Code-Breakers: Bletchley Park's Lost Heroes Timewatch


Code-Breakers: Bletchley Park's Lost Heroes

Similar Content

Browse content similar to Code-Breakers: Bletchley Park's Lost Heroes. Check below for episodes and series from the same categories and more!

Transcript


LineFromTo

This is a British mathematician called Bill Tutte.

0:00:130:00:17

You won't have heard of him.

0:00:170:00:19

But in 1943, he pulled off what many believe

0:00:190:00:22

was the greatest intellectual feat of World War Two.

0:00:220:00:26

It shortened the war and saved millions of lives.

0:00:260:00:30

He died in 2002 without ever being officially recognised

0:00:300:00:33

for his achievement.

0:00:330:00:34

This is a former GPO engineer called Tommy Flowers.

0:00:360:00:39

In 1944, he turned Tutte's mathematical ideas

0:00:390:00:43

into the world's first computer.

0:00:430:00:46

He died in 1998.

0:00:460:00:48

Chances are, you won't have heard of him either.

0:00:480:00:52

Backed by the brightest talents of Bletchley Park,

0:00:520:00:55

they allowed Britain to break a top secret machine

0:00:550:00:58

employed by Hitler to dictate the course of the war.

0:00:580:01:01

This machine was NOT Enigma.

0:01:010:01:03

It was something far more secret and significant...

0:01:030:01:06

and you definitely won't have heard of that.

0:01:060:01:09

It was Hitler's Blackberry really.

0:01:090:01:11

That intelligence probably shortened the war by a couple of years.

0:01:110:01:17

They were the forgotten heroes of Bletchley Park.

0:01:170:01:21

This is the story of a secret war and how two men changed the world

0:01:210:01:26

and then disappeared from history.

0:01:260:01:28

This is Bletchley Park.

0:01:490:01:51

In 1939, it became the wartime headquarters of MI6.

0:01:510:01:55

If you know anything about what happened here,

0:02:000:02:03

it will be that a man called Alan Turing

0:02:030:02:06

broke the German naval code known as Enigma and saved the nation.

0:02:060:02:10

And he did... but that's only half the story.

0:02:110:02:15

There were three heroes of Bletchley Park.

0:02:170:02:20

The first is Alan Turing.

0:02:200:02:22

The second was Bill Tutte who broke the Tunny system,

0:02:220:02:28

a quite amazing feat.

0:02:280:02:30

And the third was Tommy Flowers,

0:02:300:02:33

who, with no guidelines, built the first computer ever.

0:02:330:02:38

Amazingly, the story of Tutte and Flowers has never been fully told -

0:02:390:02:43

but then again, Bletchley is Britain's fortress of secrets.

0:02:430:02:47

The secrecy about Tunny and Colossus

0:02:470:02:49

has completely distorted the history of computing

0:02:490:02:53

and it's also left the story

0:02:530:02:56

of the World War Two codebreaking effort incomplete.

0:02:560:02:59

It's like there's not enough room on the stage

0:02:590:03:02

because the Enigma story has taken up so much space.

0:03:020:03:05

It's not surprising that there are stories

0:03:230:03:25

still to be told about this place.

0:03:250:03:28

Bletchley Park was Churchill's house of secrets.

0:03:300:03:33

It didn't even appear on any map.

0:03:330:03:37

Nicknamed "Station X", this sprawling complex was home

0:03:370:03:40

to a clandestine army engaged in a shadowy struggle

0:03:400:03:43

for military intelligence.

0:03:430:03:45

Bletchley Park's codebreaking history began in 1939,

0:03:530:03:57

with a tiny attic radio station hidden at the top of the house.

0:03:570:04:01

It would eventually give its name to the entire estate.

0:04:010:04:05

Station X.

0:04:050:04:06

As the war progressed, operations expanded out from the main house

0:04:190:04:24

to a haphazard collection of huts and concrete blocks.

0:04:240:04:27

Here, some of the most brilliant minds in the country

0:04:270:04:30

were involved in a constant battle to learn the enemy's secrets.

0:04:300:04:34

Arguably, the toughest and most rewarding struggle

0:04:390:04:42

was against a code called "Tunny".

0:04:420:04:44

In defeating it, Bill Tutte and Tommy Flowers

0:04:440:04:47

would change the world.

0:04:470:04:49

Captain Jerry Roberts worked alongside Bill

0:04:510:04:54

and was involved in the attack on Tunny.

0:04:540:04:56

He is the last surviving codebreaker from an elite group

0:04:560:05:00

known as "The Testery".

0:05:000:05:02

Now aged 90, this is the first time he has visited this part of the Park

0:05:020:05:06

since the war.

0:05:060:05:08

General Eisenhower said Tunny decrypts

0:05:080:05:10

shortened the war by at least two years.

0:05:100:05:13

In its heyday, the place was really buzzing.

0:05:150:05:19

Thousands of people working here, hard.

0:05:190:05:22

Very disappointing to see it in this shape.

0:05:370:05:40

The Testery were backed by a huge team of people

0:05:440:05:47

processing the information gained from the broken codes.

0:05:470:05:51

And while much of Bletchley has been restored,

0:05:510:05:54

the places that housed those workers are abandoned.

0:05:540:05:57

The secrets they uncovered, though, are still coming to light.

0:05:570:06:01

World War Two was a conflict uniquely designed

0:06:160:06:19

to create secret messages and exploit them.

0:06:190:06:22

The rapidity and mobility of armies during the Second World War

0:06:220:06:26

meant that you couldn't get your fixed-line communications,

0:06:260:06:29

which are much more secure, up quickly enough.

0:06:290:06:32

So increasingly, they came to rely upon radio technology

0:06:320:06:37

and radio technology, of course, is broadcast to the world

0:06:370:06:40

and they would, therefore, be able to intercept it.

0:06:400:06:43

It's a considerable weakness.

0:06:430:06:44

If you could break into the right encoding system

0:06:450:06:48

then you could deliver victory.

0:06:480:06:51

That was what Bletchley was built to do and their most secret

0:06:510:06:54

and stunning success came against a code which they nicknamed "Tunny"

0:06:540:06:58

and the Germans called "Lorenz".

0:06:580:07:01

Its existence was a tightly guarded secret.

0:07:070:07:10

Even now it's not common knowledge.

0:07:100:07:13

Tunny was generated by a new top-secret machine,

0:07:130:07:15

a device Hitler called his "Geheimschreiber" -

0:07:150:07:18

"The secrets writer".

0:07:180:07:20

To understand its genesis and the need for this super code,

0:07:200:07:24

you first have to look at the system that preceded it.

0:07:240:07:27

Enigma.

0:07:270:07:28

Enigma would dominate the early work of the codebreakers

0:07:340:07:37

of Bletchley Park, and it was a formidable opponent.

0:07:370:07:40

Well, this is an Enigma machine, a type of cipher machine

0:07:410:07:46

that was used throughout the Second World War by the Germans.

