EssaysForStudent.com - Free Essays, Term Papers & Book Notes
Search

Espionage During World War 2

By:   •  Research Paper  •  1,155 Words  •  May 20, 2010  •  1,718 Views

Page 1 of 5

Espionage During World War 2

Espionage was vital in the war effort of both the allied and axis powers during World War II. Espionage can take many different forms. Deception, leaking of false information, coding and encryption of information, sabotage, and sending spies in to gather intelligence are all were all used during the war and were all effective. Many of the turning points for the allied forces occurred due to various forms of espionage and deception. Depending on which side of the fence you’re sitting on, espionage was either a blessing or a curse.

Coding and encryption were two very important elements in the use of espionage. Enigmas were cipher machines that were based mainly on a wired code wheel. The wired code wheel, known more commonly as a rotor, would be shaped similar to a hockey puck made of non-conductive material, such as rubber, and have two sides, an input plate and an output plate and around the circumference are 26 evenly spaced electrical contacts. The 26 contacts on the input plate would be connected by wired through the body of the rotor to the 26 contacts on the output plate. An alphabet ring would then be placed around the rotors 26 contacts therefore creating a cipher alphabet.

The sender would type the message in plaintext (not encrypted) and the letters would be illuminated on a glass screen. With the press of each typewriter key the rotor would shift 1/26 of a revolution giving each letter a different encryption each time, which made the code so difficult to crack. Due to the complexity of the code the enigma became very useful for the Germans for radioing messages to u-boats. The cipher was finally broken when the British were able to capture some key documents from a German warship.

Navajo code talking became an extremely useful tool in the Marines war effort. In the beginning of the war Philip Johnston came forth and suggested an unbreakable code to the marines; that code was Navajo. Philip Johnston, WWI veteran, son of a missionary to the Navajos, who spoke the language fluently, suggested that it met all of the requirements. It was useful because it was an extremely complex unwritten language mostly spoken by the Navajos of the southwest and very few others. The marines enlisted 540 Navajos, of which an estimated 375-420 became code talkers, and the rest in other capacities. Navajo code talking took part in all of the marine’s assaults from 1942-45. Throughout the war the Japanese were able to crack the codes of the United States Army and Air Force, but they could never crack the marine’s code.

The turning point in the war in the Pacific for the U.S. was the battle at Midway. This was largely due to the American success at breaking a challenging Japanese code known as PURPLE. The US Navy acquired a copy of the machine that the Japanese used to create the PURPLE encryption, code-named magic. This enabled the Americans to decipher Japanese codes.

Within the Japanese messages was a reference to “AF”, which the Americans believed meant Midway. To confirm this the Americans created a false communication in a code which they knew the Japanese had previously broken. This deceptive message stated that Midway was running out of fresh water. Sure enough, the Japanese intercepted the message and broadcast to their fleet that AF was out of water. Assured that the US intelligence was accurately reading the Japanese code, Admiral Minitz was able to anticipate and overpower the Japanese attack on Midway.

False invasions were used commonly during the war and were also a valued form of espionage. At the Teheran conference in November 1943, the "Big Three" Franklin Roosevelt, Winston Churchill, and Joseph Stalin approved an outline of deception operations for the D-Day invasion of Europe. The allies renamed this plan Bodyguard 1. Bodyguard 1 came in 5 main deceptions: Vendetta, Ferdinand, Ironside, Zeppelin, and most importantly Fortitude. Fortitude consisted of fortitude north and south; fortitude south was the key deception, which was the invasion at the Pas de Calais, and fortitude north which was the actual D-day invasion. The use of double agents can be seen most effectively here as was by the agent “Garbo”. Garbo influenced German thinking from officials as high as Hitler himself. Fortitude south was a huge success. Hitler was so afraid of the invasion of the Pas de Calias that he kept the main concentration of his forces there leaving the beaches at Normandy mostly wide open.

Operation Mincemeat was a prime example of deception by intentionally leaking false information. The campaign in North Africa was coming to

Download as (for upgraded members)  txt (7.2 Kb)   pdf (110 Kb)   docx (13 Kb)  
Continue for 4 more pages »