Cipher Department of the High Command of the Wehrmacht

The Cipher Department of the High Command of the Wehrmacht (Amtsgruppe Wehrmachtnachrichtenverbindungen, Abteilung Chiffrierwesen) (also Oberkommando der Wehrmacht Chiffrierabteilung or Chiffrierabteilung of the High Command of the Wehrmacht or Chiffrierabteilung of the OKW or OKW/Chi or Chi) was the Signal Intelligence Agency of the Supreme Command of the Armed Forces of the German Armed Forces before and during World War II. OKW/Chi, within the formal order of battle hierarchy OKW/WFsT/Ag WNV/Chi, dealt with the cryptanalysis and deciphering of enemy and neutral states' message traffic and security control of its own key processes and machinery, such as the rotor cipher ENIGMA machine. It was the successor to the former Chi bureau (Chiffrierstelle) of the Reichswehr Ministry.

Short name
The name "Chi" for the Chiffrierabteilung ("cipher department") is, contrary to what one might expect, not in reference to the Greek letter Chi, nor anything to do with the chi-squared test, a common cryptographic test used as part of deciphering of enciphered message, and invented by Solomon Kullback, but simply the first three letters of the word Chiffrierabteilung.

German cryptology service structure during World War II
From the early 1930s to the start of the war, Germany had a good understanding of, and indeed a lead in, both cryptoanalytic and cryptographic cryptology services. The various agencies had cracked the French–English inter-allied cipher, the Germans with some help from the Italian Communications Intelligence Organization stole American diplomatic codes, and codes taken from the British embassy in Rome, that enabled the breaking of the cipher, leading to some gains early in the war. Although the Germans worked to ensure its cryptologic services were effective at the outbreak of the war, the service offerings fragmented considerably among the German armed forces. OKW/Chi had jurisdiction over all the military cryptologic bureaus, chairing the executive committee. However, for several reasons, including specialisation against opposing forces of a similar type, the inherent independence of agencies, and agencies vying for power and favour from Hitler, it was inevitable that the three military branches of German forces operated independently.

In total eight organizations operated within the forces, each operating on its own terms, even though OKW/Chi was considered the premier organization controlling both cipher creation and decipherment of enemy crypts. These eight bureaus which practiced cryptology were split between military and civilian control:

Military

 * OKW/Chi: The highest cryptologic bureau for the Wehrmacht supreme command.
 * General der Nachrichtenaufklärung: The high command of the German Army (Wehrmacht) OKH/Chi cipher bureau.
 * Luftnachrichten Abteilung 350: The OKL/Chi cipher bureau for high command of the Luftwaffe.
 * B-Dienst: (Observation Service) The Navy High Command OKM/Chi cipher bureau.
 * Abwehr: Military intelligence gathering and cipher bureau from 1941 to 1944.

Civilian

 * AA/Pers Z S: (AA) Auswärtiges Amt (Foreign Office Personnel Department) (Pers Z) Sonderdienst (Special Service of Unit Z) The Foreign Office cipher bureau decrypting diplomatic signals.
 * RSHA: The Reichssicherheitshauptamt (Reich Security Main Office), the main cipher bureau for Hitler's personal staff including the SS.
 * Forschungsamt: (Research bureau). Part of OKL and Göring's personnel cipher bureau.

Although OKW/Chi continually pushed for the integration of all five military services, it was last blocked in Autumn 1943 by Ribbentrop, Göring, and Himmler. It was not until 9 November 1944, that OKW/Chi was formally made responsible for control of all signals intelligence activities across all forces, by the order of Hitler.

Background
The OKW/Chi was one of the highest military agencies of the Wehrmacht, but with a dual focus: on cryptography, creating Germany's own secure communication systems, and the monitoring of enemy broadcasts and news analysis. As far as cryptanalysis was concerned, OKW/Chi tended to act as troubleshooter, providing the highest service to the Wehrmacht, instead of setting policy as its power to set military SIGINT was limited.