0:07:460:07:49

Throughout the Second World War, they believed that the ciphers

0:07:490:07:52

that were made on this machine could not be broken.

0:07:520:07:55

If I press the key for letter "N", lamp "W" lights up on this occasion.

0:07:550:08:00

So "N" would be enciphered into "W".

0:08:000:08:02

If I release my finger and press "N" a second time, on this occasion,

0:08:020:08:07

lamp "M" lights up, and the reason for that

0:08:070:08:10

is the rotors at the back of the machine have moved

0:08:100:08:12

each time I press a key and that changes the internal wiring.

0:08:120:08:17

Enigma masked Germany's wireless traffic.

0:08:190:08:22

The Morse code transmissions that were monitored back in Britain by "Y Stations",

0:08:220:08:26

monitoring and recording stations,

0:08:260:08:28

operated almost exclusively by women.

0:08:280:08:31

From the First World War, there was considerable emphasis put on

0:08:310:08:34

the quality of wireless receivers.

0:08:340:08:38

You might think that the most important thing in wireless

0:08:380:08:41

is the transmitter or the medium, the ether through which messages travel,

0:08:410:08:45

but for the cryptographers,

0:08:450:08:46

the main thing was the quality of the receiver,

0:08:460:08:49

being able to pick up the last lingering trace of a message,

0:08:490:08:52

and that was where the British radio engineers

0:08:520:08:56

were considerably more advanced than their German counterparts,

0:08:560:08:59

and the Germans simply didn't believe that their messages

0:08:590:09:02

could be picked up as far away as they were.

0:09:020:09:05

They didn't believe that messages from Russia, for example,

0:09:050:09:08

could be picked up in Britain.

0:09:080:09:10

For the first years of the war those listening posts

0:09:120:09:15

were dedicated to picking up Enigma traffic.

0:09:150:09:17

Then, in 1941, a new and strange sound

0:09:170:09:21

began to be picked out from the ether.

0:09:210:09:24

"A new kind of music", it was described as

0:09:270:09:30

by the British listeners when they first heard it.

0:09:300:09:33

This strange music was a new coding machine delivering messages

0:09:350:09:39

not by Morse, but by teleprinter.

0:09:390:09:42

The information war was about to move into new territory.

0:09:470:09:51

The advent of machine-made codes had one immediate effect

0:10:040:10:07

on Bletchley Park -

0:10:070:10:09

they began to recruit mathematicians.

0:10:090:10:12

Mathematicians were regarded as weird, incomprehensible people

0:10:120:10:17

and it just wasn't really understood what contribution

0:10:170:10:20

they could make to code-breaking.

0:10:200:10:22

These machine ciphers that were introduced, Enigma and so on,

0:10:220:10:27

and there were others as well,

0:10:270:10:29

are incredibly complex mathematically.

0:10:290:10:32

I mean, the First World War,

0:10:320:10:33

the British code-breakers were wordsmiths,

0:10:330:10:36

people who translated ancient documents for example,

0:10:360:10:39

cos it was all about words,

0:10:390:10:41

but in the Second World War it was much more about mathematics.

0:10:410:10:44

The mathematicians were thrown into the front line

0:10:440:10:47

against this new mystery system.

0:10:470:10:49

Even though the Nazis believed Enigma was unbreakable,

0:10:490:10:53

Hitler demanded more security.

0:10:530:10:55

His style of command called for a new and more direct

0:10:590:11:02

communications network. It would carry more information

0:11:020:11:07

and supersede the tangle of Morse traffic which his forces generated.

0:11:070:11:11

Enigma was really out of date technology

0:11:110:11:13

by the time the war started.

0:11:130:11:15

Three operators were required

0:11:150:11:17

and then another three operators at the receiving end.

0:11:170:11:20

There'd be the guy who actually typed the message,

0:11:200:11:24

the operator would have an assistant who would painstakingly note down

0:11:240:11:29

the letters as they lit up,

0:11:290:11:31

and then that would be handed over to a radio operator

0:11:310:11:34

who would translate that into the "dit-dit-da" of Morse code.

0:11:340:11:38

BEEPING

0:11:380:11:40

And then the process was reversed at the other end.

0:11:400:11:42

So you had six people co-operating in the transmission

0:11:420:11:45

of a single message with Enigma. Very slow, very clumsy.

0:11:450:11:48

So the vast volumes of information needed to fight a modern war

0:11:480:11:53

at that time would simply have overwhelmed a system

0:11:530:11:58

based upon using an Enigma machine, so they needed something which would

0:11:580:12:01

cope with the throughput of information required.

0:12:010:12:04

And this is it. The machine Hitler had dreamed of.

0:12:070:12:11

The Lorenz SZ40.

0:12:110:12:14

Or as the Allies called it, "Tunny".

0:12:140:12:16

This is an example, quite a rare example,

0:12:190:12:22

of what is called a Lorenz enciphering attachment.

0:12:220:12:25

Quite a complicated machine.

0:12:250:12:28

If I lift up the cover and show you the interior.

0:12:280:12:31

If you count up, you'll find that this device has got 12 wheels in it.

0:12:310:12:36

The Lorenz was much more sophisticated than Enigma.

0:12:360:12:40

The operator at one end typed in plaintext

0:12:400:12:43

and the operator at the other end received the plaintext

0:12:430:12:46

on his teleprinter without any intervention on his part.

0:12:460:12:49

The way in which this Lorenz cipher machine worked was it would apply

0:12:510:12:54

two layers, two keys, to your message,

0:12:540:12:56

so it wouldn't encipher it once, it would encipher it twice.

0:12:560:13:00

The first encipher used five wheels.

0:13:020:13:07

Then they would apply a second key

0:13:070:13:09

and this used similar five wheels and they had another two wheels

0:13:090:13:13

that were called, what we called "stutters" in the key.

0:13:130:13:17

And then that would generate a repeat character

0:13:170:13:20

and this was in order to try

0:13:200:13:21

and introduce this apparent randomness into the key.

0:13:210:13:24

The 12 wheels made the machine an awesome generator of code

0:13:260:13:29

and the number of potential ciphering possibilities

0:13:290:13:32

multiplied out as...

0:13:320:13:33

which equalled 1.6 million billion combinations.

0:13:470:13:52

Another innovation saw the Lorenz

0:13:550:13:57

incorporate the natural code of the teleprinter into its basic design.

0:13:570:14:02

It's kind of modern binary code really.

0:14:030:14:06

It's zeroes and ones and they just took the teleprinter code

0:14:060:14:10

and they encrypted that.

0:14:100:14:11

With the Lorenz enciphering device, the plain text letter "A"

0:14:140:14:18

was changed by a machine which actually added to it

0:14:180:14:23

a pseudo-random character, for example, the letter "K"

0:14:230:14:26

might have been used, for which the teleprinter code was this -

0:14:260:14:31

four crosses and a dot and these two characters were then combined

0:14:310:14:36

together by a process which is sometimes called "addition".

