United States Coast Guard Unit 387 Cryptanalysis Unit

Last updated

The United States Coast Guard Unit 387 became the official cryptanalytic unit of the Coast Guard collecting communications intelligence for Coast Guard, U.S. Department of Defense, and the Federal Bureau of Investigation (FBI) in 1931. Prior to becoming official, the Unit worked under the U.S. Treasury Department intercepting communications during the prohibition. The Unit was briefly absorbed into the U.S. Navy in 1941 during World War II (WWII) before returning to be a Coast Guard unit again following the war. The Unit contributed to significant success in deciphering rum runner codes during the prohibition and later Axis agent codes during WWII, leading to the breaking of several code systems including the Green and Red Enigma machines. [1] [2]

Contents

The Rise of Unit 387

The U.S. Coast Guard (USCG) Unit 387 was established in the 1920s as a small embedded unit of the USCG. It did not become an officially named unit until 1931, when it was named the USCG Unit 387 by Elizebeth Friedman. [2] The United States government established this code-communications unit to intercept ship communications and track down prohibition law breakers because “rum runners” were increasingly using radio and code systems for communication. There was an increasing need for code-breaking and encoding capabilities to counter the rum runners, as they were sophisticated criminals attempting to intercept government communications as well. [3] By 1927, the USCG intercepted hundreds of messages but lacked the resources and personnel needed for codebreaking. Therefore, the U.S. Treasury Department appointed William and Elizebeth Friedman, a couple famous for cryptology, to create new code systems for the USCG operations against the prohibition violators and to decrypt the messages accumulating. [4]

The Friedmans were famous cryptographers with expansive careers in Washington DC for the U.S. army, navy, Treasury and Justice Departments throughout WWI and WWII. In 1927, the rum runners commonly used two coding systems, switching them every six months. By mid-1930, rum runners significantly increased their coding abilities having virtually every rum boat use its own coding system. From April 1929 to January 1930, the San Francisco intelligence collection station alone intercepted 3,300 messages and discovered approximately 50 distinct secret coding systems which varied with up to five subsystems of codes and ciphers used by the rum runners. [5] Between 1927 and 1928, the USCG unit successfully reduced the flow of illegal smuggling by 60 percent, from 14 million gallons of liquor to 5 million, by breaking these coding systems. [4] An example of their successes took place on 29 September 1930, when the unit intercepted a message sent by a shore station in Vancouver, British Columbia intended for a rum runner operating in the Gulf of Mexico. The coded message contained five columns of 3-4 words each. When decoded by the unit, the message read “Henry cannot take goods now. Proceed 50 miles east Briton Island and give to Louis when he comes.” [5]

Their successes were in part due to the USCG interception and decryption capabilities, and their innovation in fusing together all-source intelligence such as human intelligence (HUMINT), imagery intelligence (IMINT) and communications intelligence (COMINT). The cryptanalytic unit used USCG patrol boats with high-frequency direction finding gear (HFDF, also nicknamed “Huff Duff”) created by William Friedman, and Elizebeth's code-breaking expertise to locate illicit radio stations and rum runners at sea. [4] The USCG today credits these operations as the first tactical law enforcement use of COMINT in U.S. history. [5] Elizebeth alone decrypted approximately 12,000 messages between rum runner networks over a three-year time span. [4] The unit decrypted a total of approximately 25,000 messages per year during prohibition. Following this success, the USCG requested that Elizebeth contribute more to their expanding operations, including codebreaking smugglers’ communications and aiding USCG partners such as the Customs Bureau and Secret Service. The U.S. Treasury Department officially transferred her to the Coast Guard in June 1931 to work as a cryptanalyst and to build up a new, official cryptanalytic unit within the Coast Guard. She began hiring and training young professionals to be cryptanalysts, women with expertise in stenography and men with backgrounds in physics, chemistry, or math. These young professionals trained in cryptanalysis officially became USCG Unit 387. [5] The successful techniques in codebreaking and use of HFDF technology were later used by the unit in its clandestine operations in WWII, collecting information in Central and South America. [4]

Unit 387 Involvement in WWII

Following the repeal of the prohibition, the USCG Unit 387 continued intercepting communications to counter smugglers attempting to evade liquor taxes and traffic narcotics. As the unit intercepted these communications, they discovered similar message traffic that, once decrypted, suggested non-neutral activities between Axis agents and Latin America. As worldwide aggression intensified in the 1930s, the U.S. Treasury Department requested Elizebeth Friedman and Unit 387 to officially shift focus from counter-narcotics to non-neutral communications in March 1938. [4] The U.S. Treasury Department expanded the unit's functions to include monitoring ships and communications between Germany, Italy, and Central and South America. The U.S. Navy absorbed the USCG Unit 387 under the name OP-20-GU, and later OP-G-70, in 1941. [2] The main responsibilities included monitoring worldwide clandestine radio intelligence and COMINT collection. [4] Although the unit was unofficially conducting clandestine operations, the Coast Guard was officially assigned to clandestine operations outside of the Western Hemisphere, and within the Western Hemisphere in joint operations with the FBI on 30 June 1942. [2]