The unit began as the cipher section of the German Defense Ministry (Reichswehrministerium) in 1922. The Cipher Bureau (Chiffrierstelle) followed later in the 1930s. They were more interested in diplomatic communications than foreign military communications, which were in short supply, and viewed the diplomatic communications as a way to train staff during peacetime. With the rise of the Nazis, the unit grew from 10 people in 1937 to almost 200 people by the outbreak of World War II in 1939. By the end of the war, it had almost 800 individuals working there, and its focus had changed to strategy.

It was true that a certain amount of development and security work was always done. The original charter was obscure, but since the Army, Navy and the Air Force was each responsible for its own security development, the only defining commitment of OKW/Chi was to develop ciphers for the agents of the Abwehr. The separate branches were free to submit their own systems to OKW for security scrutiny. This was changed in October 1942, ensuring that no new ciphers could be introduced by the Armed Forces unless they were first checked by the OKW. OKW/Chi made some efforts to set up an additional section in section IV, but this work was buried within the organization with OKW/Chi remaining an organization that produced military intelligence.

Contrast this with Bletchley Park, the UK Government Code and Cypher School during World War II, the direct opponent of OKW/Chi, which had almost 12,000 personnel working at the end of the war. It had a singular focus on cryptanalysis services and an integrated strategy across all the services from the start of the war.

OKW/Chi was one of the primary targets of TICOM, the operation by the United States to seize military assets after the war. This article consists in part of material from those reports (See: Notes).

Key personnel
The most important individual at OKW/Chi was Chief Cryptologist Director Wilhelm Fenner, who was the Head of Main Group B, including Group IV Analytical cryptanalysis working with Specialist Dr. Erich Hüttenhain. A German by birth, Wilhelm Fenner went to high school in St Petersburg. His father was an editor of a German language newspaper. He moved back to Germany in 1909 to study at Berlin Royal Institute of Technology but was drafted into the Army when World War I started, eventually joining the Tenth Army, serving as an intelligence officer. After the war, Fenner met Professor Peter Novopaschenny, a former Tsarist cryptanalyst who taught Fenner the Black Arts of Cryptography, and who went on to become Chief of the Russian subsection of OKW/Chi. They both joined the Cipher Bureau in autumn 1922, initially working in temporary positions. The following year, Fenner was made chief of the Bureau. He worked there until just after the war, discharged on 19 June, eventually working as a car and cycle mechanic in Straubing.

Chief Cryptanalyst Specialist Dr. Erich Hüttenhain was a mathematician hired in 1937 to create a specialized cryptanalytic research unit to investigate enemy cryptologic systems and to test Germany's own cryptologic systems and processes. Together with Dr. Walter Fricke, Chief evaluator, also a mathematician of some distinction, and his assistant, he was also moved to England to be interrogated by TICOM after the war. Walter Fricke was then considered the official historian of OKW/Chi.

Colonel Hugo Kettler was an administrator who had commanded OKW/Chi from October 1943. His intimate knowledge of the working of OKW/Chi, enabled him to provide information to TICOM that the OKW/Chi archive papers had been moved to Schliersee.

Lieutenant Colonel Metting was a signals officer who worked up to command the Germany Armies cryptologic centre, Inspectorate 7/VI from November 1941 to June 1943. After working in the Signals Battalion on the Eastern Front for several months, he was assigned second in command of OKW/Chi in December 1943. After the war he was considered such a high-value target that he was moved to England to be interrogated by TICOM. He was Head of Main Group A.

Organization
The following information was prepared by TICOM agents, by comparing the interrogation documents of Colonel Hugo Kettler, Director Wilhelm Fenner, Dr. Walter Fricke and Dr. Erich Hüttenhain. TICOM believed that the information was correct.

1939 to summer 1944
OKW/Chi passed from peace to war without change to its organization. Preparations had been made in 1938 to define staff numbers but at the outbreak of the war, personnel were increased by about 30%. In 1939, OKW/Chi was called The Cryptologic Bureau (German: Chiffrierstelle) and was a part of the Inspectorate of the Signal Troops. At the start of the war The Cryptologic Bureau was commanded by Oberstlt (Colonel) Fritz Boetzel as Director of Operations with his deputy being Major Andrae. He was replaced by Colonel Hugo Kettler during summer of 1943.