0:14:360:14:40

If the two elements were the same then the result was always a dot.

0:14:400:14:45

But if they were different, the answer was a cross.

0:14:470:14:51

And here, they're the same so it's a dot.

0:14:510:14:53

And if you looked at that set of impulses in terms of

0:14:530:14:56

the standard international teleprinter code,

0:14:560:14:58

you would find that that was, in fact, the letter "N".

0:14:580:15:01

The letter "A" has been enciphered to "N"

0:15:010:15:04

by adding this random character "K" to it.

0:15:040:15:08

Now, at the receiving station, of course,

0:15:080:15:11

the letter "N" is the cipher message

0:15:110:15:13

and we already know that that's going to come in, in terms of this pattern.

0:15:130:15:18

And now, a little bit of magic...

0:15:180:15:20

If at the receiving station the same random character that was used

0:15:200:15:24

by the sender was combined with it, in the same way...

0:15:240:15:28

Adding up... Two, these are different so the result's a cross.

0:15:310:15:36

They're different, the result's a cross. Same, a dot.

0:15:360:15:39

These two are the same, a dot. And these two are the same, a dot.

0:15:390:15:42

The result would be that. And if we look back,

0:15:420:15:46

that of course is the old character "A"

0:15:460:15:48

which was the original plaintext.

0:15:480:15:51

The actual number of teleprinters using this code

0:15:520:15:55

in the new network was less than 30.

0:15:550:15:58

But they were the lifeblood of the German command,

0:15:580:16:01

feeding out to the furthest fingertips

0:16:010:16:03

of the Third Reich's reach.

0:16:030:16:05

More importantly,

0:16:060:16:08

as many of the generals needed information about other campaigns

0:16:080:16:11

as well as their own, one line of traffic could produce an insight

0:16:110:16:15

into the entire German war effort.

0:16:150:16:18

This was the prize awaiting the codebreakers.

0:16:180:16:21

To get to it, they had to crack a code no-one understood,

0:16:240:16:27

produced by a machine no-one had seen,

0:16:270:16:31

and with a range of possible encryptions

0:16:310:16:34

that were utterly unimaginable.

0:16:340:16:37

To defeat the impossible machine, Bletchley would turn to

0:16:540:16:57

a 24-year-old mathematician called Bill Tutte.

0:16:570:17:01

Bill was born in Newmarket in 1917, the son of a gardener

0:17:100:17:15

at Fitzroy House, a local racing stable.

0:17:150:17:18

As a child, his keen intelligence soon showed itself.

0:17:260:17:30

He gained a scholarship to Cambridge and County High School.

0:17:300:17:34

After winning the scholarship, Uncle Bill faced

0:17:360:17:39

the even greater feat of getting to and from the school,

0:17:390:17:41

which was roughly a 12-mile journey there

0:17:410:17:44

and then 12 miles back again.

0:17:440:17:47

So he definitely had a lot of determination.

0:17:470:17:50

At his new school he excelled,

0:17:500:17:52

winning prizes in every subject.

0:17:520:17:54

I imagine he might have been frustrated at the school itself

0:17:550:17:59

in that he was apparently so much ahead of all the other pupils

0:17:590:18:04

so he would've been a bit isolated in that respect, I imagine.

0:18:040:18:07

In 1935, he went to Trinity College, Cambridge

0:18:150:18:18

where he studied chemistry and then mathematics.

0:18:180:18:21

Bletchley's habit of raiding the best academic talent

0:18:220:18:25

meant that Bill was sent to the Park in 1941,

0:18:250:18:28

although not everyone recognised his potential.

0:18:280:18:31

He first was interviewed by Alan Turing

0:18:310:18:34

and was not chosen to work on the Enigma project.

0:18:340:18:38

However, that was the best thing that could have happened to Bill.

0:18:380:18:43

Instead, he was chosen by John Tiltman

0:18:430:18:46

to be part of the research group.

0:18:460:18:48

They were the cream of the cryptographic people.

0:18:480:18:52

Bill found himself in the right place at the right time.

0:18:540:18:57

After months of fruitless examination,

0:18:570:18:59

the team working on the invincible Tunny code

0:18:590:19:02

were about to be gifted a way in.

0:19:020:19:04

At the beginning, the Germans were very sloppy.

0:19:210:19:24

They obviously had so much confidence in the machine,

0:19:240:19:28

they were over-confident.

0:19:280:19:31

In fact, this is how we came to break the system.

0:19:310:19:35

You need depth to break any cipher.

0:19:360:19:39

By depth, I mean a number of messages sent using the same key

0:19:390:19:43

or the same system.

0:19:430:19:45

30th August, 1941.

0:19:470:19:50

A German operator had a long message of 4,000 characters

0:19:500:19:53

to be sent from Athens to Vienna.

0:19:530:19:55

What happened is they sent the message

0:20:020:20:04

and the person at the end said, "Well, I didn't quite get that.

0:20:040:20:07

"Can you send it again?"

0:20:070:20:09

The German operator went and sent it again,

0:20:230:20:26

but he didn't change the wheel settings,

0:20:260:20:29

and so we got what we called the depth,

0:20:290:20:33

two messages with exactly the same encryption.

0:20:330:20:36

So he sends the same message

0:20:410:20:43

on the same setting,

0:20:430:20:44

and the trouble is then that when he resends it,

0:20:440:20:48

he makes slight differences in the punctuation,

0:20:480:20:52

so the message isn't quite the same as it was.

0:20:520:20:56

He abbreviated Nummer, the German word for "number", to "Nr",

0:20:580:21:02

so he didn't have to type in the U-M-M-E every time,

0:21:020:21:06

and anything he could abbreviate, he'd abbreviate it.

0:21:060:21:09

An intercept station picked up these messages.

0:21:120:21:15

They realised that they were radio teleprinter.

0:21:200:21:24

The message was sent to Bletchley via a despatch rider.

0:21:280:21:32

When it got there,

0:21:320:21:33

the first person to attack it was legendary codebreaker John Tiltman.

0:21:330:21:38

A former frontline soldier in World War One,

0:21:380:21:41

Tiltman was awarded the Military Cross.

0:21:410:21:44

But it was his talent for languages

0:21:440:21:45

that saw him rise through the ranks in intelligence work.

0:21:450:21:50

He's generally recognised

0:21:500:21:52

as one of Britain's best codebreakers in the Second World war.

0:21:520:21:55

He did achieve quite a lot on Japanese codes, for example.

0:21:550:21:59

He taught himself Japanese in just a few weeks.

0:21:590:22:02

But he looked at this Lorenz cipher and he was the first to realise

0:22:020:22:06

that there was a method of breaking through this code.

0:22:060:22:09

The Lorenz machine had a particular weakness.

