Showing posts with label Spies. Show all posts
Showing posts with label Spies. Show all posts

Saturday, February 8, 2020

Emperor of spies

Craig McKay has written a book on General Onodera, the Japanese military attaché to Sweden during WWII, and his intelligence gathering activities.

Like all the neutral capitals in Europe, Stockholm became a natural hub for intelligence activities during the Second World War. One of the chief participants in the search for critical information was the Japanese Military Attaché, Makoto Onodera. In this limited edition of 100 numbered copies, Dr. C.G. McKay, an acknowledged expert on the history of intelligence activities in Northern Europe and the author of  the now classic historical study From Information to Intrigue (Cass,1993)  and the co-author with Bengt Beckman of Swedish Signal Intelligence 1900-1945  has given a concise, stimulating and elegant account of Onodera's "intelligence bourse".  Based on archival sources in many countries and equally on McKay's own knowledge gained through conversation and correspondence with a generation of intelligence officers now dead, his book entitled Emperor of Spies, apart from being a book-collectors item of some value, deserves a place in the library of professional students of the history of intelligence. Price £25 plus postage.

To purchase email the following link:

suzy@spiegl.co.uk     

Saturday, August 10, 2019

The case of the Rote Kapelle

I have uploaded the British report KV 3/349 ‘The case of the Rote Kapelle’ (only parts 1 and 2).

Friday, February 2, 2018

Joint Chiefs of Staff evaluation of Office of War Information ciphers

During WWII the US Office of War Information engaged in intelligence gathering and propaganda activities against the Axis powers.

The representatives of the OWI used various cipher systems in order to protect their communications and these systems were examined by the Joint Chiefs of Staff.

A summary report was issued in July 1944 and it found problems with physical security, classification procedures, stereotyped messages and cipher reuse.

Regarding OWI ciphers it was noted that ‘Present double transposition keys have been in use since they were produced by the Signal Corps in late 1942 and early 1943’ and the recommendation was ‘That immediate supersession of these keys be accomplished and that provision be made for their more frequent supersession in the future’.












Source: US National Archives, collection RG 208, Office of Wartime Information: General Records of the Security Officer, Entry 9. Location:  350/71/17/6, Box 1. Folder Communications Survey OWI.

Acknowledgements: I have to thank Robert Hanyok for locating and copying the JCS evaluation.

Monday, January 29, 2018

Staff Study on OSS Cryptographic Plan - January 1945


Another document that has information on the OSS crypto systems is ‘Staff Study on OSS Cryptographic Plan’, available from the US National Archives - collection RG457- Entry 9032 - NR 3280 ‘Staff Study on OSS Cryptographic Plan’.

The report is also available from the journal ‘Cryptologia’, vol13, no.3:

 SECRET
HEADQUARTERS, ARMY SERVICE FORCES
OFFICE OF THE CHIEF SIGNAL OFFICER
WASHINGTON 25, D.C.

  SPSIC-6                                                                                            8 January 1945

MEMORANDUM for Assistant. Chief of Staff, G-2
Subject: Staff Study on OSS Cryptographic Plan
The enclosed staff study is forwarded for your consideration and comment,

For the Chief Signal Officer:  
                                                                                      W, Preston Corderman
                                                                                                                                                                                                                                          Colonel, Signal Corps
                                                                                                                                                                                                                                     Chiefs Signal Security Branch
1. Incl
Study on OSS Cryptographic Plan

STAFF STUDY ON OSS CRYPTOGRAPHIC PLAN 

PROBLEM PRESENTED

1. How may the need of OSS for a high grade, high speed cryptographic system be satisfied?

FACTS BEARING ON THE CASE

2. OSS has a requirement for a high grade, high speed cryptographic system for the encipherment and decipherment of secret traffic.

3. At the present time OSS is using the Converter M-134-A (short title SIGMYC) to satisfy this requirement.

4. Prior to 5 April 1944, eight (8) SIGMYC were issued to OSS.

5. The Assistant Chief of Staff, G-2, authorized the issue of twenty-six (26) SIGMYC to OSS by memorandum for Col. Corderman from Col. Clarke dated 5 April 1944, to meet the expanding needs of that organization.

