{"id":2394,"date":"2014-09-21T17:43:36","date_gmt":"2014-09-22T00:43:36","guid":{"rendered":"https:\/\/kljcharters.com\/blog\/?page_id=2394"},"modified":"2023-01-12T22:03:04","modified_gmt":"2023-01-13T06:03:04","slug":"national-cryptologic-museum","status":"publish","type":"page","link":"https:\/\/kljcharters.com\/blog\/galleries\/national-cryptologic-museum\/","title":{"rendered":"National Cryptologic Museum"},"content":{"rendered":"<p>June 30, 2014<\/p>\n<p>The National Cryptologic Museum is in the former Colony Seven Motel, a very unassuming building within sight&nbsp;of the National Security Agency headquarters at Fort George C. Meade, Maryland. Opened in 1993, it is filled with exhibits tracing the history of code making, code breaking, and code analysis. Outside are three aircraft representing aircraft used for &#8220;signals intelligence.&#8221;<\/p>\n<figure id=\"attachment_2395\" aria-describedby=\"caption-attachment-2395\" style=\"width: 1500px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3142.jpg?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2395\" data-permalink=\"https:\/\/kljcharters.com\/blog\/galleries\/national-cryptologic-museum\/hebern-electric-code-machine\/\" data-orig-file=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3142.jpg?fit=1500%2C1125&amp;ssl=1\" data-orig-size=\"1500,1125\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;2.8&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;Canon PowerShot G12&quot;,&quot;caption&quot;:&quot;Hebern Electric Code machine, built around 1918, was one of the first U.S. developed modern coding devices, with one rotor and nicely detailed brass segments. Like the Apple, it was Made in California, USA.&quot;,&quot;created_timestamp&quot;:&quot;1403259442&quot;,&quot;copyright&quot;:&quot;\\u00a9 2014 Lawrence I. Charters&quot;,&quot;focal_length&quot;:&quot;6.1&quot;,&quot;iso&quot;:&quot;800&quot;,&quot;shutter_speed&quot;:&quot;0.0125&quot;,&quot;title&quot;:&quot;Hebern Electric Code Machine&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Hebern Electric Code Machine\" data-image-description=\"&lt;p&gt;Hebern Electric Code machine, built around 1918, was one of the first U.S. developed modern coding devices, with one rotor and nicely detailed brass segments. Like the Apple, it was Made in California, USA.&lt;\/p&gt;\n\" data-image-caption=\"&lt;p&gt;Hebern Electric Code machine, built around 1918, was one of the first U.S. developed modern coding devices, with one rotor and nicely detailed brass segments. Like the Apple, it was Made in California, USA.&lt;\/p&gt;\n\" data-large-file=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3142.jpg?fit=530%2C398&amp;ssl=1\" class=\"size-full wp-image-2395\" src=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3142.jpg?resize=530%2C398&#038;ssl=1\" alt=\"Hebern Electric Code machine, built around 1918, was one of the first U.S. developed modern coding devices, with one rotor and nicely detailed brass segments. Like the Apple, it was Made in California, USA.\" width=\"530\" height=\"398\" srcset=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3142.jpg?w=1500&amp;ssl=1 1500w, https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3142.jpg?resize=300%2C225&amp;ssl=1 300w, https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3142.jpg?resize=1024%2C768&amp;ssl=1 1024w, https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3142.jpg?resize=768%2C576&amp;ssl=1 768w\" sizes=\"auto, (max-width: 530px) 100vw, 530px\" \/><\/a><figcaption id=\"caption-attachment-2395\" class=\"wp-caption-text\">Hebern Electric Code machine, built around 1918, was one of the first U.S. developed modern coding devices, with one rotor and nicely detailed brass segments. Like the Apple, it was Made in California, USA.<\/figcaption><\/figure>\n<figure id=\"attachment_2396\" aria-describedby=\"caption-attachment-2396\" style=\"width: 1500px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3144.jpg?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2396\" data-permalink=\"https:\/\/kljcharters.com\/blog\/galleries\/national-cryptologic-museum\/m-9-bombe-checking-machine\/\" data-orig-file=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3144.jpg?fit=1500%2C1125&amp;ssl=1\" data-orig-size=\"1500,1125\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;2.8&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;Canon PowerShot G12&quot;,&quot;caption&quot;:&quot;The M-9 Bombe Checking Machine was a US device built in large numbers to perform brute force attacks on German codes during World War II. Several machines were fed the same code to find the proper rotor settings, and once found, the code could be translated.