TICOM

Last updated

TICOM (Target Intelligence Committee) was a secret Allied project formed in World War II to find and seize German intelligence assets, particularly in the field of cryptology and signals intelligence. [1]

Contents

It operated alongside other Western Allied efforts to extract German scientific and technological information and personnel during and after the war, including Operation Paperclip (for rocketry), Operation Alsos (for nuclear information) and Operation Surgeon (for avionics).

History

The project was initiated by the British, but when the US Army Chief of Staff General George Marshall learnt of it, it soon became Anglo-American. The aim was to seek out and capture the cryptologic secrets of Germany. The concept was for teams of cryptologic experts, mainly drawn from the code-breaking center at Bletchley Park, to enter Germany with the front-line troops and capture the documents, technology and personnel of the various German signal intelligence organizations before these precious secrets could be destroyed, looted, or captured by the Soviets. [2] [3] There were six such teams. [4]

OKW/Chi (High Command)

The Allied supposition that the Supreme Command of the German Armed Forces, the Oberkommando der Wehrmacht Chiffrierabteilung (abbreviated OKW/Chi) was the German equivalent of Bletchley Park, was found to be incorrect. Despite it being the top SIGINT agency in the German military, it did not set policy and did not co-ordinate or direct the signal intelligence work of the different services. It concentrated instead on employing the best cryptanalysts to design Germany's own secure communications systems, and to assist the individual services organisations. [6] These were:

Drs Huttenhain and Fricke of OKW/Chi were requested to write about the methods of solution of the German machines. [12] This covered the un-steckered Enigma, the steckered Enigmas; Hagelin B-36 and BC-38; the cipher teleprinters Siemens and Halske T52 a/b, T52/c; the Siemens SFM T43; and the Lorenz SZ 40, SZ42 a/b. They assumed Kerckhoffs's principle that how the machines worked would be known, and addressed only the solving of keys, not the breaking of the machines in the first place. This showed that, at least amongst the cryptographers, the un-steckered Enigma was clearly recognized as solvable. The Enigmas with the plugboard (Steckerbrett) were considered secure if used according to the instructions, but were less secure if stereotyped beginnings or routine phrases were used, or during the period of what they described as the "faulty indicator technique" - used up until May 1940. It was their opinion, however, that the steckered Enigma had never been solved. [13]

FA Discovery

The discovery in May 1945 of the Nazi Party's top secret FA signals intelligence and cryptanalytic agency at the Kaufbeuren Air Base in southern Bavaria came as a total surprise. [11] The province of Luftwaffe chief Hermann Göring, it has been described as "the richest, most secret, the most Nazi, and the most influential" of all the German cryptanalytic intelligence agencies. [14]

Russian "FISH" Discovery

German prisoners prepare the "Russian Fish" for loading and shipment to England, June 1945. Russian Fish.jpg
German prisoners prepare the "Russian Fish" for loading and shipment to England, June 1945.

The greatest success for TICOM was the capture of the "Russian Fish", a set of German wide-band receivers used to intercept Soviet high-level radio teletype signals. On May 21, 1945, a party of TICOM Team 1 received tip that a German POW had knowledge of certain signals intelligence equipment and documentation relating Russian traffic. After identifying the remaining members of the unit, they were all taken back to their previous base at Rosenheim. The prisoners recovered about 7 ½ tons of equipment. One of the machines was re-assembled and demonstrated. TICOM officer 1st Lt. Paul Whitaker later reported. "They were intercepting Russian traffic right while we were there…pretty soon they had shown us all we needed to see." [15] [16]

In Operation Stella Polaris the Finnish signals intelligence unit was evacuated to Sweden following the Finland/Soviet cease-fire in September 1944. The records, including cryptographic material, ended up in the hands of Americans.

See also

Notes

  1. Rezabek 2017, I Introduction.
  2. Parrish 1986, p. 276.
  3. Rezabek 2017, I Introduction: Origin of TICOM.
  4. Rezabek 2017, III The Teams.
  5. Rezabek 2012, IV Case Studies: FISH and the Jellyfish Convoy.
  6. Rezabek 2012, II The Targets: OKW/Chi (High Command).
  7. Rezabek 2012, II The Targets: GdNA (Army).
  8. Rezabek 2012, II The Targets: Chi Stelle (Air Force).
  9. Rezabek 2012, II The Targets: B-Dienst (Navy).
  10. Rezabek 2012, II The Targets: Pers ZS (Foreign Office).
  11. 1 2 Rezabek 2012, II The Targets: FA (Nazi Party).
  12. Huttenhain & Fricke 1945.
  13. Huttenhain & Fricke 1945, pp. 4, 5.
  14. Kahn 2000, p. 178.
  15. Rezabek 2012, IV Case Studies: Russian FISH.
  16. TICOM Team 1 Report Appendix 14: Baudot Equipment Report on Gen Der Nach. Aufkl. Gruppe VI

