi- tion clearly be labeled as a copy of the authentic work with a new ISBN. Legal Status and Use of Seals and Logos The logo of the U.S. Naval War College (NWC), Newport, Rhode Island, authenticates Defeating the U- boat: Inventing Antisubmarine Warfare, by Jan S.
    [Show full text]
  • Notes and References Documents Held at the Public Record Office, London, Are Crown Copyright and Are Reproduced by Permission of the Controller Ofhm Stationery Office
    Notes and References Documents held at the Public Record Office, London, are crown copyright and are reproduced by permission of the Controller ofHM Stationery Office. I NTRODUCTION Christopher Andrew and David Dilks I. David Dilks (ed.), The Diaries rifSir Alexander Cadogan O.M. 1938-1945 (Lon­ don , (971) , p. 21. 2. Interview with Professor Hinsley in Part 3 of the BBC Radio 4 documentary series 'T he Profession of Intelligence', written and presented by Christopher Andrew (producer Peter Everett); first broadcast 16 Aug 1981. 3. F. H. Hinsleyet al., British Intelligencein the Second World War (London, 1979-). The first two chapters of volume I contain a useful retrospect on the pre-war development of the intelligence community. Curiously, despite the publication of Professor Hinsley's volumes, the government has decided not to release the official histories commissioned by it on wartime counter-espionage and deception. The forthcoming (non-official) collection of essays edited by Ernest R. May, Knowing One's Enemies: IntelligenceAssessment before the Two World Wars (Princeton) promises to add significantly to our knowledge of the role of intelligence on the eve of the world wars. 4. House of Commons Education, Science and Arts Committee (Session 1982-83) , Public Records: Minutes ofEvidence, pp . 76-7. 5. Chapman Pincher, Their Trade is Treachery (London, 1981). Nigel West, A Matter of Trust: MI51945-72 (London, 1982). Both volumes contain ample evidence of extensive 'inside information'. 6. Nigel West , MI5: British Security Operations /90/-/945 (London, 1981), pp . 41, 49, 58. One of the most interesting studies of British peacetime intelligence which depends on a substantial amount of inside information is Antony Verrier's history of post-war British foreign policy , Through the Looking Glass (London, 1983) .
    [Show full text]
  • Pdf Softwarebasis Für Viele Weitere Forschungsarbeiten Auf 273 Frank F
    Mathematisch-naturwissenschaftliche Klasse Abhandlungen München, Neue Folge 178 Mathematisch-naturwissenschaftliche Klasse Abhandlungen München 2014, Neue Folge 178 Anpassung, Unbotmäßigkeit und Widerstand Karl Küpfmüller, Hans Piloty, Hans Ferdinand Mayer – Drei Wissenschaftler der Nachrichtentechnik im «Dritten Reich» Joachim Hagenauer Martin Pabst Vorgetragen in der Gesamtsitzung der BAdW am 19. Oktober 2012 ISSN 0005 6995 ISBN 978 3 7696 2565 3 © Bayerische Akademie der Wissenschaften München, 2014 Layout und Satz: a.visus, München Druck und Bindung: Pustet, Regensburg Vertrieb: Verlag C. H. Beck, München Gedruckt auf säurefreiem, alterungsbeständigem Papier (hergestellt aus chlorfrei gebleichtem Zellstoff) Printed in Germany www.badw.de www.badw.de/publikationen/index.html Später sagte er mir einmal, daß sich ein Eintritt in die Partei wohl früher oder später nicht vermeiden liesse, um seine Fähigkeiten in den Dienst der Technik zu stellen. Man könne sich «nicht in den Schmollwinkel zurückziehen». Ein Kollege über Karl Küpfmüller Prof. Piloty ist der Typ des Intellektuellen, der bewusst mit seiner Kritik zersetzend und herabsetzend wirken will. Er versucht dabei, diese Kritik mit seiner Besorgnis um die Zukunft zu tarnen. Unter Bezugnahme auf die Besorgnis bringt er ständig Bedenken gegen die Politik des Führers und seiner Mitarbeiter vor. Der Gauführer des NSD-Dozentenbunds über Hans Piloty Eine Bestie wie Hitler sollte den Krieg nicht gewinnen. Hans Ferdinand Mayer Inhalt 1. Verhaltensoptionen in der NS-Zeit – eine vergleichende Betrachtung am Beispiel von drei Wissenschaftlern der Nachrichtentechnik 7 2. Lebensläufe und Karrieren: Karl Küpfmüller, Hans Piloty, Hans Ferdinand Mayer 11 3. Die wissenschaftlichen Leistungen der drei Nachrichtentechniker 41 4. Technik und Ingenieure im Nationalsozialismus 50 5. Gemeinsame Wege in Wissenschaft und Forschung – getrennte Wege in der Politik: Das Verhalten von Küpfmüller, Mayer und Piloty im NS-Staat und Krieg 58 6.
