...it's like TV Tropes, but LINKED DATA!
Reading The Enemy's Mail
- 134 statements
- 24 feature instances
- 27 referencing feature instances
Reading The Enemy's Mail | type |
FeatureClass | |
Reading The Enemy's Mail | label |
Reading The Enemy's Mail | |
Reading The Enemy's Mail | page |
ReadingTheEnemysMail | |
Reading The Enemy's Mail | comment |
When fighting a war, cold or hot, you try to anticipate what the enemy is going to do. What, however, if you already knew what they were doing? What if you were able to decipher their messages and know their plans in advance? This of course leads to problems — what if they know you know? They'll change their codes, or perhaps send misleading messages they want you to intercept. Therefore, you must be very careful- you can't, for example, just attack a ship because you know it's going somewhere- the other side might work out that the only way you would know is if you are... Of course, stuff is still subject to interpretation. Cipher machine theft is also a common plot in espionage, provided you are able to cover up said theft. Examples |
|
Reading The Enemy's Mail | fetched |
2024-03-17T06:31:18Z | |
Reading The Enemy's Mail | parsed |
2024-03-17T06:31:18Z | |
Reading The Enemy's Mail | processingComment |
Dropped link to AwesomeButImpractical: Not an Item - FEATURE | |
Reading The Enemy's Mail | processingComment |
Dropped link to BluffTheEavesdropper: Not an Item - FEATURE | |
Reading The Enemy's Mail | processingComment |
Dropped link to OlderThanTheyThink: Not an Item - FEATURE | |
Reading The Enemy's Mail | processingComment |
Dropped link to RightfulKingReturns: Not an Item - FEATURE | |
Reading The Enemy's Mail | processingComment |
Dropped link to SecretPolice: Not an Item - FEATURE | |
Reading The Enemy's Mail | processingComment |
Dropped link to TwentyYearsAfter: Not an Item - UNKNOWN | |
Reading The Enemy's Mail | processingUnknown |
TwentyYearsAfter | |
Reading The Enemy's Mail | isPartOf |
DBTropes | |
Reading The Enemy's Mail / int_1bb049f | type |
Reading The Enemy's Mail | |
Reading The Enemy's Mail / int_1bb049f | comment |
The A.I. Gang: In Robot Trouble, Ramone Korbuscek infiltrates the island disguised as a security guard, and after a while starts reading security chief Brody's mail, among other things intercepting and destroying a letter advising Brody to investigate the guard Korbuscek is disguised as. | |
Reading The Enemy's Mail / int_1bb049f | featureApplicability |
1.0 | |
Reading The Enemy's Mail / int_1bb049f | featureConfidence |
1.0 | |
The A.I. Gang | hasFeature |
Reading The Enemy's Mail / int_1bb049f | |
Reading The Enemy's Mail / int_230b3240 | type |
Reading The Enemy's Mail | |
Reading The Enemy's Mail / int_230b3240 | comment |
Jack Ryan: In The Sum of All Fears, a significant subplot involves whether or not NSA and State Department encoding methods have been cracked by the Soviets. In fact, they have, and at the end, when the US doesn't believe they've been cracked, it makes things in the climax significantly worse. Tom Clancy also likes looking into the specifics of certain cryptographic methods. Clear and Present Danger has a relatively long-winded passage on one-time pads (see below), and even The Hunt for Red October goes into some length about it. |
|
Reading The Enemy's Mail / int_230b3240 | featureApplicability |
1.0 | |
Reading The Enemy's Mail / int_230b3240 | featureConfidence |
1.0 | |
Jack Ryan | hasFeature |
Reading The Enemy's Mail / int_230b3240 | |
Reading The Enemy's Mail / int_29e77392 | type |
Reading The Enemy's Mail | |
Reading The Enemy's Mail / int_29e77392 | comment |
A sketch on Horrible Histories has Sir Francis Walsingham advertising his new postal service where your mail will be picked up, sorted, read by a spy... | |
Reading The Enemy's Mail / int_29e77392 | featureApplicability |
1.0 | |
Reading The Enemy's Mail / int_29e77392 | featureConfidence |
1.0 | |
Horrible Histories | hasFeature |
Reading The Enemy's Mail / int_29e77392 | |
