Puzzles in Pop Culture: The Challenge: Total Madness

totalmad head

[Image courtesy of The Nikki Sin.]

One of the first reality TV shows to make an impact was MTV’s The Real World, which debuted back in 1992. A show wherein seven strangers would live together in a house and have their lives and interactions taped, it is credited with helping launch the modern reality TV genre.

In the decades since, one of the show’s longest-lasting spin-offs has been The Challenge, a competition show where former Real World alums and other reality show figures compete against each other in physical and mental games, both individually and as teams. There is also a social element to the show, as players form alliances, scheme against other competitors, and often vote out players at regular intervals.

Challenge 35

[Image courtesy of TV Guide.]

As you might expect, puzzles have worked their way into The Challenge from time to time. Memory games, riddles, anagrams, sliding tile puzzles, and variations on the Tower of Hanoi puzzle have all appeared in past seasons.

The most recent iteration of the show, The Challenge: Total Madness, pits the players against each other in the hopes of making it to the finals and winning a big cash prize.

In last week’s episode, the players arrived at a quarry, where a puzzly surprise awaited them: Decode and Detonate.

totalmad1

The players each had a sign bearing a sequence of symbols. Their job was to decode the sequence and display the correct decryption below the sign, using letter and number cards found in a box below the sign.

But in order to decode the sign, they would have to acquire the key to the puzzle.

Well, keys.

totalmad2

Yes, the key indicating which symbols represented which letters / numbers was split between two boards a fair distance apart. With two puzzle keys to run to — and each key only bearing some of the symbols on your sign — you’re going to have to run to both puzzle keys at some point. And that doesn’t include any running back to your sign you have to do in order to decode the letters you can remember.

totalmad3

Once you’ve decoded your sign (and it’s been confirmed as correct by the judges), you have to run to a detonator and push down the plunger, blowing up one of the two trucks perched on the bluff high above. Out of 26 competitors, only 2 can push a detonator and win the game.

totalmad4

The players, as you might expect, had different strategies going into today’s challenge.

Swaggy C, a rookie, bragged about relying on his photographic memory. CT, a veteran, immediately created a memorization tool for himself, associating each character with an image or something familiar so he could better remember it.

totalmad8

Jordan hoped to remember four or five symbols on his first run, figuring he could make up time because of his endurance. Fessy, meanwhile, kept it simpler, hoping to remember three symbols, because he thought trying to remember too many would cause him to jumble them up and get confused.

Wes opted to group the symbols in sets of four, hoping to keep each smaller bundle of characters in his brain more efficiently, and then make up time during the runs between stations.

totalmad6

After a fair amount of running, Swaggy C and CT were neck and neck. Swaggy C was the first to call for a check — asking the judges to confirm his solution — but it was incorrect. So much for that photographic memory of his.

totalmad7

CT called for a check and was correct, becoming the first competitor to run to one of the detonators and blow up a truck, earning him the win and power going forward in the game.

When the truck exploded, all of the competitors, no matter how far away, now knew that someone had completed the puzzle. Only one spot left.

totalmad9

You might think people would pair up to divide and conquer, hitting both puzzle keys at once and reconvening to see how many letters they could cobble together as a team.

No one opted to pair up. But one player DID consult another player’s work.

totalmad10

Bayleigh took advantage of the fact that everyone was using the same code language. One of the other competitors, Jenny, had the same C-shaped coded letter Bayleigh had on her sign, and had placed a decoded letter beneath it. Bayleigh took a chance that Jenny was right about the decryption, and used the information to complete her sign’s coded sequence.

When she asked for a check, it was correct. TRICKY. Not exactly in the spirit of the challenge, but effective nonetheless.

totalmad11

Bayleigh then sprinted to the second detonator and blew up the second truck, joining CT in victory and bringing the day’s challenge to a close.

totalmad12

One of the cleverest things about the way The Challenge uses puzzles is that they incorporate physical obstacles as well.

