The PN Blog 2017 Countdown!

It’s one of the final blog posts of the year, so what do you say we revisit all of 2017 with a countdown of my ten favorite blog posts from the past year!


#10 Farewell, David

I don’t mean to start off this countdown on a sad note by mentioning the loss of fellow puzzler and Penny Dell colleague David Lindsey. But it was an incredibly rewarding experience to talk to those who knew him better than I did, and put together a memorial piece in his honor. I learned so much, and it was a valuable part of the healing process for all of us. I had two different opportunities to get to know David, and that’s a rare gift.

#9 The Puzzle of the Bard

Puzzle history, codes, and wordplay are three common topics around here. So when I found a story that neatly covers all three, I simply couldn’t resist. Although this one is more conspiracy theory than verifiable puzzle history, it was great fun to do a deep dive into the ongoing debate surrounding Shakespeare’s identity and put a puzzly spin on the subject. The research alone made this one worthwhile.

#8 Holiday Puzzly Gift Guide

Every year, one of my favorite activities is putting together our Holiday Puzzly Gift Guide. I get to include the best products sent to me for review by top puzzle and game companies, mix in some of my own favorites, and draw attention to terrific constructors, game designers, and friends of the blog, all in the hopes of introducing solvers (and families of solvers) to quality puzzles and games.

#7 Cultural Sensitivity and Crosswords

Sadly, crosswords in general, and New York Times crosswords in particular, have a reputation for being stodgy, steeped in arcane vocabulary, obscure facts, and antiquated cultural references. As part of the ever-evolving narrative surrounding cultural sensitivity — not just ethnic, but in terms of gender and sexuality as well — it’s important to do more than acknowledge the debate. You have to participate in it.

#6 Puzzles in Unexpected Places

One was tucked away on a university website. Another sat in plain sight on a tombstone. The third came to light in a music fan’s collection. What did all three have in common? They represented a simple fact: puzzles are everywhere, a part of the cultural fabric in innumerable ways. I’m cheating a bit by mentioning three posts here, but they all fit the pattern. And it’s so much fun to discover puzzles in unexpected places.

#5 Puzzles for Pets

April Fools Day pranks are an Internet tradition at this point. Some websites go all out in celebrating the holiday. (Heck, ThinkGeek has started using the holiday to tease the public’s interest level in “fake” products, going on to actually release some of those April Fools pranks as real items later in the year!)

So when the idea was floated for PuzzleNation to get in on the pranking fun, I couldn’t resist. The result — Puzzles for Pets — was as layered as it was silly, complete with fake quotes, splash pages, and more. I even got my own dog, Bailey, in on the gag.

#4 Design Your Own Escape Room

Bringing a puzzle-solving mindset into other social activities has always been a passion of mine. I’ve written in previous blog posts about using my puzzly experiences in designing murder mystery dinners and other events. This year, I had the opportunity to try my hand at designing an escape room-style experience for a friend’s birthday, and sharing some of what I learned with you was a genuine treat.

#3 ACPT, New York Toy Fair, and more

There are few things better than spending time with fellow puzzlers and gamers, and we got to do a lot of that this year. Whether it was supporting new creators and exploring established companies at New York Toy Fair or cheering on my fellow puzzlers at the American Crossword Puzzle Tournament, getting out and talking shop with other creators is invigorating and encouraging. It really helps solidify the spirit of community that comes with being puzzly.

#2 Puzzle History

I mentioned puzzle history as a frequent blog post topic in #9, but recent revelations by government agencies in both the United States and Great Britain have allowed puzzlers greater access than ever before to the history of codebreaking over the last century or so.

In fact, so much information has come to light that I was able to do a three-part series on the history of the NSA and American codebreaking post-World War II. This was a labor of love that took weeks to put together, and I think it’s some of the best work I’ve ever done for the blog.

#1 Daily POP Crosswords

There’s nothing more exciting than getting to announce the launch of a product that has been months or years in the making, so picking #1 was a no-brainer for me. It had to be the announcement of Daily POP Crosswords.

