Monday, February 2, 2026

The compromise of Polish diplomatic, intelligence service and resistance movement communications 1930’s-1945

 In WWII Poland fought on the side of the Allies and suffered for it since it was the first country occupied by Nazi Germany. In the period 1940-45 the Polish Government in Exile and its military forces contributed to the Allied cause by taking part in multiple campaigns of war. Polish pilots fought for the RAF during the Battle of Britain, Polish troops fought in N.Africa, Italy and Western Europe and the Polish intelligence service operated in occupied Europe and even had agents inside the German High Command.

Although it is not widely known the Polish intelligence service had spy networks operating throughout Europe and the Middle East. The Poles established their own spy networks and also cooperated with foreign agencies such as Britain’s Secret Intelligence Service and Special Operations Executive, the American Office of Strategic Services and even the Japanese intelligence service. During the war the Poles supplied roughly 80.000 reports to the British intelligence services (1), including information on the German V-weapons (V-1 cruise missile and V-2 rocket) and reports from the German High Command (though the agent ‘Knopf’) (2).

The activities of the Polish government departments and intelligence agencies attracted the attention of both Germany and the USA and UK and their codebreakers were able to solve most of the Polish cipher systems.

Compromise of Polish communications by foreign powers

The Polish diplomatic and consular systems

German effort

Foreign diplomatic codes and ciphers were worked on by three different German agencies, the German High Command’s deciphering department – OKW/Chi, the Foreign Ministry’s deciphering department Pers Z and the Air Ministry’s Research Department - Reichsluftfahrtministerium Forschungsamt.

The first Polish diplomatic cipher system solved by the Germans was a 4-figure codebook introduced in the 1920’s. The basic values were enciphered by simply substituting each number by its cipher equivalent. The cipher system changed on a daily basis. Obviously, this system offered little security and was easily solved by the Germans, who were quickly able to reconstruct the tables giving the daily substitution settings (3).

In 1933 a new main 4-figure codebook was introduced called ‘Code 45’ (4), which was enciphered using numerical sequences generated from two tables, each with 100 4-digit groups. The previous codebook was used for consular traffic (5).

The codebook was basically a dictionary that assigned a 4-figure group to each word. For example, the word ‘France’ would have the code 5538, ‘Foreign Minister’ 2090, ‘negotiations’ 0231 etc etc

So, the cipher clerk would first use the codebook in order to find the code groups corresponding to the words of the message and then he would have to use the subtractor tables in order to encipher them. This means that each code group would be subtracted from the key groups (of the subtractor table) without carrying over the numbers.

For example, let’s say that the following message is handed to the cipher clerk:

Foreign Minister requires clarification of your previous telegram

Let’s assume that using the codebook this becomes: Foreign Minister =2591 , requires =7482 , clarification =5556 , of =3309 , your = 4610 , previous= 4349 , telegram= 0144

So, the message becomes 2591 7482 5556 3309 4610 4349 0144

This will be enciphered using the subtractor tables valid for this time period using the system described in the following paragraphs.

Let’s assume that the numerical sequence selected is 5668 8301 3496 3540 7778 3985 8589

Now he would subtract the code groups of the message from these key groups, without carrying.

5668 8301 3496 3540 7778 3985 8589 - key groups

2591 7482 5556 3309 4610 4349 0144 - code groups

---------------------------------------------------

3177 1929 8940 0241 3168 9646 8445 - cipher groups

The cipher groups would be transmitted and the receiving party would identify from the indicator of the message the numerical sequence used for encipherment and reverse the process by subtracting the cipher groups from the key groups. This would reveal the code groups whose meaning would be deduced from the codebook.

Obviously, this was a time-consuming operation and prone to errors due to mistakes in encipherment. However, it was thought at the time that the use of both a codebook and enciphering tables provided a high level of security against enemy codebreakers.

The indicator system worked on the following principle (6):

a). A 10-letter word or phrase was selected and each letter was numbered from 0-9 according to their position in the alphabet. If the same letter is present more than once, we number them starting from the one to the left. For example,

PONIESIONA

9753204861

b). In the two subtractor tables containing 10x10 4-figure groups the numerical key is written vertically on the left of each table. For the first table the numerical key is added to its first value without carrying so 9753204861+9=8642193750. The value 8642193750 is written at the top of the first table. For the second table the numerical key is added to its second value without carrying so 9753204861+7=6420971538. This value is written at the top of the second table.