For instance, solving a puzzle on a hot day, and making the players run all over. As you get tired, you’re not in peak puzzle-solving condition, and it makes memorization and recall harder. Even if you have a (supposedly) photographic memory under normal circumstances, stressing the body always makes mental tasks more taxing.

totalmad5

Although this wasn’t the most difficult puzzle-based event I’ve seen in previous editions of The Challenge, it was a nice variation and certainly kept the competitors on their toes. I look forward to seeing if there are more puzzly obstacles awaiting the two teams as the competition continues.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Puzzly Ideas Just in Time for Valentine’s Day!

puzzlelove

Valentine’s Day looms large, and sometimes it’s hard to find that perfect way to express your love for that certain someone… particularly if that certain someone is the puzzly type.

But we’ve got a few suggestions…

puzzle-pin-valentines-day-craft-photo-420-ff0299vala16

Jigsaw puzzles are the perfect metaphor for relationships, as they require separate pieces working together to complete the picture.

There are necklaces and other pieces of jigsaw-themed jewelry, as well as do-it-yourself jigsaw patterns you can utilize. You could depict anything from a favorite photo to a specific Valentine’s message in the completed image.

4903-13710

Now, you can always start with something simple, like a subscription to a puzzle service like The Crosswords ClubThe American Values Club Crossword, or The Inkubator. New puzzles every week or every month are a great gift. (Especially the Valentine’s Deluxe Sets for the Penny Dell Crosswords app! *wink*)

If they’re more into mechanical puzzles, our friends at Tavern Puzzles offer several brain teasers that incorporate a heart shape.

heartpuzzle

But if you’re looking for something more personalized, why not make a crossword for them yourself?

(Yes, you can also commission a top puzzler to do one for you, but you’d usually want to get the ball rolling on something like that well before Valentine’s Day.)

Now, to be fair, crosswords can be tough and time-intensive to make, so if that feels a little daunting, why not try a Framework puzzle or a crisscross instead? They incorporate the same crossing style, but don’t require you to use every letter.

valentine-s-day-love-wedding-criss-cross-word-game-romance-themed-puzzle-also-known-as-fill-blanks-crossword-puzzle-36632791

It allows you to maintain a terrific word list all about you and your significant other without all the effort of filling in every square crossword-style.

Or you could write the object of your affection a coded love letter! All throughout history, people have employed different tricks and techniques to keep their private messages away from prying eyes, and you could do the same!

Whether it’s a simple letter-shifting cipher or something more complex, make sure your message is worth reading. =)

butterflylock

[Image courtesy of ibookbinding.com.]

Plus you could learn a bit of letterlocking to some flair — and a sense of puzzly secrecy and personalization — to your message.

Even if you don’t go the encryption route, the unique presentation of a letter-locked message makes a simple card or a heartfelt note feel more precious.

[Image courtesy of YouTube.]

Have you considered a puzzle bouquet? You could grab some newspaper crosswords and origami them into flower shapes for a fun puzzle-fueled spin on a holiday classic.

img_8721

Or you could hide jigsaw pieces around the house that, when put together, spell out a Valentine’s message or a picture of the two of you.

Put your own spin on the idea. A little bit of effort can go a long way, plus it doesn’t cost anything.

With a little more effort, you could whip up a scavenger hunt! You could leave clues around leading to a gift, or a romantic dinner, or some other grand finale. Maybe offer a rose with each clue.

Show off how much you know about him or her. You could make each clue or destination about your relationship or about your partner, allowing you to show off how well you know them… where you first met, favorite meals, favorite movie…

If you don’t want to leave things around where anyone could nab them, keep a few small tokens on you, giving one for each destination reached or clue solved. Heck, you could enlist a friend to text clues to your special someone once they’ve reached a particular destination!

Or for something less formal, you could make a game of your romantic wanderings and play Valentine’s Day Bingo.

valentines-bingo-stripes-blank-blog

[I found this blank template on Makoodle.com.]