The unit discovered that several commercial firms in Mexico and Central and South America were encrypting communications with Germany, breaking the neutrality laws. [1] Throughout WWII, the unit used HFDF technology to intercept approximately 10,000 enemy communications from 65 German clandestine networks [5] and played a key role in cracking the “Enigma G” Code of the Green Enigma, the Red Enigma, the Berlin-Madrid Machine, and the Hamburg-Bordeaux Stecker codes. [1] [6] Their HFDF stations expanded to cover the United States with 20 primary stations, nine secondary stations, six contributory stations, and five Coast Guard radio stations. The USCG also had Cutters, trucks, briefcases, and handbags with HFDF technology inside to track “wildcat” stations across the US. [4]

The FBI Director J. Edgar Hoover believed that intercepting messages of German agents in Latin America would be instrumental in eliminating Nazi spy networks in the US. Therefore, the Coast Guard Unit 387 also aided the FBI in intercepting and decrypting messages beginning around May 1940. [5]

Unit 387 Efforts in Deciphering Codes

In January 1940, the USCG Unit 387 intercepted suspicious circuits which transmitted one to five messages a day. Initially, the operators did not know the method or language of the enciphered text, which delayed success in attempts to solve the message codes. Once the Coast Guard intercepted sixty to seventy codes, it became apparent that the language used in the enciphered text was German and the encryption method used was likely a word separator. The operators knew the messages were in flush depth, [1] a ciphering term which means the encrypted messages were correctly superimposed, each starting at the same point in the key. [7] They discovered that the intercepted messages were likely enciphered using a commercial Enigma machine due to the indicators of language used and the observation that “no plain letter was represented by itself in ciphered text.” The Coast Guard had a copy of the commercial version Enigma as well as manufacturer's instructions for use. The instructions hinted at the common practice of using “X” as a separator of words and using numbers to represent their equivalent letters as displayed on the keyboard of the Enigma machine. An example of this number-word pairing is “1-Q, 2-W, 3-E, 4-R, 5-T.” After discovering the first 32 alphabets, Unit 387 created a technique for solving the reflector and successive wheels of the commercial Enigma machine, which led them to have a complete solution to all wiring of that machine. [1]

In 1940, the Coast Guard intercepted messages that were transmitted over a Mexico-Nauen circuit. When decrypted, the messages contained a series of numbers that represented pages and line numbers of a dictionary. The cryptanalytic unit discovered that two number series repeated at the end of several messages and after some experimentation, they realized the number series spelled out “Berlin” and “Bremen.” The unit used these values for other messages intercepted and deciphered additional words: two German Agent's names “Max” and “Glenn,” several ship names, departure dates, and types of cargo. The unit was able to figure out the alphabet and associated numbers for the messages sent over this circuit. Eventually the unit also located the dictionary used to encode the messages, titled “LANGENSCHEIDTS TASCHENWOERTERBUCH der spanischen und deutschen Sprache.” They were able to decode all other messages sent using the dictionary code following this discovery. [2]

Between 1940 and 1942, the Coast Guard intercepted messages between Latin America and Germany most commonly using the Rudolph Mosse code and passing “to and from SUDAMERO and SUDAMERIAT, Mexico; SUDAMERIAT, Hamburg; and SUDAMVORST, SUDAMERO, and SUDAMERIAT, Berlin.” The Rudolph Mosse is a type of code with letters of each code group transposed and a fixed alphabetic substitution for each of the last two letters. [1] These messages became known as the OPALU messages. Axis agents would send the indicator “OPALU” as the first group of letters before sending the message. [2]

In 1942, Unit 387, with the help of the Federal Communications Commission (FCC) and the Radio Security Service (RSS) intercepted messages sent between stations called TQI2 and TIM2. They believed TQI2 was in Europe and TIM2 was in South America. Between October and December that year, the unit intercepted 28 messages. Applying the lessons learned from solving the commercial Enigma machine and the new techniques passed on by the British, the unit was able to solve the Green Enigma machine encrypting these messages. The British had determined wheel motion patterns used by many of the Enigma machines by German agents in Europe. Since Unit 387 was able to decrypt several messages between TQI2 and TIM2, text revealing the messages were communications between Berlin and Argentina, they were able to apply the British techniques to determine this new machine's wheel motion patterns and the monthly ring settings the agents used to encrypt the messages. The unit had an idea of the wheel patterns and monthly ring settings by January 1943, which was confirmed by messages sent between Berlin and Argentina in June and July that year. Following these messages, they knew they had cracked the Green Enigma machine. [1]

Following the success of solving the Green Enigma, the unit intercepted more communications between Argentina and Berlin encrypted on the Green Enigma on 4 November 1943. Using the known keys, the unit revealed the following message: “THE TRUNK TRANSMITTER WITH ACCESSORIES AND ENIGMA ARRIVED VIA RED. THANK YOU VERY MUCH. FROM OUR MESSAGE 150 WE SHALL ENCIPHER WITH THE NEW ENIGMA. WE SHALL GIVE THE OLD DEVICE TO GREEN. PLEASE ACKNOWLEDGE BY RETURN MESSAGE WITH NEW ENIGMA.” Messages were then sent from Berlin to Argentina confirming the arrival of the new Enigma machine. The Axis agents encoded these messages using the Kryha machine, of which the Coast Guard already had the keys. After reading the series of messages sent by German agents from Berlin to Latin America talking of new “Red” section keys, the unit decrypted the Red Enigma machine using similar methods. [1]

See also

Related Research Articles

Cryptanalysis Study of analyzing information systems in order to discover their hidden aspects

Cryptanalysis refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.

Ultra British designation for intelligence from decrypted enemy communications

Ultra was the designation adopted by British military intelligence in June 1941 for wartime signals intelligence obtained by breaking high-level encrypted enemy radio and teleprinter communications at the Government Code and Cypher School (GC&CS) at Bletchley Park. Ultra eventually became the standard designation among the western Allies for all such intelligence. The name arose because the intelligence obtained was considered more important than that designated by the highest British security classification then used and so was regarded as being Ultra Secret. Several other cryptonyms had been used for such intelligence.

Typex British cipher machine

In the history of cryptography, Typex machines were British cipher machines used from 1937. It was an adaptation of the commercial German Enigma with a number of enhancements that greatly increased its security. The cipher machine was used until the mid-1950s when other more modern military encryption systems came into use.

SIGABA American cipher machine

In the history of cryptography, the ECM Mark II was a cipher machine used by the United States for message encryption from World War II until the 1950s. The machine was also known as the SIGABA or Converter M-134 by the Army, or CSP-888/889 by the Navy, and a modified Navy version was termed the CSP-2900.

William F. Friedman American cryptologist (1891-1969)

William Frederick Friedman was a US Army cryptographer who ran the research division of the Army's Signal Intelligence Service (SIS) in the 1930s, and parts of its follow-on services into the 1950s. In 1940, subordinates of his led by Frank Rowlett broke Japan's PURPLE cipher, thus disclosing Japanese diplomatic secrets before America's entrance into World War II.

Elizebeth Smith Friedman American cryptanalyst and author (1892-1980)

Elizebeth Smith Friedman was an American expert cryptanalyst and author. She has been called "America's first female cryptanalyst".

Frank Rowlett

Frank Byron Rowlett was an American cryptologist.

TICOM was a secret Allied project formed in World War II to find and seize German intelligence assets, particularly in the field of cryptology and signals intelligence.

The Cipher Bureau, in Polish: Biuro Szyfrów ([ˈbʲurɔ ˈʂɨfruf], was the interwar Polish General Staff's Second Department's unit charged with SIGINT and both cryptography and cryptanalysis.

Cryptanalysis of the Enigma ciphering system enabled the western Allies in World War II to read substantial amounts of Morse-coded radio communications of the Axis powers that had been enciphered using Enigma machines. This yielded military intelligence which, along with that from other decrypted Axis radio and teleprinter transmissions, was given the codename Ultra. This was considered by western Supreme Allied Commander Dwight D. Eisenhower to have been "decisive" to Allied victory.

OP-20-G or "Office of Chief Of Naval Operations (OPNAV), 20th Division of the Office of Naval Communications, G Section / Communications Security", was the U.S. Navy's signals intelligence and cryptanalysis group during World War II. Its mission was to intercept, decrypt, and analyze naval communications from Japanese, German, and Italian navies. In addition OP-20-G also copied diplomatic messages of many foreign governments. The majority of the sections effort was directed towards Japan and included breaking the early Japanese "Blue" book fleet code. This was made possible by intercept and High Frequency Direction Finder (HFDF) sites in the Pacific, Atlantic, and continental U.S., as well as a Japanese telegraphic code school for radio operators in Washington, D.C.

The Signal Intelligence Service (SIS) was the United States Army codebreaking division through World War II. It was founded in 1930 to compile codes for the Army. It was renamed the Signal Security Agency in 1943, and in September 1945, became the Army Security Agency. For most of the war it was headquartered at Arlington Hall, on Arlington Boulevard in Arlington, Virginia, across the Potomac River from Washington (D.C.). During World War II, it became known as the Army Security Agency, and its resources were reassigned to the newly established National Security Agency (NSA).

