SlideShare a Scribd company logo
Navajo Code Talkers




    Nathan Mykut
Philip Johnston
• The idea to first use the Navajo’s in WWII came from
  Johnston.
• He was the son of a missionary to the Navajos and he was also
  one of the few non-Navajos who spoke their language
  fluently.
• Johnston was a WWI veteran who new about the military’s
  need for a code for WWII that could not be deciphered if
  tried.
• He also knew that Native American Languages were used in
  WWI to create and send messages.
But why the Navajo languauge..

• The Navajo language is an unwritten one with no alphabet or
  symbols and was only spoken on Navajo lands in the United
  States.
• Its syntax and tonal qualities made it very hard to
  comprehend without lots of exposure and practice with the
  language.
• It was also said that less than 30 non-Navajo’s could
  understand the language when WWII occurred and none were
  of Japanese decent.
• Also the Navajo’s themselves could encode, transmit, and
  decode a three lined English message in 20 seconds and
  machines of the time required at least 30 minutes to perform
  the same task.
Navajo language is accepted into WWII
• In 1942 Johnston met with Major General
  Clayton B. Vogel to try to convince him to use
  the language.
• After he was convinced, due to many
  extremities of the language Vogel
  recommended to the Marines to recruit 200
  Navajo’s for the war.
Navajo’s attend boot camp

• Soon after in May of 1942, 29 Navajo soldiers
  attended boot camp.
• They attended camp at Camp
  Pendleton, Oceanside, California.
Navajo’s at boot camp


• Here the first group created the Navajo code.
• By doing this they developed a dictionary and
  many different words for military terms.
• Before being sent to the Pacific theater, a
  Navajo had to memorize the dictionary and
  complete his training.
Navajo duties in war




• The code talkers’ main job was to send and receive,
  information on key military troop movements,
  orders, and other important battlefield situations
  over telephones and radios.
• They also performed general Marine duties.
Iwo Jima

• The code talkers played a key role in the Capture of Iwo Jima.
• The code talkers here transmitted over 800 errorless
  messages which helped the Marines capture the island.
• Also the entire operation to capture the island was directed
  through orders that the Navajos would receive and send.
• It was said by Major Howard Connor, 5th Marines signal
  officer, “Were it not for the Navajos, the Marines would never
  have taken Iwo Jima.”
Japanese input on the code talkers

• It was said that the Japanese were skilled code
  breakers.
• The Japanese were never able to brake the
  code used by the Navajos.
• However, they were able to decipher the
  codes that the U.S. Army and Army Air Corps
  used during the war.
Facts of the Navajo
• In 1945, about 520 Navajos served in the Marines.
• Around 375-420 of these became code talkers.
• The remaining served in the war in other ways.
• The code talkers were credited with saving countless
  number of lives through their work.
• Also the code talkers served in all six Marine divisions
  from 1942-1945.
Navajo recognition
• On June 28, 1969, the Navajo Code talkers received
  formal recognition.
• The Fourth Marine Division honored the code talkers
  with medallions commemorating their efforts in the
  war.
• Then on July 28, 1982 the President of the United
  States signed a measure stating that August 14 was
  “National Navajo Code Talkers Day.”
Code talkers today



• Today, the remaining Navajo Code Talkers
  make their headquarters at the Gallup-
  McKinley County Chamber of Commerce.
• The Navajo Code Talker Room is open to the
  public to view.
• Exhibits of the code talkers tell fascinating
  stories of these veterans and their work.
Works Cited
• quot;Cryptology: Navajo Code Talkers in World War II.quot; Naval History and
  Heritage Command. 07 May 2009
  <http://www.history.navy.mil/faqs/faq61-2.htm>.
• quot;How the Navajo Code Talkers helped win World War II.quot; On the road
  travelogue based on editor who explores West in an RV motorhome. 07
  May 2009 <http://www.outwestnewspaper.com/codetalkers.html>.
• quot;Military.com Content.quot; Benefiting the US Army, US Navy, US Air
  Force, Marine Corps, Coast Guard - Military.com. 07 May 2009
  <http://www.military.com/Content/MoreContent?file=ML_billison_bkp>.
• Navajo Code Talkers. 07 May 2009 <http://www.navajocodetalkers.org/>.
• quot;NAVAJO CODE TALKERS WW2 Native American Warriors History Series
  Honoring Indian War Veterans.quot; CALIFORNIA INDIAN EDUCATION CALIE
  Educational Tribal Website of Calif Native American Indians Families
  Reservation and Urban Communities of North America USA Southern CA.
  07 May 2009
  <http://www.californiaindianeducation.org/native_american_veterans/na
  vajo_code_talkers.html>.

