UNCLE SAM, DETECTIVE

THE detective work accomplished by the United States Government since its entry into the war has been worthy of a Sherlock Holmes, and yet few persons, reading only the results of this remarkably developed system, have realized that a Government heretofore finding it unnecessary to match wits with foreign spy bureaus has suddenly taken a high rank in this unpleasant but absolutely essential branch of war-making—as it has in all others. The public read of the intercepted dispatches from the Argentine to Germany by way of Sweden, and of the Bernstorff messages, but without a realization of the problem that a cipher dispatch presents to one who has not the key. And probably the average reader is unaware that, in both the army and navy, experts have been trained to decipher code messages, with the result that both the making and the reading of such dispatches have been reduced to an almost mathematical science. The PhiladelphiaPress, in outlining the instruction given in this important work at the Army Service schools, says:

What is taught the military will furnish an idea of the task of the code experts in the State Department, and of the basis of the science that has unmasked the German plans with respect to vessels to bespurlos versenktand of legislators to be influenced through the power of German gold.

“It may as well be stated,” says Capt. Parker Hitt—thatis, he was a captain of infantry when he said it—“that no practicable military cipher is mathematically indecipherable if intercepted; the most that can be expected is to delay for a longer or shorter time the deciphering of the message by the interceptor.”

The young officer is warned that one doesn’t have to rely in these times upon capturing messengers as they speed by horse from post to post. All radio messages may be picked up by every operator within the zone, and the interesting information is given that if one can run a fine wire within one hundred feet of a buzzer line or within thirty feet of a telegraph line, whatever tidings may be going over these mediums may be copied by induction.

In order that the student may not lose heart, it is pointed out in the beginning that many European powers use ciphers that vary from extreme simplicity to “a complexity which is more apparent than real.” And as to amateurs, who make up ciphers for some special purpose, it’s dollars to doughnuts that their messages will be read just as easily as though they had printed them in box-car letters.

At every headquarters of an army the intelligence department of the General Staff stands ready to play checkers with any formidable looking document that comes along in cipher, and there is mighty little matter in code that stands a ghost of a chance of getting by.

The scientific dissection of ciphers starts with the examination of the general system of language communication, which, with everybody excepting friend Chinaman, is an alphabet composed of letters that appear in conventional order.

It was early found by the keen-eyed gentlemen who analyzed ciphers that if one took ten thousand words of any language and counted the letters in them the number of times that any one letter would recur would be found practically identical with their recurrence in any other ten thousand words. From this discovery the experts made frequency tables, which show just how many times one may expect to find a letter e or any other letter in a given number of words or letters. These tables were made for ten thousand letters and for two hundred letters, so that one might get an idea how often to expect to find given letters in both long and short messages or documents.

Thus we find the following result:

Letters10000200A77816B1413C2966D4028E127726F1974G1743H59512I66713J511K742L3727M2886N68614O80716P2234Q8..R65113S62212T85517U3086V1122W1763X27..Y1964Z17..

It is found that in any text the vowels A E I O U represent 38.37 per cent; that the consonants L NR S T represent 31.86 per cent, and that the consonants J K Q X Z stand for only 1.77 per cent. One doesn’t want to shy away from these figures as being dry and dull, because they form part of a story as interesting as any detective narrative that was ever penned by a Conan Doyle.

For the usual purposes of figuring a cipher the first group is given the value of 40 per cent, the second group 30 per cent, and the last 2 per cent. And then one is introduced to the order of frequency in which letters appear in ordinary text. It is:

E T O A N I R S H D L U C M P F Y W G B V K J X Z Q.

Tables are then made for kinds of matter that is not ordinary, taken from various kinds of telegraphic and other documents, which will alter only slightly the percentage values of the letters as shown in a table from ordinary English.

Having gone along thus far, the expert figures how many times he can expect to find two letters occurring together. These are called digraphs, and one learns that AH will show up once in a thousand letters, while HA will be found twenty-six times. These double-letter combinations form a separate table all of their own, and the common ones are set aside, as TH, ER, ON, OR, etc., so they can be readily guessed or mathematically figured against any text.

Tables of frequency are figured out for the various languages, particularly German, and the ciphers are divided into two chief classes, substitution and transposition. The writer inThe Presssays:

Now you will remember those percentages of vowelsand consonants. Here is where they come in. When a message is picked up the army expert counts the times that the vowels recur, and if they do not check with the 40 per cent for the common vowels, with the consonant figures tallying within 5 per cent of the key, he knows that he is up against a substitution cipher. The transposition kind will check to a gnat’s heel.