&quot;,&quot;created_timestamp&quot;:&quot;1403259619&quot;,&quot;copyright&quot;:&quot;\\u00a9 2014 Lawrence I. Charters&quot;,&quot;focal_length&quot;:&quot;6.1&quot;,&quot;iso&quot;:&quot;800&quot;,&quot;shutter_speed&quot;:&quot;0.05&quot;,&quot;title&quot;:&quot;M-9 Bombe Checking Machine&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"M-9 Bombe Checking Machine\" data-image-description=\"&lt;p&gt;The M-9 Bombe Checking Machine was a US device built in large numbers to perform brute force attacks on German codes during World War II. Several machines were fed the same code to find the proper rotor settings, and once found, the code could be translated.&lt;\/p&gt;\n\" data-image-caption=\"&lt;p&gt;The M-9 Bombe Checking Machine was a US device built in large numbers to perform brute force attacks on German codes during World War II. Several machines were fed the same code to find the proper rotor settings, and once found, the code could be translated.&lt;\/p&gt;\n\" data-large-file=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3144.jpg?fit=530%2C398&amp;ssl=1\" class=\"size-full wp-image-2396\" src=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3144.jpg?resize=530%2C398&#038;ssl=1\" alt=\"\" width=\"530\" height=\"398\" srcset=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3144.jpg?w=1500&amp;ssl=1 1500w, https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3144.jpg?resize=300%2C225&amp;ssl=1 300w, https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3144.jpg?resize=1024%2C768&amp;ssl=1 1024w, https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3144.jpg?resize=768%2C576&amp;ssl=1 768w\" sizes=\"auto, (max-width: 530px) 100vw, 530px\" \/><\/a><figcaption id=\"caption-attachment-2396\" class=\"wp-caption-text\">The M-9 Bombe Checking Machine was a US device built in large numbers to perform brute force attacks on German codes during World War II. Several machines were fed the same code to find the proper rotor settings, and once found, the code could be translated.<\/figcaption><\/figure>\n<figure id=\"attachment_2397\" aria-describedby=\"caption-attachment-2397\" style=\"width: 1500px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3151.jpg?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2397\" data-permalink=\"https:\/\/kljcharters.com\/blog\/galleries\/national-cryptologic-museum\/lorenz-sz42-tunny-code-machine\/\" data-orig-file=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3151.jpg?fit=1500%2C1125&amp;ssl=1\" data-orig-size=\"1500,1125\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;2.8&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;Canon PowerShot G12&quot;,&quot;caption&quot;:&quot;The German SZ42 Schl\\u00fcsselzusatz, or cipher attachment, was developed by the Germans in 1942 for use by the German Army. The British nicknamed it \\&quot;Tunny,\\&quot; after a type of tuna. This seemingly random name was due to the requirement to call all German encrypted traffic \\&quot;fish,\\&quot; as a security measure.&quot;,&quot;created_timestamp&quot;:&quot;1403259706&quot;,&quot;copyright&quot;:&quot;\\u00a9 2014 Lawrence I. Charters&quot;,&quot;focal_length&quot;:&quot;6.1&quot;,&quot;iso&quot;:&quot;1000&quot;,&quot;shutter_speed&quot;:&quot;0.05&quot;,&quot;title&quot;:&quot;Lorenz SZ42 \\&quot;Tunny\\&quot; code machine&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Lorenz SZ42 &amp;#8220;Tunny&amp;#8221; code machine\" data-image-description=\"&lt;p&gt;The German SZ42 Schl\u00fcsselzusatz, or cipher attachment, was developed by the Germans in 1942 for use by the German Army. The British nicknamed it &amp;#8220;Tunny,&amp;#8221; after a type of tuna. This seemingly random name was due to the requirement to call all German encrypted traffic &amp;#8220;fish,&amp;#8221; as a security measure.&lt;\/p&gt;\n\" data-image-caption=\"&lt;p&gt;The German SZ42 Schl\u00fcsselzusatz, or cipher attachment, was developed by the Germans in 1942 for use by the German Army. The British nicknamed it &amp;#8220;Tunny,&amp;#8221; after a type of tuna. This seemingly random name was due to the requirement to call all German encrypted traffic &amp;#8220;fish,&amp;#8221; as a security measure.