6. Since 5 April 1944, twenty-one (21) SIGMYC have been delivered to OSS. That organization now holds twenty-nine (29) machines; five more are available for issue.

7. In the past OSS has used one universal set of rotors with SIGMYC. These rotors were replaced once.

8. In September 1944 OSS requested two new sets of rotors, one set to be used in Europe and the other set in the Far East. Thirty-eight (38) sets of rotors SIGRHAT (for use in the Far East) have been issued in compliance with that request.

9. Twenty-five (25) sets of rotors SIGSAAD (for use in Europe) have also been issued.

10. Instructional documents associated with SIGMYC are "Operating Instructions for Converter M-134 and M-134-A (Short title SIGKOC and ‘photographs and Drawings of Converter M-134-A (short title SIGVYJ). No copies of these publications are available for issue. This situation was caused by the destruction of the instructional documents when Converters M-134-A were turned in by Army holders.

11. Requests are received for spare parts with each request for the issue of a SIGMYC. The spare parts list always include rotor stepping solenoids. There are no rotor stepping solenoids on hand in this agency. Three requests for these items have not been fulfilled.

12. In accordance with authorization of the Assistant Chief of Staff, G-2, 27 July 1944, one SIGTOT room circuit was furnished OSS in Washington. Authorization did not extend to the issuance of tapes for use with this equipment. Additional SIGTOT circuits have been made available to OSS in Europe. That organization is procuring additional tape punching equipment to meet the increased demand for tape. OSS requested the loan of such equipment until they are prepared to fulfill their own needs for tape. This branch is supplying OSS with sufficient tape until that organization is self-supporting in this respect.

13. Four (4) SIGCUM have been issued to OSS with the approval of the Assistant Chief of Staff, G-2, 28 April 1944. These machines were sent to OSS in North Africa to replace four (4) SlGCUM which were loaned to OSS by NATO and subsequently recalled by the latter organization.

14. Within the past six (6) months the communications requirements of OSS have markedly increased. The cryptographic requirements have expanded proportionately. The rapid expansion is vividly illustrated by the strip cipher requirements of that organization. In June 1944 SSA requested OSS to furnish a monthly quota of desired material in order to adjust production schedules here. The monthly quota of strip cipher systems needed is now larger than the total number of strip systems issued to OSS over a period of twenty (20) months.

15. It is believed that the OSS will request the five (5) remaining SIGMYC of the authorized allotment of twenty-six (26) machines. Instructional documents are not available for issue with these converters. The reprinting of these documents presents a major reproduction job.

16. OSS encounters an ever present maintenance problem since the machines are constantly breaking down. It is believed that the time is not far distant when it will be impossible to maintain the machines adequately,

17. In order to provide new rotors in the future it will be necessary to have rotors returned from the field by OSS for rewiring. Thus, a rotation process will be established to meet new demands for rotors which will result in the wearing out of the rotors within a relatively short time. It is noted that it would take between one to two years to procure new rotors.

18. OSS is now trying out a modification of the standard --text deleted -- device, which utilizes -*- --text deleted--. That organization is contemplating an increase in the distribution of these --text deleted – to include the standard --text deleted – held by OSS, thus, permitting inter-communication between the two machines. The cryptographic principle involved his been approved by the Signal Security Agency. OSS plans to utilize the -*- --text deleted-- for secret radio transmissions.

19.  The question arises as to what other means are available. The following items of equipment are considered:

a. SIGTOT 

This system provides adequate security but the scarcity of equipment and the difficultly of providing sufficient quantities of one-time tape render its use impracticable. In addition SIGTOT is not at present adapted to multi-holders of a common system, which is an operational requirement

b. SIGABA

 Under present policy, it would be necessary to assign a crypt team with each machine in order to make them available to OSS. This presents a problem of securing sufficient personnel which appears insurmountable at the present time. Furthermore, the use of SIGABA as a solution to this problem is not generally regarded with favor.

c. SIGCUM

The communications and cryptographic problems of OSS are developing rapidly in the Far East where traffic is transmitted largely by radio. Since SIGCUM may not be employed for secret traffic transmitted by means of radio the use of this machine would not provide a solution to the problem, Although SIGCUM would be a satisfactory substitute for SIGMYC in Europe, a revision of the cryptographic facilities of OSS in that area is not considered feasible at this time.

d. SIGFOY

This converter provides adequate security to fulfill the need for a high grade cryptographic system and is well adapted to multiple holders of a common system. Since it is not a high speed system, it would not fulfill this requirement.

e. SIGLASE

This system would provide adequate security and speed to meet the outlined requirements. However, since SIGLASE is still in the development stage and the expected date of issue is unknown it is not the immediate answer to the OSS problem.

20. From the point of view of this branch the problem could be most acceptably solved by making Army facilities available to OSS. It is realized that the latter organization would probably not be favorably disposed toward such a solution,

CONCLUSIONS

21. The continued use of SIGMYC by OSS in the Far East will present maintenance and 
distribution problems which will be virtually impossible to solve.

22. A replacement for SIGMYC is needed.

23. SIGABA, SIGCUM and SIGTOT are not completely acceptable substitutes.

24. SIGFOY and SIGLASE would be a solution to the problem but since it will require from six to nine months to manufacture the SIGLASE, it cannot be considered an immediate solution.

25. It appears that the only immediate solution to the problem is for OSS traffic to be handled by Army cryptographic facilities.

RECOMMENDATIONS

26. That OSS be requested to utilize Army cryptographic communications facilities where such exist.

27. That OSS use its own cryptographic communications facilities where Army facilities do not exist.

28. That, at such time as the equipment referred to in paragraph 27 becomes unserviceable, service be maintained by those Army cryptographic facilities and/or equipments as may then be available.

A report dated 8 February 1946 (found in SRH-366 ‘The history of Army strip cipher devices’) has more information on the implementation of the aforementioned OSS cryptographic plan.

Sunday, January 14, 2018

Joint Chiefs of Staff evaluation of Office of Strategic Services ciphers

In 1943 and 1944 the US Joint Chiefs of Staff evaluated the cryptosystems used by the various US government agencies.

For example the report on State Department codes and ciphers for 1943 can be found in the NSA website and the report of 1944 is in the US national archives, in collection RG 457- Entry 9032- box 1384 - 'JCS Ad hoc committee report on cryptographic security of government communications'.

The ciphers of the Office of Strategic Services were also evaluated and there is some information on this topic in the US national archives, specifically Record Group 226 - Series: Correspondence Files, 1942 – 1946 - File Unit: 17) Cryptographic Security:










Unfortunately there are no detailed reports on the subject but from the information presented above it seems that even as late as 1944 OSS communications were sent on vulnerable cryptosystems (double transposition and M-138-A cipher).

Monday, April 18, 2016

The ciphers of Czechoslovakia’s government in exile

At the end of the First World War the multiethnic Austro-Hungarian Empire collapsed and out of its ruins emerged several new countries. One of these was Czechoslovakia, containing the Czech areas of Bohemia and Moravia together with Slovakia and Carpathian Ruthenia in the east.

In the interwar period Czechoslovakia followed a foreign policy supportive of France and was part of the Little Entente. The country had a stable democracy and its industrial resources were large (based on the Skoda works) for such a small country. However there were two important problems affecting Czech national security. On the one hand the rise of Nazi Germany and its rearmament was a clear security threat. At the same time there were serious problems with the German and Slovak minorities that resented Czech rule.

