Elizebeth Smith Friedman, Codebreaker and Scourge of Nazi Spymasters

[William and Elizebeth Smith Friedman, hard at work.
Image courtesy of National Geographic.]

Last year, I rather ambitiously attempted to summarize the early history of American codebreaking and the NSA in a series of blog posts spanning World War II through the modern day. One of the names I cited in that series, William Friedman, is synonymous with American cryptography, thanks to his contributions to the cracking of the German ENIGMA code and his efforts to establish the National Security Agency.

Unfortunately, there is a gaping hole in the narrative I constructed. Because none of my sources made any reference to another crucial Friedman: Elizebeth Smith Friedman, William’s wife and partner in code-cracking.

Yes, she was name-dropped in my post about the book Code Girls: The Untold Story of the American Women Code Breakers of World War II, but she had to share those pages with a host of underappreciated women who were codebreaking geniuses.

[Image courtesy of HarperCollins Publishers.]

As The Woman Who Smashed Codes explains, she wasn’t just a talented codebreaker. She literally wrote the book on it. Eight of them, in fact. The Riverbank Publications — although often credited to her husband — covered new codebreaking techniques in rich detail, and they are still referred to today as part of the foundation of modern cryptography.

She also started the first and only American codebreaking unit ever run by a woman, serving as Cryptanalyst-in-Charge while jointly working for both the Treasury and the Coast Guard during and after World War II.

A history of American codebreaking without Elizebeth Smith Friedman is woefully incomplete, and in today’s post, I hope to rectify that oversight.

[Image courtesy of the Marshall Foundation.]

Elizebeth’s work with codes started in a most peculiar way. While seeking a job as a librarian after college, she was recruited by eccentric millionaire George Fabyan to live and work at Riverbank, his palatial estate that doubled as a self-funded research center for all sorts of scientific endeavors.

Elizebeth’s deep knowledge of Shakespeare was put to work attempting to prove Fabyan’s theory that there were secret messages encoded in the writings of Shakespeare. Although her work failed to uncover any hidden pattern in Shakespeare’s words or font choices, it did lead to two unexpected developments: a career in codebreaking and a budding romance with fellow Riverbank recruit William Friedman, whose own interest in codebreaking was sparked by the works of Edgar Allan Poe.

Thanks to the proliferation of radio, there was a seismic shift in how information was being passed between military units, governments, and other organizations, so the ability to listen in on one’s enemies (and allies) was not only a new strategic opportunity, but it was a relatively new science.

In short, America needed codebreakers who could crack the secret messages being transmitted (and intercepted). The military didn’t have them. The government didn’t have them.

But Riverbank did. And for the first eight months of World War I, the small group of William, Elizebeth, and those they trained handled ALL of the codebreaking for every part of the US government, from the State Department to the Army to the DOJ. William and Elizebeth began running a codebreaking school out of Riverbank, even embedding a secret message in a photo of the class taken on the last day of the course.

[Images courtesy of Elonka.com.]

In the aftermath of the First World War, codebreaking had become so important that countries were turning to machines to help develop uncrackable codes. And yet, at this point, American cryptography as a whole consisted of about 50 people. William went to work for the government, establishing the American version of Bletchley Park — Arlington Hall — and setting the stage for the creation of the NSA.

Elizebeth, on the other hand, cracked codes from home. And she did so for both the Treasury Department and the Coast Guard, who would send her sealed packages of intercepted encrypted intel and communications. In her first three months hunting down rum-runners during Prohibition, she solved two years’ worth of backlogged messages.

During World War II, Elizebeth’s Coast Guard Cryptography Unit turned their attention from smuggling (which waned during wartime) to cracking German codes. Under her tutelage, they would crack three different variations on the Enigma codes, each more complex than the last. (The British also cracked ENIGMA, independently of American efforts.)

Sadly, in the aftermath of the Pearl Harbor attack, the US military didn’t want civilians in charge of sensitive operations, so Elizebeth was demoted. Yes, she was no longer in charge of the group she started, trained, and cultivated, instead answering to a new boss of dubious cryptographic talents.

