Quantcast
Channel: Christos military and intelligence corner
Viewing all 538 articles
Browse latest View live

Naval Enigma compromise and the spy in the United States Department of the Navy

$
0
0
Signals intelligence and codebreaking played an important role in WWII. British and American codebreakers solved many important Axis crypto systems, such as the German Enigma machine and the Japanese Navy’s code JN25. 



The solution of the German military’s plugboard Enigmawas mostly carried out at Bletchley Park with Hut 6 attacking Army and Airforce ‘keys’, while Hut 8 worked on the naval traffic. During the Battle of the Atlantic the German U-boats relied mostly on the Enigma for their communications with U-boat Command, so the solution of these messages was a top priority for the Allied codebreakers.

Unfortunately the fact that the Navy used stricter procedures than the Army and Airforce plus their introduction of a separate 4-rotor Enigma machine in 1942 meant that in the period March 1941- September ‘43 the successes of Bletchley Park were spasmodic and suffered from time lag. Things changed in September since the new 4-rotor ‘Bombes’ built by the Americans were introduced and they could solve the Enigma settings reliably and in a timely manner (at least until the introduction of individual Enigma keys for U-boats in late 1944).



According to several books and articles the Germans never suspected that their codes were being read and they thought that the Enigma was unbreakable. The reality was a slightly more complex than that as can be seen from the numerous security measures they implemented during the war. Would they have taken so many precautions if they considered Enigma unbreakable?

Since the Enigma was used in huge numbers it was accepted that during the war both cipher machines and valid keylists had fallen into Allied hands. Thus current traffic could be compromised but only until new settings were introduced.



Another question is whether the Germans considered the Enigma to be vulnerable to cryptanalysis. After all it wasn’t every day that Enigma machines and keylists would fall into enemy hands. Here the story diverges since the different codebreaking departments in the Army (Inspectorate 7/VI), Navy (B-Dienst), Airforce (Chi Stelle) and Armed Forces High Command (OKW/Chi) had different opinions on the matter. Unfortunately we don’t know the full story of their security investigations as the relevant files have not been studied in detail but it is clear that they constantly researched ways of solving the Enigma.

In this area the Army codebreakers proved more suspicious than their counterparts in other departments and they always worried about the possibility of solution of the machine by the enemy. During the war they not only studied the Enigma but also interrogated Polish personnel regarding their solution of the prewar Enigma, known to the Germans as case ‘Wicher’.



The analysts of the naval cipher security department on the other hand seems to have shown a lack of imagination when it came to researching the Enigma. For some reason they constantly downplayed the possibility of cryptanalytic solution and attributed enemy successes to captured cipher material.

This can be seen from one of their reports found in NARA-RG 457- Entry 9032- box 1279 – NR 3775 ‘German Navy U-boat logs’. In the summer of 1943 the military intelligence service Abwehr learned from a Swiss-American working in the US Department of the Navy that the operational orders to U-boats were decoded by the Allies and all messages read.


According to google translate:



At 10.8. received the following message via KO Switzerland :

‘‘For several months, deciphering German naval codes with regard to operating Uboat commands succeeded. All commands are read.



Additional: Source Swiss-American secretary in high position in the U.S. Navy Department.‘’



It is not clear if this person was an Abwehr agent or someone who revealed this information to Swiss diplomatic or intelligence authorities and they in turn shared this information with the Germans.

The response of the security department was that the continuous reading of their communications by the Allies was out of the question. There was however the possibility of losing cipher material in one of the sunken U-boats. For that reason they instituted a change of the Enigma settings using the keyword ‘Andromeda’.



The emergency key-‘Stichwort’, worked on the following system according to the study ‘Cryptographic History of Work on the German Naval Enigma’, p6:

"Stichwort".



19. The "Stichwort" was a device used when the enemy suspected that the keys had been captured, or wished to protect himself from the danger of this happening. An example will make its nature and method of use clear.

20. All holders of the machine (at the time of this example) held a sealed envelope labelled PERSEUS. An order was sent out "STICHWORTHEFEHL PERSEUS". The holders opened their envelopes and found the word DANZIG inside (the "Kennwort"). They then "applied" DANZIG to the key as follows (1) D = 4 was added to the number of each wheel in the W.O. (2) A, N, Z respectively were added to the three letters of the Ringstellung. (3) I = 9 was added to each letter in the Stecker. This change was applied to all keys until further notice.