&lt;\/p&gt;\n\" data-large-file=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3151.jpg?fit=530%2C398&amp;ssl=1\" class=\"size-full wp-image-2397\" src=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3151.jpg?resize=530%2C398&#038;ssl=1\" alt=\"\" width=\"530\" height=\"398\" srcset=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3151.jpg?w=1500&amp;ssl=1 1500w, https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3151.jpg?resize=300%2C225&amp;ssl=1 300w, https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3151.jpg?resize=1024%2C768&amp;ssl=1 1024w, https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3151.jpg?resize=768%2C576&amp;ssl=1 768w\" sizes=\"auto, (max-width: 530px) 100vw, 530px\" \/><\/a><figcaption id=\"caption-attachment-2397\" class=\"wp-caption-text\">The German SZ42 Schl\u00fcsselzusatz, or cipher attachment, was developed by the Germans in 1942 for use by the German Army. The British nicknamed it &#8220;Tunny,&#8221; after a type of tuna. This seemingly random name was due to the requirement to call all German encrypted traffic &#8220;fish,&#8221; as a security measure.<\/figcaption><\/figure>\n<figure id=\"attachment_2398\" aria-describedby=\"caption-attachment-2398\" style=\"width: 1500px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3155.jpg?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2398\" data-permalink=\"https:\/\/kljcharters.com\/blog\/galleries\/national-cryptologic-museum\/enigma-machine-in-public-use\/\" data-orig-file=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3155.jpg?fit=1500%2C1125&amp;ssl=1\" data-orig-size=\"1500,1125\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;2.8&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;Canon PowerShot G12&quot;,&quot;caption&quot;:&quot;This Enigma machine and many variants was used by German forces throughout World War II. This particular device can be used by visitors to create their own secret messages.&quot;,&quot;created_timestamp&quot;:&quot;1403259986&quot;,&quot;copyright&quot;:&quot;\\u00a9 2014 Lawrence I. Charters&quot;,&quot;focal_length&quot;:&quot;6.1&quot;,&quot;iso&quot;:&quot;800&quot;,&quot;shutter_speed&quot;:&quot;0.05&quot;,&quot;title&quot;:&quot;Enigma machine, in public use&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Enigma machine, in public use\" data-image-description=\"&lt;p&gt;This Enigma machine and many variants was used by German forces throughout World War II. This particular device can be used by visitors to create their own secret messages.&lt;\/p&gt;\n\" data-image-caption=\"&lt;p&gt;This Enigma machine and many variants was used by German forces throughout World War II. This particular device can be used by visitors to create their own secret messages.&lt;\/p&gt;\n\" data-large-file=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3155.jpg?fit=530%2C398&amp;ssl=1\" class=\"size-full wp-image-2398\" src=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3155.jpg?resize=530%2C398&#038;ssl=1\" alt=\"\" width=\"530\" height=\"398\" srcset=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3155.jpg?w=1500&amp;ssl=1 1500w, https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3155.jpg?resize=300%2C225&amp;ssl=1 300w, https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3155.jpg?resize=1024%2C768&amp;ssl=1 1024w, https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3155.jpg?resize=768%2C576&amp;ssl=1 768w\" sizes=\"auto, (max-width: 530px) 100vw, 530px\" \/><\/a><figcaption id=\"caption-attachment-2398\" class=\"wp-caption-text\">This Enigma machine and many variants was used by German forces throughout World War II. This particular device can be used by visitors to create their own secret messages.<\/figcaption><\/figure>\n<figure id=\"attachment_2399\" aria-describedby=\"caption-attachment-2399\" style=\"width: 1125px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3159.jpg?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2399\" data-permalink=\"https:\/\/kljcharters.com\/blog\/galleries\/national-cryptologic-museum\/thinking-machines-cm-5\/\" data-orig-file=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3159.jpg?fit=1125%2C1500&amp;ssl=1\" data-orig-size=\"1125,1500\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;2.8&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;Canon PowerShot G12&quot;,&quot;caption&quot;:&quot;This Connection Machine CM-5 was built by the Thinking Machines Corp. It was used by NSA from 1991 to 1997, and was called \\&quot;Frostburg,\\&quot; after a college town in western Maryland. The many blinking lights are decorative.