Related Research Articles

<span class="mw-page-title-main">Fish (cryptography)</span>

Fish was the UK's GC&CS Bletchley Park codename for any of several German teleprinter stream ciphers used during World War II. Enciphered teleprinter traffic was used between German High Command and Army Group commanders in the field, so its intelligence value (Ultra) was of the highest strategic value to the Allies. This traffic normally passed over landlines, but as German forces extended their geographic reach beyond western Europe, they had to resort to wireless transmission.

<span class="mw-page-title-main">Lorenz cipher</span> Cipher machines used by the German Army during World War II

The Lorenz SZ40, SZ42a and SZ42b were German rotor stream cipher machines used by the German Army during World War II. They were developed by C. Lorenz AG in Berlin. The model name SZ was derived from Schlüssel-Zusatz, meaning cipher attachment. The instruments implemented a Vernam stream cipher.

Cryptography was used extensively during World War II because of the importance of radio communication and the ease of radio interception. The nations involved fielded a plethora of code and cipher systems, many of the latter using rotor machines. As a result, the theoretical and practical aspects of cryptanalysis, or codebreaking, were much advanced.

<span class="mw-page-title-main">Fialka</span> Soviet cipher machine

In cryptography, Fialka (M-125) is the name of a Cold War-era Soviet cipher machine. A rotor machine, the device uses 10 rotors, each with 30 contacts along with mechanical pins to control stepping. It also makes use of a punched card mechanism. Fialka means "violet" in Russian. Information regarding the machine was quite scarce until c. 2005 because the device had been kept secret.

<span class="mw-page-title-main">Gisbert Hasenjaeger</span> German mathematician (1919–2006)

Gisbert F. R. Hasenjaeger was a German mathematical logician. Independently and simultaneously with Leon Henkin in 1949, he developed a new proof of the completeness theorem of Kurt Gödel for predicate logic. He worked as an assistant to Heinrich Scholz at Section IVa of Oberkommando der Wehrmacht Chiffrierabteilung, and was responsible for the security of the Enigma machine.

The Cipher Department of the High Command of the Wehrmacht was the Signal Intelligence Agency of the Supreme Command of the Armed Forces of the German Armed Forces before and during World War II. OKW/Chi, within the formal order of battle hierarchy OKW/WFsT/Ag WNV/Chi, dealt with the cryptanalysis and deciphering of enemy and neutral states' message traffic and security control of its own key processes and machinery, such as the rotor cipher machine ENIGMA machine. It was the successor to the former Chi bureau of the Reichswehr Ministry.

The Research Office of the Reich Air Ministry was the signals intelligence and cryptanalytic agency of the German Nazi Party from 1933 to 1945. Run since its inception by Luftwaffe chief Hermann Göring, the Research Bureau was a Nazi Party institution rather than an official Wehrmacht-run military signals intelligence and cryptographic agency.

The Pers Z S was the signals intelligence agency of the German Foreign Office before and during World War II. It consisted of two cryptologic sections. Pers Z S was the cryptanalytic section which was called Special Service of Z Branch of the Foreign Office Personnel Department. Its mission was the solution of foreign diplomatic codes and ciphers. The other section, which was the Cryptography Section was called Personal Z Cipher Service of the Federal Foreign Office. The latter section was responsible for compilation, distribution and security of Foreign Office codes and ciphers. Both were colloquially known as Pers Z S. Though similar in nature and operation to the OKW/Chi cipher bureau, it was a civilian operation as opposed to the military operation at OKW/Chi and focused primarily on diplomatic communications. According to TICOM interrogators it evinced an extraordinary degree of competence, primarily driven by a consistency of development not found in any other German signals bureau of the period. Pers Z S/Chi was the symbol and the code name of the Chiffrierdienst, i.e. the Cryptanalysis Department of Pers Z S. Although little is known about the organization, in the final analysis, Pers Z S labored at diplomatic cryptanalysis for a regime for which there were no diplomatic solutions.

