![]() Throughout, the author provides examples of the various codes and ciphers employed, many of which have not been previously described. These methods included dictionary codes, diplomatic ciphers, dead drops, hidden compartments (such as a hollowed-out bullet or a woman’s garter), and even musical notation, as well as efforts of counterintelligence, including “Black Chambers,” where postal correspondence was read by cryptologists. Nagy briefly traces the history of spy techniques from ancient China through Elizabethan England before embarking on the various techniques used by spies on both sides of the war to exchange secret information. In Invisible Ink: Spycraft of the American Revolution, award-winning author John A. Washington relied on a vast spy network and personally designed sophisticated battle plan deceptions and counterintelligence efforts, some surprisingly modern in form. Spycraft was no more wholly embraced than by the American commander-in-chief, George Washington. While the most notorious episode of spying during the war-the Benedict Arnold affair-was a failure, most intelligence operations succeeded. ![]() ![]() The Critical Role of Espionage During the War of Independence and the Techniques Spies Usedĭuring the American Revolution, espionage was critical to the successes and failures of both Continental and British efforts, and those employed in cloakand- dagger operations always risked death. ![]()
0 Comments
Leave a Reply. |