A Puzzly Discovery Under the Sea!

We’ve talked quite a bit about the importance of Enigma machines in the past.

The quest to crack the unbreakable Nazi code machine spanned the Atlantic Ocean and resulted in never-before-seen collaborations between analysts, codebreakers, and puzzlers from all walks of life, dedicating hours upon hours every day to trying to unravel the secrets of German communications. Cracking the code would be the key to intercepting crucial information and outmaneuvering the Nazi war machine.

We’ve discussed those twin decryption locations — Arlington Hall in the US and Bletchley Park in the UK — as well as the efforts of codebreakers like Elizebeth Smith Friedman to dismantle the work of Nazi spymasters both during and after World War II.

The story of Alan Turing is inextricably linked with that of the Enigma device, even though there were three Polish mathematicians — Rejewski, Rózycki & Zygalski — who had already demonstrated that the Nazi code was breakable and even managed to reverse engineer an Enigma machine.

Strangely, we rarely talk about the Enigma machines themselves. They were dangerously efficient, as explained in this article from Atlas Obscura:

When the Nazis needed to send confidential messages, they entered the dispatches into the machine, which substituted every letter using a system of three or four rotors and a reflector, encrypting the message for a recipient Enigma machine to decode.

Getting Allied hands on one during the war was a top priority, so much so that the standing orders on German ships and U-boats was to throw them overboard and let the sea claim them, rather than risking the chance of the Allies getting ahold of one.

underwater enigma

But the sea doesn’t always keep secrets forever, and a recent dive by a marine biologist team discovered the remains of an Enigma machine in the Bay of Gelting:

He noticed a contraption tangled up in the fishing line the crew had headed down to collect. The device, which at first seemed like an old typewriter sitting under at least 30 feet of water, was a Nazi Enigma machine, likely one of hundreds abandoned and thrown overboard in the dying days of the German war effort.

And those devices still contain valuable information decades later.

Each Enigma machine has a serial number, and if this machine’s number is still legible after decades underwater, it could reveal which ship or Nazi unit the Enigma machine belonged to. This would allow researchers to track the use of the device and what impact its use or its absence had on the war effort overall.

Yes, it’s not just mussels and fish that call this device home, but a readily accessible history of the device itself, if we can only read it.

underwater enigma 2

And now, instead of being protected at all costs by German officers, this machine is now protected by archaeologists and researchers, sitting in a tank of demineralized water in order to flush out the salt and salt water that has so corroded the machine over time. It will spend almost a year in that tank before any restoration efforts can proceed.

Successful recoveries of these machines are understandably rare, and this is a chance to add to the historical record of codebreaking and puzzling during World War II. Here’s hoping we can stumble upon more of these lost treasures in the future.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Rock Your World With These Puzzly Mysteries!

Dighton_Rock-Davis_photograph

[Image courtesy of Atlas Obscura.]

We’ve spent a lot of time over the last few months discussing treasure hunts, but those are far from the only puzzly adventures that can send solvers out into nature. If you prefer your puzzling to have a codebreaking or cryptographic angle, we’ve got you covered there as well.

There are three mysterious stones in the United States alone that bear mysterious messages that have boggled the minds of puzzlers for decades upon decades.

In Massachusetts, an eponymous state park museum is the home of the Dighton Rock, a stone covered in petroglyphs that has baffled viewers for centuries. (The earliest writings about the rock date back to 1690!)

judaculla

[Images courtesy of Atlas Obscura. Look at the difference
between the two photos. Time is definitely running out…]

In the mountains of North Carolina, the petroglyphs of the Judaculla Rock defy decoding. Even dating the petroglyphs proves difficult, with estimates placing the origins of the rock’s message between 200 BC and 2000 BC. Sadly, efforts to solve the mystery of this former sacred site of the Cherokee people are fighting the forces of time itself, as erosion threatens the integrity of the glyphs.

And for solvers in the Southwest, New Mexico has the Decalogue Stone, which bears an inscription that, depending on the language used to decode it, could be a record of the Ten Commandments or a report from a lost explorer or warrior. (The possibility that it’s a hoax has been floated by more than one investigator as well.)

rock-inscription

[Image courtesy of The Connexion.]

But for today’s mystery, we turn toward the country of France, more specifically the village of Plougastel-Daoulas in Brittany, the home of a rock that has baffled solvers for at least a century.