Reading The Enemy's Mail / int_2e80e66f | type |
Reading The Enemy's Mail | |
Reading The Enemy's Mail / int_2e80e66f | comment |
A Diplomatic Visit: Played with. The wolves of the Packlands check incoming and outgoing mail at the borders, but it's less to read the contents and more to check for potential hazards, such as explosive or poisoned letters. In chapter 25, Twilight does get one past this security measure, but that's because Wise-Mind marked it with his seal to let it go past. | |
Reading The Enemy's Mail / int_2e80e66f | featureApplicability |
1.0 | |
Reading The Enemy's Mail / int_2e80e66f | featureConfidence |
1.0 | |
A Diplomatic Visit (Fanfic) | hasFeature |
Reading The Enemy's Mail / int_2e80e66f | |
Reading The Enemy's Mail / int_33bae31c | type |
Reading The Enemy's Mail | |
Reading The Enemy's Mail / int_33bae31c | comment |
The second act of Star Wars: Annihilation involves Republic SIS agent Theron Shan and Jedi Master Gnost-Dural infiltrating Ziost in order to steal an Imperial black cipher, the mechanism by which the Empire encrypts its sensitive communications. Stealing the cipher is the first step in the Republic's plans to take out the massively powerful Imperial battle cruiser Ascendant Spear, and - similar to stories regarding the real-life Enigma and Lorenz ciphers in WWII - this leads to a situation in which the Republic military opts not to act on foreknowledge of Imperial plans to bombard Republic planets because doing so would alert the Empire to the fact that their cipher has been compromised before the Ascendant Spear can be neutralized. | |
Reading The Enemy's Mail / int_33bae31c | featureApplicability |
1.0 | |
Reading The Enemy's Mail / int_33bae31c | featureConfidence |
1.0 | |
Star Wars: Annihilation | hasFeature |
Reading The Enemy's Mail / int_33bae31c | |
Reading The Enemy's Mail / int_468bebb0 | type |
Reading The Enemy's Mail | |
Reading The Enemy's Mail / int_468bebb0 | comment |
Discworld: Vetinari not only does this regularly in everyday life, but he expects others to do the same to him, and prepares accordingly. After all, In Monstrous Regiment, the Ankh-Morporkian representatives have the advantage of the City Watch Airborne Section, namely gnome Constable Buggy Swires and his buzzard, which lets them intercept messenger pigeons. Although not from the Borogravians, who disapprove of advanced communication technology, but from their own side's press. |
|
Reading The Enemy's Mail / int_468bebb0 | featureApplicability |
1.0 | |
Reading The Enemy's Mail / int_468bebb0 | featureConfidence |
1.0 | |
Discworld | hasFeature |
Reading The Enemy's Mail / int_468bebb0 | |
Reading The Enemy's Mail / int_475972f0 | type |
Reading The Enemy's Mail | |
Reading The Enemy's Mail / int_475972f0 | comment |
Y: The Last Man. In Paris, Alter is seen going through the mail to find the last "male". | |
Reading The Enemy's Mail / int_475972f0 | featureApplicability |
1.0 | |
Reading The Enemy's Mail / int_475972f0 | featureConfidence |
1.0 | |
Y: The Last Man (Comic Book) | hasFeature |
Reading The Enemy's Mail / int_475972f0 | |
Reading The Enemy's Mail / int_4771fb78 | type |
Reading The Enemy's Mail | |
Reading The Enemy's Mail / int_4771fb78 | comment |
One plot point in Tora! Tora! Tora! is that the US Military can decrypt the Japanese diplomatic codes. However, it is time-consuming, and very very secret. So secret, that at one point the President of the United States is removed from the list of people authorized to read the decoded messages because someone in his office improperly disposed of a decoded message. This of course only serves to add to the information delay that contributes to the Americans' failure to prepare for the impending attack. | |
Reading The Enemy's Mail / int_4771fb78 | featureApplicability |
1.0 | |
Reading The Enemy's Mail / int_4771fb78 | featureConfidence |
1.0 | |
Tora! Tora! Tora! | hasFeature |
Reading The Enemy's Mail / int_4771fb78 | |
Reading The Enemy's Mail / int_69a9c9ca | type |