Thus, in both tables each subtractor value can be identified by its coordinates from the left and top.

c). The first subtractor value to be used in enciphering the code values will be the one in the first table designated by the coordinates 1-1, the second subtractor value will be the one in the second table designated by the coordinates 1-1, the third value will be taken from the first table 1-2, the fourth from the second table 1-2,……, the 20th value will be the one in the second table with coordinates 1-0, the 21st the one from the first table with coordinates 2-1 etc

Thus the 200 subtractor values of the two tables can be used in mixed order.

d). The tables can be reused for another 200 subtractor values by inverting the top numerical coordinates sequences. So, in the first table the sequence becomes 0573912468 and in the second table 8351790246. The same procedure as before is used to get the subtractor values.


Obviously, this complex cipher procedure was a vast improvement on the previous system.

The new ‘Code 45’ was investigated by Pers Z in the 1930’s without success but in 1939 the effort was restarted and thanks to captured material and the indicator instructions it was possible to solve it and the first messages were decoded in early 1940. Solution continued in 1940 and the system was solved currently in 1941 and 1942, till October ’42 when it was replaced by the enciphered codebooks ‘Alpha’ and ‘Code 50’. The traffic intercepted came from London, Washington, Bern, Moscow, Madrid, Rome (Vatican), Istanbul (7).

Apart from the main diplomatic codebook, several low-level systems were solved by the Germans throughout the war (8). 

UK effort

In Britain foreign diplomatic cipher systems were worked on at the Diplomatic Section of the Government Code and Cypher School (GCCS), located in Berkeley Street, London. The official title of the unit was Government Communications Bureau (GCB) (9).

According to a report from 1942 no Polish diplomatic codes had been solved since 1928 (10). The new systems ‘Alpha’ and ‘Code 50’ had not been solved by 1945. The low level ‘Cypher Z’ (single transposition of text) was solved (11).

US effort

In the Unites States diplomatic traffic from European countries was worked on at the Army Security Agency. The agency only started to work on this type of traffic in 1944 and the unit working on Chinese, Bulgarian, Greek, Yugoslav, Croat, Polish, Czechoslovakian and Slovakian traffic was B-III-d-2 (12). Difficult cipher procedures were first solved at the Research Section before being passed on to the other departments for regular exploitation.

 It doesn’t seem like the systems ‘Alpha’ and ‘Code 50’ had been solved by 1945, although progress had been made in sorting the traffic and working on the encipherment and indicator systems (13).

Two low level systems called PLA and PLE were solved in 1943 and 1944 (14).

The PLA system used mono-alphabetic substitution and carried mostly financial messages between London, New York, Washington, Algiers and Dakar.

The PLE system used single columnar transposition and carried diplomatic and consular traffic between the Polish foreign ministry in London and various American capitals (Washington, Ottawa, Mexico City, Santiago de Chile, Buenos Aires, Rio de Janeiro, Havana).

During the war there was exchange of information and traffic between the US and the British codebreakers on European diplomatic systems. The British had an advantage in this area since they had been intercepting this traffic for decades and they had been following the development of these cipher systems. Meanwhile interception from the USA was difficult and in the interwar period the Army Security Agency had focused on the solution of Japanese traffic.

Polish military intelligence ciphers

The organization in charge of military intelligence was the Second Section of the Polish General Staff. Information from occupied Europe was gathered by military attaches through their spy networks and by undercover resistance networks controlled by the Department.

The military intelligence service cooperated with foreign agencies such as Britain’s Secret Intelligence Service and Special Operations Executive, the American Office of Strategic Services and even the Japanese intelligence service.

Their main cipher system was the 4-figure codebook (10.000 groups non alphabetical) enciphered with subtractor tables (15). In 1944 they introduced the stencil subtractor system, so the security of the system was dependent on the codebook, the subtractor tables and from 1944 the stencils used in each link.

