13.05.2014 Views

national security agency journal articles world war ii german ...

national security agency journal articles world war ii german ...

national security agency journal articles world war ii german ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NATIONAL SECURITY AGENCY<br />

JOURNAL ARTICLES<br />

WORLD WAR II<br />

GERMAN CRYPTOLOGY<br />

BACM RESEARCH<br />

HTTP://WWW.PAPERLESSARCHIVES.COM


CONTENTS<br />

NATIONAL SECURITY AGENCY<br />

JOURNAL ARTICLES<br />

WORLD WAR II GERMAN CRYPTOLOGY<br />

NSA Technical Journal Articles:<br />

Cryptanalysis in The German Air Force - April 1959 - Vol. IV, No. 2<br />

Cryptologic Quarterly Articles:<br />

A World War II German Army Field Cipher and How We Broke It -<br />

Winter 1995 - Vol. 14, No. 4<br />

Cryptologic Spectrum Articles:<br />

The German Cryptologic Effort 1918-1945 - Summer 1975<br />

The German Comint Organization in World War II - Spring 1978 - Vol.<br />

8, No. 2<br />

German Intercept Successes Early in World War II - Fall 1978 - Vol.<br />

8, No. 4<br />

Critical Analysis of German Operational Intelligence Part II - Winter<br />

1980 - Vol. 10, No. 1


NSA Technical Journal Article:<br />

Cryptanalysis in The German Air Force<br />

April 1959 - Vol. IV, No. 2


"'TOP 5EERH-<br />

Cryptanalysis in the German Air Force<br />

BY OBERLEUTNANT WALDEMAR WERTHER<br />

?_bjJ aUlet<br />

The r~port from which this article is taken was prepared after World<br />

War II at the request of an Army Air Corps team interrogating former<br />

Axis COMINT personnel. The extract is published here for its general<br />

interest to readers of the Journa\.<br />

I. A SHORT HISTORICAl. SURVEY OF THE DEVELOPMENT OF TilE F.ASTERN CRYPT­<br />

ANALYSIS GROUP OF TilE GERMAN AIR FORCE<br />

During the period of preparation for the establishment of the intercept<br />

equipment of the Air Force in 1936, the first State employees intended<br />

for cryptanalysis (who were all of them civilians up to the outbreak<br />

of the <strong>war</strong>) were sent to the permanent intercept posts of the<br />

Army in the East for the purpose of basic training. The results of<br />

this training were unsatisfactory because the Army was reticent in releasing<br />

even the most elementary information, and furthermore, because<br />

the individuals sent lacked in most cases the necessary qualifications<br />

for their work; the personnel officials made their selections on<br />

anything but a proper basis, and appointed many persons who turned<br />

out to be completely unsuitable for the work of a cryptanalyst. The<br />

creation of a capable and successful cryptanalytic group was accomplished<br />

only in the course of the following years of tiresome work,<br />

without outside assistance, and through an internal development<br />

achieved by dropping numerous unsatisfactory elements.<br />

In the summer of 1937, four cryptanalysts were working on Soviet·<br />

traffic at the Cryptanalytic Bureau of the Air Force (Chi-Stelle).<br />

The other Eastern powers were either treated very superficially, largely<br />

as a side issue by our Soviet section, or not processed at all. The<br />

cryptanalytic groups of the outstations of the Air Force Intercept<br />

Service (cover name: "Radio Weather Receiving Stations") also consisted<br />

of a few poorly trained and often incompetent workers. A<br />

worth-while organization for breaking new systems was developed only<br />

at the cryptographic bureau. The outstations were barely able to<br />

decode the encoded messages with the code in front of them.<br />

At the outbreak of the <strong>war</strong> in 1939, the cryptanalytic groups both<br />

in the central office and in the outstations had grown to about 10 men<br />

each, and they were included in the newly established intercept companies.<br />

.The training of the individual analyst was continuously improved<br />

through conferences, short training courges, and exchange<br />

groups. of key men for instruction purposes.<br />

73 JOP SEER!'!"<br />

~)eclassifi ed by hJS,A. 09-29-2002<br />

pursuantto E.O. '12958, as<br />

ElrTIended FC)IA, Case# 52224


lOP !lEEAiL.<br />

GERMAN CRYPTANALYSIS<br />

During the occupation of Bastern Poland in the fall of 1939, and<br />

during the Winter War in Finland (1939-40), the best men from the<br />

outstations were recalled to the Bureau, because the outstation crypt.<br />

analytic!ioups had proved unable to process accurately ~<strong>ii</strong>d quickly'<br />

enough the current and excessive material. Moreover, a group of<br />

mathematicians (made up .of about 20 men without language training)<br />

was employed at the Bureau during the Finnish Winter War, and<br />

these later formed the nucleus for work on the additive systems.<br />

At the start of the Eastern Campaign, Section E-1 of the Cryptographic<br />

Bureau (later the Cryptanalytic Section of the 353rd Regiment)<br />

was increased to abOut 40 persons, and during the course of the<br />

<strong>war</strong> to about 90, of whom some were women. The strength of the .<br />

outstations (later the cryptographic section of the evaluation companies)<br />

increased to from 40 to 60 men, women being employed only<br />

in exceptional cases. .<br />

The·intercept companies with the individual air corps ("corps companies"<br />

for short) also had small cryptanalytic groups, but they unfortunately<br />

had to be staffed with poorly trained personnel, who because<br />

of their limited field of work stayed at a low professional level·-­<br />

although their results are by no means to be underestimated.<br />

In the last months of the <strong>war</strong>, a part of the less qualified personnel<br />

was turned over to combat units.<br />

Although at the beginning of·the <strong>war</strong>, the focal point of the work<br />

was unquestionably in the cryptographic bureau and the project of<br />

combining all cryptanalytic personnel in a central office inevitably<br />

kept cropping up, the cryptanalytic sections with the Air Commands<br />

went on developing as the <strong>war</strong> continued, and thanks to the 'regional<br />

systems of the Soviets found themselves in a position to handle the<br />

material coming from their own fronts without assistance.<br />

Section E-1, on the other hand, kept losing significance, and fell to<br />

the l!lvel of an archive and organizational relay point, although it had<br />

in its command an excellent staff of cryptanalysts. Its only remaining<br />

specific assignment was the processing of material which did not<br />

admit of regional processing. But finally, after combined work on<br />

this material had been carried on for a time by the air force and/or<br />

the army, the processing, which had become useless, -was given up and<br />

Section E-1 lost its last particular assignment.<br />

2. SUM!!: SUCCF.STIONS REGARDING THE IDEAL '"ORM 0." OR(;ANlZATION<br />

The attitude to he taken on the problem, "Centralization or Decentralization,"<br />

is determined by the present characteristics of the<br />

Soviet cipher traffic (strong differentiation and regional division of<br />

cryptographic material).<br />

W. WERTHER 10' 5liCll.EI..<br />

In the case of centralization, all otherwise unavoidable duplication<br />

of work could be obviated~ and the personnel could be more logically<br />

used. But the disadvantages would be much greater, so long as, owing<br />

to the length of the Eastern [ront, it remained impossible to carryon<br />

radio reception at one point. The late arrival of the raw traffic at<br />

the central point, due to the insufficient and partly interrupted communications<br />

facilities, causes it to lose its timeliness. Moreover, with<br />

every transmission of messages by teleprinter, additional sources of<br />

error ap'pear which, as experience .shows, can hinder the work and<br />

lower the value of the cipher material. Lastly, the absolutely essential<br />

contact between intercept operator and cryptanalyst is completely interrupted.<br />

.<br />

For this reason the regional concentration of cryptanalytic personnel<br />

in the air fleets for independent processing of their own front sectors<br />

can be considered, in fact, as the most satisfactory solution. A<br />

small working staff exclusively for Questions of organization and training<br />

would have had to be formed from the extensive cryptographic<br />

section of the regiment; all the other analyst.~ would have found more<br />

profitable employment with the air fleets.<br />

Any further subdivision of the cryptanalytic forces, however, is not<br />

advisable, and should be avoided except insofar as there may be detached<br />

companies with special assignments (e. g., long-range fighters<br />

or air defense).<br />

:to ORGANIZATION AND WORKING TECHNIQUE nt' A CRYPTANA'~YT'C SM.,"TION.<br />

a. The Cryptanalytic Section of an Evaluation Company<br />

In this chapter the organization and working technique of the cryptanalytic<br />

section of the evaluation company of an intercept battalion<br />

will be sketched.<br />

Everyth<strong>ii</strong>lg said here is essentially ·valid for the cryptanalytic section<br />

of the intercept regiment (formerly E-l of the Cryptanalytic Bureau<br />

of the Air Foree), as well as for the small cryptanalytic groups of<br />

detached companies with sPecial assignments: '.<br />

The cryptanalytic section 'makes up a platoon of the evaluation<br />

company. The head of the section is, when possible, one of the company's<br />

officers (Wachoffi7.ier). The prerequisite is, however, that the<br />

head of the section be an outstanding specialist, and the question of<br />

rank plays but a minor role in this case.<br />

b. The Chief of tAe Cryptanalytic Section (Chief Analyst)<br />

He is the soul of the whole section. The extent of training, pleasure<br />

in the work, and success depend on him. If he cannot continually<br />

show proof of his outstanding professional abilities, he soon loses the<br />

respect and confidence of his men. Experiences with officers who had<br />

74 75


GERMAN CRYPTANALYSIS W. WERTHER TOP 5EeRET<br />

to assume direction of a cryptanalytic group without, or with insufficient,<br />

professional knowledge were always thoroughly disappointing.<br />

For mere organizational activity (assignment of personnel, arranging<br />

work schedules, etc.) without actual professional knowledge leads to<br />

constant wrong decisions and has a most harmful effect.<br />

All cryptanalytic work is a matter of trust; a man cannot be forced<br />

to decrypt, and the actual amount of work done cannot be exactly measured,<br />

since unfortunately, the amount of work spent on cryptanalysis<br />

does not always bear a direct relationship to the success achieved. For<br />

these reasons, if for no others, the chief must be able to judge his colleagues<br />

not only professionally but also as to character.<br />

By means of daily, even though short, conferences the chief must be<br />

in a position to be able to follow continually the work of every individual<br />

man, in order to be available with advice and assistance when<br />

the inevitable stoppages occur. In such conferences,· moreover, current<br />

organizational ills and desirable transfers of personnel will become<br />

evident.<br />

Particularly difficult prohlems are handled personally by the chief<br />

analyst with the assistance of especially good troubleshooters. He is<br />

the man who is always there when.the wagon gets stuck in the mud;<br />

once it gets going again, he cart simply turn his attention to new difficulties<br />

and leave further work on the old system to his colleagues.<br />

Because of <strong>security</strong>, the work of the cryptanalyst must always go<br />

unrecognized by the outside <strong>world</strong>. It is all the more the responsibility<br />

of the chief analyst to encourage his colleagues by just praise,<br />

and to see that the accomplishments of his people are appropriately<br />

valued by the "higher-ups" (say, at inspections).<br />

c. Work Shifts<br />

During the <strong>war</strong>, the personnel of the cryptanalytic section worked<br />

on two (early and late) or three (continuous) shifts. The exact division<br />

of time depends on the amount of work and the size of the space<br />

available, and must be adjusted to new conditions rather frequently.<br />

The assignment of personnel to the shifts takes particular care,<br />

because the abilities of the members of the shift must be carefully<br />

balanced.<br />

d. The Shift Chief<br />

The shifts take care of the current reading of traffic and the simpler<br />

decryptions. The organizational head of the shift is an experienced<br />

and responsible man, who as such is responsible for the entire process<br />

on his shift. He divides the work coming in in accordance with the<br />

instructions of the chief cryptanalyst, and must be able to judge the<br />

difficulty of the work processes in order to recognize and adjust overor<br />

under-loading of his colleagues. Since his organi;ational duties<br />

leave him little time for regular cryptanalytic work, and a long term<br />

of duty would tend to make him become a bureaucrat, it is desirable<br />

from time to time to "change the watch". It is the duty of the chief<br />

cryptanalyst to educate his men so that they see in the assignment as<br />

leader of a shift no particular "social advancement" but only a temporary,<br />

albeit honorable position. The change of the leader of a shift is<br />

neither a punishment nor a sign of lack of confidence, but merely aims<br />

at preserving the usefulness of the individual as a worker.<br />

e. The Cryptanalyst-Specialist (Trouble-shooter)<br />

For rush problems or especially difficult problems the chief analyst<br />

calls on particularly capable and reliable analysts from the shifts.<br />

Generally they work only on the day shift and are continually in<br />

closest contact with the chief analyst, These specialists are given<br />

more or less freedom with regard to working hours and length of working<br />

period,-:,insofar, of course, as inevitable military demands permit.<br />

The continual change of personnel of the specialist group makes it<br />

possible (1) to employ specially capable men in their special fields;<br />

and (2) to raise the level of training of the individual by appropriate<br />

distribution of the work.<br />

Specialization on the part of the individual cannot be avoided. In<br />

and of itself it is desirable. But care must be taken that this specialization<br />

is not allowed to become one-sidedness, so that the worker loses<br />

his necessary perspective.<br />

f. The Clerical Force<br />

The untiring efforts of a strictly trained clerical force are essential<br />

because of the excess of paper and thedanger, which springs therefrom,<br />

of an "editorial-office order." The force consists of one or two workers,<br />

who if possible should have at least a minimum knowledge both of<br />

language and cryptanalysis, 'so that they do not manage, because of<br />

their ignorance, to do more harm than good. The duties of the clerical<br />

force are the'following:<br />

Presorting of the message material received.<br />

Assembling the material by nets on the basis of rnessage designation<br />

(net number, breaking of call signs) by the traffic analysis<br />

section.<br />

Assembling by systems on the basis of known indicators and other<br />

characteristics (recognition books of the cryptanalysis section).<br />

Sifting out of the non-pertinent messages from other fronts and<br />

branches/offices of the armed forces and for<strong>war</strong>ding these to the<br />

appropriate offices, or destroying them.<br />

76 77 TOP SEeRET


'\<br />

TOl' SECRET GERMAN CRYPTANALYSIS W. WERTHER TOP SE€REL<br />

Filing material which cannot be currently read until work on its<br />

solution can begin, or until the system has been solved.<br />

Transmission of the decrypted' material for exploitation (message<br />

archives).<br />

. Registry of secret papers, teletypes and other material.<br />

In addition to this work, the clerical force c.an be called upon to do<br />

statistical work when necessary.<br />

g. The "Gadgeteer"<br />

It appears advisable to have a worker in each cryptanalytic section<br />

who can make the various aids for additive-eneipherment solution,<br />

such as sliding tables, drum systems, codes, and so on, in simple and<br />

useful forms, and who is always available. By this specia1i?.ation of<br />

one ingenious man much time can be saved, and the neatness and usefulness<br />

of the gadgets can he assured.<br />

a. Presorting and System Recognition .<br />

The already marked message material comeS from traffic analysis to<br />

the cryptanalytic section and is there sorted and identified, first by<br />

the clerical staff and then by the analyst, according to the available<br />

material for recognition of the codes.<br />

b. Decoding<br />

Insofar as the necessary material is available, the message is immediately<br />

decoded, so that there may be no unnecessary time lags, suchas<br />

may seriously reduce the value of the message.<br />

c. Analysis<br />

Unclear material, and material which cannot be directly read (that<br />

is, for which the code has not been broken) is continuously analyzed<br />

by means of all sorts of statistical studies.<br />

d. The Break-in<br />

As soon as the material in a given system has"accumulated to a point<br />

which promises success, attempts are begun to break into it.<br />

e. Analysis of the System and Reconstruction of the Basic Code<br />

As soon as a sufficient number of groups have been determined, attempts<br />

arc begun to reduce this usually relative material to a true<br />

basic, i. e., to reconstruct the original form of the Soviet code. At<br />

the same time the recovered key sequences must be compared and collected<br />

in a unified system.<br />

f. Further Treatment<br />

By reworking the material returning to the cryptanalytic section<br />

after exploitation, the codes are extended by additional recoveries.<br />

During the first years of the <strong>war</strong>, the break-in could be considered as<br />

the essential crypto-technical process, but lately the emphasis ha.~<br />

shifted more and more to a processing of the system and reconstruction<br />

of the codes.<br />

5. SOME GENERAL WOHKIN(; I·RINelrLf·;~<br />

a. Team Work<br />

The most fruitful form of cryptanalytic work is the collaboration of<br />

a few mutually sympathetic analysts, who naturally get together on<br />

the handling of more difficult problems without direction from above,<br />

and who supplement each other in their intellectual make-up. Alongside<br />

the precise, inexorably logical and constructive systematizer with<br />

perhaps only a fair knowledge of the language, there are the superior<br />

linguist who may not be so good at putting two and two together and<br />

the sensitive artist whose strong point is intuition. When one of<br />

these tires and begins to have his doubts, the common work is carried<br />

on, nevertheless, by the impetus of the others. Discussions bridge<br />

gaps in the ideas .of the individual, and arguments crystallize correct<br />

knowledge and break down unclear· and botched ideas. In short, the<br />

problem is illuminated from all sides.<br />

b. The Space Problem<br />

For this reason the demand which is sometimes heard for individual<br />

rooms as the ideal, in order to assure quiet and intellectual concentration,<br />

is not sensible. On the other hand, a certain spaciousness of<br />

quarters is necessary for the work. The rooms must be large enough<br />

so that the workers do not interfere with each other, and that big<br />

heaps of message and code material do not pile up because of lack of<br />

space, forcing the workers to hunt laboriously for the material they need<br />

at the moment, with consequent loss of time.' Care must be taken in<br />

particular to have extra sorting tables and sufficient space for storage.<br />

The disciplined quiet of an intellectual institution must be guaranteed<br />

in the interest of the work, even though brief but quite necessary<br />

recesses turn the serious room into a jovial gossip-shop. .<br />

c. Statistics<br />

The statistics are to the cryptanalytic expert at once the essence and<br />

the chemical analysis of the message, and the most essential aid in his<br />

work. A careless count can be worthless, leading to false deductions,<br />

and thus seriously delay the course of solution. For this reason the<br />

use of assistants who are employed on the basis of their previous tmin-<br />

78 79 TOil ~!~REI<br />

/


T8f 5EEORET GEllMAN CRYPTANALYSIS W. WERTHER TOP SE'AIiT<br />

ing and limited 'intellectual penetration, as "mere statisticians" is extremely<br />

dangerous and objectionable. Each cryptanalyst must be, required<br />

to make the necessary statistics for his own work. The processing<br />

of very difficult and extensive systems, e. g., superencipherment<br />

with long keys, which requires weeks of mathematical and<br />

statistical work, is, of course, an exception.<br />

d. The ResponsiMlity of the Processor<br />

Each worker is bound to process his message conscientiously to the<br />

point of readability, and to add his initials when he has finished, in<br />

order that the translator and exploiter, as well as the leader of the shift,<br />

may direct inquiries to the right person. The processed messages are<br />

collected and quickly checked by the leader of the shift or sOme specially<br />

designated person, and then turned over to Content Evaluation for<br />

translation.<br />

e. ,Me~age Translation<br />

As long as the majority of personnel in the Content and Final Evaluation<br />

sections do not know the language well enough-and that, unfortunately,<br />

was the situation except in the Regimental Evaluation<br />

Unit--all messages solved must be translated.<br />

At first, analysts were made responsible for the translation of their'<br />

own meSsages. This procedure, however, proved to be most impractical,<br />

for a l;lrge part of the cryptanalytic personnel did not have a<br />

good enough knowledge of the language to make a satisfactory translation<br />

of the difficult and partly garbled message texts:<br />

As a result, mediocre cryptanalysts with very good language ability<br />

were gathered together into a special translation group. Working<br />

under Content }


",.'<br />

GERMAN CRYPTANALYSIS<br />

time, the cryptanalyst is obliged to help himself: current language<br />

problems and obscurities are noted on paper and cleared up at the<br />

next opportunity (as by interrogating intelligent prisoners). The interrogation<br />

officer of the Air Force is used continually, insofar as there<br />

are no other more favorable sources in the vicinity (such as a P/W<br />

camp) which make independent steps more convenient.<br />

Net diagrams, callsign interpretations, and DfF results are used not<br />

only by the clerical force, but also by t.he individual worker in ident.ifying<br />

the encrypted material.<br />

Maps, lists of place names, and time-tables simplify the break-in and<br />

working out of the material. Situation maps and lists, tables of aircraft,<br />

type list.s of all kinds, and military-unit and name files all serve<br />

the ,same purpose.<br />

b. Special Tools<br />

In working on a country for a long time the classical language statistics<br />

(monographic, digraphic, and trigraphic frequencies, etc.) drop<br />

into the background. The few rules of thumb which are still used become<br />

general property.<br />

Novices and less-sure linguists have used list.s, partly prepared by<br />

themselves, in which characteristic expressions are analyzed. Sometimes,<br />

these "crib-lists" have served a good purpose, but they are<br />

looked down on by experienced analysts.<br />

The compilation of a vocabulary from the multiplicity of reconstructed<br />

and a few captured code books t.o form what we may call an "ideal<br />

COdl' book," proved to be particularly useful in filling out partial recoveries.<br />