Unlike the Dighton Rock, which was moved from the waterline of the Taunton River, the inscription on this rock spends most of its time submerged in the Atlantic Ocean, revealing itself only at low tide. The 20-line inscription utilizes letters from the French alphabet, but the actual language used has eluded solvers. Suggestions include Basque and Old Breton. (There are also two dates on the rock: 1786 and 1787.)

Those dates lead some articles to estimate that the inscription’s origins date back as far as 250 years, but I think that’s unlikely. The rock was only discovered four or five years ago, so that’s a huge window wherein those dates could’ve been carved into the rock.

So, what makes this rock so interesting, given the examples we’ve shared above? Well, this rock inspired the village of Plougastel-Daoulas to host a contest last year to decipher it, offering a prize of 2000 Euros to anyone who could translate it.

13445296-0-image-a-39_1557760832524

[Image courtesy of The Daily Mail.]

In February of this year, the prize was awarded to two solvers who pitched different solutions to the inscription:

The first hypothesis came from Noël René Toudic, professor of English, who has a degree in Celtic Studies. He said that the inscription was likely about a soldier, Serge Le Bris, who may have died at sea during a storm. Another soldier, Grégoire Haloteau, was then asked to engrave the rock in memory of the dead man.

The second hypothesis came from reporter and writer Roger Faligot, and comic book author and illustrator Alain Robert. They suggested that the inscription was by someone expressing their anger against those who caused the death of a friend.

Despite those pitches — and all of the headlines declaring the mystery solved — this case is not officially closed yet. Perhaps other towns will follow the Plougastel-Daoulas model to encourage both visitors and solvers.

It certainly couldn’t hurt.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Puzzles in Pop Culture: The Challenge: Total Madness

totalmad head

[Image courtesy of The Nikki Sin.]

One of the first reality TV shows to make an impact was MTV’s The Real World, which debuted back in 1992. A show wherein seven strangers would live together in a house and have their lives and interactions taped, it is credited with helping launch the modern reality TV genre.

In the decades since, one of the show’s longest-lasting spin-offs has been The Challenge, a competition show where former Real World alums and other reality show figures compete against each other in physical and mental games, both individually and as teams. There is also a social element to the show, as players form alliances, scheme against other competitors, and often vote out players at regular intervals.

Challenge 35

[Image courtesy of TV Guide.]

As you might expect, puzzles have worked their way into The Challenge from time to time. Memory games, riddles, anagrams, sliding tile puzzles, and variations on the Tower of Hanoi puzzle have all appeared in past seasons.

The most recent iteration of the show, The Challenge: Total Madness, pits the players against each other in the hopes of making it to the finals and winning a big cash prize.

In last week’s episode, the players arrived at a quarry, where a puzzly surprise awaited them: Decode and Detonate.

totalmad1

The players each had a sign bearing a sequence of symbols. Their job was to decode the sequence and display the correct decryption below the sign, using letter and number cards found in a box below the sign.

But in order to decode the sign, they would have to acquire the key to the puzzle.

Well, keys.

totalmad2

Yes, the key indicating which symbols represented which letters / numbers was split between two boards a fair distance apart. With two puzzle keys to run to — and each key only bearing some of the symbols on your sign — you’re going to have to run to both puzzle keys at some point. And that doesn’t include any running back to your sign you have to do in order to decode the letters you can remember.

totalmad3

Once you’ve decoded your sign (and it’s been confirmed as correct by the judges), you have to run to a detonator and push down the plunger, blowing up one of the two trucks perched on the bluff high above. Out of 26 competitors, only 2 can push a detonator and win the game.

totalmad4

The players, as you might expect, had different strategies going into today’s challenge.

Swaggy C, a rookie, bragged about relying on his photographic memory. CT, a veteran, immediately created a memorization tool for himself, associating each character with an image or something familiar so he could better remember it.

totalmad8

Jordan hoped to remember four or five symbols on his first run, figuring he could make up time because of his endurance. Fessy, meanwhile, kept it simpler, hoping to remember three symbols, because he thought trying to remember too many would cause him to jumble them up and get confused.

Wes opted to group the symbols in sets of four, hoping to keep each smaller bundle of characters in his brain more efficiently, and then make up time during the runs between stations.

totalmad6

After a fair amount of running, Swaggy C and CT were neck and neck. Swaggy C was the first to call for a check — asking the judges to confirm his solution — but it was incorrect. So much for that photographic memory of his.

totalmad7

CT called for a check and was correct, becoming the first competitor to run to one of the detonators and blow up a truck, earning him the win and power going forward in the game.

