{"id":13746,"date":"2014-04-02T16:51:17","date_gmt":"2014-04-02T20:51:17","guid":{"rendered":"http:\/\/www.opensource.im\/?p=13746"},"modified":"2014-04-02T16:51:17","modified_gmt":"2014-04-02T20:51:17","slug":"book-review-how-i-discovered-world-war-iis-greatest-spy","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/book-review-how-i-discovered-world-war-iis-greatest-spy.php","title":{"rendered":"Book Review: How I Discovered World War IIs Greatest Spy"},"content":{"rendered":"<p><p>benrothke (2577567) writes \"When it  comes to documenting the history of cryptography, David Kahn is  singularly one of the finest, if not the finest writers in that  domain. For anyone with an interest in the topic, Kahn's works  are read in detail and anticipated. His first book was written  almost 50 years ago: The Codebreakers  The Story of Secret  Writing; which was a comprehensive overview on the history  of cryptography. Other titles of his include Seizing the  Enigma: The Race to Break the German U-Boats Codes,  1939-1943. The Codebreakers was so good and so  groundbreaking, that some in the US intelligence community wanted  the book banned. They did not bear a grudge, as Kahn became an  NSA scholar-in-residence in the mid 1990's. With such a pedigree,  many were looking forward, including myself, to his latest book  How I Discovered World War IIs Greatest Spy and Other Stories  of Intelligence and Code. While the entire book is  fascinating, it is somewhat disingenuous, in that there is no new  material in it. Many of the articles are decades old, and some go  back to the late 1970's. From the book description and cover, one  would get the impression that this is an all new work. But it is  not until ones reads the preface, that it is detailed that the  book is simple an assemblage of collected articles.\" Keep  reading for the rest of Ben's review.                    How I Discovered World War IIs Greatest Spy and Other        Stories of Intelligence and Code                            author                    David Kahn                            pages                    469                            publisher                    Auerbach Publications                            rating                    8\/10                            reviewer                    Ben Rothke                            ISBN                    978-1466561991                            summary                    Very good collection of a large number of excellent        articles from David Kahn              For those that are long-time fans of Kahn, there is nothing new  in the book. For those that want a wide-ranging overview of  intelligence, espionage and codebreaking, the book does provide  that.  <\/p>\n<p>    The book gets its title from a 2007 article in which Kahn    tracked down whom he felt was the greatest spy of World War 2.    That was none other than Hans-Thilo Schmidt, who sold    information about the Enigma cipher machine to the French. That    information made its way to Marian Rejewski of Poland, which    lead to the ability of the Polish military to read many    Enigma-enciphered communications.  <\/p>\n<p>    An interesting question Kahn deals with is the old conspiracy    theory that President Franklin Roosevelt and many in is    administration knew about the impending attack on Pearl Harbor.    He writes that the theory is flawed for numerous reasons. Kahn    notes that the attack on Pearl Harbor succeeded because of    Japan's total secrecy about the attack. Even the Japanese    ambassador's in Washington, D.C., whose messages the US was    reading were never told of the attack.  <\/p>\n<p>    Chapter 4 from 1984 is particularly interesting which deals    with how the US viewed Germany and Japan in 1941. Kahn writes    that part of the reason the US did not anticipate a Japanese    attack was due to racist attitudes. The book notes that many    Americans viewed the Japanese as a bucktoothed and bespectacled    nation.  <\/p>\n<p>    Chapter 10 Why Germany's intelligence failed in World War II,    is one of the most interesting chapters in the book. It is from    Kahn's 1978 book Hitlers Spies: German Military    Intelligence In World War II.  <\/p>\n<p>    In the Allies vs. the Axis, the Allies were far from perfect.    Battles at Norway, Arnhem and the Bulge were met with huge    losses. But overall, the Allies enjoyed significant success in    their intelligence, much of it due to their superiority in    verbal intelligence because of their far better code-breaking.    Kahn writes that the Germans in contrast, were glaringly    inferior.  <\/p>\n<p>    Kahn writes that there were five basic factors that led to the    failure of the Germans, namely: unjustified arrogance, which    caused them to lose touch with reality; aggression, which led    to a neglect of intelligence; a power struggle within the    officer corps, which made many generals hostile to    intelligence; the authority structure of the Nazi state, which    gravely impaired its intelligence, and anti-Semitism, which    deprived German intelligence of many brains.  <\/p>\n<p>    The Germans negative attitude towards intelligence went all the    way back to World War I, when in 1914 the German Army was so    certain of success that many units left their intelligence    officers behind. Jump to 1941 and Hitler invaded Russia with no    real intelligence preparation. This arrogance, which broke    Germany's contact with reality, also prevented intelligence    from seeking to resume that contact.  <\/p>\n<p>    Other interesting stories in the book include how the US spied    on the Vatican in WW2, the great spy capers between the US and    Soviets, and more.  <\/p>\n<p>    For those that want a broad overview of the recent history of    cryptography, spying and military intelligence, How I    Discovered World War IIs Greatest Spy and Other Stories of    Intelligence and Code, is an enjoyable, albeit somewhat    disjointed summary of the topic.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/slashdot.feedsportal.com\/c\/35028\/f\/647390\/s\/38e9db4c\/sc\/38\/l\/0Lbooks0Bslashdot0Borg0Cstory0C140C0A40C0A20C1462270Cbook0Ereview0Ehow0Ei0Ediscovered0Eworld0Ewar0Eiis0Egreatest0Espy0Dutm0Isource0Frss10B0Amainlinkanon0Gutm0Imedium0Ffeed\/story01.htm\/RS=^ADAXEgZX_oOGSpcTXh.moot.yOo3Qo-\" title=\"Book Review: How I Discovered World War IIs Greatest Spy\">Book Review: How I Discovered World War IIs Greatest Spy<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> benrothke (2577567) writes \"When it comes to documenting the history of cryptography, David Kahn is singularly one of the finest, if not the finest writers in that domain. For anyone with an interest in the topic, Kahn's works are read in detail and anticipated<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-13746","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/13746"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=13746"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/13746\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=13746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=13746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=13746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}