
First we’ll take our key and put it on top of our table.

Now comes the tricky part: transposing everything. Then write your message inside, without any spaces between words.

#MESSAGE LIKKE A SPY AGENT GENERATOR#
I’ll use the handy table generator in my word processing system, but if you’re in the field in the 1940s, you’ll probably have to draw your own squared paper. Our key has 33 letters in it, so next we draw a table with 33 columns in it. If there are more than one of the same letter, give the letter farthest to the left the first number. We assign a 1 to the first letter in the alphabet, then a 2 to the second, etc. Next, we turn the five words into a numeric code. For this part, we pick five words from our poem. Received latest drop need more detonators radio crystals and winter socks stop landing field compromised stop next moon period try field south of river stop agent taylor captured sent to fresnes stop malarkey cover blown request extraction at once stop plan to sabotage ball bearing factory in two weeks If you were really behind enemy lines, you’d be encouraged to mix up the language, but for this post, we’ll stick to English. Don’t read too much into this message-I’m just making stuff up. And it would be transmitted via Morse code, so no punctuation. For use with the poem code, a message needed to be at least 200 characters long. That fought with us upon Saint Crispin’s Day. Shall think themselves accursed that they were not here,Īnd hold their manhoods cheap whiles any speaks We few, we happy few, we band of brothersįor he today that sheds his blood with me As an added bonus, Shakespeare’s copyrights have run out, so I can quote it on my blog without permission. In fact, I like it so much that my Shakespeare-quoting Englishman in Sworn Enemy and Deadly Alliance uses the band of brothers quote in both books. Agents operating in the Mediterranean area would often use novels, but the principle was the same. Agents operating in northern Europe would pick a poem and memorize it.

Should you feel like trying it out, it will be up to you to look up Morse code, secure a radio, and find someone to transmit it to.Įarly in WWII, agents with SOE (a British wartime intelligence and sabotage agency) used what was called the poem code. Pharming can be used in conjunction with, or in an independent "phishing attack" - usually in the form of an email that looks friendly but contains links to very unfriendly places.This blog post will take you through the steps of encoding a message using double transposition, just like British and American spies did in WWII. For example, TAO could duplicate a bank's website where the target enters in all his or her account information and logs in successfully, but in the process, the data also gets captured by the hackers.

In a pharming attack, a user is redirected to a website other than what he or she was trying to go to, but the person doesn't know it. Put simply, TAO is the unit of hackers trying to break into foreign computers, and one technique they can use is pharming. In the U.S., most are in a special NSA unit called TAO, or Tailored Access Operations (Many other countries have their own versions of this unit). While some hackers break into computers just out of curiosity or in an effort to score some cash, there are plenty of others who are working in the intelligence community. history came from former FBI agent Robert Hanssen, who sold secrets to the Soviet Union, and later Russia, for $1.4 million over 22 years. One of the worst intelligence leaks in U.S.
#MESSAGE LIKKE A SPY AGENT MANUAL#
Historically for American spies, the manual says, the motivation has been money.