When the truck exploded, all of the competitors, no matter how far away, now knew that someone had completed the puzzle. Only one spot left.

totalmad9

You might think people would pair up to divide and conquer, hitting both puzzle keys at once and reconvening to see how many letters they could cobble together as a team.

No one opted to pair up. But one player DID consult another player’s work.

totalmad10

Bayleigh took advantage of the fact that everyone was using the same code language. One of the other competitors, Jenny, had the same C-shaped coded letter Bayleigh had on her sign, and had placed a decoded letter beneath it. Bayleigh took a chance that Jenny was right about the decryption, and used the information to complete her sign’s coded sequence.

When she asked for a check, it was correct. TRICKY. Not exactly in the spirit of the challenge, but effective nonetheless.

totalmad11

Bayleigh then sprinted to the second detonator and blew up the second truck, joining CT in victory and bringing the day’s challenge to a close.

totalmad12

One of the cleverest things about the way The Challenge uses puzzles is that they incorporate physical obstacles as well.

For instance, solving a puzzle on a hot day, and making the players run all over. As you get tired, you’re not in peak puzzle-solving condition, and it makes memorization and recall harder. Even if you have a (supposedly) photographic memory under normal circumstances, stressing the body always makes mental tasks more taxing.

totalmad5

Although this wasn’t the most difficult puzzle-based event I’ve seen in previous editions of The Challenge, it was a nice variation and certainly kept the competitors on their toes. I look forward to seeing if there are more puzzly obstacles awaiting the two teams as the competition continues.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

The Beale Ciphers: A Puzzly Treasure Hidden Since the 1800’s?

There’s nothing quite like a treasure hunt to spark the imagination. From The Treasure of the Sierra Madre to the adventures of Indiana Jones, from tales as far back as Poe’s “The Gold-Bug” to stories as recent as an episode of NCIS: New Orleans last year, a treasure hunt can turn a crime story or an adventure tale into an irresistible narrative for the ages.

Thankfully, there are a few treasure hunts lurking out there in the real world, offering clever solvers the chance to live out their own adventure. In the past, we’ve explored the mystery of Forrest Fenn’s Rocky Mountain treasure, we’ve chronicled efforts to locate all of Byron Preiss’s The Secret treasures, and we’ve suggested tactics for cracking Jason Rohrer’s A Game for Someone hunt.

But as intriguing as those hunts are, none of them have spanned more than a century of searching. (Without resulting in unfortunate demises, that is. We’re looking at you, Oak Island.)

No, that singular honor belongs to a treasure hunt known as the Beale Ciphers.

beale_papers

As the story goes, a man named Thomas J. Beale buried a treasure trove of gold and silver somewhere in Bedford County, Virginia, in the early 1800s. Beale then encrypted the location of the treasure, the contents of the treasure, and the names of those he wished to have the treasure. Beale handed off those encryptions to an innkeeper, then vanished, never to be seen again. (His promise of later providing the key for the ciphers was never fulfilled.)

The innkeeper failed to crack the ciphers, then held onto them for decades before passing them along to an unnamed friend before his death. The unnamed friend spent twenty more years trying to unravel the encryptions (managing to solve the second of the three encrypted messages). Eventually, the friend published the encryptions and the story of Beale’s treasure in a pamphlet he began selling in 1885.

So, how do the ciphers work?

It’s simple, really. Take a book, pick a given page, and number all of the words on the page. (Or just start at the beginning of the book.)

If you’re using A Tale of Two Cities, for instance:

1 It
2 was
3 the
4 best
5 of
6 times,
7 it
8 was
9 the
10 worst
11 of
12 times…

So, using the first letters of each word (and the corresponding number), the word BOW could be encrypted 4 11 8 or 4 11 2 or 4 11 10.

This grants people in the know two advantages. The code is incredibly difficult to break on its own, because unlike a cryptogram (or any other message encrypted with a Caesar cipher or a one-to-one relationship between coded letters), each appearance of a given letter could be a different number, not the same one over and over.

Plus, if you know the key (the book and page number), decoding it requires no puzzly skill at all.

It’s diabolical and effective, as proven by Beale’s trio of ciphers, since only one has been cracked (because the solver stumbled upon the Declaration of Independence as the key).