The organization of OKW/Chi was broken down into four groups which were named Group I to Group IV.

In 1938, OKW/Chi had no mechanical aids to use for the quick decryption of enemy messages once the cipher was broken. Although major attempts were made to mechanize the process, it was realized only in late 1943 that additional specialist personnel would be needed, and they were not available.

OKW/Chi was primarily an intelligence gathering organization at this point, with its only commitment to develop ciphers for Military Intelligence (Abwehr). Each branch of the armed forces were free to submit their system for testing, but were under no obligation to do so. In October 1943, OKW/Chi gained control for cipher development across all military agencies by an order of Field Marshall Keitel, Chief of Staff of the Supreme Command Armed Forces (OKW).

Summer 1944 to March 1945
The organisation and mission of OKW/Chi changed significantly in the summer of 1944, principally centered on the attempted assassination of Hitler. Whereas OKW/Chi had supposed jurisdiction over all cipher agencies within the Armed Forces, after Summer 1944, Director Wilhelm Fenner persuaded Generalleutnant Albert Praun, General of the Communications Troops of the need to centralise all results and efforts within OKW/Chi, and to issue an order to that effect. After the order, OKW/Chi no longer acted like a service agency, but instead set policy and became the primary jurisdiction for all work done on cipher development, message decryption and associated machinery design and construction. The organisation changed significantly, with new commanding officers, more focus for Chi IV function and increased staffing levels.

OKW/Chi classified the manner of how they would work with other agencies. How they were classified depended on whether a particular agency had influential Nazi party members in their leadership. The Army had close ties with OKW/Chi but other classifications, for example, the Kriegsmarine and Luftwaffe proved more difficult to control and were never subordinate to OKW. Agreement was needed to ensure common process, control and cipher machinery. The Waffen-SS was considered a third classification. OKW had no control over it and special orders had to be issued to enable liaison to start.

OKW/Chi was organised into four principal groups headed by Colonel Kettler, with his deputy Major Mettig. These were the personnel section, Main Group A, Main Group B and Group X. Group A contained Section I, Section II and Section III. Group B contained Section a, Section b and Section c. Group A's assignment was the development of their own cryptographic systems and the interception of foreign radios and cables. Group B's assignment was cryptanalysis of foreign government communications, the development of mechanical cryptanalysis devices including training in such devices. Group X's assignment was the scanning and forwarding of deciphered telegrams to suitable offices including the keeping of a day book recording the most important data.


 * Chi I: Commanded by Captain (Hauptmann) Grotz. Also called Section 1, it controlled the interception of class 1 traffic. The job was one of liaison. The section head was briefed by the head of OKW/Chi and was also in contact with the cryptanalysts. On that basis he would give instructions to the intercept stations. It consisted of some 420 staff at the end of 1944 including the intercept station traffic. It consisted of three sections:


 * Referat Ia: It had control of signal intelligence cover for inter-state communications and control of fixed intercept stations and their branch stations. It contained two staff.
 * Referat Ib: Study of communications systems of foreign countries and consisted of two staff.
 * Referat Ic: Responsible for both the Abwehr and OKW/Chi's own telecommunications equipment, including deployment and upkeep. It contained two officers and 24 staff.


 * Chi II: Its position was similar to Chi I but while Chi I was a liaison organisation, Chi II was the interception organisation. It controlled directly the personnel at the main intercept stations at Ludwigsfelds and of the subsidiary stations at Treuenbrietzen and Lauf which was used to intercept encrypted diplomatic Morse network signals. The broadcasts picked up at Ludwigsfelds and other stations were carried by line to Berlin. They were immediately translated. It also developed and allocated German code and cipher systems. It consisted of three sections:


 * Referat IIa: Section IIa's activities varied, and included the following. Camouflage systems for use in German telephonic and radio communications. Passing of requests to monitoring services. Preparation of code and cipher manuals and working instructions. Ownership of key allocation policy. Security scrutiny. Investigation of loss and compromise. Captain Bernsdorf was in control of IIa and had some six staff.
 * Referat IIb: Developed German code and cipher systems (camouflage, codes and ciphers and telephone secrecy) and also advised on the production of keys and the supervision of production. Specialist Dr Fricke was in control of IIb and had some 14 staff.
 * Referat IIc: Controlled by Inspector Fritz Menzer with a staff of 25. Codes and ciphers for agents. Fritz Menzer was considered a Cryptographic Inventor Extraordinaire by cryptographic historian David P Mowry.