Such ideal code books were published a number of times<br />

during the <strong>war</strong>.<br />

In the course of the years, some twenty st.atistical procedures have<br />

been developed, most of which have been used for 'current operations.<br />

The archives of previously read messages are, of great value as<br />

visualization material 'in work on new systems from known' nets and<br />

in further training of cryptanalysts.<br />

Daily summaries in the form of leaflets or card files on the occurrence<br />

of individual systems, on the relationship between systems on<br />

the one hand, and call signs, address and signature groups, place names,<br />

indicators, characteristic headings and characteristic message construction<br />

on the other, complete the list of aids for the cryptanalyst.<br />

c. Explo'itation of Captured Material<br />

Although the German Army intercept service captured a great many<br />

codes during the advances in the East, the amount of captured material<br />

in the Air Force (partly because of the more extensive front) was insignificant,<br />

sO that no reduction in the work load was noticeable. A<br />

W. WERTHER<br />

majority of the captured material was either well out of date (during<br />

the first days of the War in the East, for example, codes were captured<br />

dating' from the year 1935) or already superseded because of compromise.<br />

Moreover, air-ground tables from shot-down aircraft could<br />

very seldom be exploited, because of the short effective period of these<br />

tables (usually only one mission).<br />

The transmission of captured aviation codes from intercept units of<br />

the army and the intercept liaison officers of t.he navy staffs and other<br />

flying organizations was generally assured. ' ,<br />

Sometimes, also, captured orders containing superencipherment<br />

instructions for systems still in use were of great value, since they gave<br />

a clear, insight into the structure of the system in question.<br />

1. COOPERATION BETWEEN THE CRYPTANALYTIC DIVISION AN)) OTHER PROFES_<br />

SIONAL GROupS<br />

a. Cooperation with the Other Groups of an Exploitation Company<br />

A close connection between operators and cryptanalysts has always<br />

proven very fruitful. Frequent conferences give the cryptanalyst<br />

valuable hints for his work. Knowledge of the quality of the individual<br />

operator, the good points of his work or his characteristic mistakes<br />

saves the cryptanalyst from many blind alleys. Especially when attacking<br />

new systems, it is most important to be able to evaluate the<br />

material at hand on the basis of the abilities of the receiving operators.<br />

Occasional talks, in a popular vein, on cryptanalysis and the value of<br />

perfect message material, given the operators by the chief analyst, had<br />

a decidedly positive effect on the zeal of the radio shifts.<br />

The messages arc reviewed and marked by the traffic analysis section<br />

before their processing by the cryptanalysis unit. Discussion with the<br />

traffic analyst can often provide the cryptanalyst with useful hints in<br />

individual cases; on t.he other hand, the cryptanalyst is in a position to<br />

aid the traffic analyst in picking up lost nets, by identifying messages<br />

on the basis of message and system indicat.ors ,and characteristic counts.<br />

In some cases, DjF result.~ can be of notable value, especially where<br />

traffic analysis can giv,e little information.<br />

All card files and other materials of the Evaluation Section can be<br />

continuously used by the cryptographic section for their work. Indeed<br />

it has been shown repeatedly that in the handling of difficult problems<br />

cryptanalysts and exploiters have cooperated and decrypted almost as<br />

a team. The daily work conferences under the chairmanship of the<br />

commanding or executive officer of the section gave the chief cryptanalyst<br />

an opportunity to present hints and wishes for cooperation.<br />

Fundamental for all cooperation is the recognition of the fact that each<br />

specialized section needs the others for its work, and is also needed by<br />

Tap lij;€Ai:r 82 83 1QP l<strong>ii</strong>€RET


TOI' 3EEORET GERMAN CRYPTANALYSIS W. WERTHER TQP 5EERET<br />

them; that each technical specialty is, to a certain extent, a tool subject<br />

for the others; that an individual section can never work successfully<br />

alone. At the beginning of the <strong>war</strong>, there were attempts for<br />

<strong>security</strong> reasons to keep the various sections separate from each other<br />

and prevent any exchange of ideas; this insane plan was dropped very<br />

shortl:v.<br />

b. Cooperation of 1M Cryptanalytic Group with Other Cryptanalytic Units<br />

Originally the contact between regiment and section in the field of<br />

cryptanalysis was very close, because the section had neither the personnel<br />

nor the material to meet the demands made upon it. Frequent<br />

borrowing of workers, and conferences, guaranteed the transmission of<br />

new discoveries and techniques.' .<br />

Owing to the differentiation of the cipher material, the often ex'<br />

cessive distances on the Eastern front, and poor communications, the<br />

contact became, in the course of .time, -less close. The sections were<br />

later able to handle their as.~ignments in complete independence.<br />

New systems were exchanged constantly with the regiment by teleprinter,<br />

and their designations were selected by the regiment. An<br />

exceptionwas made sO.that the radio star net.of the intercept service<br />

in the East could be used for the exchange of communications between<br />

the sections. A special cipher system was available for encoding radio<br />

messages concerned with cryptanalysis. It may' be worth mentioning<br />

that at times a Soviet code book was used a... the basis of this system.<br />

Quarterly conferences lasting several days gave the chief analyst of<br />

the sections an opportunity to clear up all technical and organizational<br />

problems with the regiment. .<br />

The three cryptanalytic sections on the eastern front ~aintained an<br />

active interchange of ideas. Frequent visil~ back and forth afforded<br />

~n insight into the work of the neighboring sl.'CtionS and gave a new<br />

mcentive for one's own. Newly solved systems of air armies which<br />

they covered in common were exchanged directly on the teleprinter,<br />

and codes for older and processed systems were compared at regular<br />

intervals. The fact that the key men in all cryptographic sections<br />

had either come from the cryptographic bureau or had worked together<br />

elsewhere for years and were well acquainted led to very stimulating<br />

and loyal cooperation.<br />

The personnel of detached companies of the intercept section was,<br />

in most cases, drawn from the cryptanalysis section; and was later<br />

taken care of by the cryptanalytic section of the exploitation company,<br />

remaining closely connected with the latter in its work..<br />

c. Cooperation with Other Branches of the Armed Forces and Foreign Intercept<br />

Services<br />

Even thougb the field of work of the individual cryptanalysis sections<br />

waS definitely limited by the nature of Soviet cryptographic methods,<br />

an attempt was made to kl.'Cp up a current exchange of opinions with<br />

the corresponding technical sections of other branches of the armed<br />

forces and friendly foreign intercept services, and this led to good<br />

results and a broadening of the professional horizon.<br />

Cooperation with the cryptanalytic sections of the "commands for<br />

communications observations" in the same area was uniformly good.<br />

Again and again, exchange of material betwecn the individual cryptanalytic<br />

sections of the Anny and the Air Force wa..~ arranged. It is<br />

true that it never became very effective because mutual interest in<br />

individual systems was not great, but the characteristics' of the systems,<br />

the resulting methods of attack, and· the general organi7..a.tion of<br />

the work were repeatedly discussed or investigated. Aside from that,<br />

message material of interest was continually exchanged.<br />

In contrast to the Air Force, the Army posts had behind them a great<br />

tradition, although this very tradition threatened to degenerate into<br />

intellectual stagnation and made the organization of the work appear<br />

unwieldy. The successes of the Army became smaller in the course of<br />

the <strong>war</strong> owing to increased complication of the army systems and very<br />

strict radio discipline on the part of the Soviets. The level of training<br />

and the techniques were approximately the same as in the Air Force.<br />

Cooperation with the Navy was not so close, largely because of the.<br />

difference in technical interests; otherwise, what has been said concerning<br />

cooperation with the Army also applies here.<br />

No cooperation existed with the SS. There were rumors of an<br />

elaborate cryptographic set-up within that body, and sporadic attempts<br />

were. made to recruit key men of the other branches of the armed<br />

forces for it.<br />

Finnish cryptanalysis was carefully and efficiently organized in a<br />

large centr.ll station, had available a multitude of excellent personnel<br />

and obtained correspondingly good results., Cooperation with the<br />

cryptanalysis section of the Finnish First Air Fleet was unrestricted<br />

and led to excellent results.<br />

The cryptanalysis force of the Hungarian intercept service consisted<br />

of over-age personnel and was unadaptable; the results were m",ager.<br />

Although even before the <strong>war</strong> a disguised Air Force detachment in<br />

Budapest was cooperating with the Hungarians, the relationship could<br />

not be characterized as satisfactory because the Hungarians were not<br />

sufficiently honest.<br />

.,er SE€Ait. 84 85 fer SEEAIiT


lOP :;EER!;T GERMAN CRYPTANALYSIS W. WERTHER TOP !!~IU:T<br />

8. THE CRYPTANALYST<br />

a. Mental Requisites<br />

The prime requisite is a lively interest in the work. A man with~ut<br />

enthusiasm and interest in the work cannot be forced to accomphsh<br />

anything. He is merely an obstructive foreign body.<br />

The cryptanalyst must be intelligent and mentally very alert, but<br />

the ability to associate ideas must be held in cheek by a well-developed<br />

critical faculty. A mere day-dreamer is inconceivable as a cryptanalyst.<br />

The ability to work scientifically, i. e. systematically, is a further<br />

essential. The peculiar character of the profession all too often involves<br />

having the work of days, or even weeks, prove usel~ss ~nd<br />

being continually obliged to try new ways of reachmg the obJectlVe;<br />

in such a situation indomitable persistance is the only resource.<br />

Good knowledge of languages is indispensable. At least, if a man<br />

has no satisfactory knowledge of languages, he must show a pronounced<br />

feeling for languages.<br />

The mathematical ability so often called for or. presupposed does<br />

indeed belong among the essentials, but this talent is not to be confused<br />

with mathematical schooling. The best cryptanalysts with great<br />

analytic and constructive talents have, as a rule, no notion of the<br />

theory of combinations. The few mathematically trained workers on<br />

the other hand often use their knowledge merely to calculate, on the<br />

basis of well-known formulae, how many possibilities this or that system<br />

permits-the system being generally broken by others.<br />

Two other elements must not be forgotten: intuition and--Iuck. I<br />

mean that luck which in the long run falls only to the lot of the competent.<br />

These notes indicate sufficiently that, on the basis of the<br />

requirements set forth, the professional ideal can. 0~1~ be reached by<br />

very few. Hence in the interests of the work the mdIvIdual must have<br />

a definite community feeling; he must not be a mere lone wolf. Most<br />

successes in cryptanalysis are not the exclusive work of an individual<br />

but are group accomplishments, which have resulted from technical<br />

discussion, from mutual criticism, and from an integration of intuition,<br />

systematic work and diligence.<br />

There is no cryptanalyst whose knowledge covers the entire field.·<br />

The reason for this is to be found less in the mental acumen of the<br />

analyst than in the inventors of the systems worked on, and in. the a~cidental<br />

allocation of the individual, usually made on the basIs of hIS<br />

linguistic knowledge. Each one is master only of t?C systems and the<br />

tricks necessary for the solution of the systems whIch he has actually<br />

worked on, and worked on not for a short time-perhaps at some school<br />

or in a course-but in actual practice over a long period. An outstanding<br />

analyst, who has worked, let us say, for years only on the substitution<br />

systems of a particular group of countries, will only· be able to talk<br />

in generalities about machine systems, although it must be assumed on<br />

the basis Df his proven profes.~ional ability that he will be able to hold<br />

his own in this field too.<br />

5<br />

b. Choice of Cryptanalytic Personnel<br />

Selection and replacement of personnel is rendered very difficult by<br />

the striCt demands for secrecy. Special psychological-technical tests<br />

are obviously risky, .while general intelligence tests lead repeatedly to<br />

bad' mistakes. After years of experience in the field of personnel selection<br />

one must come to the conviction that a ten-minute general conversation<br />

reveals the suitability or unsuitability of an applicant better<br />

than the most lengthy and compreh.msive tests. Of course, occasional<br />

errors of judgement cannot be wholly avoided. Many a hopeful novice<br />

reveals himself after a few weeks as an untalented bungler and<br />

many an unimpressive person with obvious deficiencies (inadequate<br />

knowledge of languages, scant general education, and the like) becomes<br />

a successful and well-qualified worker. Thus, for example, an undoubtedly<br />

highly intelligent language teacher, who composed several<br />

textbooks for learning Russian which are recognized as good, failed<br />

utterly as a cryptanalyst. On the other hand a young soldier, a metal<br />

worker by trade, who had never done any scientific work and was<br />

assigned to thc intercept service by sheer accident, became one of our<br />

most effective cryptanalysts.<br />

One factor which must not be underestimated as a contribution to<br />

morale and achievement was the fact that numerous cryptanalysts<br />

were either Germans from Russia and the Baltic States, or Russian<br />

<strong>national</strong>s who had immigrated; all these had had their unfortunate<br />

experiences with Bolshevism. For these people, employment in the<br />

cryptanalytic section was not simply a matter of bread and butter or<br />

obedience to orders, but was an expression of strong anti-Bolshevist<br />

feeling.<br />

In the last years of the <strong>war</strong>, replacements were supplied almost exclusively<br />

by the InterPI


TOP SI!CRET GERMAN CRYPTANALYSIS W, WERTHER "TOP 5EERST<br />

the trade, .8xplanation is not enough. An explanation, for instance,<br />

of how a reciphennent is solved or how a relative code is adjusted to<br />

the presumed original does not, by any means, put him in a position<br />

to perform these tasks by himself. If he cannot himself se~ the problematic<br />

character of his work, if he does not feel the desire to force<br />

his entry into this undiscovered territory by constant questioning .a~d<br />

boring, he will never become a good cryptanalyst. Those who faJl 10<br />

the profession are prone to otTer the excuse that this or that was not<br />

shown them or not explained to them. It will almost always be true<br />

that they did not have the necessary acumen to work out the corresponding<br />

proble'm themselves. As a matter of principle everything is<br />

explained, but it must also be understood. Naturally, however, young<br />

members of the organization are not mere mental messenger boys,<br />

whose time is to be filled out exclusively with sorting messages and<br />

making counts the significance of which' may perhaps not be explained<br />

to them. At the beginning of a long and tedious training it is necessary<br />

that the novice be able to share in the exciting, nay, dramatic<br />

incidents of this work,-that one try to show him the breaking of a<br />

system or the development of a process. Great importance also attaches<br />

to having the young analyst learn to make practical and efficient<br />

use of the manifold aids afforded by all the other sections, for<br />

the best analyst is not the one who works depending upon himself<br />

alone and starting from scratch, but the one who can piece together,<br />

for his own combinations and constructions, the greatest number of<br />

buildirig blocks selected frum the results of the other sections. It<br />

cannot be over-emphasized that the art consists not in working as<br />

"creatively" as pos.qible, but in incorporating as many known technical<br />

elements as pos.qible into one's work.<br />

For this reason it is absolutely essential that the cryptanalyst have<br />

tactical schooling and be acquainted with the work of the various<br />

Evaluation Sections, at least in broad outline. One can only think<br />

with horror of the many fellow workers of those first years who, in<br />

default of the most elementary knowledge of military affairs, did not<br />

hesitate in their messages to subordinate a divisional staff to a regiment<br />

and let the regiment issue orders' to the staff or to start local<br />

reconnaissance planes on a long-range fighter mission--and when<br />

their work was criticized, to assert that what they had written agreed<br />

with the source and if the text was not satisfactory, so much the<br />

worse for the text. One trait of a really good cryptanalyst is his<br />

tendency to conservatism--- the tendency to cling to methods which<br />

have at some time proven good. It is very difficult to convince one's<br />

fellow workers that the methods they have used thus far have led to<br />

the goal to be sure, but can or must be replaced by others which are<br />

better, more logical, and more exact. At such momentB, a certain spiritual<br />

inertia becom~s manifest. Introducing the use of substitution<br />

tableB, for example"or implanting the idea that it is absolutely necessary<br />

to attempt the reconstruction of the original code even though<br />

decipherment with a relative code has been successful; such reforms<br />

require much time, effort, and pedagogical persuaBion on the part of<br />

the analyst responsible.<br />

Formal courses of instruction seemed desirable, but unfortunately<br />

the want of good cryptanalytic personnel was so keenly felt that it<br />

was not possible to release a few good men from their daily tasks to<br />

set up a permanent teaching staff and institute a long,term training<br />

program. All the short tenn and--in the last analysis-improvised<br />

courses in cryptanalysis which were giYen, revealed their inadequacy<br />

and questionable value again and again_ It was really only possible<br />

to discuss the systems briefly and to show the sort of aids necessary in<br />

working them. 'Any made-up problem is after all only an isolated<br />

phenomenon and furnishes training in the use of a particular procedure<br />

rather than in flexibility of mind. That was all, and it amounted to<br />

very little. Thus the short term courses were, for the most part,<br />

merely a means of getting acquainted with the new fellow workers.<br />

The product of the courses was never a "trained" eryptanalYBt. Such<br />

a one develops, as already remarked, only in and by practical work.<br />

As to a text book: no doubt it would have been wise to put into<br />

writing the results of practical experience, fundamental ideas, and<br />

tricks of cryptanalysis in the form of a guide, and to place this in the<br />

hands of not only the novice but the advanced student as a manual<br />

for reference work. This project. was to be carried out after the end<br />

of the <strong>war</strong>.<br />

88 89 lOP 91!CRET


NSA Cryptologic Quarterly Article:<br />

A World War II German Army Field Cipher<br />

and How We Broke It<br />

Winter 1995 - Vol. 14, No. 4


i<br />

I<br />

I,<br />

UNCLASSIFIED<br />

A World War II German Army Field Cipher and<br />

How We Broke It<br />

CHARLES DAVID<br />

In 1942 the U.S. Army Signal Corps was looking for college graduates to train in radar<br />

work, which was then new and promising. I enlisted, and after, six months of pre-radar<br />

courses in calculus, physics, chemistry, and radio theory at Rutgers University, I found<br />

myselfin Camp Crowder, Missouri, the Signal Corps basic training center.<br />

Once I was there, a classification sergeant informed me that Camp Murphy, the radar<br />

facility in Florida, was overcrowded and that I'd be assigned to some other training.<br />

Checking my academic record and Army Classification Test score, he suddenly asked me if<br />

I had ever heard of "cryptography."<br />

As he thumbed through his manual, my memory reverted to a cryptanalysis course<br />

that my fiancee had taken at Brooklyn College, given by Professor Jack Wolfe of the math<br />

department. She and I would sit in a sunny meadow in Prospect Park, and I helped with<br />

the frequency counts. My reverie was broken by the information that I was to be sent to<br />

Vint Hill Farms Station, near Warrenton, Virginia - close enough to my New York home<br />

and my wife-to-be to please me no end.<br />

Vint Hill was an unusual army camp - in a bucolic setting, with evergreen trees<br />

surrounding the barracks and woods all around. It was a hush-hush place, and we were<br />

constantly <strong>war</strong>ned to keep it so. One of its two parts was devoted to cryptanalysis studies,<br />

and the other was a working radio facility.<br />

The students were men of strong academic backgrounds and achievements. Of course,<br />

there was a large supporting cast of administrative cadre who tormented us with the usual<br />

army routine - drills, hikes, KP, inspections, and the like. However, there was<br />

communion among the "crypt" people as a result of the learning atmosphere and the<br />

intellectual interest engendered by these new and uncommon studies.<br />

Our classes were taught by sergeants. Once in a while an officer would appear from<br />

Arlington Hall, but Vint Hill was an enlisted men's camp and school. We religiously<br />

followed the texts of William Friedman and considered him our mentor. Men left after<br />

unpredictable time periods to join active units in both main theaters of the <strong>war</strong>. Most<br />

seemed to end up in our own signal centers and were involved with <strong>security</strong> matters.<br />

After seven months I was called in for an interview, and I was asked if I knew any<br />

German. I had studied the language for two years in high school and was able to read and<br />

translate a newspaper handed to me by an officer. He said that would do just fine, and I<br />

was assigned to a special class being formed.<br />

31 UNCLASSIFIED


UNCLASSIFIED<br />

CRYPTOLOGIC QUARTERLY<br />

The new class of about thirty men was taught by a very bright Sergeant Dineen. He<br />

hadjust returned from Arlington Hall where he had been briefed on two German systemsone<br />

a lower-grade code and the other a medium-grade field cipher which the British had<br />

started to break. We learned about the cryptographic nature of the systems and then<br />

something of the analysis procedures. I knew then that working on them would be<br />

intriguing beyond compare. I found out I was right when I got a chance to work on the<br />

cipher as a member of Signal Security Detachment D, an element of General Omar<br />

Bradley's Twelfth Army Group.<br />

In April 1944, I and other embryonic codebreakers debarked from a large troop ship in<br />

the bombed-out port of Liverpool, England. Our group was brought to London and billeted<br />

near Marble Arch. The next day we were brought to an apartment building on Weymouth<br />

Street that had been given to the Signal Corps for its intelligence work. A number of<br />

comrades and I were assigned to a breaking section working on the German army mediumgrade<br />

cipher. We had been familiarized with it during our last month at Vint Hill and<br />

were told that the British had made good progress with the breaking. The system was<br />

used by all levels of the German army, from army groups on down, seemingly where the<br />

highest-level means (Enigma) were not necessary or available. The encryption method<br />

was a clever variation of the Playfair that rendered breaking very difficult. We called it<br />

NI, short for Non-Indicator, as the early intercepts showed no indicator. To the enemy it<br />

was Doppelkastenschl<strong>ii</strong>ssel (Two-Box Cipher).<br />

At Weymouth Street it became apparent that all the operational work was performed<br />

by us enlisted men. This contrasted with the British army, where our equivalents were<br />

officers. Our men and officers were mostly professional people and scholars. On the whole<br />

they were older than the average G.!.<br />

Our first weeks were spent on practice problems and perfecting our skills. We also<br />

took a class in military German. Although all of the men had had some past school contact<br />

with the language, this taught us likely army vocabulary. Oddly, however, many of the<br />

people who succeeded best in codebreaking had limited facility with German. The<br />

language experts, both trained and German-born, tended to see more than really was<br />

present in cipher text, and they neglected the more important principles as frequency and<br />

combination, which led to gradual but surer results.<br />

Soon we were thrown in with the earlier arrivals, and we began to work on current<br />

intercepts. Before the 1944 invasion, the enemy signal units on the Atlantic Wall<br />

practiced their cryptography and radio transmission constantly. Often they sent personal<br />

messages, newspaper <strong>articles</strong>, nursery rhymes, and the like. As they practiced, so could<br />

we, and thus our skills were improved.<br />

When the Normandy invasion began, the breaking proceeded apace. We gleaned both<br />

tactical and strategic information that was coordinated with other forms of signal<br />

intelligence, such as direction finding and traffic analysis. As our armies pressed inland,<br />

it was decided to form a mobile unit to accompany the advancing allied armies. This was<br />

necessary for two reasons. Firstly, our radio-intercept companies had to be near the front<br />

UNCLASSIFIED 32


WWII GERMAN ARMY FIELD CIPHER<br />

UNCLASSIFIED<br />

in order to read enemy traffic more accurately. Secondly, they could send intercepts to us<br />

quickly by messenger.<br />

I was chosen for this unit along with a mixture of the newer and the more experienced<br />

men. The unit was called Signal Security Detachment D, after<strong>war</strong>ds always S.S.D.D., and<br />

it was commanded by Lieutenant Colonel Charles Allen. We were attached to General<br />

Omar Bradley's Twelfth Army Group, but we always stayed by ourselves in the field.<br />

S.S.D.D. consisted of various sections representing all phases of signal intelligence:<br />

1. Cipher-breaking Team. This was my group. It was headed by Sergeant Ho<strong>war</strong>d<br />

Arnold, a fine cryptanalyst from Providence, Rhode Island, who later became president of<br />

a large department store in his home city. Besides continuing his own breaking activity,<br />

Ho<strong>war</strong>d supervised the group in a laid-back and thoughtful manner.<br />

2. Codebreaking Section, headed by Sergeant James Wallace of North Dakota, a<br />

skilled and assiduous codebreaker. After the <strong>war</strong> Jim became a newspaper columnist in<br />

Brainerd, Minnesota. The enemy used code for lower-grade messages and for smaller<br />

units. He and his men were very successful.<br />

3. Traffic Analysis Group was the largest. It studied message headings, radio<br />

frequencies, code signs of sending and receiving units, volumes of traffic, and more to<br />

derive indications of enemy placements and intentions. Led by Sergeant George Bauer, it<br />

was consistently productive.<br />

4. Direction-finding Team, headed by my tentmate Sergeant Leonard Netzorg,<br />

successful Yale Law School graduate. It located and identified enemy units by<br />

triangulating bearings. Len later became an eminent attorney in Portland, Oregon; his<br />

career and views were the subject of a recent magazine article.<br />

5. Emending Section. These German language experts removed mistakes from<br />

interpreted deciphered messages. Much of what was broken was so garbled that it<br />

required people very conversant in the language to make it coherent. Sergeant Hyman<br />

