2783

Document Title Government Code and Cypher School: Signals Intelligence Passed to the Prime Minister, Messages and Correspondence
Reference HW 1/2783
Conflicts Second World War
Themes Military Intelligence and Operations, Intelligence Gathering and Surveillance
Regions Africa, Atlantic, East Asia, Europe, Mediterranean, North America
Countries England, France, Germany, Great Britain, Italy, Portugal, Singapore, Spain, United States of America
Document Type Signals Intelligence
Organisations Government Code and Cypher School
People Not Defined

Description

A file of signals intelligence reports, messages, and correspondence issued by the Government Code and Cypher School and sent by the head ('C') of the Secret Intelligence Service (MI6) to the Prime Minister, Winston Churchill. This file includes the following reports on Southern Europe: that the Allies intend to surround the mountain Massif, west of Cassino, by a pincer movement, on May 12; beach-head battle reports for May 12; that the Allies seize Castelforte, on May 12; the 71st Infantry Division appreciates that the Allied objective is to open up the Liri valley, on May 12; a battle report from the 1st Parachute Division in the Cassino area, for May 12; and on covernames for Parachute Divisions, on May 12; Naval Headlines; and from the Japanese naval attach� in Berlin, reports (ULTRA) on German defences in northern France and on the likelihood of when and where the Allied invasion might take place and an appraisal of the Allies' intelligence network, on May 8 (see also 6481).

Keywords

predicting enemy intentions, Allied strategy, Battle of Monte Cassino, military situation reports, Battle of Anzio, Operation Shingle, captured settlements, German army, counter-attacks, German airborne troops, naval intelligence, warships, naval operations, torpedo boats, shipping, transportation, evacuation, Eastern Front, Pacific War, Japanese navy, shipping losses, aerial attacks on ships, United States Navy, submarines, coastal defence, occupied France, fortifications, tactics, second front, assessing enemy strength, espionage, intelligence gathering

Cookies Notification

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Find out more.

Accept