 * Chi III: Managed by Major Metzger. Its assignment was the monitoring of foreign press and propaganda transmissions. It evaluated those transmissions, reproduced and distributed the most important broadcasts. It also made and improved the radio receiving stations, managed the telegram system to and from Chi and ensured the operation provided a 24-hour service. It consisted of around 100 individuals by the end of the war. It was also responsible for the distribution of keys. It controlled the production, printing and distribution and control of outstations responsible for production of keys. It was controlled by Major Metzger and was managed by 25 officers and 215 staff.
 * Chi IV: Managed by Dr. Erich Hüttenhain, with the department name (German: Analytische Kryptanalyse), was the code breaking and translation service which took the raw material from Chi I intercept stations for decryption. This was considered the most important section of the service from an operational viewpoint. The bulk of the personal in Chi IV were linguists, engaged in code-breaking and translation. Also in Chi IV, from 1939, was a group of mathematicians headed by Dr Erich Hüttenhain, and organised on the same level as the linguists. By 1942, the mathematicians were grouped in a new subsection, Chi IVc, in recognition of their increasing importance. The mathematicians were considered a research group, whose job was to make the initial break into more difficult ciphers. When the cipher decryption became routine, it was handed to a linguist. In addition, Chi IV contained a subsection devoted to cipher development and security improvements. In connection of security improvements, an additional subsection was created in 1942, tasked with the development of cryptanalytic machines. It was managed by Dr Hüttenhain with two administrative staff. It consisted of four sections:


 * Referat IVa: Managed by Dr Karl Stein with a staff of 11. Its duties were the testing of accepted and new cipher procedures and devices (camouflage, codes and ciphers, and telephone security). The section's purpose was to determine the degree of security of devices and processes. It also tested newly invented devices.
 * Referat IVb: Managed by Wilhelm Rotscheidt with a staff of 28. Its duties were the development and construction of decoding devices and the deployment of decoding devices. This was specifically for the decoding offices of Chi and various departments of the Armed Forces and several Government departments.
 * Referat IVc: Managed by Dr Wolfgang Franz, it had a staff of 48. Its duties were the scientific decoding of enemy crypts, the development of code breaking methods and working on re-ciphering systems not solved by practical decoding.
 * Referat IVd: Managed by Dr Hüttenhain, he provided training and instructions. Conducted lectures and prepared tutorial materials.


 * Chi V: Managed by Dr Wendland with an administrative staff of two, with 22 desks. It was in charge of the teleprinter connections between Chi I and the intercept stations, and in addition provided a Siemens ADOLF teleprinter network for the Abwehr, at home and abroad. It ran the special communications service of Chi, also for the German High Command, Luftwaffe, Funkabwehr, Abwehr and AA/Pers Z. Monthly message rates were of 18-20000 teleprints.

It also conducted practical decoding of codes and ciphers of foreign governments, military attaches and agents.
 * Chi VI: Managed by Colonel Kaehler with an administrative staff of two and its main duty was the monitoring of radio and press. It was staffed mostly by personnel with newspaper experience and who prepared a daily news summary. In addition, special reports were occasionally created and sent to those departments which had a need for the material. Chi VI consisted of four desks.