21. Suppose for instance the key for the day had been W.O. 275, Rings. BYL, Stecker A/F, B/J, D/X.... . The modified key would then be W.O. 631, Ring. CML, Stecker J/O, K/S, M/G .... .

22. This is a security measure with some "nuisance value" but is clearly not equivalent to a new key. Given that a key has been captured (the assumption on which the Stichwort is based) then - once we have discovered what is happening - there are 8 W.O.'s and 26 sets of Stecker to try; this might certainly be tiresome but does not compare with the 336 W.O.'s and 140 million million stecker on a completely unknown key.



The naval codebreakers would change their minds regarding the theoretical solution of their 4-rotor Enigma in late 1944 when one of their analysts named Hans-Joachim Frowein showed that it could be solved on a ‘crib’ of 25 letters (suspected plaintext in the ciphertext).

 
This report is TICOM I-38 and is available from Ticom Archive.

In the news

Update

Interesting WWII documentary

$
0
0



Best seen under the influence of hallucinogenic drugs.

Update

The War Nerd returns

GCHQ Middle East base

Operation Overlord 70th anniversary

$
0
0
On 6 June 1944 the Anglo-Americans landed in Normandy, France and proceeded to liberate Nazi occupied Europe.



The anniversary of this operation will undoubtedly lead to statements in magazines and newspapers attributing the success of ‘Overlord’ to a disinformation campaign. According to this view the Germans could have defeated the landings but they were tricked into holding most of their forces in reserve so they could be used against the ‘real’ landings expected near Pas de Calais.

For an opposing view read the following essays:



2). Normandy 1944 – What-if scenarios and the Fortitude deception



4). The Jellyfish radio-teletype link



6). Book review – Normandy 1944

Update

The codebreakers of the Japanese Foreign Ministry and the compromise of US codes prior to Pearl Harbor

$
0
0
Imperial Japan entered WWII with three separate codebreaking agencies under the control of the Army, Navy and Foreign Ministry. The Army and Navy signal intelligence agencies intercepted foreign radio traffic and decrypted several military and civilian US, UK, Chinese and Soviet cryptosystems. However relations between these two organizations were strained and in many cases they withheld valuable information from each other. Compared to them the decryption department of the Foreign Ministry was much smaller and had access to limited resources, both in terms of manpower and radio equipment.



Information on the decryption department of the Japanese Foreign Ministry is limited since their archives were destroyed twice during the war. First in a bombing on 25 May 1945 and then in August 1945, when they were ordered by their superiors to burn all secret documents.

According to the recently declassified TICOM report DF-169 ‘Cryptanalytic section Japanese Foreign Office’ this department was established in 1923 and by the end of WWII had approximately 14 officials and 16 clerks. The radio intercept unit supplying it with messages had a station in Tokyo equipped with 10 receivers and 19 operators. They usually intercepted 40-60 messages per day with 100 being the maximum.





The emphasis was on the solution of the codes of the United States, Britain, China and France but some German, Turkish, Spanish, Italian, Swiss, Thailand and Portuguese codes were also read. Despite their limited resources it seems that the Foreign Ministry’s codebreakers were able to achieve their goals mainly thanks to compromised material that they received from their Army and Navy counterparts.

 
Overview of exploited foreign codes



British codes

In the case of Britain the Government Telegraph Code, R Code, Interdepartmental Cypher and Cypher M were read.



According to one of the Japanese analysts a 4-figure diplomatic codebook and its substitution tables were received from either the Army or the Navy in January 1940, thus a great deal of the traffic could be read. Even though the substitution tables changed every 4-6 months the Japanese were able to get a copy roughly one month after their introduction.

 
Chinese codes



The Chinese government used several codebooks but only a few were enciphered properly. This allowed the Japanese to solve most of the traffic. One of the codebooks they solved was the ’27 DEMPON’.

 
French codes



Some French codes and their substitution tables were received from the Army and thus it was possible to solve this traffic. These were called ‘PC 149’, ‘PC 150’, ‘PC 151’ and ‘CGX’ by the Japanese and they were used by the French embassies in Tokyo, Peking, Hanoi, Nanking and Chungking.

 
It seems that the numbered codes were used mostly for reports on administrative matters while ‘CGX’ carried important reports on the political and military developments.



German codes

Even though Japan and Germany were allies in WWII it seems that the Japanese authorities did not neglect to solve German diplomatic codes. According to DF-169, p2 a German diplomatic unenciphered code of 100.000 values was solved in part and from 1942 it was possible to read some messages even when they were enciphered with additive sequences, thanks to the reuse of the additive pads.


This must have been the German Foreign Ministry’s basic codebook used unenciphered for low level messages, enciphered with reusable additive pads for important messages and also with one time pads for the most important traffic.



 Swiss codes

The code of the Swiss legation in Tokyo was received from the military in summer 1945 and messages were read till the end of the war.



USA codes

The main target of the Foreign Ministry’s codebreakers were the diplomatic systems of the United States. The State Department used the Gray and Brown codes, the enciphered codebooks A1, B1, C1, D1 and the M-138-A strip cipher. By 1940 the Japanese had managed to get copies of Gray, Brown, A1 and several sets of strips of the M-138-A.



 
With these codes and with the M-138-A strips and keylists the Japanese could read all US diplomatic traffic in the period 1940-41. The importance of this compromise for Japanese foreign policy is something that needs to be investigated by historians.



During the war they received more strips and keylists from their Finnish and German allies.



Compromise of Soviet communications in WWII

Decoded messages in the Finnish national archives

$
0
0
The history of signals intelligence and codebreaking is usually focused on the achievements of the codebreakers of large countries such as the USA, Britain, Germany, Soviet Union etc. However small nations have often managed to achieve great victories in the field of signals intelligence despite being hampered by limited resources.



The Finnish signals intelligence service of WWII was able to solve many foreign cryptosystems including Soviet military and NKVD codes and the diplomatic systems of the United States. Many of these messages can be found in the Finnish national archives. The decoded diplomatic traffic can be found in folders T-21810/4 and T-21810/5.

It is interesting to note that a lot of the traffic from Bern, Switzerland consists of reports on the German military and the war industry. These were probably prepared by the OSS Bern Station and the US military attaché Barnwell R. Legge.

Here are some of these messages:



Folder T-21810/4 –  messages of 1943



 
The Vatican requests information on POW officers in Crossville, Tennessee

 
Report on Soviet losses in 1941 by US Ambassador William Harrison Standley




Reports by US ambassador Laurence Steinhardt on negotiations between SU foreign minister Molotov and Turkish government

 
US report on Turkish asbestos exports


Office of Strategic Services requests that US embassy in Turkey pay 10.000 dollars to Albanian minister Dshadshuli





US report from Bern regarding shipping of raw materials essential to the German war effort

 
US report from Bern on German synthetic fuel production





Report by General Barnwell R. Legge, US military attaché in Bern, on German manpower reserves


 
Folder T-21810/5 –  messages of 1944



Turkish report on the troops of the Soviet Ukrainian Front

 
 
Turkish account of Molotov speeches regarding peace negotiations with Finland
 
US report from Bern on French resistance

 
US report from Bern on amount of food in the Netherlands


Report on French industry from British ambassador in Switzerland Clifford Norton


US reports from Bern on German war industry










Note: The messages in the Finnish archives were located and copied for me by the researcher Martti Kujansuu.

Update

Detailed report on the Soviet T-34/85 tank

$
0
0
After spending months trying to track down this report I’ve finally managed to get a copy through the CIA’s freedom of information act office.



The report is called ‘ENGINEERING ANALYSIS OF THE RUSSIAN T34/85 TANK’ and contains analysis of all the components of a Soviet T-34/85 tank captured in Korea.

 
 
 
 


First impressions



The T-34/85 seems to have been improved in terms of performance and reliability compared to the T-34/76 examined by US experts at Aberdeen in WWII. However the transmission failed again.


 

Also the vehicle examined still had the older 4-speed transmission and no radio onboard. I thought all T-34/85’s had these…

The report is 453 pages long, so it will take me some time to scan it. In the meantime read WWII Myths - T-34 Best Tank of the war.