The codebooks were the 555 (probably prewar), 666 (probably introduced in 1941), 777 (probably introduced in 1943), 888 (introduced in September 1944).

Initially the subtractor tables were issued with 3 pages, each page valid for 4 months. Tables consisted of 4-figure groups, usually 20 lines of 30 columns, with bigram indicators placed around the table. Some improvements were introduced during the war such as sets of 4 tables for use at the same time, 3-figure indicators and tables of different sizes.

The biggest improvement in cipher security was the introduction of the stencil subtractor frame in 1944. The new system was used with tables that had 3-4 pages and the tables were not made of 4-figure groups but had uninterrupted lines of numbers.

Each stencil was used for about 3 months and then replaced together with the subtractor tables (although sometimes the same stencil was used for longer periods of time with several sets of tables). The stencils could be set in different positions vertically and horizontally and they could also be reversed.

German effort

Polish military intelligence ciphers were worked on at the German High Command’s deciphering department – OKW/Chi. The section dealing with Polish systems was headed by the civil servant Berndt and had about 20 workers (16). The solution of the enciphered 4-figure codebook was their greatest achievement and one of the outstanding achievements of OKW/Chi. An activity report of OKW/Chi (17), covering the 1st half of 1944, says:

Government codes and cyphers of 33 European and extra-European States and Agents Lines were worked on and deciphered. 17,792 VN were produced, including 6.000 agents' messages. From point of view of numbers, the list was headed by Government reports of the U.S.A., POLAND, and TURKEY’.

A number of complicated recypherings, principally American (U.S.A.) and Polish, have been broken’.

Since the war diary of OKW/Chi is not available the information we have comes from postwar TICOM reports and thus not all the details of this case are known.

The mathematical research section of OKW/Chi was responsible for solving complicated encipherment so that they could be exploited by the country sections. The person responsible for the investigation and solution of the Polish cipher was the mathematician Ernst Witt. According to his colleague Wolfgang Franz (18) ‘the most successful work along with that on the Am10 was that of professor WITT, who very skillfully solved a cipher of the Polish Government in Exile in London. This was a complicated grille which was laid over a large number sheet. Several such grilles were constructed and messages were read currently’.

According to Erich Hüttenhain, head of the mathematical research department, they initially solved the system when only subtractor tables were used and the codebook was recovered but after some time their solution failed and by solving messages in depth, they found that a stencil was used on the subtractor tables. This new system was then broken since they had the basic codebook and they only had to recover the stencil and the subtractor tables. By 1945 roughly 12 different stencils and a large number of subtractor tables had been solved (19).

Mechanical aids to cryptanalysis were used against the Polish cipher system. Apart from standard IBM punch card machines there was also a specialized device called ‘Witzkiste’. The ‘Witzkiste’ or ‘Brainbox’ was a photoelectric device using lattice frames for removing additive from a column of super-enciphered code groups arranged in depth. It could be used with any four-digit (or smaller) enciphered code, the frequency of whose unenciphered code groups had been discovered from previous removal of additives (20).

If the codebook, the stencils and the subtractor tables had been changed at the same time solution would not have been possible (21). It seems that the Poles believed that even if their codebooks had been compromised this would not affect the overall security of their cryptosystem since the main protection was the encipherment method (22).

Notable cases:

The greatest successes were achieved against the Polish military intelligence networks Ekspozytura S in Switzerland and Ekspozytura F2 in France (23).

Ekspozytura S (network of Major Choynacki)

The Polish intelligence network in Switzerland was controlled by Major Szczesny Choynacki, Polish Vice-Consul in Berne. Switzerland was a traditionally neutral country but during the war it had close economic relations with Germany and it also acted as an intermediary in negotiations between the warring nations. Important international organizations like the Red Cross and the Bank of International Settlements were based in Switzerland. Naturally both the Allies and the Germans ran intelligence networks in Switzerland.

The Poles had their own networks and also collaborated with the other Allied intelligence agencies such as the intelligence service of the Free French, the American OSS and the British SIS. The messages of Major Choynacki were read by the Germans and they revealed details about intelligence operations as well as the identities of highly placed agents numbered in the 500 series (such as agent ‘594’).