 * Referat VIa: It conducted wireless interception and managed the sound recording machinery. It was also in charge of listening station Ludwigsfelde, provided analytical solutions to foreign re-encipherments, was in charge of communication between intercept stations and controlled the wireless equipment. It consisted of some 60 individuals.
 * Referat VIb: It managed radio news services and photographic image transmission. It consisted of some 60 individuals.
 * Referat VIc: It intercepted and monitored non-German radio broadcast services. It consisted of some 30 personnel.
 * Referat VId: This section evaluated radio broadcasts and press news. It published the Chi-bulletins, and created normal and special reports according to subject. It consisted of 12 personnel.


 * Chi VII: Managed by Oberstltn. Dr Kalckstein. Sometimes called Group X, its task was mainly administrative in nature. It scanned and forwarded deciphered telegrams, kept a day book, and consisted of four officers and nine other personnel. It consisted of two sections.


 * Referat VIIa: It kept the day book, and also evaluated and distributed VN-bulletins as necessary.
 * Referat VIIb: It organised and indexed messages into categories including family name, place names and subjects such as politics. It also distributed the information on cards as necessary.


 * Group Z: The department's duties was entirely administrative in nature. It looked after quarters, accounts, and staff deployments. Managed the organisation of internal offices and ran the political commissariat. It had a staff of 13.

Disintegration
By end of 1944 and the beginning of 1945, Chi had begun to disintegrate. Increasing bombing and difficult working conditions in Berlin forced Chi to transfer to Army Signal School (Heeresnachrichtenschule) (LNS) Halle (Saale) in Halle on 13 February 1945, with the cryptanalytic machinery left lying in the cellar of the Haus des Fremdenverkehrs, Potsdamer Straße, in Berlin. Message decryption continued on a limited scale. On 13 April 1945, Chi partially dissolved when Colonel Hugo Kettler dismissed all staff who wanted to go home. All remaining personnel of Chi again moved on 14 April by military train to Werfen station in Austria. It ceased to exist the next day. All papers and machinery were destroyed by burning in anticipation of the American forces, the American Ninth Army arriving in the next few days. All burnt material was thrown into the River Salzach next to the Werfen station.

No Verlässliche Nachrichten's (V.N's) (described below) were thrown into the River Salzach. V.N's from 1922 to 1939 were deposited in the archive of the Chef des Heeres in Potsdam. The V.N's for 1940-1943 were deposited at the Tirpitzufer 38–42, later renamed the Bendlerblock. The V.N's for the last year were all burnt.

Evaluation output
During the period of 1 January 1944 to 25 June 1944, Chi II, the evaluation of foreign language transmissions section, processed an average of 253 broadcast transmissions and 234 wireless news service reports were dealt with daily. Apart from the daily Chi reports, i.e. military, political, economic situation and commentaries, a further P/W report was issued on an average daily, and an espionage report nearly every day. In addition, special reports were sent to the following daily.


 * Amtsgruppe Ausland (Abwehr Foreign Intelligence Group) and Abwehr main group. These were sent about 45 separate reports daily.
 * Reich Ministry of Public Enlightenment and Propaganda. This was sent current material, especially for Soviet Legionaries.
 * Department of the Oberkommando der Marine Seekriegsleitung III, Naval Command, B-Dienst. This was sent all current Naval material, including about 57 communiques of the British Admiralty per day.
 * Department of the Foreign Armies West. All reports and material concerning the Invasion of Normandy.
 * Field Economics Office, Funkabwehr, Ag. Ansl., General Erich Fellgiebel, later Albert Praun, General Wilhelm Gimmler, OKH.

Chi II achieved these results in spite of having to work since the outbreak of the war without pause in day and night shifts, and since August 1943, owing to bomb damage, in a deep cellar and in cramped quarters.

Solution output
The number of encrypted intercepts that were solved, over the life of the Chi IV unit:


 * 93,891 line messages
 * 150,847 wireless messages
 * 244,738 cipher and code messages.

12.5% of this amount was due to traffic intercept received from Hungary. Around 33% of solutions to diplomatic traffic was received from the Forschungsamt. Rejects amount to 0.25%. Forty-one European and extra-European countries were monitored on a regular basis as well as Allied agents' codes and ciphers. Government codes and ciphers of 33 European and extra-European countries were worked on and solved.

