Preview

Encryption in the Zimmerman Telegram

Satisfactory Essays
Open Document
Open Document
287 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Encryption in the Zimmerman Telegram
Doing some research about the "Zimmermann Telegram" (image shown below) and then answer the following questions:
1) Which technique was used in encrypting this telegram: substitution, transposition/permutation or steganography?
2) If you were an intelligence officer, what lessons you could learn from this "weak" encryption?
(There is no need to decrypt the telegram yourself. It requires lots of efforts to solve this puzzle, even though the classical encryption technique dates back to a hundred years ago.)
Image of Zimmermann Telegram: zimmermann.jpg

1. Upon doing my own research, since I do not know anything about encryption, Ibelieve the technique used in encrypting this specific telegram is substitution. I came to this reasoning because transposition involves the positioning of the letters/numbers, such as columnar positioning and includes a more complicated order; steganography is when a hidden message is part of something else, like an image, article, in a list or other form of language. Stenography is intended to not attract attention to the message itself. The specific telegram we are looking at obviously looks coded and is not covert at all, that is how I ruled out stenography. I ruled out transposition because our telegram’s codes are positioned as if each set of numbers is a word. Then the signature at the end definitely leads me to believe it is the format of a letter.

2. If I was an intelligence officer, something I could learn from this weak encryption is that if I need to send a message, I need to definitely use something more complex, because when using substitution, once someone catches on to the pattern, it will get easier and easier to code the message . Honestly, I would use stenography as much as possible.

You May Also Find These Documents Helpful

  • Best Essays

    Zimmerman Telegram Notes

    • 1034 Words
    • 5 Pages

    In the telegram Zimmermann reveals Germany’s plan to restart unrestricted submarine warfare the US territory is offered to Mexico in return for joining the German Cause.…

    • 1034 Words
    • 5 Pages
    Best Essays
  • Good Essays

    How do you crack something with 158 million million million possible combinations? Many countries have tried, but ultimately failed to accomplish their goal. The movie The Imitation Game accurately portrays the historical events of the era. It correctly informs the viewer on how the Nazis communicated using a machine called enigma, it also shows an accurate depiction of Bletchley Park and the work of cracking enigma and the things they did to ensure that nobody found out about their work, and it also accurately focuses on Alan Turing and his work on creating a machine to instantly crack messages. The Nazis used the extremely complex enigma code for communication purposes. The British worked on cracking enigma at Bletchley Park and were very secretive about their…

    • 1412 Words
    • 6 Pages
    Good Essays
  • Better Essays

    The beginning of chapter 5 discusses the importance of cryptography and the legislative issues that surround government access. The debate of whether the government should have access to all encryptions we use, ultimately giving them total ability to read all communication to help fight crime and terrorism or if that is a breach of personal space. As the text attests to, "the tension between enabling secure conduct of electronic commerce and preventing secret communication among outlaws had been in the air for a decade" (Abelson, Ledeen, and Lewis 163). Later however, the government turned to helping citizens and businesses encrypt their messages to ultimately keep more information secure through packets from the construction of a system of routers (Abelson, Ledeen, and Lewis 164). However as technology has improved, the ability to create new encryption systems is…

    • 773 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Report of the Select Committee on Intelligence United States Senate Covering the Period January 4, 2007 to January 2, 2009. U.S. Government Printing Office, Washington, D.C. March 9, 2009. http://www.gpo.gov/fdsys/pkg/CRPT-111srpt6/pdf/CRPT-111srpt6.pdf.…

