Skip to content
Scan a barcode
Scan
Hardcover Delusions of Intelligence Book

ISBN: 0521855225

ISBN13: 9780521855228

Delusions of Intelligence

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Hardcover

Condition: Very Good

$12.89
Save $86.11!
List Price $99.00
Almost Gone, Only 1 Left!

Book Overview

In 1974, the British government admitted that its WWII secret intelligence organization had read Germany's ciphers on a massive scale. The intelligence from these decrypts influenced the Atlantic, the Eastern Front and Normandy. Why did the Germans never realize the Allies had so thoroughly penetrated their communications? As German intelligence experts conducted numerous internal investigations that all certified their ciphers' security, the Allies...

Customer Reviews

2 ratings

Interesting ideas in too many pages

This book describes interesting aspects of WWII intelligence. Centered on the Anglo-American and German cryptographic efforts, it's merit is to emphasize the role played by different social mentalities leading the Allies to success and the Axis to failure. The German sources are less researched than the British ones. The writing would have benefited from avoiding redundancy.

The Business of Reading Other Gentlemen's Mail

While there are many books describing WW-II code-breaking techniques (starting with the bible: David Kahn's "The Codebreakers"), few describe the operation of how it was actually done. R.A. Ratcliff remedies that omission with this thorough and highly detailed survey of how British, U.S. and German code breaking was organized as a business. He describes the way the various militaries of WW-II set up their code breaking operations and highlights how different they were--both in organization and effectiveness. The answers he provides offer exciting lessons for how to (and how not to) run any effective business organization where the output is cerebral. Here are some major take-aways from this fascinating book: * Everyone's codes were broken to some degree or another. Reading the books in this genre--particularly about the astonishing successes of the British Bletchley Park operation--one does not notice that, as good as they were in decrypting enemy code, the British and American codes were also broken by the Germans. In the German case, this led to a sense of invincibility of "We're smarter than they are" that doomed their own code security. * The Bletchley Park code breaking established the gold standard for how to let intellectuals do what intellectuals do best--think--and keep hide-bound military structure out of their way. Under the nominal control of the British military, Bletchley was run loosely enough inside the walls of the compound so that analysts of could easily seek each other out, compare notes, and spot chinks in the armor across regional and service lines. The German code-breaking effort was a model of military turf battles, with each service jealously guarding its own efforts, and breakthroughs by one group rarely communicated to others. * A key tactic--and one unrecognized by the Germans--was that of maintaining an iron-clad provenance of any code-breaking results. It was forbidden (and strictly enforced) for any Bletchley results to be recoded and retransmitted without first having the original information paraphrased. This prevented German analysts from obtaining a key to a secure code by being able to decrypt the same message content sent via a broken code. Many German codes were cracked in this manner, as, for example, the same weather forecasts were retransmitted by the different services. The secret work and great success of Bletchley Park was not revealed to the public until 1974! The final astonishing lesson of this operation was that by trusting the workers with continual cross-discipline updates, everyone was brought more fully into the big picture. This facilitated trust among the workers to help insure security. It also caused small inconsequential-seeming details to be caught, correlated, and fitted into a mass of yet incomprehensible data as a missing link that made sense of the whole thing. One cannot help thinking that this same trust-oriented operation in a single location must have been the model f
Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured