Topic: Can you Identify these Flashy Cars from The '70s?
With this, there was hardly any need to triangulate-the escort could just run down the precise bearing provided, estimating range from the signal strength, and use look-outs or radar for final positioning. In good visibility, a U-boat might try and outrun an escort on the surface whilst out of gun range - most U-boat types had a faster maximum speed on the surface than, for instance, a Flower-class corvette, while a Black Swan-class sloop was only marginally faster. Axis aircraft, mostly Fw 200 Condors, performing shadow surveillance-tailing the convoy out of range of the convoy's guns-posed a serious risk of reporting back the convoy's course and position so that U-boats could then be directed on to the convoy. Find out about some of these suspects on the next page. In August 1940, the British began use of their "bombe" computer which, when presented with an intercepted German Enigma message, suggested possible settings with which the Enigma cipher machine had been programmed. A reverse-engineered Enigma machine in British hands could then be programmed with each set of suggested settings in turn until the message was successfully deciphered. An escort could then run in the direction of the signal and attack the U-boat, or at least force it to submerge (causing it to lose contact), which might prevent an attack on the convoy.