    • 17193 Words
    • 69 Pages
    Powerful Essays
  • Powerful Essays

    “It [the telegraph] worked by transmitting electrical signals over a wire laid between stations” (“Morse Code and The Telegraph”). Basically, the telegraph would send electrical impulses over a long wire laid between two points connected by telegraph stations, and once the electricity hit the other station it would pick up the impulses. These electrical impulses were received in a code of dots and dashes called Morse code made by Samuel Morse (Mountjoy 32). Samuel Morse was one of the top contributors to the telegraph along with William Sturgeon and Joseph Henry (Doss 40; Mountjoy 32). Shockingly, the messages sent by telegraph were delivered almost instantly no matter how far (Mountjoy 30). Additionally, these messages were called telegrams, cablegrams, wires, and a cable because of the way they were sent (31). Before the war, the war department in the government did not have the telegraph. To communicate, they sent letters by a person on horseback (Wheeler). By the time the war started, there were about 50,000 miles of telegraph wires strung (Mountjoy 33). In 1857, the Confederates only had 107 telegraph stations compared to the 1,467 that the Union had (Allen and Allen 116). Because of the need to communicate during the war, the Union established a telegraph corps in 1661 with 1,200 operators. To gain an advantage in battle, soldiers would carry telegraph lines into battle areas and other places…

    • 1488 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    The Zimmerman Telegram

    • 394 Words
    • 2 Pages

    The Zimmerman telegram was originally sent by Authur Zimmerman, the German Foreign Secretary on to the German Ambassador in the United States, and directed to the German ambassador in Mexico, von Eckhardt. The subsequent events that instigated the release of the Zimmerman Telegram began with German’s policy of unrestricted submarine warfare. This policy allowed German U-boats to attack merchant ships without warning, in hopes of undermining the British by blocking their line of supply from North America. The United States remained neutral at the time, however in 1915, a German U-boat sunk the British ocean liner Lusitania. The ship consisted mostly of passengers, in which 159 Americans had died. The Sussex Pledge was issued as another sinking of a French ship called, ‘The Sussex,’ caused many American casualties. The US president, Woodrow Wilson became concerned and proposed this ultimatum stating that US would break off diplomatic relations if Germany did not stop sinking passenger ships. However, this did not last long as Germany was outraged over the British naval blockade that deprived thm of supplies and food. Germany abandoned the pledge and in response, the United States cut their diplomatic relations with Germany. The Zimmerman telegram was released on March 1, 1917 to divert United States away from going to war with Germany on the Allies side. The telegram listed that Germany would return to the policy of unrestricted submarine warfare, regardless of the neutrality of the US. It proposed an offer of military alliance to Mexico, in which Germany would provide financial aid and the return of their lost states, Texas, Mexico and Arizona. The telegram further advised Mexico to form an alliance with Japan to form a new Pacific and Central front, which would pose as a threat to the United States if war was declared. Germany’s plan was to use these alliances as a distraction to the United States on their Southern…

    • 394 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Zimmerman Telegram

    • 1099 Words
    • 5 Pages

    On April 2, 1917 the United States entered WWI declaring war against Germany and its allies. The deciding factor for the U.S. to enter the war is due to one document, the Zimmerman Telegram. The document was sole proof to many Americans that Germany’s intentions were not only causing harm on European soil but bringing it across the seas to American soil. It stated that Germany had no intentions on slowing down its submarine warfare to which they hoped to keep the Americans neutral, but if they failed in doing so they offered an alliance among themselves and Mexico. The understanding was that Mexico would declare war on the United States and help the Germans and in return they would receive their land they had lost to America in years past, and receive a great deal of financial support.…

    • 1099 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Espionage During Wwii

    • 1258 Words
    • 6 Pages

    The sender would type the message in plaintext (not encrypted) and the letters would be illuminated on a glass screen. With the press of each typewriter key the rotor would shift 1/26 of a revolution giving each letter a different encryption each time, which made the code so difficult to crack. Due to the complexity of the code the enigma became very useful for the Germans for radioing messages to u-boats. The cipher was finally broken when the British were able to capture some key documents from a German warship.…

    • 1258 Words
    • 6 Pages
    Better Essays
  • Good Essays

    In this paper, I will give the Department of Defense (DoD) definition of accountability and responsibility while explaining the importance of maintaining positive physical security of a Common Access Card (CAC) which is a piece of the “intelligence puzzle” and vital to Operational Security (OPSEC). The paper will give examples of how the lack of positive security of a CAC can, not only, diminish a soldier’s ability to perform daily tasks, but also limit their access to information pertinent to the mission at hand.…