Czechoslovakia contained a large number of minorities that were dissatisfied with the ruling Czech establishment. Especially the German minority made up roughly 23% of the population (according to the 1921 census) and a large part of it was concentrated in the border with Germany called Sudetenland. Many of the Sudeten Germans wanted for their areas to be unified with Germany and in the 1930’s Hitler’s Germany supported the demands of the Sudeten German Party. These claims were rejected by the Czech government of Edvard Beneš and as the Czech crisis threatened Europe with a new war a conference took place in Munich between the governments of Germany, Italy, Britain and France.  

Without support from Britain and France the Czech government was forced to cede the Sudeten territories to Germany and also lost other disputed areas to Hungary and Poland. Even though Germany had succeeded in absorbing the Sudeten areas and in weakening Czechoslovakia that did not stop Hitler’s offensive plans and in March 1939 German troops invaded and occupied the rest of the country. From then on the country was ruled by Germany and special attention was given to its heavy industry which produced weapons for the German armed forces.

During the war the Czechoslovak Government in Exile, headed by Beneš, was based in London and had regular communications with the Czech resistance and with its diplomatic missions and intelligence service stations abroad. In order to protect these communications several cryptosystems were used by the Czech crypto department.

Information on these systems is available from books and articles written recently:

1). The books Odhalena tajemstvi šifrovacich kličů minulosti, Gentlemani (ne)čtou cizi dopisy and Válka šifer. Výhry a prohry československé vojenské rozvědky (1939-1945) by Jiri Janecek have descriptions of the ciphers and the author’s conclusion was that the security afforded by these systems was limited.

2). A series of articles written for ‘Crypto World’ by Jozef Kollár describe each cipher system, explain how to encipher and decipher and also evaluate their security. The articles are:

Cipher ‘TTS’ (double transposition of the text followed by letter to figure substitution)

Cipher ’Rimska dva’ (letter to figure substitution followed by double transposition of the digits)

Cipher ‘Rimska osem’ (homophonic letter to figure substitution followed by encipherment with repeating 10-figure additive sequence)

Cipher ‘Rimska devat’ (letter to figure substitution followed by additive encipherment, repeating additive created from a passphrase)

Cipher ‘Rimska desat’ (letter to figure substitution followed by transposition then additive encipherment, repeating additive created from a passphrase, passphrase is also used to limit the cells of the transposition table)

Cipher ‘Rimska trinast’ (transposition of the text followed by polyalphabetic substitution)

Cipher ‘Eva’ (transposition of the text using a pyramid shaped transposition table)

Cipher ‘Marta’ (letter to figure substitution followed by additive encipherment, additive created via passphrase autoclave procedure)

Cipher ‘Ruzena’ (letter to figure substitution followed by additive encipherment, additive created via passphrase procedure)

Cipher ‘Utility’ (letter to figure substitution followed by transposition)

Cipher ‘Palacky’ (letter to figure substitution followed by additive encipherment, additive created via passphrase procedure, cipher digits multiplied by a constant)

Compromise of Czech ciphers

The Czech resistance movement and the Czech intelligence service caused serious problems for the German authorities with their most audacious operation being the assassination of Reinhard Heydrich, protector of Bohemia and Moravia and former head of the Reich Main Security Office. However after this episode the Germans took many security measures and were generally able to keep the resistance activities under control. Keeping the Czech areas pacified was particularly important since Czechoslovakia had a developed heavy industry sector which produced weapons for the German armed forces.

In their counterintelligence operations the Germans benefitted from having the ability to read a substantial amount of the traffic exchanged between the Czech IS in Britain and the Czech resistance in the occupied territories. This case has been covered in detail in Svetova Revoluce and the codes of the Czechoslovak resistance.

Report on the compromise of the communications of the government in exile

After the end of WWII it seems that the Czechoslovak authorities learned from POW interrogations about the compromise of their ciphers. Karol Cigáň, who worked in the Defense Ministry’s cipher department, summarized some of this information in a report written in 1989.

The report ‘Dopady lúštenia šifrovacieho systému čs. londýnskeho MNO z rokov 1940-1945 na domáci odboj’, can be found in the archive of the Museum of the Slovak National Uprising in Banská Bystrica and in the Central Military Archive at Prague.