German decodes of the Bern-London traffic can be found in pages 878-916 of ‘KODY WOJNY. Niemiecki wywiad elektroniczny w latach 1907–1945’. They date from October 1942 to September 1944 and are signed ‘Szef II Oddzialu Sztabu’, ‘Darek’, ‘Gano’, ‘Hugo’, ‘Mak’, ‘Orkan’, ‘Espe’, ‘Jerzy’.

Ekspozytura F2

In occupied France the intelligence department of the Polish Army’s General Staff organized several resistance/intelligence groups tasked not only with obtaining information on the German military but also with evacuating Polish men so they could serve in the Armed Forces. These networks soon attracted the attention of the German security services and from 1943 the communications of the F2 network were continuously solved.

This allowed the Germans to monitor the activities of these groups and keep them under control, especially in the period preceding the Normandy invasion of 1944.

German decodes of the London-Grenoble traffic can be found in pages 793-877 of ‘KODY WOJNY. Niemiecki wywiad elektroniczny w latach 1907–1945’. They date from July 1943 to October 1944 and are signed ‘Szef II Oddzialu Sztabu’, ‘Marian’, ‘Alfred’, ‘Szef Ekspozytury II Oddzialu Sztabu’, ‘Lubicz’, ‘Vox’, ‘Los’, ‘Rawa’, ‘Klemens’, ‘Major Zychon’, ‘Mikolaj’, ‘Bernard’, ‘Biz’, ‘Zenon’.

UK effort

The Polish military intelligence ciphers were worked on at the Government Communications Bureau (GCB), located in Berkeley Street, London.

The traffic was first solved in 1942 thanks to a captured codebook and subtractor tables (24) and the links identified were between the Polish General Staff in London and the military attaches in Bern, Washington, Stockholm, Mexico.  

The solution of Polish ciphers was an important undertaking for the GCB codebreakers. The introduction of the stencil subtractor frame in 1944 made solution harder but they developed methods for dealing with this system and they continuously exploited this traffic in the period 1942-45 (25).

Their reports from the period March ’44 to March ’45 show that they concentrated on the links London-Bern and London-Washington (26). 

There is no evidence that the British were aware of the German success against the Ekspozytura S network during the war. However, decoded messages from the Ekspozytura F2 network (London-Grenoble) were identified in German intelligence traffic in August 1944 (ISK/ISBA decodes) (27). No information is available regarding their actions in response to this compromise.

US effort

As has been stated previously the Army Security Agency started to work on the traffic of Central European countries in 1944. The unit responsible for exploitation of this traffic was B-III-d-2, with difficult cipher procedures first solved by the Research Section.

The military intelligence cipher was designated system PLF. Despite the close contact with the British codebreakers it seems that in this case they refused to share all their results with the Americans, since a report from 1945 says (28):

This is to acknowledge receipt of the query on PLF (Militpologne) by O.I.C. SPSIS-9, recently brought to me. I saw Commander Denniston and Mr. Jones Williams on this. They believe it improper to furnish us with any results of their analysis, beyond a general description of the system, and are sorry if we obtained a different impression at any time’.

By intercepting and evaluating this traffic the US codebreakers might have been able to solve the PLF system in 1945 but no details are available on their effort pi(29).

Polish intelligence ciphers Middle East and occupied Poland

German effort

The organization responsible for the solution and exploitation of Polish agents’ traffic was the German Army High Command’s codebreaking department Inspectorate 7/VI. Specifically, Referat 12, which was formed in August 1942 in order to deal with Allied agents’ systems. In November 1943 the entire department was moved close to the OKW Funkabwehr HQ at Dorf Zinna, Jüterbog and became subordinate to OKW/Chi (30).

The reports of Referat 12 show that the Polish networks were called PS nets by the Germans and after investigation of their cipher procedures in July and August 1942 the first messages were solved in September ’42. The traffic of several nets was solved in the period 1942-44, mainly lines 6521 London-Warsaw (RIS), 6509, 6508 Bucharest-Turkey, 6003 London-Nice (31). However, the last report of Referat 12 found in the War Diary of Inspectorate 7/VI is that of February ’44 so our knowledge of their successes is incomplete.