Damage to working materials, e.g. burnt one-time pads, reciphering, and cipher texts, caused by air attacks were regularly made good by copies that had been safely stored elsewhere.

Linguistic output
The final output from Chi IVb, i.e. from the linguists, was the translation of decoded traffic into a product called Reliable Reports (Verlässliche Nachrichten), and were classified as Top Secret (German: Geheime Kommandosache).

The principal recipient of the most important VNs was General Alfred Jodl, Chief of Operations and Hitler, with a copies being sent to other agencies and archives and used for additional processing, for example, cribbing. That material which was considered of no importance was discarded. The linguistic section produced an average of 3000 VNs per month. Statistics on a month per month basis demonstrate the number of VN's produced, after sorting and rejection of unimportant texts. Note: the following statistics do not include the 6000 agent messages handed to the Funkabwehr (FU III).

TICOM seized most of the VNs which represent the traffic of 29 countries and are now available at the US National Archives for viewing. A Combined British and American team combed the VNs for Intelligence after the war and it was known that Churchill read a number.

Production process
All traffic intercepts were written out as a telegram card and sorted in the telegram registry. The telegram registry was a very large card index system that was designed to be as comprehensive as possible. The telegram was assigned various property values which uniquely defined it. The telegram was delivered as quickly as possible to the section head of the appropriate country desk. There the telegrams were divided according to four points of view:


 * Messages which could be read currently.
 * Messages worked on but not presently decipherable.
 * Unknown systems, i.e. those not yet analysed, but not presently deciperable, insofar as the telegram has failed to eliminate these.

The telegrams containing solved codes were stripped of encipherment and decoded at once. Messages enciphered with a code or cipher that was not solved was assigned to a cryptanalyst. Unknown telegrams were stored in the telegram registry, and observed for like types, frequencies, frequency of message intercept that Chi would like to be cleared before starting a systematic study of the code. Fenner stated that he did not think any clever cryptanalyst was allowed to work on more than two plain codes unless solution had reached a point where only decoding was involved. When messages were decoded the selection began.

Selection process
The practiced cryptanalyst can quickly determine whether a message contains a political or political, military-political news, administrative messages or those messages with content that could be used to provide intelligence. So called Passport messages, i.e. those messages sent to confirm the identity of an individual seeking a passport, were quickly spotted, likewise those only reporting press reports. Very few messages were of objective interest. Moreover, nothing was so apt to reduce the value of a particular VN, than to publish trivial information. Hence in selecting the VN's it was considered important to give:


 * daily situation reports of diplomatic representatives as the specific attitude of a particular countries government could be understood.
 * Information that helped to solve certain outstanding problems
 * new reports and instructions from foreign central government authorities to its Ambassadors, government minister, and other Plenipotentiaries and from them to the home office. after observations covering many years, about 7 times as many telegrams were deciphered as were issued as VN's.

Occasionally instructions were received regarding information that was of a particular or special interest and effort was focused but such instructions regularly coincided with what Fenner generally knew about current event. Fenner gave his colleagues as much leeway as possible in their choice of selection and it was possible since most cryptanalysts were professionals and professional objectivity was expected of the role. The many passport messages and messages containing information of an economic nature were of no interest to German High Command, and if they were included sometimes in a particular VN, as were even less significant items, it was usually due to the cryptanalyst attributing some additional significance, perhaps from personal information, that the eventual end reader of the VN, in the High Command did not know, as they were less informed, and ultimately less prepared. The question: What was the most important information? was, of course, never correctly answered, as the whole process was a subjective one. What seemed important and intensely interesting one day, in two years’ time could be unimportant and vice versa. Hence, Fenner and his colleagues took the view that it was better to issue some unimportant VN's than to fail to include some important ones. Fenner's attitude in this matter, could best be described by TICOM as


 * Let the senior command sift the grain from the chaff.

