Feeds

Bletchley Park spat 'halts work on rare German cipher machine'

Trust denies claims that priceless working Lorenz device left unmaintained...

Build a business case: developing custom apps

An engineer has claimed the war between the Bletchley Park Trust and the National Museum of Computing has prevented him from repairing one of the few WWII German cipher machines that remain in working order.

On GreenKeys, a mailing list dedicated to the discussion of older radio teletype (RTTY) gear, engineer Craig Sawyers warned the "total mess" at Bletchley was hampering the conservation of priceless World War II artefacts.

Sawyers worked on the restoration of the German-made Lorenz SZ42, which the Nazis used to transmit coded messages, and claimed the ongoing tensions between Bletchley Park and the National Museum of Computing have prevented him from continuing his work.

The mailing list letter read: "The continuing, blood on the walls dispute essentially locks me out of repairing the only functional SZ42 on the planet."

The letter continued, saying that he had brought the machine to a cipher challenge in Germany five years ago. But when it was switched on in Germany, the mains transformer blew.

"It was kind of ironic," Sawyers added.

Visitors to Bletchley Park used to also be shown around the National Museum of Computing, a separate institution which houses the Colossus code-breaking machine.

But Bletchley tour parties are no longer brought into the Museum and must pay a separate fee to visit it.

The museum used to have a good relationship with the Bletchley Park Trust, but this has foundered since CEO Iain Standen took the helm of the heritage site.

Sawyers added: "The only mention of the National Museum of Computing on the Bletchley website is buried here. What it does not mention is that you cannot visit the site just to see Colossus - you have to pay the site entry fee at the gate and then as a result of Byzantine politics pay extra to see everything to do with Colossus."

The National Museum of Computing claimed that the Trust were building a fence to make sure the two institutions are kept entirely apart.

"We owe it to the men and women who worked at Bletchley Park during the war and to those who have helped save Bletchley Park since the 1990s to play our part in telling the full code-breaking story," a spokesman said.

"Unfortunately, Bletchley Park Trust have told us that they will not negotiate until recently agreed debts are paid, even though a timetable for payment has already been agreed.

"The Bletchley Park site as a whole is a major tool to help educate young people. We should together be celebrating this history and the development of the British computing industry rather than erecting fences and splitting a heritage site."

We have written to Sawyers to confirm he wrote the post, but he has not yet replied.

The Bletchley Park Trust issued a long statement rebuffing many of the claims in Sawyers' post.

"The Lorenz machine has, from the outset of its arrival at Bletchley Park, been on loan to the Bletchley Park Trust by GCHQ, one of a number of artefacts and documents GCHQ has loaned to the Bletchley Park Trust, dating back to the 1990s," a spokeswoman said.

"It is now on permanent public display, in a secure case pertinent to its historic value, in an exhibition in the Block B museum that tells the remarkable story of the breaking of Lorenz by the Bletchley Park Codebreakers. All this [is] a wonderful marker of how far the Bletchley Park Trust has progressed in ten years."

It also denied it was neglecting the upkeep of the German cipher machine:

The Bletchley Park Trust now employs a Curator; the custodian of the Trust’s collection, responsible for its protection, preservation and conservation, in line with the standards you would expect for its value to the nation.

TNMOC is supposed to pay £100,000 to the Trust for its "Block H" building, where the Colossus and Tunny are located. It does not receive any government funding.

A number of readers have contacted us to share their thoughts about this story. If you know something about the Battle of Bletchley, please do contact us – click the author's name at the top to send an email or get stuck into the comments below. ®

The essential guide to IT transformation

More from The Register

next story
Reg man looks through a Glass, darkly: Google's toy ploy or killer tech specs?
Tip: Put the shades on and you'll look less of a spanner
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
One step closer to ROBOT BUTLERS: Dyson flashes vid of VACUUM SUCKER bot
Latest cleaner available for world+dog in September
Samsung Gear S: Quick, LAUNCH IT – before Apple straps on iWatch
Full specs for wrist-mounted device here ... but who'll buy it?
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Now that's FIRE WIRE: HP recalls 6 MILLION burn-risk laptop cables
Right in the middle of Burning Mains Man week
Apple's iWatch? They cannae do it ... they don't have the POWER
Analyst predicts fanbois will have to wait until next year
Tim Cook in Applerexia fears: New MacBook THINNER THAN EVER
'Supply chain sources' give up the goss on new iLappy
HUGE iPAD? Maybe. HUGE ADVERTS? That's for SURE
Noo! Hand not big enough! Don't look at meee!
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.