front cover of The Comanche Code Talkers of World War II
The Comanche Code Talkers of World War II
By William C. Meadows
University of Texas Press, 2003

Among the allied troops that came ashore in Normandy on D-Day, June 6, 1944, were thirteen Comanches in the 4th Infantry Division, 4th Signal Company. Under German fire they laid communications lines and began sending messages in a form never before heard in Europe—coded Comanche. For the rest of World War II, the Comanche Code Talkers played a vital role in transmitting orders and messages in a code that was never broken by the Germans.

This book tells the full story of the Comanche Code Talkers for the first time. Drawing on interviews with all surviving members of the unit, their original training officer, and fellow soldiers, as well as military records and news accounts, William C. Meadows follows the group from their recruitment and training to their active duty in World War II and on through their postwar lives up to the present. He also provides the first comparison of Native American code talking programs, comparing the Comanche Code Talkers with their better-known Navajo counterparts in the Pacific and with other Native Americans who used their languages, coded or not, for secret communication. Meadows sets this history in a larger discussion of the development of Native American code talking in World Wars I and II, identifying two distinct forms of Native American code talking, examining the attitudes of the American military toward Native American code talkers, and assessing the complex cultural factors that led Comanche and other Native Americans to serve their country in this way.

[more]

front cover of Invisible Ink
Invisible Ink
Spycraft of the American Revolution
John A. Nagy
Westholme Publishing, 2010

The Critical Role of Espionage During the War of Independence and the Techniques Spies Used
During the American Revolution, espionage was critical to the successes and failures of both Continental and British efforts, and those employed in cloakand- dagger operations always risked death. While the most notorious episode of spying during the war—the Benedict Arnold affair—was a failure, most intelligence operations succeeded. Spycraft was no more wholly embraced than by the American commander-in-chief, George Washington. Washington relied on a vast spy network and personally designed sophisticated battle plan deceptions and counterintelligence efforts, some surprisingly modern in form. In Invisible Ink: Spycraft of the American Revolution, award-winning author John A. Nagy briefly traces the history of spy techniques from ancient China through Elizabethan England before embarking on the various techniques used by spies on both sides of the war to exchange secret information. These methods included dictionary codes, diplomatic ciphers, dead drops, hidden compartments (such as a hollowed-out bullet or a woman’s garter), and even musical notation, as well as efforts of counterintelligence, including “Black Chambers,” where postal correspondence was read by cryptologists. Throughout, the author provides examples of the various codes and ciphers employed, many of which have not been previously described. In addition, the author analyzes some of the key spy rings operating during the war, most notably the Culper ring that provided information to Washington from inside British-controlled New York City. Based on nearly two decades of primary research, including the author’s discovery of previously unrecognized spies and methods, Invisible Ink is a major contribution to the history of conflict and technology.

[more]

front cover of Passwords
Passwords
Philology, Security, Authentication
Brian Lennon
Harvard University Press, 2018

Cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages, are typically understood as separate domains of activity. But Brian Lennon contends that these two domains, both concerned with authentication of text, should be viewed as contiguous. He argues that computing’s humanistic applications are as historically important as its mathematical and technical ones. What is more, these humanistic uses, no less than cryptological ones, are marked and constrained by the priorities of security and military institutions devoted to fighting wars and decoding intelligence.

Lennon’s history encompasses the first documented techniques for the statistical analysis of text, early experiments in mechanized literary analysis, electromechanical and electronic code-breaking and machine translation, early literary data processing, the computational philology of late twentieth-century humanities computing, and early twenty-first-century digital humanities. Throughout, Passwords makes clear the continuity between cryptology and philology, showing how the same practices flourish in literary study and in conditions of war.

Lennon emphasizes the convergence of cryptology and philology in the modern digital password. Like philologists, hackers use computational methods to break open the secrets coded in text. One of their preferred tools is the dictionary, that preeminent product of the philologist’s scholarly labor, which supplies the raw material for computational processing of natural language. Thus does the historic overlap of cryptology and philology persist in an artifact of computing—passwords—that many of us use every day.

[more]

front cover of A Private War
A Private War
An American Code Officer in the Belgian Congo
Robert Laxalt
University of Nevada Press, 1998

In this vivid memoir, Laxalt recalls his service during WWII as a code officer in the Belgian Congo. In this remote jungle outpost, a secret war was being fought for control of the world’s future. Deep in the Congo lay a mine that produced a little-known substance called uranium, and for reasons no one then understood, the Allies and the Germans were struggling ferociously to control this mine and its ore. The cloth edition is a limited numbered, signed edition.

[more]

front cover of Thomas H. Begay and the Navajo Code Talkers
Thomas H. Begay and the Navajo Code Talkers
Alysa Landry
Ohio University Press, 2023

The life story of this World War II Navajo Code Talker introduces middle-grade readers to an unforgettable person and offers a close perspective on aspects of Navajo (or Diné) history and culture.

Thomas H. Begay was one of the young Navajo men who, during World War II, invented and used a secret, unbreakable communications code based on their native Diné language to help win the war in the Pacific. Although the book includes anecdotes from other code talkers, its central narrative revolves around Begay. It tells his story, from his birth near the Navajo reservation, his childhood spent herding sheep, his adolescence in federally mandated boarding schools, and ultimately, his decision to enlist in the US Marine Corps.

Alysa Landry relies heavily on interviews with Begay, who, as of this writing, is in his late nineties and one of only three surviving code talkers. Begay’s own voice and sense of humor make this book particularly significant in that it is the only Code Talker biography for young readers told from a soldier’s perspective. Begay was involved with the book every step of the way, granting Landry unlimited access to his military documents, personal photos, and oral history. Additionally, Begay’s family contributed by reading and fact-checking the manuscript. This truly is a unique collaborative project.

[more]


Send via email Share on Facebook Share on Twitter