DC -- International Spy Museum (New Location) -- 2. Codes:
Bruce Guthrie Photos Home Page: [Click here] to go to Bruce Guthrie Photos home page.
Recognize anyone? If you recognize specific folks (or other stuff) and I haven't labeled them, please identify them for the world. Click the little pencil icon underneath the file name (just above the picture). Spammers need not apply.
Slide Show: Want to see the pictures as a slide show?
[Slideshow]
Copyrights: All pictures were taken by amateur photographer Bruce Guthrie (me!) who retains copyright on them. Free for non-commercial use with attribution. See the [Creative Commons] definition of what this means. "Photos (c) Bruce Guthrie" is fine for attribution. (Commercial use folks including AI scrapers can of course contact me.) Feel free to use in publications and pages with attribution but you don't have permission to sell the photos themselves. A free copy of any printed publication using any photographs is requested. Descriptive text, if any, is from a mixture of sources, quite frequently from signs at the location or from official web sites; copyrights, if any, are retained by their original owners.
Help? The Medium (Email) links are for screen viewing and emailing. You'll want bigger sizes for printing. [Click here for additional help]
Specific picture descriptions: Photos above with "i" icons next to the bracketed sequence numbers (e.g. "[1] ") are described as follows:
SPY2C_190507_008.JPG: Making Sense of Secrets
SPY2C_190507_014.JPG: Speaking in Code
SPY2C_190507_016.JPG: Is it a Code... Or Cipher?
Code:
* Replaces words, phrases, or names with different words, phrases, numbers, or symbols.
* Need a code book to decode.
Example: ENORMZ was the Soviet code name for America's WWII atomic bomb program.
Cipher:
* Replaces each letter in a word with a different letter, number, or symbol.
* Needs a key or algorithm to decrypt it.
Example: Replace each letter of the alphabet with a number in ascending order, and the word SPY becomes 19 16 25.
SPY2C_190507_025.JPG: "Were it not for the Navajos, the Marines would never have taken Iwo Jima."
-- Major Howard Connor, 5th Marine Division Signal Officer
SPY2C_190507_032.JPG: Modern Technology in an Ancient Tongue
SPY2C_190507_035.JPG: Choctaw to the Rescue
SPY2C_190507_041.JPG: Code Purple!
SPY2C_190507_048.JPG: This shows one of the few remaining fragments of a PURPLE machine, recovered from the basement of the Japanese Embassy in Germany after the war. The Japanese destroyed all other PURPLE machines worldwide.
SPY2C_190507_052.JPG: Breaking PURPLE
SPY2C_190507_059.JPG: Each year the Friedmans sent out a clever coded Christmas card -- they called this one from 1928 a "telephotocryptogram." When each side of the grille is held over the table of scrambled letters it reveals a different secret message.
SPY2C_190507_063.JPG: The coding couple, William and Elizebeth Friedman, shown with a cipher disk and a cipher wheel.
SPY2C_190507_066.JPG: The Friedmans used these coded bookplates in their personal library.
SPY2C_190507_069.JPG: Codebreakers:
William & Elizebeth Friedman (1891-1969 and 1892-1980)
SPY2C_190507_072.JPG: This cipher sheet was found on the wreck of the U-85, sunk off the coast of North Carolina in 1942. Divers retrieved the cipher machine and cipher page.
SPY2C_190507_076.JPG: An Enigma's heart were interchangeable internal rotors like these. Each rotor had 26 internal settings.
SPY2C_190507_083.JPG: The odds against breaking Enigma without knowing the machine's settings? 150 million-million-million to one.
SPY2C_190507_091.JPG: The Uncrackable Enigma
SPY2C_190507_093.JPG: Rotor Power: Making Enigma Stronger!
Germany built this rare Enigma for its ally, Japan (notice the Japanese characters). See the fourth rotor? Unaware Britain had cracked Enigma, Germany added a rotor in 1942 to strengthen in.
The British called the device's messages "Shark." It took nearly a year to crack, and only after capturing key sheets from a German U-boat. In the interim, Nazi subs sank more than 2 million tons of Allied supplies.