[The second Beale cipher.]

The decrypted text from the second cipher:

I have deposited in the county of Bedford, about four miles from Buford’s, in an excavation or vault, six feet below the surface of the ground, the following articles, belonging jointly to the parties whose names are given in number three, herewith:

The first deposit consisted of ten hundred and fourteen pounds of gold, and thirty-eight hundred and twelve pounds of silver, deposited Nov. eighteen nineteen. The second was made Dec. eighteen twenty-one, and consisted of nineteen hundred and seven pounds of gold, and twelve hundred and eighty-eight of silver; also jewels, obtained in St. Louis in exchange to save transportation, and valued at thirteen thousand dollars.

The above is securely packed in iron pots, with iron covers. The vault is roughly lined with stone, and the vessels rest on solid stone, and are covered with others. Paper number one describes the exact locality of the vault, so that no difficulty will be had in finding it.

bealemap

Of course, there are some problems there, even with the cipher that treasure hunters consider solved. You see, there are some irregularities with the solution. Not only are there four misspellings in the translation, but a variation on the original Declaration of Independence must be used or the cipher doesn’t decode correctly.

Now, mistakes happen. (As we learned with the story of Brian Patrick Regan.) But if there are mistakes in the two unsolved ciphers as well, that only makes the chances of finding the proper key even slimmer, because a mistake in the early numbers of the code might convince someone that they’ve got the wrong key, even if they have the right one!

Do you find that challenge daunting, fellow puzzlers? It’s understandable if you do. The other two ciphers have resisted the best efforts of even master cryptographers and cryptanalysts.

Given that the Declaration of Independence was the key for the second cipher, many aspiring treasure hunters have tried using other famous historical documents as possible keys for the other ciphers, including the Magna Carta, the Constitution, the Monroe Doctrine, and more, as well as the plays of Shakespeare and the Lord’s Prayer.

bealemontvale

There are also plenty of reasons to doubt that this treasure exists at all. (The same question marks hang over some of the other treasure hunts we’ve mentioned, like Forrest Fenn’s.)

There are questions regarding the language in the pamphlet, where the gold was supposedly found, why Beale would bother encrypting the names of the people he wanted to inherit the treasure, and even whether Beale himself ever existed in the first place. (Famous skeptic and investigator of the supernatural Joe Nickell believes the pamphlet is a fraud.)

But does that mean the ciphers are? Not necessarily.

An analysis in 1970 by Dr. Carl Hammer of Sperry-UNIVAC indicated that the number patterns are not random. He believed that further attempts at cracking the ciphers would be worthwhile.

Heck, even our old codebreaking friends Elizebeth Smith Friedman and her husband William tried to unravel the Beale ciphers, but without success. She called the ciphers “a diabolical ingenuity designed to lure the unwary reader.”

And, of course, not every hunter has come away empty-handed. One team of treasure hunters stumbled upon a cache of Civil War artifacts while hunting for Beale’s trove.

So what do you think, PuzzleNationers? Is the Beale treasure real? Will it ever be found? Let us know in the comments section below! We’d love to hear from you.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Puzzles in Pop Culture: NCIS: New Orleans

Last week, a murder investigation turned into a puzzly treasure hunt for a group of NCIS investigators, a team who investigates criminal cases involving members of the military. So join us as we rundown the events of “Treasure Hunt,” episode 17 of season 4 of NCIS: New Orleans.

The episode opens during a pirate-themed festival, as two women search for the secret entrance to an exclusive costume party. Unfortunately, instead of drunken revelry, they stumble upon a dead body, strung up inside a warehouse on the waterfront.

The NCIS team soon arrives, and the coroner identifies the victim as an oceanographer, Lt. Commander Elaine Dodd. Dodd was beaten before her death, and her arm was partially skinned, perhaps as part of an interrogation.

Dodd’s oceanographic work centered around Grande Isle, the former stomping grounds of the infamous pirate Jean LaFitte. The team makes contact with Dodd’s father, Tom, a former Green Beret. He expected her to show up at his house in Florida after an excited phone call, but she never arrived. This leads the team to believe that Dodd’s death had something to do with a treasure hunt, one of the things she and her father bonded over.

Forensic analysis reveals that her arm was skinned to remove a tattoo, but they’re able to reconstruct the image: a simple compass and some coordinates. These confirm the treasure hunt theory: Dodd had apparently made some progress in locating the lost Napoleon Fleur de Lis, a jewel-encrusted emblem stolen by Jean LaFitte and hidden away.