When army radiograms were solved, there was no hard or fast criteria for evaluation. A seemingly irrelevant message in which some new unit was named might, under certain circumstances, be more important than an order to attack, of which one already had knowledge from other sources. For this reason, deciphered army radiograms were never included in the daily VN's. They were termed VN's but followed a different process and given the appropriate attention in a different section. This process was separate from diplomatic intercepts, and involved evaluation of Call signs, the attempt to find some periodicity in the scheduling of call-signs and wavelengths; with preliminary evaluation, updates to the card index registry, the actual evaluation of the message and final evaluation resulting in an appropriate report.

Translation process
Good translation was the task that had the greatest importance attached to it within OKW/Chi. Translation was necessary due to the number of different languages used in intercepted messages. It was inconceivable that the officers engaged in dealing with the solved intercepts would be able to understand them all, especially since the grammar in messages often departed from normal conversational usage. At each desk, there was at least one translator analyst who knew the foreign language specific to that desk and German well enough too, such that in doubtful cases the translation could be shown to him for checking. It was expected that e.g. the language differences as the following should be handled directly:


 * gewisslich certainement
 * sicherlich surement
 * nur plus de, seulement
 * bloss pas autrement, simple
 * anscheinend probable
 * scheinbar apparent

Designations of offices and officials had to be translated correctly as well. Missing words or garbled messages were replaced by dots. Doubtful translations were enclosed by parentheses with a question mark. However, in the view of the multitude of newly appearing technical terms (Fachausdrücke) with one or another, may not have been correctly rendered. The deciding factor was always the grammatical sense and word structure of the VN, and any attempt at free elaboration of an incomplete reliable report was strictly forbidden. Personal remarks made on the VN were also strictly forbidden, otherwise it would have ceased to be a Verlässliche Nachricht. Therefore, if an item seemed important enough to be issued as a VN and if it was translated correctly it was issued as a VN.

Distribution
Each VN bore in the heading the designation OKW/Chi and VN, also an indicator whether sent by radio or cable. Then a note of nationality since language alone was not enough. Egypt, for instance, employed a French code. Furthermore, each VN had to contain data which made it a bona fide document; Date of message, and if present, the Journal number, or issuing office. Finally, each VN had in the lower-left corner a Distribution mark, e.g. ''Abw. 4 x.''. This meant that a total of four copies had been supplied to the Abwehr. This mark remained long after Chi ceased to be a part of the Abwehr, even when other offices were supplied copies. No exact list of recipients was on the sheet, so it was decided to write Abw ... x.. In the lower right hand corner, also on the last sheet, was a brief indication of the system, e.g. F 21. This meant France, system 21, i.e. the 21st system solved by OKW/Chi since World War I. The notation was sometimes more explicit, i.e. the entire formula for the code or cipher was given, e.g. P4ZüZw4 meaning Polish 4-digit code enciphered by an additive sequence (Zahenwurm), fourth system solved. Later these notations were usually made on the copy which remained in the section, and was only understood by the section anyway. A VN was not considered genuine without all these identity indicators. On many VNs, the initials of the responsible worker was written, and sometimes Fenner added his own initials that were added later, since it was impossible to read all VNs. VNs were reproduced using a typewriter and using Carbon paper, and a lack of paper meant the available supply became worse and worse as the war progressed. Not until 1944 did Fenner obtain permission to use Wachsplatten, a device created to print multiple copies. As soon as the copies were made they were sent to Leutnant Kalckstein who was changed with all further details. He kept the one copy which ultimately went to the Archive. These copies were inserted in binders, ordered chronologically and delivered to the Chef der Heeresarchive, located in 8 Hans von Seeckt Strasse, Potsdam, whenever it was assumed that Chi no longer had an active interest in them. All VNs up to about 1930 were delivered there. Before distribution, the most important passages in the messages were underscored by Kalckstein and his assistants. Fenner objected to this predigestion owing to the danger that the reader would scan these valuable documents just as fleetingly as he did others. They maintained that VNs should only reach the hands of those who had time to read them and most importantly understand them.