0:22:160:22:19

If two messages were sent with the same key sequence,

0:22:190:22:22

then there was a way in which the signals could be recovered.

0:22:220:22:26

Let me show you.

0:22:260:22:27

We had a message earlier where the plaintext was letter A

0:22:270:22:32

and the pseudo-random character generated by the machine was K,

0:22:320:22:36

and the result turned out to be the letter N.

0:22:360:22:39

Now, suppose another plaintext message B was sent

0:22:390:22:43

using the same key.

0:22:430:22:45

Then on this occasion the answer to that in fact turns out to be P.

0:22:460:22:50

I'm not going to show that,

0:22:500:22:52

but it's the same procedure as we used before.

0:22:520:22:54

Now, we saw previously

0:22:540:22:56

that if you add K to this message you recover the plaintext.

0:22:560:23:00

Suppose you add those up,

0:23:020:23:04

so that on the left-hand side you've got A + B + K + K.

0:23:040:23:09

Now, the elements of those two in each case will be identical,

0:23:090:23:12

they'll cancel each other out,

0:23:120:23:14

and in effect the K disappears from the equation.

0:23:140:23:18

And of course, on the right-hand side we've got N + P.

0:23:180:23:21

N + P, from the teleprinter code, is in fact the letter G.

0:23:210:23:26

And so we can say that this is what we've got.

0:23:260:23:29

We've got G, the sum of the two pieces of cipher text,

0:23:290:23:33

and the question is, is it possible to decompose that

0:23:330:23:37

back into the original messages, which were of course A and B?

0:23:370:23:42

That was what we would like to do.

0:23:420:23:44

Well, there's no mathematical way of doing it,

0:23:440:23:47

but one way in which it CAN be done

0:23:470:23:50

is to make an inspired guess for one of those answers.

0:23:500:23:54

Suppose, for example, we made a lucky guess

0:23:540:23:56

that the first message was just the letter A.

0:23:560:24:00

Then if you take the G we've got and add A to it,

0:24:000:24:04

then from the teleprinter code, if you add G and A together

0:24:040:24:08

you discover that you do get B, the second one.

0:24:080:24:11

And so if this make sense, that makes sense, and you've got a result.

0:24:110:24:15

A second, more convincing example, perhaps, is this one,

0:24:150:24:19

which is based upon six letters.

0:24:190:24:22

..is the sum of, in teleprinter world,

0:24:260:24:29

the names of two principal cities in the United Kingdom.

0:24:290:24:33

Now, the question is, could we resolve that

0:24:330:24:36

into the actual names of these cities?

0:24:360:24:38

And the method they used at Bletchley was based upon

0:24:380:24:41

intuition and perseverance.

0:24:410:24:44

For example, if you've got two important towns here,

0:24:440:24:48

it's conceivable that one of them might well be London.

0:24:480:24:51

And so a good try...

0:24:510:24:53

And then proceed to add these pairs of letters together

0:24:560:25:00

using the teleprinter code method I showed you earlier.

0:25:000:25:05

We won't do those. It'll take us too long.

0:25:050:25:07

But I assure you that if you do, you come up with this result.

0:25:070:25:10

Now, it might be argued that that could have occurred by chance,

0:25:130:25:17

but it's very unlikely,

0:25:170:25:19

and so this approach was one that was used at Bletchley Park

0:25:190:25:23

to decompose these combined messages.

0:25:230:25:26

Colonel John Tiltman would take such a message

0:25:260:25:29

and he would use a plausible piece of German,

0:25:290:25:32

something he thought might well occur at the beginning of one of the messages,

0:25:320:25:36

add it into the composite

0:25:360:25:38

and see if something in plausible Germanic came out as a result.

0:25:380:25:42

Tiltman took ten days to hand-break and unravel the transmission.

0:25:450:25:50

In his extraordinary feat, he manages to extract from this

0:25:520:25:56

the cipher text,

0:25:560:25:58

what was the cipher text, what was added to the plaintext.

0:25:580:26:01

It was a phenomenal piece of decryption.

0:26:010:26:04

But it still didn't help the team understand

0:26:040:26:07

how they could regularly read Tunny.

0:26:070:26:09

He couldn't work out the system -

0:26:090:26:12

how the machine worked,

0:26:120:26:15

and the job was passed to Bill Tutte.

0:26:150:26:18

Tutte sort of recalls it as almost an act of desperation -

0:26:180:26:23

"Oh, well, we can't work it out - here you are, you have a go at it,"

0:26:230:26:27

almost disparagingly, you know?

0:26:270:26:30

And Tutte sits down and he sees patterns.

0:26:300:26:32

He's looking for patterns.

0:26:320:26:34

And he did put this 4,000-word message into columns

0:26:450:26:51

and made a rectangle out of it,

0:26:510:26:54

and he thought about what might be a useful length of this.

0:26:540:26:58

And then he noticed that there were certain repetitions

0:26:580:27:01

that went across the rectangle.

0:27:010:27:03

He realises that there seems to be a pattern every 23 times, a rotation.

0:27:080:27:16

He thinks it might be 25, so he tries multiplying 23 by 25

0:27:160:27:21

to see if the pattern extends along that.

0:27:210:27:25

And it doesn't quite work,

0:27:250:27:27

but the pattern does extend along 574.

0:27:270:27:33

So he thinks then,

0:27:330:27:36

"Ah, well, maybe it's 41,"

0:27:360:27:39

because 41 is a prime number of 574.

0:27:390:27:43

You wouldn't have a machine that rotated through 574 positions.

0:27:430:27:49

"Maybe it's 41." And he tried it, and it worked.

0:27:490:27:52

From that, he began to deduce,

0:28:030:28:06

"Well, this starts repeating itself after 41 strokes,"

0:28:060:28:10

that you get a certain resonance

0:28:100:28:12

that even though it's affected by other impulses,

0:28:120:28:15

the dominant thing is here the fact that you get this resonance after 41.

0:28:150:28:21

So he says, "Well, I think the first wheel in this has 41 spokes."

0:28:210:28:25

Then he starts working on the second wheel, and so forth.

0:28:250:28:28

I was working in the same office as Bill Tutte for most of that time,

0:28:280:28:34

and I can still remember him staring into the middle distance

0:28:340:28:40

and making counts on reams and reams of paper.

0:28:400:28:45

And I used to wonder whether he was actually doing anything!

0:28:470:28:51

My word, he was! The most extraordinary achievement.

0:28:510:28:55

Using Tutte's insight and a method known as Turingery,

0:28:580:29:02

the Testery applied brute mental force to break the code.

0:29:020:29:05

As they did, it became apparent

0:29:050:29:07

just what a valuable source of information Tunny would prove to be.

0:29:070:29:10

We saw the signatories and we saw who the messages were sent to.

0:29:100:29:16

So we were well aware of all that.

