The Puzzling Art of Letterlocking

letterlocking

[Image courtesy of Letter Writers Alliance.]

When you think about puzzles and personal security, what comes to mind?

Do you think of puzzle boxes, those delightfully tricky little wooden creations with all their sliding pieces and hidden compartments? Or does your mind go to encryption, the art of concealing your message in plain sight with ciphers, scytales, and other techniques meant to baffle anyone but those in the know?

Some puzzle box designs date back centuries, and ciphers can be traced back even further. (One is named after Caesar, after all.)

But there’s another centuries-old puzzly procedure you might not know about, and it kept letters and messages safe using nothing more than paper and wax.

butterflylock

[Image courtesy of ibookbinding.com.]

This technique is known as letterlocking. It involves a mix of precise folds, interlocking pieces of paper, and sealing wax in order to create a distinctive design or pattern.

Although the pattern itself can work like a puzzle — requiring a particular trick to unfold it and reveal the message without ripping or damaging the letter — that’s only a secondary line of defense. The true goal of letterlocking is to reveal tampering. The folding techniques are distinctive, and the wax creates points of adhesion.

If you receive a letter and the folds are done (aka redone) incorrectly, or the wax is smeared (or the paper ripped where the wax would have held it tight), then you know the letter has been compromised.

daggertrap

[Image courtesy of ibookbinding.com.]

Some examples of letterlocking trace back to the 13th century, and key figures like Queen Elizabeth I, Machiavelli, Galileo, and Marie Antoinette employed letterlocking security in the past. Mary, Queen of Scots, wrote a message and letterlocked it with a butterfly lock six hours before her beheading. (For a more modern reference, letterlocking was employed in the Harry Potter films as well, most famously in Dumbledore’s will.)

The various techniques involved are as distinctive as knots. The triangle lock. The dagger-trap. The pinwheel letter. And some historians believe that those techniques imply connections between some of the important players in history.

For instance, both poet John Donne and the spymaster of Queen Elizabeth I employed a similar letterlocking style. Did they share a common source, or even an instructor in common? Or did a particular letterlocking technique provide a clue as to the contents of the letter within?

Letterlocking is a historical curiosity that was seemingly lost to time after the proliferation of the envelope and other security techniques, but it is slowly being rediscovered by a new generation, as well as reverse engineered by scientists and scholars. Yale and MIT both have teams exploring the burgeoning field of letterlocking.

Museums are discovering treasure troves of letterlocked messages by going directly to the source: post offices. A cache of 600 undelivered letters in the Netherlands, for instance, are being analyzed by researchers.

trianglelock

[Image courtesy of Atlas Obscura.]

It’s a remarkable thing, really, this union of centuries-old skills with twenty-first century knowledge. These are puzzles, frozen in time, waiting to be solved and placed into the larger picture of history.

Letterlocking is nothing less than a rare and beautiful art combining puzzles and privacy, as elegant as it is clever. There are no doubt many more secrets to be found behind the folds, slits, and wax seals of these lovingly crafted messages.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

PuzzleNation Product Review: Codenames

codenames0

There are all kinds of games where communication is crucial.

In You’ve Got Crabs, you must employ a secret non-verbal signal to inform your partner that you’ve completed a task, but without the other team spotting your signal and intercepting. In Taboo, you have to get a teammate to state a particular word, but without using several words closely associated with the answer.

But other games ratchet up both the creativity necessary to win and the difficulty involved in doing so. Imagine having to communicate volumes with a single word.

In today’s product review, we delve into the world of spycraft and put our communication skills to the test as we try out the card game Codenames.

codenames4

In Codenames, two teams (the red team and the blue team) are tasked with identifying all of their secret agents before their opponents can locate their own agents from the same list. But in order to do so, they must pick those agents out of a field of 25 possible individuals.

In each group, there are red agents, blue agents, innocent bystanders, and an assassin. Each possible individual is marked with a codename that is viewable by all of the players.

So, where does the wordplay and communication come in?

Each team selects one player apiece to serve as the spymaster. The spymaster for each team looks at one of the secret patterns determining which cards/codenames represent blue agents and which red agents.

codenames3

So it’s up to the spymaster to point the players in the right direction, but it’s up to the players to actually choose a given person in the field of 25 and label them an agent.

