Saturday, July 16, 2016

Netherlands Intelligence Studies Association 25th anniversary conference 1991 – 2016

On Friday 28 and Saturday 29 October 2016 the Netherlands Intelligence Studies Association (NISA) celebrates its 25th anniversary with an inspiring two-days conference. 

Main theme is the strongly  changed environment of the intelligence analyst during these past 25 years.

In other words: the 25th anniversary as a symbol for the revolutionary changes in the intelligence world  with which analysts have to deal; both external developments (the onset of a multipolar world, asymmetric conflicts, the information revolution), and internal changes (in collecting, processing, dissemination,legitimization and supervision).

These developments forced intelligence analysts and organisations to adapt work processes and methods and techniques. Intelligence analysts still mostly operate in secret, but the demands of intelligence consumers and the public have changed over the last 25 years. Social and technological developments have changed the playing field and the rules of the game for the intelligence analyst, leading to an enormous growth in (publicly) available information and means of communication, and demands for more transparency and accountability. Aim of the conference is to touch on the consequences of this changed environment, and to look ahead.

Participants are invited to listen to distinguished experts in the field, and to enter into discussions on various topics relating to intelligence analysis.

The Conference will be held at the Nationaal Archief (the National Archive),
Prins Willem Alexanderhof 20,
The Hague, the Netherlands



Saturday, July 9, 2016

Book review – ‘Code Warriors: NSA's Codebreakers and the Secret Intelligence War Against the Soviet Union’

Stephen Budiansky, author of Battle of Wits: The Complete Story of Codebreaking in World War IIand Blackett's War: The Men Who Defeated the Nazi U-Boats and Brought Science to the Art of Warfare has published a new book, this time dealing with the Cold War operations of the NSA and the efforts to solve Soviet high level cryptosystems.

Code Warriors: NSA's Codebreakers and the Secret Intelligence War Against the Soviet Union’ is a history of the National Security Agency with an emphasis on the work done on Soviet cryptosystems.


The book starts in 1943, when US codebreakers were solving several important Axis cryptosystems (such as the German Enigma and the Japanese PURPLE cipher machines). At the time Soviet diplomatic traffic was being collected but it was only sorted not actively attacked. During the year a small group was formed to study this material and make an attempt at solution.

In theory the Soviet authorities used codebooks enciphered with one time pad which meant that their messages should have been unbreakable. However the ‘Russian problem’ group was able to make a stunning discovery. It turned out that there were cases of additive pad reuse, which meant that some messages could be decoded.

This was the start of the famous VENONA project and thanks to the decoded messages of the Soviet intelligence agencies it was possible to identify a large number of Soviet agents and communist sympathizers.

NSA and GCHQ continued to solve important Soviet systems in the period 1945-48, such as the cipher machines Coleridge, Longfellow, Pagoda and a modified version of the Hagelin B-211. They were also able to intercept the Soviet civilian network thanks to German equipment, captured in the last days of the war.

Operations came to a standstill in 1948 when after being warned by one of their agents the Soviets introduced new secure cipher procedures. From then on NSA would continue its efforts against Soviet high level cryptosystems but with little to no success and this despite devoting most of its resources to the Soviet problem.

The author looks into the efforts of the NSA to solve Soviet high level cryptosystems, the investments in new technologies such as high speed computers, the crisis resulting from repeated failures and the huge resources devoted to the Soviet problem (at the expense of other targets). In the end the failure to solve Soviet ciphers using the ‘standard’ methods meant that more resources had to be directed to ELINT satellites, ‘bugs’ and traffic analysis. It was only in the late 1970’s that a combination of new supercomputers (built by the Cray corporation) and mathematical research (from the Institute for Defense Analyses) that allowed the NSA to solve Soviet high level ciphers.

Overall the book covers NSA operations from WWII till the end of the Cold War and looks into all aspects of the agency’s work, their codebreaking successes, the relationship with the CIA, their investment into high speed computers, operations in Korea and Vietnam and even the organizational and security problems of running an organization of such size.