Following the coordinates to a church, Special Agent Pride and lab tech Sebastian search the area, finding their way upstairs to a lofted storage area. But someone has beaten them to the punch, opening fire and sending the agents scurrying for cover.

Pride chases the two suspects, but they get away, and when he doubles back to the loft, he finds Sebastian examining a statue stored in the church attic. Once the statue is removed from its pedestal, a secret compartment opens, revealing a wooden puzzle book wrapped in cloth.

The puzzle book is marked with a fleur de lis and bears an inscription of Jean LaFitte’s signature. The investigation of Dodd’s murder has officially become a treasure hunt.

Back at the field office, Agent Gregorio would prefer to use a knife to crack open the book, but Sebastian insists on solving the cipher to open the book, as some puzzle books include a vial of acid inside that would destroy the book if tampered with.

While he works on the puzzle book, cameras outside the church help the agents ID one of the suspects, a mercenary for hire. Dodd’s father Tom enters the office, hoping for progress, and recognizes the suspect. He points the agents toward the mercenary’s usual employer, a specialist in deep-sea diving and sunken galleons. Dodd’s father offers to arrange a meeting, and the team is wary, but takes him up on his offer.

Meanwhile, Sebastian and Gregorio check Dodd’s phone records and find several calls to a local professor, Michelle Faucheux, an expert in LaFitte and pirate history, who they believe helped Elaine find the coordinates. But when they arrive at her home, it has been ransacked, the professor locked in a closet. After they release her and calm her down, she confirms she’d been talking to Elaine.

Tom makes good on his word and lures his contact to a bar with the agents in tow. But the man, Walton, claims he hasn’t worked with either of the suspects in months. He warns Tom and the team away from the treasure hunt, clearly spooked by the ruthlessness he’s observed.

Sebastian and Gregorio bring Michelle back to the office, and she’s stoked to see the puzzle book. The cover of the puzzle book is encrypted, and they have to turn a dial in order to unlock it. But they need a key word to help solve the cipher. After trying out various words, they focus on LaFitte’s brother, Pierre — the most likely person to be hunting for LaFitte’s treasure. This leads them to try the word “Cabildo,” the jail in which Pierre had been incarcerated.

Using that as the key word — and a Vigenere cipher to crack the code — leads them to the answer “fleur de lis”, and they unlock the puzzle book’s cover. The iris in the center opens, revealing a latch, and they open the puzzle book.

On the left page is a clock puzzle, and on the right is a map with smaller code dials beneath it, along with a plate reading BLF6.

Agent Pride calls them, informing Gregorio that the two suspects are camped out right down the street from the office. He and the team are en route, but they expect trouble soon.

Oddly enough, the suspects simply hang back and wait as the team reunites. The agents suspect the mercenaries are waiting for the team to lead them to the fleur. So the team focuses on the riddle, hoping for a chance to gather more info on whomever is bankrolling the gun-toting baddies.

The riddle “Move as the clock” offers a hint for how to find which code letters to enter, but they’re not sure where to start. Pride theorizes that BLF6 could point toward Barthelemy Lafon, an architect and city planner from the 1700s who also palled around with the LaFitte brothers. He is buried in a local cemetery, in a crypt located at F6 on the map.

Gregorio, Sebastian, and Michelle head to the crypt while Agents Percy and LaSalle keep their eyes on the suspects, getting close enough to clone their phones and gain access to their calls and text messages. Pride and Dodd’s father are back at the field office, trying to figure out who would literally kill to have the artifact.

The puzzle book trio spot an engraved fleur de lis over the letter L in “Lafon”. They try “moving as the clock” by moving clockwise to the next crypt. Another fleur de lis over another crypt engraving gives them the final letter they need, unlocking a compartment in the book and revealing both the suspected acid vial and a piece of paper. It’s a partial map with another riddle written in French. Michelle quickly translates it as “enter this last crypt to find the fleur de lis” and runs off.

At this point, all of the viewers become very suspicious of Michelle. I mean, come on, the riddle was four lines long, and given how tough the puzzle book had been to crack thus far, this seemed too easy.

Meanwhile, the suspects leave after receiving a text that the fleur is NOT in the cemetery. As you might have suspected, Michelle texted the suspects and has been behind everything the whole time. But the viewers are clearly one-up on the agents, who blindly follow Michelle to another crypt, where Michelle traps them inside and runs off.