According to Major Mettig, head of Inspectorate 7/VI in the period 1941-43 and later moved to OKW/Chi, the solution of the messages between the Polish Government in exile in London and the Polish resistance movement was one of the outstanding achievements of Referat 12 (32).

UK effort

The radio traffic of the minor European Allied countries was monitored by the British for security reasons and in March 1944 they carried out an investigation of Polish radio traffic in the Middle East (33). In general, they found few issues with signals security with the notable exception of a consular cipher used between Cairo, Jerusalem, Istanbul. The cipher used was single transposition and it was not considered secure. The Poles were told not to use this system for important messages and a subsequent check showed that they adhered to this rule (34).


Regarding the Polish resistance movement traffic there is no indication that it was monitored and solved by the British codebreakers prior to 1944. In September 1944 they decoded German messages containing the translations of decoded Polish resistance traffic on the link London-Warsaw (35).

US effort

There is no indication that the traffic of the Polish intelligence networks in the M.E. and in occupied Poland were worked on by the US codebreakers.

Conclusion

In the interwar period the Poles distinguished themselves by being the first to solve the German military’s Enigma machine. During the war their intelligence department operated throughout occupied Europe, gathering information from spies and resistance groups and they even penetrated the German High Command.

However, while they were busy gathering intelligence for the Allies they neglected to secure their crypto systems. The Germans were able to solve their diplomatic, military intelligence and resistance movement codes and they gained valuable information from the decoded messages. The compromise of the communications of Major Choynacki in Switzerland, of the Ekspozytura F2 network in France and of the Polish resistance movement were major German successes.

The British and American codebreakers were also able to solve the ciphers of the military intelligence service and they obviously thought so highly of this source that they never made an attempt to warn the Poles and get them to secure their systems.

This was a risky operation since the information passing on Polish links could also endanger the security of Allied military and diplomatic plans. This is admitted in the British report DS/24/1556 of October 1945, written by Commander Russell Dudley-Smith (head of cryptosecurity at Bletchley Park) (36), which said:

‘The whole question of the control of Polish traffic during the war was a major headache which was never satisfactorily resolved’.

………………………………………………………………………………………….

I doubt whether a further post-mortem into this matter would achieve very much, but there does seem to be a real lesson to be learnt for the future. Owing to a combination of circumstances, (including a delicate political situation, certain special security requirements, and so on), large quantities of uncontrolled and unknown traffic in low grade systems were passing from U.K. throughout the war, not only in undeposited systems (as indeed was the case with all Allied diplomatic traffic) but without our having any knowledge of the contents of the messages or the nature and extent of the leakage, owing to the fact that the cypher versions never reached Berkeley Street’.

Considering the inaction of those in charge, it is evident they believed the potential rewards outweighed the risks involved.

Additional information

British SS Frame vs Polish SS Frame

The basic British cryptosystem for important radio-traffic was the enciphered codebook. These 4-figure codebooks were enciphered with subtractor tables, using the non-carrying system. In 1943 the British changed their cipher procedures by introducing the SS Frame. The stencil subtractor frame was used together with the day’s enciphering table in order to reveal the numerical values to be used in enciphering and deciphering messages. The Royal Navy started using the SS Frame in July 1943 and it was introduced for combined British-US- Canadian service in January 1944 (37).

The Poles used 4-figure codebooks enciphered with subtractor tables and in 1944 they also introduced the SS Frame. Their version differed from the British SS Frame in the number of apertures. While the British version had 100 apertures (38) the Polish version only had from 28 to 40 randomly placed apertures (39) or according to another source 24 to 50 (40). It is not clear why the Poles used a weaker version of the SS Frame…

Polish cipher machines

Lacida

The Poles used hand ciphers and codebooks during the war. Their only cipher machine was the LCD-Lacida, a non-reciprocal rotor machine equipped with 6 rotors (3 moved during encipherment). The machine was used during the period 1935-45 but a security investigation in 1941 revealed that it could be solved in a few hours. It is not known if after this discovery the device was modified in some way or if the operating procedures were changed in order to increase security (41).