<span class="mw-page-title-main">Wilhelm Fenner</span>

Wilhelm Fenner was a German cryptanalyst, before and during the time of World War II in the OKW/Chi, the Cipher Department of the High Command of the Wehrmacht, working within the main cryptanalysis group, and entrusted with deciphering enemy message traffic (Cryptography). Wilhelm Fenner was considered an excellent organizer, an anti-Nazi, an anti-Bolshevik and a confirmed Protestant and was known by colleagues as someone who was keen to continue working in cryptology after World War II. To quote military historian David Alvarez:

<span class="mw-page-title-main">Erich Hüttenhain</span>

Erich Hüttenhain was a German academic mathematician and cryptographer (Cryptography) and considered a leading cryptanalyst in the Third Reich. He was Head of the cryptanalysis unit at OKW/Chi, the Cipher Department of the High Command of the Wehrmacht.

Peter Novopashenny was before and during the World War I, a Russian Marine Officer and who worked as a cryptanalyst during World War II for the German Wehrmacht (OKW/Chi) cipher bureau, working on the Russian desk, deciphering enciphered Soviet communications.

<span class="mw-page-title-main">Walter Fricke</span> Cryptanalyst, mathematician and professor

Walter Ernst Fricke was a distinguished German professor of theoretical astronomy at the University of Heidelberg. He was a mathematician and cryptanalyst during World War II at the Wehrmacht signals intelligence agency, Inspectorate 7/VI from 1941 to 1942 (which would later become the General der Nachrichtenaufklärung. In 1942 he was transferred to the OKW/Chi Section IIb. His specialty was the production of codes and ciphers, and the security studies of Army systems. After the war he was director of the Astronomical Calculation Institute in Heidelberg, Germany.

General der Nachrichtenaufklärung was the signals intelligence agency of the Heer, before and during World War II. It was the successor to the former cipher bureau known as Inspectorate 7/VI in operation between 1940 and 1942, when it was further reorganised into the Headquarters for Signal Intelligence between 1942 and 1944, until it was finally reorganised in October 1944 into the GdNA. The agency was also known at the OKH/Gend Na, GendNa or Inspectorate 7 or more commonly OKH/GdNA. Inspectorate 7/VI was also known as In 7 or In/7 or In 7/VI and also OKH/Chi.

Ostwin Fritz Menzer was a German cryptologist, who before and during World War II, worked in the In 7/VI, the Wehrmacht signals intelligence agency, later working in that was the cipher bureau of the supreme command of the Nazi party, and later in Abwehr, the military intelligence service of the Wehrmacht. He was involved in the development and production of cryptographic devices and procedures, as well as the security control of their own methods.

Otto Buggisch was a German mathematician who, during World War II, was a cryptanalyst working in the cipher bureau, the Cipher Department of the High Command of the Wehrmacht (OKW/Chi) responsible for deciphering of the opposing forces Communications. He also dealt with the security control of own key procedures. Through research and revelations exposed by two Polish officers, late in the war, he recognized the true cryptographic weaknesses of the Enigma rotor cipher, key machine used by the German armed forces to encrypt their secret communications, in World War II.

Kurt Selchow was a Minister and Director of the Z Branch, the Signal Intelligence Agency of the German Foreign Office before and during World War II.

The Schlüsselgerät 39 (SG-39) was an electrically operated rotor cipher machine, invented by the German Fritz Menzer during World War II. The device was the evolution of the Enigma rotors coupled with three Hagelin pin wheels to provide variable stepping of the rotors. All three wheels stepped once with each encipherment. Rotors stepped according to normal Enigma rules, except that an active pin at the reading station for a pin wheel prevented the coupled rotor from stepping. The cycle for a normal Enigma was 17,576 characters. When the Schlüsselgerät 39 was correctly configured, its cycle length was characters, which was more than 15,000 times longer than a standard Enigma. The Schlüsselgerät 39 was fully automatic, in that when a key was pressed, the plain and cipher letters were printed on separate paper tapes, divided into five-digit groups. The Schlüsselgerät 39 was abandoned by German forces in favour of the Schlüsselgerät 41.

Hans Karl Georg Heinrich Pietsch was a German mathematician who was most notable for being a director of the Mathematical Referat of the Wehrmacht signals intelligence agency, the General der Nachrichtenaufklärung during World War II.

Hans-Peter Luzius was a German actuarial mathematician and economist. Luzius was most notable for his work oduring World War II on researching a method to cryptanalyse the M-209 mechanical cipher machine that led to the first recovery of key based on a crib, while he was conscripted to the Inspectorate 7/VI, the signals intelligence agency of the Wehrmacht, while based at Matthäikirchplatz in Berlin, close to Bendlerblock.

<span class="mw-page-title-main">German Army cryptographic systems of World War II</span>

German Army cryptographic systems of World War II were based on the use of three types of cryptographic machines that were used to encrypt communications between units at the division level. These were the Enigma machine, the teleprinter cipher attachment, and the cipher teleprinter the Siemens and Halske T52,. All were considered insecure.

References