Sobel, a Harvard instructor, was in charge. The group's members were amazed at how we<br />

cryptanalysts broke traffic that was so full of errors,and we were surprised at their ability<br />

to make it understandable.<br />

6. Intelligence Coordination Section. This group collated the information,<br />

evaluated it,and passed reports based on it to the Twelfth Army Group headquarters. It<br />

was headed by a very bright Master Sergeant Samuel Lieberman, whose ability was<br />

respected by all of us.<br />

There was also a small photographic unit, a signal center, and the usual<br />

administrative personnel, motor transport, mess people, etc.<br />

S.S.D.D. landed in Normandy. We started by living in the field and working under<br />

tents. We bivouacked in the countryside near such towns as Coutances, Laval, Chartres,<br />

and Meaux, and in the tiny Lorraine village of Mangiennes. Then came three months in<br />

the city of Luxembourg, where we were quartered in a school not far from the<br />

33 UNCLASSIFIED


UNCLASSIFIED<br />

CRYPTOLOGIC QUARTERLY<br />

headquarters of Generals Bradley and Dwight Eisenhower in the Hotel Alfa. After the<br />

Battle of the Bulge in December 1944, we went through parts of Belgium, entered<br />

Germany at Aachen, and after four months of movement, ended the <strong>war</strong> in Forchheim,<br />

north of Nuremberg.<br />

As noted previously, all the operational work was performed by enlisted men. Many of<br />

the officers were sent by the Signal Corps to supervise subsidiary functions, such as<br />

transport and billeting, and had little knowledge of our work. Occasionally, men from the<br />

intercept units drifted in and out of the central groups, seemingly to absorb some notion of<br />

what was being done. Of course we had our own intelligence officers, and two in particular<br />

deserve special note for their hands-on attitude and productive work.<br />

The officer supervising my cipher-breaking section was the very erudite Captain<br />

Benjamin Sch<strong>war</strong>tz. He was a family man, over forty-five, who had volunteered to<br />

contribute his expertise to the <strong>war</strong> effort. Sch<strong>war</strong>tz was skilled in Sanskrit, other ancient<br />

Indic languages, and several modern tongues, and he had headed departments for those<br />

exotic languages in the New York Public Library and the Library of Congress. He<br />

instructed us in cryptanalysis, watched over our daily efforts, and assumed a rather<br />

paternal role to<strong>war</strong>d his men. He was a person who cared, and that meant a great deal.<br />

Captain Ho<strong>war</strong>d Mendel supervised the traffic analysis team. He worked at it<br />

incessantly, and he was an intelligent and effective participant throughout. He was<br />

wounded in Luxembourg when a stray airplane bullet went through his side, but much to<br />

the reliefofhis men, their Howie soon recovered and came back.<br />

Soon after we landed, an unexpected development struck our cipher-breaking section.<br />

Many of the approximately sixteen cryptanalysts - no matter how adept they had been in<br />

training classes - seemed unable to cope with a real-life situation in which a solution<br />

might not exist. A substantial portion of the enemy traffic could not be solved, and this<br />

uncertainty created a psychological barrier that stopped men before they started. As a<br />

consequence, many faltered and produced few results.<br />

Four of our men did most of our breaking. They were George Hussey of Bronxville,<br />

New York, and Eric Porter of EI Segundo, California, who worked marvelously together,<br />

Ho<strong>war</strong>d Arnold, and this writer.<br />

Though we were the signal intelligence arm of the Twelfth Army Group, S.S.D.D.<br />

traveled by itself in the field. We were an isolated outfit, known only to the intelligence<br />

people. Our <strong>security</strong> and secrecy were superb, even within the outfit. People in one section<br />

knew very little about the doings in other sections. On a few occasions, senior officers from<br />

headquarters stopped by to express appreciation for our results, and they would mention a<br />

specific case or two that were outstanding.<br />

Our daily intelligence production was notable from the start, but it reached a<br />

crescendo during the three months in Luxembourg. Our deciphered intercepts, traffic<br />

analysis, and direction finding indicated unusual enemy activity before the Battle of the<br />

Bulge began on 16 December 1944. tjudge that people at army group headquarters simply<br />

UNCLASSIFIED 34


WWII GERMAN ARMY FIELD CIPHER<br />

UNCLASSIFIED<br />

did not evaluate these data properly. It probably seemed impossible to them for the<br />

Germans to stage a major armored offensive over unfavorable terrain, especially when<br />

most of their forces were tied up on the Russian front. After the Ardennes offensive was<br />

stopped a month later, the cipher section broke the radio traffic to the German units<br />

retreating from the Bulge. It revealed the detailed instructions to each unit as to exactly<br />

where it should be virtually every minute of the day. With the skies now clear, the Allied<br />

air forces made very effective use of this information.<br />

In January, S.S.D.D. moved again through different parts of Belgium and entered<br />

Germany, remaining there until the end of the <strong>war</strong>. We stayed near Cologne, crossed the<br />

Rhine at Remagen, camped at Bad Wildungen, and were in Forchheim, Bavaria, on VE<br />

Day. We then moved to the town of Russelsheim, where everyone wondered what our<br />

destination would be in the <strong>war</strong> with Japan. But that soon ended, and gradually we<br />

worked our separate ways home.<br />

Many of us had a strong affection for S.S.D.D. Our fellow soldiers were often quite<br />

accomplished and thoughtful. There were professors, attorneys, classical musicians,<br />

writers, and businessmen-all on their way tojoin the hopeful post<strong>war</strong> <strong>world</strong>.<br />

A short, personal epilogue: Several years later, I visited Captain Sch<strong>war</strong>tz in<br />

Washington, D.C. He had stayed in the army and had become a colonel in Army Signal<br />

Intelligence. We were happy to see each other and had much to discuss. He thanked me<br />

for my <strong>war</strong>time efforts and then offered me an immediate commission to reenlist and come<br />

to work with him. I'm afraid that my destiny was as a civilian, but it was gratifying to<br />

have the praise and appreciation of the boss.<br />

NI DESCRIPTION AND BREAKING<br />

The medium-grade field cipher was called "Doppelkastenschlussel" - Two-Box Cipher<br />

- by the Germans. Because the first messages when intercepted by the British bore no<br />

indicator, the Allies called it the Non-Indicator or NI system.<br />

The NI was used from army groups to all lower units down to company level and<br />

carried both tactical and strategic information. It ranked just below the Enigma, the highgrade<br />

electromechanical machine cipher. The Enigma could not be distributed to the<br />

multitude oflower field units, and thus the NI served as a more practical hand system.<br />

During the North African campaign, the British overran a German signal center and<br />

discovered the nature of the system.<br />

35 UNCLASSIFIED


UNCLASSIFIED<br />

CRYPTOLOGIC QUARTERLY<br />

System Rules<br />

The NI cipher combines a transposition, or more precisely, a seriation of the plain text,<br />

and then two Playfair-Iike encipherments. The apparatus of the system consists of two 5x5<br />

random-alphabet squares (which omit J) such as those in figure 1.<br />

Box 1<br />

Box2<br />

K X N Z Y G S A 0 R<br />

E M 0 B P V F H Z W<br />

L Q F V I B N Y C Q<br />

R A W G U U I E M X<br />

H S C D T K L D P T<br />

Fig. 1. Enciphering boxes<br />

A plaintext bigram, say ED, is enciphered by finding the first letter in Box 1 and the<br />

second letter in Box 2. In this case E is on row 2 of Box 1, and U is on row 4 of Box 2. The<br />

two letters are considered as diagonal corners of a rectangle, and the intermediate cipher<br />

bigram is those two letters which complete the rectangle, namely VR.<br />

Box 1 Box 2<br />

K X N Z Y G S A 0 R<br />

E M 0 B P V F H Z W<br />

L Q F V I B N Y C Q<br />

R A W G U U I E M X<br />

H S C D T K L D P T<br />

Fig. 2. First encipherment<br />

The bigram VR is now itself enciphered just as the original plaintext bigram was and<br />

the resultant diagonals form the final cipher letters - QZ.<br />

Box 1 Box 2<br />

K X N Z y G S A 0 R<br />

E M 0 B P V F H Z W<br />

L Q F V I B N Y C Q<br />

R A W G U U I E M· X<br />

H S C D T K L D P T<br />

•<br />

Fig.3. Second encipherment<br />

In this way EU becomes QZ in cipher.<br />

UNCLASSIFIED 36


WWIIGERMAN ARMY FIELD CIPHER<br />

UNCLASSIFIED<br />

If the two letters of a bigram to be encrypted lie along the same line in both boxes, we<br />

take the letters immediately to the left as cipher values. These we called liners. .For<br />

example, DL= KC. The rectangular cases we called diagonals.<br />

Box 1 Box 2<br />

K X N Z Y G S A 0 R<br />

E M 0 B P V F H Z W<br />

L Q F V I B N Y C Q<br />

R A W G U U I E M X<br />

H S C D T K L D P T<br />

Fig.4. Linear encipherment<br />

For cryptanalytic purposes it is important to see that four combinations of diagonals<br />

(0) and liners (L) exist:<br />

D-D<br />

D-L<br />

L-D<br />

L-L<br />

Plain text<br />

Intermediate<br />

Cipher text<br />

en<br />

FL<br />

NC<br />

ea<br />

HK<br />

TT<br />

The seriation of the plain text consists of writing in blocks of two lines of twenty-one<br />

letters each. For example, using the first line of Heine's poem "Die Lorelei":<br />

gi<br />

uw<br />

XP<br />

Ich weiss nicht was soll es bedeuten<br />

dass ich so traurig bin<br />

and replacing the common ch combination with q:<br />

i q w e i s s n i q t w a s s 0 1 1 e s b<br />

e d e u t e n d a s s i q s 0 t r a u r i<br />

g b<br />

i<br />

n<br />

The vertical bigrams (I-E, Q-D, W-E, etc.) are the pairs actually enciphered:<br />

G G y Q Q D C M A R N E R Q W M B G Q T B<br />

i q w e i s s n i q t w a s s 0 1 1 e s b<br />

e d e u t e n d a s s i q S 0 t r a u r i<br />

U Z Y Z S Z I Q I Q I y A R U F S T Z U N<br />

X B<br />

g b<br />

i n<br />

p 0<br />

yr<br />

oz<br />

HM<br />

37 UNCLASSIFIED


UNCLASSIFIED<br />

CRYPTOLOGIC QUARTERLY<br />

The cipher text is then read off horizontally in groups of five letters for transmission.<br />

GGYQQ<br />

UFSTZ<br />

DeMAR<br />

UNXBP<br />

NERQW<br />

o<br />

MBGQT BUZYZ SZIQI WIYAR<br />

German Communication Protocols<br />

Each German division had its own set of cipher boxes. It was assigned six different<br />

boxes for each day. These were paired in different combinations for each day's eight threehour<br />

periods. In effect, there were eight keys per day.<br />

The German encipherers followed certain conventions, though they grew lax as the<br />

<strong>war</strong> progressed. They placed an X before and after all numbers, proper names, place<br />

names, sentences, within abbreviations, and at the end of plain texts having an odd<br />

number of letters. As a result, plaintext X had an abnormally high frequency and tended<br />

to mask the identification ofthe usual high-frequency German letters.<br />

The word zuiei ("two") was changed to zwo, and ch plain text was changed to q,<br />

distorting the frequency of q also. The use of occasional "quatsch" (German for nonsense)<br />

sequences was encouraged to distort combinations and frequencies.<br />

All in all, the Germans seemed to feel that the NI system was impervious to timely<br />

cryptanalysis. They had readied a different system on general <strong>security</strong> grounds but kept<br />

the NI right to the end.<br />

Some Cipher Security Considerations<br />

The seriation (vertical reading of the plaintext bigrams) ensured that the enciphered<br />

bigrams were not same letter combinations of normal German text. The most frequent<br />

ciphertext bigrams certainly did not reflect the most frequent German combinations (en,<br />

er, ei, ie, in, etc.). What the ciphertext bigrams did reflect was the individual frequencies of<br />

disconnected German letters taken two at a time. The most frequent NI cipher bigram had<br />

a good possibility of representing plaintext ee, for example, but this was by no means<br />

always the case.<br />

Even knowing the mechanics of the system, we found that the reconstruction of the<br />

cipher boxes was extremely difficult because ofthe double encipherment feature. No doubt<br />

the German signal experts counted heavily on this.<br />

By using different boxes for each division and by changing the boxes every three hours<br />

of every day, the Germans made the cipher uncomfortably close to a one-time pad systemunbreakable<br />

in theory and practice. Nevertheless we broke it and, generally, in useful<br />

time.<br />

UNCLASSIFIED 38


WWIIGERMANARMY FIELDCIPHER<br />

UNCLASSIFIED<br />

AIDS TO CRYPTANALYSIS: THE INITIAL BREAKS<br />

Each message was preceded by three-letter callsigns of the sending and receiving units<br />

and the time of day. Our traffic analysis teams were quite adept at identifying them. This<br />

plus the assigned radio frequency used aided in sorting the messages by unit - and<br />

therefore by key.<br />

In cryptanalyzing the NI system, we used very large sheets of paper, colored pencils,<br />

and good erasers. These sheets and colors cannot be fairly reproduced in a journa1. I will<br />

describe our analytic tools, show how we used them, and then leave it to the initiative of<br />

the reader to complete the analysis to reach the final plain text.<br />

1205<br />

MXY A-V 0 L V V K X R K C X V R B X A B A S K D<br />

URT D F X E G K M N Z I W B T A W P F Y 0 K E<br />

B- G K S Q A V I S K S N U T E K 0 C K C G F<br />

V U A Z N R I M Z R W I F G K K K L T T D<br />

c, W P N M Y Y K G C C D Y M W 0 K F I S M Q<br />

T D Q Y C X K D Y P 0 P I S Z F L S 0 A E<br />

D-U Q D 0 U N K I N D H G 0 Y P H M K N Y B<br />

I Q M Q Y D K B F A G Q D M D A A I 0 Y F<br />

E-D 0 E R F B P V P U<br />

L K D I 0 R E M Q 0<br />

1215<br />

REX F-M U M V I B V 0<br />

IXY P Q K 0 I W D U<br />

1240<br />

ZBT G-K L 0 A Z W S E Z U C K S P K 0 T X C y U<br />

QLS K S L F Q M F D X D P Z Q X N M 0 V K D S<br />

H-C X S Z 0 K W<br />

K C A C M K P<br />

1305<br />

RLS 1- K N D C V M K S A N I L Y S M C A P W B Q<br />

BNQ K s U P 0 K Z K A Q I K C L S K W S X C G<br />

J- Y K C S I U T 0 S G M D 0 G K K C K o 0 H<br />

W L D M Z Z P K A S Y A R Z K Q M K V Z B<br />

K-N C F Y K F<br />

L U T T Z A<br />

39 UNCLASSIFIED


UNCLASSIFIED'<br />

CRYPTOLOGIC QUARTERLY<br />

1340<br />

DEF L-K U G Y X K W S K R M K A U 0 V H K K N C<br />

GHI K K B W W Z H M M Z U K E B K B G K F I P<br />

M-V C G 0 S 0 L C K 0 K I W A S V K F S U A<br />

B Q Q 0 V S R P L K Q I B F R M K S X I N<br />

N- S N 0 0 V A<br />

A Z M K R P<br />

1350<br />

paR<br />

CLV<br />

1415<br />

QZB<br />

LTS<br />

0- T C K U<br />

N U K 0<br />

P- V D L V V K B U 0 U S H W V D Y E B Q 0 G<br />

D F X E G K Z W Z K A Z X D F P D 0 A Z Q<br />

Q-K F U K y L K U G 0 K I X W Z L a X F K C<br />

K P 0 K E W I o V K T M M X C S N R X B P<br />

R- X P B T M K F a T L S C 0 A N I M P S P Z<br />

N Q F B D K S Z Q p A A B R I I P Q A X T<br />

Fig. 5. Transcribed messages for a single period<br />

Usually we needed a sufficient number ofletters in the same key to make inroads into<br />

the cipher. We were delighted if many more letters arrived for a three-hour period, but<br />

often not enough traffic was intercepted to afford us an entry.<br />

To illustrate the solution of the cipher, I have composed a sample problem of eighteen<br />

lines of cipher text supposedly intercepted from units of one division during a three-hour<br />

period. Also listed are the times of transmission and the callsigns of the sending and<br />

receiving radio stations. Each pair oflines is given a line identification letter (see Fig. 5).<br />

The messages have been manipulated to allow showing a number of techniques in a<br />

relatively short space. This sample is much less difficult than the messages we<br />

encountered, although the language is typical of the German radio traffic ~fthe time.<br />

Knowing how the system worked, we were able immediately to rewrite the intercepted<br />

messages in two lines of twenty-one letters each. Once the messages were in this form, we<br />

made a bigram frequency - one of our most useful tools. The count was made in a 25x25<br />

matrix on graph paper.<br />

Each line of the problem was given an identifying letter at the left, as can be seen in<br />

-figute-6: "When a bigram was entered on the frequency count, that line-identification<br />

letter was entered in the appropriate square instead of a tally mark allowing us to locate<br />

the occurrences rapidly (see Fig. 6).<br />

UNCLASSI FIED 40


wwn GERMAN ARMY FIELD CIPHER<br />

UNCLASSIFIED<br />

With the frequency count as a guide, we attacked the messages using a technique we<br />

called anagramming. This started with an assumption - an educated guess - followed by a<br />

good deal of trial and error. The intent was to substitute these plaintext assumptions<br />

throughout the problem, check surrounding values, and search for clues to expand our<br />

guesses.<br />

We could not immediately start reconstructing the boxes even when our assumptions<br />

were corroborated because of the double-encipherment feature. The middle bigram is<br />

unknown, and a workable number of plaintext values must be ascertained before a start<br />

can be made in forming the boxes.<br />

In the frequency count, we find that KK cipher text stands out with the highest count<br />

by far. We can start by assuming that it represents ee. We replace KK with ee throughout<br />

the text and see where it leads us.<br />

The Germans often sent very short messages that reflected basic military necessities<br />

and which were therefore constantly repeated. The most common six-, eight-, ten-, and<br />

twelve-letter messages were known to us. Curiously, we were almost never given<br />

information about the military situation that might yield more specific probable words for<br />

our attacks. I don't know why. Perhaps it was <strong>security</strong>, perhaps ignorance, perhaps lack of<br />

time.<br />

Note Line 0 in our sample problem:<br />

Line 0-<br />

T C K U<br />

N U K 0<br />

To the experienced eye, this is a dead giveaway. The Germans were constantly asking,<br />

"What is your position?" or wie lage. The phrase might be preceded by a "please" or<br />

"request" or an addressee, but time was critical, and the eight-letter message was common.<br />

We thus have assurance that our KK = ee assumption is probably correct, and we<br />

have:<br />

Line0-<br />

w i e 1<br />

T C K U<br />

N U K 0<br />

age x<br />

Our initial assumption has grown: We now have plaintext pairs wa, wg, and lx.<br />

The Germans used many stereotyped openings. With experience, we cryptanalysts<br />

could recognize them. For instance, messages frequently began with an ("to") followed by<br />

the person or unit receiving the signal.<br />

We are fortunate in having three of our practice messages begin with KK cipher text.<br />

In German military text, about 95 percent ofthe time a message starts with e, the opening<br />

41 UNCLASSIFIED


UNCLASSIFIED<br />

CRYPTOLOGIC QUARTERLY<br />

A B C D E F G H I K L M N 0 p Q R S T U V W X Y Z<br />

A I L GM BM AN R I A<br />

B A I I lwR P<br />

C I R J A BGH J M<br />

I<br />

I!<br />

F<br />

GL<br />

M I B KO C<br />

MQ<br />

P<br />

D OJ R A APP E 0 C I<br />

E EGP B<br />

F K B C E Q r,tR K Q<br />

G L C<br />

DM<br />

P<br />

J<br />

B<br />

BQ<br />

J<br />

H D J DL P<br />

I DI<br />

BEl<br />

MR Q<br />

C J<br />

K Q CL I D ~ ~ DM<br />

L G JM Q B ~C<br />

Q<br />

L ~!U<br />

R M I}Q Q ~<br />

I<br />

JL<br />

LL<br />

M CD R C FI FR 1 L<br />

CJ<br />

N D DI LR K 0 Cl I 0 N<br />

0<br />

EJL BJ GH<br />

rJp<br />

0 MO N Q 0 J M F J fR-<br />

P CD E ERR 1 GR<br />

Q C I 0 B<br />

R E A A L<br />

S NPR<br />

BHJ G I I<br />

R<br />

BJ<br />

L<br />

AC G BM M M<br />

T R B 0 G J R<br />

U L L ~Q BOM LO EO F G P D J<br />

V<br />

LM<br />

AFP AP 8M FI BM<br />

P<br />

W M L G H C C PQ<br />

X H AQ R Q G AL<br />

I<br />

Y Cl G Q D CP K JL C D<br />

Z HQ G R G<br />

UNCLASSIFIED 42


WWIIGERMANARMY FIELDCIPHER<br />

UNCLASSIFIED<br />

words will be one of four: erbitte C'request"), eigene C'our, our own"), ein C'a"), and eins<br />

C'one"). Let us see how this works in our text.<br />

Ifwe try erbitte in Line I, the final e falls on ciphertext KZ, which has a high frequency.<br />

(Frequencies are always our strong ally.)<br />

Line I -<br />

Line L-<br />

e r bit t e<br />

K N D C V M K SA.<br />

K SUP 0 K Z K A •<br />

e<br />

KZ also occurs in line L in position 6. This is a perfect opening for eigene:<br />

e i g enee<br />

K U G Y X K W S K R M K A .<br />

K K B W W Z H M M Z U K E .<br />

e<br />

e<br />

Although these are only the upper values of bigrams, when they are substituted<br />

throughout the text, we gain opportunities for assumptions for additional anagramrning.<br />

For example, bigram CP in Line I has a rather high frequency, and it is a good assumption<br />

that the bottom plaintext letter is e.<br />

We now examine other lines, with our assumed plain text entered, and see what can be<br />

done:<br />

Line A -<br />

e<br />

e nne<br />

VDLVVKXRKCXVRBXABASKD<br />

DFXEGKMNZIWBTANPFYOKE<br />

e<br />

Units in the field constantly sent reports to various headquarters. German operations<br />

officers in a unit's staff (G-3 in American nomenclature) had the designator 1a. Messages<br />

to higher headquarters often began "an roem eins Anton" C'to roman numeral one Anton" ­<br />