Reading The Enemy's Mail | |
Reading The Enemy's Mail / int_69a9c9ca | comment |
From Russia with Love, James Bond must collect a Soviet defector from Turkey, who is bringing a cipher machine with her. He has to start a fire in the embassy to cover up the theft. | |
Reading The Enemy's Mail / int_69a9c9ca | featureApplicability |
1.0 | |
Reading The Enemy's Mail / int_69a9c9ca | featureConfidence |
1.0 | |
From Russia with Love | hasFeature |
Reading The Enemy's Mail / int_69a9c9ca | |
Reading The Enemy's Mail / int_769da46e | type |
Reading The Enemy's Mail | |
Reading The Enemy's Mail / int_769da46e | comment |
In Monstrous Regiment, the Ankh-Morporkian representatives have the advantage of the City Watch Airborne Section, namely gnome Constable Buggy Swires and his buzzard, which lets them intercept messenger pigeons. Although not from the Borogravians, who disapprove of advanced communication technology, but from their own side's press. | |
Reading The Enemy's Mail / int_769da46e | featureApplicability |
1.0 | |
Reading The Enemy's Mail / int_769da46e | featureConfidence |
1.0 | |
Monstrous Regiment | hasFeature |
Reading The Enemy's Mail / int_769da46e | |
Reading The Enemy's Mail / int_76c01b30 | type |
Reading The Enemy's Mail | |
Reading The Enemy's Mail / int_76c01b30 | comment |
In V for Vendetta, V hacks Fate, the government's central supercomputer (and, incidentally, the love of the villain's life). He uses it to access both their surveillance systems and the freaking postal system in order to bring down the corrupt regime. Unlike the film, the postal system stuff was just to flip the bird at the establishment by showing them he was not only in their systems, but able to control them. | |
Reading The Enemy's Mail / int_76c01b30 | featureApplicability |
1.0 | |
Reading The Enemy's Mail / int_76c01b30 | featureConfidence |
1.0 | |
V for Vendetta (Comic Book) | hasFeature |
Reading The Enemy's Mail / int_76c01b30 | |
Reading The Enemy's Mail / int_85b855e2 | type |
Reading The Enemy's Mail | |
Reading The Enemy's Mail / int_85b855e2 | comment |
In The Thrawn Trilogy, eventually the New Republic figures out that Thrawn is aware of all the plans they made in the Imperial Palace on Coruscant, courtesy of a source known only as "Delta Source." They spend a lot of effort trying to figure out who the spy is. Only after a slicer cracks Delta Source's transmission encryption on his own time for fun do they figure out that it was a sophisticated listening system Hidden in Plain Sight. | |
Reading The Enemy's Mail / int_85b855e2 | featureApplicability |
1.0 | |
Reading The Enemy's Mail / int_85b855e2 | featureConfidence |
1.0 | |
The Thrawn Trilogy | hasFeature |
Reading The Enemy's Mail / int_85b855e2 | |
Reading The Enemy's Mail / int_90d45233 | type |
Reading The Enemy's Mail | |
Reading The Enemy's Mail / int_90d45233 | comment |
The Underland Chronicles: Underlanders of all species have a system similar to Morse code to send messages. The plot of Gregor and the Code of Claw revolves around breaking the titular code in which the gnawers write theirs. | |
Reading The Enemy's Mail / int_90d45233 | featureApplicability |
1.0 | |
Reading The Enemy's Mail / int_90d45233 | featureConfidence |
1.0 | |
The Underland Chronicles | hasFeature |
Reading The Enemy's Mail / int_90d45233 | |
Reading The Enemy's Mail / int_90f42a9b | type |
Reading The Enemy's Mail | |
Reading The Enemy's Mail / int_90f42a9b | comment |
The Wheel of Time: Something Egwene and the other rebel Aes Sedai try to do while Dreaming with regards to Elaida's mail. | |
Reading The Enemy's Mail / int_90f42a9b | featureApplicability |
1.0 | |
Reading The Enemy's Mail / int_90f42a9b | featureConfidence |
1.0 | |
The Wheel of Time | hasFeature |
Reading The Enemy's Mail / int_90f42a9b | |
Reading The Enemy's Mail / int_9b1636a1 | type |
Reading The Enemy's Mail | |
Reading The Enemy's Mail / int_9b1636a1 | comment |