In the report Cigan analyzed the Czechoslovak STP cipher and found it insecure. In addition he proved the compromise of Czechoslovak ciphers by examining reports from the office of the high ranking SS official Karl Hermann Frank.

A report from November 1944 had a summary of Funkwabwehr (Radio Defense) operations and it said that during the previous month 8 radio links, whose cipher procedures could be solved, were kept under observation. Of special interest was traffic between the Protectorate and London regarding the preparations for the uprising.

In the month of October a total of 488 messages were solved and 8 cipher keys derived for the STP cipher.



In pages 37-41 Cigan directly compared the Funkawbehr decodes with some of the Czechoslovak telegrams found in the country’s national archives.

For example messages exchanged between the Minister of National Defense General Ingr and Ján Golian and Jaroslav Krátký in the Protectorate and with Heliodor Píka in Moscow. 



The author’s conclusion was that the use of insecure ciphers during wartime played an important role in undermining the operations of the Czechoslovak resistance movement and these events should be acknowledged by the country’s historians. 

Acknowledgments: I have to thank Jozef Krajcovic for his help in locating the report ‘Dopady lúštenia šifrovacieho systému čs. londýnskeho MNO z rokov 1940-1945 na domáci odboj’ and Štefan Porubský for informing me of the articles from Crypto World. 

Monday, November 23, 2015

Intelligence operations in Switzerland - Hans von Pescatore, Captain Choynacki and General Barnwell R. Legge

In WWII Poland fought on the side of the Allies and suffered for it since it was the first country occupied by Nazi Germany. In the period 1940-45 the Polish Government in Exile and its military forces contributed to the Allied cause by taking part in multiple campaigns of war. Polish pilots fought for the RAF during the Battle of Britain, Polish troops fought in N.Africa, Italy and Western Europe and the Polish intelligence service operated in occupied Europe and even had agents inside the German High Command. 

Although it is not widely known the Polish intelligence service had spy networks operating throughout Europe and the Middle East. The Poles established their own spy networks and also cooperated with foreign agencies such as Britain’s Secret Intelligence Service and Special Operations Executive, the American Office of Strategic Services and even the Japanese intelligence service. During the war the Poles supplied roughly 80.000 reports to the British intelligence services (1), including information on the German V-weapons (V-1 cruise missile and V-2 rocket) and reports from the German High Command (though the agent ‘Knopf) (2). In occupied France the intelligence department of the Polish Army’s General Staff organized several resistance/intelligence groups tasked not only with obtaining information on the German units but also  with evacuating Polish men so they could serve in the Armed Forces (3).

Compromise of Polish codes

Poland’s role in WWII is well known, especially the success of Marian Rejewski, Henryk Zygalski and Jerzy Różycki during the 1930’s in solving the Enigma cipher machine, used by the German Armed forces. It is important to note that countries with large cryptologic staffs such as France and Britain had not managed to solve this device, in that time period.

Although the Poles were successful in the offence they neglected their defense. Their diplomatic, military attaché, resistance movement and intelligence service codes were read by the Germans during the war. Especially important for the Germans was the solution of the cipher used by Major Szczesny Choynacki, Polish deputy consul in Bern, Switzerland.

The telegrams of Major Choynacki

Choynacki regularly communicated with the Polish intelligence service in London and transmitted valuable reports from his agents/contacts in Switzerland and throughout occupied Europe. 

His cryptosystem consisted of an enciphered codebook. The codebook contained 4-figure groups and was enciphered with a version of the British Stencil Subtractor Frame. The codebreakers of the Signal Intelligence Agency of the Supreme Command of the Armed Forces - OKW/Chi (Oberkommando der Wehrmacht/Chiffrier Abteilung) were able to solve this system in late 1942-early 1943 and from then on his voluminous traffic to London was continuously decoded (4).

Details about the content of these messages are available from the postwar interrogations of German intelligence officers, specifically Willy Piert and Hans Von Pescatore (5). They were both members of the German Legation in Bern and they conducted intelligence operations against the Allied agencies and even the Swiss IS.