More Related Content

What's hot

Major canadian battles in ww1
Major canadian battles in ww1Major canadian battles in ww1
Major canadian battles in ww1
dave865
 
The Fall of Saigon
The Fall of SaigonThe Fall of Saigon
The Fall of Saigon
Ben Dover
 
Battle of midway
Battle of midwayBattle of midway
Battle of midway
IMNDN Jayarathna
 
The New Deal
The New DealThe New Deal
The New Deal
Diana Fordham
 
The Americans Chapter 15 powerpoint
The Americans Chapter 15 powerpoint The Americans Chapter 15 powerpoint
The Americans Chapter 15 powerpoint
kprice70
 
The Gulf War
The Gulf WarThe Gulf War
The Gulf War
guest044cc4
 
The Gulf War
The Gulf WarThe Gulf War
The Gulf War
Ben Dover
 
Holocaust
HolocaustHolocaust
Pearl Harbor
Pearl HarborPearl Harbor
Pearl Harbor
christje
 
Cold war conflicts
Cold war conflictsCold war conflicts
HISTORY.pptx
HISTORY.pptxHISTORY.pptx
HISTORY.pptx
9D38SHIDHANTMITTAL
 
US History Ch. 18 Section 3 Notes
US History Ch. 18 Section 3 NotesUS History Ch. 18 Section 3 Notes
US History Ch. 18 Section 3 Notes
skorbar7
 
United States History Ch. 20 Section 4 Notes
United States History Ch. 20 Section 4 NotesUnited States History Ch. 20 Section 4 Notes
United States History Ch. 20 Section 4 Notes
skorbar7
 
Vietnam War Overview
Vietnam War OverviewVietnam War Overview
Vietnam War Overview
Joseph Sam
 
Vietnam overview-powerpoint
Vietnam overview-powerpointVietnam overview-powerpoint
Vietnam overview-powerpoint
Ekart's World Geography
 
Pearl Harbour
Pearl HarbourPearl Harbour
Pearl Harbour
Alex Thompson
 
Bay of pigs presentation
Bay of pigs presentationBay of pigs presentation
Bay of pigs presentation
annahecht
 
A c 17 us chapter 17
A c 17 us chapter 17A c 17 us chapter 17
A c 17 us chapter 17
Sandra Waters
 
The Pearl Harbor Attack
The Pearl Harbor AttackThe Pearl Harbor Attack
The Pearl Harbor Attack
Hafsah Khan
 
Iran – Iraq war
Iran – Iraq warIran – Iraq war
Iran – Iraq war
juliah
 

What's hot (20)

Major canadian battles in ww1
Major canadian battles in ww1Major canadian battles in ww1
Major canadian battles in ww1
 
The Fall of Saigon
The Fall of SaigonThe Fall of Saigon
The Fall of Saigon
 
Battle of midway
Battle of midwayBattle of midway
Battle of midway
 
The New Deal
The New DealThe New Deal
The New Deal
 
The Americans Chapter 15 powerpoint
The Americans Chapter 15 powerpoint The Americans Chapter 15 powerpoint
The Americans Chapter 15 powerpoint
 
The Gulf War
The Gulf WarThe Gulf War
The Gulf War
 
The Gulf War
The Gulf WarThe Gulf War
The Gulf War
 
Holocaust
HolocaustHolocaust
Holocaust
 
Pearl Harbor
Pearl HarborPearl Harbor
Pearl Harbor
 
Cold war conflicts
Cold war conflictsCold war conflicts
Cold war conflicts
 
HISTORY.pptx
HISTORY.pptxHISTORY.pptx
HISTORY.pptx
 
US History Ch. 18 Section 3 Notes
US History Ch. 18 Section 3 NotesUS History Ch. 18 Section 3 Notes
US History Ch. 18 Section 3 Notes
 
United States History Ch. 20 Section 4 Notes
United States History Ch. 20 Section 4 NotesUnited States History Ch. 20 Section 4 Notes
United States History Ch. 20 Section 4 Notes
 
Vietnam War Overview
Vietnam War OverviewVietnam War Overview
Vietnam War Overview
 
Vietnam overview-powerpoint
Vietnam overview-powerpointVietnam overview-powerpoint
Vietnam overview-powerpoint
 
Pearl Harbour
Pearl HarbourPearl Harbour
Pearl Harbour
 
Bay of pigs presentation
Bay of pigs presentationBay of pigs presentation
Bay of pigs presentation
 
A c 17 us chapter 17
A c 17 us chapter 17A c 17 us chapter 17
A c 17 us chapter 17
 
The Pearl Harbor Attack
The Pearl Harbor AttackThe Pearl Harbor Attack
The Pearl Harbor Attack
 