"Anton" being the German phonetic equivalent of our "Able"). Line A has several values<br />

that fit this possibility:<br />

Line A -<br />

anxroernxeinsxanton e<br />

VDLVVKXRKCXVRBXABASKD<br />

DFXEGKMNZIWBTANPFYOKE<br />

e<br />

Often this opening was followed by "enemy something or other" as "enemy tanks, or<br />

planes, or troops." ("Enemy" is "Feind" [noun) or "FeindIiche" [adjective] in German.)<br />

That seems a likely entry here because of the KK (ee) second from the end on top and<br />

around the bottom where "Feindliqe" connects with it. Now we have six more probable<br />

equivalents to substitute throughout.<br />

43 UNCLASSIFIED


UNCLASSIFIED<br />

CRYPTOLOGICQUARTERLY<br />

Line A -<br />

anxroemxeinsxantonfei<br />

VDLVVKXRKCXVRBXABASKD<br />

DFXEGKMNZIWBTANPFYOKE<br />

ndliqe<br />

e<br />

Let us examine one more short message to see ifanything can be made of it:<br />

Line F -<br />

Line F -<br />

t tea<br />

MUM V I B V 0<br />

P Q K 0 I W D U<br />

That first word just has to be bitte ("please"). But please what? A common request was<br />

for a situation report, and a frequent sixteen-letter message was therefore bitte lage<br />

meldung ("situation report, please"). Checking the frequency chart also shows higher<br />

counts for a few of the cipher bigrams that accord well with their plaintext equivalents<br />

(e.g., II = e d has a count of 5 and VD = an a count of 3). We always looked for frequency<br />

indications that tended to confirm what were still only assumptions. Thus we have eight<br />

more probable bigrams:<br />

bit tel a g<br />

MUM V I B V 0<br />

P Q K 0 I W D U<br />

e mel dun g<br />

It was a good break if we found two messages with the same beginning. It was<br />

especially helpful if the beginning was longer than twenty-one letters and thus continued<br />

on the second line. Such a case may be seen in Lines A and P. We have already<br />

anagrammed some of Line A, and it seems as though it may share the first twenty-seven<br />

letters with Line P. Note the six-bigram repeated block at the beginning of Lines A and P<br />

and the repetition of vertical bigrams at positions 1 and 14 of Line P.<br />

Line A -<br />

anxroemxeinsxantonfei<br />

VDLVVKXRKCXVRBXABASKD<br />

DFXEGKMNZIWBTANPFYOKE<br />

ndliqe<br />

e<br />

Line P -<br />

anxroemxeinsxantonfei<br />

VDLVVKBUOUSHWVDYEBQOG<br />

DFXEGKZWZKAZXDFPDOAZQ<br />

ndliqe nd<br />

Thus it seems we have another fifteen upper letters to substitute in the problem.<br />

One of the greatest helps to the cryptanalyst is to know what the enemy is likely to<br />

talk about. There were plenty of the German equivalents of "enemy," "aircraft," "troops,"<br />

"armor," and so on. But by far the most common words were the cardinal numbers: eins,<br />

UNCLASSIFIED 44


WWIIGERMANARMYFIELD CIPHER<br />

UNCLASSIFIED<br />

zwo, drei, etc. Supply reports, casualty figures, radio frequencies, times of day, location<br />

grids, and much more all required numbers.<br />

Often when no other openings were visible, numbers could be spotted in the middle of<br />

messages - after some judicious assumptions based on frequency and combinations. The<br />

ten digits were frequently used in groups (e.g., four digits for the time of day plus uhre,<br />

"hours") and were separated one from another by X.<br />

Security violations and operator mistakes greatly helped us. Of course, we were<br />

always looking for that rare happening - the same message sent in plain and cipher textbut<br />

that was rare.<br />

Let us examine Line G ofthe problem:<br />

Line G -<br />

Line G -<br />

e e ie<br />

KLOAZWSEZUCKSPKOTXCYU<br />

KSLFQMFDXDPZQXNMOVKDS<br />

e<br />

e<br />

We already have some letters of Line G, one of them being an initial e. Now look in<br />

figure 5 at the header of the message:<br />

ZBT<br />

QLS<br />

1240<br />

The alert cryptanalyst now rubs his hands in glee because he realizes that the careless<br />

German code clerk has included the time of day at the beginning of the message. (This<br />

occurred once in a long while.) We now have the following:<br />

einsxzwoxvierxnulluhr<br />

KLOAZWSEZUCKSPKOTXCYU<br />

KSLFQMFDXDPZQXNMOVKDS<br />

e<br />

e<br />

There is a slight problem here because the code clerk accidentally omitted the X after<br />

null, but that is seen when uhre fits into the bottom e of cipher KK.<br />

The above examples should give a good idea of how the initial plaintext wedges were<br />

made. Again, I caution that the sample problem is contrived - it was never this easy. Very<br />

few of these entry points, if any, appeared within the same three-hour period. It took a<br />

very patient cryptanalyst to find correct plain text in the average set of messages.<br />

This involved daring assumptions and detailed tracking of surrounding bigrams to<br />

find promising combinations. Trial and error, persistence, and some sixth sense could lead<br />

to progress. We stuck with a three-hour period as long as it seemed to show promise - a<br />

large volume, a good frequency count, likely plain texts. Conversely, we abandoned a<br />

period for a new one - usually on the basis of instinct and experience - when we were<br />

getting nowhere.<br />

45 UNCLASSIFIED


UNCLASSIFIED<br />

CRYPTOLOGIC QUARTERLY<br />

Once a sufficient number of bigrams was recovered - one cannot quantify it exactly ­<br />

we set about trying to reconstruct the cipher squares, a process we called "boxing." This<br />

could be the most daunting task of all. As the squares were completely random, we did not<br />

get help from any pattern or keyword.<br />

The first step was to make "encipher" and "decipher" charts. These were large sheets<br />

with 25x25 matrices, each cell with four quadrants (see Fig. 7).<br />

A II<br />

" c II<br />

\I I II<br />

T·: GI:<br />

I' \I t<br />

B<br />

II I A I /I I<br />

B I I I 1M II I<br />

I II I II 1<br />

C I II I 5<br />

..<br />

II<br />

I II BI I /I<br />

I Ii ID I II I Mil<br />

I II A I I 1101 II . I<br />

" E 11 p;<br />

E I I Y II I I I K II I K II I<br />

\V I L I II I II K I II Z<br />

"I<br />

I I. I<br />

I Q II<br />

FI<br />

Ii II I"" II I E II ~ I<br />

AI II II /I I Ii P I Ii . I I<br />

GI<br />

, II I, /I I Q II I !\ Ii I /I 10/1<br />

I II Ii Ii Q I /I P I • /I I I! li I /I<br />

E\<br />

I II II t II 1 /I I I /I<br />

I Ii Ii I Ii . I II I I II<br />

I [ I Z II I G II II I Ii I C /I I /I I C /I<br />

I W I II L I II I II P , II I II r I II<br />

1-: I<br />

I /I I II I /I I II I II I II<br />

I II I Ii II I II I Ii I II<br />

Fig.7. Portion ofencipher chart<br />

The charts were over a foot square and were preprinted for us in horizontal sets of two,<br />

which made it easier for us to fill in and work from both at the same time.<br />

In the encipher chart, the bigrarn coordinates of the matrix represented the plain text,<br />

with the cipher equivalents written in the appropriate square. The first letter of the cipher<br />

bigram was written in the upper right quadrant of the square, and the second letter in the<br />

lower left quadrant, thus serving as a reminder of which letter belonged in which box.<br />

The decipher chart was the reverse. The coordinates were the cipher bigrams, with the<br />

plaintext bigrams written in the upper right and lower left quadrants of the inner squares.<br />

The upper left and lower right quadrants were reserved for the unknown intermediate<br />

bigrams of the cipher which might be discovered as we progressed with pencil and paper.<br />

These charts now served as the the soft<strong>war</strong>e for the computer in the cryptanalysts' minds.<br />

With graph paper and pencils, the problem then was to somehow string these letters<br />

together so as to recover the original cipher boxes. For a start we used numbers to<br />

represent the middle letters, and then by using other related values we tried to "hook"<br />

UNCLASSIFIED 46


WWIl GERMAN ARMY FIELD CIPHER<br />

UNCLASSIFIED<br />

some of the letters together. Except in the unlikely event of a very great amount of<br />

anagrammed plain text, this became an eye-twisting exercise in frustration for several<br />

reasons.<br />

First, we had no idea of the middle bigram. Second, as I explained earlier, the final<br />

cipher bigram can be the result of four possible enciphering combinations: diagonaldiagonal,<br />

liner-diagonal, diagonal-liner, and liner-liner. Third, we had no idea of which<br />

letters in each box were on the same line, or in the same column, or opposite which line in<br />

the other box.<br />

Fortunately, the inherent properties of the boxes and the enciphering method offered<br />

ways to help reconstruct the boxes. I will use the cipher boxes of figure 1 to illustrate the<br />

three most useful phenomena.<br />

1. Reversibles - If the middle bigram of the encipherment is a repeated letter, the<br />

result of the second must be the reverse of the original plaintext bigram:<br />

ed = HH = DE<br />

This can result only from a double diagonal, which is a clue we really need in our<br />

boxing effort.<br />

2. Reciprocal - Assume a plaintext bigram enciphered via two diagonals. If the<br />

reverse of its cipher bigram happens to be a plaintext bigram, its own cipher equivalent is<br />

the reverse of the original plaintext bigram:<br />

(1) ne = AW = XM<br />

(2) mx = WA = EN<br />

Thus if we find two of our anagrammed bigrams 10 this for<strong>war</strong>d-reverse<br />

relationship, we know that they can result only from a diagonal-diagonal encipherment.<br />

We encircle these in red on the encipherment and decipherment charts. Eliminating the<br />

possibility ofliners is invaluable in rebuilding the boxes.<br />

3. Appendixing - "Appendixing" aided the analyst in determining which letters<br />

were on the same line in a box. Ifany letters are on the same line (e.g., K, X, N, Z, or Y in<br />

Box 1 of figure 1) and are combined with one particular letter in Box 2 - say the letter E in<br />

the fourth row - then the first letter of the middle bigram must be the same for all the<br />

bigrams:<br />

ke = AR<br />

= XX<br />

xe = AA = EX<br />

ne = AW<br />

= XM<br />

ze = AG = UX<br />

ye = AU = XR<br />

47 UNCLASSIFIED


UNCLASSIFIED<br />

CRYPTOLOGIC QUARTERLY<br />

When the middle bigram is reenciphered, since the first letter (in this case A) is always<br />

the same, the final bigram can consist of only one of five values in each box, instead of the<br />

usual twenty-five: (in this case U, I, E, M, or X in Box 2, and X, M, Q, A, or S in Box lor<br />

letters to the left when a liner is involved).<br />

So ifwe find a pattern of repeats going down a column of our charts, there is a greater<br />

than normal chance that the corresponding outside letters on the left are on the same line<br />

in their box. This can be fortified ifanother column shows a similar pattern. None of this<br />

is certain, but it bolsters the odds.<br />

From this point, the cryptanalyst resorts to trial-and-error boxing. If the reader has<br />

experience with a particularly difficult Playfair cipher, where it appears that some letters<br />

must be all at once on the same row, in the same column, and on the diagonal with others,<br />

he will have some appreciation of what we faced.<br />

Common Boxes<br />

As mentioned earlier, each German unit was supplied with a group of six boxes for the<br />

day. Since two boxes were necessary for each of eight three-hour periods, some of the boxes<br />

were used more than once. For instance, Boxes 1 through 6 might be used as follows:<br />

Time of Day<br />

Box Combination<br />

0001-0300<br />

0301-0600<br />

0601-0900<br />

0901-1200<br />

1201-1500<br />

1501-1800<br />

1801-2100<br />

2101-2400<br />

1&2<br />

3&4<br />

4&1<br />

5&6<br />

3&5<br />

2&6<br />

5&2<br />

6&3<br />

The difficult and crucial breaking was of the first workable period that appeared<br />

during the day. This was not necessarily the 0001-0300 slot but the first period with<br />

enough text to attack. We called that the original period. Which it would be was not<br />

predictable; no period was regularly the busiest. After that a search was made for other<br />

periods that used one of the two boxes now known. Ifone was discovered, its period was a<br />

rather easy one to solve.<br />

Locating a common box in the double encipherment was not simple. A period had to be<br />

anagrammed and boxing started before there was a basis for comparison. However, once a<br />

common box was spotted, an experienced analyst could quickly reconstruct the second one.<br />

I would like to discuss the major reasons for the NI cipher-breaking being so difficult<br />

and daunting.<br />

1. Volume: The enemy changed its boxes every three hours of every day. The<br />

quantity of cipher text available in a three-hour period was often insufficient to work with,<br />

or just marginally sufficient, and might not bear fruit.<br />

UNCLASSIFIED 48


WWII GERMAN ARMY FIELD CIPHER<br />

UNCLASSIFIED<br />

2. Peculiarities: Even with adequate volume, a particular text might have a<br />

makeup that frustrated continuity, even after sensible beginnings. Worst of all was an<br />

aberrant frequency count, which would result in interminable false starts. Though this is<br />

common with limited message volume, many longer texts displayed abnormal frequency<br />

indications. Despite this, we had the feeling that, given time, we could break into most<br />

problems, which brings up the next obstacle.<br />

3. Time strictures: Messages enciphered in NI dealt with both tactical and strategic<br />

matters. However, after a day or two, the intelligence became stale, and we had to go on to<br />

new and fresh material. Working under this kind of pressure proved impossible for some<br />

of the men.<br />

4. Garbles: This was the greatest obstacle. The German cryptographers made<br />

mistakes, their radiomen transmitted wrongly, and our interceptors made errors in<br />

picking up what was often a weak signal. At times we had the same messages from three<br />

or four intercept-companies, and the variation could be most marked. If breaking<br />

assumptions are based on wrong cipher values, the analyst is dead in the water from the<br />

start. Sometimes we displayed an almost sixth sense about incorrect letters, but garbles<br />

greatly hindered us.<br />

A Simplification - Single Encipherment<br />

With the invasion of Normandy in June 1944, much of the enemy traffic began to be<br />

enciphered only singly, the second, double encipherment being omitted. The German<br />

communication experts perhaps realized that the double encipherment took too long and<br />

was too prone to error at both ends to use in combat situations.<br />

To illustrate its use, here are the opening words of "Die Lorelei" singly enciphered in<br />

the boxes of figure 1:<br />

Y Y I V Q D L A Y N L U X L P W Q Y V T F<br />

i q w e i s s n i q t w a s s 0 1 1 e s b<br />

e d e u t e n d a s s i q s 0 t r a u r i<br />

U S .A R T A Q C Y X Y A Q X X C K K R X G<br />

Ct: YYIVQ DLAYN LULXP WQYVT FUSAR TAQCY XYAQX XCKKR XG<br />

It will be seen that our task was much simplified. The diabolical middle bigram no<br />

longer exists, and the analyst can use a reciprocal process of simultaneous anagramming<br />

and boxing. Some salient helping points are as follows:<br />

1. When enciphered, a plaintext letter must result in a different cipher letter in the<br />

same box. Thus, for example, bigram ab cannot possibly show a cipher B on top or a cipher<br />

A on bottom. This helps prevent wrong anagramming.<br />

2. Single plaintext values allow a start to be made in boxing. If we know that<br />

plaintext u- is cipher XV, then we also know that X in Box 2 is on the same line as u in Box<br />

49 UNCLASSIFIED


UNCLASSIFIED<br />

CRYPTOLOGIC QUARTERLY<br />

I, and that Y in Box 1 is in the same column as u in Box I, or in the same line adjacent to u.<br />

Single values are far less useful in double encipherment.<br />

3. Plaintext assumptions lead more quickly to boxing contradictions than they do in<br />

double encipherment, letting us discover anagramming errors much earlier.<br />

Unfortunately, while these aids are valid, they were rather moot in practice. Often the<br />

reason was the lack of sufficient traffic in any three-hour period. Add to this the numerous<br />

garbles, and breaking the cipher was still difficult - especially in a usable time frame.<br />

Nevertheless a large volume of the single encipherment was broken in time to be of use.<br />

Because of<strong>security</strong> necessities and our isolation, we were largely in the dark as to the use<br />

ofour information, but we were assured by officers from General Bradley's headquarters<br />

that it was of constant and great value.<br />

To sum up, I found that breaking the NI cipher system was a complex and often mindbending<br />

process. It would be interesting to learn if it were the last of the "pencil-andpaper"<br />

systems used by a major army in a major conflict. It was tempting to think of it as<br />

"interesting" or "intriguing," but in <strong>war</strong>time that seems incongruous. Perhaps now, many<br />

years later, we can study it with a greater degree of academic equanimity.<br />

(U) Mr. David was born in Brooklyn,<br />

New York, and graduated from<br />

Brooklyn College in 1941. After taking<br />

graduate courses at Columbia<br />

University, he enlisted in the U.S. Army<br />

Signal Corps in 1942 and served as a<br />

cryptanalyst until his discharge in 1946.<br />

Mr. David then went to work as a sales<br />

representative, from which he retired in<br />

1988. He presented a talk on the subject<br />

of this article at the 1994 Cryptologic<br />

History Symposium.<br />

UNCLASSIFIED<br />

50


NSA Cryptologic Spectrum Article:<br />

The German Cryptologic Effort 1918-1945<br />

Summer 1975


~<br />

(b) (3)-P.L. 86-36<br />

.,pproved for Release by r\JS,A, 0<br />

~]9-29-2CHJ8 FOI.A, C:ase # 5222"<br />

The German Cryptologic Effor't<br />

1918-1945<br />

Betu'een tbe two <strong>world</strong> u'ars. six ma.;or cryptologic<br />

.rert·ice.r and hureaus evolved within German;'. Three<br />

u'ere responsible mainly for foreign diplomatic systems,<br />

and the other three' repr~sentinK each 0/the branches of<br />

the armed serl'ices ·-for exploitin!!, counterpart forei!!,n<br />

militar.''1 systems. Sel'eral additional cryptologic<br />

orl?,anization.( were also estahlished to u'orR al(tJimt<br />

s,'Ystems used. for example. by enemy a/!.ents and (or<br />

encipherinx weather traffic. 1~ the area' of<br />

communications securit.'Y. five of these six orxaniZ4tions<br />

u'ere responsible for desixning and testinx their ()u'n<br />

cr,yptoxraphic s."lstem.r, and for insuring tbeir securit."1<br />

when used by associated armed forces units or hy the<br />

diplomatic sen·ices. All of these agencies and h~re(Jus<br />

It:asted side h;' side u'ith more or les.1 equal authority.<br />

There u'a.r no central conrdinatinx point to fuse, et'aluate,<br />

and report German communications intellif!,ence. or to<br />

safeguard ol'erall communications s.ecurity.<br />

This JitUtJtion also pref'ailed for the maior portion of<br />

World War ll. In the autumn of 1944. hou'III'er, an<br />

attempt was made b."l the German HiXh Command to<br />

establish a single cryptologic policy and to im'est one of<br />

This discussion of German cryplololl)' is taken mainly from an<br />

Armed Forcn Security Allency Council (AFSACI study produced in<br />

1')')0. enlitled: "The Consequences of l.ack of Coordination am"n!:<br />

the German Cryptolollic Services." It is presented in S/Hctnlm to show<br />

the fr'j(mented German cryptolollic effort from 1918-1945. and to<br />

~how proNems such an effort fostered and its consequences lU the<br />

German <strong>war</strong> effort.<br />

the existing orxanizations with the responsihility for its<br />

implementation. Special empha.ri.r u'as placed 071 tbe<br />

authority /!,il1en this <strong>agency</strong> to rull! upon the seL'uritJ of<br />