&quot;,&quot;created_timestamp&quot;:&quot;1403262828&quot;,&quot;copyright&quot;:&quot;\\u00a9 2014 Lawrence I. Charters&quot;,&quot;focal_length&quot;:&quot;6.1&quot;,&quot;iso&quot;:&quot;1600&quot;,&quot;shutter_speed&quot;:&quot;0.066666666666667&quot;,&quot;title&quot;:&quot;Thinking Machines CM-5&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Thinking Machines CM-5\" data-image-description=\"&lt;p&gt;This Connection Machine CM-5 was built by the Thinking Machines Corp. It was used by NSA from 1991 to 1997, and was called &amp;#8220;Frostburg,&amp;#8221; after a college town in western Maryland. The many blinking lights are decorative.&lt;\/p&gt;\n\" data-image-caption=\"&lt;p&gt;This Connection Machine CM-5 was built by the Thinking Machines Corp. It was used by NSA from 1991 to 1997, and was called &amp;#8220;Frostburg,&amp;#8221; after a college town in western Maryland. The many blinking lights are decorative.&lt;\/p&gt;\n\" data-large-file=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3159.jpg?fit=530%2C707&amp;ssl=1\" class=\"size-full wp-image-2399\" src=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3159.jpg?resize=530%2C707&#038;ssl=1\" alt=\"\" width=\"530\" height=\"707\" srcset=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3159.jpg?w=1125&amp;ssl=1 1125w, https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3159.jpg?resize=225%2C300&amp;ssl=1 225w, https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3159.jpg?resize=768%2C1024&amp;ssl=1 768w, https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3159.jpg?w=1060&amp;ssl=1 1060w\" sizes=\"auto, (max-width: 530px) 100vw, 530px\" \/><\/a><figcaption id=\"caption-attachment-2399\" class=\"wp-caption-text\">This Connection Machine CM-5 was built by the Thinking Machines Corp. It was used by NSA from 1991 to 1997, and was called &#8220;Frostburg,&#8221; after a college town in western Maryland. The many blinking lights are decorative.<\/figcaption><\/figure>\n<figure id=\"attachment_2400\" aria-describedby=\"caption-attachment-2400\" style=\"width: 1500px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3161.jpg?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2400\" data-permalink=\"https:\/\/kljcharters.com\/blog\/galleries\/national-cryptologic-museum\/imz-ural-motorcycle\/\" data-orig-file=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3161.jpg?fit=1500%2C1125&amp;ssl=1\" data-orig-size=\"1500,1125\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;2.8&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;Canon PowerShot G12&quot;,&quot;caption&quot;:&quot;This Soviet made IMZ-Ural motorcycle is a Soviet copy of a German BMW R-71 motorcycle from 1941. It was captured from the North Vietnamese Army by the U.S. during the Vietnam War, and has not a thing to do with cryptanalysis.&quot;,&quot;created_timestamp&quot;:&quot;1403263311&quot;,&quot;copyright&quot;:&quot;\\u00a9 2014 Lawrence I. Charters&quot;,&quot;focal_length&quot;:&quot;6.1&quot;,&quot;iso&quot;:&quot;500&quot;,&quot;shutter_speed&quot;:&quot;0.016666666666667&quot;,&quot;title&quot;:&quot;IMZ-Ural motorcycle&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"IMZ-Ural motorcycle\" data-image-description=\"&lt;p&gt;This Soviet made IMZ-Ural motorcycle is a Soviet copy of a German BMW R-71 motorcycle from 1941. It was captured from the North Vietnamese Army by the U.S. during the Vietnam War, and has not a thing to do with cryptanalysis.&lt;\/p&gt;\n\" data-image-caption=\"&lt;p&gt;This Soviet made IMZ-Ural motorcycle is a Soviet copy of a German BMW R-71 motorcycle from 1941. It was captured from the North Vietnamese Army by the U.S. during the Vietnam War, and has not a thing to do with cryptanalysis.