But it’s not just the app, it’s everything behind the app. I’ve had the opportunity to introduce you to several of the terrific constructors we’ve recruited to make the puzzles as fresh and engaging as they can possibly be, and you’ll get to meet a few more in the weeks to come.

It may sound self-serving or schlocky to talk about our flagship products as #1 in the countdown, but it’s something that we’re all extremely proud of, something that we’re constantly working to improve, because we want to make our apps the absolute best they can be for the PuzzleNation audience. That’s what you deserve.

And it’s part of the evolution of PuzzleNation and PN Blog. Even as we work to ensure our current products are the best they can be, we’re always looking ahead to what’s next, what’s on the horizon, what’s to come.

Thanks for spending 2017 with us, through puzzle scandals and proposals, through forts and festivities, through doomsday prepping and daily delights. We’ll see you in 2018.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

PuzzleNation Blog Looks Back on 2017!

2017 is quickly coming to a close, and as I look back on an eventful year in the world of puzzles and games, I’m incredibly proud of the contributions both PuzzleNation Blog and PuzzleNation made to the puzzle community as a whole.

Over the last year, we explored board games and card games, strategy games and trivia games, dice games and tile games, do-it-yourself puzzlers and pen-and-paper classics. We met game designers, constructors, artists, and creative types of all kinds.

We unraveled math puzzles and tackled the Crossword from Hell. We accepted the challenge of diabolical brain teasers, optical illusions, Internet memes, and more, even pondering our place in the world of puzzles as electronic solvers like Dr. Fill and AlphaGo rise in capability.

We delved into puzzle history with posts about the legacy of female codebreakers in World War II, game dice from centuries ago, theories about Shakespeare’s secret codes, and the long history of cryptography and the NSA. We brought to light valuable examples of puzzles in art, popular culture, famous quotations, and even the natural world as we pondered whether bees are verifiable problem-solvers like crows and octopuses.

We spread the word about numerous worthwhile Kickstarters and Indiegogo campaigns, watching as the puzzle/game renaissance continued to amaze and surprise us with innovative new ways to play and solve. We shared worthy causes like Puzzles for Progress, as well as amazing projects like new escape rooms, dazzling corn mazes, and the ongoing Kubrick’s Game interactive experience.

We cheered the 75th anniversary of the New York Times Crossword, and chronicled the many celebrations that marked the occasion, from guest crossword constructors like Bill Clinton and Lisa Loeb to a puzzle-centric cruise across the Atlantic!

We also mourned as friends and fellow puzzlers passed on. We said goodbye to David Lindsey and Raymond Smullyan, two underappreciated giants of the field. The pun-fueled show @midnight this year, which inspired our monthly hashtag game, also closed up shop, sadly.

We celebrated International TableTop Day, made puzzly bouquets in honor of International Puzzle Day, marveled at the records broken at the Rubik’s Cube World Championship, attended the American Crossword Puzzle Tournament and New York Toy Fair, and dove deep into an ever-expanding litany of puzzle events like the Indie 500, BosWords, Lollapuzzoola 10, and Crosswords LA.

We found puzzly ways to celebrate everything from Pi Day, the Super Bowl, and Star Wars Day to Halloween, Thanksgiving, and Christmas, and we were happy to share so many remarkable puzzly landmark moments with you. We even discovered Puzzle Mountain!

It’s been both a pleasure and a privilege to explore the world of puzzles and games with you, my fellow puzzle lovers and PuzzleNationers. We marked five years of PuzzleNation Blog this year, I recently penned my 800th blog post, and I’m more excited to write for you now than I was when I started.

And honestly, that’s just the blog. PuzzleNation’s good fortune, hard work, and accomplishments in 2017 went well beyond that.

Every month, we delivered quality content for the Penny Dell Crosswords App. From monthly deluxe sets and bonus boxes to Dell Collection sets and holiday bundles, dozens upon dozens of topnotch puzzles wended their way to our loyal and enthusiastic solvers.

