Andrew James John Mackenzie
an historiography
Contact Me
January, 2012
February, 2012
April, 2012
June, 2012
July, 2012
August, 2012
September, 2012
October, 2012
November, 2012
December, 2012
January, 2013
February, 2013
March, 2013
April, 2013
May, 2013
June, 2013
July, 2013
August, 2013
September, 2013
October, 2013
November, 2013
December, 2013
January, 2014
February, 2014
March, 2014
April, 2014
May, 2014
June, 2014
July, 2014
August, 2014
September, 2014
October, 2014
November, 2014
December, 2014
January, 2015
February, 2015
April, 2015
May, 2015
June, 2015
July, 2015
August, 2015
September, 2015
October, 2015
November, 2015
December, 2015
January, 2016
February, 2016
April, 2016
May, 2016
June, 2016
July, 2016
August, 2016
September, 2016
October, 2016
November, 2016
December, 2016
January, 2017
March, 2017
June, 2017
Quoted Perspectives; “Rachel Carson’s Silent Spring Encounters and Legacies”
11/26/2012 3:29:39 PM

It was this author’s great pleasure to have the honour of being quoted in the latest issue of RCC Perspectives entitled “Rachel Carson’s Silent Spring: Encounters and Legacies” 2012/07 published by the Rachel Carson Center for Environment and Study (RCC),
a joint initiative of Munich's Ludwig-Maximilians-Universität and the Deutsches Museum, with the generous support of the German Federal Ministry of Education and Research.
Bird-brained; Carrier Pigeon Coding Baffles Experts
11/26/2012 2:34:38 PM

During the Second World War, security was of the utmost importance. Ensuring secure communications to and from high command was of particularly high importance and various methods were employed in so doing. Specialist codes, ciphers, encryption techniques and imaginative deployments were utilised to safeguard these sensitive messages. Code books were printed in which groups of four or five letters, representing a particular code, were arranged and referred to specific operational details. Where there was a need for added, tougher security, a one-time pad could be used in which the actual codebook was also encrypted. In 1982, the remains of a carrier pigeon were discovered only to reveal a coded message which has proved, thus far, to be unbreakable. The wartime efforts made in counterespionage and military security are still effective it seems, even after 70 years of continually advancing technology and coding expertise.

2 items total
BlogPhotosCVContact Me