    [Show full text]
  • The Dawn of American Cryptology, 1900–1917
    United States Cryptologic History The Dawn of American Cryptology, 1900–1917 Special Series | Volume 7 Center for Cryptologic History David Hatch is technical director of the Center for Cryptologic History (CCH) and is also the NSA Historian. He has worked in the CCH since 1990. From October 1988 to February 1990, he was a legislative staff officer in the NSA Legislative Affairs Office. Previously, he served as a Congressional Fellow. He earned a B.A. degree in East Asian languages and literature and an M.A. in East Asian studies, both from Indiana University at Bloomington. Dr. Hatch holds a Ph.D. in international relations from American University. This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other US government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: Before and during World War I, the United States Army maintained intercept sites along the Mexican border to monitor the Mexican Revolution. Many of the intercept sites consisted of radio-mounted trucks, known as Radio Tractor Units (RTUs). Here, the staff of RTU 33, commanded by Lieutenant Main, on left, pose for a photograph on the US-Mexican border (n.d.). United States Cryptologic History Special Series | Volume 7 The Dawn of American Cryptology, 1900–1917 David A.
    [Show full text]
  • 1 British Signals Intelligence and the 1916 Easter Rising in Ireland ABSTRACT Historians for Decades Have Placed Room 40, the Fi
    British Signals Intelligence and the 1916 Easter Rising in Ireland ABSTRACT Historians for decades have placed Room 40, the First World War British naval signals intelligence organization, at the centre of narratives about the British anticipation of and response to the Easter Rising in Ireland in 1916. A series of crucial decrypts of telegrams between the German embassy in Washington and Berlin, it has been believed, provided significant advance intelligence about the Rising before it took place. This article upends previous accounts by demonstrating that Room 40 possessed far less advance knowledge about the Rising than has been believed, with most of the supposedly key decrypts not being generated until months after the Rising had taken place. INTRODUCTION A key moment in twentieth century Irish history, on Easter Monday 1916 a group of rebels launched in Dublin an uprising against British rule. Carefully prepared in advance, the Irish rebels had previously sought German assistance in providing arms and in organizing transport for famed Irish nationalist Roger Casement. The Germans agreed to provide this assistance, dispatching Casement aboard a German submarine and organizing a covert landing of munitions aboard a merchant ship masquerading as the Norwegian steamer Aud. The arms, however, were intercepted and Casement captured by the British authorities. Notwithstanding these reverses, the uprising went forward shortly thereafter on Easter Monday, 24 April 1916. Though apparently catching the British authorities in Ireland by surprise, the uprising was put down by the British in a violent crackdown. For decades, signals intelligence has been treated as the linchpin in our understanding of the British anticipation of and response to these events.
    [Show full text]
  • The Current-Source Equivalent
    Scanning Our Past Origins of the Equivalent Circuit Concept: The Current-Source Equivalent I. INTRODUCTION technical work, Mayer’s personal life perhaps had more im- As described in my previous paper [1], the voltage-source pact. As described in [8], [10], [11], Mayer secretly leaked equivalent was first derived by Hermann von Helmholtz to the British in November 1939 all he knew of Germany’s (1821–1894) in an 1853 paper [2]. Exactly thirty years later warfare capabilities, particularly concerning electronic war- in 1883, Léon Charles Thévenin (1857–1926) published fare. Because he represented Siemens as a technical expert the same result [3], [4] apparently unaware of Helmholtz’s in negotiations with companies outside Germany, he had the work. The generality of the equivalent source network was opportunity to travel widely about Europe. While in Oslo, not appreciated until forty-three years later. Then, in 1926, Norway, he typed and mailed a two-page report of what he Edward Lawry Norton (1898–1983) wrote an internal Bell knew and mailed it to the British Embassy in Oslo. Because Laboratory technical report [5] that described in passing the Mayer wrote it anonymously, the British, led by Reginald usefulness in some applications of using the current-source Jones, had to determine the report’s accuracy. Jones found form of the equivalent circuit. In that same year, Hans what became known as the Oslo Report to be a technically Ferdinand Mayer (1895–1980) published the same result [6] knowledgeable person’s description of what he/she knew (al- and detailed it fully. As detailed subsequently, these people though it contains some errors) [11].
    [Show full text]
  • Zimmermann Telegram: the Original Draft
    Cryptologia, 31:2–37, 2007 Copyright Taylor & Francis Group, LLC ISSN: 0161-1194 print DOI: 10.1080/01611190600921165 Zimmermann Telegram: The Original Draft JOACHIM VON ZUR GATHEN Abstract This article presents the original draft of the Zimmermann telegram poses. These works may not bemission posted of elsewhere the without copyright the holder. explicit (Last written update per- 2014/01/29-17 :42.) from 1917 in facsimile. Its various annotations provide interesting insights, such as the idea to promise California to Japan and instructions concerning trans- mission and encryption. Further documents clarify how the telegram was sent and put various alternatives suggested in the literature to rest. The political back- ground and fallout in Germany are discussed, as well. Keywords codebook, cryptanalysis, First World War, Room 40, Zimmermann telegram 1. Introduction (1), 2–37. URL No single event decided the outcome of the First World War 1914–1918. But the 31 entry of the United States as a belligerent—after long hesitation—played a major ing any of theseeach documents will copyright adhere holder, to and the in terms particular and use constraints them invoked only by for noncommercial pur- role in the success of the Entente, originally led by France and Great Britain. And the (in)famous telegram discussed in this article played a role in changing the anti- Cryptologia war attitude in large parts of the US population and giving President Thomas Woodrow Wilson the popular and political majority for entry into the war on the side of the Entente, clenching its victory. David Kahn has called the cryptanalytic solution the greatest intelligence coup of all time [27, p.
    [Show full text]