Update


Mega update of the T-34 myth essay

Update

Index

$
0
0
USA codes



Army Command and Administrative Network, IBM Radiotype and APO numbers



US Military Strip Ciphers


The State Department’s strip cipher – no clear cut answers



State Department’s strip cipher – reuse of alphabet strips and key lists



Mister David A.Salmon - The State Department’s master of ciphers



Allen Dulles and the compromise of OSS codes in WWII



The American M-209 cipher machine



The Slidex code



The US AN/GSQ-1 (SIGJIP) speech scrambler




 
Soviet codes


Soviet signals intelligence and the German Enigma cipher machine



NKVD operational and high level codes



The Forschungsamt’s biggest success



Bamford, the Russian ‘FISH’ and Unteroffizier Karrenberg - part 1, part 2, part 3

German exploitation of Soviet radio-facsimile traffic



Soviet Diplomatic Code 26 and the elusive Dr Roeder



The Soviet K-37 ‘Crystal’ cipher machine



Soviet naval codes and the Arctic convoys



Soviet cipher teleprinters of WWII



German signals intelligence and the Stalingrad offensive




 
British codes


The British War Office Cypher



The British Interdepartmental Cypher



B-Dienst vs Bletchley Park - The invasion of Norway and the Battle of the Atlantic



Rommel’s Italian savior



SOE cryptosystems – The German view



Typex operational procedures




 

Polish codes



Solution of prewar Polish diplomatic code by OKW/Chi



Decoding the Warsaw Uprising



Forschungsamt success with Polish diplomatic link London-Washington




 

French codes



French Hagelin cipher machines



 

Normandy 1944



Normandy 1944 – What-if scenarios and the Fortitude deception



German fuel reserve - Normandy 1944




 

Axis codebreakers



A who’s who of German Signals Intelligence



Italian codebreakers of WWII



An easy target - Italian codes and German codebreakers



German mathematicians in the cryptologic service



The codebreakers of the Hungarian General Staff



The codebreakers of the Japanese Foreign Ministry and the compromise of US codes prior to Pearl Harbor



The Japanese J-19 FUJI code



Decoded messages in the Finnish national archives




 

Deception



German disinformation operations - Barbarossa 1941




 

Neutrals and minor Allied codes



Compromise of Iranian codes in WWII



The German intercept stations in Spain



Swedish Army codes and Aussenstelle Halden



Wartime exploitation of Turkish codes by Axis and Allied powers



The Pope’s codes



 

Enigma cipher machine



Naval Enigma compromise and the spy in the United States Department of the Navy



Specialized cryptanalytic machines of WWII

 

Spies



An Abwehr success via Moscow



The Abwehr’s assessment of Russian women



Leaders of the Rote Kapelle



Kurt Jahnke German saboteur, Soviet spy?



P for Philby?



Abwehr agent Marina Lee and the Norway campaign



German counterintelligence operations in occupied France



Dienstelle Klatt – A case of Soviet deception




 

German communications



Exploding telephone poles in the Eastern front



German 80mm Photophone - Carl Zeiss Lichtsprechgerät



 

WWII Statistics



German AFV losses 1941-44



German Tank losses FMS P-059



Eastern Front Aircraft Strength and Losses 1941-45



The German response against the Soviet T-34 and KV tanks



German AFV losses in the Eastern Front



RAF Bomber Command strength 1939-45



RAF Strength Far East Command – January 1942



RAF 2nd TAF strength 1944-45



British report on German armor piercing projectiles



 

WWII Myths



WWII Myths – The Me262 jet fighter and the dumb Fuehrer



German evaluation of captured Soviet tanks



Some facts on the Panzer V Panther



Was the Panther a ‘heavy’ tank?



WWII Myths – Weak Panzer Divisions after 1940



Battle of Britain 1940 - Strength reports and What If scenarios



WWII Myths – German lack of standardization



The Mortain counterattack – Effects of ULTRA and airpower



WWII Myths – Multitude of German AFV types




 

Book reviews



‘Ultra’ the end of a myth. The war of the codes between the British and Italian navies. 1934-1945’



Brute Force



Strategic Bombing by the United States in World War II: The Myths and the Facts



Normandy 1944



Air Power at the Battlefront: Allied Close Air Support in Europe 1943-45



British Intelligence in the Second World War



Red Storm Rising


Update

$
0
0
I have added an index for the top essays and included a permanent link on the upper right side of the site.

In the news

Viewing all 538 articles
Browse latest View live


Latest Images