The Imitation Game is about the British efforts to crack the German ENIGMA system. Even though they had captured machines and knew how they worked, the British still needed to determine the daily settings, and used mathematics and early computers to find solutions. | |
Reading The Enemy's Mail / int_9b1636a1 | featureApplicability |
1.0 | |
Reading The Enemy's Mail / int_9b1636a1 | featureConfidence |
1.0 | |
The Imitation Game | hasFeature |
Reading The Enemy's Mail / int_9b1636a1 | |
Reading The Enemy's Mail / int_b30ae4db | type |
Reading The Enemy's Mail | |
Reading The Enemy's Mail / int_b30ae4db | comment |
Game of Thrones: Roose reads the exchange of messages between Cersei and Littlefinger. A wise move, considering that those two might be the most incredibly untrustworthy people to have ever existed. | |
Reading The Enemy's Mail / int_b30ae4db | featureApplicability |
1.0 | |
Reading The Enemy's Mail / int_b30ae4db | featureConfidence |
1.0 | |
Game of Thrones | hasFeature |
Reading The Enemy's Mail / int_b30ae4db | |
Reading The Enemy's Mail / int_b3708bb4 | type |
Reading The Enemy's Mail | |
Reading The Enemy's Mail / int_b3708bb4 | comment |
The main reason for wanting to attack the titular submarine in U571 is to capture the submarine's Enigma machine and the associated code documents. This is Very Loosely Based on a True Story: the capture of U-110 in May 1941 with her Enigma machine and all her code documents by a British destroyer was a critical breakthrough in British penetration of the German Navy's ciphers. | |
Reading The Enemy's Mail / int_b3708bb4 | featureApplicability |
1.0 | |
Reading The Enemy's Mail / int_b3708bb4 | featureConfidence |
1.0 | |
U-571 | hasFeature |
Reading The Enemy's Mail / int_b3708bb4 | |
Reading The Enemy's Mail / int_b389ac77 | type |
Reading The Enemy's Mail | |
Reading The Enemy's Mail / int_b389ac77 | comment |
Most of Cryptonomicon (the 1940s bits, at least) is based around this. As with the real life section below, the Allies go to incredible amounts of effort to engineer plausible explanations for them having the information gained from intercepting enemy signals. | |
Reading The Enemy's Mail / int_b389ac77 | featureApplicability |
1.0 | |
Reading The Enemy's Mail / int_b389ac77 | featureConfidence |
1.0 | |
Cryptonomicon | hasFeature |
Reading The Enemy's Mail / int_b389ac77 | |
Reading The Enemy's Mail / int_b3e0e2e0 | type |
Reading The Enemy's Mail | |
Reading The Enemy's Mail / int_b3e0e2e0 | comment |
In The Sum of All Fears, a significant subplot involves whether or not NSA and State Department encoding methods have been cracked by the Soviets. In fact, they have, and at the end, when the US doesn't believe they've been cracked, it makes things in the climax significantly worse. | |
Reading The Enemy's Mail / int_b3e0e2e0 | featureApplicability |
1.0 | |
Reading The Enemy's Mail / int_b3e0e2e0 | featureConfidence |
1.0 | |
The Sum of All Fears | hasFeature |
Reading The Enemy's Mail / int_b3e0e2e0 | |
Reading The Enemy's Mail / int_c0add399 | type |
Reading The Enemy's Mail | |
Reading The Enemy's Mail / int_c0add399 | comment |
In The Third World War, the US had cracked the Atrophos cipher being used by Cuba. In the early stages of the war, the Cubans send a long message stating that they cannot attack the US directly, but they might be able to do some small sabotage operations. While the Soviet cipher clerk is manually decrypting the message and wishing that the long-winded platitudes that begin it are done with, the Americans have broken the whole message. The Soviets interpret the message correctly (You cowards! You're wimping out like Italy in 1939), the Americans don't (They're going to attack us!) and launch air strikes on Cuba. It takes the rest of Latin America to stop a full-scale invasion. | |
Reading The Enemy's Mail / int_c0add399 | featureApplicability |
1.0 | |
Reading The Enemy's Mail / int_c0add399 | featureConfidence |
1.0 | |
The Third World War | hasFeature |
Reading The Enemy's Mail / int_c0add399 | |
Reading The Enemy's Mail / int_c6f7e804 | type |