There are also five appendixes with short explanations of enciphered codebooks, the Soviet cipher teleprinter (from TICOM sources), cryptanalysis of the Hagelin machines, Turing’s deciban method and Friedman’s Index of Coincidence.

Considering the information presented in the book it is a valuable contribution to Cold War cryptologic history.


The author was kind enough to answer some of my questions. 

1). You’ve written several books on signals intelligence and codebreaking. How did you become interested in this subject and how did you go from writing ‘Battle of Wits: The Complete Story of Codebreaking in World War II’ to ‘Blackett's War: The Men Who Defeated the Nazi U-Boats and Brought Science to the Art of Warfare’ and now ‘Code Warriors: NSA's Codebreakers and the Secret Intelligence War Against the Soviet Union’?

I think what first drew me to the subject, and what has been the common theme of all of these books of mine that you mention, is my abiding interest in the intersection of science and warfare. Since World War II, science has dominated warfare, and it’s simply impossible to understand modern military history without the technical story of scientific developments that have shaped conflicts, weapons, and strategy and tactics. It also involves an often fascinating intersection of very different cultures and personalities.

2). There are only a few books that cover the Cold War operations of the NSA. What new information have you discovered for your latest book that set it apart from previous efforts? How hard is it to research cryptologic history compared to social, economic or standard military history? 

NSA has been regularly releasing and declassifying documents from the post-World War II period. It’s admittedly slim pickings, and a very frustrating process. I did file several Mandatory Declassification Review requests with NSA in the course of my research and actually received several of the important reports I was seeking to have declassified—only to find that NSA’s declassifiers had redacted so much from the documents that they needn’t have bothered even pretending they were releasing anything: so much was chopped out that there was literally nothing of significant historical information left by the time they were done. 

And we’re talking about information that is as much as 70 years old, involving for example Soviet rotor cipher machines from 1947. You can buy a Soviet “Fialka” machine on the collectors’ market these days, but NSA still refuses to acknowledge that such a thing even exists, much less anything about its cryptanalysis.

That said, there are a few significant things that have come out recently, notably in the William Friedman Papers released (or partially released I should say — these too were subjected to the usual heavy-handed redaction censorship) last year.

But the main thing I tried to do which I think is different from earlier books was to pull the clues from disparate sources together, provide essential context, and try as much as possible to synthesize the technical story of cryptanalysis in the Cold War, as I did for World War II in my earlier book “Battle of Wits.” There’s a lot that one can figure out from context, correlating sources, and applying a basic knowledge of cryptology

3). During the Cold War the NSA’s budget and manpower rivaled those of the largest companies in the world. Do you think that this investment paid off for the US government? How can one evaluate the operations of an agency that works in secret?

I’ve repeatedly argued that NSA would be much better off if they were more open. It’s very difficult to get them to reveal their successes, and the result is exactly the problem you note: Why should the American public continue to support these agencies and their activities if they can’t know what they’re getting for the investment? The public tends to hear about NSA when there’s a failure or a scandal. 

That said, I do think NSA’s greatest success in the Cold War was preventing us all from being blown to bits in World War III. That’s a negative argument which you can't prove of course. But until the advent of real-time photoreconnaissance satellites in the 1970s and 80s, SIGINT was the primary source of early warning of Soviet military activity and in particular was the only real source of strategic warning of Soviet preparations that would precede a nuclear attack. The reassurance that NSA’s surveillance gave US leaders that the Soviets could not launch a first strike without us having significant warning greatly reduced the hair trigger of the Cold War nuclear standoff. And we specifically know, as I note in the book, that during some key crises in the Cold War—such as the Suez Crisis in 1956—the information NSA provided was crucial in convincing US leaders that Soviet threats of military intervention were a bluff, not backed up by any actual movement or mobilization of its forces, which greatly helped to defuse those crises. It’s not hard to imagine an escalation that could quickly have gotten out of hand had we been in the dark and left to guess what the Soviets were up to.