(Of course, the sexist dimwits making decisions like this had to grin and bear it when numerous other organizations and agencies continued to asked for Elizebeth’s assistance by name.)

And stealing Elizebeth’s credit was practically a cottage industry over at the FBI. We have them to thank for erasing Elizebeth’s role in particular — and the Coast Guard’s role in general — in hunting down, exposing, and compromising Nazi spy networks in South America, even though the FBI’s hamfisted blundering actually served to expose codebreaking operations in the past, forcing Elizebeth to crack new codes in order to regain the advantage the FBI had squandered.

Oh, yeah, did I mention that both during AND after World War II, Elizebeth continued to hound the Nazi forces in South America who sought to destabilize the region?

As one historian put it, referring to the thousands of pages of decryptions Elizebeth produced:

These pieces of paper saved lives. They almost certainly stopped coups. They put fascist spies in prison. They drove wedges between Germany and other nations that were trying to sustain and prolong Nazi terror. By any measure, Elizebeth was a great heroine of the Second World War.

The British knew it. The navy knew it. The FBI knew it. But the American public never did, because Elizebeth wasn’t allowed to speak.

[Image courtesy of Find a Grave.]

Even in their retirement, the Friedmans continued to contribute to the world of cryptography. They returned to the subject of Shakespeare with The Shakespeare Ciphers Examined, thoroughly debunking the whole idea of hidden codes in the Bard’s works.

When William died, Elizebeth even hid a secret message on his tombstone, for those who knew how to look. (It was Bacon’s cipher, something they both studied extensively during their time at Riverbank.) What a touching tribute to how she met her partner and husband.

And although the accolades and appreciation for Elizebeth’s incredible contributions have been slow in coming, they are trickling in. In the 1990s, the NSA renamed its auditorium from the William F. Friedman Memorial Auditorium to the William F. Friedman and Elizebeth S. Friedman Memorial Auditorium. A Justice Department building also has an auditorium bearing her name.

More information about the massive expansion of codebreaking worldwide is coming to light with every passing year. Hopefully that will mean greater attention for minds like Elizebeth, who used her puzzly mind to protect the world. That’s someone worth celebrating.

[Much of the information in this post comes from a wonderful book on Elizebeth, The Woman Who Smashed Codes by Jason Fagone, and it’s well-worth your time to check out her story in full.]

Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

The Puzzly Legacy of Edgar Allan Poe

[Image courtesy of the Poetry Foundation.]

Edgar Allan Poe is one of the most influential writers in all of American literature. Not only did he come to epitomize all things ghastly and unnerving in Gothic horror with chillers like “The Tell-Tale Heart” and “The Cask of Amontillado,” but he also trailblazed the detective fiction genre with his character C. Auguste Dupin.

He also made an impact on the world of puzzles.

[Image courtesy of the National Cryptologic Museum Foundation.]

Those familiar with Poe’s works of fiction probably think I’m referring to his story “The Gold-Bug,” one of, if not the first, stories to not only mention cryptography, but to include a substitution cipher (a cipher where each letter in the alphabet is represented by a different letter, number, or symbol).

In “The Gold-Bug,” an unnamed narrator meets the unusual William Legrand, a man obsessed with restoring his family’s lost fortune. Legrand shows off a large scarab-like insect, the titular gold bug. A month later, the narrator and Legrand are reunited when the obsessed Legrand (along with his servant Jupiter) goes off on a expedition to discover the location of the buried treasure of the legendary Captain Kidd.

As it turns out, a piece of paper Jupiter used to collect the gold bug had traces of invisible ink on it, revealing a cipher containing instructions for how to find Kidd’s gold.

[Image courtesy of Bookriot.]

But this was far from Poe’s only dalliance with codebreaking. In fact, he helped popularize the art and science of cryptography with a series of articles in a Philadelphia publication called Alexander’s Weekly Messenger.