Typex

The Poles must have learned of the British Typex cipher machine, since in 1944 they requested 40 machines for use by their Foreign Ministry (42). The British position was that due to production difficulties ‘it is probably impossible to meet their requirements for the time being’ however ‘provided the Type X machines supplied were not fitted with Plugboard and provided also we wired for them and supplied the necessary drums, the advantages to be gained by meeting their request would outweigh the disadvantages’…

The Russian connection

In the period 1941-45 the Soviet codebreaking agencies were the 5th Department of the People's Commissariat for Internal Affairs - NKVD and the 8th department of the Intelligence Directorate of the Army General Staff - GRU.

At this time there is no information on whether the Polish diplomatic and military intelligence ciphers were worked on by the Soviet codebreakers. However, it is reasonable to assume that the Soviet leadership would have been very interested in the communications of the Poles.

Sources:

(1). Journal of U.S. Intelligence Studies, vol. 15, no. 2: ‘England’s Poles in the Game: WWII Intelligence Cooperation’

(2). War in History Vol. 18, No. 1 article: ‘Penetrating Hitler's High Command: Anglo-Polish HUMINT, 1939-1945’

(3). TICOM report DF 187G ‘Replies by ministerialrat Fenner to questions regarding cryptologic matters’, p11-19

(4). Cryptologia Volume 31, Issue 3: ‘From the Archives: Polish Interwar MFA's Cipher Compromised?’

(5). TICOM report I-63 ‘Interrogation Report on ORR Herrmann Scherschmidt of Pers Z S, Auswaertiges Amt’, p3

(6). UK Archives - HW 47/2 "Polish Cyphers 1942-1945", write-up by Jones-Williams (Berkeley St.) - TICOM report D-3 ‘The Polish Cyphers for Diplomatic and Consular Traffic’ by Scherschmidt (1943)

(7). TICOM report I-63 ‘Interrogation Report on ORR Herrmann Scherschmidt of Pers Z S, Auswaertiges Amt’, TICOM report D-3 ‘The Polish Cyphers for Diplomatic and Consular Traffic’ by Scherschmidt (1943), Cryptologia Volume 31, Issue 3: ‘From the Archives: Polish Interwar MFA's Cipher Compromised?’ (the compromised material was probably recovered from the archives of the Czechoslovak crypto service)

(8). TICOM report I-159 'Report on GAF Intelligence based on Interrogation of Hauptmann Zetzsche', p3 (link Washington-London)

It is reasonable to assume that these were the systems designated PLA and PLE by the US codebreakers.

(9). Journal of Intelligence History, Vol. 13: ‘A note on diplomatic intercepts in England during World War II’

(10). UK Archives - HW 53/38 ‘DSH 15 - Cryptographic Reports’

(11). UK Archives - HW 47/2 "Polish Cyphers 1942-1945", write-up by Jones-Williams (Berkeley St.)

(12). SRH-361 ‘History of the Signal Security Agency volume two - The general cryptanalytic problems’, chapter XI ‘Far Eastern and Central European systems’.

(13). The relevant report ‘Polish cipher systems - January 1945’ has not been declassified.

(14). NARA - RG 457 - Entry 9032 - NR 3819 ‘Cryptographic codes and ciphers: Polish cipher systems 1942-44’

(15). UK Archives - HW 47/2 "Polish Cyphers 1942-1945", write-up by Jones-Williams (Berkeley St.)

(16). TICOM report I-150 ‘Report by Uffz. Heinz W. Beyreuther on the organisation of OKH/Chi’, p3

(17). TICOM report DF-9 ‘Captured Wehrmacht Sigint Document: Translation of Activity Report of OKW/Chi for the Period 1st January, 1944 to 25th June, 1944’, p3

(18). TICOM report DF-176 ‘Answers written by professor doctor Wolfgang Franz to questions of ASA Europe’, p11

(19). TICOM report I-118 ‘Joint reports by Reg. Rat. Dr. Hüttenhain and Sdf. Dr. Fricke, written at CSDIC on or about 28 August 1945’, p8-9

