Thursday, November 29, 2012

Book review- Behind the Urals: An American Worker in Russia's City of Steel

In the 1930’s the main goal of the communist regime in the Soviet Union was the rapid industrialization of the country. New factories were built all over the country and farmers were brought in to work in them. The need for specialized labor also attracted some foreign engineers who were facing unemployment in their own countries due to the Great Depression.


A small group of foreigners who immigrated to the Soviet Union during that period were the ‘true believers’ in communism.

One of them was John Scott, son of radical economist Scott Nearing. Scott left the United States, that was at that time trapped in the Great Depression, and went to the Magnitogorsk area of the Urals in 1932.

Magnitogorsk had huge metal deposits and factories were built to exploit those resources. The communist regime was sparing no expense in importing the best foreign machinery and in attracting experienced engineers from abroad. Scott was able to participate in the industrialization of an agricultural society and in his memoirs he gives the reader a very clear view of what it was like to live and work in the Soviet Union of the 1930’s.

The everyday life was brutal. Accommodations were poor, fuel and food lacking and the work was very dangerous with people being injured or killed every day. The main problem was the lack of trained personnel. All the workers were peasants who had left their villages in search of a better life as factory workers. Some were hostile to the communist regime but the majority was happy to have left the fields and they spent their limited free time learning to read and write. Those who had already mastered the basics studied engineering.

Progress was hampered by the purges of the 1930’s and the search for imaginary spies and counterrevolutionaries.

An interesting aspect of the book is the analysis of the industrial centers in the Urals. According to Scott the decision to invest huge sums in the Ural industries had primarily a military character since they would be safe from invaders.  He calls these centers in Nizhny Tagil, Sverdlovsk, Chelyabinsk, Magnitogorsk, Perm, Ufa, Zlatoust, Berezniki, Solikamsk, Bashkortostan, Orsk and other areas  ‘Stalin’s Ural stronghold’.

Overall this is a unique book in the sense that the writer participated in one of the greatest social and economic experiments of the 20th century. Since the book was written in 1942, at a time when the Soviet Union was still in danger of military defeat, one wonders if the analysis of the Ural stronghold was meant to inform Anglo-American policy makers of the Soviet Union’s economic power and resilience.

Monday, November 26, 2012

Report on the war industry of the Soviet Union


There is a file at NARA called SOVIET UNION, SURVEY OF THE RECORDS OF THE BAND I (NR 3708 CBTM13 20293A 19420201).

It is a German estimate of Soviet industrial production in 1942. I assume that some of the information on this report comes from monitoring the internal radio and radio-teletype traffic between industrial centers.

It would be interesting to compare the data on this report (and others like it) with the ‘official’ numbers from Soviet/Russian sources. Unfortunately I could only copy the first pages of this large report (~300 pages):
 

Thursday, November 22, 2012

Don’t trust the fax comrade!

The wireless transmission of images was used by WWII participants for military purposes and by their news agencies. However radio-fax communications could be intercepted…

During WWII the Soviet Union had several radio-facsimile stations. Their transmissions were intercepted by the German signal intelligence agencies OKH/GdNA Group VI and Wa Pruef 7/IV. According to postwar reports they contained ‘hand-written communications, typewritten texts, drawings, and weather maps’ and ‘technical diagrams and charts’.

This wasn’t the last time that radio-fax communications of communist countries were compromised. According to Matthew M. Aid’s ‘The secret sentry’, p142 after the USS Pueblo was captured by the North Koreans in 1968 a USAF listening post in Japan intercepted its top secret documents being transmitted on the Pyongyang-Moscow radio-facsimile link.

Tuesday, November 20, 2012

Sunday, November 18, 2012

Russian Fish intelligence – A case of quantity over quality

As I’ve mentioned before the internal Soviet radioteletype network was intercepted during the 1930’s and 1940’s by the Germans and postwar by the Americans.

The intercepted plaintext traffic concerned economic and military matters and was of vital importance in finding out what was happening inside the Soviet Union.

However the Russian Fish intelligence was definitely a case of quantity over quality. This is clearly mentioned in several TICOM reports and matches the American assessment during the early cold war period.