Each round, the spymaster comes up with a one-word clue for the other players on their team that points to their secret agents (as well as a number representing the number of agents in the field that the clue applies to). The word must be specific enough to point them in the right direction, but that can be difficult depending on the words in your play area.

For instance, in our example grid, the clue “royalty: 1” could point toward KING, or QUEEN, or HEAD, or even REVOLUTION, depending on what the other players associate with the word “royalty.” But suppose that you want your players to choose KING and not QUEEN. Then “royalty” is no good, because it’s too vague.

The number aspect of the clue is also important, because it offers the opportunity to gain an advantage over your opponents. For instance, if you wanted both KING and QUEEN to be labeled as your agents, the clue “royalty: 2” would be good, because those would probably be the two most likely choices based on that clue.

codenames2

In our example grid, the red team went first, and the spymaster said “dishes: 2.” The other player on the red team chose GLASS and WASHER from the grid, and both were correct and marked with red agent cards. This was a smart play, but also a risky one, as PAN could also be associated with “dishes.”

The blue team responded with the clue “rasp: 1,” choosing specificity and a single possible answer for the sake of certainty, rather than risk trying for more than one agent in this turn. The blue player correctly selected FILE, and that card was marked with a blue agent card.

The next turn for the red team didn’t go nearly as well. The spymaster used the clue “big: 1” and instead of choosing SHOT (the intended answer), the player opted for MAMMOTH. The card was revealed to be an innocent bystander, and the red team’s turn was immediately over for failing to ID an agent that turn.

And that is one of the big strategic challenges of Codenames. Do you stick to 1 agent per turn with a greater chance of success, or do you try to get more creative and bold by going for less certain clues that could lead to multiple agent IDs in one fell swoop? Do you risk uncovering the assassin (and immediately losing the game) with a clue that could suggest him as well as a secret agent for your team?

codenames1

The field of codenames in the play area can also lead to unexpected challenges. In one game, I was playing the spymaster for my team. The words JUPITER and SATURN were both in the grid, but only JUPITER was one of our agents. So a clue like “planet” was out. Unfortunately, other clues (like “biggest” or “god”) were excluded because they also applied to other codenames in the play area, including the dreaded assassin.

A mix of tactics, efficiency, association, vocabulary, and luck, Codenames is a terrific game that will test your wits, your communication skills, and your ability to make every word count.

The sheer volume of possible codenames (as well as the increased variety offered by each card being double-sided) ensues a huge amount of replay value is built into the game. And not only is it great as a group game, but the two-player version is just as fun!

Codenames, playable for 4 to 8 players (with variant rules for 2 or 3 players) is available at Target, Barnes & Noble, and many online retailers.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

The Countess Who Revolutionized European Spycraft

[Image courtesy of Derek Bruff.org.]

The history of codebreaking is a fascinating subject not only for the mythic figures and their brain-melting accomplishments, but also for the unsung heroes who are only recently being rediscovered.

A few months ago, I wrote a blog post about Elizebeth Smith Friedman, a woman who shaped a new foundation for American codebreaking, but has long since been overshadowed by the reputation of her husband William Friedman (as well as FBI sexism and self-promotion which helped to bury and/or co-opt her accomplishments as their own).

[Image courtesy of Wikipedia. Of course, not her page. The page on her family line.]

And as part of my research into Elizebeth’s story, I encountered a curious anecdote from the 1600s about another codebreaker and influential spymaster who history had forgotten.

From The Woman Who Smashed Codes by Jason Fagone:

Monks, librarians, linguists, pianists and flutists, diplomats, scribes, postal clerks, astrologers, alchemists, players of games, lotharios, revolutionaries in coffee shops, kings and queens: these are the ones who built the field across the centuries and pushed the boundaries forward, stubborn individuals with a lot of time to sit and think and not give up. Most were men who did not believe women intellectually or morally capable of breaking codes; some were women who took advantage of this prejudice to steal secrets in the shadows.

One of the more cunning and effective codebreakers of the seventeenth century was a Belgian countess named Alexandrine, who upon the death of her husband in 1628 took over the management of an influential post office, The Chamber of the Thurn and Taxis, which routed mail all throughout Europe.

