When
researching WWII signals intelligence and codebreaking operations it is
important to track down all the available sources of information, from POW
interrogations and captured documents to detailed reports summarizing Allied cipher
policy, decisions and compromises.
It is
reasonable to assume that in the postwar era all the Allied countries tried to
assess the extent of the compromise of their communications during WWII. Thus
I’ve tried to track down these reports. In the following space i’m going to
list the reports I know of and give a short summary of each one. I’ve used most
of them in my essays but there are some that I haven’t been able to locate
(yet).
USA
Military cryptosystems
1). The ‘European Axis Signal Intelligence in World War II’ volumes are
available from the NSA’s website. They are dated May 1946 and have a lot of
information on German cipher machines, the German codebreaking agencies and
their major achievements. Unfortunately I don’t think that the EASI volumes are
entirely accurate.
2). The
report Special conference on M-209 security is dated 1950 and looks into the German
exploitation of the US M-209 cipher machine. It is difficult to explain why the
people involved looked only at the available TICOM reports and not the actual
files of the German Army’s codebreaking agency Inspectorate 7/VI. These had
been retrieved in 1947 from a camp in Austria.
Overall it
seems to me that US reports are not as thorough
as they should be.
State
Department
I am not
aware of any State Department communications security report written after the
end of WWII. The ones available were produced during the war and submitted to
the US Joint Chiefs of Staff.
1). The
reports of June 1941 and November/December 1943 are available online via the NSA’s Friedman collection.
2). The
report of June 1944 can be found in the US National Archives and Records
Administration - collection RG 457- Entry 9032- box 1384 - 'JCS Ad hoc committee report on cryptographic
security of government communications'.
The problem
is that these reports only have theoretical evaluations of the State Department
cryptosystems, not information on their compromise by the Axis powers.
OSS
The Office of
Strategic Services was the predecessor of the CIA and during WWII its
overseas stations gathered military and political intelligence on the Axis
powers. For example in Bern, Switzerland the local OSS station (headed by Allen
Dulles) kept in contact with members of the German Resistance.
According to
an OSS veteran a report on WWII crypto security was prepared but I don’t have
any details.
Soviet Union
Both in the
Soviet era and today in modern Russia the files and archives of the signal
intelligence organizations remain closed to researchers. This makes it very
difficult to find information on Soviet cryptosystems and on whether the Soviet
authorities evaluated their communications security during WWII.
According to
Anatoly Klepov's “The
historical truth” of Beria and Suvorov about cryptography and radio
intelligence, there were evaluations of Soviet cryptosecurity in 1941, in 1943 and at the end of WWII. These investigations came to the conclusion
that Soviet ciphers had not been compromised by the Germans but that they were
theoretically solvable. This led to the introduction of new, more secure systems.
UK
Army
There are
files dealing with British Army communications at the National Archives,
collections WO
219 and WO
193. However these deal with cipher policy, not cipher compromises.
Navy
The report ADM
1/27186 ‘Review of
security of naval codes and cyphers 1939-1945’ is available from my Google
docs and Scribd folders. It is dated November 1945 and it was written after
examining the files of the German Navy’s codebreaking agency B-Dienst. Thus it
has an excellent analysis both of Royal Navy cipher policy and the compromise
of RN codes and ciphers.
RAF
The report AIR
20/1531 ’R.A.F.
signal communications: security’ can be found in the National Archives but
the information on the compromise of RAF systems is only based on decrypted
German messages, not other sources.
SOE
The Special
Operations Executive was an intelligence organization created during WWII.
I don’t know if a report on the compromise of SOE codes was ever prepared. The
British authorities certainly had the available information, since they
captured the War Diary of Inspectorate 7/VI in 1947 and this included the
summary reports of Referat 12 which dealt with Allied agents’ codes.
The report HS
7/41 ‘Section
II: field cyphers; appendices L, M, N and O’ has a file titled S.O.E. FIELD CIPHERS
which is available from the Arcre website. This file points out theoretical and
practical problems with SOE cipher security but does not have information on
the compromise of said systems by enemy codebreakers.
France
French
military high level codes were solved
by the Germans in the 1930’s and up to the Battle of France. Unfortunately
I am not aware of any French report summarizing their cryptosystems and their
compromise during the war.
Czech Republic
During WWII
the communications of the Czech
resistance movement were solved by the Germans. It seems that at the end of
the war the Czechoslovak government found out about this case and personnel of
the Defense Ministry prepared the report ‘Dopady
lúštenia šifrovacieho systému čs. londýnskeho MNO z rokov 1940-1945 na domáci
odboj’.
I requested
this report from the Czech Defense Ministry’s history department but they were
not able to locate it. Let’s hope that some Czech researcher will be able to
find it.
Poland
Polish
military, diplomatic, resistance movement and intelligence service codes were
read by the Germans during WWII. I don’t know if there are detailed reports in
the Polish government archives but the following sources have valuable
information.
1). The Cryptologia
article ‘From
the Archives: Polish Interwar MFA's Cipher Compromised?’ by Jan Bury presents
two reports written in 1940 and 1947 by the intelligence officer Major Tadeusz
Szumowski, concerning the security of the Polish diplomatic Code 45. According to Szumowski this codebook had been
compromised and the Germans could read the Polish diplomatic traffic since the
leadership of the Polish Foreign Ministry chose to keep using it despite his
warnings. Szumowski
was correct about this case.
2). Recently the
book KODY WOJNY. Niemiecki wywiad
elektroniczny w latach 1907–1945 a losy polskich, sowieckich, alianckich kodów
i szyfrów has been
published by Marian
Zacharski. I don’t know if the author has information on the Polish ciphers from
Polish sources but he has uncovered material from the recently released TICOM
files on the extensive compromise of Polish cryptosystems during the war.
Conclusion
Compromises
of communications security are usually difficult to acknowledge by the
countries that suffer them. For example since the 1970’s countless books have
been written about the successes of Bletchley Park, yet
detailed information on the Axis solution of Allied codes only started to
become available in the 2000’s when TICOM reports and other relevant documents
were released to the public archives by the US and UK authorities.
I’ve listed
some reports that deal with the compromise of Allied codes but I hope that
researchers will be able to locate more. Specifically:
1). State
Department postwar reports on WWII compromises (especially the M-138-A strip cipher case)
2). The OSS
report on WWII cryptosecurity.
3). The
Soviet reports of 1941, 1943 and postwar period.
4). Reports
similar to ADM 1/27186 for the
British Army, RAF and SOE.
5). French
reports on their WWII cryptosystems.
6). The Czech
report ‘Dopady lúštenia šifrovacieho
systému čs. londýnskeho MNO z rokov 1940-1945 na domáci odboj’.
7). Polish government-in-exile reports
on their codes and ciphers.
No comments:
Post a Comment