Alexis Dettmann, head of cryptanalysis at the German Army’s cryptanalytic centre in the East -Horchleitstelle Ost, says in TICOM DF-112:

The monitoring and deciphering of internal radio traffic was not an assignment of army signal intelligence units but necessarily messages of internal networks were solved and worked on. Special offices in the former German army were occupied among other things with the reception of messages of Baudot circuits, the value of the results however belonged in a different sector. Even in the years 1938/39 a relatively simple devise was constructed which made it possible to reproduce directly on typewriters the Baudot messages which in part ware transmitted by high-speed transmitters. The results from the point of view of content in no wise corresponded to the expectations. Of the entire traffic monitored at great expense at best 10% was useful for economic leaders while military-political matters constituted hardly 1%.. The major portion of these messages was like the content of the long distance telephone messages and contained private or business affairs. It was learned that all these circuits were not only monitored and controlled by the NKVD but in many cases were directed by it, and that in all probability the GUP-NKVD was also responsible in large measure for the issue of cryptographic material for internal radio traffic.’


Otto Buggisch, a member of the cipher machine department of the German army’s signal intelligence agency, gives the same percentage in TICOM I-58:

Further on Russian Baudot – B. says that one Dipl. Ing. Gramberg came to group IV with him from In 7/VI (Army Signal Intelligence) and was used to translate the intercepted clear text in Russian Baudot. ‘’ 90% of it was unimportant’’.

The relative lack of importance of each individual message was also recognized by the Americans. According to NSA history ‘The Invisible Cryptologists: African-Americans, WWII to 1956’:

‘The ASA. effort to exploit Russian plaintext traffic began in 1946 with the part-time assignment of several linguists to the target. At that time, however, the Agency's emphasis was on the translation of encrypted messages, and the employment of scarce Russian linguists on plain text was judged to be unwarranted. Later, in May 1947, the effort was revised at the Pentagon. Individuals without security clearances or with partial clearances would sift through volumes of messages and translate all or parts of those determined to have intelligence value. Placed in charge of this group was Jacob Gurin, an ASA Russian linguist who had immigrated to the U.S. with his parents at the age of three.

……………………………………………………………………………………………………………………………………………

From the Agency's inception under William Friedman, its business was the breaking of codes and ciphers. Once the underlying text was revealed, individual messages were translated, and, after a reporting mission was established, selected ones were published on 3" x 5" cards. While individual decrypted messages could be extremely valuable, plaintext messages were most often preformatted status reports that were insignificant when considered singly. Jack Gurin was convinced that if these messages were assembled and analyzed in the aggregate, they could yield valuable information on Soviet defense capabilities.
 

For both the Germans and Americans the limited value of single messages was leveraged by the huge intercept volumes.

FMS P-038 ‘German Radio intelligence’ says: ‘At the experimental station the volume of recordings, which were made available to the cryptanalysis and evaluation sections of the Armed Forces Cryptographic Branch and the Evaluation Control Center of OKH, averaged ten million transmissions a day.

Information on the  Anglo-American interception is available in NSA history ‘On Watch: Profiles from the National Security Agency’s past 40 years’:

In addition to manual Morse, the Soviets were using a good deal of [redacted] among others. The Soviet plaintext problem was a SIGINT success story from the beginning, from the design of electro-mechanical processing equipment that could handle each new Soviet development to the painstaking analysis of the intercepted communications. A joint American-British effort against these communications in the nineteen-forties led to high intercept volume and new engineering challenges in the face of proliferating Soviet [redacted] techniques.

At one time the United States and Britain together were processing as many as two million plaintext messages a month, messages containing everything from money orders to birthday greetings. The production task was awesome, with analysts manually leafing through mountains of page copy, meticulously screening millions of messages. [redacted] The investment paid off, leading, to an encyclopedic knowledge of what was going on in the Soviet Union. Over 95 percent of what the United States knew about Soviet weaponry in the nineteen-forties came from analysis of plaintext radioprinter traffic. Almost everything American policy makers learned about the Soviet nuclear energy and nuclear weapons programs came from [redacted] radioprinter traffic, the result of fitting together thousands of tiny, selected pieces of the jig saw puzzle.’
 

Tuesday, November 13, 2012

Compromise of OSS codes in WWII – Part 2

In my piece on the compromise of OSS codes during WWII it was stated that Allen Dulles occasionally used diplomatic ciphers when his own systems where overloaded.

In 1943 the Germans were apparently able to read his messages enciphered on the M-138-A strip cipher. The question is whether this was an OSS strip set or the special set used by the embassy in Berne for diplomatic traffic.