cryptof.raphic systems for both diplomatic and milita'.'1<br />

use and to control the del'elopment and use of<br />

cr.yptanal,;tic aids and devices. Interdepartmental<br />

;ealousies, howef'er, were not easi('1 overcome, and it was<br />

not possible durin Ktke feu! remaini,,/!. monthJ ofthe War<br />

to effectit'e~y implement thiJ plan.<br />

German Cryptologic Organization,<br />

1918-1938<br />

Cryptolol!,ic Bureaus<br />

The three cryptologic bureaus which existed during<br />

World War I continued in operation after the Armistice.<br />

The responsibilities of these bureaus were clearly defined.<br />

and they functioned, so far as can be determined. as the<br />

main cryptologic organi7.ations within the German<br />

Government until )933.<br />

The first of these, the Cipher Bureau ofthe Ministry of<br />

Defense, was responsible for workinJt on foreign army<br />

cryptographic systems. The second, the Cipher Bureau of<br />

the Forei,gn Office. was assiJtned foreign diplomatic<br />

systems, and the third. the Cipher Bureau of the German<br />

Navy. forei}(n navy systems. All three were also<br />

responsible for insuring the <strong>security</strong> of counterpart<br />

German communications.<br />

lIs'ifJFJIJ: '111\ t.f.Jl.IINT (I Ja.4,4EL1 UNt'l .£iCRE"- 25<br />

~.,


Despite the d~arly defined mission~ of these bureaus.<br />

rivalr\' between the first two he~an almost immediately<br />

after the Armistin:. This rivalry be1:an when th~ Defense<br />

Bureau involved itself with diplomatic systems of forei,gn<br />

,governJl1~nt~. dearly a n ar~a reserved to th~ Forcil!n<br />

(Hlice's Bureau. Althou,l(h a number I)f reasons were<br />

,civtll in iltWmpts to justify this encroachment. the\' did<br />

not satisf\ the forei~n Office. :-.ievertheless. th~ Cipher<br />

Burtau of the Ministn of Ddense wntinued to work in<br />

the diplomatic area. thus duplicatinl! to a considerable<br />

extent the work of the Forei~n Office. I ntercept stations<br />

of both bUrl:aus were assi,l:ned diplomatic tarJ(ets. and<br />

tension and rivalry between the two steadily intensified.<br />

The Cipher Burtau of the German ~avy. however.<br />

limited itself strinly to forei1:n naval traffic. and as such<br />

did nnt encroach upon responsibilities of the other<br />

bureaus. nor they on its mission.<br />

F..rtflh/iJlmJI!1l1 f~rthe Ff)r,cchun!:samt in 1933<br />

In March. I


Radio Defense Corps. was responsible for the<br />

identification and "elimination" of enem)' radio a,gents.<br />

Another, the Weather Service, involved itself with<br />

weather cr)'ptol{raphic systems. A third. the Postal<br />

Service. was ~iven the task of monitorin~ telegraph.<br />

telephone, and mail communications, And the fourth. the<br />

Propa~anda Ministry. was responsible for the intercepdon<br />

of forei~n radio broadcasts.<br />

The German Cryptologic Organization<br />

in World War II<br />

The StruKx1e for Authori~y<br />

By the be~innin}!: of World War II. Germanv had six<br />

major cryptologic or}!:anizations. each more' or less<br />

independent of the others. This situation prevailed. to onc<br />

de}!:ree or another. throu~hout most ofthe <strong>war</strong>.·<br />

But an attempt was made during the <strong>war</strong> to place this<br />

fra~mented effort under one central authority. It evolved<br />

from the realization by persons in the G~rman High<br />

Command. and in some of the t:ryptologic or~anizations<br />

as well. of the need for a centralized authority in<br />

nvptologic matters. partimlarly in regard ro safe~uar'ding<br />

the <strong>security</strong> of German cryptographic systems and<br />

procedures. Attempts were subsequently made to<br />

inaugurate an over-all policy, and to establish a central<br />

authority. but with onlv partial success.<br />

The Armed Forces High Command Cryptolof:ic<br />

A/tency I was selected to provide this leadership. and in<br />

September 194.'1 it was ordered that this Agency must be<br />

consulted. and approve. proposed introductions of new<br />

ayptowaphic systems bv any branch of the armed forces.<br />

Also. in Au~ust 194.1. this Al{ency was ~iven the<br />

responsibility for chairin~ a working committee<br />

responsible for o... erseein~ the testinl{ of all German<br />

cryptllg-raphic systems. Under the chairmanship of<br />

General Gimmler. numerous high-level meetings were<br />

held. attended by representatives of all the l"fyprol(l~ic<br />

organizations. General Gimmler. however. found it<br />

necessar~' to dilute responsibili ties and authority of [he<br />

workinf: committee, and to assure the cryptolo!/:ic<br />

or~anizations that their own prero~atives would be<br />

respected. In fact. when C


:iECRE~<br />

Anlllher instance conn:rnt"d the securit\· of the main<br />

(jctrn,ln lfvp((l~raphi( machine the E~iJ.!ma.~ Each'·<br />

hranch llf the German armed forces ha


Doenitz went even further, ~a\·jnl: he had never heard<br />

of the Army unit. and had no i~f()r'mation abuut the Air<br />

Fone's lIr~anization. si nee these matters were of .. no<br />

interest to him." Ribbentrop realized that the forei~n<br />

Office and (joerin~'s l-"or.rcbu1lgsamt wtre: (Overing the'<br />

same field. but he c1airnt-c:1 that the texts (Ifthe latter were<br />

less clear and often inaccurate. Hitler himself. acwrJing<br />

to Ribbentrop. expressed linle interest in the German<br />

crypwlogic effort. noting that Hitler "did not like this<br />

type of intelligence very mU('h and ... it was he:m~r tlJ use<br />

... (omrnon sense.<br />

Conclusions<br />

Baron von Ribbentrop, Minister of Forei~n Af.<br />

fairs, reco~nized the fragmented nature of the<br />

German cryptologic effort, noting that it "was.not<br />

well directed," and that when be beld discussions<br />

to consolidate it "nothing happened."<br />

them to the maximum extent possible. JodI. for example.<br />

noted that the Furschunpamt was "Goering's affair."<br />

and "Keitel described the Forei~n Office. about which he<br />

admittedlv knew nothi ng. as "extremely secretive Jnd<br />

jeJlous about everything ~heir bureau produced." He also<br />

referred til the ForJl'hungramt as the "third competitllr"<br />

and felt its reports were chosen on an "erratic and irra·<br />

tional basis,"<br />

From the: foreg()in~ discussions. it IS seen that<br />

Germany. from 19lH to llJ4'i. had nil <strong>national</strong><br />

cryptologic polk)'. Rather. six major or~ani7.ations. and at<br />

least four of lesser significance. wndurred its cryptllllll(ic<br />

husiness in an atmosphere of rivalry and suspicion. None<br />

had clost association. much less coordinating authority.<br />

with llr over any (If the others.<br />

This situati~n prevai led. to one degree or another.<br />

throu~h(lut most of World War II. severely hindering<br />

Germany's, <strong>war</strong> effort. and resulting in redundant and<br />

wasteful effort and missed opportunities. Although<br />

German leaders reco,l(niled these shortcomi n,!(sas far<br />

back as 193.', it was not until late in the <strong>war</strong> that a<br />

concerted effort was made to correct them. By that time.<br />

however. it was too late to effectively implement such a<br />

<strong>national</strong> policy. and Germany continued to suffer to the<br />

end of the <strong>war</strong> wi th a fra~mentedcrypt()lo~ic effort.<br />

I<br />

Ijoined NSA in 1956; since then he<br />

has worked mainly in the collection and SRA fields.<br />

and at present With the NCS Press. He has contrib.<br />

uted a number of, ~rticles to Spectrum and other<br />

Agency publications.<br />

(b) (3)-P.L. 86-36<br />

II 2)'1)• .1: "Iz' totu,.l" '(:JJ:'z~JtJl:J.!i UNI.Y ..sECRET 29


NSA Cryptologic Spectrum Article:<br />

The German Comint Organization in World War II<br />

Spring 1978 - Vol. 8, No. 2


UNCLASSIFIED<br />

David Kahn<br />

The German Comint Organization<br />

in World War II<br />

A German interpreter hunched over and listened<br />

intently to the Russian voice in his earphones. It came<br />

from a loop of wire that members of a wiretapping squad<br />

had set out two weeks before to intercept Soviet field<br />

telephone conversations.<br />

All around him, that winter's day early in 1942,<br />

German forces tightened their steel grip around<br />

Sevastopol, a key port on the Black Sea. But the Russians<br />

defended their Crimean fortress with toughness and<br />

tenacity. Like a bear swiping at his tormentors with his<br />

paws, they struck out at the Germans in a series of<br />

counterattacks. The interpreter's unit, the 24th Infantry<br />

Division, had suffered many of these for the past week.<br />

In this positional <strong>war</strong>fare, it was the chief duty of the<br />

wiretapping squad to preclude surprise attacks by<br />

eavesdropping on enemy talk that would give hints of<br />

Russian intentions. To this end, members of the squad<br />

had, after the suspension of the first systematic German<br />

offensive against Sevastopol, when Russian counterattacks<br />

might be expected, crawled to the Russian lines on 7<br />

January and left there a loop of wire. One of three such<br />

loops, it did not actually connect to the enemy wires, but<br />

detected the return speech currents in the earth, like the<br />

Arendt apparatus of World War I. It thus picked up, not<br />

the distinct conversations of a single line, but some 20<br />

telephone stations with consequent cross-talk and hum.<br />

For the first week, it produced general intelligence on<br />

enemy equipment and supplies, replacements and their<br />

instructions, observations, morale, losses, and battle<br />

measures. Twice it enabled the Germans to save their<br />

scouts, once from enemy gunfire, once from encirclement,<br />

by alerting them that the Russians had spotted the<br />

patrols.<br />

On 15 January the Russians began a week-long series<br />

of attacks aimed particularly at winning observation<br />

posts that would overlook the German rear, as<br />

well as tying down and weakening German forces.<br />

The Germ~n wiretappers provided clues that helped alert<br />

This was taken from a chapter of Mr. Kahn's new book,<br />

Hitler's Oracles. Used with permission of the author.<br />

their division to Russian activities. They heard a speaker<br />

asking "Where am I going to get some schnapps?" and<br />

another promising to fire "very, very much" on a bunker.<br />

On 21 January, the attacks started early in the morning.<br />

The battles flamed in close combat along the main trench<br />

line, and at one point the Russians broke through, only to<br />

be quickly thrown back. During the early afternoon a<br />

pause set in. The infantrymen waited uncertainly, not<br />

knowing whether they were through fighting for the day<br />

or whether the Russians would suddenly rain shells upon<br />

them and follow with a renewed onslaught.<br />

At 4 p.m. the interpreter heard Russian Post 21 calling<br />

all company commanders to the telephone. After some<br />

indistinct expressions, he heard the commander at Post 21<br />

say clearly:<br />

"Forty-five minutes left till chen."<br />

Ten minutes later, a Russian telephone speaker asked<br />

another:<br />

"Usina! When are we supposed to begin again?"<br />

To which the reply came:<br />

"In 35 minutes."<br />

The interpreter reported this to the divisional G2, who<br />

correctly interpreted it as another attack. The troops were<br />

alerted. As the Russians assembled their companies, the<br />

artillery of the 24th, of the neighboring 50th Infantry<br />

Division, and of the corps brought them under fire.<br />

When they finally attacked in battalion strength, only<br />

weak leading elements even reached the main German<br />

lines, and the infantry repulsed them with their light<br />

weapons. The Russians returned to the attack in several<br />

uncoordinated pushes but were repeatedly thrown back.<br />

Ar 6:45 they finally gave up, returning to their original<br />

positions and leaving the Germans firmly in control of<br />

their main lines.<br />

The German Staff declared the next day: "Wiretap<br />

reconnaissance again achieved important results in the<br />

enemy attacks on 21 January, creating the basis for their<br />

successful <strong>war</strong>ding off. In defense, wiretap reconnaissance<br />

is of controlling importance, which is widely recognized<br />

by the combat troops."<br />

UNCLASSIFIED 3


UNCLASSIFIED<br />

Unlike political circles, the military welcomed<br />

communications intelligence. In fact, in the field it<br />

became the most important source of enemy intelligence.<br />

In only one place does the Treaty of Versaillesmention<br />

intelligence agencies. Its table listing German infantry<br />

division strengths allowed the signal detachment to<br />

include an intercept section. The German army did not<br />

use the men for the low-level work that had been<br />

intended, but assigned them instead to the army's 12<br />

major radio stations. In 1925, with Germany increasingly<br />

departing from the Versailles restrictions, the army set up<br />

six posts specifically for interception. Each had three or<br />

four receivers served around the clock by about 20<br />

radiomen, The difficulty of following foreign maneuver<br />

traffic from these fixed locations led in 1928 to the<br />

erection of mobile direction finders near the borders, and<br />

two years later to the creation of mobile interception units<br />

which evolved into mobile intercept companies. Directing<br />

this work was first the Cipher Center and then the new<br />

<strong>agency</strong> organized by about 1939 in the army command:<br />

the Main Intercept Post.<br />

The intercept organization was part of the signal corps,<br />

which was headed by General Erich Fellgiebel. He was<br />

subordinated in <strong>war</strong>time to the chief of the general staff;<br />

he served simultaneously as head of armed-forces<br />

communications, making him also the superior officer of<br />

OKW/Chi, A bespectacled, kindly, well-liked officer in<br />

his early fifties, divorced and remarried, a former chiefof<br />

the Cipher Center, Fellgiebel won high praise from the<br />

OKW chief, Keitel: "In his field a pronounced leader<br />

type with broad vision, a gi ft for organization, full<br />

energy, , , satisfied even the most unexpected and<br />

difficult requirements." But Keitel added that Fellgiebel<br />

inclined to an "unconsidered mania of criticism" to<strong>war</strong>ds<br />

Naz<strong>ii</strong>sm. And indeed FellgiebeJ participated in the 1944<br />

attempt to kill Hitler. His hesitancy in sealing off<br />

communications to the Fuhrer headquarters after the<br />

bomb went off contributed to the failure of the plot, for<br />

which the conspirators, including himself, paid with their<br />

lives. He was succeeded in both his army and armed<br />

forces offices by General Albert Pr aun, 49, a short,<br />

pleasant, extremely capable signal officer who had also<br />

led an infantry division and who was, Chief of Staff<br />

Guderian wrote, a "good National Socialist."<br />

These two men, especially FellgiebeJ. presided over the<br />

remarkable expansion of German army communications<br />

intelligence in World War II. It provides a classic case<br />

history of how an intelligence organization develops in<br />

response to the requirements of intelligence consumers<br />

and its success in satisfying them.<br />

At the stan of the <strong>war</strong>, army communications<br />

intelligence operated on four levels: the Main Intercept<br />

Post at Zossen, 10 fixed intercept posts that passed their<br />

information to Zossen and to the army groups, 7 mobile<br />

intercept companies attached to armies, and intercept<br />

platoons within the divisions. But communications<br />

intelligence scored only minor successes during the Polish<br />

campaign. Fellgiebel traced this in part to the distance of<br />

the Main Intercept Post from the action. But bringing<br />

control closer to the front implied a dispersal of control,<br />

and all the lessons of radio reconnaissance taught that<br />

strong centralization was essential for success. Fellgiebel<br />

compromised. He created commanders of intercept troops<br />

to handle communications intelligence for each of the<br />

three army groups getting ready to attack France.<br />

This organization worked well on the higher levels in<br />

the French and Russian campaigns. But the tactical results<br />

continued to be poor, So in 1942 Fellgiebel centralized<br />

this work. He pulled men out of the intercept platoons of<br />

the divisions, which were left with only a squad, and<br />

assembled them in short-range communications<br />

reconnaissance companies. He gave one to each army<br />

headquarters. The company scattered its platoons<br />

throughout the army's area: two platoons for message<br />

interception, two for short-range direction finding, five<br />

for wiretapping. To rationalize the terminology,<br />

Fellgiebel renamed the armies' intercept companies "longrange<br />

communications reconnaissance companies," the<br />

Main Intercept Post the" Main Post for Communications<br />

Reconnaissance," and the commanders of intercept troops<br />

"commanders of communication reconnaissance."<br />

Each army then had a short-range company and either<br />

a long-range company or a fixed intercept post. Again<br />

centralization promised improvement. On 15 December<br />

1943, FellgiebeI united each army's organs into a<br />

communications reconnaissance batallion. The 17 that<br />

existed were in turn grouped into 8 regiments for<br />

communications reconnaissance, each under a commander<br />

of communications reconnaissance at army group or<br />

theater command, Finally, early in 1944, the only field<br />

level that did not have its own <strong>agency</strong>, corps, set up small,<br />