And just last month, we launched our newest puzzly endeavor — Daily POP Crosswords — bringing you fresh, up-to-date cluing and relatable themes in world-class puzzles created by some of the industry’s best constructors! (Many of whom you’ve gotten to know in our recent interview series, Meet the Daily POP Crosswords Constructors!)

But whether we’re talking about the Penny Dell Crosswords App or Daily POP Crosswords, I’m proud to say that every single puzzle represents our high standards of quality puzzle content crafted for solvers and PuzzleNationers.

And your response has been fantastic! Daily POP Crosswords is thriving, the blog has over 2200 followers, and with our audience on Facebook, Twitter, Instagram, and other platforms continuing to grow, the enthusiasm of the PuzzleNation readership is both humbling and very encouraging.

2017 was our most ambitious, most exciting, and most creatively fulfilling year to date, and the coming year promises to be even brighter.

Thank you for your support, your interest, and your feedback, PuzzleNationers. The new year looms large, and we look forward to seeing you in 2018!


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Unsung Tales of Women in American Code Breaking!

[Image courtesy of Amazon.]

Dot Braden. Agnes Driscoll. Betty Hyatt. Elizebeth Friedman. Genevieve Grotjan. Ann Caracristi. Virginia Aderholdt. Ruth “Crow” Weston.

You don’t know these names, but you should. Everyone should. They’re bona fide American heroes who dedicated their time and energy to protecting not only our country, but also every soldier in the Allied forces during World War II. And they did so when they should have otherwise been continuing their collegiate studies.

That’s right, these women who came from majors as diverse as botany, math, psychology, and English, were recruited out of college in order to build a dedicated code-breaking unit for the US armed forces.

Thankfully, their stories are now being told in Liza Mundy’s new book, Code Girls: The Untold Story of the American Women Code Breakers of World War II. And these are some amazing stories.

It all started in early 1942, as secret letters began showing up in college mailboxes. Schools like Bryn Mawr, Mount Holyoke, Barnard, Radcliffe, and more posed two questions to prospective female recruits:

1. Did she like crossword puzzles?
2. Was she engaged to be married?

All of these women replied yes, they like crossword puzzles, and no, they’re not engaged or soon-to-be engaged.

After answering these questions, the women began attending introductory meetings. They were issued manila envelopes containing “a brief introduction to the arcane history of codes and ciphers, along with numbered problems sets and strips of paper with the letters of the alphabet printed on them.”

Their orders? Complete the problem sets every week.

[Image courtesy of YouTube.]

Each packet contained one problem that could not be solved, to show that sometimes, a jumble of letters or numbers doesn’t stand for anything. Sometimes, gibberish remains just that, because sometimes a code-breaker fails.

They developed working knowledge of foreign languages they didn’t speak. They memorized the most common English letters — E, T, O, N, A, I, R, S — and took frequency counts.

And that’s how America built its answer to England’s Bletchley Park code-breaking operation. (The American effort, known as Arlington Hall, was considered by their Bletchley Park rivals as “just a lot of kids playing at ‘office’.”)

College presidents like Ada Comstock, the president of Radcliffe College (the women’s counterpart to Harvard), were recruited to identify candidates to learn cryptanalysis to help shorten the war.

And make no mistake, they did shorten the war. They helped crack Enigma, which was key to decimating the German U-boat fleet, and their code-breaking efforts were instrumental in defeating Japan as well, providing valuable intel on the island-to-island battles of the Pacific theater.

[Image courtesy of Military Factory.]

Of the US Army’s World War II code-breaking force, nearly 70 percent was female. We’re talking 7,000 female code-breakers. When you factor in US Navy recruits as well, that number jumps to 11,000 women out of 20,000 code-breakers.

From Code Girls: “Code breaking required literacy, numeracy, care, creativity, painstaking attention to detail, a good memory, and a willingness to hazard guesses. It required a tolerance for drudgery and a boundless reserve of energy and optimism.”