In December of 1839, he laid out a challenge to his readers, boasting that he could crack any substitution cipher that readers submitted:

It would be by no means a labor lost to show how great a degree of rigid method enters into enigma-guessing. This may sound oddly; but it is not more strange than the well know fact that rules really exist, by means of which it is easy to decipher any species of hieroglyphical writing — that is to say writing where, in place of alphabetical letters, any kind of marks are made use of at random. For example, in place of A put % or any other arbitrary character –in place of B, a *, etc., etc.

Let an entire alphabet be made in this manner, and then let this alphabet be used in any piece of writing. This writing can be read by means of a proper method. Let this be put to the test. Let any one address us a letter in this way, and we pledge ourselves to read it forthwith–however unusual or arbitrary may be the characters employed.

For the next six months, Poe tackled every cipher sent to Alexander’s. According to Poe, he received around a hundred ciphers, though historians have stated that only 36 distinct ciphers appeared in Alexander’s Weekly Messenger, 15 of which had solutions or partial solutions printed.

Nonetheless, it’s believed that Poe solved each of those 36 ciphers.

[Image courtesy of Awesome Stories.]

He followed up this impressive feat with an essay about cryptography in July of 1841 for Graham’s Magazine, “A Few Words on Secret Writing,” in which he discussed ancient methods of encryption and decryption, name-dropping codebreaking icons like Trithemius, Vigenere, and others.

He also published two cryptograms for the readers to solve, both submitted by a man named W.B. Tyler, “a gentleman whose abilities we highly respect.” Poe claimed he didn’t have time to solve either cryptogram, leaving them to the readers to crack. (Naturally, some scholars theorize that W.B. Tyler was none other than Poe himself.)

It would be over a century before the first verifiable solution to a W.B. Tyler cryptogram appeared. Professor Terence Whalen published his solution to the first Tyler cryptogram in 1992, and even offered a $2500 prize to whomever could solve the remaining Tyler cryptogram.

[Image courtesy of Cryptiana.web.]

That prize was claimed 8 years later by a Canadian software expert named Gil Broza, who cracked what turned out to be a polyalphabetic cipher, one in which several substitution alphabets are used.

Naturally, Poe’s interest in secret messages and codebreaking has led some to suspect that secret messages are lurking in his poetry and works of fiction. (Similar conspiracy theories abound regarding the works of Shakespeare.)

To be fair, there is something to this theory.

In a manner similar to Lewis Carroll hiding Alice Liddell’s name in an acrostic poem at the end of Through the Looking-Glass, Poe dedicated a poem to friend and poet Sarah Anna Lewis by hiding her name, one letter per line, in the poem itself.

[Image courtesy of The Baltimore Post Examiner.]

Of course, Poe’s method was more intricate than Carroll’s. The S in Sarah was the first letter on the first line, the A was the second letter on the second line, the R was the third letter on the third line, and so on. (Hiding coded messages in plain sight in this manner is known as steganography.)

And to this day, the hunt is on for secret messages in Poe’s works, particularly his more esoteric and oddly worded pieces. For instance, his prose poem “Eureka” — a musing on the nature of the universe itself, which actually proposed a Big Bang-like theory for the birth of the universe well before scientists offered the same theory — is believed to contain some sort of secret message or code.

Poe stated on more than one occasion that “human ingenuity cannot concoct a cipher which human ingenuity cannot resolve.” So if there is a code lurking in his works, someone will surely find it.

And in the meantime, we can still enjoy the chills, the grand ideas, and the mysteries he left behind. That’s quite a puzzly legacy.

Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Unsung Tales of Women in American Code Breaking!

[Image courtesy of Amazon.]

Dot Braden. Agnes Driscoll. Betty Hyatt. Elizebeth Friedman. Genevieve Grotjan. Ann Caracristi. Virginia Aderholdt. Ruth “Crow” Weston.

