Los hablantes del código navajo: estrategias de traducción, interpretación y encriptación

Translated title of the contribution: The Navajo Code Talkers: Strategies of Translation, Interpreting and Encryption

    Research output: Contribution to journalArticlepeer-review

    Abstract

    The Navajo code talkers, recruited by the US Marine Corps during World War II, devised the encryption of 411 Navajo terms in order to protect the information transmitted by radio between US officers. In order to achieve this purpose, they resorted to strategies from translation, interpreting, sight translation as well as to the extension of an alphabet based on reduplication of the more frequent letters of the English alphabet. The strategies used for codification created several layers of concealed meanings that were not easily broken by anyone except those who had learned and memorized the Navajo code. The hermetic nature of the specialized Navajo code was instrumental in protecting crucial information in the planning of war strategies. This article describes the process of encryption and gives examples of translation and equivalence of terms and of the development of terms for which there was no equivalence. It discusses the differences and similarities between translation, interpreting and encryption and focuses on the intersection of code talkers, translators and interpreters. It shows the crucial role that an indigenous language played in enabling classified communication to lead to an unprecedented victory of the United States over the enemy.
    Translated title of the contributionThe Navajo Code Talkers: Strategies of Translation, Interpreting and Encryption
    Original languageSpanish
    Pages (from-to)153-171
    JournalInternational Journal of the Sociology of Language
    Volume2011
    Issue number207
    DOIs
    Publication statusPublished - 22 Feb 2011

    Fingerprint Dive into the research topics of 'The Navajo Code Talkers: Strategies of Translation, Interpreting and Encryption'. Together they form a unique fingerprint.

    Cite this