Codeword Overlord


Book Description

It was inevitable that the Allies would invade France in the summer of 1944: the Nazis just had to figure out where and when. This job fell to the Abwehr and several other German intelligence services. Between them they put over 30,000 personnel to work studying British and American signals traffic, and achieved considerable success in intercepting and decrypting enemy messages. They also sent agents to England – but they weren't to know that none of them would be successful. Until now, the Nazi intelligence community has been disparaged by historians as incompetent and corrupt, but newly released declassified documents suggest this wasn't the case – and that they had a highly sophisticated system that concentrated on the threat of an Allied invasion. Written by acclaimed espionage historian Nigel West, Codeword Overlord is a vital reassessment of Axis behaviour in one of the most dramatic episodes of the twentieth century.




Allied Intelligence and the Cover Up at Pointe Du Hoc


Book Description

The first volume in a groundbreaking work of WWII history presents a startlingly different narrative of D-Day based on newly released documents. Though the historic importance of the Allied attack on the gun battery at Pointe du Hoc is well known, historian Gary Sterne has uncovered striking new information about the events in recently released documents. In a landmark work of World War II history, Sterne presents a trenchant reassessment of the battle for Pointe du Hoc in a vivid, two-volume account that reveals the true mission of the 2nd and 5th U.S. Army Rangers. This first volume looks at the critical months leading up to the Normandy invasion, following the preparations of the Rangers from their arrival in England in 1943. Sterne examines the orders they received, along with dozens of aerial reconnaissance photographs of Omaha Beach, Pointe et Raz de la Percée, Pointe du Hoc and Maisy—as well as French Resistance reports. Shown in chronological order and in their original format, many of these documents are still marked TOP SECRET. Together with the second volume, The Cover Up at Omaha Beach, this revelatory work will change the way historians view the Pointe du Hoc battle from now on.







Code Breaking in the Pacific


Book Description

This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25) and the Japanese Army’s Water Transport Code during WWII. This is the first book to describe, explain and analyze the code breaking techniques developed and used to provide this intelligence, thus closing the sole remaining gap in the published accounts of the Pacific War. The authors also explore the organization of cryptographic teams and issues of security, censorship, and leaks. Correcting gaps in previous research, this book illustrates how Sigint remained crucial to Allied planning throughout the war. It helped direct the advance to the Philippines from New Guinea, the sea battles and the submarine onslaught on merchant shipping. Written by well-known authorities on the history of cryptography and mathematics, Code Breaking in the Pacific is designed for cryptologists, mathematicians and researchers working in communications security. Advanced-level students interested in cryptology, the history of the Pacific War, mathematics or the history of computing will also find this book a valuable resource.







Fiber Optics Standard Dictionary


Book Description

Fiber Optics Vocabulary Development In 1979, the National Communications System published Technical InfonnationBulle tin TB 79-1, Vocabulary for Fiber Optics and Lightwave Communications, written by this author. Based on a draft prepared by this author, the National Communications System published Federal Standard FED-STD-1037, Glossary of Telecommunications Terms, in 1980 with no fiber optics tenns. In 1981, the first edition of this dictionary was published under the title Fiber Optics and Lightwave Communications Standard Dictionary. In 1982, the then National Bureau of Standards, now the National Institute of Standards and Technology, published NBS Handbook 140, Optical Waveguide Communications Glossary, which was also published by the General Services Admin istration as PB82-166257 under the same title. Also in 1982, Dynamic Systems, Inc. , Fiberoptic Sensor Technology Handbook, co-authored and edited by published the this author, with an extensive Fiberoptic Sensors Glossary. In 1989, the handbook was republished by Optical Technologies, Inc. It contained the same glossary. In 1984, the Institute of Electrical and Electronic Engineers published IEEE Standard 812-1984, Definitions of Terms Relating to Fiber Optics. In 1986, with the assistance of this author, the National Communications System published FED-STD-1037A, Glossary of Telecommunications Terms, with a few fiber optics tenns. In 1988, the Electronics Industries Association issued EIA-440A, Fiber Optic Terminology, based primarily on PB82-166257. The International Electrotechnical Commission then pub lished IEC 731, Optical Communications, Terms and Definitions. In 1989, the second edition of this dictionary was published.




Spy and Counterspy


Book Description

The shadowy world of supposedly legalized spying has an enduring fascination for us all. Spy and Counterspy reveals for the first time the web of spies that spanned the globe during and after the Second World War, working for organisations like MI5 & MI6, the CIA & OSS, Soviet Smersh & NKVD, Japanese Tokko and the German Gestapo. These men and women lived extraordinary lives, always on the edge of exposure and the risk of death. Many of them were so in love with the Great Game of espionage that they betrayed their countries and acted as double and sometimes even triple agents in a complex deception that threatened the very grasp of power in government. Their war in the shadows remained unrecognized until today.




Puzzlelopedia


Book Description

An A-Z collection of more than 200 quirky, brain-bending, endlessly fun, and unusually unusual puzzles for kids aged 8-12. All you need are a sharp pencil and sharper wits! (An eraser wouldn’t be a bad idea, either.) Solve word searches with themes like Spies, Movies, or the Wild West—and when you’re finished, write out the leftover letters to discover a hidden message. Can’t get enough of the addictive fun of Sudoku? Introducing Dicedoku, which uses dice to represent numbers. Just try saying (or even reading) this tongue twister three times fast: Guy gargoyle, girl gargoyle! Plus hidden pictures, crosswords, spot the mistakes, and many kinds of puzzles you’ve never seen before. Puzzlelopedia also contains special “Puzzle Breakers” for reading about anagrams, code breaking, oxymorons, palindromes, and other bamboozling conundrums.




D-Day Deception


Book Description

On 6 June 1944, Allied forces stormed the beaches at Normandy. The invasion followed several years of argument and planning by Allied leaders, who remained committed to a return to the European continent after the Germans had forced the Allies to evacuate at Dunkirk in May 1940. Before the spring of 1944, however, Prime Minister Winston Churchill and other British leaders remained unconvinced that the invasion was feasible. At the Teheran Conference in November 1943, Franklin D. Roosevelt and Winston Churchill promised Josef Stalin that Allied troops would launch Operation Overlord, the invasion of Normandy, in the spring. Because of their continuing concerns about Overlord, the British convinced the Americans to implement a cover plan to help ensure the invasion's success. The London Controlling Section (LCS) devised an elaborate two-part plan called Operation Fortitude that SHAEF (Supreme Headquarters, Allied Expeditionary Force) helped to fine tune and that both British and American forces implemented Historians analyzing the Normandy invasion frequently devote some discussion to Operation Fortitude. Although they admit that Fortitude North did not accomplish all that the Allied deception planners had hoped, many historians heap praise on Fortitude South, using phrases such as, unquestionably the greatest deception in military history. Many of these historians assume that the deception plan played a crucial role in the June 1944 assault. A reexamination of the sources suggests, however, that other factors contributed as much, if not more, to the Allied victory in Normandy and that Allied forces could have succeeded without the elaborate deception created by the LCS. Moreover, the persistent tendency to exaggerate the operational effect of Fortitude on the German military performance at Normandy continues to draw attention away from other, technical-military reasons for the German failures there.