[Image courtesy of Wikipedia.]

Naturally, I was intrigued. But there’s surprisingly little out there about Alexandrine, whose full title was Alexandrine of Rye-Varax, Countess of Taxis, widow of Leonard II, Count of Taxis, occasionally shortened to Alexandrine von Taxis. She gets merely a paragraph on Wikipedia, and most Google searches only feature her as part of noble family trees.

Which is amazing, because she created the first verifiable Black Chamber in Europe — better known ones in England, France, and Germany weren’t established until the late seventeenth century. (A Black Chamber is a secret spy room or intelligence office, and Alexandrine’s was not only one of the first, but it was one of the most expansive.)

Despite her status as a widow, she was sworn into office as Postmistress in 1628 (serving as such until 1646, when her son would come of age), using those years to improve the wealth and status of her family while expanding the reach of the Taxis postal business, based in the Spanish Netherlands.

[The Taxis postal service, circa 1505-1516.
Blurry image courtesy of ApfelbaumInc.com.]

Alexandrine took over the Taxis postal service — the primary postal service across the continent, save for private couriers. She had a monopoly over the post in Europe, and was the de facto postmistress for the entire Holy Roman Empire.

And she used that position to her advantage, forming the Chamber of Taxis, an elite intelligence team composed of agents, forgers, scribes, codebreakers, and artisans. In a couple of hours, they could melt the wax seals off letters, copy their contents (in short-hand, often), decipher any coded messages, forge a new seal (and any other marks, including signatures, that would authenticate a seal), reseal the letter, and send it on its way, the invasion of privacy undetected.

She spoke four languages — French, Dutch, Italian, and German — and was very politcally savvy, cultivating relationships with fellow nobles even as she prowled through their private messages.

It’s not clear for whom she was spying. Some sources claim she sold her information to the highest bidder, while others claim she worked for both Emperor Ferdinand II and his son and successor Ferdinand III.

[Image courtesy of Wikipedia.]

What is clear, however, is that many discounted her and the Chamber of Taxis as a possible threat because of who she was. Sir Balthazar Gerbier, an agent of Charles I, suspected her early on, but discounted his own instincts because of “her honesty, dignity, and sex.”

Yes, the fact that she was a woman disqualified her in the minds of many from being capable of the sort of deceit and spycraft going on in the Chamber. (It also rankled some, like several German princes, that she was in a position of power at all, given her sex.)

And discounting her was a mistake, given that she commanded a crucial hub in the postal network.

[Yes, there’s even a board game based on the family business.
No spycraft though, unfortunately. Image courtesy of 999 Games.]

From Diplomacy and Early Modern Culture, edited by R. Adams and R. Cox:

Since the 1490s Brussels had been the gateway to Europe’s postal network, connecting international postal routes from Spain, France, Italy, Austria, Germany, Scandinavia, and England. One single family, the Counts of Taxis (from 1649/50 Thurn and Taxis), commanded the mounted couriers over these many-branched routes.

Yes, the family name and title changed, and that was also Alexandrine’s doing.

When those aforementioned German princes questioned having a woman running the Taxis postal service, she ordered a full ancestral workup. That examination revealed her family’s ties to another important lineage, and from that point on, The Thurn and Taxis postal service (as well as her spy organization, The Chamber of the Thurn and Taxis) would bear that additional name, increasing the prestige and reputation of both family and business alike.

For eighteen years, Countess Alexandrine commanded both a business and a spy network that spanned the European continent, influencing the information flowing between various noble families, and no doubt helping to shape the future of Europe.

I sincerely hope more is revealed about her life and the work of The Chamber of the Thurn and Taxis in the future. I feel like we’ve only just scratched the surface of the role she (and the group) played in European history.


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Puzzle History: Codebreaking and the NSA, part 3

[Image courtesy of NSA’s official Twitter account.]

At the end of part 2 in our series, we left off during the early days of the NSA, as American cryptographers continued to labor under the shadow of the Black Friday change in Russian codes.

You may have noticed that part 2 got a little farther from puzzly topics than part 1, and there’s a reason for that. As the NSA evolved and grew, codebreaking was downplayed in favor of data acquisition. The reasons for this were twofold:

1. Context. You need to understand why given encrypted information is important in order to put it toward the best possible use. As Budiansky stated in part 1, “The top translators at Bletchley were intelligence officers first, who sifted myriad pieces to
assemble an insightful whole.”

2. Russian surveillance and bugging continued to grow more clever and sophisticated, pushing attention away from codebreaking. After all, what good is breaking codes or developing new ones if they can just steal unencrypted intel firsthand by monitoring
agents in the field?

Moving forward, the NSA would continue to pursue all manner of data mining, eventually leaving behind much of the codebreaking and analysis that originally formed the backbone of the organization. But that was in years to come. Cryptography was still a major player in NSA operations from the ’50s and onward.

[The progression of “secret” and “top secret” code words.
Image courtesy of NSA’s official Twitter account.]

In May 1956, NSA cryptanalytic veterans pushed a proposal titled “Recommendations for a Full-Scale Attack on the Russian High-Level Systems,” believing that specially designed computers from IBM could provide the key for cracking the impenetrable Russian cryptography wall. Some cryptographers believed that ever-increasing processor speeds would eventually outpace even sophisticated codes.

By 1960, the NSA had spent $100 million on computers and analytical tools.

The problem? The NSA was collecting so much information that their increasingly small team of cryptoanalysts couldn’t dream of processing even a tiny portion of it.

But the quest for data access would only grow more ambitious.

In the wake of Sputnik’s launch in October of 1957, US signals intelligence would go where no man had gone before. The satellite GRAB, launched alongside Transit II-A in June of 1960, was supposedly meant to study cosmic radiation. (GRAB stood for Galactic Radiation and Background.)

[Image courtesy of NSA’s official Twitter account.]

But it was actually intended to collect radar signals from two Soviet air-defense systems. This was the next step of ELINT, electronic intelligence work. (The younger brother of SIGINT.)

The NSA would later find a huge supporter in President Lyndon Johnson, as the president was heavily invested in SIGINT, ELINT, and any other INTs he could access. This did little to quell the intelligence-gathering rivalry growing between the CIA and NSA.

Of course, that’s not to say that the NSA ceased to do any worthwhile work in codebreaking. Far from it, actually.

During the Vietnam War, NSA analysts pored over North Vietnamese signals, trying to uncover how enemy pilots managed to scramble and respond so quickly to many of the US’s airstrikes conducted during Operation Rolling Thunder.

Careful analysis revealed an aberrant character (in Morse code) in messages that appeared in North Vietnamese transmissions before 90 percent of the Rolling Thunder airstrikes. By identifying when the enemy used that aberrant character, the analysts
were able to warn US pilots whether they were heading toward a prepared enemy or an unsuspecting one during a given sortie.

Other NSA teams worked to protect US communications by playing the role of an enemy analyst. They would try to break US message encryptions and see how much they could learn from intercepted US signals. Identifying flaws in their own procedures — as well as members of the military who were cutting corners when it came to secured communications — helped to make US communications more secure.

[Image courtesy of NSA.gov.]

In 1979, Jack Gurin, the NSA’s Chief of Language Research, wrote an article in the NSA’s in-house publication Cryptolog, entitled “Let’s Not Forget Our Cryptologic Mission.” He believed much of the work done at the agency, and many of the people
hired, had strayed from the organization’s core mission.

The continued push for data acquisition over codebreaking analysis in the NSA led to other organizations picking up the slack. The FBI used (and continues to use) codebreakers and forensic accountants when dealing with encrypted logs from criminal organizations covering up money laundering, embezzlement, and other illegal activities.

And groups outside the government also made impressive gains in the field of encryption, among them IBM’s Thomas J. Watson Research Center, the Center for International Security and Arms Control, and even graduate student programs at universities like MIT and Stanford.

For instance, cryptographer Whitfield Diffie developed the concept of the asymmetric cipher. Joichi Ito explains it well in Whiplash:

Unlike any previously known code, asymmetric ciphers do not require the sender and receiver to have the same key. Instead, the sender (Alice) gives her public key to Bob, and Bob uses it to encrypt a message to Alice. She decrypts it using her private key. It no longer matters if Eve (who’s eavesdropping on their conversation) also has Alice’s public key, because the only thing she’ll be able to do with it is encrypt a message that only Alice can read.

This would lead to a team at MIT developing RSA, a technique that implemented Diffie’s asymmetric cipher concept. (It’s worth noting that RSA encryption is still used to this day.)

[Image courtesy of Campus Safety Magazine.com.]

The last big sea change in encryption came when the government and military realized they no longer had a monopoly on codebreaking technology. Increased reliance and awareness of the importance of computer programming, greater access to computers with impressive processing power, and a groundswell of support for privacy from prying government eyes, led to dual arms races: encryption and acquisition.

And this brings us to the modern day. The revelations wrought by Edward Snowden’s leak of NSA information revealed the incredible depth of government data mining and acquistion, leading some pundits to claim that the NSA is “the only part of government that actually listens.”

Whatever your feelings on Snowden’s actions or government surveillance, there is no doubt that the National Security Agency has grown and changed a great deal since the days of cracking the ENIGMA code or working with the crew at Bletchley Park.

Where will American codebreaking go next? Who knows? Perhaps quantum computing will bring codes so complicated they’ll be impenetrable.

All I know is… it’s part of puzzle history.


I hope you enjoyed this multi-part series on the history of 20th-century codebreaking in America. If you’d like to learn more, you can check out some of the valuable sources I consulted while working on these posts:

Code Warriors: NSA’s Codebreakers and the Secret Intelligence War Against the Soviet Union by Stephen Budiansky

Whiplash: How to Survive Our Faster Future by Joichi Ito

The Secret Lives of Codebreakers by Sinclair McKay


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Puzzle History: Codebreaking and the NSA, part 2

[Image courtesy of NSA’s official Twitter account.]

At the end of part 1 of our look at the history of the NSA and American codebreaking, we left off with the pivotal Black Friday event.

On November 1, 1948, all intel coming from monitored Soviet signals went quiet. All traffic on military, naval, and police radio links was replaced with dummy messages. It was such an unprecedented and alarming event that London and Washington briefly considered that it might’ve been the first indication of preparations for war.

According to Code Warriors author Stephen Budiansky:

The full extent of the disaster only became apparent the following spring when real traffic started reappearing on the radio nets, now employing greatly improved — and completely unbreakable — technical and security procedures. The keying errors or other mistakes that had allowed most of the Soviets’ machine-enciphered military traffic to be routinely read by US and British codebreakers for the last several years had been corrected, and the much more disciplined systems that now replaced them slammed the cryptanalytic door shut.

Even the one-time pads that had offered some hope to attentive American codebreakers were updated, eliminating the ability to sort messages by which organization they originated from.

Codemakers had suddenly outpaced codebreakers.

[The Kryptos sculpture outside CIA Headquarters. The NSA cracked
several of its codes before the CIA did. Image courtesy of Slate.com.]

The Office of Naval Intelligence wanted to take over from Signals Intelligence (SIGINT), demanding to see “everything” so they could do the job. They claimed SIGINT should limit their work to message translation, leaving interpretation to “the real experts.” This sort of territorial gamesmanship would continue to hamper government organizations for decades to come.

And that demand to see everything? That probably sounds familiar, in light of the revelations about government data collection and the PRISM program that were revealed in Edward Snowden’s leaks.

Black Friday was the start of all that, a shift from codecracking to the massive data collection and sifting operation that characterized the NSA for decades to come.

More amazingly, there was SO MUCH information collected during World War II that SIGINT was still poring over it all in 1949, decrypting what they could to reveal Soviet agents in the U.S. and England.

The fact that a high-ranking member of British Intelligence at the time, Kim Philby, was actually a Soviet double agent complicated things. After a decade under suspicion, Philby would flee to the Soviet Union in 1963, stunning many friends and colleagues who had believed in his innocence.

[The spy and defector, honored with a Soviet stamp.
Image courtesy of Britannica.com.]