Reading The Enemy's Mail | |
Reading The Enemy's Mail / int_c6f7e804 | comment |
Blake's 7. Episodes like "Seek-Locate-Destroy" and "Killer" involved the theft of a component that would allow Blake to crack Federation codes, no doubt inspired by the revelation just a few years previously about the war-winning importance of ULTRA (see Real Life). Later the rebels would get hold of a Magical Computer called Orac who could do this as a matter of course. | |
Reading The Enemy's Mail / int_c6f7e804 | featureApplicability |
1.0 | |
Reading The Enemy's Mail / int_c6f7e804 | featureConfidence |
1.0 | |
Blake's 7 | hasFeature |
Reading The Enemy's Mail / int_c6f7e804 | |
Reading The Enemy's Mail / int_cb28b938 | type |
Reading The Enemy's Mail | |
Reading The Enemy's Mail / int_cb28b938 | comment |
Charité at War: Professor Jung, a French medic who's conscripted to serve in a Berlin hospital in Nazi Germany, is not happy that his letters to and from home are controlled by censorship. It's not just enemy's mail, though — Otto is a German soldier, but he has to be careful with what he writes, too. | |
Reading The Enemy's Mail / int_cb28b938 | featureApplicability |
1.0 | |
Reading The Enemy's Mail / int_cb28b938 | featureConfidence |
1.0 | |
Charité at War | hasFeature |
Reading The Enemy's Mail / int_cb28b938 | |
Reading The Enemy's Mail / int_d581d078 | type |
Reading The Enemy's Mail | |
Reading The Enemy's Mail / int_d581d078 | comment |
The Americans used a low-tech solution in World War II by using Navajo code-talkers, nicknamed wind-talkers, not to be confused with the fictional account in the movie Windtalkers. They didn't just speak in the Navajo language (which the Japanese were completely clueless to figure out anyway), but also spoke in code in the language. It was basically double encryption. The British apparently made similar use of Welsh. Older Than They Think: in the previous war, Italian communications were handled in Sardinian Language (Sardu): regarded by many scholars to be the living language closest to Classical Latin, it is not an Italian dialect nor by any means related to Italian. In Italy, it is notoriously known for its difficulty to be actually understood by anyone not speaking it (that is, Italians and many Sardinians themselves, being an endangered language), unless spoken very slowly. And to be sure it couldn't be understood, the code-talkers weren't Italians speaking the literary version of Sardinian (that may have been understood), but actual Sardinians speaking their native dialects (which, even though they are all pretty much mutually intelligible, vary greatly the pronunciation of words). |
|
Reading The Enemy's Mail / int_d581d078 | featureApplicability |
1.0 | |
Reading The Enemy's Mail / int_d581d078 | featureConfidence |
1.0 | |
Windtalkers | hasFeature |
Reading The Enemy's Mail / int_d581d078 | |
Reading The Enemy's Mail / int_eb3f769d | type |
Reading The Enemy's Mail | |
Reading The Enemy's Mail / int_eb3f769d | comment |
Stephen Maturin of the Aubrey-Maturin series does this frequently. He even carefully edits the messages before passing them along to spread misinformation in enemy lines. While his friend Jack Aubrey found the operation very dishonorable, Stephen once mentioned that he has no qualms about violating an entire mail coach if it wins them the war. | |
Reading The Enemy's Mail / int_eb3f769d | featureApplicability |
1.0 | |
Reading The Enemy's Mail / int_eb3f769d | featureConfidence |
1.0 | |
Aubrey-Maturin | hasFeature |
Reading The Enemy's Mail / int_eb3f769d |
The following is a list of statements referring to the current page from other pages.
Copyright of DBTropes.org wrapper 2009-2013 DFKI Knowledge Management. Imprint. - Thanks to Bakken&Baeck for hosting. Contact.
Copyright of data TVTropes.org contributors under Creative Commons Attribution-Share Alike 3.0 Unported License.
Copyright of data TVTropes.org contributors under Creative Commons Attribution-Share Alike 3.0 Unported License.