0:29:160:29:19

And they included

0:29:190:29:21

Field Marshal Keitel, who was the head of the whole German army,

0:29:210:29:25

which was not a bad start,

0:29:250:29:27

and Jodl, who was the Chief of Staff of the German army,

0:29:270:29:31

in other words the chief operating officer,

0:29:310:29:34

and his number two, Warlimont.

0:29:340:29:36

But in 1944 they were joined by a fourth -

0:29:360:29:39

Adolf Hitler himself.

0:29:390:29:43

You're almost in the High Command meeting,

0:29:450:29:49

where they're working it all out. You are almost actually the fly on the wall.

0:29:490:29:53

The world's toughest code had been broken.

0:29:530:29:57

Hitler's secrets were laid bare,

0:29:570:29:59

and the course of the war was about to change,

0:29:590:30:02

all because of one sloppy, lazy error

0:30:020:30:04

by a lowly teleprinter operator.

0:30:040:30:07

I think this German operator did us such a huge favour,

0:30:070:30:14

I think there ought to be a statue of him in Whitehall.

0:30:140:30:17

The first chance for Bletchley Park to use Tunny information in the field

0:30:380:30:42

came at the battle of Kursk on the eastern front.

0:30:420:30:45

The Testery, the elite group commanded by Major Ralph Tester,

0:30:450:30:48

were still breaking this impenetrable code by hand.

0:30:480:30:52

Even so, they had uncovered an incredible amount of information

0:30:520:30:56

regarding plans for a massive surge by Germany

0:30:560:30:59

against the Russian forces.

0:30:590:31:01

The Tunny decrypt showed that they were about to make

0:31:010:31:04

a major assault on the Russian lines,

0:31:040:31:08

and we were able to warn the Russians.

0:31:080:31:10

But much more than that,

0:31:180:31:20

we were able to tell them how the attack was planned.

0:31:200:31:24

"It's going to be a pincer attack."

0:31:240:31:27

And even more astonishingly,

0:31:270:31:29

we were able to give them the whole order of battle.

0:31:290:31:33

It was the Nazis' last chance to put the Red Army on the back foot,

0:31:350:31:38

but the Russians, forewarned and forearmed, were waiting for them.

0:31:380:31:42

Kursk was both the largest armoured clash in history

0:31:420:31:45

and the single bloodiest day of aerial warfare ever.

0:31:450:31:49

By the end of it, Germany's Russian campaign was in tatters

0:31:510:31:55

and the Red Army gained an initiative they would press all the way to Berlin.

0:31:550:31:59

The Russians, of course, called Kursk "the turning of the tide".

0:31:590:32:06

Kursk proved just how important intercepted Tunny messages could be.

0:32:160:32:20

The challenge now was to accelerate the decoding process.

0:32:200:32:24

I've got a page up here that mentions Bill Tutte.

0:32:270:32:31

It says that he invented what they call...

0:32:320:32:35

the "1 + 2 break-in method was invented by William Tutte in November 1942."

0:32:350:32:41

What Bill did, his first achievement was

0:32:410:32:43

he actually diagnosed the machine, the structure of the machine

0:32:430:32:46

and how the cipher worked, purely from intercepted messages.

0:32:460:32:50

Nobody had actually seen the machine at all.

0:32:500:32:53

But then, his second major contribution

0:32:540:32:57

was working out a statistical method of cracking the machine.

0:32:570:33:01

The hand methods that they had used up until then were no longer possible

0:33:010:33:05

because of extra German security measures and so on,

0:33:050:33:08

so they were coming to an end of what they could do in cracking these messages.

0:33:080:33:12

And then Tutte worked out this method.

0:33:120:33:15

It was a mathematical and statistical attack on the coded messages,

0:33:150:33:20

and it required a huge amount of checking and counting of data.

0:33:200:33:23

Luckily, at Bletchley Park there was a man who had an idea

0:33:230:33:26

how this work could be done.

0:33:260:33:29

Putting Bill Tutte's theories into practice

0:33:380:33:41

led to one of the great technological breakthroughs

0:33:410:33:44

of the Second World War,

0:33:440:33:45

a breakthrough kept secret for nearly 60 years.

0:33:450:33:48

It was made by a GPO engineer called Tommy Flowers.

0:33:540:33:59

Flowers was a brilliant man.

0:34:010:34:03

He was quiet, he had a slightly hesitant manner.

0:34:030:34:06

He looked very boyish,

0:34:060:34:08

and with his hair perpetually smarmed back with Brilliantine,

0:34:080:34:13

he didn't look like someone who was about to change the world.

0:34:130:34:16

But change the world he did.

0:34:160:34:18

Tommy Flowers was born in Poplar, London in 1905,

0:34:190:34:23

the son of a bricklayer.

0:34:230:34:25

He was born into

0:34:250:34:26

a Cockney-speaking world,

0:34:260:34:28

and Flowers kept his accent, to a greater or lesser degree,

0:34:280:34:32

right through his life,

0:34:320:34:33

and he said later in life

0:34:330:34:35

that his Cockney accent had probably been a handicap to him.

0:34:350:34:40

His brilliant mind enabled him

0:34:400:34:43

to move out of that world into a quite different world.

0:34:430:34:46

Like Tutte, he was a scholarship boy,

0:34:480:34:51

but he would gravitate to industry rather than university.

0:34:510:34:54

First, he did an apprenticeship in mechanical engineering

0:34:540:34:57

before gaining a degree at night school

0:34:570:34:59

and rounding off his education at Dollis Hill,

0:34:590:35:02

the Post Office's unique research laboratory in London.

0:35:020:35:06

Bletchley used the Dollis Hill engineers to help with their attempts

0:35:080:35:11

to harness machines to the task of codebreaking.

0:35:110:35:14

This is how Tommy came on to the radar of a pivotal figure at the park,

0:35:140:35:19

the mathematician Max Newman.

0:35:190:35:22

He discovered that you could mechanise

0:35:220:35:24

Tutte's method of breaking this cipher.

0:35:240:35:27

He understood that it was something that you could put into a machine.

0:35:270:35:30

Max's department, called the Newmanry,

0:35:300:35:34

had built a machine to crack Tunny.

0:35:340:35:37

Nicknamed Heath Robinson, it kept breaking down.

0:35:370:35:41

Newman brought in Flowers to fix the Robinson,

0:35:430:35:46

but Tommy had a better idea.

0:35:460:35:48

Tommy Flowers took one look at this and said, "I can do that better."

0:35:490:35:52

I can have the patterns generated in electronic circuits,

0:35:520:35:56

and now I've only got one tape, which is the source tape, the cipher text.

0:35:560:36:02

I can read that now at 5,000 characters per second,

0:36:020:36:06

compared with 1,000 on Heath Robinson.

0:36:060:36:09

And I can now generate these patterns in electronic circuits.

0:36:090:36:13

But, of course, that meant that he had to have

0:36:130:36:17

vast numbers of valve tubes in order to do this.