The decoded messages revealed that Choynacki had well placed agents numbered in the 500 series.




According to the Germans the most damaging agent was No 594, Isidore Koppelmann, a Jewish banker living in Basel. One of Choynacki’s decoded messages was used to uncover his identity.



It is up to historians to research this case further and identify the full extent of the damage caused to the Polish networks from the compromise of their communications.

The German spy in the US embassy and the messages of General Legge

Another interesting German operation, mentioned in the interrogations of Piert and Pescatore, was one directed against the US embassy in Bern, Switzerland. In 1941 the Germans were able to recruit a Swiss national who worked in the US embassy. This person, named Fuerst, had access to the office of the US military attaché General Barnwell R. Legge and he was able to take documents plus the used carbon paper and give it to the Germans. These documents revealed some of Legge’s sources:




Although Fuerst was apprehended in March 1942 the information he provided, coupled with decodes of US traffic (6), gave the Germans an insight into the sources and operations of the US intelligence agencies.

Notes:

(1). Journal of U.S. Intelligence Studies article: ‘England's Poles in the Game: WWII Intelligence Cooperation’

(2). War in History article: ‘Penetrating Hitler's High Command: Anglo-Polish HUMINT, 1939-1945’

(3). ‘War Secrets in the Ether’, p230-1


(5). KV 2/1329 ‘Willy PIERT / Hans Von PESCATORE



Acknowledgments: The credit for locating the very interesting Piert/Pescatore report goes to Craig McKay, author of Major Choynacki’s Ace: the Solution to an Old Puzzle of Wartime Intelligence.

Sunday, August 2, 2015

Allied agents codes and Referat 12

In the course of WWII both the Allies and the Axis powers were able to gain information of great value from reading their enemies secret communications. In Britain the codebreakers of Bletchley Park solved several enemy systems with the most important ones being the German Enigma and Tunny cipher machines and the Italian C-38m. Codebreaking played a role in the Battle of the Atlantic, the North Africa Campaign and the Normandy invasion. 

In the United States the Army and Navy codebreakers solved many Japanese cryptosystems and used this advantage in battle. The great victory at Midway would probably not have been possible if the Americans had not solved the Japanese Navy’s JN25 code.
On the other side of the hill the codebreakers of Germany, JapanItaly and Finland also solved many important enemy cryptosystems both military and diplomatic. The German codebreakers could eavesdrop on the radio-telephone conversations of Franklin Roosevelt and Winston Churchill, they could decode the messages of the British and US Navies during their convoy operations in the Atlantic and together with the Japanese and Finns they could solve State Department messages (both low and high level)  from embassies around the world.

Radio intelligence and codebreaking played an important role not only in the military and diplomatic fields but also in the shadow war between the Allied intelligence agencies, the European Resistance movements and the German security services. In the period 1939-41 German troops conquered most of continental Europe and the occupied countries were forced to contribute to the Axis effort by sending raw materials, agricultural products and forced labor to Germany. Thanks to the blockade of German occupied Europe by the Royal Navy and the harsh demands of the German authorities life in the occupied areas was bleak. Discontent over German occupation led many people to join resistance movements and oppose the authorities, either by printing and distributing anti-Axis leaflets and books, by sabotaging war production or by directly attacking the German troops and their collaborators in the government and the civil service.

Saturday, May 9, 2015

The compromise of the communications of General Barnwell R. Legge, US military attache to Switzerland

In the course of WWII both the Allies and the Axis powers were able to gain information of great value from reading their enemies secret communications. In Britain the codebreakers of Bletchley Park solved several enemy systems with the most important ones being the German Enigma and Tunny cipher machines and the Italian C-38m. Codebreaking played a role in the Battle of the Atlantic, the North Africa Campaign and the Normandy invasion. In the United States the Army and Navy codebreakers solved many Japanese cryptosystems and used this advantage in battle. The great victory at Midway would probably not have been possible if the Americans had not solved the Japanese Navy’s code.