We get some unnecessary backstory on Michelle involving a dead brother and being scammed out of treasure by the Spanish government, but who cares, what about the treasure hunt?

Pride and Tom go after Michelle while Percy and LaSalle hunts for the easily bamboozled agents, who are trapped in the crypt and running out of air. Pride and Tom head out to Fort Macomb, a repurposed, then abandoned, base which was formerly known as Chef Menteur. (It’s unclear whether they solved the map clue that Sebastian photographed and sent them before being trapped or if they just followed the hired goons.)

But nonetheless, they’re en route to the treasure while Gregorio and Sebastian set a fire inside the crypt, hoping the smoke will escape and lead their fellow agents to them before they suffocate. Their plan works, and they’re rescued.

At Fort Macomb, Pride orders Tom to stay with the car, and heads into the fort, getting the drop on Michelle. Unfortunately, her goons capture Tom, and Pride loses the standoff. In classic villain fashion, Michelle has Pride dig up the treasure for her.

At her moment of triumph, Tom puts his Green Beret training to work, taking out one of the hired thugs as Pride dispatches the other. Since we’re running on full cliche at this point, Tom has a chance to kill the woman who killed his daughter, but spares her after a speech from Pride. The better man and all that.

The episode closes with the team admiring the bejeweled source of everyone’s consternation. Tom decides to donate the fleur to the city, because that’s what his daughter would have done. Nice closer.

All in all, I was a little underwhelmed by the episode, because the plotline twists failed to keep up the same interest level that the treasure hunt did. Once they were done with the puzzle book, the cliches rapidly took over.

Who stops in the middle of a treasure hunt to tattoo a clue on themselves? Why wasn’t the tattoo artist a suspect? That would have been a nice touch. Also, Michelle’s transparent villainy wasn’t nearly as fun as her geeky schoolgirl excitement at cracking puzzles alongside Sebastian. That was easily the show’s highlight.

I do want to give a special shout-out to the Codex Silenda team, who created the specially weathered-looking puzzle book for the episode. I wrote about them back in August of 2016 when their wildly-successful Kickstarter campaign originally closed. They’ve been busy fulfilling orders for Kickstarter backers ever since, and they were clearly excited to see one of their puzzle books on a national stage like this.

What’s more amazing is that the puzzle book cracked by the NCIS team in this episode was only a few pages deep. The full Codex Silenda is much larger and more intricate! No doubt the real Jean LaFitte would’ve splashed out for the complete Codex in order to bamboozle potential treasure hunters.

Still, it’s always nice to see crime shows explore the possibilities that puzzles offer. Splicing up the occasional murder with a puzzle (or better yet, a treasure hunt) is a pleasant change of pace for the procedural genre. Nicely done, NCIS: NO.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Puzzle History: Codebreaking and the NSA

ohr577n

[Image courtesy of NSA.gov.]

The National Security Agency has been in the news a lot over the last few years.

It arguably all started with Edward Snowden and the revelations about government surveillance, both domestic and foreign, that emerged in his wake. Between President Trump’s intimations of Obama-era wiretapping (which also supposedly involved England’s GCHQ) and recent news stories about NSA contractor Reality Winner leaking information, the NSA continues to draw mainstream attention in the 24-hour news cycle.

When you factor in the declassification of codebreaking intel during and after World War II, we know more about the NSA’s inner workings than ever before.

You might be asking what the NSA has to do with puzzles. Well, everything. Because the NSA was born as a codecracking organization.

enigma

The NSA was founded in November of 1952, but its formative stages began during World War II, as codebreakers were recruited in the U.S. starting in 1943. Not only were they tasked with tackling the German ENIGMA code, but their secondary mission was to solve “the Russian problem.” This group was known as Signals Intelligence, or SIGINT.

William Friedman, one of the early figures in American codebreaking, described cryptanalysis as “a unique profession, demanding a peculiar kind of puzzle-solving mentality combined with patience. So staffing this new organization was a curious endeavor.”

Those who were recruited came from all walks of life:

Career officers and new draftees, young women math majors just out of Smith or Vassar, partners of white-shoe New York law firms, electrical engineers from MIT, the entire ship’s band from the battleship California after it was torpedoed by the Japanese in the attack on Pearl Harbor, winners of puzzle competitions, radio hobbyists, farm boys from Wisconsin, world-traveling ex-missionaries, and one of the World’s foremost experts on the cuneiform tablets of ancient Assyria.

04/11/14 imitation game - bletchley park, milton keynes

A large campus was built that echoed the style and efforts of Britain’s Bletchley Park, including Alan Turing’s calculating machines, the bombes. Efforts on both sides of the Atlantic centered on cracking ENIGMA, the German codes used in all sorts of high-level communications. The teams worked alongside the bombes to try to determine which of the 456, 976 possible codes was being used in a given piece of communication.

It was a truly Herculean effort.

But while nearly half the staff focused on the Germans, others focused on cracking Russian codebooks, where words were translated into four-digit codes. Often, decrypting these codes involved “brute force” efforts, poring through numerous messages to pair up messages that used similar numerical groups, meaning they used the same cipher.

This would only work if the Soviets were lazy in their production of so-called “one-time pads,” encryption devices that had a particular code, which would be used once and then thrown away. Brute force codebreaking revealed that some of the one-time pads had been used more than once, a lapse in Soviet security that could work to the advantage of U.S. intelligence.

That deduction led to another stunning discovery: cracking the system used in encrypted messages to tell agents which encryption was used in a given missive. You see, each encoded message contained within it a code that dictated the cipher necessary to decrypt the message.

The Russians would later complicate this work by employing multiplexers: devices that would transmit numerous messages at once, making it harder to separate one message from another in the same dispatch.

hqdefault6

[Image courtesy of Virtantiq.com.]

The Germans would unwittingly aid the US in their Russian codebreaking efforts when a POW camp in Bad Aibling, Germany, was captured by the US army, and they uncovered a German device designed to “de-multiplex” Russian messages. The device was called the HMFS, because Hartmehrfachfernschreiber, while a great deal of fun to type, is hard to say quickly.

After World War II ended, U.S. intelligence consolidated their efforts on “the Russian problem,” continuing their work unraveling the Russian codebooks. Slowly, the codemasters began determining which organizations in the Soviet government used which codes. Even if the codes weren’t broken yet, it helped the intelligence community organize and prioritize their efforts.

The problem? They had a very tight timeframe to work in. Those duplicated codebooks were produced during a very small window of time in 1942, and only issued to Soviet agents in the three years that followed. By 1947, SIGINT analysts knew the Soviets would soon run out of the duplicated pads. Once they did, those recurring patterns of encrypted numbers would stop, and the best chance for cracking the Soviet codes would be lost.

Still, there was reason to be encouraged. Some important code words had been identified. TYRE was New York City, SIDON was London, and CARTHAGE was Washington; ENORMOZ appeared often enough that they determined it referred to atomic bomb research in Los Alamos.

It would also be revealed, through careful analysis of decrypted intel, that Soviet agents were embedded in both the U.S. Justice Department and in England’s Bletchley Park campus. The Justice Department agent was identified and tried, but released after the court found insufficient evidence to place her under surveillance in the first place.

This was one consequence of the secrecy surrounding codebreaking: an unwillingness to reveal their codebreaking success by turning over evidence of it. (As for the Bletchley Park spies, one was identified in 1951 and confessed in 1964. The other was never identified.)

By this time, the Russians had gone over ENIGMA machines captured during the German retreat, and had unraveled not only how the devices worked, but how to improve upon them. This would lead to the next-generation Russian Fialka machine.

fialka

With ever-increasing complexity when it came to encryption, thanks to increased automation, codebreaking evolved into not just intelligence work, but intelligence analysis. After all, if you don’t know something is important, you don’t necessarily give it the attention it deserves. As researcher Stephen Budiansky put it, “The top translators at Bletchley were intelligence officers first, who sifted myriad pieces to assemble an insightful whole.”

It also led to bigger, faster machines, like Goldberg and Demon, two computation machines designed to more efficiently pore over the vast amount of encrypted information being intercepted by the various U.S. intelligence services.

In 1948, though, the game changed. It changed so dramatically that November 1, 1948, is still remembered in NSA circles as Black Friday.


I hope you’re enjoying this look at the early days of America’s codebreaking efforts. Part 2 will continue next week, with a look at the rise of the NSA, Cold War cryptography, and more!

[Quotes and certain photos were sourced from Code Warriors: NSA’s Codebreakers and the Secret Intelligence War Against the Soviet Union by Stephen Budiansky.]


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!