Quantcast
Channel: Christos military and intelligence corner
Viewing all articles
Browse latest Browse all 542

Wartime exploitation of Turkish codes by Axis and Allied powers

$
0
0
The Republic of Turkey remained neutral during most of WWII, while at the same time maintaining close economic relations with Germany. Through constant negotiations with Germany, Britain and the Soviet Union the Turkish leaders were successful in protecting their country’s territorial integrity.

They finally joined the Allied cause and declared war on the Axis only in February 1945. 

During the war Turkey, as a neutral power, had a major advantage since it could operate embassies in both Allied and Axis nations. This gave Turkish officials the opportunity to get valuable information from both sides. For this reason Turkish diplomatic communications became a target for Axis and Allied cryptanalysts.

The Turks used mainly 4-figure codebooks (INKILAP, ZAFER, SAKARYA, CANKAYA, INONU, ISMET) enciphered with additive sequences.

Turkish systems were attacked by several German agencies. The diplomatic codes were attacked by the Pers Z, Forschungsamt and OKW/Chi. Military systems by the OKL Chi Stelle, the Army’s Inspectorate 7/VI and OKW/Chi.

Italy, Hungary and Finland also read Turkish traffic with significant success throughout the war.

All the Axis powers took advantage of the fact that some of the Turkish codebooks were simply repaginations of previous versions.

German effort

The codebreaking department of the Foreign Ministry - Pers Z attacked Turkish diplomatic systems since 1934. These were continuously solved till the end of the war. There was a separate department for Turkish traffic headed by Dr. Hermann Scherschmidt.

Goering’s Forschungsamt also read Turkish diplomatic traffic, especially that of the Moscow embassy.

The codebreaking department of the Armed Forces High Command - OKW/Chi dealt with Turkish military and diplomatic traffic with good results. The Turkish desk had about 10 people and was headed by Dr Locker. According to Mettig, second in command of OKW/Chi in the period 1943-45, the solution of the Turkish traffic (especially from London, Paris and Moscow) was one of the major OKW/Chi achievements during the war.

The Luftwaffe’s OKL Chi Stelle monitored Turkish AF traffic. According to chief cryptanalyst Ferdinand Voegele three simple systems were solved by forward units.

The Army’s signal intelligence regiment KONA 4monitored Turkish traffic both military and police. The central agency OKH/Inspectorate 7/VI read Turkish systems and shared results with the Forschungsamt. One of the codes read was that used by the Turkish president when onboard the state yacht ‘Savarona’. Army cryptanalyst Dettmann, head of cryptanalysis in the Eastern Front, says in DF-112 that the results of the Yalta conference became known to the Germans through Turkish messages.

Italian effort

The Italians army’s cryptanalytic department, headed by General Gamba, attacked Turkish diplomatic and military attaché codes with success. These were solved both by physical compromise and cryptanalysis. Military and police traffic was intercepted and decoded by a small team assigned to an intercept station on the island of Rhodes. The Italians valued the intelligence gained from Turkish traffic, especially the information from the Moscow embassy.

Hungarian effort

The Hungariansput special emphasis on the solution of Turkish traffic and assigned their best cryptanalyst Titus Vass to the Turkish desk.

Finnish effort

The Finnish codebreaking department devoted a third of its cryptanalysts on Turkish traffic with the result that all the 4-figure codes were read.

Allied effort

The Western Allies were also interested in the Turkish diplomatic communications.

The US Army’s Signal Security Agency started attacking Turkish and Arabic traffic in 1942. Its official history says:

Late in 1942 work was initiated on the systems of those governments who use the Arabic and Turkish languages.  After a modest beginning the traffic of the following governments was read: ‘Egypt, Ethiopia, Iran, Iraq, Lebanon, Saudi Arabia, Syria, Transjordan, and Turkey. Of these, by far the most Important in production of valuable information and in extent of the task of solution were the Turkish systems.’

Britain had been reading Turkish traffic for decades and continued to do so during WWII. Diplomatic traffic was worked on not at the famous Bletchley Park facility but at the Diplomatic section in Berkeley Street, London. The embassies monitored were London, Kuibyshev, Teheran, Budapest, Lisbon, Rome, Madrid, Stockholm, Berlin, Washington, Vichy, South America, Helsinki, Bucharest, Sofia and Tokyo. Results were shared with the Americans. Decoded messages allowed them to keep an eye on Turkish-German relations and Soviet territorial demands. 

Conclusion

Turkish codes seem to have yielded against anyone who was willing to invest the necessary resources against them. Even though Turkey was not that important politically or economically the fact that it had embassies in Axis and Allied capitals made its traffic valuable for all the major participants of the war.

The Axis gained information of great value especially from the Moscow embassy. The Allies used the decrypts in order to monitor Turkish foreign policy towards Germany and counter Soviet efforts to change the legal status of the Turkish Straits.

Sources: TICOM reports I-22, I-63, I-103, I-119, I-128, DF-187B, DF-112, ‘European Axis Signal Intelligence in World War II’ volumes 3,4,5,6,7 , Intelligence and National Security article: ‘No immunity: Signals intelligence and the European neutrals, 1939-45’, International Journal of Intelligence and Counter-Intelligence article: ‘Left in the Dust: Italian Signals Intelligence, 1915-1943’, 'In the Name of Intelligence: Essays in Honor of Walter Pforzheimer', ‘The Achievements of the Signal Security Agency (SSA) in World War II’, Intelligence and National Security article: ‘Diplomatic Sigint and the British Official Mind during the Second World War: Soviet claims on Turkey, 1940-45’

Acknowledgements: I have to thank Ralph Erskine for information on the British exploitation of Turkish codes.

Viewing all articles
Browse latest Browse all 542

Trending Articles