Extract a lot of that themselves, thats not a good way of subsidizing homeownership. Christopher hitch ince, ann applebomb, and gretchen are a few of the engaging stories on cspans at eight, now at your Favorite Book seller. Each week, american artifacts takes viewers to archives, museums, and Historic Sites around the country. Next we visit the National Crypt logic museum located just north f washington, d. C. On the campus of the National Security agency to learn about the making and breaking of secret codes and their role in u. S. History. First of the twopart programs. The purpose of this museum is to people understand the role cryptology uses since the beginning of time. Where find the examples the ability to get information from your adversary and protect critical. M has been not tonight survive nation states but to armies and a host f other organizations and entities. Say cryptology is the worlds third or fourth oldest profession. Talk about the others. We have these artifacts that to the 1800s. We have artifacts to speak to 90s. There are any number of from world stories war ii which in many respects is age. Golden but we do try to cover a great ground to help people discipline. He johan and it dates from 1518. Extremely rare text and throughout time, the individuals ones who ran the ational Security Agency but anything they could get their hands on that spoke to the art and science of the discipline. That cryptology has been with us for a very, very long time. When we talk about the united its important to note that the making and breaking of has been a part of america even before we gained our independence. Our most precious artifacts is referred to as the device. On cipher now, truth in advertising, its that we rtant to note dont have any definitive conclusive evidence that this device belonged to thomas jefferson. But there are some interesting facts about it. One, this device was found in an antique store very close to mon cello. It appears to have the ability english. R french and we know jefferson was ambassador to france and probably the most is, theres a t drawing of the device very imilar to this in jeffersons private papers. Sure o, we cant say for that jefferson owned it. What we can say is this is an example of how people sed cryptology in the 19th century. So the way the device worked is, there were a series of leather the sequence would be prearranged. Both the sender and the receiver would know. You would put the bar across the top and you would line up the of the xt on one side bar and you write the ciphered text on the other. You put that in an envelope or a send that u would off, either with a courier, or aybe a ship across the atlantic. The good news is, if it was picked up by pirates or bandits or fell into the hands of shouldnt have it, if they didnt have the device ith the disks arranged in the proper sequence, they would not be able to understand what the said. E and again, were working with the wonderful cspan network is a model of the device. You can see the bar. The message welcome cspan to the museum. The ay this works, this is plain text. You can choose either of these lines and write the ciphered individual on the other end knew which line you were going to use, you could iftect the message and again it fell into the hands of someone who shouldnt have it, they dont have this or they prearrangement of the disks, theyre not going to find out what the message says. An important thing to know hat today when we conduct conversations, we do lightning speed. Were fundamentally doing the same thing. A receiver, a set sequence. A key. They both know it. Nd that way if the information does fall into the wrong hands, its not going to be used against you because the individuals are not going to it means. Jefferson to the cipher disk, we do like to talk bout times in history where cryptology made a real difference. In the beginning where our nation is fighting for our the making and breaking of codes played a critical role. The example that i always like about is the fact that washingtons decision to move at a rapid clip to trap corn with alis was series of ue to a intercepted messages. Dispatches that were encrypted. Washington had individuals on his staff able to decrypt those messages. The information, they were able to discern that he was very difficult position. And if he could not be resupplied by the british fleet, a good chance that they could trap it. Thats exactly what happened. Known what co cornwallis was planning to do, likely washington would continue the attack on new york and never made the tactical move. But because he knew what was able do, he teamed one the french. The french did their job and and the british fleet away the American Army was able to prevail at yorktown. Beginning of our republic, the making and breaking of codes has played a role. Cal now the making and breaking of codes was a critical part of our beginning. The but it has played a role in all of the major wars that our fought in. Not the least of which was the the etween the states, civil war. The civil war came at a time of there were any number new inventions. Robably from the perspective was the telegraph. You can send messages over long and the first time the commanders could communicate with their generals and other leaders in the field. Telegraph oblem is, a is a fixed physical entity. Is you can intercept messages off of it. You have to have the ability to encrypt them. Rare union code book. T contains a system that was used at the battle of chancellorville. You can see its detailed and it to understand how important it was to be able to send messages that, again, if fall into the hands of the enemy, they would be meaningless. Wartime, making braengding of codes is critical. Works a reel that similarly to the jefferson cipher device, so both the union were using ederacy crypt cryptology to try to achieve their goals. Other , a telegraph and technologies were being developed many times in battle, what ve to go to i guess you would call analog methods, of the most effective ways was the wigwag system developed myer, the leader and the person who started the signal. This is a battle flag. One lieve this is only other in assistance. When someone asserted itself in he wigwag system, its moving the flag back and forth in certain movements to denote alphabet. The it can be used in line of sight over great distances. The soldiers for involve in this activity, oftentimes they had to do this were quite clear to the enemy. So they would come under