Iran – Iraq war
Iran – Iraq warIran – Iraq war
Iran – Iraq war
 

Similar to Navajo Code Talkers

Navajo Code Talkers
Navajo Code TalkersNavajo Code Talkers
Navajo Code Talkers
mbiddle14057
 
Navajo Code Talkers
Navajo Code TalkersNavajo Code Talkers
Navajo Code Talkers
MrG
 
Code talkers jordan, cameron, colby
Code talkers jordan, cameron, colbyCode talkers jordan, cameron, colby
Code talkers jordan, cameron, colby
Sharon Matney
 
Navajo code talkers
Navajo code talkersNavajo code talkers
Navajo code talkers
basswoodgirl
 
Writing your outline
Writing your outlineWriting your outline
Writing your outline
Saint John Westminster
 
Writing your outline
Writing your outlineWriting your outline
Writing your outline
Saint John Westminster
 
Writing your paper
Writing your paperWriting your paper
Writing your paper
Saint John Westminster
 
American indian month
American indian monthAmerican indian month
American indian month
Aimoooka
 
Unsung heroes navajo code talkers
Unsung heroes  navajo code talkersUnsung heroes  navajo code talkers
Unsung heroes navajo code talkers
Alex Lysenko
 
The Montford Point Marines
The Montford Point MarinesThe Montford Point Marines
The Montford Point Marines
mgysgtcarr
 
United States Special Service:
United States Special Service:United States Special Service:
United States Special Service:
nwellwood
 
Secret Code Talkers.docx
Secret Code Talkers.docxSecret Code Talkers.docx
Secret Code Talkers.docx
KrisAveinMalaay1
 
Pacific battles of world war ii
Pacific battles of world war iiPacific battles of world war ii
Pacific battles of world war ii
totok_sgj
 
Marine Corps Birthday 2008---REDONE
Marine Corps Birthday 2008---REDONEMarine Corps Birthday 2008---REDONE
Marine Corps Birthday 2008---REDONE
AngelSings4u2
 
WWII Shortened
WWII ShortenedWWII Shortened
WWII Shortened
jbeneigh
 
APUSH Lecture Ch. 26 The Pacific War
APUSH Lecture Ch. 26 The Pacific WarAPUSH Lecture Ch. 26 The Pacific War
APUSH Lecture Ch. 26 The Pacific War
bwellington
 
U:\Navajocodetalkers
U:\NavajocodetalkersU:\Navajocodetalkers
U:\Navajocodetalkers
acoffman11
 
U:\Navajocodetalkers
U:\NavajocodetalkersU:\Navajocodetalkers
U:\Navajocodetalkers
acoffman11
 
unsungheroes
unsungheroesunsungheroes
unsungheroes
Manny Mendez
 
Point
PointPoint
Point
Keikoooow
 

Similar to Navajo Code Talkers (20)

Navajo Code Talkers
Navajo Code TalkersNavajo Code Talkers
Navajo Code Talkers
 
Navajo Code Talkers
Navajo Code TalkersNavajo Code Talkers
Navajo Code Talkers
 
Code talkers jordan, cameron, colby
Code talkers jordan, cameron, colbyCode talkers jordan, cameron, colby
Code talkers jordan, cameron, colby
 
Navajo code talkers
Navajo code talkersNavajo code talkers
Navajo code talkers
 
Writing your outline
Writing your outlineWriting your outline
Writing your outline
 
Writing your outline
Writing your outlineWriting your outline
Writing your outline
 
Writing your paper
Writing your paperWriting your paper
Writing your paper
 
American indian month
American indian monthAmerican indian month
American indian month
 
Unsung heroes navajo code talkers
Unsung heroes  navajo code talkersUnsung heroes  navajo code talkers
Unsung heroes navajo code talkers
 
The Montford Point Marines
The Montford Point MarinesThe Montford Point Marines
The Montford Point Marines
 
United States Special Service:
United States Special Service:United States Special Service:
United States Special Service:
 
Secret Code Talkers.docx
Secret Code Talkers.docxSecret Code Talkers.docx
Secret Code Talkers.docx
 
Pacific battles of world war ii
Pacific battles of world war iiPacific battles of world war ii
Pacific battles of world war ii
 
Marine Corps Birthday 2008---REDONE
Marine Corps Birthday 2008---REDONEMarine Corps Birthday 2008---REDONE
Marine Corps Birthday 2008---REDONE
 
WWII Shortened
WWII ShortenedWWII Shortened
WWII Shortened
 
APUSH Lecture Ch. 26 The Pacific War
APUSH Lecture Ch. 26 The Pacific WarAPUSH Lecture Ch. 26 The Pacific War
APUSH Lecture Ch. 26 The Pacific War
 
U:\Navajocodetalkers
U:\NavajocodetalkersU:\Navajocodetalkers
U:\Navajocodetalkers
 
