Search/Recent Changes
DBTropes
...it's like TV Tropes, but LINKED DATA!

Reading The Enemy's Mail

 Reading The Enemy's Mail
type
FeatureClass
 Reading The Enemy's Mail
label
Reading The Enemy's Mail
 Reading The Enemy's Mail
page
ReadingTheEnemysMail
 Reading The Enemy's Mail
comment
When fighting a war, cold or hot, you try to anticipate what the enemy is going to do. What, however, if you already knew what they were doing? What if you were able to decipher their messages and know their plans in advance?
This of course leads to problems — what if they know you know? They'll change their codes, or perhaps send misleading messages they want you to intercept. Therefore, you must be very careful- you can't, for example, just attack a ship because you know it's going somewhere- the other side might work out that the only way you would know is if you are...
Of course, stuff is still subject to interpretation.
Cipher machine theft is also a common plot in espionage, provided you are able to cover up said theft.

Examples
 Reading The Enemy's Mail
fetched
2024-03-17T06:31:18Z
 Reading The Enemy's Mail
parsed
2024-03-17T06:31:18Z
 Reading The Enemy's Mail
processingComment
Dropped link to AwesomeButImpractical: Not an Item - FEATURE
 Reading The Enemy's Mail
processingComment
Dropped link to BluffTheEavesdropper: Not an Item - FEATURE
 Reading The Enemy's Mail
processingComment
Dropped link to OlderThanTheyThink: Not an Item - FEATURE
 Reading The Enemy's Mail
processingComment
Dropped link to RightfulKingReturns: Not an Item - FEATURE
 Reading The Enemy's Mail
processingComment
Dropped link to SecretPolice: Not an Item - FEATURE
 Reading The Enemy's Mail
processingComment
Dropped link to TwentyYearsAfter: Not an Item - UNKNOWN
 Reading The Enemy's Mail
processingUnknown
TwentyYearsAfter
 Reading The Enemy's Mail
isPartOf
DBTropes
 Reading The Enemy's Mail / int_1bb049f
type
Reading The Enemy's Mail
 Reading The Enemy's Mail / int_1bb049f
comment
The A.I. Gang: In Robot Trouble, Ramone Korbuscek infiltrates the island disguised as a security guard, and after a while starts reading security chief Brody's mail, among other things intercepting and destroying a letter advising Brody to investigate the guard Korbuscek is disguised as.
 Reading The Enemy's Mail / int_1bb049f
featureApplicability
1.0
 Reading The Enemy's Mail / int_1bb049f
featureConfidence
1.0
 The A.I. Gang
hasFeature
Reading The Enemy's Mail / int_1bb049f
 Reading The Enemy's Mail / int_230b3240
type
Reading The Enemy's Mail
 Reading The Enemy's Mail / int_230b3240
comment
Jack Ryan:
In The Sum of All Fears, a significant subplot involves whether or not NSA and State Department encoding methods have been cracked by the Soviets. In fact, they have, and at the end, when the US doesn't believe they've been cracked, it makes things in the climax significantly worse.
Tom Clancy also likes looking into the specifics of certain cryptographic methods. Clear and Present Danger has a relatively long-winded passage on one-time pads (see below), and even The Hunt for Red October goes into some length about it.
 Reading The Enemy's Mail / int_230b3240
featureApplicability
1.0
 Reading The Enemy's Mail / int_230b3240
featureConfidence
1.0
 Jack Ryan
hasFeature
Reading The Enemy's Mail / int_230b3240
 Reading The Enemy's Mail / int_29e77392
type
Reading The Enemy's Mail
 Reading The Enemy's Mail / int_29e77392
comment
A sketch on Horrible Histories has Sir Francis Walsingham advertising his new postal service where your mail will be picked up, sorted, read by a spy...
 Reading The Enemy's Mail / int_29e77392
featureApplicability
1.0
 Reading The Enemy's Mail / int_29e77392
featureConfidence
1.0
 Horrible Histories
hasFeature
Reading The Enemy's Mail / int_29e77392
 Reading The Enemy's Mail / int_2e80e66f
type
Reading The Enemy's Mail
 Reading The Enemy's Mail / int_2e80e66f
comment
A Diplomatic Visit: Played with. The wolves of the Packlands check incoming and outgoing mail at the borders, but it's less to read the contents and more to check for potential hazards, such as explosive or poisoned letters. In chapter 25, Twilight does get one past this security measure, but that's because Wise-Mind marked it with his seal to let it go past.