Report SRH-366 ‘History of Army Strip Cipher devices’ says that the Army Signal Intelligence agency provided M-138 strips for OSS use in 1944.
 
This would mean that the system exploited by the Germans in 1943 was probably the diplomatic strip.

Friday, November 9, 2012

Wednesday, November 7, 2012

Insecure traffic of Soviet GHQ units

During WWII the radio traffic of Soviet units was one of the most reliable sources of information for the German Command. Through traffic analysis and D/F the numbers and location of units could be identified. In cases where the messages themselves could be decoded the Germans could anticipate enemy attacks.

In the first years of the war in the East the Germans could read practically all the Soviet codes. In the period 1943-45 however the SU upgraded its cryptologic security. The top level 5-figure code was enciphered almost exclusively with one time pad and the insecure 4-figure codes of the OKK type were replaced with SUV tables.

This meant that the work of the Germans codebreakers became much harder. However they were helped in their work by a serious error in the Soviet Union’s radio security. Special units controlled by the Soviet High Command (assault, engineers, artillery, supply) did not follow the strict protocols of the standard military formations nor did they use secure codes. These errors allowed the Germans to circumvent the new Soviet procedures.

By monitoring the traffic of the GHQ units assigned to large Soviet formations their concentrations and movements could be followed.


 

 
Source: FMS P-038 ‘German radio Intelligence’

Friday, November 2, 2012

Swedish Army codes and Aussenstelle Halden

During WWII Sweden was neutral but maintained close economic relations with Germany. The German signal intelligence agencies were interested in Swedish communications and they tried to solve their diplomatic and military systems.

Diplomatic systems

The Swedish diplomatic traffic was mainly enciphered with Hagelin cipher machines. The Germans analyzed the traffic but according to postwar reports could not solve it (although one message of 5.000 words may have been solved).

The Allies also targeted Swedish Hagelin traffic and had some success, mainly through physical compromise, but according to a report dated August 1944 (Fish notes report 102) ‘the keys have not been broken since January 1942 and none of this traffic has been read since June of that year’.


Military systems

The military traffic was intercepted and decoded successfully by a unit in Halden, Norway. This was outstation Halden (Aussenstelle Halden). This unit belonged to Feste 9 (Feste Nachrichten Aufklärungsstelle -Stationary Intercept Company) but was attached to the Halden Police battalion for administrative purposes. It was commanded by Lieutenant Thielcke.

The systems solved by the Germans were:
1). SC2 - Slidex type system, read in May ’43.

2). SC3 - 3-letter field code without reciphering, read in April ’43.

3). SC4 - 3-letter alphabetical code without reciphering, read in June ’43.
4). SRA1 and SRA5 - Grille/Stencil systems. First broken in the spring or summer of ’43.

5). SM-1 (Schwedische Maschine 1) - version of the Hagelin C-38. This was solved on operator mistakes and ‘depths’. Some details are given by Luzius, an expert on Hagelin cipher machines at the German army’s signal intelligence agency:
7. He was then asked whether they had achieved any other successes with this type of machine. He recalled that the Hagelin had been used by the Swedes, in a form known as BC-38. This was similar to the M-209, but with the additional security feature that, whereas with the American machine in the zero position A = Z, B = Y, etc., In the Swedish machine the relationship between these alphabets could be changed. He could not remember whether it had changed daily or for each message. He himself had worked on this machine and had solved a few messages. It had been an unimportant sideline, and he could not remember details; he thought that it had been done by the same method, when two messages occurred with the same indicators. This had only happened very rarely.

The report E-Bericht 7/44 of Feste 9 has some information on Swedish systems:





The people of Aussenstelle Halden were not successful with all the Swedish codes. According to ‘European Axis signals intelligence’ vol4 the high level grille HCA and the ‘large’ Hagelin (probably a version of the Hagelin B-211) were not solved.
The solution of the tactical codes and the C-38 allowed the Germans to build up the Swedish army’s OOB. Why were the Germans so interested in the army’s dispositions? It seems that in 1943 they contemplated an attack on Sweden.

Sources: European Axis signals intelligence’ vol4, CSDIC/CMF/Y 40 - 'First Detailed Interrogation Report on Barthel Thomas’, TICOM reports I-55, I-64, I-211, ‘Hitler’s war’, E-Bericht Feste 9 - 7/44

Thursday, November 1, 2012