4). What are your thoughts on the recent Snowden revelations regarding the NSA interception of US civilian communications?

I think they show NSA to be very much a creature of its history. The problems that the Snowden revelations point to regarding NSA’s efforts to “get everything,” to exaggerate the effectiveness of its bulk collection activities, its willingness to press a maximal and at times highly dubious view of its legal authorities, and to misrepresent the truth when confronted with embarrassing facts, are strikingly similar to the mindset and institutional culture of the agency (and its predecessors) going back as early as World War II.

5). What areas of intelligence history do you find most interesting and what topics do you plan to research for future books?

I feel in a way that intelligence history is at a real crisis point. We’ve beaten to death World War II—I mean how many books about breaking the Enigma or Operation Zig Zag do we need? — and the completely broken system of official declassification of post–World War II documents has left intelligence historians with precious little to work on. Until some fundamental change occurs—and it has to come from the top, because the entire FOIA and declassification process is the *problem*, not the solution—I think I’m going to head for another field entirely, if I decide to write another book. I’m a bit worn out from reading documents with every other word crossed out!

Friday, July 1, 2016

July 2011 to July 2016 - 5 years of Christos military and intelligence corner

This July marks 5 years since I created the Christos military and intelligence corner blogsite. During this time I’ve written many essays on WWII military, economic and intelligence history, I have attracted a small but dedicated audience and I think that I’ve made valuable contributions to WWII cryptologic history.

Did I start with that goal in mind? No.

Prior to 2011 I was simply a person who had read a lot of books on WWII and occasionally took part in conversations at various internet forums. Back then social networking sites hadn’t taken off so lots of interesting and knowledgeable people frequented internet forums. Some were WWII buffs (like me), others hobbyists, wargamers or aspiring historians. Although internet forums weren’t perfect it was possible to have great debates about battles, weapon systems, strategies, personalities etc.

Some of these individuals had researched these cases thoroughly and they had documents from the archives that contradicted the arguments made in ‘popular’ history books. Through these forums I learned that many of the things I thought to be true because I read them in ‘best selling’ books were in fact completely wrong.

In order for someone to take part in these debates and not look like a fool it was necessary not only to have read a few books on the subject but also to have specialized information from academic journals and from government archives. That’s why my next step was to download several articles from academic journals. I also ordered files from the British national archives through their website.

I not only read this material but I also wrote down the main points and created excel tables with interesting statistics (strength and loss reports for men, tanks, planes etc). Thus I was able to debate some of the ‘old timers’ on an equal footing.

At that time I had read a lot on WWII but there was an aspect of the conflict that I had neglected. That was the role of intelligence (not only spies but also signals intelligence and codebreaking). In 2010 the NSA published on their website the ‘European Axis Signal Intelligence in World War II’ volumes and I happened to find them through a google search.  I was impressed with this material and especially the fact that after all these years the operations of the German codebreakers were unknown to the public. I knew of the German Navy’s B-Dienst due to the role that it played in the Battle of the Atlantic but I had never heard of Inspectorate 7/VI or the Luftwaffe’s Chi Stelle.

After reading these reports I knew that it would be interesting to research some of these cases further, so I emailed several people (academics and authors) that were known in the field and asked for their assistance plus i told them about my own findings regarding the Russian radioteletype equipment mentioned in the books  ‘Body of secretsanatomy of the ultra-secret National Security Agency’ and ‘The ultra Americans:the U.S. role in breaking the Nazi codes’ (see Bamford, the Russian ‘FISH’ and Unteroffizier Karrenberg - part 1part 2part 3).

Unfortunately I learned that most of them either do not respond to emails or if they do they will just say that they cannot help (or worse).

People in this ‘field’ are weird!

I decided to persevere on my own, so had a quick look online on how to start a blog, how to set it up, how to upload pics etc and I decided to create Christos military and intelligence corner. In the beginning I posted the information i had on WWII statistics and of course my research on the German exploitation of Soviet multichannel radio-teletype networks 1936-1945.