 Reading The Enemy's Mail / int_2e80e66f
featureApplicability
1.0
 Reading The Enemy's Mail / int_2e80e66f
featureConfidence
1.0
 A Diplomatic Visit (Fanfic)
hasFeature
Reading The Enemy's Mail / int_2e80e66f
 Reading The Enemy's Mail / int_33bae31c
type
Reading The Enemy's Mail
 Reading The Enemy's Mail / int_33bae31c
comment
The second act of Star Wars: Annihilation involves Republic SIS agent Theron Shan and Jedi Master Gnost-Dural infiltrating Ziost in order to steal an Imperial black cipher, the mechanism by which the Empire encrypts its sensitive communications. Stealing the cipher is the first step in the Republic's plans to take out the massively powerful Imperial battle cruiser Ascendant Spear, and - similar to stories regarding the real-life Enigma and Lorenz ciphers in WWII - this leads to a situation in which the Republic military opts not to act on foreknowledge of Imperial plans to bombard Republic planets because doing so would alert the Empire to the fact that their cipher has been compromised before the Ascendant Spear can be neutralized.
 Reading The Enemy's Mail / int_33bae31c
featureApplicability
1.0
 Reading The Enemy's Mail / int_33bae31c
featureConfidence
1.0
 Star Wars: Annihilation
hasFeature
Reading The Enemy's Mail / int_33bae31c
 Reading The Enemy's Mail / int_468bebb0
type
Reading The Enemy's Mail
 Reading The Enemy's Mail / int_468bebb0
comment
Discworld:
Vetinari not only does this regularly in everyday life, but he expects others to do the same to him, and prepares accordingly. After all,
In Monstrous Regiment, the Ankh-Morporkian representatives have the advantage of the City Watch Airborne Section, namely gnome Constable Buggy Swires and his buzzard, which lets them intercept messenger pigeons. Although not from the Borogravians, who disapprove of advanced communication technology, but from their own side's press.
 Reading The Enemy's Mail / int_468bebb0
featureApplicability
1.0
 Reading The Enemy's Mail / int_468bebb0
featureConfidence
1.0
 Discworld
hasFeature
Reading The Enemy's Mail / int_468bebb0
 Reading The Enemy's Mail / int_475972f0
type
Reading The Enemy's Mail
 Reading The Enemy's Mail / int_475972f0
comment
Y: The Last Man. In Paris, Alter is seen going through the mail to find the last "male".
 Reading The Enemy's Mail / int_475972f0
featureApplicability
1.0
 Reading The Enemy's Mail / int_475972f0
featureConfidence
1.0
 Y: The Last Man (Comic Book)
hasFeature
Reading The Enemy's Mail / int_475972f0
 Reading The Enemy's Mail / int_4771fb78
type
Reading The Enemy's Mail
 Reading The Enemy's Mail / int_4771fb78
comment
One plot point in Tora! Tora! Tora! is that the US Military can decrypt the Japanese diplomatic codes. However, it is time-consuming, and very very secret. So secret, that at one point the President of the United States is removed from the list of people authorized to read the decoded messages because someone in his office improperly disposed of a decoded message. This of course only serves to add to the information delay that contributes to the Americans' failure to prepare for the impending attack.
 Reading The Enemy's Mail / int_4771fb78
featureApplicability
1.0
 Reading The Enemy's Mail / int_4771fb78
featureConfidence
1.0
 Tora! Tora! Tora!
hasFeature
Reading The Enemy's Mail / int_4771fb78
 Reading The Enemy's Mail / int_69a9c9ca
type
Reading The Enemy's Mail
 Reading The Enemy's Mail / int_69a9c9ca
comment
From Russia with Love, James Bond must collect a Soviet defector from Turkey, who is bringing a cipher machine with her. He has to start a fire in the embassy to cover up the theft.
 Reading The Enemy's Mail / int_69a9c9ca
featureApplicability
1.0
 Reading The Enemy's Mail / int_69a9c9ca
featureConfidence
1.0
 From Russia with Love
hasFeature
Reading The Enemy's Mail / int_69a9c9ca
 Reading The Enemy's Mail / int_769da46e
type
Reading The Enemy's Mail
 Reading The Enemy's Mail / int_769da46e
comment
In Monstrous Regiment, the Ankh-Morporkian representatives have the advantage of the City Watch Airborne Section, namely gnome Constable Buggy Swires and his buzzard, which lets them intercept messenger pigeons. Although not from the Borogravians, who disapprove of advanced communication technology, but from their own side's press.
 Reading The Enemy's Mail / int_769da46e
featureApplicability
1.0
 Reading The Enemy's Mail / int_769da46e
featureConfidence
1.0
 Monstrous Regiment
hasFeature
Reading The Enemy's Mail / int_769da46e
 Reading The Enemy's Mail / int_76c01b30
type
Reading The Enemy's Mail
 Reading The Enemy's Mail / int_76c01b30
comment
In V for Vendetta, V hacks Fate, the government's central supercomputer (and, incidentally, the love of the villain's life). He uses it to access both their surveillance systems and the freaking postal system in order to bring down the corrupt regime. Unlike the film, the postal system stuff was just to flip the bird at the establishment by showing them he was not only in their systems, but able to control them.
 Reading The Enemy's Mail / int_76c01b30
featureApplicability
1.0
 Reading The Enemy's Mail / int_76c01b30
featureConfidence
1.0
 V for Vendetta (Comic Book)
hasFeature
Reading The Enemy's Mail / int_76c01b30
 Reading The Enemy's Mail / int_85b855e2
type
Reading The Enemy's Mail
 Reading The Enemy's Mail / int_85b855e2
comment
In The Thrawn Trilogy, eventually the New Republic figures out that Thrawn is aware of all the plans they made in the Imperial Palace on Coruscant, courtesy of a source known only as "Delta Source." They spend a lot of effort trying to figure out who the spy is. Only after a slicer cracks Delta Source's transmission encryption on his own time for fun do they figure out that it was a sophisticated listening system Hidden in Plain Sight.
 Reading The Enemy's Mail / int_85b855e2
featureApplicability
1.0
 Reading The Enemy's Mail / int_85b855e2
featureConfidence
1.0
 The Thrawn Trilogy
hasFeature
Reading The Enemy's Mail / int_85b855e2
 Reading The Enemy's Mail / int_90d45233
type
Reading The Enemy's Mail
 Reading The Enemy's Mail / int_90d45233
comment
The Underland Chronicles: Underlanders of all species have a system similar to Morse code to send messages. The plot of Gregor and the Code of Claw revolves around breaking the titular code in which the gnawers write theirs.
 Reading The Enemy's Mail / int_90d45233
featureApplicability
1.0
 Reading The Enemy's Mail / int_90d45233
featureConfidence
1.0
 The Underland Chronicles
hasFeature
Reading The Enemy's Mail / int_90d45233
 Reading The Enemy's Mail / int_90f42a9b
type
Reading The Enemy's Mail
 Reading The Enemy's Mail / int_90f42a9b
comment
The Wheel of Time: Something Egwene and the other rebel Aes Sedai try to do while Dreaming with regards to Elaida's mail.
 Reading The Enemy's Mail / int_90f42a9b
featureApplicability
1.0
 Reading The Enemy's Mail / int_90f42a9b
featureConfidence
1.0
 The Wheel of Time
hasFeature
Reading The Enemy's Mail / int_90f42a9b
 Reading The Enemy's Mail / int_9b1636a1
type
Reading The Enemy's Mail
 Reading The Enemy's Mail / int_9b1636a1
comment
The Imitation Game is about the British efforts to crack the German ENIGMA system. Even though they had captured machines and knew how they worked, the British still needed to determine the daily settings, and used mathematics and early computers to find solutions.
 Reading The Enemy's Mail / int_9b1636a1
featureApplicability
1.0
 Reading The Enemy's Mail / int_9b1636a1
featureConfidence
1.0
 The Imitation Game
hasFeature
Reading The Enemy's Mail / int_9b1636a1
 Reading The Enemy's Mail / int_b30ae4db
type
Reading The Enemy's Mail
 Reading The Enemy's Mail / int_b30ae4db
comment
Game of Thrones: Roose reads the exchange of messages between Cersei and Littlefinger. A wise move, considering that those two might be the most incredibly untrustworthy people to have ever existed.
 Reading The Enemy's Mail / int_b30ae4db
featureApplicability
1.0
 Reading The Enemy's Mail / int_b30ae4db
featureConfidence
1.0
 Game of Thrones
hasFeature
Reading The Enemy's Mail / int_b30ae4db
 Reading The Enemy's Mail / int_b3708bb4
type
Reading The Enemy's Mail
 Reading The Enemy's Mail / int_b3708bb4
comment
The main reason for wanting to attack the titular submarine in U571 is to capture the submarine's Enigma machine and the associated code documents. This is Very Loosely Based on a True Story: the capture of U-110 in May 1941 with her Enigma machine and all her code documents by a British destroyer was a critical breakthrough in British penetration of the German Navy's ciphers.
 Reading The Enemy's Mail / int_b3708bb4
featureApplicability
1.0
 Reading The Enemy's Mail / int_b3708bb4
featureConfidence
1.0
 U-571
hasFeature
Reading The Enemy's Mail / int_b3708bb4
 Reading The Enemy's Mail / int_b389ac77
type
Reading The Enemy's Mail
 Reading The Enemy's Mail / int_b389ac77
comment
Most of Cryptonomicon (the 1940s bits, at least) is based around this. As with the real life section below, the Allies go to incredible amounts of effort to engineer plausible explanations for them having the information gained from intercepting enemy signals.
 Reading The Enemy's Mail / int_b389ac77
featureApplicability
1.0
 Reading The Enemy's Mail / int_b389ac77
featureConfidence
1.0
 Cryptonomicon
hasFeature
Reading The Enemy's Mail / int_b389ac77
 Reading The Enemy's Mail / int_b3e0e2e0
type
Reading The Enemy's Mail
 Reading The Enemy's Mail / int_b3e0e2e0
comment
In The Sum of All Fears, a significant subplot involves whether or not NSA and State Department encoding methods have been cracked by the Soviets. In fact, they have, and at the end, when the US doesn't believe they've been cracked, it makes things in the climax significantly worse.
 Reading The Enemy's Mail / int_b3e0e2e0
featureApplicability
1.0
 Reading The Enemy's Mail / int_b3e0e2e0
featureConfidence
1.0
 The Sum of All Fears
hasFeature
Reading The Enemy's Mail / int_b3e0e2e0
 Reading The Enemy's Mail / int_c0add399
type
Reading The Enemy's Mail
 Reading The Enemy's Mail / int_c0add399
comment
In The Third World War, the US had cracked the Atrophos cipher being used by Cuba. In the early stages of the war, the Cubans send a long message stating that they cannot attack the US directly, but they might be able to do some small sabotage operations. While the Soviet cipher clerk is manually decrypting the message and wishing that the long-winded platitudes that begin it are done with, the Americans have broken the whole message. The Soviets interpret the message correctly (You cowards! You're wimping out like Italy in 1939), the Americans don't (They're going to attack us!) and launch air strikes on Cuba. It takes the rest of Latin America to stop a full-scale invasion.
 Reading The Enemy's Mail / int_c0add399
featureApplicability
1.0
 Reading The Enemy's Mail / int_c0add399
featureConfidence
1.0
 The Third World War
hasFeature
Reading The Enemy's Mail / int_c0add399
 Reading The Enemy's Mail / int_c6f7e804
type
Reading The Enemy's Mail
 Reading The Enemy's Mail / int_c6f7e804
comment
Blake's 7. Episodes like "Seek-Locate-Destroy" and "Killer" involved the theft of a component that would allow Blake to crack Federation codes, no doubt inspired by the revelation just a few years previously about the war-winning importance of ULTRA (see Real Life). Later the rebels would get hold of a Magical Computer called Orac who could do this as a matter of course.
 Reading The Enemy's Mail / int_c6f7e804
featureApplicability
1.0
 Reading The Enemy's Mail / int_c6f7e804
featureConfidence
1.0
 Blake's 7
hasFeature
Reading The Enemy's Mail / int_c6f7e804
 Reading The Enemy's Mail / int_cb28b938
type
Reading The Enemy's Mail
 Reading The Enemy's Mail / int_cb28b938
comment
Charité at War: Professor Jung, a French medic who's conscripted to serve in a Berlin hospital in Nazi Germany, is not happy that his letters to and from home are controlled by censorship. It's not just enemy's mail, though — Otto is a German soldier, but he has to be careful with what he writes, too.
 Reading The Enemy's Mail / int_cb28b938
featureApplicability
1.0
 Reading The Enemy's Mail / int_cb28b938
featureConfidence
1.0
 Charité at War
hasFeature
Reading The Enemy's Mail / int_cb28b938
 Reading The Enemy's Mail / int_d581d078
type
Reading The Enemy's Mail
 Reading The Enemy's Mail / int_d581d078
comment
The Americans used a low-tech solution in World War II by using Navajo code-talkers, nicknamed wind-talkers, not to be confused with the fictional account in the movie Windtalkers. They didn't just speak in the Navajo language (which the Japanese were completely clueless to figure out anyway), but also spoke in code in the language. It was basically double encryption. The British apparently made similar use of Welsh.