On the other side of the hill the codebreakers of Germany, Japan, Italy and Finland also solved many important enemy cryptosystems both military and diplomatic. The German codebreakers could eavesdrop on the radio-telephone conversations of Franklin Roosevelt and Winston Churchill, they could decode the messages of the British and US Navies during their convoy operations in the Atlantic and together with the Japanese and Finns they could solve State Department messages (both low and high level)  from embassies around the world.
The State Department made many mistakes in the use of its cipher systems and thus compromised not only US diplomatic communications but also the messages of other organizations that were occasionally enciphered with State Department systems, such as the Office of Strategic Services and the Office of War Information. Another similar case concerns the communications of General Barnwell R. Legge, US military attache to Switzerland during WWII.


Sunday, August 3, 2014

Sonderkommando Rote Kapelle and the radio network of the French Communist Party

The Soviet Union was a secretive state convinced that the capitalist world was plotting to invade and destroy it. In order to avert such a development the Soviet government financed and organized the creation of spy networks throughout Europe. These penetrated military, economic, political and diplomatic circles. Many of the agents were devoted communists who thought they were working for the creation of a better world.

Germany was a major target of the Soviet spies, especially after power was seized by the NSDAP party. The Red Orchestra was the name given by German intelligence to the Soviet spy networks operating in Europe during WWII. These networks had been set up in the 1920’s and had managed to infiltrate government departments and business circles of every country in Europe. Through their spying activity they kept Moscow informed of important events in Europe.
Their means of communication was the radio and it was this means that led to their downfall. The German Radio Defence agency (Funkabwehr) was able to locate one of the sites used for radio transmissions in 1941 and by apprehending the cipher clerks and their cipher material they were able to read this traffic. By decoding messages they uncovered the names of many Rote Kapelle members and of course these were arrested, interrogated and more people were incriminated. By late 1942 the main networks in Western Europe were destroyed.
 
However after exposing and dismantling these networks the Germans took measures to continue their transmissions to Moscow, so that they could pass false information to the Soviets and also receive information on new spies sent to the West.

The unit tasked with dismantling the Rote Kapelle networks and handling the radio deception (funkspiel) was the Sonderkommando Rote Kapelle, headed in 1943-44 by Heinz Pannwitz.

Operations Eiffel and Mars
In the period 1943-44 the Sonderkommando Rote Kapelle/ Sonderkommando Pannwitz was based in Paris and handled the radio-games between captured Soviet agents and Moscow. The Germans had managed to capture the leaders of the organization Leopold Trepper (Grand Chef) and Anatoly Gurevich (Petit Chef).

After a short period in captivity Trepper managed to escape but Gurevich was used by the Germans to report disinformation to Moscow and convince them that their spy networks were operating normally.
Radio messages were sent from Paris (operation Eiffel) and from Marseille (operation Mars).

The radio network of the French communist party
Another success of the Sonderkommando Rote Kapelle concerned the undercover radio network of the French communist party. According to a recently declassified CIA report, written by Pannwitz, the French CP had prepared a network of undercover radio stations, ready to be used when the party leadership ordered it.


 
These stations had been located by the Germans and they were eliminated thus preventing direct communications with Moscow. However Pannwitz knew that eventually the communists would replace these stations with new ones and risk exposing his operations in France. In order to preempt such a move the Sonderkommando established a new French CP radio network that was in reality under its complete control.


Using the cover of the Rote Kapelle, the resistance leader Paul Victor Legendre was persuaded to set up this radio network. The Germans managed to build up this organization and inserted their own men as radio operators. By operating this network they got a large number of daily espionage reports and were able to keep track of the resistance and stop acts of sabotage.

 
According to Pannwitz an added benefit of running this network was that during the Normandy campaign some of the radio stations continued to transmit information, this time on the strength and operations of the Allied forces.
 
The operations of the network concluded in the summer of 1944 when the Germans had to evacuate Paris. Till that time however the German intelligence agencies got information of great value through the French CP radio network.