0:36:170:36:20

Valves were flaky kind of devices,

0:36:200:36:23

and the more of them that you had, the greater the probability

0:36:230:36:27

that a couple of them would be out of action at any time.

0:36:270:36:30

But Tommy's practical experience meant that at that time,

0:36:300:36:34

he knew more about the potential of this technology

0:36:340:36:37

than anyone else in the country.

0:36:370:36:39

He knew that if you left electronic valves running for a long time

0:36:390:36:43

then you didn't get problems with them.

0:36:430:36:45

The problems arose if you kept switching them on and off.

0:36:450:36:49

Flowers knew he was right,

0:36:490:36:50

so he just went back to his laboratory at Dollis Hill

0:36:500:36:54

and quietly got on with building the electronic machine

0:36:540:36:57

that he knew the codebreakers needed.

0:36:570:37:00

It was massive, the effort that was required to do it.

0:37:170:37:21

Flowers told me that he and his group worked until their eyes dropped out.

0:37:210:37:26

Eventually, he produces this thing and they try it out,

0:37:260:37:30

and it works first time.

0:37:300:37:32

"Oh, gosh, that's luck." So they try it out again.

0:37:320:37:35

And it works second time, and it keeps working,

0:37:350:37:39

every time they try it out. And they're so...you know,

0:37:390:37:43

"Good grief!" And he produces this thing called Colossus,

0:37:430:37:49

which is the world's first semi-programmable electronic computer.

0:37:490:37:56

This is Colossus.

0:38:160:38:19

And what it did was, you took the intercepted cipher text,

0:38:190:38:22

on a lot of paper tape.

0:38:220:38:26

Five bit code there. And that is received by us on our radio station,

0:38:260:38:31

planked on a paper tape,

0:38:310:38:32

and loaded on to this part of Colossus here, called the bedstick.

0:38:320:38:36

That's the part of Colossus that holds the intercepted

0:38:360:38:39

cipher signal, and that is joined into a loop,

0:38:390:38:42

and being read continuously.

0:38:420:38:44

And that is being read at 5,000 characters per second.

0:38:440:38:47

That's the data going into Colossus.

0:38:470:38:49

They put the results of those readings up on to a lamp panel here,

0:38:490:38:55

and here are the results of a particular run.

0:38:550:39:00

So this is refreshed every time the tape goes round one continuous cycle.

0:39:000:39:05

We got one document that was written at the end of the war.

0:39:050:39:08

A Technical Description of Colossus 1.

0:39:080:39:11

It's a sort of technical manual that describes

0:39:110:39:13

the different types of valves that were used, for example.

0:39:130:39:17

And the different parts of the machine,

0:39:170:39:20

the circuit diagrams of the valves

0:39:200:39:22

that were used in the different parts of the machinery.

0:39:220:39:26

Internal bitstream generators, the clock pulse system and what have you.

0:39:260:39:30

Which were all, nowadays are standard parts of any computer,

0:39:300:39:35

but all had to be invented for this machine from scratch.

0:39:350:39:39

Now, as I say, they have been taken over and used in modern day computers.

0:39:390:39:43

As innovative as it was, Colossus would only break the two chi wheels.

0:39:440:39:49

Decoding Tunny would still be a team effort.

0:39:490:39:52

There were seven stages to the breaking of Tunny.

0:39:520:39:56

And, uh, whilst the Newmanry was established,

0:39:560:39:59

the Newmanry handled two of them,

0:39:590:40:02

and then the Testery handled the other five.

0:40:020:40:07

PHONE RINGS

0:40:070:40:11

Bletchley Park's scepticism was immediately cured

0:40:210:40:25

as soon as they sa2 Colossus working.

0:40:250:40:27

They wanted more machines.

0:40:270:40:29

A little unrealistically, they asked for four more Colossi

0:40:310:40:35

by the 1st June, the projected date for D-Day.

0:40:350:40:38

As it was, Tommy and his team

0:40:380:40:41

only just managed to deliver one more machine, the Mark II.

0:40:410:40:46

It was 1am on the 1st June,

0:40:490:40:50

and Flowers and his men just had to go home to catch some sleep.

0:40:500:40:56

Flowers left one of his right-hand men, Bill Chandler,

0:40:560:41:00

to carry on the fight alone, through the small hours of the morning.

0:41:000:41:04

It was a very tough night for Chandler. He worked on, and about 3am

0:41:040:41:09

he noticed that his feet were in a pool of water.

0:41:090:41:14

A radiator pipe on the wall had burst

0:41:140:41:17

and water was inching inexorably across the floor

0:41:170:41:22

towards high-voltage equipment.

0:41:220:41:24

It was quite dangerous, I think, for Chandler, but he carried on

0:41:240:41:27

and eventually, in the wee small hours,

0:41:270:41:30

he tracked down the fault

0:41:300:41:32

and he made some adjustments using his soldering iron,

0:41:320:41:36

and Flowers turned up a few hours later to find

0:41:360:41:39

Colossus working perfectly.

0:41:390:41:40

No one had managed to fix the leaking radiator pipe, though,

0:41:400:41:44

and the people operating Colossus had to wear Wellington boots

0:41:440:41:47

to insulate themselves.

0:41:470:41:49

But, Flowers beat the deadline.

0:41:490:41:51

It was the 1st June and Colossus was working.

0:41:510:41:53

And so both Colossus I and Colossus II were in operation

0:41:550:41:59

in time for the D-Day landings.

0:41:590:42:01

Tunny decrypts made two major contributions to the success of D-Day.

0:42:030:42:07

The first was to uncover the entire defensive structure

0:42:070:42:11

of the German army.

0:42:110:42:12

The most important information

0:42:120:42:14

that Lorenz provided for the run-up to D-Day

0:42:140:42:17

was the order of battle information,

0:42:170:42:19

which give details of the aircraft, the tanks and so on

0:42:190:42:24

that were available to the Germans against the D-Day forces.

0:42:240:42:29

None of this information came from Enigma intercept.

0:42:290:42:32

Even got details of aircraft being refitted

0:42:320:42:35

or moved around and so on.

0:42:350:42:38

So we had as much information about the German air force

0:42:380:42:41

as the German air force itself had.

0:42:410:42:42

The other contribution was to eavesdrop

0:42:460:42:48

on conversations which confirmed

0:42:480:42:50

that the Nazis had fallen for Operation Fortitude,

0:42:500:42:53

the fake invasion of Calais.

0:42:530:42:55

Hitler had swallowed our deception campaigns,

0:42:580:43:01

Hitler was convinced the attack was coming across the Straits of Dover,

0:43:010:43:05

and that Normandy was a feint.

0:43:050:43:07

These generals, being professionals,

0:43:110:43:14

wanted it to be in the Normandy region.

0:43:140:43:17

Hitler won out, so we knew that the Normandy region

0:43:200:43:26

was less well-defended than it could have been.