10-man units to evaluate the material that came in from<br />

the divisions and from any nearby platoons of the shortrange<br />

companies.<br />

In the fall of 1944, Praun carried all this to a logical<br />

conclusion. At the very peak, he created a general of<br />

communications reconnaissance to assure cooperation<br />

among the various units and to improve personnel and<br />

equipment. Genera! Fritz Boetzel, a man of some charm<br />

and broad cultural interests and a one-time head of the<br />

Cipher Center, was named to the post. This gave<br />

communications intelligence its sixth and final level and<br />

completed its evolution into a highly articulated<br />

organizaron that effectively served all commands and<br />

4 UNCLASSIFIED


UNCLASSIFIED<br />

delivered the most valuable enemy intelligence that came<br />

to German army generals during World War II.<br />

The work of many of the officers in many of these<br />

posts can be illustrated by the daily routine of a young<br />

lieutenant, who despite his low rank became in effect the<br />

commander of Communications Reconnaissance 2, the<br />

regiment that served Army Group Center. He was Fritz<br />

Neeb, a stubby young Viennese who had been interested<br />

in cryptology as a teenager. He read everything he could<br />

find on it in the Austrian National Library and cracked<br />

the cryptograms that friends made up for him. Through<br />

some blunder on the part of the German army, he was<br />

actually put into the kind of work 'for which he was best<br />

suited. He served in communications in the Polish and<br />

French campaigns and the first part of the Russian-early<br />

in which, while a member of the 137th Communications<br />

Batallion, he captured 130 Russians 20 miles behind<br />

their lines. One day his major met an old friend, the<br />

colonel commanding the Army Group Center<br />

communications reconnaissance regiment. The colonel<br />

told the major of some of his problems, and the major<br />

responded that he had a young lieutenant who had<br />

resolved those same problems within his battalion. Three<br />

days later Neeb was at the regiment's headquarters.<br />

Codenamed HEINRICH EAST, it was located on rwo<br />

floors of a former Russian secret police building in<br />

Smolensk. Neeb was at first just one of several able<br />

evaluators but as first one and then another of the officers<br />

departed, and eventually the chief himself was<br />

transferred, Neeb became virtually the commander of<br />

HEINRICH EAST, with its 400 men, and made the<br />

daily reports to the army group G 2 Colonel Rudolf<br />

Christian Baron von Gersdorff.<br />

His day began when he got up about 11 p.m., after the<br />

most important reports from the subordinate companies<br />

came in. He looked through these, gave assignments as to<br />

how they were to be handled, and from about 3 to 5 a.m.<br />

assembled the daily report, either by dictating it or by<br />

simply assembling the rewritten drafts of the subordinate<br />

companies' reports. Between 5 and 7 a.m. these reports<br />

were teletyped to the Main Post for Communications<br />

Reconnaissance and to the subordinate armies'<br />

communications reconnaissance companies. Five or six<br />

copies went to the G 2 and other officers of his own army<br />

group. If no immediate questions came in, Neeb could<br />

then go to sleep about 6 or 6: 30; otherwise, 7: 30. He<br />

awoke again around noon, ate in the officer's mess, put<br />

out a short so-called "advance report" of four or five<br />

pages with the most important new information, and then<br />

prepared for the daily G 2 situation conference in<br />

Gersdorffs office. These began at 4 p.m. and sometimes<br />

lasted three hours. Here the leaders of the various organs<br />

of specialized reconnaissance submitted their results and<br />

compared them. Often the discussions were very lively.<br />

Neeb had to advance communications intelligence<br />

entirely on its own, without recourse to any other source.<br />

At about 6 or 6: 30, or sometimes 7, he went home,<br />

grabbed a bite to eat, and went to bed to try to get some<br />

sleep.<br />

Sometimes instead of sleeping Neeb went to or gave<br />

instructional lectures, for he realized that for him and<br />

others on the same schedule it often didn't pay to try to<br />

sleep a few hours in the early evening. He also prepared<br />

tests for potential crypanalysts and evaluators, and during<br />

the course of time tested more than 1,500 persons to try<br />

to cover his personnel needs. Twice he gave information<br />

out over the telephone in his sleep. He had no recollection<br />

of it when he awoke, but was told ofit-and found to his<br />

relief that the information had been correct. Thereafter<br />

he had a wire recorder attached to his telephone.<br />

The production of communications intelligence began<br />

with an assignment from an intelligence officer.<br />

Sometimes this simply called for general information,<br />

sometimes for specifics on, for example, artillery or<br />

armored formations. The communications reconnaissance<br />

commander disposed his units to obtain the raw material<br />

he needed to fulfill the assignment. In the west, Colonel<br />

Maximilian Baron von Oer, the higher commander of<br />

communications reconnaissance (called "higher" because<br />

he had two regiments under him), sought simply to get as<br />

much information about the Anglo-American forces as<br />

possible. Before the invasion, his Communications<br />

Reconnaissance Battalion 12 concentrated on radio traffic<br />

in and with the United States. After the invasion, he<br />

shifted ten receivers of its Fixed Intercept Post 3 at<br />

Euskirchen to cover Great Britain. He divided British<br />

army traffic between Fixed Intercept Post 2 in Port<br />

Marly, which listened from 4,500 to 7,500 kilocycles<br />

with a search up to 10,000, and Post 12 in Louveciennes,<br />

which listened from 3,000 to 4,500 with a search from<br />

100 to 3,000 kilocycles. Within each post or company,<br />

the commander might further divide up these bands into<br />

subbands and assign one to each of his approximately 36<br />

receivers. The monitoring radioman would tune slowly up<br />

and down, sometimes listening to two frequencies at once,<br />

until he heard a transmission. He notified the directionfinding<br />

team. If they told him the transmitter was outside<br />

of the interception area, he continued his patrolling of the<br />

other. If it were within the area, he continued to listen.<br />

He observed the tone of the transmitter and the "fist" of<br />

the radioman-his way of sending, which is as distinctive<br />

as handwriting. These alone could often identify a<br />

particular radioman, whose moves from one place to<br />

another-and by implication the moves of his<br />

unit-could therefore be followed. The monitoring<br />

radioman also noted other details, such as the wave length<br />

UNCLASSIFIED 5


UNCLASSIFIED<br />

of the transmission, the calling station's sign, the called<br />

station's sign, and cipher recognition groups as he wrote<br />

down the intercept.<br />

These intercepts poured out of the radio room, where<br />

the monitors sat with their headphones on, into an<br />

evaluation center. Each command level had such a center,<br />

corresponding in size co the volume and complexity of its<br />

work. The centers divided into subsections for traffic<br />

evaluation, direction-finding evaluation, contents<br />

evaluation, and final evaluation. The raw data could often<br />

reveal much. Long wave lengths often meant higher<br />

staffs; short waves, corps and division staffs; ultrashort<br />

waves, armor. Since not every unit held every cipher, the<br />

cipher recognition groups helped define communications<br />

nets and so, by implication, command organizations.<br />

Supplementing this was direction-finding. Monitors in<br />

widely separated locations turned the movable antennas<br />

of their specialized radio sets until they heard an enemy<br />

transmitter at its quietest. A calculation indicated in<br />

which direction it was. They reported this direction to the<br />

direction-finding evaluation subseccion. It plotted, on a<br />

map, the bearings given by several monitors. Where these<br />

lines crossed marked the location of the enemy<br />

transmitter.<br />

The traffic evaluacors then listed on cards all stations<br />

using a certain frequency, all stations called by a<br />

particular call sign, and all known locations of the<br />

different stations. They diagramed these relationships and<br />

saw what patterns emerged. One station addresses<br />

messages to many others, which seldom<br />

intercommunicate; direction finding shows it further to<br />

the rear. The evaluators deduce that it represents a higher<br />

echelon commanding the others. A higher volume of<br />

traffic on one circuit may portend an attack, a withdrawal,<br />

a relief, perhaps only a disciplinary problem, but almost<br />

certainly something. The evaluacors followed the<br />

movements of the stations. Often they were extremely<br />

acute. Once the Russians sent an armored army to<strong>war</strong>d<br />

Stalingrad while leaving some of the army's radiomen in<br />

its old location to give the impression that it was still<br />

there. But on the march, one of the radiomen who had<br />

gone along inadvertently transmitted. The Germans<br />

picked up his transmission, recognized him, and<br />

concluded that the armored force was moving south,<br />

probably to<strong>war</strong>d Stalingrad.<br />

Valuable as these inferences from the traffic patterns<br />

were, they could seldom provide the insights that the<br />

actual contents of the enemy messages could. Many of<br />

these were unenciphered. Indeed, at the lowest level, such<br />

cleartext radio or wire intercepts provided about 95<br />

percent of communications intelligence. Sometimes they<br />

shocked with their revelations of enemy attitudes. In<br />

Russia on 17 February 1944, the 17th Panzer Division<br />

overheard a conversation on 1,960 kilocycles at 10:30<br />

a.m.:<br />

Rokot:<br />

Tochka:<br />

Rokot:<br />

Tochka:<br />

Rokot:<br />

Thirty minutes ago my patrol came out of Oktyabr<br />

and reported that no one is there. It found only our<br />

own wounded.<br />

Why was it shot into! You're dogs, bastards, traitors.<br />

The battery commander fired without an order.<br />

Arrest him and shoot him with his own pistol.<br />

Acknowledged.<br />

Other times the cleartext messages provided helpful<br />

background information. In May 1943, radio<br />

reconnaissance of a landing practice of the Royal Marines<br />

near Southampton shed light on amphibious tactics. The<br />

Germans learned that the Marine division landed on a<br />

width of 10 miles in the morning hours, attacking with<br />

three brigades in the for<strong>war</strong>d lines. Despite strong<br />

"enemy" counterattacks, by 5 p.m. it had reached the line<br />

Totton-Ringwood, two-thirds of the way to its objective<br />

12 miles inland. Most rarely, c1earcext intercepts revealed<br />

actual enemy intentions. In November of 1944, the 26th<br />

Panzer Division in Iealy intercepted an order for a<br />

bombing mission naming in clear the village that<br />

headquartered the neighboring 278th Infantry Division.<br />

It sent a <strong>war</strong>ning, and the 278th suffered only minor<br />

casualties. Similar cases in Russia led a commander of<br />

communications reconnaissance to declare in mid-1943:<br />

"The monitoring of the radio voice traffic (short-range<br />

intelligence coverage) brings valuable results."<br />

Wiretapping produced a lower volume of intercepts<br />

than radio, and seldom overheard anything but front-line<br />

conversations of limited concern. The German troops<br />

crawled from their own to the enemy trenches and either<br />

tapped directly into the enemy telephone lines or set out<br />

loops that picked up ground currents, which were then<br />

amplified.<br />

During the Russian campaign, the wire reconnaissance<br />

team of the 72nd Infantry Division, advancing into the<br />

Crimea, hooked into the wires on the permanent<br />

telephone poles along the main road. Through these<br />

during a German attack, the team heard the Russian<br />

defenders being told that it was absolutely necessary to<br />

hold a certain position and that reinforcements were on<br />

the way. The conversation included details about the<br />

Russian guns and their locations. All this enabled the<br />

Germans co rush up their own reinforcements and to take<br />

the position.<br />

Clear text messages like these nearly always<br />

outnumbered cryptograms. In September of 1944, for<br />

example, the commander of co rnrnu n i ca t i o ns<br />

reconnaissance 7, in Italy, picked up 22,254 clearcexts<br />

and 14,373 cryptograms. This preponderance stemmed<br />

from the enormous number of short local messages within<br />

6 UNCLASSIFIED


UNCLASSIFIED<br />

a division. At the higher echelons, where orders live<br />

longer and therefore allow more time for encipherrnent,<br />

the proportion of cryptograms increased, until at the top,<br />

practically all messages were enciphered. They were<br />

obviously of far greater importance than those in clear.<br />

To get to their contents, the Germans had to crack open<br />

their cryptographic armor. As the enemy improved his<br />

cryptographic protection during the <strong>war</strong> and extended it<br />

to more classes of messages, the German army's<br />

cryptanalytic establishment grew to keep pace.<br />

The Main Intercept Post had only a handful of<br />

cryptanalysts at the beginning of the <strong>war</strong>-five for all<br />

Britain, for example. By 1942, it had 200, divided into<br />

country sections and such service sections as those for<br />

Hollerith machine processing and for archives. It attacked<br />

not only the enemy high command systems but also those<br />

unsolvable by field echelons, which worked on the<br />

simpler cryptosystems of the enemy units on their level<br />

opposite them.<br />

At first the Germans had relatively good success with<br />

the Russian codes. The solved messages, said the<br />

cryptanalysts of Army Group North in 1944, "contain<br />

operational combat reports, statements about assembly<br />

areas, command posts, loss and replacement reports,<br />

reports about chain of command and positions prepared<br />

for the attack (e.g., messages of the 122nd Armored<br />

Brigade on 14 and 17 February)." These results came<br />

from only a small proportion of the intercepts. In the<br />

thirteen months from 1 May 1943 to 31 May 1944,<br />

Army Group North intercepted 46,342 Russian<br />

cryptograms. It solved 13,312, or less than one in four.<br />

Its commander of communications reconnaissance<br />

explained why:<br />

"It is only infrequently possible to get enough<br />

identically enciphered messages from the same net to be<br />

able to solve the current systems." Later he adduced<br />

additional reasons:"... a growing complication in the<br />

systems used by the enemy ... a greater care in<br />

enciphering ... (avoidance of identical addresses and<br />

signatures; names and phrases with characteristic endings<br />

and patterns, which must be given in code form in<br />

individual letters or syJlables, were either enciphered<br />

abbreviated or were inserted in cleartext)."<br />

In other words, as Russian code construction and<br />

discipline improved, German cryptanalytic success<br />

declined. Whereas from May to August 1943 the Army<br />

Group North code breakers always solved more than 34<br />

percent of all intercepts, from January to May 1944, with<br />

even greater monthly volume, they never solved more<br />

than 33 percent. These almost never included the toplevel<br />

command systems. It was the same for the western<br />

Allies. In general, the Germans failed to read the<br />

messages moving in the higher command nets.<br />

The cryptanalysts passed their solutions CO the contents<br />

evaluators, who passed their conclusions in turn to the<br />

final evaluators. They combined these conclusions with<br />

those of the traffic evaluators. Often their analysis could<br />

precipitate precious observations. The evaluators of<br />

Intercept Company 3.jN.7 Ord company of<br />

Communications (Nachrichten) Battalion 7) did so for<br />

the 11th Army in March of 1942.<br />

In its drive to conquer the Crimea, the 11th Army had<br />

split the Russian forces on that peninsula. It had penned<br />

some in Sevasropol in the west; it had not yet swept away<br />

those in the eastern portion, an elongated peninsula<br />

ending in the city of Kerch. These Russian eastern forces,<br />

controlled by the Crimean Front, continued to assemble<br />

troops for a counteroffensive. The intercept company<br />

concentrated much of its effort at determining the<br />

composition of these forces, since this would help the<br />

Germans know how many of their own troops they might<br />

have to use to repel the Russian attacks in their rear.<br />

This was the situation when, at 7: 16 a.m. on 13<br />

March, the company intercepted a message to an<br />

unknown radio station with call sign SOTD. It was<br />

addressed "To the chief of communications of the 44th<br />

Army." This indicated pretty clearly that SOTO was the<br />

44th Army, and since company's records showed that<br />

direction-finding had located SOTO transmitting from<br />

near Kerch, the company could report a few hours later to<br />

the intelligence officer of the 11th Army, .. 44th<br />

Army definitely on the Kerch Peninsula." It was one<br />

more element in his picture of the enemy.<br />

Though these chains of hypotheses might seem to have<br />

led to freq uent error, constant observations corrected<br />

wild reasoning and kept the results close to the facts. A<br />

few days after the intercept comr.any identified the 44th<br />

Army, it assigned radio station OPWCH {O the air staff<br />

of the enemy's 51st Army on the similar basis of a message<br />

address. But the following day, it recognized that the net<br />

to which OPWCH belonged was in fact identical to a net<br />

of the 44th Army .. according to the net construction,<br />

frequency notifications, and statements of the<br />

monitoring radiomen." OPWCH was therefore a station<br />

of the 44th Army, the company concluded, and had<br />

probably merely accepted the message for for<strong>war</strong>ding<br />

tothe51stArmy.<br />

Through such detailed and often wearisome activity,<br />

German radio intelligence units contributed enormously<br />

UNCLASSIFIED 7


UNCLASSIFIED<br />

to German tactical and operational intelligence. In these<br />

low and middle echelons, it <strong>war</strong>ned of enemy attacks,<br />

provided solid information on enemy order of battle and<br />

enemy weaknesses, and saw through both radio silence<br />

and radio deceptions.<br />

In Russia, for example, the Main Post for<br />

Communications Reconnaissance issued a report each day<br />

listing all enemy troop units recognized or confirmed<br />

through communications intelligence. A typical such<br />

report ran 14 pages for Soviet army units, 2 for partisan<br />

forces, and 2 for air units. From the south to the north of<br />

the long Russian front, it dealt with the major commands,<br />

as far down as divisions. "5th Guards Army. Directionfinding<br />

for the army command from 24 August [1944J<br />

indicate the area southeast of Staszow [Poland].<br />

According to a message of 7: 30 a.m. 25 August it is<br />

changing its location," read one entry. Another entry,<br />

based on a Moscow broadcast praising heroic units, listed<br />

a score of divisions, their commanders, their location, and<br />

their subordination. This top-secret report, produced in<br />

37 copies, went to Foreign Armies East, where it joined<br />

other sources in creating a picture of the Soviet forces<br />

opposite the German.<br />

In France in 1944, the higher commander of<br />

communications reconnaissance likewise achieved good<br />

accuracy in determining American order of battle.<br />

Between D-Day and 25 June, it recognized the presence<br />

of the U.S. 1st Army, 4 corps, and 15 divisions or pares of<br />

divisions. Under the VIIIth Corps, for example, it<br />

correctly listed the lOlst and 82nd Airborne Divisions<br />

and parts of the 90th Infantry Division. Much of this<br />

information later appeared in the order of battle reports<br />

of the G2 of the commander-in-chief west. To<strong>war</strong>d the<br />

end of June 1944, the breaking of a logistical code used<br />

by the senior officer, Ferry Control, in the area of the<br />

British 2nd Army in Normandy gave the Germans exact<br />

figures on the personnel and e


UNCLASSIFIED<br />

But communications intelligence did not invariably<br />

enable the Germans to win victories. Sometimes its<br />

information. though correct when delivered, was falsified<br />

by enemy plan changes that it did not detect. For<br />

example, in 1943, the commander of communications<br />

reconnaissance of Army Group North reported: "An<br />

intended Russian attack on Staraya Russa was recognized<br />

on 25 June, which was to begin at 2300 hours 25 June<br />

and in which 6 armored battalions, among others, were to<br />

take part. The attack, however, was not carried out,<br />

probably because of the unfavorable weather conditions."<br />

Communications intelligence was also often nullified<br />

by any of the host of nonintelligence factors that<br />

determine success and failure in battle. On 9 August<br />

1944, the Main Post for Communications<br />

Reconnaissance disclosed in its report that "11th Guard<br />

Army gets order to improve clothing, get new underwear.<br />

all airplanes to be overhauled and prepared for flight,<br />

provisions to be improved and three hot meals a day<br />

served." The next day, the Germans, who were preparing<br />

a relief operation, learned through radio intelligence that<br />

two of the 11th Guard Army divisions were ordered to be<br />

ready to go into action against enemy attacks by 5 p.m.<br />

When the Germans began their drive on the l oth, the<br />

11th Guard Army responded with a counterthrust, just as<br />

predicted. But this fore<strong>war</strong>ning did not enable the<br />

Germans to stop the Russians, one of whose platoons<br />

carried the ground <strong>war</strong>. for the first time, onto the soil of<br />

the Reich.<br />

And sometimes communications intelligence simply<br />

failed. The evidence on which it rested was<br />

ethereal-peepings in rad iornen' s earphones-and could<br />

be suppressed or faked. Occasionally the Germans turned<br />

radio silence against its users: the 7th Army G 2 declared<br />

in France in November 1944 that radio silence suggested<br />

Allied attack preparations. But in North Africa, the<br />

British concealed a division very close to the front by<br />

shutting off their radios for several weeks. Radio silence<br />

also preserved surprise for many Allied landings in Sicily<br />

and Italy. Radio deceptions sought to fool the Germans.<br />

The Russians tried this every few weeks, but the Germans<br />

always seemed to see through them. On the other hand,<br />

the British successfully covered the transfer of three<br />

armored divisions from one point in the line to another<br />

during the Normandy battles through radio deception.<br />

Perhaps the most common failure was simply<br />

rnisevaluation. In November 1940, the chief of the<br />

general staff, Halder, thought that an intercepted message<br />

referring to a transfer of headquarters might mean that<br />

the English were about to occupy all of Ireland to get the<br />

western harbors. He was all wrong. Before Leningrad in<br />

June of 1943, the commander of communications<br />

reconnaissance in Army Group North reported: "The<br />

[Russian] 8th Army had only a little radio traffic in the<br />

early days of May and soon after<strong>war</strong>d complete radio<br />

silence ensued .... Together with the radio silence of the<br />

8th Army, the irregular and opaque traffic of the 2nd<br />

Shock Army and the change in location of the command<br />

post of the Leningrad Front ... , it is concluded that a<br />

Russian attack of considerable magnitude is imminent."<br />

It never came.<br />

But the many successes counteracted these occasional<br />

failures. Moreover, communications intelligence<br />

produced great quantities of information about the<br />

existence, locations, and movements of enemy<br />

formations-the basic enemy order-of-battle intelligence<br />

that says so much about enemy capabilities and intentions.<br />

Consequently, by 1943, commanders in the field, who in<br />

1939 had mistrusted communications<br />

intelligence-particularly when it came, not from the<br />

contents of messages, but from inferences based on<br />

traffic volume and routing-came to look upon it as their<br />

best source of intelligence. The G2 of the XXXXth<br />

Panzer Corps noted that through the "outstanding"<br />

communications intelligence in February 1943 the corps<br />

"always knew almost exactly the enemy situation,<br />

location and strength. This knowledge contributed<br />

considerably to the complete annihilation of the Popoff<br />

armored army." During Normandy, the G2's in the west<br />

drew about 60 percent of their information from radio<br />

intelligence, 40 percent from all other sources combined.<br />

The chief of staff of the western theater called it "the<br />

most important means for clarifying the enemy picture."<br />

A head of Foreign Armies West called it "the darling of<br />

all intelligence men;" the head of Foreign Armies East,<br />

Gehlen, listed it as the most important of his sources.<br />

And Halder flatly declared it to be "the most copious and<br />

the best source of intelligence."<br />

The glowing testimonials that many high-ranking<br />

officers gave to army communications intelligence<br />

referred only to tactical and operational results. For on<br />

the strategic level, German communications intelligence<br />

failed utterly. In contrast to the Allies, who could read all<br />

levels of German cryptosystems up to those enshrouding<br />

the command messages of the F<strong>ii</strong>hrer himself, the<br />

Germans-though they sometimes read diplomatic<br />

messages of Roosevelt and Churchill-never cracked the<br />

high- and top-level military ciphers of the Allies. Thus<br />

unlike the Allies, who often knew German plans for the<br />

overall direction of the <strong>war</strong>, the Germans never knew the<br />

Allies'. Probes of high-level Allied messages showed that<br />

they could not be solved analytically. Testing them all<br />

statistical]y for a possible cipher clerk's error that might<br />

9 UNCLASSIFIED


UNCLASSIFIED<br />

have permitted the solution of a dozen or so would have<br />

taken too many cryptanalysts away from work that,<br />

though lower in echelon, was more certain of results. So<br />

the Germans did not seek to crack these high-level<br />

messages, and after a while they even gave up intercepting<br />

them. This was their unacknowledged admission ofdefeat<br />

in the most vital sector of the secret <strong>war</strong>.<br />

David Kahn is the leading authority on cryptology in<br />

America, outside of Government Service. He has served<br />

as president of the American Cryptogram Association and<br />

the New York Cipher Society. A member of the faculty of<br />

New York University, he is the author of technical and<br />

popular <strong>articles</strong> on cryptology and of The Codebreakers<br />

(1967) and the recently published Hitler's Spies.<br />

10 UNCLASSIFIED


NSA Cryptologic Spectrum Article:<br />

German Intercept Successes Early in<br />

World War II<br />

Fall 1978 - Vol. 8, No. 4


Wilhelm Flicke<br />

UNCLASSIFIED<br />

German Intercept Successes<br />

Early in World War II<br />

A German cryptologic officer's account of intercept In the West<br />

The campaign in the West in the summer of 1940<br />

appears to many people to be the master stroke of a<br />

military genius. Even when we take into account the<br />

German superiority in numbers and materiel and<br />

appraise adequately the spirit of the German troops,<br />

many things still remain inexplicable - in particular<br />

the swift drive through the northern continuation of<br />

the Maginot Line. On the basis of what I was able to<br />

learn, I shall attempt to throw a few side lights on<br />

this campaign, without pretending to be able to explain<br />

everything.<br />

I have already reported on the situation in the<br />

intercept service. Conditions for successful intercept<br />

work were as favorable as one could desire in France,<br />

Holland, and Belgium.<br />

From intercept traffic the French assembly and the<br />

Belgian and Dutch frontier defenses could be recognized<br />

so clearly both in respect to organization and<br />

geographical distribution that the information was<br />

fully adequate for making German dispositions. It was<br />

a pleasure for the German command to be able to<br />

enter the enemy's troop dispositions on its own situation<br />

maps on the basis of the results of the intercept<br />

service. In the present case, however, this did not<br />

suffice. Before the <strong>war</strong> the great question was: how<br />

good will the mighty defense system of the Maginot<br />

Line be? Will it be possible to break through quickly<br />

or will a <strong>war</strong> of position on a large scale develop here?<br />

Will modern heavy artillery be able to crack these<br />

defenses? Who could answer these questions?<br />

Earlier we reported how Poland and Czechoslovakia<br />

were thoroughly reconnoitered by the German espionage<br />

service. In France there was no such degree of<br />

success although the German intelligence service did<br />

receive current reports and single notices. France had<br />

no extensive German minority and conditions were less<br />

From War Secrets in the Ether, translated by Ray W. Pettengill,<br />

NSA, 1959.<br />

favorable. Nevertheless, in the summer of 1939 the<br />

German Secret Service succeeded in pulling off something<br />

which absolutely made up for the previous years.<br />

In August it was possible to get a photograph of a<br />

French map showing all forts, barriers, obstacles,<br />

communications routes and communications points of<br />

the Maginot Line and of its extension to the coast.<br />

This showed how imperfectly the French had developed<br />

their system of defense along the Belgian frontier and<br />

one did not need to study the map long in order to put<br />

his finger on the weakest point in this system of<br />

defense. This map was reproduced in Germany and<br />

was the basis for planning the campaign in France.<br />

In order to drive at this weak point in the French<br />

system of defense, it was necessary to advance through<br />

Holland and Belgium. Consequently, this move was<br />

decided upon in Germany without hesitation. The<br />

prospect of overrunning the French line swiftly was<br />

too inviting, and it was impossible for the French to<br />

build up this weak point within a few months to match<br />

the strength of the Maginot Line proper.<br />

The campaign against Poland was followed by a<br />

period of calm. Only in the air and at sea did some<br />

minor engagements take place, which no one regarded<br />

very seriously. People were already beginning to crack<br />

jokes about the "phony <strong>war</strong>." Many thought there<br />

would be no serious conflict and that France and<br />

England were in a state of <strong>war</strong> merely "to save face"<br />

with respect to Poland. Peace would surely come in<br />

the spring.<br />

The monitoring of French and English traffic, however,<br />

did not indicate that people in those countries<br />

were concerned with "saving face." War production<br />

was under way; they were arming for battle, though<br />

only for a defensive struggle. The whole system of land<br />

defense for France since 1919 had been based on the<br />

invincibility of the Maginot Line, while England was<br />

convinced that economic measures directed against<br />

UNCLASSIFIED 25


UNCLASSIFIED<br />

Germany would not fail. Anyhow, one could not count<br />

on a conciliatory attitude in either France or England.<br />

On 'l:7 January was broadcast Churchill's speech in<br />

which he said: "Hitler has already lost his best<br />

opportunity."<br />

On 9 April the German people were suprised by the<br />

information that "German troops have undertaken the<br />

protection of Denmark and Norway." The National<br />

Socialist Government tried, naturally, to throw all<br />

blame on the English and Norwegians. Of course no<br />

mention was made of the fact that the invasion might<br />

not have been successful, if the intercept service of<br />

the German Navy had not ascertained the position of<br />

the British naval forces and calculated the time so<br />

that no suprises need be feared from that quarter.<br />

Despite heroic resistance, all Norway was occupied<br />

within four weeks during which the German intercept<br />

service played a notable role against both land and<br />

naval forces. At Narvik, both the British and Norwegians<br />

used radio very incautiously. The course of<br />

British ships could be followed perfectly at all times.<br />

Several Norwegian units were encircled and captured<br />

because of their incautious use of radio, and the<br />

capture of Bergen with its <strong>war</strong> stores was possible only<br />

because of frivolous use of radio.<br />

Of course the Germans sometimes made mistakes,<br />

too, and the British followed German ship movements.<br />

Simultaneous with increase in military radio traffic<br />

at the beginning of these operations was the enormous<br />

increase in diplomatic and press traffic. It was interesting<br />

to see how the German advance against the two<br />

northern countries affected neutral lands. While the<br />

German press tried to characterize the whole action<br />

as a "British Crime" against which the entire press of<br />

the <strong>world</strong> was clamoring indignantly and while German<br />

papers were printing quotations from foreign papers,<br />

which had been paid for with German money, intercepts<br />

from foreign countries gave a very different<br />

picture. British action against Norway had been<br />

started only after Germany's intention had become<br />

known to England at the last moment. Consequently<br />

it was not England but Germany that had attacked,<br />

and this unjustified attack in defiance of all inter<strong>national</strong><br />