In order to find more material on the work of the Axis codebreakers I contacted a researcher at the British national archives and one at the U.S. National Archives and Records Administration. Thus I was able to copy a lot of the original TICOM reports, i started posting them online at my Google Docs account and I also created a Scribd account in 2012.

One thing that this experience taught me is that proper research requires a lot of time and money. That’s why most history books are shit. Authors simply do not have the resources to check the archives thoroughly.

Especially in the field of intelligence things are further complicated by the fact that government agencies hold important files classified for too long and when they release them they do so in a haphazard manner.

Even so I pushed on and I think that I’ve been able to cover almost all the cases that interested me. In order to achieve this I had to spend my own money, I copied material from government archives in the US, UK, Germany and Finland and I’ve also been lucky enough to receive help from like minded individuals.

A lot of people have helped me by giving me information and/or files and I’ve tried to repay them by giving them some of my own material.

I hope that I’ve helped you as much as you’ve helped me!

Toughest cases

You can find my best essays here.

Some of them required a lot of work either in locating the files or in reading and comprehending them. Here are some memorable cases:

1). The Russian FISH case


Within a few days the team struck gold. They came upon an entire convoy of four German signal trucks, complete with four Fish machines, a signals technician, German drivers, and a lieutenant in charge. Arthur Levenson and Major Ralph Tester, a British expert on the Fish, escorted the whole lot, including the Germans, back to England. Once at Bletchley Park the machines were reverse-engineered to determine exactly how they were built and how they operated. (Levenson would later return to Washington and go on to become chief of the Russian codebreaking section at NSA.)

With enough Fish and other equipment to keep the engineers busy for a long time at Bletchley, the team began a manhunt for key German codebreakers. On May 21, 1945, Lieutenant Commander Howard Campaigne and several other TICOM officers interviewed a small group of Sigint personnel being held in Rosenheim. They had all worked for a unit of the Signals Intelligence Agency of the German Abwehr High Command, a major target of TICOM. What the prisoners told Campaigne would lead to one of the most important, and most secret, discoveries in the history of Cold War codebreaking. Their command, they said, had built a machine that broke the highest-level Russian cipher system. The machine, now buried beneath the cobblestones in front of a building nearby, had been designed to attack the advanced Russian teleprinter cipher-the Soviet equivalent of the Fish.
If this was true, it was breathtaking. For over six years US. and British codebreakers had placed Japan and Germany under a microscope, to the near exclusion of Russia and almost all other areas. Now with the war over and with Communist Russia as their new major adversary, the codebreakers would have to start all over from scratch. But if a working machine capable of breaking high-level Russian ciphers was indeed buried nearby, years of mind-numbing effort would be saved.

The Germans, eager to be released from prison, quickly agreed to lead TICOM to the machine. Campaigne wasted no time and the next day the twenty-eight prisoners, dressed in their German Army uniforms, began pulling up the cobblestones and opening the ground with picks and shovels. Slowly the heavy wooden boxes began to appear. One after another they were pulled from the earth, until the crates nearly filled the grounds. In all there were a dozen huge chests weighing more than 600 pounds each; 53 chests weighing nearly 100 pounds each; and about 53 more weighing 50 pounds each. It was a massive haul of some 7-1/2 tons.

Over the next several days the dark gray equipment was carefully lifted from its crates and set up in the basement of the building. Then, like magic, high-level encrypted Russian communications, pulled from the ether, began spewing forth in readable plaintext. Whitaker, who pulled into the camp a short time later, was amazed. "They were working like beavers before we ever arrived," he scribbled in his notebook. "They had one of the machines all set up and receiving traffic when we got there."