0:43:260:43:31

As the war through Europe progressed,

0:43:550:43:58

the information gained from the Tunny system

0:43:580:44:00

began to be used in a more subtle and innovative way.

0:44:000:44:03

The effect of this flow of information

0:44:070:44:10

helped us to "read" Hitler,

0:44:100:44:11

and predict the way he would react and wage war.

0:44:110:44:14

In modern terms, it helped us to get inside his head,

0:44:160:44:19

something which up until then had been difficult to do,

0:44:190:44:23

because Hitler didn't act like a normal military commander.

0:44:230:44:26

They had to learn not to think that Hitler would do what they would do,

0:44:280:44:32

but to understand how Hitler would actually react in these situations,

0:44:320:44:36

and do things that they simply didn't expect him to do.

0:44:360:44:39

To hang on to territory when it was completely pointless.

0:44:390:44:41

And this was one of the amazing things about the war in Italy,

0:44:410:44:48

which people don't really get or understand.

0:44:480:44:51

Once the British know from this teleprinter link

0:44:510:44:56

that the Germans have decided to keep the front going,

0:44:560:44:59

not only do they know how to shape the immediate battle,

0:44:590:45:03

but they also realise that they can keep the thing going

0:45:030:45:06

for as long as they like.

0:45:060:45:09

They can control the extent to which the battle moves forward.

0:45:090:45:15

And by doing so, can drain away German resources,

0:45:150:45:19

which won't then be used for the main battle, the invasion of Europe.

0:45:190:45:24

This is the great irony of the Nazis' love affair

0:45:290:45:31

with secrets and machines.

0:45:310:45:34

The very devices they trusted to give them total security

0:45:340:45:38

allowed the Allies to play Hitler like a fish on a line.

0:45:380:45:42

From the beginning, the Nazis were in the impossible position

0:45:420:45:46

of having to trust these machines.

0:45:460:45:48

Machines which would prove to be an Achilles heel.

0:45:480:45:51

The Nazi philosophy led them to distrust people

0:45:520:45:56

and to put their trust in machines,

0:45:560:45:59

and the problem then is you have to accept the idea

0:45:590:46:02

that the machine cannot be broken.

0:46:020:46:05

And in fact, all of these machines are vulnerable

0:46:050:46:07

provided you approach it in the right way

0:46:070:46:10

and that is what the British did.

0:46:100:46:12

And the secrets of Nazi Germany, of Hitler himself,

0:46:120:46:14

flowed forth because of that.

0:46:140:46:17

Unlike here in Britain, where we had one codebreaking organisation,

0:46:170:46:22

in Germany, there were seven different organisations

0:46:220:46:24

involved in codebreaking.

0:46:240:46:26

And they spent a lot of their time just fighting one another -

0:46:260:46:29

even, on one occasion, actually physically fighting on the street.

0:46:290:46:33

So it couldn't bring together a mass of people

0:46:330:46:35

and get the best out of them in the way in which we did in Britain.

0:46:350:46:38

Similarly, their ideology meant they were equally ill-equipped

0:46:400:46:43

to create their own version of Bletchley Park.

0:46:430:46:45

Some people say it's because the kind of people

0:46:450:46:48

that worked at Bletchley Park

0:46:480:46:51

were just, by German lights, unemployable.

0:46:510:46:54

There were gays like Turing, there were Jews,

0:46:540:46:57

there were totally disorganised academics,

0:46:570:47:01

people who were brilliant but practically dysfunctional.

0:47:010:47:04

They just did not fit into the Nazi ethos.

0:47:040:47:07

By May 1945, the war in Europe was over,

0:47:170:47:21

and Bletchley Park had done its job.

0:47:210:47:23

The war cost, on average, ten million lives a year.

0:47:360:47:40

This is not counting the wounded and the maimed.

0:47:400:47:43

Breaking Tunny at that juncture was pretty jolly important.

0:47:460:47:50

For Tutte, and for Flowers in particular,

0:47:520:47:55

peacetime would bring a unique set of difficulties.

0:47:550:47:59

During the war, Bletchley operated behind a wall of silence.

0:48:160:48:20

And thanks to the nature of their work,

0:48:200:48:22

that secrecy would remain intact for a long time to come.

0:48:220:48:26

Even once the war was over, they still couldn't say.

0:48:260:48:30

That was a big issue, and the bosses at the time understood

0:48:300:48:34

that that was a security threat, if you like,

0:48:340:48:36

so they moved quickly to say to people,

0:48:360:48:39

"Sorry, you've got to keep this secret permanently, forever.

0:48:390:48:43

"You can't go home and tell your mother or your father

0:48:430:48:46

"what you were doing."

0:48:460:48:48

And there are many interesting and quite tragic stories

0:48:480:48:51

where people didn't, and right into the 1970s and beyond,

0:48:510:48:55

parents died without knowing what their children had done.

0:48:550:48:58

As for the machine itself, after the war, Churchill let it be known

0:48:590:49:03

that Colossus had been broken into pieces.

0:49:030:49:06

This was not true.

0:49:060:49:08

At least two survived and were taken to the new GCHQ building,

0:49:080:49:12

where they were used until the 1960s.

0:49:120:49:14

It seems very likely to me that the Russians were using Tunny

0:49:160:49:20

in the Cold War period.

0:49:200:49:22

As the Russian armies swept across Europe,

0:49:220:49:25

they captured numerous German Tunny machines,

0:49:250:49:29

and they very probably reconditioned them

0:49:290:49:32

and used them for their own communications.

0:49:320:49:35

As the Tunny brick was being buried, Tommy was recalled to Dollis Hill.

0:49:370:49:41

While he was there, the Americans announced that they had built

0:49:420:49:46

the world's first computer, ENIAC, in February 1946.

0:49:460:49:50

Already, the true history of computing was being corrupted.

0:49:510:49:56

Tommy's suffering in silence was slowly disappearing from history.

0:49:560:50:00

As for Bill Tutte, he was awarded a fellowship at Cambridge,

0:50:080:50:12

before moving to Canada, where he took up a teaching post

0:50:120:50:15

and met his wife, Dorothea.

0:50:150:50:17

Bizarrely for a man who had helped defeat the Nazis

0:50:280:50:31

with the use of cutting-edge technology,

0:50:310:50:34

Bill settled in rural Montrose,

0:50:340:50:36

surrounded by German-speaking Amish farmers.

0:50:360:50:38

There, he continued to do breakthrough work

0:50:470:50:49

at the University of Waterloo,

0:50:490:50:51

in a branch of mathematics that was growing in importance

0:50:510:50:55

thanks to the rise of computer science.

0:50:550:50:57

So he was working in an area of mathematics

0:51:010:51:05

that wasn't especially fashionable in the middle of the 20th century,

0:51:050:51:08

but it is the mathematics that underlies

0:51:080:51:12

much of the theory of computation.