law lost Germany the respect of the <strong>world</strong> and<br />

laid the groundwork for her defeat.<br />

On 9 May one of the leading German newspapers<br />

carried the headline: "Stupid British Diversionary<br />

Maneuver." The content was to the effect that the<br />

discovery by Germany of ostensible British plans had<br />

produced such an impression in England that they<br />

were resorting to diversionary maneuvers; news was<br />

being spread abroad that Holland was sorely threatened<br />

by Germany. There was a false report that two<br />

German armies were moving to<strong>war</strong>d Holland, but of<br />

course that was nonsense, an old wives' tale of the<br />

Ministry of Lies in London. But the next day at nine<br />

o'clock Doctor Goebbels delivered a long talk on the<br />

German invasion of Holland, Belgium, and Luxenbourg.<br />

The <strong>war</strong> in the West had begun.<br />

The attempt to attribute the blame for the outbreak<br />

of hostilities to the Dutch and Belgians was ridiculous.<br />

From everything that could be observed by monitoring<br />

their traffic, it was clear that both countries did<br />

everything possible to maintain neutrality. On 14 May<br />

the Dutch army gave up the hopeless struggle and a<br />

break was made in the extended Maginot Line at<br />

Sedan. On 16 May came a break through the Maginot<br />

Line on a front of 100 kilometers. On 17 May German<br />

troops entered Brussels. Soon Hitler's threat: "We will<br />

put them in a panic which will spread!" was made<br />

good.<br />

This creation of panic was carried on by all modern<br />

technical means. Leaflets were dropped by the<br />

hundreds of thousands and served to spread the wildest<br />

rumors. Agents deposited by parachute behind the<br />

enemy front cut in on the telephone wires, called up<br />

all sorts of government offices, gave false instructions<br />

to civilian offices and troop units, and by reports of<br />

panic caused a chaotic flight on the part of the civilian<br />

population, which resulted in a hopeless blocking of<br />

the highways. Captured radio stations were likewise<br />

put into operation and issued alarming reports. With<br />

events moving so rapidly, the French command had<br />

no possibility of effectively counteracting these activities;<br />

moreover, the French did not catch on to these<br />

methods until too late. In several cases, whole divisions<br />

were forced in this fashion to surrender. A number of<br />

German agents equipped with small shortwave radio<br />

had been deposited behind the French front and were<br />

working from there with excellent success. These<br />

people watched everything that went on and reported<br />

each of their observations immediately to one of the<br />

three control stations by which their work was directed.<br />

For the first time in history a combat instrumentality<br />

was employed here which in the later years<br />

of this <strong>war</strong> was to give it its special character and<br />

which was to be turned in catastrophic fashion against<br />

Germany.<br />

On 3 June the frightful slaughter known in history<br />

as the "Battle of Flanders" ended with the capitulation<br />

of the Belgian army and the encirclement and annihilation<br />

of British and French forces. These troops<br />

fought bravely but succumbed to superior force. The<br />

name Dunkirk became for the Germans the symbol of<br />

a decisive victory over England and for the British<br />

the symbol of a most successful evacuation, carried<br />

26 UNCLASSIFIED


out with the aid of the fleet. Both were right ­<br />

everything depends on the point of view.<br />

Once again there came a period of tense expectation.<br />

What would happen? Would the Germans turn south<br />

and attack the French divisions on the Aisne and the<br />

Somme, or would they follow British troops across the<br />

Channel? The word "invasion" began to spook around.<br />

The German High Command diligently spread the<br />

news that it was preparing to invade at once. In any<br />

case the fate of France was virtually sealed. This<br />

seemed to be a suitable time for Italy to enter the<br />

<strong>war</strong>. Pressure was put on Mussolini. A feverish exchange<br />

of telegrams between Berlin and Rome began.<br />

And finally it happened. On 10 June 1940, from the<br />

balcony of the Palazzo Venezia, Mussolini proclaimed<br />

to the Italian people and to the <strong>world</strong> Italy's entry<br />

into the <strong>war</strong> on the side of Germany. This was<br />

speculating on a cheap victory, on sharing the spoils<br />

after France had been completely subdued and England<br />

had pulled out of the <strong>war</strong>, as it was expected to<br />

do.<br />

But even in this seemingly so favorable situation,<br />

the true attitude of a large part of the Italian Officer<br />

Corps, in particular General Staff Officers, was and<br />

remained adverse both to the <strong>war</strong> and to Germany. A<br />

not inconsiderable group of officers was outright anti­<br />

German in sympathy to such a degree that this could<br />

be clearly recognized from intercepted Italian traffic.<br />

We shall have occasion to speak of this later. For the<br />

moment, however, the chances seemed to favor the<br />

two Axis Powers and for the moment this outweighed<br />

everything else.<br />

The battle along the Aisne and the Somme began<br />

and in a few days the French army was split into four<br />

groups. On 15 June, German troops crossed the Loire.<br />

On 18 June Hitler and Mussolini met in Munich to<br />

discuss the terms of an armistice. On 22 June, the<br />

armistice was concluded in the Forest of Compiegne;<br />

the French fleet remained in French harbors.<br />

France was beaten. Hopelessly beaten in an astoundingly<br />

short time. How could this country, protected by<br />

the most modern line of fortification and with its<br />

strong army, be conquered so easily? For one thing<br />

the Germans, contrary to French expectation, had not<br />

hesitated to attack two neutral and almost defenseless<br />

countries, Holland and Belgium, and thus to reach the<br />

French frontier where it was least well protected.<br />

Moreover at the beginning of the <strong>war</strong> France was<br />

distinctly inferior in materiel. There was lack of<br />

planes, armoured tanks and other <strong>war</strong> equipment.<br />

Despite all <strong>war</strong>nings, including repeated reports to the<br />

Deuxieme Bureau regarding German armament, those<br />

in control refused to believe there was any serious<br />

danger.<br />

UNCLASSIFIED<br />

When the campaign in the West began, the French<br />

greatly underestimated German strength, while espionage<br />

had revealed to the Germans the weak points in<br />

the French line of defense. Another unexpected factor<br />

was the systematic spreading of panic. In a very short<br />

time, millions of French and Belgians were in flight,<br />

blocking roads and bridges so that French troops and<br />

supplies could not get through. On top of all that,<br />

there was the German radio intercept service. Most of<br />

the French army cryptographic systems and two systems<br />

of the French Foreign Office were known to the<br />

German cryptanalytic service. Countless messages with<br />

highly important content could be read. Moreover,<br />

diplomatic representatives of various countries were<br />

transmitting by radio important information and were<br />

doing this in systems already solved in Germany. From<br />

a purely military angle, the system of French army<br />

traffic resulted in revealing to the German Intercept<br />

Service in a very short time the relation between the<br />

higher and medium units. The organization of the<br />

French front was known at all times. No movement<br />

and no dislocation remained concealed from the Germans.<br />

The French Air Force was most incautious in<br />

its use of radio and the ground stations gave countless<br />

clues. The picture was the same as that observed<br />

during French maneuvers from 1930 to 1939.<br />

The map of the line of fortifications, the intercept<br />

service, the cryptanalytic service, the creation of<br />

panic, the blocking of highways, air superiority, and<br />

superiority of numbers and materiel on the German<br />

side, coupled with an ineffective intelligence service<br />

on the French side - nothing more was needed to<br />

gain a crushing victory in the West.<br />

The campaign in the West had ended. Throughout<br />

Germany bells pealed and flags fluttered. People were<br />

convinced that victory in the West meant the end of<br />

the <strong>war</strong>; now it was up to the diplomats to find a way<br />

to bring about peace. It was incredible that England,<br />

the last remaining antagonist, would dare to continue<br />

the <strong>war</strong>. Goebbels organized a mighty reception for<br />

Hitler when the latter returned from the front; the<br />

rumor was spread that America had intervened and<br />

England would make peace. Plans for demobilization<br />

were worked out and a few people were discharged<br />

from the armed forces.<br />

But although people were convinced in Germany<br />

that England would now try to get out of the <strong>war</strong>,<br />

longboats, light sailing vessels, motorboats and other<br />

craft began moving north<strong>war</strong>d on special vehicles; they<br />

were to carry German troops across the Channel and<br />

few people doubted that this enterprise would shortly<br />

be crowned by success. Yet week after week passed<br />

and nothing happened. On the contrary, the German<br />

intercept service was obliged to report again and again<br />

UNCLASSIFIED 27


UNCLASSIFIED<br />

that England had no thought of submission. Moreover,<br />

voices from America also had to be taken seriously.<br />

While the public was thus forced to settle back and<br />

wait for the invasion which Hitler said was coming, it<br />

was remarkable that all preparations for invasion were<br />

carried on in the open instead of being carefully<br />

camouflaged as usual. Details which normally would<br />

have been strictly secret could be heard everywhere,<br />

until one almost had the impression that the invasion<br />

was nothing but a bluff.<br />

Interception of English traffic, however, gave the<br />

impression that the British were counting on an<br />

attempted landing. Their air reconnaissance of points<br />

where the Germans were concentrating small boats<br />

became intensive and the assemblies were bombed<br />

constantly.<br />

Meanwhile the air <strong>war</strong> against England began. It<br />

was supposed to break the will of the people to resist,<br />

but it soon brought two disappointments: first, the<br />

British fighter defense proved far stronger than expected;<br />

second, the effect of the bombs was by no<br />

means as great as had been expected. Furthermore,<br />

German aircraft losses increased rather than decreased<br />

- some days a hundred or more machines were lost.<br />

Careful monitoring of all radio traffic between Great<br />

Britain and the U.S. A. showed no indication of any<br />

letup in England's will to resist. Week by week the<br />

United States was growing closer and closer to Great<br />

Britain. Unmistakably there was a resolve to put an<br />

end to the conquest of one country after another by<br />

National Socialism. The attitude of the U.S. A. was<br />

expressed in a speech in Philadelphia on 18 August by<br />

Mr. Bullitt, former ambassador to France.<br />

Since the air <strong>war</strong> was not achieving its purpose, the<br />

German Government proclaimed in August a "total<br />

blockade of England." This step was aimed primarily<br />

at the U.S.A., but its effect was like pouring oil on a<br />

fire. It really betokened German weakness rather than<br />

strength.<br />

While the German press printed long-winded <strong>articles</strong><br />

on the effect of German air attacks on London, only<br />

small type was available on 10 September for the news<br />

that the House of Representatives had on the day<br />

before accepted the Bill for Compulsory Military<br />

Service. The question was no longer, "Will the U.S.A.<br />

fight?" but, "When?"<br />

Supposedly, the invasion was to take place during<br />

the night of 15-16 September 1940, but the English<br />

fighter defense was still too strong, the Navy was still<br />

intact, and German preparations were too inadequate.<br />

Only a few of the 1,000 large transport gliders called<br />

for had been completed. The espionage service had<br />

almost completely failed to function; in particular the<br />

establishment of a network of radio agents had never<br />

gotten beyond very modest beginnings. The intercept<br />

service provided virtually no information regarding the<br />

military situation in the British Isles.<br />

Of course the decisive factor was Hitler himself. He<br />

did not seriously believe it would be necessary to<br />

invade by force; he expected England to make peace<br />

and Ribbentrop held the same view. Not until four<br />

weeks after the conclusion of the campaign in the<br />

West did Hitler realize that this assumption was not<br />

correct. Hitler could pursue a goal with great obstinacy<br />

but he was an easily influenced, emotional character<br />

and now he shifted suddenly and ordered the General<br />

Staff (or at least part of it) to make plans for a<br />

Russian campaign which had never been mentioned<br />

before. He thought that England would change its<br />

attitude immediately, if Germany should attack the<br />

Soviet Union. Hess entertained the same opinion.<br />

Points of difference between England and the Soviet<br />

Union were well known, likewise Churchill's aversion<br />

to Bolshevism. If the English attitude took the course<br />

they expected, then invasion was superfluous.<br />

It is true that there was a dilemma; Hitler must<br />

say one thing to the Germans and another to the<br />

English. It was necessary to explain to the German<br />

people why the invasion did not come off: first there<br />

was fog, then there were storms, then it was said<br />

spring was the only proper time, and then when at<br />

Headquarters the idea had long since been dropped,<br />

"preparations for the invasion" were carried on in an<br />

ostentatious manner. The British were to get the<br />

impression that the invasion was imminent and the<br />

bombing attacks continued, although their intensity<br />

decreased. The main activity was confined to threats.<br />

Amid this tense expectation there was concluded<br />

with great pomp on 26 September 1940 the so-called<br />

Three Power Pact between Germany, Italy, and Japan.<br />

This act was purely theatrical. It was the first confession<br />

of the fact that from now on the whole threat of<br />

an invasion was merely a bluff, because if there were<br />

an invasion and England were defeated, then there<br />

would be no need of exerting pressure on England in<br />

the Far East. The fact that this step was taken proved<br />

that the German Government had no illusion regarding<br />

the invasion, even if it should be carried out. Actually<br />

the plan had already been given up. It was interesting<br />

to see how they reached the same conclusion in<br />

England; this was revealed by the mass of intercepted<br />

diplomatic messages of other governments, Poland in<br />

particular.<br />

The Polish Government had fled to London and was<br />

in close contact there with all organs of the British<br />

Government and with the British armed forces. The<br />

English on their part esteemed this cooperation since<br />

the Polish element all over Europe gave a unique basis<br />

28 UNCLASSIFIED


for the organization of a large scale spy network for<br />

the English secret service. The reverse of the medal<br />

lay in the fact that the Polish Government in London<br />

talked too much out of school in its exchange of<br />

telegrams.<br />

The cryptographic systems of the Polish Government<br />

in Exile for the most part had been solved in Germany.<br />

Consequently, insight was obtained into the thinking<br />

and the plans of influential English offices. It could be<br />

seen that the British took the invasion seriously for<br />

only a short time. In any case, they were ready to<br />

accept it and were resolved, in case it succeeded, to<br />

continue the struggle from overseas. The fleet was to<br />

go to America and the struggle would be organized<br />

anew from there. Africa was to constitute the starting<br />

point for the attack on the Axis Powers. There were<br />

similar revelations in the intercepted traffic of diplomats<br />

representing other nations.<br />

The German plan aimed, by threatening British<br />

possessions in the Far East, to force Britain to change<br />

her military dispositions. The idea appeared very<br />

clever and in those days Ribbentrop was considered in<br />

Germany a very competent and clever diplomat. However,<br />

he had neglected one important factor: should<br />

Japan try to disturb the balance of power in the Far<br />

East, this would inevitably arouse opposition in the<br />

U. S. A., and relations between the two countries were<br />

already tense due to the conflict in China. When the<br />

Japanese raised 'this objection, Ribbentrop assured<br />

UNCLASSIFIED<br />

them that the U. S. A would not be in a position to<br />

employ its whole strength against Japan because<br />

Germany would, in case of conflict, declare <strong>war</strong> on the<br />

U. S. A.; this would mean for both the U. S. A. and<br />

Great Britain a splitting up of forces, and the Americans<br />

would be too weak to threaten Japan seriously.<br />

At that moment, what Ribbentrop said was valid,<br />

but one factor was omitted: in September 1940 we<br />

had from intercepted traffic a fair picture of <strong>war</strong><br />

production in the U. S. A. with production estimates<br />

for the two ensuing years. Compared with German<br />

production these figures were enormous. Hitler and<br />

Ribbentrop said these figures were pure pipe dreams.<br />

What induced them to take such an attitude is not<br />

known to me. The figures were not based on propaganda<br />

speeches but were carefully compiled from<br />

authentic sources. On this occasion Hitler displayed a<br />

characteristic trait; he would believe only what accorded<br />

with his ideas, everything else he rejected<br />

abruptly.<br />

Wilhelm Flicke worked in German cryptologic<br />

organizations, as an analyst and administrator,<br />

from World War I through World War<br />

II. The rights to his Kriegsgeheimnisse in<br />

Aetber, which covers both <strong>war</strong>s, was purchased<br />

by the U.S. Government shortly after World<br />

War II.<br />

UNCLASSIFIED 29


NSA Cryptologic Spectrum Article:<br />

Critical Analysis of German Operational<br />

Intelligence Part II<br />

Winter 1980 - Vol. 10, No. 1


UNCLASSIFIED<br />

Critical Analysis of<br />

German Operational Intelligence<br />

Part II<br />

Sources of Intelligence<br />

The study of sources and types of intelligence<br />

available to the Germans shows clearly how the inherent<br />

weaknesses' of their intelligence system extended<br />

to their detailed work. The insufficient importance<br />

they attributed to intelligence meant that all its<br />

branches suffered from shortage of personnel and<br />

equipment; and, although in some fields there was an<br />

approach to German thoroughness, in the main the<br />

lack of attention to detail was surprising.<br />

The interrogation of prisoners of <strong>war</strong>, which they<br />

regarded as one of their most fruitful sources of<br />

information, is a good example. In the beginning of<br />

the <strong>war</strong>, their need for detailed and comprehensive<br />

interrogation was small; but even later, a standard<br />

OKH questionnaire was still being used and at no time<br />

was much initiative shown on the part of interrogators.<br />

Only later, in the Russian campaign, did it become<br />

obvious to the Germans that their system was not<br />

nearly flexible enough and that more individual attention<br />

had to be paid to the problem of exhaustive<br />

interrogations. Even so, it seems clear that Allied<br />

interrogation methods, employing more and better<br />

interrogators and producing competent work at all<br />

levels down to battalion, were probably far superior to<br />

anything the Germans ever knew.<br />

The same holds true for work on captured documents.<br />

The Germans realized the value of document<br />

From German Operational Intelligence. Military Intelligence<br />

Division, War Department, Washington, D.C., 1946.<br />

work, and many German field orders stress the importance<br />

of the capture, preservation, and quick evaluation<br />

of enemy documents; but they paid scant attention<br />

to adequate training of personnel, and no<br />

outstanding work seems to have been done. During the<br />

second half of the <strong>war</strong>, the amount of captured<br />

documents in German hands decreased, owing to the<br />

nature of their defensive <strong>war</strong>fare, and the opportunity<br />

for good document work became fewer.<br />

That the Germans were capable of good detailed<br />

work is shown by their practice in the Internment<br />

Center for Captured Air Force Personnel at Oberursel,<br />

where all Allied air crews were first interrogated. The<br />

German specialists here realized the value of combined<br />

document and interrogation work, and devised an<br />

excellent system of analysis. In order to identify the<br />

units of their prisoners - a matter of the highest<br />

importance to the Germans so as to analyze the<br />

steadily increasing size of Allied air fleets - they<br />

went so far as keeping card files on the types of ration<br />

cards issued to the Americans, or the type of photographs<br />

used for their identification papers, etc. Generally<br />

speaking, so exhaustive a study was unknown in<br />

the Army.<br />

A major contributory cause of the weakness of<br />

German intelligence was their loss, to<strong>war</strong>d the end of<br />

the <strong>war</strong> of an important source of intelligence - air<br />

reconnaissance. The failure of the German Air Force<br />

to stay in the air during the last two years of the <strong>war</strong>,<br />

meant an almost paralyzing loss of eye-sight to the<br />

German Army. The Germans expended much ingenuity<br />

in the development of other sources of intelligence,<br />

but for the long-range exploration of enemy intentions,<br />

16 UNCLASSIFIED


UNCLASSIFIED<br />

the loss of air reconnaissance, both visual and photographic,<br />

remained a severe handicap. There was practically<br />

no air reconnaissance over England prior to D­<br />

day, with great consequent advantages to the Allies at<br />

a time when their preparations and concentrations<br />

could hardly have been concealed from the air.<br />

This failure was a purely physical one, for the early<br />

campaigns of the <strong>war</strong>, when the Germans had air<br />

superiority, showed that they fully realized the value<br />

of serial photographs as a source of intelligence in the<br />

planning of tactical operations. In the planning of the<br />

campaign in France, the field echelons were given<br />

aerial photographs of the Maginot Line, both verticals<br />

and obliques, in sufficient quantities for distribution<br />

down to companies. This undoubtedly helped their<br />

successful campaign against the line.<br />

As the <strong>war</strong> progressed, there was a definite shift of<br />

emphasis in photographic interpretation from tactical<br />

to strategic considerations, i.e., to photographic reconnaissance<br />

and interpretation of enemy air forces,<br />

air fields (France), enemy navies, ports and shipments<br />

(England), air fields and landing places for parachute<br />

troops (Crete), roads and supply routes (Russia). Until<br />

late 1942, photographic reconnaissance planes remained<br />

under the commander of the air support<br />

(Koluft), the officer who was responsible for supplying<br />

photographic coverage to field units. After 1942, such<br />

available planes were taken over by the Air Force and,<br />

though theoretically they were to function as previously,<br />

flight missions for photographic reconnaissance<br />

were no longer automatic but had to be requested.<br />

Not only did the quantity of necessary photographic<br />

missions decrease, but the quality of photographic<br />

reconnaissance also deteriorated rapidly when Allied<br />

air strength forced photographic reconnaissance planes<br />

to be equipped to fight and to be flown by men who<br />

were primarily fighter pilots.<br />

Along with the reorganization, useful experiments<br />

which were in progress ceased altogether. Developments<br />

in night photography, so important in Russia,<br />

infra-red photography, and penetration of non-transparent<br />

intermediaries were either curtailed or stopped<br />

altogether. Technically trained civilian personnel (e.g.,<br />

from the Hansa Luftbild Companyj were absorbed<br />

elsewhere, and there was no one left who had either<br />

the technical knowledge or the energy to pursue further<br />

developments in this field. Because of lack of supervision,<br />

the entire field of photogrammetry, with the<br />

exception of rectification, was ignored. Finally, there<br />

was no coordinating authority, nor anyone of sufficiently<br />

high rank to sponsor air photographs at higher<br />

headquarters. Such were the conditions on the higher<br />

levels. It must be emphasized that, fundamentally,<br />

the entire subject of photographic intelligence was left<br />

in the hands of Air Force personnel. This meant that<br />

the air liaison officer and his staff not only arranged<br />

for the flying of the missions, but were responsible for<br />

the developing, interpretation, and reproduction of<br />

photographs as requested by the Army G-2, with<br />

whom the air liaison worked closely. The implication<br />

of this must be immediately apparent, for such cooperation<br />

presented the problem of training Air Force<br />

personnel in interpretation for use in ground force<br />

operations.<br />

That this was realized can be established by the<br />

existence of a photographic intelligence school located<br />

at Hildesheim. Significant is the fact that emphasis<br />

was laid on studying photography, the technique of air<br />

photography, and the handling of cameras; interpretation<br />

was taught to a limited extent. It was only in<br />

the officers' course that the subject of enemy Army<br />

organization and tactics were stressed. Though advanced<br />

courses were offered, specialists were developed<br />

only through actual experience, and more in the<br />

various practical aspects of photographic reconnaissance<br />

than in interpretation itself.<br />

Over-all policy and direction for the training of<br />

interpreters were lacking. Although there were other<br />

schools of limited duration instituted by the higher<br />

air echelons of the various theaters, the need for<br />

courses in ground tactics, enemy Army organization,<br />

etc., was never fully realized.<br />

With this thought in mind, the limitations of<br />

photographic interpreters attached to army (the lowest<br />

level at which interpretation was carried out) must be<br />

realized. The tactical problems of one division, the<br />

need for minute study and interpretation of its sector<br />

as seen from verticals (scale 1:10,000), obliques, and<br />

from semi-oblique stereographic pairs, could not be<br />

taken care of at army.<br />

To illustrate this important point, let us consider<br />

the problem of a division. Since a mission could be<br />

flown by neither division nor corps, the request was<br />

passed on through the chief intelligence officer at<br />

army, who stated his request to the air intelligence<br />

officer indicating the limits by coordinates. The latter<br />

prepared the mission and coordinated it with the<br />

reconnaissance section which carried it out. The interpretation<br />

was done by the photographic reproduction<br />

section (Stabia), which returned the interpreted photographs<br />

with annotations to the air intelligence officer<br />

responsible for their sorting, filing, and distribution.<br />

