More on this book
Community
Kindle Notes & Highlights
To that extent the Zimmermann telegram altered the course of history … In itself the Zimmermann telegram was only a pebble on the long road of history. But a pebble can kill a Goliath, and this one killed the American illusion that we could go about our business happily separate from other nations.
So far in this chapter, the Enigma traffic has been treated as one giant communications system, but in fact there were several distinct networks. The German Army in North Africa, for instance, had its own separate network,
Some networks were harder to break into than others. The Kriegsmarine network was the hardest of all, because the German Navy operated a more sophisticated version of the Enigma machine.
The attack would commence only when a large pack of U-boats had been assembled.
Churchill would later write, “Amid
the torrent of violent events one anxiety reigned supreme. Battles might be won or lost, enterprises might succeed or miscarry, territories might be gained or quitted, but dominating all our power to carry on war, or even keep ourselves alive, lay our mastery of the ocean routes and the free approach and entry to our ports.”
Operation Ruthless,
Stuart Milner-Barry, one of the Hut 6 cryptanalysts, wrote: “I do not imagine that any war since classical times, if ever, has been fought in which one side read consistently the main military and naval intelligence of the other.”
“It saved lives. Not only Allied and Russian lives but, by shortening the war, German, Italian, and Japanese lives as well. Some people alive after World War II might not have been but for these solutions. That is the debt that the world owes to the codebreakers; that is the crowning human value of their triumphs.”
According to Admiral Chester Nimitz, the American victory at Midway “was essentially a victory of intelligence. In attempting surprise, the Japanese were themselves surprised.”
“In Navajo everything is in the memory—songs, prayers, everything. That’s the way we were raised.”
the decipherment of Linear B is generally regarded as the greatest of all archaeological decipherments.
First, pronunciation evolves with time.
Second, there are changes in grammar.
Finally, the lexicon can change dramatically. Some words are born, some die, others change their meaning.
And the way to get to the top of the heap in terms of developing original research is to be a fool, because only fools keep trying.
Unless you’re foolish enough to be continually excited, you won’t have the motivation, you won’t have the energy to carry it through. God rewards fools.
(An existence theorem shows that a particular concept is possible, but is not concerned with the details of the concept.)
I can’t show you the papers that I have in here because they still have naughty words like
TOP SECRET stamped all over them.
Law enforcers fear that the Internet coupled with cryptography will help criminals to communicate and coordinate their efforts, and they are particularly concerned about the so-called Four Horsemen of the Infocalypse—drug dealers, organized crime, terrorists and pedophiles—the groups who will benefit most from encryption.
Echelon operates according to a dictionary of suspicious words, such as “Hezbollah,” “assassin” and “Clinton,” and the system is smart enough to recognize these words in real time. Echelon
In the 1790s, when the Bill of Rights was ratified, any two people could have a private conversation-with a certainty no one in the world enjoys today-by walking a few meters down the road and looking to see no one was hiding in the bushes.
If you would like to obtain a copy of PGP, there are many sites on the Internet that offer it, and you should find them fairly easily. Probably the most reliable source is at http://www.pgpi.com/, the International PGP Home Page, from where you can download the American and international versions of PGP.