The B-Dienst, also called xB-Dienst, X-B-Dienst and χB-Dienst, was a Department of the German Naval Intelligence Service of the OKM, that dealt with the interception and recording, decoding and analysis of the enemy, in particular British radio communications before and during World War II. B-Dienst worked on cryptanalysis and deciphering (decrypting) of enemy and neutral states' message traffic and security control of Kriegsmarine key processes and machinery.

Before the development of radar and other electronics techniques, signals intelligence (SIGINT) and communications intelligence (COMINT) were essentially synonymous. Sir Francis Walsingham ran a postal interception bureau with some cryptanalytic capability during the reign of Elizabeth I, but the technology was only slightly less advanced than men with shotguns, during World War I, who jammed pigeon post communications and intercepted the messages carried.

The Cipher Department of the High Command of the Wehrmacht was the Signal Intelligence Agency of the Supreme Command of the Armed Forces of the German Armed Forces before and during World War II. OKW/Chi, within the formal order of battle hierarchy OKW/WFsT/Ag WNV/Chi, dealt with the cryptanalysis and deciphering of enemy and neutral states' message traffic and security control of its own key processes and machinery, such as the rotor cipher machine ENIGMA machine. It was the successor to the former Chi bureau of the Reichswehr Ministry.

<i>Im Alone</i>

I'm Alone was a Canadian ship used as a rum runner during Prohibition in the United States. The auxiliary schooner was built in Nova Scotia in 1923, and for six years, she transported contraband alcohol. Another source says the ship was built in the United Kingdom. Her registry was in Lunenburg, Nova Scotia. I'm Alone was intercepted in the Gulf of Mexico off the coast of Louisiana by USCGC Wolcott on 22 March 1929, as the schooner was returning from Belize with liquor. The crew of I'm Alone disobeyed orders to stop and was shelled and sunk by USCGC Dexter. Seven of the ship's eight crew members were rescued. The eighth, a French Canadian boatswain, Leon Mainguy, died. The surviving crew members, including captain John "Jack" Randell, were arrested and jailed in New Orleans.

Wilhelm Tranow

Wilhelm Tranow was a very successful German cryptanalyst, who before and during World War II worked in the monitoring service of the German Navy and was responsible for breaking a number of encrypted radio communication systems, particularly the Naval Cypher, which was used by the British Admiralty for encrypting operational signals and the Naval Code for encrypting administrative signals. Tranow was considered one of the most important cryptanalysts of B-service. He was described as being experienced and energetic. Little was known about his personal life, when and where he was born, or where he died.

General der Nachrichtenaufklärung was the signals intelligence agency of the Heer, before and during World War II. It was the successor to the former cipher bureau known as Inspectorate 7/VI in operation between 1940 and 1942, when it was further reorganised into the Headquarters for Signal Intelligence between 1942 and 1944, until it was finally reorganised in October 1944 into the GdNA. The agency was also known at the OKH/Gend Na, GendNa or Inspectorate 7 or more commonly OKH/GdNA. Inspectorate 7/VI was also known as In 7 or In/7 or In 7/VI and also OKH/Chi.

Code Girls Women who served as code breakers for the US during WW II

The Code Girls or World War II Code Girls were a group of more than 10,000 women who served as cryptographers and cryptanalysts for the United States Military during World War II.

Hans Karl Georg Heinrich Pietsch was a German mathematician who was most notable for being a director of the Mathematical Referat of the Wehrmacht signals intelligence agency, the General der Nachrichtenaufklärung during World War II.

References

  1. 1 2 3 4 5 6 7 8 National Security Agency (13 April 2009). "The Cryptology of the German Intelligence Services" (PDF) via National Security Agency.
  2. 1 2 3 4 5 6 National Archives and Records Administration (25 April 2018). "History Of Coast Guard Unit 387 (Cryptanalytic Unit), 1940-1945" via Internet Archive.
  3. Burke, Colin. "What OSS Black Chamber? What Yardley? What Dr. Friedman? Ah, Grombach? Or Donovan's Folly" (PDF) via UMBC.
  4. 1 2 3 4 5 6 7 8 National Military Intelligence Association (2009). "National Military Intelligence Association American Intelligence Journal" (PDF) via American Intelligence Journal.
  5. 1 2 3 4 5 6 Smith, G. Stuart (28 April 2017). A Life in Code: Pioneer Cryptanalyst Elizebeth Smith Friedman. McFarland. ISBN   9781476669182 via Google Books.
  6. Foundation for Coast Guard History (2009). "The Newsletter of the Foundation for Coast Guard History" (PDF) via Foundation for Coast Guard History.
  7. National Security Agency (9 January 2014). "NSA BASIC CRYPTOLOGIC GLOSSARY" (PDF) via National Security Agency.