    • 743 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    7) List and discuss some of the weaknesses associated with U.S. intelligence in the aftermath of September 11, 2001.…

    • 1029 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    In the essay”Mail” which was originally appeared in the American Scholar, written by Anne Fadiman, Fadiman reflects on the history of communication, from the Victorian mail system to modern electronic mail. She opened her essay with a portrait of her father, writer Clifton Fadiman, waiting for his day to really start with the arrival of the daily post. From there, she examines British postal history in nineteenth century. At her father times, mail was delivered from 10 to 12 times a day and everybody has not any others communication tools, except mail. Sending mail was a very expensive business and only made worse by the fact that the recipient and not the sender was forced to pay for it, thus putting the expense out of one's hand. Eventually, the system was completely overhauled and the so-called "penny post" was introduced in the essay. Moreover, when the recipient was forced to pay for the letter and often pay dearly, there was added pressure by an additional charge for long distance between the sender and the addressee. The hope was that revenue would increase by reducing the price and thereby increasing the volume handled. In fact, it succeeded and shifted the burden of payment from the addressee to the sender. Linking the continuous history of the postal service, Anne Fadiman looks at a new phenomenon that has become familiar to millions: Electronic mail. She recounts her own struggles with e-mail and concludes that this tool can provide human beings the level of service they need. In this essay, I find that the author has approached the subject from a personal perspective and makes the essay rich in familiar nature. She used an agreeable style and tone that was neither too formal nor too informal. Her essay are written over a long period and took longer in the gestation, giving it a depth and consistency across the topic she want to mainly talk…

    • 335 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Text messaging, also referred to as SMS messaging, is a popular form of mediated, interpersonal communication that involves sending short messages to and from individual’s cell phones through a or cellular connection to converse with individuals at anyplace and anytime all over the world. Created in 1992 by Neil Papworth, an engineer for Vodaphone, a software company in England, the first text message was sent by Papworth to an executive of the company attending a Christmas party in a separate building; the message of the first ever text message simply read, “Merry Christmas”, it wouldn’t be until the next year that texting would be available to the general public (Peritz, 2012). So at mere 23 years old, Texting is one of the youngest mediums…

    • 1150 Words
    • 5 Pages
    Good Essays
  • Best Essays

    Counter Terrorism

    • 2173 Words
    • 9 Pages

    As noted by Carera (2005), the theme of intelligence reform is still fresh in the United States, and with the creation of the Director of National Intelligence (DNI), we can appreciate how deep the concerns over intelligence failure in recent years have been. At the heart of this development lie issues of funding, structure and methodology, of which we are concerned with the last of the three. In order to address the issues surrounding the methodology of collecting intelligence for counter terrorism, we first look at definitions of the intelligence terminology referred to, along with an explanation of the current focus of the debate. We then identify how the modern terrorist threat differs from the traditional Cold War enemy, before suggesting reasons why over reliance on one form of intelligence gathering is wrong. We concentrate on a western perspective of intelligence, in particular, the experiences of the United States. This approach allows us to keep a focus on the issue without wandering into inappropriate areas of debate.…

    • 2173 Words
    • 9 Pages
    Best Essays
  • Good Essays

    Technology Synthesis Essay

    • 1003 Words
    • 5 Pages

    As technology grows the ways of communicating continue to become more effective. We have the ability to communicate through cell phones and the internet. The advancement in technology has invented the way of texting on a cell phone or using the social media on the internet. Lynne Truss, the author of The Joy of Texting, gives a great example of what texting is by saying “texting is a supremely secretive medium of communication-its like passing a note…” Using the example of passing a note is a great way of interpreting a text because no one knows what the text says and it…

    • 1003 Words
    • 5 Pages
    Good Essays
  • Good Essays

    In January 1917, the British intercepted a telegram being sent by Germany to Mexico. In the telegram Germany said if Mexico helped Germany defeat the United States then they would help Mexico get their land back from the United States. Although it is argued that the Zimmerman telegram was fake and simply a ploy by England to get the United States involved in the war, it did get the United States involved in the war.…

    • 452 Words
    • 2 Pages
    Good Essays

Related Topics