&lt;\/p&gt;\n\" data-large-file=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3161.jpg?fit=530%2C398&amp;ssl=1\" class=\"size-full wp-image-2400\" src=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3161.jpg?resize=530%2C398&#038;ssl=1\" alt=\"\" width=\"530\" height=\"398\" srcset=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3161.jpg?w=1500&amp;ssl=1 1500w, https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3161.jpg?resize=300%2C225&amp;ssl=1 300w, https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3161.jpg?resize=1024%2C768&amp;ssl=1 1024w, https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3161.jpg?resize=768%2C576&amp;ssl=1 768w\" sizes=\"auto, (max-width: 530px) 100vw, 530px\" \/><\/a><figcaption id=\"caption-attachment-2400\" class=\"wp-caption-text\">This Soviet-made IMZ-Ural motorcycle is a Soviet copy of a German BMW R-71 motorcycle from 1941. It was captured from the North Vietnamese Army by the U.S. during the Vietnam War, and has not a thing to do with cryptanalysis.<\/figcaption><\/figure>\n<figure id=\"attachment_2401\" aria-describedby=\"caption-attachment-2401\" style=\"width: 1500px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3165.jpg?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2401\" data-permalink=\"https:\/\/kljcharters.com\/blog\/galleries\/national-cryptologic-museum\/rosetta-stone\/\" data-orig-file=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3165.jpg?fit=1500%2C1125&amp;ssl=1\" data-orig-size=\"1500,1125\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;2.8&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;Canon PowerShot G12&quot;,&quot;caption&quot;:&quot;Outside the National Cryptologic Museum gift store is this replica of the Rosetta Stone. Created around 196 BC, it displays a decree from an Egyptian king, written in Egyptian hieroglyphs, Demotic script and ancient Greek. Discovered by a French soldier during France&#039;s invasion of Egypt in 1799, it provided the key to unlocking Egyptian hieroglyphs, much as modern code breakers look for keys in breaking coded texts. The real Rosetta Stone is on display at the British Museum in London.&quot;,&quot;created_timestamp&quot;:&quot;1403265784&quot;,&quot;copyright&quot;:&quot;\\u00a9 2014 Lawrence I. Charters&quot;,&quot;focal_length&quot;:&quot;6.1&quot;,&quot;iso&quot;:&quot;1000&quot;,&quot;shutter_speed&quot;:&quot;0.05&quot;,&quot;title&quot;:&quot;Rosetta Stone&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Rosetta Stone\" data-image-description=\"&lt;p&gt;Outside the National Cryptologic Museum gift store is this replica of the Rosetta Stone. Created around 196 BC, it displays a decree from an Egyptian king, written in Egyptian hieroglyphs, Demotic script and ancient Greek. Discovered by a French soldier during France&amp;#8217;s invasion of Egypt in 1799, it provided the key to unlocking Egyptian hieroglyphs, much as modern code breakers look for keys in breaking coded texts. The real Rosetta Stone is on display at the British Museum in London.&lt;\/p&gt;\n\" data-image-caption=\"&lt;p&gt;Outside the National Cryptologic Museum gift store is this replica of the Rosetta Stone. Created around 196 BC, it displays a decree from an Egyptian king, written in Egyptian hieroglyphs, Demotic script and ancient Greek. Discovered by a French soldier during France&amp;#8217;s invasion of Egypt in 1799, it provided the key to unlocking Egyptian hieroglyphs, much as modern code breakers look for keys in breaking coded texts. The real Rosetta Stone is on display at the British Museum in London.&lt;\/p&gt;\n\" data-large-file=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3165.jpg?fit=530%2C398&amp;ssl=1\" class=\"size-full wp-image-2401\" src=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3165.jpg?resize=530%2C398&#038;ssl=1\" alt=\"\" width=\"530\" height=\"398\" srcset=\"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3165.jpg?w=1500&amp;ssl=1 1500w, https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3165.jpg?resize=300%2C225&amp;ssl=1 300w, https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3165.jpg?resize=1024%2C768&amp;ssl=1 1024w, https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3165.jpg?resize=768%2C576&amp;ssl=1 768w\" sizes=\"auto, (max-width: 530px) 100vw, 530px\" \/><\/a><figcaption id=\"caption-attachment-2401\" class=\"wp-caption-text\">Outside the National Cryptologic Museum gift store is this replica of the Rosetta Stone. Created around 196 BC, it displays a decree from an Egyptian king, written in Egyptian hieroglyphs, Demotic script and ancient Greek. Discovered by a French soldier during France&#8217;s invasion of Egypt in 1799, it provided the key to unlocking Egyptian hieroglyphs, much as modern code breakers look for keys in breaking coded texts. The real Rosetta Stone is on display at the British Museum in London.