Genevieve Grotjan was key to cracking the Japanese cipher known as Purple, and William Friedman, the man who initially ran the Arlington Hall operation, described the Purple cipher as “by far the most difficult cryptanalytic problem successfully handled and solved by any signal intelligence organization in the world.” He specifically pointed to the contrbutions of Grotjan, Mary Louise Prather, and other women in the Arlington Hall group.

Codes used by twenty-five different nations were analyzed by Arlington Hall, including codes of friends and foes alike. “There was a French code called Jellyfish, a Chinese enciphered code they called Jabberwocky, another they called Gryphon.”

But even their staggering efforts in code-breaking weren’t all they contributed to the cause. They were also crucial to the success of the D-Day invasion, as many of the women were put to work reverse-engineering messages in order to create false information about imaginary troop movements and landing areas. And in order to create fake signal traffic, they had to know the real traffic backward and forward.

I could go into more detail, breaking down how they cracked some of the war’s most important code languages, or exploring their personal lives and how life changed for these college students-turned-military operatives, but I don’t want to reveal more than I have already.

Read Code Girls. You won’t regret it. It’s another terrific entry in a year of books full of revelations about wartime puzzle history. We’ve been taken behind the scenes of the NSA, Bletchley Park, and now Arlington Hall.

And once more, important and influential female voices are getting the limelight far later than they deserve. It’s about time.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Puzzle History: Codebreaking and the NSA, part 3

[Image courtesy of NSA’s official Twitter account.]

At the end of part 2 in our series, we left off during the early days of the NSA, as American cryptographers continued to labor under the shadow of the Black Friday change in Russian codes.

You may have noticed that part 2 got a little farther from puzzly topics than part 1, and there’s a reason for that. As the NSA evolved and grew, codebreaking was downplayed in favor of data acquisition. The reasons for this were twofold:

1. Context. You need to understand why given encrypted information is important in order to put it toward the best possible use. As Budiansky stated in part 1, “The top translators at Bletchley were intelligence officers first, who sifted myriad pieces to
assemble an insightful whole.”

2. Russian surveillance and bugging continued to grow more clever and sophisticated, pushing attention away from codebreaking. After all, what good is breaking codes or developing new ones if they can just steal unencrypted intel firsthand by monitoring
agents in the field?

Moving forward, the NSA would continue to pursue all manner of data mining, eventually leaving behind much of the codebreaking and analysis that originally formed the backbone of the organization. But that was in years to come. Cryptography was still a major player in NSA operations from the ’50s and onward.

[The progression of “secret” and “top secret” code words.
Image courtesy of NSA’s official Twitter account.]

In May 1956, NSA cryptanalytic veterans pushed a proposal titled “Recommendations for a Full-Scale Attack on the Russian High-Level Systems,” believing that specially designed computers from IBM could provide the key for cracking the impenetrable Russian cryptography wall. Some cryptographers believed that ever-increasing processor speeds would eventually outpace even sophisticated codes.

By 1960, the NSA had spent $100 million on computers and analytical tools.

The problem? The NSA was collecting so much information that their increasingly small team of cryptoanalysts couldn’t dream of processing even a tiny portion of it.

But the quest for data access would only grow more ambitious.

In the wake of Sputnik’s launch in October of 1957, US signals intelligence would go where no man had gone before. The satellite GRAB, launched alongside Transit II-A in June of 1960, was supposedly meant to study cosmic radiation. (GRAB stood for Galactic Radiation and Background.)

[Image courtesy of NSA’s official Twitter account.]

But it was actually intended to collect radar signals from two Soviet air-defense systems. This was the next step of ELINT, electronic intelligence work. (The younger brother of SIGINT.)

The NSA would later find a huge supporter in President Lyndon Johnson, as the president was heavily invested in SIGINT, ELINT, and any other INTs he could access. This did little to quell the intelligence-gathering rivalry growing between the CIA and NSA.

Of course, that’s not to say that the NSA ceased to do any worthwhile work in codebreaking. Far from it, actually.