The Russian system involved dividing the transmissions into nine separate parts and then transmitting them on nine different channels. The German machines were able to take the intercepted signals and stitch them back together again in the proper order. For Campaigne and the rest of the TICOM team, it was a once-in-a-lifetime discovery. Back in Washington, Campaigne would eventually go on to become chief of research at NSA. Once the demonstration was over, Campaigne had the German soldiers repack the equipment and the next day it was loaded on a convoy, completely filling four heavy trucks. Two TICOM members, including I First Lieutenant Sehner Norland, who would also go on to a long career at NSA, accompanied the equipment and soldiers back to England. There it was set up near Bletchley Park and quickly put into operation. It, or a working model, was later shipped back to Washington. The discovery of the Russian codebreaking machine was a principal reason why both the US. and British governments still have an absolute ban on all details surrounding the TICOM operations.

Initially I wrote about this case in ‘Bamford, the Russian ‘FISH’ and Unteroffizier Karrenberg’ - part 1part 2part 3.

I continued to research this case and after locating the reports SI-32 - Special Intelligence and CSDIC SIR 1717 i presented all the available information in German exploitation of Soviet multichannel radio-teletype networks 1936-1945. (note that Randy Rezabek has covered aspects of this case in Case Studies‎: Russian FISH)

2). Compromise of the State Department’s strip cipher

In the period 1940-1945 the US State Department used the M-138-A strip cipher for encrypting messages classified SECRET. Each embassy had 50 alphabet sets for decrypting circular messages and 50 alphabet sets for direct communications with Washington. The codebreakers of Germany, Finland and Japan were very interested in these messages and during the period 1940-1944 they were able to exploit this traffic.

The German success was made possible thanks to alphabet strips and key lists they received from the Japanese in 1941 and these were passed on by the Germans to their Finnish allies in 1942. The Finnish codebreakers solved several diplomatic links in that year and in 1943 started sharing their findings with the Japanese. German and Finnish codebreakers cooperated in the solution of the strips during the war, with visits of personnel to each country. The Axis codebreakers took advantage of mistakes in the use of the strip cipher by the State Department’s cipher unit.

This has been the hardest case I’ve had to research because the information is scattered in various files, in various collections and in the archives of several countries!

For example I’ve had to copy relevant reports from the US National Archives and Records Administration (OSS, NSA and State Department collections), from the British national archives, from the German foreign ministry’s political archive, from the Finnish national archives, from the Bavarian State Library, from the US National Cryptologic Museum, from books written by Erkki Pale and Aladár Paasonen, from the Japan Center for Asian Historical Records and I’m still not done researching this case!

So far I’ve covered important aspects of this case:






3). Engineering analysis of the Russian T-34/85 tank

The US report Engineering analysis of the Russian T-34/85 tank has a detailed examination of a Soviet T-34/85 tank captured in Korea. I’ve added information from that report in my essay WWII Myths - T-34 Best Tank of the war but locating the report proved to be really, really hard!

The report is mentioned in Osprey books but the author didn’t have a specific reference. I emailed his publisher and they forwarded my request but I never got a response from the author. Instead I tried to find the file at NARA but I was not successful. After emailing the US Army Center of Military History I was told to check with the National Armor and Cavalry Archives and they did have the file but it was in an unpacked box and since they were in the process of unpacking their files they could not copy it for me right away.

By pure luck I saw in a google search that the CIA’s FOIA office listed this file and my researcher went to NARA and copied a few pages from the CIA collection. Thus I was able to confirm that this was the file I was looking for and I requested it from the CIA’s FOIA office.

Then I waited. And waited. And waited…

Then, more than a month later, I got a phone call from the post office asking if i had ordered stuff from the US. The CIA’s FOIA office had gotten my address wrong so the post office people were trying to find where to send the report. After clearing things up I finally got the report, scanned and uploaded it. I also had to pay the CIA’s FOIA office for the copying cost.

4). Inspectorate 7/VI war diary

While looking at the finding aid to the NSA collection RG 457 – entry P11 I saw several files titled Journal/Activity Report, Wehrmacht/Army High Command. For some reason I thought this was the OKW/Chi (Signal Intelligence Agency of the Supreme Command, Armed Forces) war diary and I told my researcher to copy some of the months.