fire. Be very ot only had to intelligent, but they also had brave. If an individual involve in the peration distinguished themselves. They would take the rectangle off their flag, that you can see clearly here. A german enigma machine. We have 40 in our collection. We have five you can operate. Many people come from around the United States and from around not only because they want to look at an enigma machine that you can do in a lot can operate t you this device. Were going do that in just a second. The germans adopted the device the main battlefield tactical largely tions device, it had an amazing ability. It can produce permations 10 to the 114th power. More than all of the stars in the universe, it made impossible to do what we call a brute force operation. Its way too much information to go through. Because of that, the germans believed that you could never get to the point where you could find the key. The key, t find youre not going to be breaking messages. The cryptology power comes from three rotors that make up the device. Here are three points on each rotor. If you hit a keeton key board, the current flows in to the plug where it o the rotors goes through each one. Hit a reflector, come back the plug board, and again, light up here. This is a very versatile machine. Portable. So really, you can take this anywhere. You can have it in a defensive fighting position. Can have it in the headquarters area. One of the critical parts of key entire process was the list, but you can see over here in this exhibit case. Months list had three worth of rotor settings and it was disseminated every four by german couriers. If you didnt have the key list, you werent going to be able to settings correct if you didnt have the ability to get the rotor settings, you could not with everyone else in the network. A quick demonstration here to show you. To use vivid imaginations. Were going to prep tend its march 24, 1942. War. Orld is at we look at our key list. And the rotor setting that were oing to have just to make it simple is 111. Message were going to send are now in to where we is stutgard to usa. It willnd it out clear, get there. But it will fall into the hands people umber of el frequency. Going to hit the u, then theres the s and the a and theres the c. What we would send to stuttgard. Sing our imaginations again, were no longer in berlin, were in stuttgard. Bit later in the day. However, our rotor setting has not changed. The message back. My machine is set to 010104. For the t the setting day. Im going to go back. And now on stutgard, im going decrypt the message. The f, the u, going to hit the y, theres the s. And then finally, the c. And theres the a. O you can see it works very, very nicely. A lot of people are not impressed by this. Me a little orphan annie ring. The 114th 10 to power. Thats why the germans had every reason to believe it was a encryption device. Thankfully for the world, the to break it. Ble first country to make poland. S was hand select e to mathematicians. D they began an earnest effort to enigma code. If youre going up three times the 114th power, you have a tough row to hoe. Give up. t they got some help. The gentleman who worked in the ureau by the name of hans schmitt. He had been a wealthy man. Businesses of his because of the great depression. He was destitute. Able to get him a job as a humble government clerk at the cipher bureau. Decided to do something to enhance his financial situation. Secret service. He said ive got secrets about like to sell. D how much money do you give me . Sound in french francs. Schmitt was more than open to that proposal. Made. Change was and bertrand, because he talked to the polls before, forwarded the information to them. A slow process. Are ableolls over time to discern how the process works break enigma messages. To you do that, you have turn it to a realtime operation o develop realtime intelligence. They didnt get a chance to do that. Now after two years, they were place make it to a called bletchley park. The code making and code up by g headquarters set winston churchill. Allen churing comes up with an approach that he referred to as i should say assumed text. Were able to find radio stations in the third reich and occupied europe that sent out day at the same time, enigma messages at the same time. The nature of the mission of the radio stations, guess the ble to first station 26 on the coast of france comes on the air every 7 00 a. M. And the first sentence off of tower is the weather today off of the coast of france will be why, it was concerned with reports to weather the german ships and boats at sea. You get a head start. You can begin the process. Design a s able to marvelous device. Its a giant calculating a guessing machine. It helps to sort out the other patterns and accept kwenss. Sequences. I dont want this to sound easy. It was not. It took eight to 12 hours. Analysts and t linguists and many, many more personnel. Bottom line. By the end of the day, with some able to s, they were turn to the rotor settings ntercepts ing messages all day long. In some sense, they were able to discern the future tactical the german f military. Its a critical breakthrough. Great britainthat was standing alone against the nazi onslaught. Britain was a very challenge for the royal air force. The ability to discern the Tactical Operations of the erman military was a huge advantage. Ne of the methods that the germans used with great effect was to conduct the bombing raids at night. If you read anything about the litz, it was a incredibly difficult time. Huge portions of Great Britain are destroyed. Lives are being lost. Indeed when the germans bothered knight, it was more effective. Pilots and fewer planes. One of the systems they used was radio beam end a from the airfield, germany, france, somewhere in occupied europe to the target in the uk. They would lock on to the beam. Able to deposit their bombs, lock on the the eam and fly back to their air base. This proved to be very effective. Enigma code was broken, the british knowing what they were, they were intercepting the beams because intercepting messages, they were able to use their term, then the beams. Powerful transmitters on the coast. They were able to move the beams eventually bombers armaments on open cow pastures rather than military and population centers. That is an early and permanent example of information warfare. Shows you what to do when you know what your adversary is going to do before they do it. Bravery of the british people and