U.S.

September 27, 2013

Military Intelligence – this week in history September 27

Tags:
Ruth Quinn, Staff Historian
USAICoE Command History Office
Courtesy Photo
The SIS used this analog of the Japanese Purple machine to decipher Japanese diplomatic messages in 1940.

Purple is much more than color for signals intelligence

The SIS used this analog of the Japanese Purple machine to decipher Japanese diplomatic messages in 1940.

Sept. 25, 1940
By the spring of 1939, William Friedman’s teams of cryptologists had already achieved partial success with the Italian and German code-systems and the Japanese army systems. At the same time, the Navy had managed to break a number of the Japanese naval codes. But the biggest puzzle of all was the Japanese diplomatic cipher system, used by the Foreign Office in Tokyo for its most secret communications with its ambassadors serving abroad. This system was nick-named “Purple” – and it became the most legendary encipherment system in the history of cryptography prior to the computer age.

The first few Purple messages were intercepted in 1937. It took awhile for there to be enough traffic for the Signals Intelligence Service, or SIS, to even attempt to decipher them. The team expected the solution to follow the same pattern as the Enigma machine that the Germans had been using since the 1920s. They were quickly dismayed to find that the Japanese had implemented numerous ingenious adaptations and improvements to the Enigma, multiplying the difficulties of deciphering its code.

Ronald Clark, in his book “The Man Who Broke Purple,” explains the difficulty faced by Friedman and his expert team of SIS cryptologists:
“The first step in what seemed to be the impossible task of decipherment lay in collecting a certain minimum of traffic sent on one day – or, at least, sent with the same keys in operation, which was initially the same thing. The next step was to decide which permutation and combination of wiring could have been used to produce such a set of enciphered messages. If the decision was correct all messages sent on that particular day could be deciphered to produce intelligible plaintext. If not, not; and for month after month it was always not.”

It was slow, painstaking work. But gradually, the SIS team built up bits and pieces of deciphered traffic. In February 1939, General Mauborgne, the Chief Signal Officer, ordered Friedman to drop all of his other duties, and he and his staff concentrated solely on solving Purple. It became Friedman’s consuming passion, conducted in total secrecy, for an excruciating eighteen months.

In August 1940, the SIS had a breakthrough, which allowed them to build a mock-up of the Japanese encryption machine – called an analog. The Purple analog allowed the SIS analysts, to produce its first major, ungarbled, translated “solutions” of two PURPLE messages on Sept. 25, 1940. Ironically, this major success occurred just two days before Germany, Italy and Japan signed in Berlin the Tripartite Pact pledging all 3 of them to mutual support, an event which led to an unexpected, but useful, cascade of Purple messages. The Americans not only had the ability to read the diplomatic traffic, they had plenty of it to read.

Of course, there were plenty of issues that slowed down the process, such as the physical delay in passing encrypted intercepts from the field to the cryptographers in Washington, the small number of trained analysts handling a huge volume of traffic, and finding people who could translate accurately the deciphered messages. In spite of these obstacles, William Friedman had handed his government a tool which would change the course of history. As Clark writes, “By the autumn of 1940 there was available for the State Department, and for the Chiefs of Staff, a continuing flow of top secret information from Tokyo in which the Japanese leaders outlined their plans for the future and the strategy and tactics with which they were to be carried out.”




All of this week's top headlines to your email every Friday.


 
 

 
TRADOC

‘Start Strong:’ Every Army career starts with TRADOC

FORT EUSTIS, Va. — Through U.S. Army Recruiting Command, U.S. Army Center for Initial Military Training and U.S. Army Cadet Command, U.S. Army Training and Doctrine Command serves as the foundation for the “Start Strong” ...
 
 

Honoring Gold Star Mothers

As part of our commitment to never forget those Soldiers who gave all, the Army joins the Nation on Sunday in remembering the strength and sacrifice of its Gold Star Mothers. Since 1936, Congress has set aside the last Sunday in September to recognize the mothers of Service members who have died while defending our...
 
 

Remember Gold Star Mothers, Families

The term Gold Star Family is a modern reference that comes from the Service Flag. These flags/banners were first flown by Families during World War I. The flag included a blue star for every immediate Family member serving in the armed forces of the United States, during any period of war or hostilities in which...
 

 

New NCOER expected to more accurately assess Soldiers’ performance

WASHINGTON — On Aug. 1, the secretary of the Army approved the new Non-Commissioned Officer Evaluation Report. Implementation will be in September 2015. “The new NCOER will come out in five phases: inform, educate, train, roll-out and after-action review. Human Resources Command is beginning to build the NCOER into the Evaluation System now,” said Command...
 
 
Flooding1_20140918_S.Vasey

Water, water everywhere

Photos by Scott Vasey The remnants of Hurricane Odile brought significant rainfall to Fort Huachuca last week as shown in photos of Huachuca Creek Sept. 18. The storm made landfall as the strongest storm on record to hit Mexico...
 
 
_DSC9936

ISEC gains new senior enlisted leader

Timothy Toms Command Sgt. Maj. Ulysses Rayford, (center) U.S. Army Information Systems Engineering Command, accepts the sword of responsibility from Col. Patrick Kerr, ISEC commander (left), and Master Sgt. Christopher Paluzzi,...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


Directory powered by Business Directory Plugin