Maybe go for a walk or take your loved one out to dinner, and see if they can get bingo by observing different things. A couple holding hands as they walk, a Valentine’s Day proposal, outrageously priced flowers…

The possibilities are endless when you put your mind to it.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Elizebeth Smith Friedman, Codebreaker and Scourge of Nazi Spymasters

[William and Elizebeth Smith Friedman, hard at work.
Image courtesy of National Geographic.]

Last year, I rather ambitiously attempted to summarize the early history of American codebreaking and the NSA in a series of blog posts spanning World War II through the modern day. One of the names I cited in that series, William Friedman, is synonymous with American cryptography, thanks to his contributions to the cracking of the German ENIGMA code and his efforts to establish the National Security Agency.

Unfortunately, there is a gaping hole in the narrative I constructed. Because none of my sources made any reference to another crucial Friedman: Elizebeth Smith Friedman, William’s wife and partner in code-cracking.

Yes, she was name-dropped in my post about the book Code Girls: The Untold Story of the American Women Code Breakers of World War II, but she had to share those pages with a host of underappreciated women who were codebreaking geniuses.

[Image courtesy of HarperCollins Publishers.]

As The Woman Who Smashed Codes explains, she wasn’t just a talented codebreaker. She literally wrote the book on it. Eight of them, in fact. The Riverbank Publications — although often credited to her husband — covered new codebreaking techniques in rich detail, and they are still referred to today as part of the foundation of modern cryptography.

She also started the first and only American codebreaking unit ever run by a woman, serving as Cryptanalyst-in-Charge while jointly working for both the Treasury and the Coast Guard during and after World War II.

A history of American codebreaking without Elizebeth Smith Friedman is woefully incomplete, and in today’s post, I hope to rectify that oversight.

[Image courtesy of the Marshall Foundation.]

Elizebeth’s work with codes started in a most peculiar way. While seeking a job as a librarian after college, she was recruited by eccentric millionaire George Fabyan to live and work at Riverbank, his palatial estate that doubled as a self-funded research center for all sorts of scientific endeavors.

Elizebeth’s deep knowledge of Shakespeare was put to work attempting to prove Fabyan’s theory that there were secret messages encoded in the writings of Shakespeare. Although her work failed to uncover any hidden pattern in Shakespeare’s words or font choices, it did lead to two unexpected developments: a career in codebreaking and a budding romance with fellow Riverbank recruit William Friedman, whose own interest in codebreaking was sparked by the works of Edgar Allan Poe.

Thanks to the proliferation of radio, there was a seismic shift in how information was being passed between military units, governments, and other organizations, so the ability to listen in on one’s enemies (and allies) was not only a new strategic opportunity, but it was a relatively new science.

In short, America needed codebreakers who could crack the secret messages being transmitted (and intercepted). The military didn’t have them. The government didn’t have them.

But Riverbank did. And for the first eight months of World War I, the small group of William, Elizebeth, and those they trained handled ALL of the codebreaking for every part of the US government, from the State Department to the Army to the DOJ. William and Elizebeth began running a codebreaking school out of Riverbank, even embedding a secret message in a photo of the class taken on the last day of the course.

[Images courtesy of Elonka.com.]

In the aftermath of the First World War, codebreaking had become so important that countries were turning to machines to help develop uncrackable codes. And yet, at this point, American cryptography as a whole consisted of about 50 people. William went to work for the government, establishing the American version of Bletchley Park — Arlington Hall — and setting the stage for the creation of the NSA.

Elizebeth, on the other hand, cracked codes from home. And she did so for both the Treasury Department and the Coast Guard, who would send her sealed packages of intercepted encrypted intel and communications. In her first three months hunting down rum-runners during Prohibition, she solved two years’ worth of backlogged messages.

During World War II, Elizebeth’s Coast Guard Cryptography Unit turned their attention from smuggling (which waned during wartime) to cracking German codes. Under her tutelage, they would crack three different variations on the Enigma codes, each more complex than the last. (The British also cracked ENIGMA, independently of American efforts.)

Sadly, in the aftermath of the Pearl Harbor attack, the US military didn’t want civilians in charge of sensitive operations, so Elizebeth was demoted. Yes, she was no longer in charge of the group she started, trained, and cultivated, instead answering to a new boss of dubious cryptographic talents.

(Of course, the sexist dimwits making decisions like this had to grin and bear it when numerous other organizations and agencies continued to asked for Elizebeth’s assistance by name.)

And stealing Elizebeth’s credit was practically a cottage industry over at the FBI. We have them to thank for erasing Elizebeth’s role in particular — and the Coast Guard’s role in general — in hunting down, exposing, and compromising Nazi spy networks in South America, even though the FBI’s hamfisted blundering actually served to expose codebreaking operations in the past, forcing Elizebeth to crack new codes in order to regain the advantage the FBI had squandered.

Oh, yeah, did I mention that both during AND after World War II, Elizebeth continued to hound the Nazi forces in South America who sought to destabilize the region?

As one historian put it, referring to the thousands of pages of decryptions Elizebeth produced:

These pieces of paper saved lives. They almost certainly stopped coups. They put fascist spies in prison. They drove wedges between Germany and other nations that were trying to sustain and prolong Nazi terror. By any measure, Elizebeth was a great heroine of the Second World War.

The British knew it. The navy knew it. The FBI knew it. But the American public never did, because Elizebeth wasn’t allowed to speak.

[Image courtesy of Find a Grave.]

Even in their retirement, the Friedmans continued to contribute to the world of cryptography. They returned to the subject of Shakespeare with The Shakespeare Ciphers Examined, thoroughly debunking the whole idea of hidden codes in the Bard’s works.

When William died, Elizebeth even hid a secret message on his tombstone, for those who knew how to look. (It was Bacon’s cipher, something they both studied extensively during their time at Riverbank.) What a touching tribute to how she met her partner and husband.

And although the accolades and appreciation for Elizebeth’s incredible contributions have been slow in coming, they are trickling in. In the 1990s, the NSA renamed its auditorium from the William F. Friedman Memorial Auditorium to the William F. Friedman and Elizebeth S. Friedman Memorial Auditorium. A Justice Department building also has an auditorium bearing her name.

More information about the massive expansion of codebreaking worldwide is coming to light with every passing year. Hopefully that will mean greater attention for minds like Elizebeth, who used her puzzly mind to protect the world. That’s someone worth celebrating.

[Much of the information in this post comes from a wonderful book on Elizebeth, The Woman Who Smashed Codes by Jason Fagone, and it’s well-worth your time to check out her story in full.]


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Last-Minute Puzzly Valentine’s Day Ideas!

Valentine’s Day looms large, and sometimes it’s hard to find that perfect way to express your love for that certain someone… particularly if that certain someone is the puzzly type.

But have no fear! We’re here with some terrific last-minute puzzly ideas for Valentine’s Day!

[Image courtesy of YouTube.]

Have you considered a puzzle bouquet? You could grab some newspaper crosswords and origami them into flower shapes for a fun puzzle-fueled spin on a holiday classic.

Or maybe they like coded puzzles? You could write the object of your affection a coded love letter!

All throughout history, people have employed different tricks and techniques to keep their private messages away from prying eyes, and you could do the same! Whether it’s a simple letter-shifting cipher or something more complex, just make sure your message is worth reading. =)

[Image courtesy of Shutterstock.]

Or maybe you’d like to show off how much you know about him or her. Then you could whip up a little scavenger hunt! You could leave clues around leading to a gift, or a romantic dinner, or some other grand finale. Maybe a rose with each clue.

(You could make each clue or destination about your relationship or about your partner, allowing you to show off how well you know them… where you first met, favorite meals, favorite movie… )

If you don’t want to leave things around where anyone could nab them, keep a few small tokens on you, giving one for each destination reached or clue solved. Heck, you could enlist a friend to text clues to your special someone once they’ve reached a particular destination!

For a family-friendly version of the same idea, have the kids help you cut out and hide jigsaw pieces around the house that, when put together, spell out a Valentine’s message, a picture of the family, or a picture of some gift or event to come!

You could even walk around and play Valentine’s Day Bingo.

Go for a walk or take your loved one out to dinner, and see if one of you can get bingo by observing different things. A couple holding hands as they walk, a Valentine’s Day proposal, outrageously priced flowers…

Even on short notice, the possibilities are endless when you put your mind to it. Happy Valentine’s Day, fellow puzzlers!


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Puzzles Endanger, Then Save, a Nation: The Spy Who Couldn’t Spell

While working on our multi-part series of posts about the history of codebreaking in America during the 20th century, I mentioned that some of the recent revelations about the National Security Agency were the result of Edward Snowden’s actions during his time as a government contractor.

What you might not know is that he has not been the only contractor to sneak information off of government computers in that fashion: a decade before Edward Snowden, there was Brian Patrick Regan.

Regan was a career soldier in the Air Force who eventually reached the rank of Master Sergeant and worked in signals intelligence.

Buried under hundreds of thousands of dollars in credit card debt, Regan decided his only way out of financial ruin was to try to sell US government secrets to a foreign government. He copied page after page of sensitive documents from national defense systems and snuck them out of his office, eventually amassing more than 15,000 pages, CD-ROMs, and other material in his home.

He would later bury bundles of these documents in various locations, including state parks, concealing the GPS coordinates of these valuables caches through a complicated series of encryptions where letters and numbers became three-digit sets.

You see, Regan had spent a fair amount of time studying cryptography, and fancied himself a top-shelf codemaster.

Regan used another set of encryptions of lesser complexity when he attempted to contact agents of the Libyan, Iraqi, and Chinese governments in order to sell off the treasure trove of secrets he’d amassed during his time at the National Reconnaissance Office.

One of these packets — a collection of three parcels intended for Libya — ended up in the hands of an FBI agent named Steven Carr.

From The Spy Who Couldn’t Spell by Yudhijit Bhattacharjee:

In the first envelope was a four-page letter with 149 lines of typed text consisting of alphabets and numbers. The second envelope included instructions on how to decode the letter. The third envelope included two sets of code sheets.

One set contained a list of ciphers. The other, running to six pages, listed dozens of words along with their encoded abbreviations: a system commonly known as brevity codes. Together, the two sets were meant to serve as the key for the decryption.

Some of the document had already been decrypted by FBI agents, and it revealed a member of the US intelligence community — claiming to be CIA, which was unverified, but definitely someone with top secret access — was trying to sell government secrets.

And this person had terrible spelling.

Brian Patrick Regan suffered from severe dyslexia. And, despite concerted efforts to perfect both his encryptions and his plan to net millions by selling government secrets, that dyslexia would be one of the clues that led Steven Carr to Regan’s doorstep.

It took Carr six months to connect Regan to the Libyan package, but once he did, surveillance on Regan began immediately.

When Regan attempted to board a plane to Zurich in 2001 — intending to meet with Iraqi and Libyan embassy officials — he was nabbed by the FBI and taken into custody.

Again, excerpted from The Spy Who Couldn’t Spell:

On searching Regan, officials found a piece of paper tucked between the inner and outer soles of his right shoe, on which were written addresses of Iraqi and Chinese embassies in Europe. The other materials they found on him and in his belongings were more mystifying. In a trouser pocket, Regan was carrying a spiral pad containing a page with 13 words that didn’t add up to anything: like tricycle, rocket and glove.

He had another 26 random words scribbled on an index card. Among the contents of Regan’s wallet was a piece of paper with a string of letters and numbers that read “5-6-N-V-O-A-I …” And in a folder he was carrying in his duffel bag were four sheets with handwritten lines of three-digit numbers.

FBI cryptanalyst Daniel Olson decoded some of the messages found on Regan when he was captured, but he had failed to unravel the multi-stage encryptions that concealed where Regan had buried his secret parcels. The government knew which state parks, but with acres and acres of possible hiding places, they needed more precise information.

And those parcels were the key, because they weren’t just packages to be sold to the highest bidder. No, those parcels doubled as a ransom in order to secure a better deal for himself with the US government. He wanted to blackmail the government for a reduced sentence.

They were his insurance plan.

As Thomas G. West said in Seeing What Others Cannot See, a book about visual thinking and dyslexia, “It’s not hard for a dyslexic to think ‘out of the box’ because they have never been in the box.”

Thankfully, Regan eventually realized that cooperation was in his best interest, and he revealed that each of the elaborate three-digit codes concealed a backdoor key built into the code itself.

Regan designed them this way so that, if he forgot the actual details of the encryption, all he would need is the starter word, a spark that would unlock the built-in key and help him decode the entire message.

This backdoor key system worked in a similar fashion to the Vigenere cipher, where a keyword or key phrase served as the entry point for a longer string of encrypted text. The trouble is… you need to know the cipher word or source in order to crack the code.

For example, during World War II, German agents in Europe used Daphne du Maurier’s Rebecca as the basis of a code for transmitting intelligence from Cairo to support a campaign by the Axis powers against the Allies in North Africa.

The discovery of the book among the possessions of two German radio operators who didn’t read English ultimately led to the breaking of the code, which in turn led to the capture of the German spies in Cairo.

Regan revealed the cipher words for the various hiding spots in state parks — which used cipher words from sources as peculiar as Regan’s own high school yearbook — and soon, the FBI recovered all but one of the buried parcels.

But Regan couldn’t remember the cipher word for the last one.

Daniel Olson would then step in, having learned some of Regan’s techniques as they uncovered the other parcels, and partially decrypting the remaining message enough to spark Regan’s memory. Regan finally came up with the last cipher key, and the final parcel was recovered.

Yes, once again, puzzly perseverance had saved the day!

Regan was found guilty on two counts of attempted espionage and one of gathering national defense information, and sentenced to life imprisonment with parole. Which, quite honestly, is getting off easy, considering that prosecutors were seeking the death penalty for his treasonous acts. (If prosecutors had gotten their way, he would’ve been the first person executed for espionage since the Rosenbergs in the ’50s.)

For the full story, including more in-depth explanations of Regan’s elaborate encryptions, check out The Spy Who Couldn’t Spell by Yudhijit Bhattacharjee.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Puzzle History: Codebreaking and the NSA

ohr577n

[Image courtesy of NSA.gov.]

The National Security Agency has been in the news a lot over the last few years.

It arguably all started with Edward Snowden and the revelations about government surveillance, both domestic and foreign, that emerged in his wake. Between President Trump’s intimations of Obama-era wiretapping (which also supposedly involved England’s GCHQ) and recent news stories about NSA contractor Reality Winner leaking information, the NSA continues to draw mainstream attention in the 24-hour news cycle.

When you factor in the declassification of codebreaking intel during and after World War II, we know more about the NSA’s inner workings than ever before.

You might be asking what the NSA has to do with puzzles. Well, everything. Because the NSA was born as a codecracking organization.

enigma

The NSA was founded in November of 1952, but its formative stages began during World War II, as codebreakers were recruited in the U.S. starting in 1943. Not only were they tasked with tackling the German ENIGMA code, but their secondary mission was to solve “the Russian problem.” This group was known as Signals Intelligence, or SIGINT.

William Friedman, one of the early figures in American codebreaking, described cryptanalysis as “a unique profession, demanding a peculiar kind of puzzle-solving mentality combined with patience. So staffing this new organization was a curious endeavor.”

Those who were recruited came from all walks of life:

Career officers and new draftees, young women math majors just out of Smith or Vassar, partners of white-shoe New York law firms, electrical engineers from MIT, the entire ship’s band from the battleship California after it was torpedoed by the Japanese in the attack on Pearl Harbor, winners of puzzle competitions, radio hobbyists, farm boys from Wisconsin, world-traveling ex-missionaries, and one of the World’s foremost experts on the cuneiform tablets of ancient Assyria.

04/11/14 imitation game - bletchley park, milton keynes

A large campus was built that echoed the style and efforts of Britain’s Bletchley Park, including Alan Turing’s calculating machines, the bombes. Efforts on both sides of the Atlantic centered on cracking ENIGMA, the German codes used in all sorts of high-level communications. The teams worked alongside the bombes to try to determine which of the 456, 976 possible codes was being used in a given piece of communication.

It was a truly Herculean effort.

But while nearly half the staff focused on the Germans, others focused on cracking Russian codebooks, where words were translated into four-digit codes. Often, decrypting these codes involved “brute force” efforts, poring through numerous messages to pair up messages that used similar numerical groups, meaning they used the same cipher.

This would only work if the Soviets were lazy in their production of so-called “one-time pads,” encryption devices that had a particular code, which would be used once and then thrown away. Brute force codebreaking revealed that some of the one-time pads had been used more than once, a lapse in Soviet security that could work to the advantage of U.S. intelligence.

That deduction led to another stunning discovery: cracking the system used in encrypted messages to tell agents which encryption was used in a given missive. You see, each encoded message contained within it a code that dictated the cipher necessary to decrypt the message.

The Russians would later complicate this work by employing multiplexers: devices that would transmit numerous messages at once, making it harder to separate one message from another in the same dispatch.

hqdefault6

[Image courtesy of Virtantiq.com.]

The Germans would unwittingly aid the US in their Russian codebreaking efforts when a POW camp in Bad Aibling, Germany, was captured by the US army, and they uncovered a German device designed to “de-multiplex” Russian messages. The device was called the HMFS, because Hartmehrfachfernschreiber, while a great deal of fun to type, is hard to say quickly.

After World War II ended, U.S. intelligence consolidated their efforts on “the Russian problem,” continuing their work unraveling the Russian codebooks. Slowly, the codemasters began determining which organizations in the Soviet government used which codes. Even if the codes weren’t broken yet, it helped the intelligence community organize and prioritize their efforts.

The problem? They had a very tight timeframe to work in. Those duplicated codebooks were produced during a very small window of time in 1942, and only issued to Soviet agents in the three years that followed. By 1947, SIGINT analysts knew the Soviets would soon run out of the duplicated pads. Once they did, those recurring patterns of encrypted numbers would stop, and the best chance for cracking the Soviet codes would be lost.

Still, there was reason to be encouraged. Some important code words had been identified. TYRE was New York City, SIDON was London, and CARTHAGE was Washington; ENORMOZ appeared often enough that they determined it referred to atomic bomb research in Los Alamos.

It would also be revealed, through careful analysis of decrypted intel, that Soviet agents were embedded in both the U.S. Justice Department and in England’s Bletchley Park campus. The Justice Department agent was identified and tried, but released after the court found insufficient evidence to place her under surveillance in the first place.

This was one consequence of the secrecy surrounding codebreaking: an unwillingness to reveal their codebreaking success by turning over evidence of it. (As for the Bletchley Park spies, one was identified in 1951 and confessed in 1964. The other was never identified.)

By this time, the Russians had gone over ENIGMA machines captured during the German retreat, and had unraveled not only how the devices worked, but how to improve upon them. This would lead to the next-generation Russian Fialka machine.

fialka

With ever-increasing complexity when it came to encryption, thanks to increased automation, codebreaking evolved into not just intelligence work, but intelligence analysis. After all, if you don’t know something is important, you don’t necessarily give it the attention it deserves. As researcher Stephen Budiansky put it, “The top translators at Bletchley were intelligence officers first, who sifted myriad pieces to assemble an insightful whole.”

It also led to bigger, faster machines, like Goldberg and Demon, two computation machines designed to more efficiently pore over the vast amount of encrypted information being intercepted by the various U.S. intelligence services.

In 1948, though, the game changed. It changed so dramatically that November 1, 1948, is still remembered in NSA circles as Black Friday.


I hope you’re enjoying this look at the early days of America’s codebreaking efforts. Part 2 will continue next week, with a look at the rise of the NSA, Cold War cryptography, and more!

[Quotes and certain photos were sourced from Code Warriors: NSA’s Codebreakers and the Secret Intelligence War Against the Soviet Union by Stephen Budiansky.]


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!