When the expert knows exactly what he is up against he is ready to apply the figures and patiently unravel the story. It may take him hours, and maybe days, but sooner or later he will get it to a certainty.

If he has picked up a transposition fellow he proceeds to examine it geometrically, placing the letters so that they form all sorts of squares and rectangles that come under the heads of simple horizontals, simple verticals, alternate horizontals, alternate verticals, simple diagonals, alternate diagonals, spirals reading clockwise, and spirals reading counter-clockwise. Once one gets the arrangement of the letters, the reading is simple.

For instance, ILVGIOIAEITSRNMANHMNG comes along the wire. It doesn’t figure for a substitution cipher and you try the transposition plan. There are twenty-one letters in it, and the number at once suggests seven columns of three letters each. Try it on your piano:

ILVGIOIAEITSRNMANHMNG

And reading down each column in succession you get “I am leaving this morning.”

After passing over several simple ciphers as not“classy” enough to engage the reader’s attention, the writer takes up one of a much more complicated nature, which, however, did not get by Uncle Sam’s code wizards. Follow the deciphering of this example by Captain Hitt:

He began with an advertisement which appeared in a London newspaper, which read as follows:

“M. B. Will deposit £27 14s.5d.to-morrow.”

The next day this advertisement in cipher appeared:

“M. B. CT OSB UHGI TP IPEWF H CEWIL NSTTLE FJNVX XTYLS FWKKHI BJLSI SQ VOI BKSM XMKUL SK NVPONPN GSW OL IEAG NPSI HYJISFZ CYY NPUXQG TPRJA VXMXI AP EHVPPR TH WPPNEL. UVZUA MMYVSF KNTS ZSZ UAJPQ DLMMJXL JR RA PORTELOGJ CSULTWNI XMKUHW XGLN ELCPOWY OL. ULJTL BVJ TLBWTPZ XLD K ZISZNK OSY DL RYJUAJSSGK. TLFNS UVD W FQGCYL FJHVSI YJL NEXV PO WTOL PYYYHSH GQBOH AGZTIQ EYFAX YPMP SQA CI XEYVXNPPAII UV TLFTWMC FU WBWXGUHIWU. AIIWG HSI YJVTI BJV XMQN SFX DQB LRTY TZ QTXLNISVZ. GIFT AII UQSJGJ OHZ XFOWFV BXAI CTWY DSWTLTTTPKFRHG IVX QCAFV TP DIIS JBF ESF JSC MCCF HNGK ESBP DJPQ NLU CTW ROSB CSM.”

Now just off-hand, the average man would shy away from this combination as a bit of news that he really did not care to read. But to the cipher fiend it was a thing of joy, and it illustrates one of the many cases that they are called upon to read, and the methods by which they work.

As a starting-point the cipher-man assumed that the text was in English because he got it out of an English newspaper, but he did not stop there. He checked it from a negative view-point by finding the letterwin it, which does not occur in the Latin languages, and by finding that the last fifteen words of the message hadfrom two to four letters each, which would have been impossible in German.

Then he proceeds to analyze. The message has 108 groups that are presumably words, and there are 473 letters in it. This makes an average of 4.4 letters to the group, whereas one versed in the art normally expects about five. There are ninety vowels of the AEIOU group and seventy-eight letters JKQXZ. Harking back to that first statement of percentages, it is certain that this is a substitution cipher because the percentage does not check with the transposition averages.

The canny man with the sharp pencil then looks for recurring groups and similar groups in his message and he finds that they are:

AIIWG AII BKSM BKAI CT CTWY CTW DLMMJXL DL ESF ESBP FJNVX FJHVSI NPSI NPUXQG OSB OSY ROSB OL OL PORTELOGJ PO SQ SQA TP TP TLBWTPZ TLFNS TLFTWMC UVZUA UVD UV SMKUL XMKUHW YJL YJVTI.

Passing along by the elimination route he refers to his frequency tables to see how often the same letters occur, and he finds that they are all out of proportion, and he can proceed to hunt the key for several alphabets.

