Description

Book Synopsis
In 1974, the British government admitted that its WWII secret intelligence organization had read Germany's ciphers on a massive scale. The intelligence from these decrypts influenced the Atlantic, the Eastern Front and Normandy. Why did the Germans never realize the Allies had so thoroughly penetrated their communications? As German intelligence experts conducted numerous internal investigations that all certified their ciphers' security, the Allies continued to break more ciphers and plugged their own communication leaks. How were the Allies able to so thoroughly exploit Germany's secret messages? How did they keep their tremendous success a secret? What flaws in Germany's organization allowed this counterintelligence failure and how can today's organizations learn to avoid similar disasters? This book, the first comparative study of WWII SIGINT (Signals Intelligence), analyzes the characteristics that allowed the Allies SIGINT success and that fostered the German blindness to Enigma'

Trade Review
'This book is a major addition to the existing literature on code breaking during the Second World War, and may well create a stir among historians of cryptology, especially in Europe.' Intelligence of National Security
'A fascinating book! If I was still teaching I would get my students to read it.' Professor Robert Moore, University of Liverpool
'… is well written and accessible and is indispensable to any student of wartime intelligence. For the general reader, it is an excellent introduction to the topic of wartime code breaking.' The Times Higher Education Supplement

Table of Contents
Introduction: the traitor in our midst; 1. Enigma: the development and use of a new technology; 2. Early triumph: German intelligence successes; 3. Of no mutual assistance: compartmentalization and competition in German signals intelligence; 4. The work of Station X: centralizing Allied cryptology at Bletchley Park; 5. Protecting Boniface: Allied security, disguise, and dissemination of Ultra; 6. The illusion of security: the German explanations for Allied successes; 7. Determined answers: structural problems in German signal intelligence; 8. A long-standing anxiety: Allied communications security; 9. Enter the machines: the role of science and machines in the cryptologic war; Conclusion: ending the era of security.

Whats the Time Cambridge Reading

Product form

£27.89

Includes FREE delivery

RRP £30.99 – you save £3.10 (10%)

Order before 4pm tomorrow for delivery by Fri 9 Jan 2026.

A Paperback by R. A. Ratcliff

1 in stock


    View other formats and editions of Whats the Time Cambridge Reading by R. A. Ratcliff

    Publisher: Cambridge University Press
    Publication Date: 10/6/2008 12:00:00 AM
    ISBN13: 9780521736626, 978-0521736626
    ISBN10: 0521736625

    Description

    Book Synopsis
    In 1974, the British government admitted that its WWII secret intelligence organization had read Germany's ciphers on a massive scale. The intelligence from these decrypts influenced the Atlantic, the Eastern Front and Normandy. Why did the Germans never realize the Allies had so thoroughly penetrated their communications? As German intelligence experts conducted numerous internal investigations that all certified their ciphers' security, the Allies continued to break more ciphers and plugged their own communication leaks. How were the Allies able to so thoroughly exploit Germany's secret messages? How did they keep their tremendous success a secret? What flaws in Germany's organization allowed this counterintelligence failure and how can today's organizations learn to avoid similar disasters? This book, the first comparative study of WWII SIGINT (Signals Intelligence), analyzes the characteristics that allowed the Allies SIGINT success and that fostered the German blindness to Enigma'

    Trade Review
    'This book is a major addition to the existing literature on code breaking during the Second World War, and may well create a stir among historians of cryptology, especially in Europe.' Intelligence of National Security
    'A fascinating book! If I was still teaching I would get my students to read it.' Professor Robert Moore, University of Liverpool
    '… is well written and accessible and is indispensable to any student of wartime intelligence. For the general reader, it is an excellent introduction to the topic of wartime code breaking.' The Times Higher Education Supplement

    Table of Contents
    Introduction: the traitor in our midst; 1. Enigma: the development and use of a new technology; 2. Early triumph: German intelligence successes; 3. Of no mutual assistance: compartmentalization and competition in German signals intelligence; 4. The work of Station X: centralizing Allied cryptology at Bletchley Park; 5. Protecting Boniface: Allied security, disguise, and dissemination of Ultra; 6. The illusion of security: the German explanations for Allied successes; 7. Determined answers: structural problems in German signal intelligence; 8. A long-standing anxiety: Allied communications security; 9. Enter the machines: the role of science and machines in the cryptologic war; Conclusion: ending the era of security.

    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account