When I got the reports I saw that they were the war diary of the German Army’s signal intelligence service Inspectorate 7/VI and I was not happy. First of all I didn’t think these reports would be very interesting and they were written in German! (Scheiße)

It turns out that they are interesting, very much so, and even though I can’t read German google translate does an adequate job (plus I convinced Frode Weierud to translate some of it).

A friend from the Balkans copied several more of the monthly reports and we exchanged material plus I also located other Inspectorate 7/VI reports (in entry 9032) listed in the sources of the book Delusions of Intelligence: Enigma, Ultra, and the End of Secure Ciphers.

Unfortunately NARA does not have copies of all the monthly reports and many of the ones it does have are of such poor quality that they are practically unreadable. The solution to this problem was clear. I would have to copy the remaining reports from the TICOM collection of the German Foreign Ministry’s Political Archive (Auswärtiges Amt Politisches Archiv).

Together with some friends we formed a team and we copied the material. This was undoubtedly a great success.

5). Books written by former Finnish codebreakers

The Finnish codebreakers solved several foreign cryptosystems during WWII. Their greatest successes were the solution of Soviet military codes and of the State Department’s strip cipher. I was interested in what they had to say about the strip cipher so I tried to find copies of 'Marsalkan tiedustelupäällikkönä' by Aladár Paasonen and ‘Suomen radiotiedustelu 1927-1944’ by Erkki Pale.

It turns out that getting copies of these books is not easy but in the end I got the pages that dealt with the Finnish work on the strip cipher.

My friend Frode Weierud had 'Marsalkan tiedustelupäällikkönä' so I got that part from him. Two friends in Finland had a copy of ‘Suomen radiotiedustelu 1927-1944’ and they sent me chapter ‘DIPLOMAAT TISANOMIAKIN AVATTIIN’. Then it was easy for me to OCR and translate the text.

6). Did the German codebreakers solve the Japanese Purple cipher machine? – Conversation with Otto Leiberich

In the late 1930’s the Japanese Foreign Ministry distributed the Purple cipher machine to its most important embassies and it was used to encipher high level messages to and from Tokyo. Unfortunately for the Japanese the introduction of this new cipher machine wasn’t able to secure their diplomatic communications.

The codebreakers of the US Signal Intelligence Service were able to solve this device in 1940 and according to Russian historians the codebreakers of the Soviet Union, led by Sergei Tolstoy, also solved it. The British codebreakers were not able to solve this system on their own but they received information and a copy of the device from their American allies in 1941.

US reports based on the interrogation of German cryptanalysts claim that the Germans made an effort to solve the Purple cipher machine but were not successful.
There is information pointing to the compromise of this device by the Germans and I’ve presented a summary in German success with Purple?

In 2013 I tried to contact mr Otto Leiberich, chief cryptologist of the German cipher department in the period 1972-1990, because he had written about the Purple machine in his article Vom diplomatischen Code zur Falltürfunktion. Hundert Jahre Kryptographie in Deutschland:

Zwei Erfolge verdienen eine besondere Würdigung: die Entzifferung des Purple-Verfahrens der Japaner und die Entzifferung der amerikanischen Chiffriermaschine M 209.

Während des Krieges hatten die Japaner eine Chiffriermaschine entwickelt und zum Einsatz gebracht, die der amerikanischen Aufklärung größte Probleme bereitete. Da gelang es einer amerikanischen Gruppe um den Kryptologen William Friedman, diese Maschine, die als purple machine bezeichnet wurde, zu rekonstruieren und zu entziffern.