During the Vietnam War, NSA analysts pored over North Vietnamese signals, trying to uncover how enemy pilots managed to scramble and respond so quickly to many of the US’s airstrikes conducted during Operation Rolling Thunder.

Careful analysis revealed an aberrant character (in Morse code) in messages that appeared in North Vietnamese transmissions before 90 percent of the Rolling Thunder airstrikes. By identifying when the enemy used that aberrant character, the analysts
were able to warn US pilots whether they were heading toward a prepared enemy or an unsuspecting one during a given sortie.

Other NSA teams worked to protect US communications by playing the role of an enemy analyst. They would try to break US message encryptions and see how much they could learn from intercepted US signals. Identifying flaws in their own procedures — as well as members of the military who were cutting corners when it came to secured communications — helped to make US communications more secure.

[Image courtesy of NSA.gov.]

In 1979, Jack Gurin, the NSA’s Chief of Language Research, wrote an article in the NSA’s in-house publication Cryptolog, entitled “Let’s Not Forget Our Cryptologic Mission.” He believed much of the work done at the agency, and many of the people
hired, had strayed from the organization’s core mission.

The continued push for data acquisition over codebreaking analysis in the NSA led to other organizations picking up the slack. The FBI used (and continues to use) codebreakers and forensic accountants when dealing with encrypted logs from criminal organizations covering up money laundering, embezzlement, and other illegal activities.

And groups outside the government also made impressive gains in the field of encryption, among them IBM’s Thomas J. Watson Research Center, the Center for International Security and Arms Control, and even graduate student programs at universities like MIT and Stanford.

For instance, cryptographer Whitfield Diffie developed the concept of the asymmetric cipher. Joichi Ito explains it well in Whiplash:

Unlike any previously known code, asymmetric ciphers do not require the sender and receiver to have the same key. Instead, the sender (Alice) gives her public key to Bob, and Bob uses it to encrypt a message to Alice. She decrypts it using her private key. It no longer matters if Eve (who’s eavesdropping on their conversation) also has Alice’s public key, because the only thing she’ll be able to do with it is encrypt a message that only Alice can read.

This would lead to a team at MIT developing RSA, a technique that implemented Diffie’s asymmetric cipher concept. (It’s worth noting that RSA encryption is still used to this day.)

[Image courtesy of Campus Safety Magazine.com.]

The last big sea change in encryption came when the government and military realized they no longer had a monopoly on codebreaking technology. Increased reliance and awareness of the importance of computer programming, greater access to computers with impressive processing power, and a groundswell of support for privacy from prying government eyes, led to dual arms races: encryption and acquisition.

And this brings us to the modern day. The revelations wrought by Edward Snowden’s leak of NSA information revealed the incredible depth of government data mining and acquistion, leading some pundits to claim that the NSA is “the only part of government that actually listens.”

Whatever your feelings on Snowden’s actions or government surveillance, there is no doubt that the National Security Agency has grown and changed a great deal since the days of cracking the ENIGMA code or working with the crew at Bletchley Park.

Where will American codebreaking go next? Who knows? Perhaps quantum computing will bring codes so complicated they’ll be impenetrable.

All I know is… it’s part of puzzle history.


I hope you enjoyed this multi-part series on the history of 20th-century codebreaking in America. If you’d like to learn more, you can check out some of the valuable sources I consulted while working on these posts:

Code Warriors: NSA’s Codebreakers and the Secret Intelligence War Against the Soviet Union by Stephen Budiansky

Whiplash: How to Survive Our Faster Future by Joichi Ito

The Secret Lives of Codebreakers by Sinclair McKay


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Puzzle History: Codebreaking and the NSA, part 2

[Image courtesy of NSA’s official Twitter account.]

At the end of part 1 of our look at the history of the NSA and American codebreaking, we left off with the pivotal Black Friday event.

On November 1, 1948, all intel coming from monitored Soviet signals went quiet. All traffic on military, naval, and police radio links was replaced with dummy messages. It was such an unprecedented and alarming event that London and Washington briefly considered that it might’ve been the first indication of preparations for war.