U:\Navajocodetalkers
U:\NavajocodetalkersU:\Navajocodetalkers
U:\Navajocodetalkers
 
unsungheroes
unsungheroesunsungheroes
unsungheroes
 
Point
PointPoint
Point
 

Recently uploaded

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

Navajo Code Talkers

  • 1. Navajo Code Talkers Nathan Mykut
  • 2. Philip Johnston • The idea to first use the Navajo’s in WWII came from Johnston. • He was the son of a missionary to the Navajos and he was also one of the few non-Navajos who spoke their language fluently. • Johnston was a WWI veteran who new about the military’s need for a code for WWII that could not be deciphered if tried. • He also knew that Native American Languages were used in WWI to create and send messages.
  • 3. But why the Navajo languauge.. • The Navajo language is an unwritten one with no alphabet or symbols and was only spoken on Navajo lands in the United States. • Its syntax and tonal qualities made it very hard to comprehend without lots of exposure and practice with the language. • It was also said that less than 30 non-Navajo’s could understand the language when WWII occurred and none were of Japanese decent. • Also the Navajo’s themselves could encode, transmit, and decode a three lined English message in 20 seconds and machines of the time required at least 30 minutes to perform the same task.
  • 4. Navajo language is accepted into WWII • In 1942 Johnston met with Major General Clayton B. Vogel to try to convince him to use the language. • After he was convinced, due to many extremities of the language Vogel recommended to the Marines to recruit 200 Navajo’s for the war.
  • 5. Navajo’s attend boot camp • Soon after in May of 1942, 29 Navajo soldiers attended boot camp. • They attended camp at Camp Pendleton, Oceanside, California.
  • 6. Navajo’s at boot camp • Here the first group created the Navajo code. • By doing this they developed a dictionary and many different words for military terms. • Before being sent to the Pacific theater, a Navajo had to memorize the dictionary and complete his training.
  • 7. Navajo duties in war • The code talkers’ main job was to send and receive, information on key military troop movements, orders, and other important battlefield situations over telephones and radios. • They also performed general Marine duties.
  • 8. Iwo Jima • The code talkers played a key role in the Capture of Iwo Jima. • The code talkers here transmitted over 800 errorless messages which helped the Marines capture the island. • Also the entire operation to capture the island was directed through orders that the Navajos would receive and send. • It was said by Major Howard Connor, 5th Marines signal officer, “Were it not for the Navajos, the Marines would never have taken Iwo Jima.”
  • 9. Japanese input on the code talkers • It was said that the Japanese were skilled code breakers. • The Japanese were never able to brake the code used by the Navajos. • However, they were able to decipher the codes that the U.S. Army and Army Air Corps used during the war.
  • 10. Facts of the Navajo • In 1945, about 520 Navajos served in the Marines. • Around 375-420 of these became code talkers. • The remaining served in the war in other ways. • The code talkers were credited with saving countless number of lives through their work. • Also the code talkers served in all six Marine divisions from 1942-1945.
  • 11. Navajo recognition • On June 28, 1969, the Navajo Code talkers received formal recognition. • The Fourth Marine Division honored the code talkers with medallions commemorating their efforts in the war. • Then on July 28, 1982 the President of the United States signed a measure stating that August 14 was “National Navajo Code Talkers Day.”
  • 12. Code talkers today • Today, the remaining Navajo Code Talkers make their headquarters at the Gallup- McKinley County Chamber of Commerce. • The Navajo Code Talker Room is open to the public to view. • Exhibits of the code talkers tell fascinating stories of these veterans and their work.
  • 13. Works Cited • quot;Cryptology: Navajo Code Talkers in World War II.quot; Naval History and Heritage Command. 07 May 2009 <http://www.history.navy.mil/faqs/faq61-2.htm>. • quot;How the Navajo Code Talkers helped win World War II.quot; On the road travelogue based on editor who explores West in an RV motorhome. 07 May 2009 <http://www.outwestnewspaper.com/codetalkers.html>. • quot;Military.com Content.quot; Benefiting the US Army, US Navy, US Air Force, Marine Corps, Coast Guard - Military.com. 07 May 2009 <http://www.military.com/Content/MoreContent?file=ML_billison_bkp>. • Navajo Code Talkers. 07 May 2009 <http://www.navajocodetalkers.org/>. • quot;NAVAJO CODE TALKERS WW2 Native American Warriors History Series Honoring Indian War Veterans.quot; CALIFORNIA INDIAN EDUCATION CALIE Educational Tribal Website of Calif Native American Indians Families Reservation and Urban Communities of North America USA Southern CA. 07 May 2009 <http://www.californiaindianeducation.org/native_american_veterans/na vajo_code_talkers.html>.