Dies gilt seither in Amerika als der größte Erfolg in der Kryptologie-Geschichte. Angeregt durch eine kürzlich ausgestrahlte Fernsehsendung fragte ich bei einem ehemaligen Kollegen nach, der während des Krieges auf diesem Gebiet tätig gewesen war, und erhielt bestätigt, woran ich bis dahin nur eine ungefähre Erinnerung hatte: Auch die Deutschen hatten die Sendungen der verbündeten Japaner bearbeitet, insbesondere die Meldungen, die der japanische Botschafter Oshima aus Berlin nach Tokio sandte. Einer Gruppe von Kryptologen und Technikern der Chiffrierabteilung des Oberkommandos der Wehrmacht (OKW) unter der Leitung des Mathematikers Erich Hüttenhain war die Entzifferung ebenso gelungen wie den Amerikanern. Hin und wieder war ein Bericht schon entziffert und weitergeleitet, wenn Tokio wegen Übermittlungsfehlern um nochmalige Übersendung bitten mußte. Wenn also die Entzifferung der purple machine der größte Entzifferungserfolg während des Zweiten Weltkrieges gewesen wäre (er war es nicht!), so hätten ihn Hüttenhain und sein Team ebenfalls errungen. Leider existieren in Deutschland hierzu keine Unterlagen mehr
.’

Initially I contacted the editorial board members of a journal that dealt with intelligence. Leiberich was also a member of this board but there were no contact details for him. The people I spoke with told me that they could not give me his contact details (which probably makes sense considering his previous government position…).

However his name was listed in the German yellow pages and I decided that I might as well call him and see if I can find out more on the Purple case.

I called twice and he picked up the phone the second time. For some reason I did not really believe that he would be Leiberich the cryptologist and I hadn’t prepared my questions in advance. It had also been a while since I had spoken in English and to make things worse he couldn’t hear me very well!

After asking him if he was Otto Leiberich, the mathematician, and explaining who I was he said that he had written that article a long time ago and he could not remember all the details. The information in the article came from conversations with his coworkers during their lunch break, especially since some of them had worked in this field during WWII.
I apologized several times for calling him at home and he was interested in the fact that I was calling from Greece (Griechenland).

Moral of the story, it’s probably not a good idea to call government officials at their residence, although in this case I’m glad I did!

7). Carlson-Goldsberry report

As I said previously the Finnish codebreakers solved several foreign cryptosystems during WWII and one of their greatest successes was the solution of the State Department’s strip cipher.

In September 1944 Finland signed an armistice with the Soviet Union. The people in charge of the Finnish signal intelligence service anticipated this move and fearing a Soviet takeover of the country had taken measures to relocate the radio service to Sweden. This operation was called Stella Polaris (Polar Star).

According to the NSA study History of Venona (Ft. George G. Meade: Center for Cryptologic History, 1995) by Robert Louis Benson and Cecil J. Phillips, it was at that time that the Finns revealed to the US authorities that they had solved their diplomatic codes. On 29 September 1944 colonel Hallamaa met with L.Randolph Higgs of the US embassy in Stockholm and told him about their success.

In response two cryptanalysts were sent from the US to evaluate the compromise of US codes in more detail. They were Paavo Carlson of the Army’s Signal Security Agency-SSA and Paul E. Goldsberry of the State Department’s cipher unit. Their report dated 23 November 1944 had details on the solution of US systems.

Unfortunately I haven’t been able to locate this report at NARA. The NSA’s foia office however has located the file and it has been placed in the review queue. The problem is that it takes a long time for reports to be reviewed and declassified. 

We’ll see….

8). Compromise of Polish military intelligence codes and Major Szczesny Choynacki, Polish deputy consul in Bern, Switzerland.

One day, while thinking about the compromise of Polish communications in WWII, I remembered that several sources mentioned a person named Choynacki.

According to Wilhelm Flicke’s ‘War Secrets in the Ether’ a captain Choynacki who collaborated with the office of the Polish military attaché in Bern had agents whose information showed that they were in ‘Hitler’s  immediate vicinity’.

Keith Jeffery also mentioned Choynacki in ‘MI6: The History of the Secret Intelligence Service 1909-1949’.

So it was easy for me to put two and two together and I wrote about this case in Polish Stencil codes and secret agent ‘’Knopf’’.