0:51:120:51:14

So the importance of his work in the field he helped nurture

0:51:140:51:18

became astronomically important,

0:51:180:51:20

as the information age unfolded in the late 20th century.

0:51:200:51:23

Well, all that was rather nice,

0:51:230:51:25

and you see it meant that in the case of unit resistances,

0:51:250:51:32

all these determinants were integers,

0:51:320:51:35

and therefore if you made the horizontal side equal to the complexity,

0:51:350:51:40

all your little squares and rectangle sides,

0:51:400:51:45

they all became integers.

0:51:450:51:47

Certainly, we're talking about a genius, yes, in many respects.

0:51:470:51:51

I think for what he did at Bletchley, he proved it,

0:51:510:51:54

and for what he did in graph theory

0:51:540:51:56

and related parts of mathematics, he proved it again.

0:51:560:51:59

Meanwhile, the story of Colossus was beginning to creep out.

0:52:010:52:06

Tommy at last began to receive some recognition.

0:52:070:52:10

In 1982, he was invited to talk

0:52:100:52:13

at the Museum of Digital Technology in Boston.

0:52:130:52:16

When the hostilities commenced in Europe in 1939,

0:52:180:52:22

all civil work in Britain had to be subordinated to war work.

0:52:220:52:27

In the course of which I was sent to Bletchley Park,

0:52:270:52:30

a highly secret establishment some 50 miles north of London,

0:52:300:52:33

to take on some top-secret work.

0:52:330:52:36

He was still consulting with the MoD as to what he could and couldn't say

0:52:360:52:40

and some things were restricted even in the 1980s.

0:52:400:52:43

For Tommy, 12 years older than Bill,

0:52:430:52:46

the gradual lifting of secrecy came too late.

0:52:460:52:49

Although he did live long enough to see his famous machine rebuilt at Bletchley.

0:52:490:52:54

He knew that history had treated him badly.

0:52:540:52:58

I had the sense that he was weighed down

0:52:580:53:01

by all those might-have-beens,

0:53:010:53:04

how fabulous it could have been if things had gone differently.

0:53:040:53:10

If only it hadn't been for the secrecy.

0:53:100:53:12

He also knew - and told me -

0:53:120:53:14

that the story was coming out too late for him.

0:53:140:53:18

It was too late to make any real difference.

0:53:180:53:22

Back in Canada, Bill took the opportunity provided by

0:53:230:53:26

his 80th birthday lecture to finally break his silence on Tunny.

0:53:260:53:30

And then, if you know the wheel patterns...

0:53:300:53:33

INDISTINCT

0:53:330:53:35

..you can try the first chi wheel

0:53:350:53:39

against the first impulse...

0:53:390:53:42

He said that when he finally did tell about it,

0:53:430:53:47

finally did speak of it, then it lifted an enormous burden,

0:53:470:53:52

and it's hard to exactly say

0:53:520:53:54

to the extent to which it may have altered his personality,

0:53:540:53:58

the personality that I first met him as.

0:53:580:54:02

Outside of a select group of academics, however,

0:54:100:54:14

few people realise the significance of these men's achievements.

0:54:140:54:17

Bill received the Order of Canada for his academic work,

0:54:170:54:21

but he was never decorated by his own country.

0:54:210:54:25

He did, however, gain the most important award he could have wished for.

0:54:400:54:44

To become a Fellow of the Royal Society

0:54:480:54:50

and to sign this charter book, you need to be a leading scientist,

0:54:500:54:54

you need to convince your peers that your work is good enough.

0:54:540:54:59

So you are refereed in the same way that a scientific paper is refereed.

0:55:000:55:04

If you cross that hurdle, Council of the Royal Society

0:55:040:55:08

will assess you as being a good enough scientist,

0:55:080:55:11

you become a Fellow, and if you get over that hurdle,

0:55:110:55:14

then you become a Fellow of the Royal Society

0:55:140:55:17

and you sign this very fine book.

0:55:170:55:20

It helps if you have a Nobel Prize tucked away somewhere.

0:55:200:55:23

In 1987, Bill signed the book.

0:55:230:55:26

He joined an illustrious group.

0:55:260:55:29

Isaac Newton,

0:55:290:55:31

Charles Darwin, Winston Churchill,

0:55:310:55:34

and William T Tutte.

0:55:340:55:37

Other names in the book are Alan Turing and Max Newman.

0:55:380:55:42

Tommy's name was never entered in it,

0:55:420:55:45

although one of his many awards

0:55:450:55:46

does show the effect of the revolution he helped begin.

0:55:460:55:49

When personal computers came in

0:55:490:55:51

in the 1980s and '90s, he bought a PC,

0:55:510:55:54

tried to work out how to use it and had difficulty,

0:55:540:55:58

so he enrolled on a course at the local college

0:55:580:56:01

to learn basic information processing,

0:56:010:56:04

and he got a certificate, here,

0:56:040:56:08

which shows that he passed an introductory course

0:56:080:56:11

in information processing,

0:56:110:56:13

so he learned how to use programs on a PC like everyone else,

0:56:130:56:18

and that was 28th June 1993, when he was 87 years old.

0:56:180:56:23

Tommy's only public recognition was to have a road

0:56:250:56:29

and an IT centre named after him in his native East End.

0:56:290:56:32

The centre has since been closed.

0:56:350:56:38

At the end of the war,

0:56:380:56:40

Flowers got a leading inventors award for his war work,

0:56:400:56:44

and this carried a monetary reward of £1,000,

0:56:440:56:49

which was quite a lot of money in those days, of course,

0:56:490:56:52

but Flowers being Flowers,

0:56:520:56:54

he shared it with his men, and so by the time he had done that,

0:56:540:56:59

he'd got about 350 quid for inventing the first electronic computer.

0:56:590:57:05

Tommy died aged 92 in 1998.

0:57:100:57:13

And Bill four years later, aged 84.

0:57:160:57:19

Bill Tutte's memorial

0:57:240:57:26

is a simple headstone in a rural Canadian cemetery,

0:57:260:57:29

and a lifetime of academic achievement.

0:57:290:57:32

Tommy's is slightly different.

0:57:320:57:35

My father was cremated and the ashes scattered in the crematorium,

0:57:360:57:40

but I think he would have recognised that his main memorial

0:57:400:57:44

is at Bletchley Park in the reconstituted Colossus.

0:57:440:57:46

As an engineer, to have a working machine

0:57:460:57:49

as your memorial is the ideal thing, really.

0:57:490:57:52

Hitler ordered this machine himself.

0:57:570:57:59

It should never, ever have been broken.

0:57:590:58:02

But the minds at Bletchley Park

0:58:030:58:06

managed to find ways of breaking it.

0:58:060:58:09

And this is an amazing triumph of mind over machines.

0:58:120:58:18

Subtitles by Red Bee Media Ltd

0:58:580:59:01

E-mail [email protected]

0:59:010:59:04

Download Subtitles

SRT

ASS