He factors the recurring groups like a small boy doing a sum in arithmetic when he wants to find out how many numbers multiplied by each other will produce a larger one. The number of letters between recurring groups and words is counted and dissected in this wise:

AIIAII45,which equals 3x3x5BKBK345,which equals 23x3x5CTCT403,no factorsCTWCTW60,which equals 2x2x2x5DLDL75,which equals 3x5x5ESES14,which equals 2x7FJFJ187,no factorsNPNP14,which equals 2x7OLOL120,which equals 2x2x2x3x5OSOS220,which equals 11x2x2x5OSBOSB465,which equals 31x3x5POPO105,which equals 7x3x5SQSQ250,which equals 2x5x5x5TLFTLF80,which equals 2x2x2x2x5TPTP405,which equals 3x3x3x3x5UVUV115,which equals 23x5XMKUXMKU120,which equals 2x2x2x3x5UVUV73,no factorsYJYJ85,which equals 17x5

Now the man who is doing the studying takes a squint at this result and he sees that the dominant factor all through the case is the figure 5, so he is reasonably sure that five alphabets were used, and that the key-word had, therefore, five letters, so he writes the message in lines of five letters each and makes a frequency table for each one of the five columns he has formed, and he gets the following result:

Col. 1.Col. 2.Col. 3.Col. 4.Col. 5.A 2A 9A 1A 1A 2B—B 3B 3B—B 7C 7C 1C 3C 4C—D 2D 2D 1D—D 3E 4E—E 2E 7E—F 3F—F 9F 3F 5G 9G—G 3G 2G 2H 3H 5H 3H 3H 2I 2I 2I 7I 17I 2J 5J 1J 6J—J 9K 6K 5K—K 1K 1L—L 19L 2L 5L 1M—M—M 7M 4M 3N 7N 3N 4N—N 5O 5O—O 9O 1O—P 7P 7P 8P 4P—Q 5Q—Q—Q 2Q 6R—R 1R 1R 6R 1S—S 8S 6S 12S 7T 7T 3T 5T 1T 14U 7U 3U 6U—U 1V 5V—V 2V 5V—W 3W 4W—W 5W 7X 2X—X 4X 8X 6Y 4Y 5Y—Y 3Y 7Z—Z 5Z 3Z—Z 3

Now, having erected these five enigmatical columns, Captain Hitt juggles them until he uncovers the hidden message, thus:

“In the table for column 1 the letter G occurs 9 times,” he says with an air of a man having found something that is perfectly plain. “Let us consider it tentatively as E.

“Then, if the cipher alphabet runs regularly and in the direction of the regular alphabet, C (7 times) is equal to A, and the cipher alphabet bears a close resemblanceto the regular frequency table. Note that TUV (equal to RST) occurring respectively 7, 7, and 5 times and the non-occurrence of B, L, M, R, S, Z (equal to Z, J, K, P, Q, and X, respectively).

“In the next table L occurs 19 times, and taking it for E with the alphabet running the same way, A is equal to H. The first word of our message, CT, thus becomes AM when deciphered with these two alphabets, and the first two letters of the key are CH.

“Similarly in the third table we may take either F or O for E, but a casual examination shows that the former is correct and A is equal to B.

“In the fourth table I is clearly E and A is equal to E.

“The fifth table shows that T is equal to 14 and J is equal to 9. If we take J as equal to E then T is equal to O, and in view of the many Es already accounted for in the other columns this may be all right. It checks as correct if we apply the last three alphabets to the second word of our message, OSB, which deciphers NOW. Using these alphabets to decipher the whole message we find it to read:

“‘M. B. Am now safe on board a barge moored below Tower Bridge, where no one will think of looking for me. Have good friends but little money owing to action of police. Trust, little girl, you still believe in my innocence although things seem against me. There are reasons why I should not be questioned. Shall try to embark before the mast in some outward-bound vessel. Crews will not be scrutinized as sharply as passengers. There are those who will let you know my movements. Fear the police may tamper with your correspondence,but later on, when hue and cry have died down, will let you know all.’”

It all seems simple to the man who follows the idea closely, but Captain Hitt proceeds to make further revelations of the art. He adds:

“The key to this message is CHBEF, which is not intelligible as a word, but if put into figures, indicating that the 2d, 7th, 1st, 4th, and 5th letter beyond the corresponding letter of the message has been used as a key it becomes 27145, and we connect it with the personal which appeared in the same paper the day before reading:

“‘M. B. Will deposit £27 14s.5d.tomorrow.’”

This is only one of the many methods for getting under the hide of a coded message that our bright men of the Army and their cousins of the State and Navy departments have worked out through years of study and application.

He—“And that night we drove the Germans back two miles.”

She—“Drove them, indeed. I’d have made them walk every step of it.”

The Host—“I thought of sending some of these cigars out to the Front.”

The Victim—“Good idea! But how can you make certain that the Germans will get them?”


Back to IndexNext