Military and intelligence history mostly dealing with World War II.
Saturday, September 24, 2016
Monday, September 19, 2016
Wednesday, September 14, 2016
Update
On the
contrary the recent article ‘О ВКЛАДЕ
СОВЕТСКИХ КРИПТОГРАФОВ В ПОБЕДУ ПОД МОСКВОЙ’, says that in late 1942
the Soviet codebreakers analyzed the Enigma cipher machine and developed ways
of solving it. However their efforts failed in January 1943 due to German
security measures.
This
information seems to be confirmed by the war diary of the German Army’s
Inspectorate 7/VI. The March 1943 report of Referat 13 (security of
German cipher machines) says that based on the published radio dispatches from Stalingrad Inspectorate 7/VI was asked to give an opinion from the point of view of decipherment.
Schlüsselüberwachung
Auf grund der veröffentlichten
Funksprüche asus Stalingrad wurde In 7/VI um ein allgemeines Gutachten gebeten,
das die Stellungnahme vom Standpunkt der Entzifferung enthält.
Thus it seems
that the Soviet effort to decrypt Enigma messages was identified early and
countered by the Germans.
2). In Soviet
signals intelligence and the German Enigma cipher machine i added:
According to
the recent article ‘О ВКЛАДЕ
СОВЕТСКИХ КРИПТОГРАФОВ В ПОБЕДУ ПОД МОСКВОЙ’, in late 1942 the Soviet
codebreakers analyzed the Enigma cipher machine and developed ways of solving
it. However their efforts failed in
January 1943 due to new German
security measures.
This
information seems to be confirmed by the war diary of the German Army’s
Inspectorate 7/VI. The March 1943 report of Referat 13 (security of German cipher machines) says that based on the published radio dispatches from Stalingrad Inspectorate 7/VI was asked to give an opinion from the point of view of decipherment.
Schlüsselüberwachung
Auf grund der veröffentlichten
Funksprüche asus Stalingrad wurde In 7/VI um ein allgemeines Gutachten gebeten,
das die Stellungnahme vom Standpunkt der Entzifferung enthält.
Thus it seems
that the Soviet effort to decrypt Enigma messages was identified early and
countered by the Germans.
Monday, September 12, 2016
Another victory!
In my recent
essay on The
ciphers of Czechoslovakia’s government in exile I mentioned a report titled
‘Dopady lúštenia šifrovacieho systému čs. londýnskeho MNO z rokov 1940-1945
na domáci odboj’.
This report
had information on the compromise of Czechoslovak communications and the impact
on resistance activities.
It has taken
me some time get a copy but thanks to my friend Jozef Krajcovic I finally have the
report.
I will soon add
some of this information in my essays on Czechoslovak ciphers.
Tuesday, September 6, 2016
Czechoslovak not Czech – my mistake…
I changed the title of my essay Svetova Revoluce and the codes of the Czech resistance into Svetova
Revoluce and the codes of the Czechoslovak resistance.
Thursday, September 1, 2016
What happened to my FOIA requests? Progress report
When I
started researching WWII cryptologic history I not only copied stuff from the
archives but I also requested a lot of material from the NSA’s FOIA office.
Although I
have received some interesting reports from them (I-172, I-89,
DF-111, DF-105, DF-176, DF-169)
they are still reviewing a lot of the TICOM files that I’ve requested. Why do
they need to ‘review’ material from the 1940’s? I don’t know.,,
So what’s the
progress of these cases?
Let’s see, so
far in 2016 i have received information on the following cases:
State
Department M-138-A instructions
The M-138-A
strip cipher system was used by the State Department during WWII for
enciphering messages classified SECRET. The 1944 instructions can be found at
NARA but the previous editions from 1939 and 1942 are not there (or at least I
haven’t been able to find them).
The NSA FOIA office
stated that ‘a thorough search of our
archival files was conducted but no records responsive to your requests were
located’.
However the 1939 instructions can be found in
TICOM report DF-15 so that’s not a complete loss.
Note that the
1939 instructions describe the straight
board system (30 letters taken from one cipher column) while the 1944
instructions state that channel
elimination is to be used for each message.
Dr Wilhelm
Vauck, head of Referat 12 (Agents section)
In 1942 the
German Army’s codebreaking agency OKH/Inspectorate 7/VI created a new
department tasked with the solution of enemy agents codes. This was Referat
12 (Department 12), headed by the mathematician dr Wilhelm Vauck. According
to the short
bio of dr Vauck found at the website of Dresden University he survived the
war and was a POW for the years 1945-48.
I thought
that in that period he would have been interrogated by the Allies about his
wartime activities so I requested information from the NSA. The recent response
was ‘a thorough search of our historical files
was conducted but no records responsive to your request were located’.
Still it is
possible that other agencies might have some information on Vauck. We’ll see…
Dr Herbert
Lotze, head of Wa Pruef 7/IV/E
Dr Lotze was
head of research on speech privacy systems at the German Army’s Ordnance,
Development and Testing Group, Signal Branch Group IVe. His team solved the US Bell
Labs A-3 speech scrambler and similar
Soviet devices.
The response
of the NSA to my request for any postwar interrogations of dr Lotze was ‘a thorough search of our historical files
was conducted but no records responsive to your request were located’.
However there
seems to be material on Lotze at NARA so this isn’t the end of this case.
Other
cases
During the
year I was able to copy from NARA some of the reports that I had requested from
the FOIA office years ago. This is material that was given to NARA in 2015.
Apart from
these cases there are about a dozen TICOM reports that are being reviewed by
the FOIA office. Let’s hope that they are released soon.