Still important information was missing and I had to wait till Craig McKay covered this case in Major Choynacki’s Ace: the Solution to an Old Puzzle of Wartime Intelligence in order to get the whole story.

9). Referat 12 reports

In 1942 the German Army’s signal intelligence agency Inspectorate 7/VI created a new department to deal exclusively with the solution of enemy agents codes. This was Referat 12 and it was headed by 1st Lieutenant Dr Wilhelm Vauck, a talented mathematician.

I was very interested in locating the reports of Referat 12 and in fact I thought that it would be unlikely that they survived the war.

My first move in tracking them down was to file a FOIA request with the British national archives. Unfortunately that was rejected, so I thought that I would never find them.

Previously I said that I was lucky to find the war diary of Inspectorate 7/VI. Since Referat 12 was a part of Inspectorate 7/VI its reports were included in the war diary, thus I killed two birds with one stone!

That wasn’t the end of this story. Since the reports were in German I used OCR software and google translate plus some parts had to be typed by hand. After translating and studying this material I wrote the essay Allied agents codes and Referat 12.

10). Czechoslovak report ‘Dopady lúštenia šifrovacieho systému čs. londýnskeho MNO z rokov 1940-1945 na domáci odboj

After writing the essay Svetova Revoluce and the codes of the Czech resistance i’ve tried to find out more on the compromise of Czechoslovak ciphers in WWII. Recently i saw online a reference to the report ‘Dopady lúštenia šifrovacieho systému čs. londýnskeho MNO z rokov 1940-1945 na domáci odboj’ and I tried to locate it.

I emailed a well known Czech academic who is an expert on the Czechoslovak resistance but he did not respond.

I requested this report from the Czech Defense Ministry’s history department but they could not locate it.

I even called the editor of their military history magazine in case he knew how to proceed but he wasn’t interested in this case.

How did I solve this problem? I simply asked Jozef Krajcovic. It turns out that the report is held at the archive of the Museum of the Slovak National Uprising in Banská Bystrica.

11). TICOM report DF-112 ‘Survey of Russian military systems’

The report DF-112 ‘Survey of Russian military systems’ was written in 1947 by Alexis Dettmann (an important member of the German Army’s signal intelligence agency) and it contains lots of information on the solution of Soviet military, NKVD and partisan codes.

I saw this report mentioned in the Cryptologia article ‘Cryptology in the early Bundesrepublik’ and after failing to locate it at NARA I tried to contact the author of the article mr Michael van der Muelen. This proved to be harder than expected but in the end a friend of a friend was able to give me his email.

Mr Muelen sent me a copy of the report and I scanned and uploaded it. Thus I was able to learn a lot about German work on Soviet ciphers.

12). Rommel’s supply convoys

One of the most important questions regarding the war in North Africa, during WWII, is what effect did the sinking of Axis convoys have on the overall campaign. Can Rommel’s defeat be attributed to his lost supplies? Or were the losses tolerable?

In order to answer this question I wanted to find the detailed statistics on what was transported from Europe to N.Africa by the Axis powers.

This wasn’t as easy as you’d think. Books on the subject do not have the actual tables. Instead authors give figures or percentages for some of the months. I wanted all of the data.

I first emailed the owner of a website on the Italian Navy but his response was that ‘I’m limiting my assistance only to academic research’.

I guess the rest of us are the unwashed masses and we don’t need these files…

Anyway, I tried to find another source and I asked Andreas Biermann for this information. He scanned the relevant pages for 1941-42 and I typed the data into an excel file.


These are just a few of the cases that proved hard to crack. In fact even easy cases had parts that required a lot of work to get right.

Remaining cases

At this time I’m only actively researching the case of the strip cipher. I’m also waiting for several of my cases to be processed by the NSA’s FOIA office.

Hopefully these will be released soon and they will add to our knowledge of WWII history.
Be patient and let’s keep our fingers crossed!

For now enjoy these interesting files: