Updated for challenge 9
[cipher-tools.git] / 2020-early / 8a.plaintext
1 harry we managed to tap the phone lines in oslo and intercepted german military police reports to
2 the ss headquarters they established that the gunner side operation was effective in wiping out the
3 existing stocks of heavy water but that the nazi engineers were able to restart production this was
4 confirmed in communications smuggled out of the plant by jomar brun and e in nar skinner land the
5 chief engineer and designer of the plant who are still working there as soe agents the information
6 was sent to intelligence headquarters in london in toothpaste tubes using a cipher developed for
7 boss by leo marks this intelligence was passed to usaaf who started to develop a plan to bomb the
8 plant running the risk of significant civilian losses luckily one of our boss officials spotted the
9 map on the wall of a briefing room during a protocol visit and realised what it was he flagged the
10 operation and got me involved i was able to contact swallow via the oslo branch of mil org and we
11 have been working together with usaaf to refine the mission despite the risks they agreed to a
12 daylight raid in the hope that the added accuracy would reduce norwegian casualties unfortunately
13 the raid was a mixed success as you can see from the attached report it is double encrypted again
14 but was alot tougher to crack they have used an affine shift for the substitution phase before using
15 the same sort of transposition take a look and let me know what you think meanwhile i will try to
16 contact ronn enberg to see what he wants to do next given the need to protect our network i will
17 increase the key length for my message to you next week to atleast six