(20). TICOM report I-37 ‘Translation of paper written by Reg.Rat.Dr Huettenhain of OKW/Chi on special apparatus used as aids to cryptanalysis’, p4-5, European Axis Signals Intelligence vol. 2, p61-63, Histocrypt 2020: ‘The Auxiliary Devices of OKW/Chi’

(21). TICOM report I-31 ‘Detailed interrogations of Dr. Hüttenhain, formerly head of research section of OKW/Chi, 18-21 June 1945’, p21

(22). The Enigma Bulletin no13: ‘The decryption of Polish intelligence communications during World War II: A view from inside the OKW/Chi’

(23). ‘Intelligence Past’ website: ‘Major Choynacki's Ace: The solution to an old puzzle of wartime intelligence’, UK Archives - KV 2/1329 ‘Willy PIERT / Hans Von PESCATORE’, The Enigma Bulletin no13: ‘The decryption of Polish intelligence communications during World War II: A view from inside the OKW/Chi’, ‘KODY WOJNY. Niemiecki wywiad elektroniczny w latach 1907–1945 a losy polskich, sowieckich, alianckich kodów i szyfrów’, TICOM report I-31 ‘Detailed interrogations of Dr. Hüttenhain, formerly head of research section of OKW/Chi, 18-21 June 1945’, TICOM report I-118 ‘Joint reports by Reg. Rat. Dr. Hüttenhain and Sdf. Dr. Fricke, written at CSDIC on or about 28 August 1945’, TICOM report DF-187B ‘The cryptanalytic successes of OKW/Chi after 1938’, CSDIC SIR 1719 - 'Notes on Leitstelle III West Fur Frontaufklarung'

(24). UK Archives - HW 53/38 ‘DSH 15 - Cryptographic Reports’

(25). UK Archives - HW 47/2 "Polish Cyphers 1942-1945", write-up by Jones-Williams (Berkeley St.)

(26). UK Archives - HW 53/36 ‘DSH 17 - Supplementary Cryptological Reports Nos. 1-9’

(27). UK Archives - HW 40/221 ‘Poland: reports and correspondence relating to the security of Polish communications’

(28). G40 Small’s report January 1945 (Ralph Erskine files)

(29). The relevant report ‘Polish cipher systems - January 1945’ has not been declassified.

(30). German Foreign Ministry’s Political Archive - TICOM collection - Inspectorate 7/VI War Diary - Referat 12 reports

(31). Referat 12 reports, ‘KODY WOJNY. Niemiecki wywiad elektroniczny w latach 1907–1945’, Facebook page of Marian Zacharski, TICOM report I-180 ‘Homework by Uffz. Keller of In 7/VI and WNV/Chi’

(32). TICOM report I-115 ‘Further interrogation of Oberstlt. Mettig of OKH/Chi on the German wireless security service (Funküberwachung)’, p9

(33). UK Archives - HW 40/221 ‘Poland: reports and correspondence relating to the security of Polish communications’

(34). UK Archives - HW 40/222 ‘Poland: reports and correspondence relating to the security of Polish communications’

(35). UK Archives - HW 40/221 ‘Poland: reports and correspondence relating to the security of Polish communications’ and HW 40/244 ‘Polish: evidence that the OKW (High Command of the German Armed Forces) was reading traffic passing between London and the Polish underground’

(36). UK Archives - HW 40/222 ‘Poland: reports and correspondence relating to the security of Polish communications’

(37).  UK Archives - ADM 1/27186 ‘Review of security of naval codes and cyphers 1939-1945’, p24

(38). European Axis Signals Intelligence, Vol. 2, Alamy website

(39). I-31 ‘Detailed interrogations of Dr. Hüttenhain, formerly head of research section of OKW/Chi, 18-21 June 1945’, p20

(40). UK Archives - HW 47/2 "Polish Cyphers 1942-1945", write-up by Jones-Williams (Berkeley St.)

(41). Cryptologia, Volume 16, Issue 1 - ‘Polish cipher machine Lacida’

(42). UK Archives - HW 40/221 ‘Poland: reports and correspondence relating to the security of Polish communications’

No comments:

Post a Comment