<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>June 30, 2014 The National Cryptologic Museum is in the former Colony Seven Motel, a very unassuming building within sight&nbsp;of the National Security Agency headquarters at Fort George C. Meade, Maryland. Opened in 1993, it is filled with exhibits tracing <a class=\"more-link\" href=\"https:\/\/kljcharters.com\/blog\/galleries\/national-cryptologic-museum\/\">Continue reading <span class=\"screen-reader-text\">  National Cryptologic Museum<\/span><span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":2398,"parent":2332,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-fullwidth.php","meta":{"_crdt_document":"","ngg_post_thumbnail":0,"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-2394","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>National Cryptologic Museum - Kathleen Charters and Lawrence Charters<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kljcharters.com\/blog\/galleries\/national-cryptologic-museum\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"National Cryptologic Museum - Kathleen Charters and Lawrence Charters\" \/>\n<meta property=\"og:description\" content=\"June 30, 2014 The National Cryptologic Museum is in the former Colony Seven Motel, a very unassuming building within sight&nbsp;of the National Security Agency headquarters at Fort George C. Meade, Maryland. Opened in 1993, it is filled with exhibits tracing Continue reading  National Cryptologic Museum&rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kljcharters.com\/blog\/galleries\/national-cryptologic-museum\/\" \/>\n<meta property=\"og:site_name\" content=\"Kathleen Charters and Lawrence Charters\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/lawrence.charters\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-13T06:03:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3155.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1125\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@lcharters\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/kljcharters.com\\\/blog\\\/galleries\\\/national-cryptologic-museum\\\/\",\"url\":\"https:\\\/\\\/kljcharters.com\\\/blog\\\/galleries\\\/national-cryptologic-museum\\\/\",\"name\":\"National Cryptologic Museum - Kathleen Charters and Lawrence Charters\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kljcharters.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/kljcharters.com\\\/blog\\\/galleries\\\/national-cryptologic-museum\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/kljcharters.com\\\/blog\\\/galleries\\\/national-cryptologic-museum\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/kljcharters.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/img_3155.jpg?fit=1500%2C1125&ssl=1\",\"datePublished\":\"2014-09-22T00:43:36+00:00\",\"dateModified\":\"2023-01-13T06:03:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/kljcharters.com\\\/blog\\\/galleries\\\/national-cryptologic-museum\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/kljcharters.com\\\/blog\\\/galleries\\\/national-cryptologic-museum\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/kljcharters.com\\\/blog\\\/galleries\\\/national-cryptologic-museum\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/kljcharters.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/img_3155.jpg?fit=1500%2C1125&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/kljcharters.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/img_3155.jpg?fit=1500%2C1125&ssl=1\",\"width\":1500,\"height\":1125,\"caption\":\"This Enigma machine and many variants was used by German forces throughout World War II. This particular device can be used by visitors to create their own secret messages.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/kljcharters.com\\\/blog\\\/galleries\\\/national-cryptologic-museum\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/kljcharters.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Galleries\",\"item\":\"https:\\\/\\\/kljcharters.com\\\/blog\\\/galleries\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"National Cryptologic Museum\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/kljcharters.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/kljcharters.com\\\/blog\\\/\",\"name\":\"Kathleen Charters and Lawrence Charters\",\"description\":\"Explorations large and small\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/kljcharters.