Four rotor Enigma machine, Germany, 1943-1944
SPY2C_190507_105.JPG: Why Was It So Hard to Break Enigma?
SPY2C_190507_109.JPG: Breaking Enigma: Pole Vaulted
SPY2C_190507_111.JPG: Codebreaker:
Marian Rejewski (1905-1980)
SPY2C_190507_114.JPG: It took more than 40 years to honor the unheralded work of three Polish codebreakers who delivered to Bomba, the first machine to break part of the Enigma cipher. Marian Rejewski, Jerry Rozycki, and Henryk Zygalski.
SPY2C_190507_121.JPG: The Brains of Bletchley
SPY2C_190507_123.JPG: Codebreaker:
Alan Turing (1912-1954)
SPY2C_190507_125.JPG: Mavis Lever (1921-2013)
SPY2C_190507_127.JPG: Lorenz: Enigma on Steroids
SPY2C_190507_132.JPG: A Colossal Codebreaker
It was a cryptographic race... and the Nazis had taken the lead. After Bletchley codebreakers cracked the Lorenz cipher in 1941, Germany upped the ante, making it even more complex. Could Britain develop a machine to break it?
In 1943, a team at Bletchley unveiled Colossus. Created by telephone engineer Thomas Flowers, it was the first practical electronic digital information processor.
SPY2C_190507_135.JPG: Bletchley Park mansion and estate in Buckinghamshire, England was the top secret center for a group of WWII codebreakers.
SPY2C_190507_138.JPG: Wonder Woman
About 8,000 women -- from card-index compilers to codebreaking specialists -- were the backbone of operations at Bletchley. They mostly performed the less glamorous but essential tasks of monitoring and processing coded messages and handling the mountains of paper generated in a pre-computer age.
They received little glory or praise for their work. But no breakthroughs would have happened without them.
SPY2C_190507_143.JPG: After an agent used numbers from this non-rustling one time pad, she cut them away and burned them. That ensured the message could never be recovered -- except by someone at "home station" with the exact same one time pad.
SPY2C_190507_148.JPG: This device was used to authenticate non-secure US military communications. The yellow indicator shows which row of cipher should be used to confirm orders. It has eight different ways to authenticate, and eight ways to set message groups.
SPY2C_190507_152.JPG: This handy pocket book was used to send secure messages during the Spanish-American War. It includes instructions for soldiers with zero coding experience.
SPY2C_190507_155.JPG: One time pads are intended for one use only -- making it an unbreakable system. Sender and recipient hold identical pads. Each sheet is used to encrypt or decrypt a message, and then destroyed.
Walnut with one time pad, Germany (Stasi), ca 1960s-1970s
SPY2C_190507_159.JPG: This device -- used by the US Army and Navy until WWII -- employs the same basic principle as one invented by Thomas Jefferson: rotate the disks to encipher a message. It has 15 septillion possible combinations!
SPY2C_190507_162.JPG: During WWII, an ashtray sitting on an agent's desk wouldn't attract much attention. And that's exactly why it was used to conceal a cipher disk for covert communication.
SPY2C_190507_167.JPG: Developed in the 1920s, the Kryha was a clockwork-driven mechanical device marketed for commercial use. In 1933, the US Army evaluated its security: William Friedman and his colleagues took less than three hours to decipher an 1135-character message.
SPY2C_190507_170.JPG: The US Army widely used cheap, portable, and secure strip cipher systems like this during WWII. A flat version of the M-94, it allowed soldiers to easily arrange alphabet strips to cipher and decipher medium security messages at low cost.
SPY2C_190507_174.JPG: This handy pocket book was used to send secure messages during the Spanish-American War. It includes instructions for soldiers with zero coding experience.
SPY2C_190507_178.JPG: The portable M-209 (successor for the M-94) was so popular in the US Army that German cryptoanalysts knew it as AM_1: American Machine #1. Never considered very secure, it was used for tactical battlefield messages.