Although the Russians had flummoxed SIGINT, other countries weren’t so lucky. The East German police continued to use ENIGMA codes as late as 1956. Many of the early successes in the Korean War were tied to important decryption and analysis work by SIGINT. Those successes slowed in July of 1951, when North Korea began mimicking Russia’s radio procedures, making it much harder to gain access to North Korean intel.

Finally, the chaotic scramble for control over signal-based data gathering and codebreaking between the government and the military resulted in the birth of the National Security Agency on November 4, 1952, by order of President Truman.

One of the first things the NSA did? Reclassify all sorts of material involving historical codebreaking, including books and papers dating back to the Civil War and even the American Revolution.

[The actual report that recommended the creation of the NSA.
Image courtesy of NSA’s official Twitter account.]

The creation of the NSA had finally, for a time at least, settled the issue of who was running the codebreaking and signals intelligence operation for the United States. And they were doing fine work refining the art of encryption, thanks to the work of minds like mathematician and cryptographer Claude Shannon.

One of Shannon’s insights was the inherent redundancy that is built into written language. Think of the rules of spelling, of syntax, of logical sentence progression. Those rules define the ways that letters are combined to form words (and those words form sentences, and those sentences form paragraphs, and so on).

The result? Well, if you know the end goal of the encoded string of characters is a functioning sentence in a given language, that helps narrow down the amount of possible information contained in that string. For instance, a pair of characters can’t be ANYTHING, because letter combinations like TD, ED, LY, OU, and ING are common, while combos like XR, QA, and BG are rare or impossible.

By programming codecracking computers to recognize some of these rules, analysts were developing the next generation of codebreakers.

Unfortunately, the Russian line was holding. The NSA’s failure to read much, if any, Soviet encrypted traffic since Black Friday was obviously becoming more than just a temporary setback.

Something fundamental had changed in the nature of the Russian cryptographic systems, and in the eyes of some scientific experts called in to assess the situation, the NSA had failed to keep up with the times.


I hope you’re enjoying this look at the early days of America’s 20th-century codebreaking efforts. Part 3 will continue next week, with the sea change from active codebreaking to data mining, plus Vietnam, the space race, and more!


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!

Puzzle History: Codebreaking and the NSA

ohr577n

[Image courtesy of NSA.gov.]

The National Security Agency has been in the news a lot over the last few years.

It arguably all started with Edward Snowden and the revelations about government surveillance, both domestic and foreign, that emerged in his wake. Between President Trump’s intimations of Obama-era wiretapping (which also supposedly involved England’s GCHQ) and recent news stories about NSA contractor Reality Winner leaking information, the NSA continues to draw mainstream attention in the 24-hour news cycle.

When you factor in the declassification of codebreaking intel during and after World War II, we know more about the NSA’s inner workings than ever before.

You might be asking what the NSA has to do with puzzles. Well, everything. Because the NSA was born as a codecracking organization.

enigma

The NSA was founded in November of 1952, but its formative stages began during World War II, as codebreakers were recruited in the U.S. starting in 1943. Not only were they tasked with tackling the German ENIGMA code, but their secondary mission was to solve “the Russian problem.” This group was known as Signals Intelligence, or SIGINT.

William Friedman, one of the early figures in American codebreaking, described cryptanalysis as “a unique profession, demanding a peculiar kind of puzzle-solving mentality combined with patience. So staffing this new organization was a curious endeavor.”

Those who were recruited came from all walks of life:

Career officers and new draftees, young women math majors just out of Smith or Vassar, partners of white-shoe New York law firms, electrical engineers from MIT, the entire ship’s band from the battleship California after it was torpedoed by the Japanese in the attack on Pearl Harbor, winners of puzzle competitions, radio hobbyists, farm boys from Wisconsin, world-traveling ex-missionaries, and one of the World’s foremost experts on the cuneiform tablets of ancient Assyria.

04/11/14 imitation game - bletchley park, milton keynes

A large campus was built that echoed the style and efforts of Britain’s Bletchley Park, including Alan Turing’s calculating machines, the bombes. Efforts on both sides of the Atlantic centered on cracking ENIGMA, the German codes used in all sorts of high-level communications. The teams worked alongside the bombes to try to determine which of the 456, 976 possible codes was being used in a given piece of communication.

It was a truly Herculean effort.

But while nearly half the staff focused on the Germans, others focused on cracking Russian codebooks, where words were translated into four-digit codes. Often, decrypting these codes involved “brute force” efforts, poring through numerous messages to pair up messages that used similar numerical groups, meaning they used the same cipher.

This would only work if the Soviets were lazy in their production of so-called “one-time pads,” encryption devices that had a particular code, which would be used once and then thrown away. Brute force codebreaking revealed that some of the one-time pads had been used more than once, a lapse in Soviet security that could work to the advantage of U.S. intelligence.

That deduction led to another stunning discovery: cracking the system used in encrypted messages to tell agents which encryption was used in a given missive. You see, each encoded message contained within it a code that dictated the cipher necessary to decrypt the message.

The Russians would later complicate this work by employing multiplexers: devices that would transmit numerous messages at once, making it harder to separate one message from another in the same dispatch.

hqdefault6

[Image courtesy of Virtantiq.com.]

The Germans would unwittingly aid the US in their Russian codebreaking efforts when a POW camp in Bad Aibling, Germany, was captured by the US army, and they uncovered a German device designed to “de-multiplex” Russian messages. The device was called the HMFS, because Hartmehrfachfernschreiber, while a great deal of fun to type, is hard to say quickly.

After World War II ended, U.S. intelligence consolidated their efforts on “the Russian problem,” continuing their work unraveling the Russian codebooks. Slowly, the codemasters began determining which organizations in the Soviet government used which codes. Even if the codes weren’t broken yet, it helped the intelligence community organize and prioritize their efforts.

The problem? They had a very tight timeframe to work in. Those duplicated codebooks were produced during a very small window of time in 1942, and only issued to Soviet agents in the three years that followed. By 1947, SIGINT analysts knew the Soviets would soon run out of the duplicated pads. Once they did, those recurring patterns of encrypted numbers would stop, and the best chance for cracking the Soviet codes would be lost.

Still, there was reason to be encouraged. Some important code words had been identified. TYRE was New York City, SIDON was London, and CARTHAGE was Washington; ENORMOZ appeared often enough that they determined it referred to atomic bomb research in Los Alamos.

It would also be revealed, through careful analysis of decrypted intel, that Soviet agents were embedded in both the U.S. Justice Department and in England’s Bletchley Park campus. The Justice Department agent was identified and tried, but released after the court found insufficient evidence to place her under surveillance in the first place.

This was one consequence of the secrecy surrounding codebreaking: an unwillingness to reveal their codebreaking success by turning over evidence of it. (As for the Bletchley Park spies, one was identified in 1951 and confessed in 1964. The other was never identified.)

By this time, the Russians had gone over ENIGMA machines captured during the German retreat, and had unraveled not only how the devices worked, but how to improve upon them. This would lead to the next-generation Russian Fialka machine.

fialka

With ever-increasing complexity when it came to encryption, thanks to increased automation, codebreaking evolved into not just intelligence work, but intelligence analysis. After all, if you don’t know something is important, you don’t necessarily give it the attention it deserves. As researcher Stephen Budiansky put it, “The top translators at Bletchley were intelligence officers first, who sifted myriad pieces to assemble an insightful whole.”

It also led to bigger, faster machines, like Goldberg and Demon, two computation machines designed to more efficiently pore over the vast amount of encrypted information being intercepted by the various U.S. intelligence services.

In 1948, though, the game changed. It changed so dramatically that November 1, 1948, is still remembered in NSA circles as Black Friday.


I hope you’re enjoying this look at the early days of America’s codebreaking efforts. Part 2 will continue next week, with a look at the rise of the NSA, Cold War cryptography, and more!

[Quotes and certain photos were sourced from Code Warriors: NSA’s Codebreakers and the Secret Intelligence War Against the Soviet Union by Stephen Budiansky.]


Thanks for visiting PuzzleNation Blog today! Be sure to sign up for our newsletter to stay up-to-date on everything PuzzleNation!

You can also share your pictures with us on Instagram, friend us on Facebook, check us out on TwitterPinterest, and Tumblr, and explore the always-expanding library of PuzzleNation apps and games on our website!