Through intelligence channels, four or five copies were<br />

for<strong>war</strong>ded to the division in question which distributed<br />

the photographs to the various commands. Interpretation<br />

at army obviously could not be so efficient as at<br />

UNCLASSIFIED 17


UNCLASSIFIED<br />

the division concerned, where so much more was known<br />

of the terrain and the local problems; and it was often<br />

necessary to refer back a questionable interpretation<br />

to the photographic reproduction section at army<br />

(Stabia) to clear it up. Systematic and continuous<br />

coverage, so necessary for a proper interpretation, was<br />

seldom possible, in view of the many limitations, as<br />

well as the lengthy front of an army and, correspondingly,<br />

the sector of a division.<br />

On the eastern front, the Germans attributed the<br />

shortcomings of their photographic intelligence to the<br />

skillful camouflage of the Russians, their excellent<br />

road discipline, and their ability to transport great<br />

numbers of troops at night. Perhaps a more accurate<br />

explanation was the lack of planes and equipment in<br />

the German Army, their poor technique, and the<br />

inadequacy of their personnel, both in quantity and<br />

training. Finally, there was a lack of supervision and<br />

control in the filling of the requirements of ground<br />

force field echelons when the interpretation was done<br />

by Air Force personnel. Technically, German air<br />

reconnaissance, as long as it could be practiced, was<br />

sound; interpretation, even in the first two campaigns<br />

of the <strong>war</strong>, was never really well-developed or organized.<br />

The loss of air reconnaissance was an incentive to<br />

the Germans to develop their methods of radio intercept<br />

work, and signal intelligence later became important<br />

on all fronts. In the West, it accounted for<br />

approximately 60 per cent of all intelligence received.<br />

With the development of signal intercept, although<br />

it made no essential difference to the attitude of the<br />

General Staff, there could be found the beginnings of<br />

a higher prestige for intelligence work. Good intercept<br />

work, producing, as it did, almost 90 per cent reliable<br />

information, was invaluable for helping the intelligence<br />

officer to sell himself; and the efforts expanded by the<br />

Germans in this field, in training specialists and<br />

equipping field units with intercept teams, reflect the<br />

greater value they attached to it.<br />

It is true to say that this was the only field of<br />

intelligence in which the Germans came near to an<br />

adequate personnel and technical solution. They<br />

trained and prepared a sufficient number of specialists,<br />

from operators and technicians to mathematicians and<br />

linguists; the amount of equipment at their disposal<br />

was limited by the shortage of labor and materials<br />

and does not seem to have been very plentiful, but, on<br />

the whole, was sufficient to meet the steady expansion<br />

and improvement of the service.<br />

Another important factor in their success was the<br />

close cooperation built up between the intercept agencies<br />

and the G-2s of the various command echelons.<br />

This was insured by locating the command posts of<br />

the intercept and evaluation units at or near unit<br />

headquarters. In addition - and this was probably<br />

the key to their ultimate success - the Germans<br />

realized at an early date, through practical experience,<br />

that the greatest gains could be achieved only through<br />

a physical dispersal of the actual intercept stations<br />

coupled with a strictly centralized direction and evaluation<br />

of the results. They learned that in this field<br />

a correct picture could be obtained only by assembling<br />

all the intercepted messages at higher headquarters<br />

and by disseminating intelligence from the top down,<br />

rather than from lower echelons up. This avoided the<br />

danger of overestimating the value of a single message<br />

and insured that it received its proper place in the<br />

over-all picture.<br />

Throughout this work, the Germans appear to have<br />

concentrated on the aspects from which they could<br />

gain quick and operationally useful results, and to<br />

have limited the over-all effort. They made little<br />

attempt at intensive work on high-grade ciphers, which<br />

offered great resistance to the cryptographers but<br />

stressed the rapid exploitation of low-grade codes and<br />

messages in the clear, and the development of means<br />

for rapid dissemination of the results. They did not<br />

achieve the mass of intelligence produced by the Allied<br />

intercept organizations: but, even at the cost of<br />

<strong>security</strong>, they did at least equal the Allies in the<br />

production of results of tactical value to the lower<br />

levels.<br />

A good example of this was their work on Allied air<br />

liaison nets. Messages from ground forces calling for<br />

air support, were often evaluated sufficiently to enable<br />

the troops to be <strong>war</strong>ned, though the actual targets<br />

mentioned were in a code which the Germans were<br />

unable to break. In the West, for example, a broadcast<br />

system was established and put at the disposal of the<br />

Chief Intelligence Office at Western Theater Command,<br />

with receivers at all division, corps, army, and<br />

army group headquarters. (This was a system often<br />

considered by the Allies but always turned down for<br />

<strong>security</strong> reasons.) There can be no doubt that by a<br />

procedure such as this the Germans succeeded in<br />

disseminating the results of intercept more rapidly<br />

than the Allies, but they fell short of the over-all<br />

results of Allied intercept, and impaired their effort<br />

by poor <strong>security</strong>.<br />

The Germans distinguished between long-range and<br />

short-range reconnaissance through agents. Although<br />

both types were under the Abwehr and after 1944<br />

under the Military Office of the National Security<br />

Office (i.e., under the 8S), there were important<br />

differences.<br />

Long-range secret intelligence was handled by static<br />

headquarters, which were usually in Germany proper<br />

18 UNCLASSIFIED


UNCLASSIFIED<br />

or at least far behind the actual front lines. They sent<br />

agents who were not employed on front-line activities<br />

through neutral countries, or by parachute, far into<br />

the rear of enemy territory. It has not been possible<br />

to check the German claim that these agents were<br />

reasonably successful, especially in the West. Coverage<br />

of English invasion bases prior to D-day, for example,<br />

was claimed to be adequate, and, until fairly late in<br />

the western campaign, there were no surprises so far<br />

as order of battle was concerned.<br />

Prior to their attack in 1941, the knowledge about<br />

Russia which the Germans possessed was scanty.<br />

Although it is said that the German attache in Moscow<br />

repeatedly informed his superiors of the strength of<br />

the Soviet Union, the Germans either disbelieved his<br />

reports or did not have enough information on that<br />

point from other secret sources. Intelligence on the<br />

whole had greater difficulties to overcome in Russian<br />

than in the West, and the Germans themselves admit<br />

that most of the material available before the inception<br />

of the campaign was of doubtful value.<br />

In the short-range secret intelligence the Germans<br />

obtained their greatest successes in Russia and in<br />

Italy, and were least successful in the West. This type<br />

of work was in the hands of Abwehr units and subunits,<br />

which, after the reorganization in 1944, were renamed<br />

intelligence reconnaissance units and subunits (FAKs,<br />

FATs). They were mobile units attached to army<br />

groups and army. For operational intelligence they<br />

were important in two ways: FAKs I (or Abwehr I)<br />

sent agents through the enemy front lines, FAKs ill<br />

(or Abwehr ill) were engaged in counterespionage and<br />

the apprehension of Allied agents behind the German<br />

lines. The counterespionage work of FAKs ill, which<br />

seems to have been most successful in the East in the<br />

appreciation of the Russian employment of agents and<br />

the knowledge of the various missions assigned to<br />

them, formed one of the most important bases upon<br />

which the operational intentions of the enemy could<br />

be estimated. It was complemented by signal intelligence.<br />

FAKs ill furnished a consolidated report on the<br />

activities of Russian agents every ten days. These<br />

reports were evaluated by the sections dealing with<br />

partisan matters, where a map was kept showing when<br />

and where the agent was detected or apprehended<br />

and, if known, by whom he was sent out. Army<br />

information concerning the agent's mission was included<br />

in a legend to the map. It was found, by<br />

experience, that the entries, as they increased in<br />

density in certain sectors of the front, indicated very<br />

clearly where the Russians were planning to engage in<br />

large-scale operations. It was also found that on those<br />

sectors of the front where a large number of agents<br />

who had been given their missions directly by the<br />

General Staff of the Red Army were being employed,<br />

a clear picture of impending main efforts could be<br />

obtained. In this way, the defensive use of secret<br />

intelligence on the eastern front was particularly<br />

valuable to operational intelligence. The offensive use<br />

of German espionage behind the Russian front lines<br />

also seems to have shown fairly good results. It was<br />

estimated that only 20 percent of the messages received<br />

by German agents were of value, but that those<br />

messages were extremely useful for operational intelligence<br />

and well worth the effort and expense. The<br />

same seems to be true of the Italian theater, where by<br />

and large, the Germans were able to obtain good<br />

results through agents and counterintelligence work.<br />

In the West, however, the picture was different. FAKs<br />

ill were successful up to a point, but their reports on<br />

apprehended Allied agents did not form the basis for<br />

any operational intelligence comparable to that carried<br />

on in the East. And as far as FAKa I, i.e., active<br />

espionage through and behind Allied lines, were concerned,<br />

German efforts were a dismal failure. In view<br />

of the successes achieved on other fronts, this may<br />

sound surprising but close analysis reveals several<br />

reasons for it.<br />

Until D-day in June 1944 there was no front line<br />

and the FAKs could not engage in active espionage by<br />

which they might have gained experience and developed<br />

the required machinery. In Russia and Italy, the<br />

necessary organization was developed over a period of<br />

years, whereas in France the Germans were faced with<br />

a new situation for which they could not be completely<br />

prepared.<br />

The Abwehr was reorganized on 1 June 1944, and<br />

was transformed into the military office under SS<br />

leadership. Direction of espionage came into the hands<br />

of party fanatics, who were little more than dilettantes<br />

in this field. A few days after D-day, the confusion<br />

that reorganization caused in the higher echelons<br />

hindered the study of current procedures and the<br />

carrying out of the necessary improvements. In the<br />

East and in Italy, experience was gained throughout<br />

the campaigns. The espionage machinery was in existence<br />

in June 1944, and the changeover amounted to<br />

little more than a change of name, higher administration,<br />

and command channels. This only slightly encumbered<br />

current work.<br />

In the Russian and Italian theaters of operations,<br />

the work of German agents was helped by the confused<br />

political and ethological situation. This facilitated<br />

both recruiting and employment of agents. In Russia,<br />

although the bulk of the population was wholeheartedly<br />

on the side of the Red Army, a considerable number<br />

UNCLASSIFIED 19


UNCLASSIFIED<br />

of Ukrainians, White Russians, and Cossacks, were to<br />

some extent pro-German. This made penetration of<br />

enemy organizations by agents comparatively easy.<br />

Only SS stupidity and unwillingness to arrive at a<br />

political compromise with some of the anti-Soviet<br />

groups in Russia and Poland ruined this fertile ground<br />

for German espionage. In the West, on the other hand,<br />

the Germans were faced by solid blocks of hostile<br />

populations. England, favored by the insular character<br />

of the country, was a particularly difficult problem for<br />

agents. By 1944, France also had become almost<br />

solidly united against the Germans as a result of the<br />

short-sighted manner in which the Germans treated<br />

the French.<br />

Directing secret service work is, perhaps more than<br />

any other kind of intelligence work, largely a question<br />

of personalities. Many agents do not work directly for<br />

a cause, but are mercenaries working for the officer<br />

who hired them. Often they do not even realize what<br />

cause they are working for. This requires a great deal<br />

of personal skill and knowledge of psychology on the<br />

part of the directing officer. In addition he must have<br />

detailed and accurate knowledge of the enemy, of local<br />

conditions and habits, and of tactical situations. He<br />

must work relentlessly and have a love for anonymity.<br />

Altogether the German character, so easily given to<br />

illusions, romantic speculations, and spectacular deeds<br />

does not lend itself too well to secret work. In that<br />

sense, the Germans obviously did not have the right<br />

personalities available when the invasion started. It is<br />

quite typical that, in order to reinforce their organization<br />

in the West, the Germans brought, from an<br />

army group in the East, the experienced commander<br />

of a FAK, an officer who had never worked in the<br />

West, but who knew France. It is reported that this<br />

officer, although at first quite unfamiliar with local<br />

conditions, achieved more in two weeks than his<br />

predecessor had attained in six months.<br />

In the East, there was no continuous front line, and<br />

the employment of agents, their infiltration through<br />

the enemy lines, and their return were comparatively<br />

easy. In Italy, the long coastal stretches on both sides<br />

of the country favored the employment of agents, since<br />

they could enter and return from enemy occupied<br />

territory by water around either end of the front. In<br />

the West, however, more or less continuous front lines<br />

existed - at least during the static phase of the <strong>war</strong><br />

- that hampered the regularity of such movements.<br />

The Allied employment of agents in the West gave<br />

the Germans little indication of Allied intentions. In<br />

the East, -communications behind the front lines were<br />

exceedingly poor as compared to the West, and the<br />

Russians, in order to gain important data about the<br />

enemy for their next operations, had to send their<br />

agents directly into the region in which they were<br />

interested. In the West, there was no technical difficulty<br />

in sending agents to Holland with missions<br />

covering anything between the Ruhr and the French<br />

Alps. The place of capture, therefore, meant very<br />

little unless the exact mission of the man became<br />

known, so that intelligence obtained by counterespionage<br />

in the West could be used for operational purposes<br />

only in an extremely indirect manner.<br />

Concerning the organization of the secret service,<br />

one other point needs emphasis - the dual chain of<br />

command of the intelligence reconnaissance units. For<br />

formation, direction, and administration they were<br />

first under the Abwehr and later under the Military<br />

Office of the National Security Office. The tactical<br />

employment of these units, however, was a function of<br />

the chief intelligence officer at army group and army<br />

level. He never personally directed agents, and almost<br />

never saw an agent himself. He could give orders and<br />

designate objectives to the commanding officer of the<br />

FAK who, in turn, had to take the steps needed to<br />

achieve the results desired by the chief intelligence<br />

officer. To this extent - i.e., in having an agent<br />

organization over which the local commander had little<br />

or no control - the Germans suffered from the same<br />

disadvantages as the Allies.<br />

Channels<br />

Distrust of the specialist was the chief factor in the<br />

strict limitations set by German Army orders to<br />

intelligence channels. In practice there was more<br />

freedom than appeared. The chief fault, as far as can<br />

be ascertained, was that, while the intelligence channel<br />

was efficient in the for<strong>war</strong>ding of information (Foreign<br />

Armies in Berlin was informed of new identifications<br />

in a matter of hours), the channel was not so effective<br />

as a means of exchanging ideas. The extent to which<br />

the G-2 of a field unit could discuss with his superior<br />

G-2s the day's information, and thereby outline the<br />

enemy situation with them, was severely limited by<br />

the fact that he was required to submit his ideas to<br />

his G-3 or his chief of staff. The influence of these<br />

operations officers in intelligence matters was, by<br />

Allied standards, far too great; for, instead of having<br />

the differences in appreciation straightened out over<br />

the telephone between G-2s, the chief of staff and<br />

even the commander, came into such discussions much<br />

too often. The result of such a procedure was that the<br />

intelligence picture at the various echelons frequently<br />

differed. This had two negative results. First, it did<br />

not help to raise the prestige of the intelligence officer<br />

20 UNCLASSIFIED


UNCLASSIFIED<br />

in the eyes of the rest of the staff. Second, it lessened<br />

the contact between intelligence officers of different<br />

echelons. Many divisions, for example, instead of<br />

placing reliance on the enemy division history folders<br />

produced for them by higher authority (a good feature<br />

of German intelligence), preferred to compile and keep<br />

up their own. The 65th Division in Italy, for example,<br />

built up its own division folder, relying largely on the<br />

results of its own interrogations.<br />

This extent of self-reliance often caused a lack of<br />

harmony in the solutions of the day-to-day problems<br />

in interrogation and appreciation which repeatedly<br />

plagued division, corps, and army intelligence officers.<br />

Foreign Armies<br />

There is little doubt that of the two agencies<br />

Foreign Armies East and Foreign Armies West - the<br />

one dealing with the eastern theater of <strong>war</strong> was the<br />

more valuable and efficient. After its initial grave<br />

errors in its judgment of Russian military strength<br />

and over-all <strong>war</strong> potential, the work of Branch Foreign<br />

Armies East improved steadily. There are several<br />

reasons for this superiority over Foreign Armies West.<br />

After the initial failure of the Germans to bring the<br />

campaign in the East to a quick and successful<br />

conclusion, General Halder, then chief of the Army<br />

General Staff, realized that intelligence methods had<br />

to be radically altered and improved. His choice for<br />

Chief of Foreign Armies East, Brigadier General<br />

Gehlen, was excellent, and it was due to the latter's<br />

personality and drive that the branch attained a<br />

degree of efficiency which, because of the lack of such<br />

leadership, Foreign Armies West never equaled.<br />

Branch Foreign Armies East profited by the fact<br />

that the direction of its theater of <strong>war</strong> was always<br />

under the OKH and the Army General Staff, and that<br />

its mission was simply to be the intelligence <strong>agency</strong><br />

for the OKH. This facilitated the coordination of all<br />

intelligence efforts. Foreign Armies West, on the other<br />

hand, suffered from an increasing influence of the<br />

OKW and its political leaders in the so-called "OKW<br />

Theaters", i. e., the Balkans and Italy, and later the<br />

West. The branch was, therefore, under the dual<br />

control of the OKW and the Army General Staff,<br />

which encumbered the coordination of work and the<br />

speedy solution of problems.<br />

Although certain intelligence sections, notably those<br />

dealing with the Balkans, the United States, and the<br />

Pacific, were shifted back and forth several times<br />

between Foreign Armies East and West, Foreign Armies<br />

East was, on the whole, allowed to concentrate its<br />

efforts on Russia alone. This meant that the branch<br />

could be organized on the basis of a functional rather<br />

than a geographical division of work, so that Section<br />

I dealt with operational intelligence, Section II with<br />

long-range research, statistical data, manpower, etc.,<br />

Section ill with translation and propaganda work,<br />

Section IV with all matters pertaining to Sweden,<br />

Section V with map and photographic reproduction,<br />

and Section VI with personnel administration. To a<br />

great extent, this avoided duplication. Foreign Armies<br />

West, on the other hand, dealt with a number of<br />

enemy armies and was organized according to countries,<br />

not theaters. The duplication resulting from this<br />

was realized by the Germans, and they created the<br />

office of an executive officer whose section was responsible<br />

for the intelligence of the Italian theater as a<br />

whole. For the western theater, separate sections dealt<br />

with the ·British, French, and American Armies and<br />

with other Allied forces, a separation which was not<br />

suited to the production of an harmonious intelligence<br />

picture.<br />

From 1941 until the end of the <strong>war</strong>, there was a<br />

continuous campaign and a gigantic front in the East.<br />

This enabled German intelligence to gain experience<br />

constantly and to develop and improve its methods of<br />

collecting and evaluating information. Although, in<br />

1941, the Germans knew very little about Russia and<br />

the Red Army, they were able in the course of the <strong>war</strong><br />

to establish a fairly adequate and reliable Russian<br />

order of battle. That the result of their labors was<br />

neither well used by the High Command nor much<br />

believed by Hitler, was not Gehlen'a fa_ult. _In._~he<br />

West, the Germans gained considerable insight into<br />

the organization of the British Army through and<br />

after Dunkirk. For the next four years, the German<br />

and Allied armies were in fighting contact only in<br />

North Africa and Italy, which hampered the continuous<br />

collection of intelligence by the Germans. They<br />

were able slowly to pick up knowledge about the new<br />

British and French Armies and the US Army in North<br />

Africa, Sicily, and Italy. It may be true, as the<br />

Germans claim, that on 6 June 1944, the new situation<br />

did not confront Foreign Armies West with any major<br />

surprise in order of battle, but it still remains very<br />

probable that the branch did not have too extensive<br />

a knowledge of Allied intentions.<br />

The center of gravity of German operations was in<br />

the East. The Russian campaign absorbed most of<br />

Germany's manpower and material. Accordingly, Foreign<br />

Armies East had a much greater staff at its<br />

disposal and was in a position to do more thorough<br />

work and to publish more detailed reports. As far as<br />

can be ascertained, Foreign Armies West never em-<br />

UNCLASSIFIED 21


UNCLASSIFIED<br />

ployed more than 100 people, whereas Foreign Armies<br />

East had, at its peak, several times that many.<br />

Foreign Armies West, not equipped to deal with<br />

economic matters, gave these only secondary treatment,<br />

and relied, to all practical purposes,on the<br />

efforts and results of the Field Economic Office (Feldwirtschaftsamt)<br />

in the OKW. Foreign Armies East<br />

paid increasing attention to the questions of the<br />

Russian industrial and armament potential, and organized<br />

Subsection IT for that purpose. Foreign Armies<br />

East even joined efforts with the Field Economics<br />

Office by taking as chief of Subsection II an officer<br />

who was also a specialist on Russia in the Field<br />

Economic Office, so that the work of both agencies<br />

was properly coordinated, and each office could utilize<br />

directly the facilities of the other for carrying out its<br />

work.<br />

Through Gehlen's outstanding personality, Branch<br />

Foreign Armies East gained direct influence over<br />

agencies whose efficient functioning was important to<br />

its success. The tactical employment of agents came<br />

directly under the branch, which was able to direct<br />

short-range secret intelligence in accordance with its<br />

day-to-day needs. In the West, there was no such<br />

simple chain of command, and the intellignece reconnaissance<br />

units did not do nearly so well.<br />

Such were the main reasons for the noticeable<br />

difference in efficiency between Foreign Armies East<br />

and West. Because of outstanding leadership, Foreign<br />

Armies East received all the support and cooperation<br />

it needed in order to increase its intelligence effort<br />

according to the needs of the German Army. Foreign<br />

Armies West, lacking such support, remained a small<br />

<strong>agency</strong> too busy with the day-to-day technical details<br />

of work to develop into the large central intelligence<br />

<strong>agency</strong> which the Germans needed for their great fight<br />

in the West. In neither case, however, while the<br />

Army's and the High Command's attitude to<strong>war</strong>d<br />

intelligence remained what it was, could these agencies<br />

carry out their mission adequately.<br />

Conclusion<br />

The results of this study are largely negative. It<br />

shows that the German approach to intelligence was<br />

a faulty one: insufficient attention was given to the<br />

subject as a whole, its importance was generally<br />

underrated, and the intelligence officer was rarely able<br />

to attain the prestige necessary for his job. For the<br />

first three years of the <strong>war</strong>, this had but little adverse<br />

effect on operations, but later the very success at arms<br />

which the Germans had enjoyed served only to increase<br />

their neglect of intelligence, so that, as the tide<br />

turned, they were unable to estimate correctly the<br />

extent of allied superiority. It would be untrue to infer<br />

from this that German intelligence was bad. Perhaps<br />

it would be more precise to call it "mediocre", and to<br />

say that its disadvantages were largely offset by the<br />

high military efficiency of the Germany Army as a<br />

whole.<br />

Because there is little that the Allied intelligence<br />

services can learn from the Germans, no attempt has<br />

been made in this study to collect every possible detail<br />

of German methods and their results. These have been<br />

merely outlined and only those aspects from which a<br />

lesson could be learned have been considered and<br />

emphasized. Some of the different methods used by<br />

the Germans point a moral, as in the case of their<br />

concentration on signal intelligence, their emphasis on<br />

low rather than high-grade ciphers, and their disregard<br />

for <strong>security</strong> in the dissemination of results. In other<br />

procedures, they stressed detail to an extent which we<br />

might well follow. Apart from these points, this general<br />

discussion of German methods can have at least the<br />

negative value to Allied intelligence of lessons in<br />

weaknesses.<br />

22 UNCLASSIFIED


NATIONAL SECURITY AGENCY<br />

JOURNAL ARTICLES<br />

WORLD WAR II<br />

GERMAN CRYPTOLOGY<br />

BACM RESEARCH<br />

HTTP://WWW.PAPERLESSARCHIVES.COM

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!