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"National Cryptologic Museum - Kathleen Charters and Lawrence Charters","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kljcharters.com\/blog\/galleries\/national-cryptologic-museum\/","og_locale":"en_US","og_type":"article","og_title":"National Cryptologic Museum - Kathleen Charters and Lawrence Charters","og_description":"June 30, 2014 The National Cryptologic Museum is in the former Colony Seven Motel, a very unassuming building within sight&nbsp;of the National Security Agency headquarters at Fort George C. Meade, Maryland. Opened in 1993, it is filled with exhibits tracing Continue reading  National Cryptologic Museum&rarr;","og_url":"https:\/\/kljcharters.com\/blog\/galleries\/national-cryptologic-museum\/","og_site_name":"Kathleen Charters and Lawrence Charters","article_publisher":"https:\/\/www.facebook.com\/lawrence.charters","article_modified_time":"2023-01-13T06:03:04+00:00","og_image":[{"width":1500,"height":1125,"url":"https:\/\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3155.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@lcharters","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/kljcharters.com\/blog\/galleries\/national-cryptologic-museum\/","url":"https:\/\/kljcharters.com\/blog\/galleries\/national-cryptologic-museum\/","name":"National Cryptologic Museum - Kathleen Charters and Lawrence Charters","isPartOf":{"@id":"https:\/\/kljcharters.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kljcharters.com\/blog\/galleries\/national-cryptologic-museum\/#primaryimage"},"image":{"@id":"https:\/\/kljcharters.com\/blog\/galleries\/national-cryptologic-museum\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3155.jpg?fit=1500%2C1125&ssl=1","datePublished":"2014-09-22T00:43:36+00:00","dateModified":"2023-01-13T06:03:04+00:00","breadcrumb":{"@id":"https:\/\/kljcharters.com\/blog\/galleries\/national-cryptologic-museum\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kljcharters.com\/blog\/galleries\/national-cryptologic-museum\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kljcharters.com\/blog\/galleries\/national-cryptologic-museum\/#primaryimage","url":"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3155.jpg?fit=1500%2C1125&ssl=1","contentUrl":"https:\/\/i0.wp.com\/kljcharters.com\/blog\/wp-content\/uploads\/2023\/01\/img_3155.jpg?fit=1500%2C1125&ssl=1","width":1500,"height":1125,"caption":"This Enigma machine and many variants was used by German forces throughout World War II. This particular device can be used by visitors to create their own secret messages."},{"@type":"BreadcrumbList","@id":"https:\/\/kljcharters.com\/blog\/galleries\/national-cryptologic-museum\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kljcharters.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Galleries","item":"https:\/\/kljcharters.com\/blog\/galleries\/"},{"@type":"ListItem","position":3,"name":"National Cryptologic Museum"}]},{"@type":"WebSite","@id":"https:\/\/kljcharters.com\/blog\/#website","url":"https:\/\/kljcharters.com\/blog\/","name":"Kathleen Charters and Lawrence Charters","description":"Explorations large and small","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kljcharters.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P4BWbR-CC","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/kljcharters.com\/blog\/wp-json\/wp\/v2\/pages\/2394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kljcharters.com\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kljcharters.com\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kljcharters.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kljcharters.com\/blog\/wp-json\/wp\/v2\/comments?post=2394"}],"version-history":[{"count":2,"href":"https:\/\/kljcharters.com\/blog\/wp-json\/wp\/v2\/pages\/2394\/revisions"}],"predecessor-version":[{"id":2535,"href":"https:\/\/kljcharters.com\/blog\/wp-json\/wp\/v2\/pages\/2394\/revisions\/2535"}],"up":[{"embeddable":true,"href":"https:\/\/kljcharters.com\/blog\/wp-json\/wp\/v2\/pages\/2332"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kljcharters.com\/blog\/wp-json\/wp\/v2\/media\/2398"}],"wp:attachment":[{"href":"https:\/\/kljcharters.com\/blog\/wp-json\/wp\/v2\/media?parent=2394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}