SPY2C_190507_183.JPG: Easily concealed in a coat pocket, this machine was popular with Cold War spy agencies, notably French intelligence. It was even supplied to the Vatican. The left hand squeezes the lever while the right hand is free to take notes.
SPY2C_190507_189.JPG: Cracking the Code, Turning the Tide
SPY2C_190507_194.JPG: Codebreaker:
Joseph Rochefort (1900-1976)
SPY2C_190507_197.JPG: Map of the Battle of Midway
SPY2C_190507_199.JPG: Captain Joseph Rochefort was a major figure in US Navy intelligence and codebreaking from 1925 to 1947. He died in 1976, and was honored posthumously with a Presidential Medal of Freedom in 1986.
SPY2C_190507_204.JPG: The Battle of Midway: Victory Decoded
SPY2C_190507_205.JPG: Italian mathematician Girolama Cardano. Despite his many professions, he was constantly strapped for cash -- but used his expertise at probability to win money at card games, dice, and chess.
SPY2C_190507_221.JPG: Codebreaker:
Leon Battista Alberti (1404-1472)
SPY2C_190507_224.JPG: Spinning Secrets
SPY2C_190507_227.JPG: Hit the Books for Hidden Messages!
Book codes convey secret messages by directing people to find specific words in the text. (The recipient must have exactly the same book!)
Page number / line number - word number / line number - word number, etc.
SPY2C_190507_231.JPG: Now You See It...
Now You Don't
SPY2C_190507_233.JPG: Bald, Boiled, and Buried in Books
AAA "Gem": AAA considers this location to be a "must see" point of interest. To see pictures of other areas that AAA considers to be Gems, click here.
Bigger photos? To save server space, the full-sized versions of these images have either not been loaded to the server or have been removed from the server. (Only some pages are loaded with full-sized images and those usually get removed after three months.)
I still have them though. If you want me to email them to you, please send an email to guthrie.bruce@gmail.com
and I can email them to you, or, depending on the number of images, just repost the page again will the full-sized images.
Directly Related Pages: Other pages with content (DC -- International Spy Museum) directly related to this one:
[Display ALL photos on one page]:
2021_DC_Spy: DC -- International Spy Museum (4 photos from 2021)
2020_DC_Spy: DC -- International Spy Museum (5 photos from 2020)
2019_DC_Spy_6Uncertain: DC -- International Spy Museum (New Location) -- 6. An Uncertain World (228 photos from 2019)
2019_DC_Spy_5History: DC -- International Spy Museum (New Location) -- 5. Spying that Shaped History (315 photos from 2019)
2019_DC_Spy_4Covert: DC -- International Spy Museum (New Location) -- 4. Covert Action (226 photos from 2019)
2019_DC_Spy_3Sense: DC -- International Spy Museum (New Location) -- 3. Making Sense of Secrets (81 photos from 2019)
2019_DC_Spy_1Stealing: DC -- International Spy Museum (New Location) -- 1. Stealing Secrets (389 photos from 2019)
2019_DC_Spy: DC -- International Spy Museum (New Location) (77 photos from 2019)
2018_DC_Spy: DC -- International Spy Museum (New Location) (12 photos from 2018)
2017_DC_Spy: DC -- International Spy Museum (New Location) (40 photos from 2017)
2019 photos: Equipment this year: I continued to use my Fuji XS-1 cameras but, depending on the event, I also used a Nikon D7000.
Trips this year:
a four-day jaunt to Massachusetts (Boston, Stockbridge, and Springfield) to experience rain in another state,
Asheville, NC to visit Dad and his wife Dixie,
four trips to New York City (including the United Nations, Flushing, and the New York Comic-Con), and
my 14th consecutive San Diego Comic-Con (including sites in Utah).
Number of photos taken this year: about 582,000.
Connection Not Secure messages? Those warnings you get from your browser about this site not having secure connections worry some people. This means this site does not have SSL installed (the link is http:, not https:). That's bad if you're entering credit card numbers, passwords, or other personal information. But this site doesn't collect any personal information so SSL is not necessary. Life's good!
Limiting Text: You can turn off all of this text by clicking this link:
[Thumbnails Only]