You don’t know these names, but you should. Everyone should. They’re bona fide American heroes who dedicated their time and energy to protecting not only our country, but also every soldier in the Allied forces during World War II. And they did so when they should have otherwise been continuing their collegiate studies.

That’s right, these women who came from majors as diverse as botany, math, psychology, and English, were recruited out of college in order to build a dedicated code-breaking unit for the US armed forces.

Thankfully, their stories are now being told in Liza Mundy’s new book, Code Girls: The Untold Story of the American Women Code Breakers of World War II. And these are some amazing stories.

It all started in early 1942, as secret letters began showing up in college mailboxes. Schools like Bryn Mawr, Mount Holyoke, Barnard, Radcliffe, and more posed two questions to prospective female recruits:

1. Did she like crossword puzzles?
2. Was she engaged to be married?

All of these women replied yes, they like crossword puzzles, and no, they’re not engaged or soon-to-be engaged.

After answering these questions, the women began attending introductory meetings. They were issued manila envelopes containing “a brief introduction to the arcane history of codes and ciphers, along with numbered problems sets and strips of paper with the letters of the alphabet printed on them.”

Their orders? Complete the problem sets every week.

[Image courtesy of YouTube.]

Each packet contained one problem that could not be solved, to show that sometimes, a jumble of letters or numbers doesn’t stand for anything. Sometimes, gibberish remains just that, because sometimes a code-breaker fails.

They developed working knowledge of foreign languages they didn’t speak. They memorized the most common English letters — E, T, O, N, A, I, R, S — and took frequency counts.

And that’s how America built its answer to England’s Bletchley Park code-breaking operation. (The American effort, known as Arlington Hall, was considered by their Bletchley Park rivals as “just a lot of kids playing at ‘office’.”)

College presidents like Ada Comstock, the president of Radcliffe College (the women’s counterpart to Harvard), were recruited to identify candidates to learn cryptanalysis to help shorten the war.

And make no mistake, they did shorten the war. They helped crack Enigma, which was key to decimating the German U-boat fleet, and their code-breaking efforts were instrumental in defeating Japan as well, providing valuable intel on the island-to-island battles of the Pacific theater.

[Image courtesy of Military Factory.]

Of the US Army’s World War II code-breaking force, nearly 70 percent was female. We’re talking 7,000 female code-breakers. When you factor in US Navy recruits as well, that number jumps to 11,000 women out of 20,000 code-breakers.

From Code Girls: “Code breaking required literacy, numeracy, care, creativity, painstaking attention to detail, a good memory, and a willingness to hazard guesses. It required a tolerance for drudgery and a boundless reserve of energy and optimism.”

Genevieve Grotjan was key to cracking the Japanese cipher known as Purple, and William Friedman, the man who initially ran the Arlington Hall operation, described the Purple cipher as “by far the most difficult cryptanalytic problem successfully handled and solved by any signal intelligence organization in the world.” He specifically pointed to the contrbutions of Grotjan, Mary Louise Prather, and other women in the Arlington Hall group.

Codes used by twenty-five different nations were analyzed by Arlington Hall, including codes of friends and foes alike. “There was a French code called Jellyfish, a Chinese enciphered code they called Jabberwocky, another they called Gryphon.”

But even their staggering efforts in code-breaking weren’t all they contributed to the cause. They were also crucial to the success of the D-Day invasion, as many of the women were put to work reverse-engineering messages in order to create false information about imaginary troop movements and landing areas. And in order to create fake signal traffic, they had to know the real traffic backward and forward.

I could go into more detail, breaking down how they cracked some of the war’s most important code languages, or exploring their personal lives and how life changed for these college students-turned-military operatives, but I don’t want to reveal more than I have already.

Read Code Girls. You won’t regret it. It’s another terrific entry in a year of books full of revelations about wartime puzzle history. We’ve been taken behind the scenes of the NSA, Bletchley Park, and now Arlington Hall.

And once more, important and influential female voices are getting the limelight far later than they deserve. It’s about time.

Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!