According to Code Warriors author Stephen Budiansky:

The full extent of the disaster only became apparent the following spring when real traffic started reappearing on the radio nets, now employing greatly improved — and completely unbreakable — technical and security procedures. The keying errors or other mistakes that had allowed most of the Soviets’ machine-enciphered military traffic to be routinely read by US and British codebreakers for the last several years had been corrected, and the much more disciplined systems that now replaced them slammed the cryptanalytic door shut.

Even the one-time pads that had offered some hope to attentive American codebreakers were updated, eliminating the ability to sort messages by which organization they originated from.

Codemakers had suddenly outpaced codebreakers.

[The Kryptos sculpture outside CIA Headquarters. The NSA cracked
several of its codes before the CIA did. Image courtesy of Slate.com.]

The Office of Naval Intelligence wanted to take over from Signals Intelligence (SIGINT), demanding to see “everything” so they could do the job. They claimed SIGINT should limit their work to message translation, leaving interpretation to “the real experts.” This sort of territorial gamesmanship would continue to hamper government organizations for decades to come.

And that demand to see everything? That probably sounds familiar, in light of the revelations about government data collection and the PRISM program that were revealed in Edward Snowden’s leaks.

Black Friday was the start of all that, a shift from codecracking to the massive data collection and sifting operation that characterized the NSA for decades to come.

More amazingly, there was SO MUCH information collected during World War II that SIGINT was still poring over it all in 1949, decrypting what they could to reveal Soviet agents in the U.S. and England.

The fact that a high-ranking member of British Intelligence at the time, Kim Philby, was actually a Soviet double agent complicated things. After a decade under suspicion, Philby would flee to the Soviet Union in 1963, stunning many friends and colleagues who had believed in his innocence.

[The spy and defector, honored with a Soviet stamp.
Image courtesy of Britannica.com.]

Although the Russians had flummoxed SIGINT, other countries weren’t so lucky. The East German police continued to use ENIGMA codes as late as 1956. Many of the early successes in the Korean War were tied to important decryption and analysis work by SIGINT. Those successes slowed in July of 1951, when North Korea began mimicking Russia’s radio procedures, making it much harder to gain access to North Korean intel.

Finally, the chaotic scramble for control over signal-based data gathering and codebreaking between the government and the military resulted in the birth of the National Security Agency on November 4, 1952, by order of President Truman.

One of the first things the NSA did? Reclassify all sorts of material involving historical codebreaking, including books and papers dating back to the Civil War and even the American Revolution.

[The actual report that recommended the creation of the NSA.
Image courtesy of NSA’s official Twitter account.]

The creation of the NSA had finally, for a time at least, settled the issue of who was running the codebreaking and signals intelligence operation for the United States. And they were doing fine work refining the art of encryption, thanks to the work of minds like mathematician and cryptographer Claude Shannon.

One of Shannon’s insights was the inherent redundancy that is built into written language. Think of the rules of spelling, of syntax, of logical sentence progression. Those rules define the ways that letters are combined to form words (and those words form sentences, and those sentences form paragraphs, and so on).

The result? Well, if you know the end goal of the encoded string of characters is a functioning sentence in a given language, that helps narrow down the amount of possible information contained in that string. For instance, a pair of characters can’t be ANYTHING, because letter combinations like TD, ED, LY, OU, and ING are common, while combos like XR, QA, and BG are rare or impossible.

By programming codecracking computers to recognize some of these rules, analysts were developing the next generation of codebreakers.

Unfortunately, the Russian line was holding. The NSA’s failure to read much, if any, Soviet encrypted traffic since Black Friday was obviously becoming more than just a temporary setback.

Something fundamental had changed in the nature of the Russian cryptographic systems, and in the eyes of some scientific experts called in to assess the situation, the NSA had failed to keep up with the times.


I hope you’re enjoying this look at the early days of America’s 20th-century codebreaking efforts. Part 3 will continue next week, with the sea change from active codebreaking to data mining, plus Vietnam, the space race, and more!


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!