the effectiveness of their armed forces that played a huge role helping Great Britain to survive. You can make the case that the read enigma messages was key. Would like to tell you that the story ends here. Its a cat and mouse game. Noticed a change and began to make sure ry that enigma was secure. As indeed enigma was as they wanted it to be. The enigmas out of the ships and submarines that he ontrolled and just so could sleep better at night, he anythings install a permanent fourth row door. Based on three rotor traffic, not four. Lost a ans the allieds track of the german subs. He german submarine commanders referred to the months as the happen pip time. They sent over 200 ships off of the coast of the United States alone. The u. S. Navy is growing frantic because the convoys are being a far too regular basis. They sign the contract with National Cash register out ofday ton, ohio to develop a device similar to the ones that the solve the oped to four rotor problem. One of the here is most precious artifacts. There were 100 of these built ohio. Ton, they were moved to a facility nebraska avenue. That facility is by the department of Homeland Security years belonged to the United States navy. Now like the british device, it clues in ant to get the morning and once you were able to obtain those, you could the process. This is basically like the device, a giant calculating machine, a guessing machine, that helps you with a to winnow down and winnow down and finally get in his case the four rotor settings. Its not easy. 12 a long time, eight to hours, sometimes longer. A lot of work. Some linguists, but with some exceptions, they were able to rotor settings. With that, they could do one or two things. Out tactical nd units to destroy the wolf packs because they knew the location. At times the convoys were sea. And in those cases, they could radio the captains to help them danger lay. Here the many historians believed that this project helped to shorten a year. By basically because it helped to atlantic. The north other historians disagree with that. Ut there is consensus on one critical point. It saved thousands lives. Ed in 1974, over three decades, the world and the e germans, guess what, we broke the enigma code as early as 1940. When that was announced, there were any number of individuals living in germany who had been with and responsible for the enigma program. And when they found out, they absolutely and utterly stunned. They had believed that it was a pointt machine up to that in time. It was a wellkept secret. Always be careful of the word impossible. If someone tells you something impossible, and theres a lot riding on it, you need to check it out. You have to be careful of your assumptions. Dont ume too much, you investigate what you believe to be the truth, you can meet with devastating consequences. Believed the machine we demonstrated was perfect. It could never be broken. Case. As not the and thankfully for the rest of the world, they would pay a high price. Out your to check assumptions. To look at another very interesting and impressive story world war ii era. Row let as fer to the babe ruth of cryptology in the 21st century. E was not good in the offense, breaking codes, but good at making devices to protect critical information. This is one of the most impressive. And it really in many ways is antithesis of the enigma machine we saw earlier. Machine was el elect ro mechanical, rotor driven, and hought by the germans to be perfect because it could produce untold permentations. Lies at the , opposite end of the spectrum. Ecause its rotor driven, its electromechanical, but theres not one recorded instance, not of this machine ever being compromised. Were going to talk a little bit about why. In designing it, took a look at the enigma. Wanted the benchmark. That the enigma was an amazing device, but because of the regularity of the stepping motion of the machine, vulnerabilities. So he designed this in a way as avoid them as much as possible. O there are three rotor, sometimes four, in the enigma device. Rowlet included 15 rotors in the segava machine. They fit to the basket and the basket recesses to the device. Board, hit a keeton key some of the rotors turn forward, some reverse, some of them do not move at all. Its the sum total of the movement of those rotors that ives the machine its amazing power. What youre trying to do when design a cryptology device, you want to get it as perfect as you can, this machine does a good job of that. Know from looking at german intelligence documents they crack this machine. They gave up and said well never be able to do it. We have to get the information ways. Er when i became curator in 2006, i was of the opinion that humans could design a cryptology system, humans can break it. That. L believe but i have to tell you, this is the argument to the contrary. Perfectthis machine was from the time it was put online and it was perfect from the time it was taken off line. In fact, the only reason it was removed from service was other achines were getting a little bit faster, the computer age was dawning. Frank rowlet on the day he was asked, what are you most proud of. Career. A storied and he replied, i dont have to think about that much, fellas. Of the fact that encryption perfect machine. If you look at this exhibit, we can ask a question, why did the ii. Ted states win world war well . As noted, they won it because rave soldiers, sailors, marines, were able to go off and stand in harms way and carry the fight to the enemy. Number of ck planes and guns and tanks to force needed. With the exceptions, we were strategic into the indications of our adversaries and gain Critical Knowledge of intentions. Because of segava, they tried to us, with some exceptions, they failed. This was a major, major reason able to be es were victorious in the conflict. This was the first of a twopart program from our visit National Cryptology museum. You can watch this and other at ican artifacts programs any time by visiting our spa e, c cspan. Org history. Soldiers , british encountered troops outside of outside of washington, d. C. The forces marched to the city and burned down the white house the u. S. Capitol. You can find more about the burning of washington in the war of 1812 this thursday at an smithsonian by the associates. The live coverage starts at 6 45 p. M. Eastern. The burning of washington next saturday, august 3, as we take you live to bladensburg Waterfront Park for a Panel Discussion of the events ago. 00 years