Older Than They Think: in the previous war, Italian communications were handled in Sardinian Language (Sardu): regarded by many scholars to be the living language closest to Classical Latin, it is not an Italian dialect nor by any means related to Italian. In Italy, it is notoriously known for its difficulty to be actually understood by anyone not speaking it (that is, Italians and many Sardinians themselves, being an endangered language), unless spoken very slowly. And to be sure it couldn't be understood, the code-talkers weren't Italians speaking the literary version of Sardinian (that may have been understood), but actual Sardinians speaking their native dialects (which, even though they are all pretty much mutually intelligible, vary greatly the pronunciation of words).
 Reading The Enemy's Mail / int_d581d078
featureApplicability
1.0
 Reading The Enemy's Mail / int_d581d078
featureConfidence
1.0
 Windtalkers
hasFeature
Reading The Enemy's Mail / int_d581d078
 Reading The Enemy's Mail / int_eb3f769d
type
Reading The Enemy's Mail
 Reading The Enemy's Mail / int_eb3f769d
comment
Stephen Maturin of the Aubrey-Maturin series does this frequently. He even carefully edits the messages before passing them along to spread misinformation in enemy lines. While his friend Jack Aubrey found the operation very dishonorable, Stephen once mentioned that he has no qualms about violating an entire mail coach if it wins them the war.
 Reading The Enemy's Mail / int_eb3f769d
featureApplicability
1.0
 Reading The Enemy's Mail / int_eb3f769d
featureConfidence
1.0
 Aubrey-Maturin
hasFeature
Reading The Enemy's Mail / int_eb3f769d

The following is a list of statements referring to the current page from other pages.

 Reading The Enemy's Mail
processingCategory2
Espionage Tropes
 Reading The Enemy's Mail
processingCategory2
Mail and Delivery Tropes
 A Diplomatic Visit (Fanfic) / int_5d3483cc
type
Reading The Enemy's Mail
 A Thing of Vikings (Fanfic) / int_5d3483cc
type
Reading The Enemy's Mail
 Spirited Away (2012) (Fanfic) / int_5d3483cc
type
Reading The Enemy's Mail
 Warbound Widow (Fanfic) / int_2d9553ec
type
Reading The Enemy's Mail
 An Officer and a Spy / int_5d3483cc
type
Reading The Enemy's Mail
 Carry On Spying / int_5d3483cc
type
Reading The Enemy's Mail
 Kelly's Heroes / int_5d3483cc
type
Reading The Enemy's Mail
 Pearl Harbor / int_5d3483cc
type
Reading The Enemy's Mail
 The Man Who Never Was / int_5d3483cc
type
Reading The Enemy's Mail
 The Scarlet Pimpernel (1982) / int_5d3483cc
type
Reading The Enemy's Mail
 Tora! Tora! Tora! / int_5d3483cc
type
Reading The Enemy's Mail
 U-571 / int_5d3483cc
type
Reading The Enemy's Mail
 City of No End / int_5d3483cc
type
Reading The Enemy's Mail
 Johnny Tremain / int_5d3483cc
type
Reading The Enemy's Mail
 The A.I. Gang / int_5d3483cc
type
Reading The Enemy's Mail
 The Saga of Tanya the Evil / int_5d3483cc
type
Reading The Enemy's Mail
 The Underland Chronicles / int_5d3483cc
type
Reading The Enemy's Mail
 Tommy and Tuppence / int_5d3483cc
type
Reading The Enemy's Mail
 ReadingtheEnemysMail
sameAs
Reading The Enemy's Mail
 Charité at War / int_5d3483cc
type
Reading The Enemy's Mail
 Horrible Histories / int_5d3483cc
type
Reading The Enemy's Mail
 Nova / int_5d3483cc
type
Reading The Enemy's Mail
 Castle Falkenstein (Tabletop Game) / int_5d3483cc
type
Reading The Enemy's Mail
 Commandos (Video Game) / int_5d3483cc
type
Reading The Enemy's Mail
 EVE Online (Video Game) / int_5d3483cc
type
Reading The Enemy's Mail