Publication
Publication of VNs was strictly forbidden. Each VN was classified as secret (German:Geheime Kommandosache) and was marked with the highest security protection. It was forbidden to speak about the VN outside the cipher bureau itself, and only inside with the immediate group a particular individual worked with. Every serious cryptanalyst knew the consequences of publication of a VN. When Ambassador Walter Page published the Zimmermann Telegram after World War I, the unit used this to prove how important exact decipherment is and how important it was that every cryptographic system was to be tested before being put into use.

Day-to-day operations
Friction in day-to-day activities occurred between Fenner and other personnel and military agencies, and was not considered satisfactory from an efficiency standpoint. Neither the head of Abwehr, nor indeed the head of OKW/Chi really understood the difficulties involved in cryptanalysis, nor the operational resources required for a specific task. A directive was issued to Fenner to break a particular American strip system by a particular Sunday. This was completed, purely by chance and hard work, and met the deadline. As Dr Hüttenhain stated:


 * From that point on, personnel were continually concerned that specific ciphers were to be broken to order.

OKW/Chi managed to keep up a continuous stream of VNs even when conditions started to become intolerable, primarily due to the continual bombing. OKW/Chi had been bombed out of its regular headquarters in the Tirpltzufer section in Berlin by November 1943, close to the Abwehr headquarters. From that point it was moved to temporary buildings which were unheated and sometimes without doors and windows. During the last three years of the war a continual thinning of the ranks reduced active personnel in Main Group B down to about 321 from a peak in 1941.

Interception input
All intercepts were centrally controlled by the unit in order that it did justice to the requirements of the recipients and the technical demands of deciphering at the same time to remove unnecessary duplication. The monthly averages for the period of January 1944 to June 1944 were as follows:


 * Wireless messages: 36,480
 * Press reports: 7,280
 * R/T transmission 20 minutes: 7,340
 * Line messages: 12,330

Intercept networks
OKW/Chi ran two distinct interception networks, which included legacy systems from previous agencies. The first system that was subordinated to Chi I, intercepted inter-state wireless traffic of enemy and neutral stations, that included enciphered and unenciphered telegraphic communications of diplomatic and military attache messages sent in Morse code and most messages were encrypted and received from enemy and neutral states. Messages picked up on this system were sent to OKW/Chi for decipherment. The second network's mission, which was subordinated to Chi II and Chi III, was to monitor foreign wireless news broadcasts, with all traffic sent in clear text, and included such news agencies as Reuters, and Domei, picture transmission as well as multiple enemy Morse code wireless transmissions, also of illicit transmissions, agents' messages and the secret press in Europe. The second system was also used for testing of new or special equipment.

The first network and by far the largest consisted of two large fixed signals intercept stations at Lauf, one at Treuenbrietzen, and outstations at Lörrach, Tennenlohe and branch stations at Libourne, Madrid, Sofia. These stations were subordinated to Chi I.

The Treuenbrietzen station was created in 1933 and used to pick up diplomatic traffic before the war. It was subordinated by OKW/Chi in 1939, but little is known about it since staff escaped to Werfen at the end of the war and they were never interrogated by TICOM. The Lauf station started life intercepting diplomatic traffic in 1933, but was also subordinated by OKW/Chi in 1939 and expanded considerably. It had three small intercept stations on its own. These were branch stations at Lörrach with eight intercept sets to track Swiss traffic, Tennenlohe was a backup/emergency station with five sets and there was a small station at Libourne in France, operating nine sets from 1943 and used to track Swedish and Turkish Traffic.

Lauf had between 200 and 250 people running it, including outstations with over 80 women after January 1944. It used around 90 receiving sets. TICOM primary witness to the running of Lauf was Specialist Flicke, who stated:


 * [Lauf's primary] mission was to intercept all diplomatic traffic including the traffic from the Polish underground.

Wilhelm F. Flicke (1897-1957) would later write a book at the request of the German Military in the 1950s of his experiences at Lauf. The book was called War Secrets in the Ether (which was restricted (English translation) by the NSA, and Britain, until the early 1970s). The Lauf station was intercepting 25000 messages per day by late 1942, but this changed when closer control was instigated in early 1943 to only focus on specific messages groups, dropping the message count down to about 10000 per day.

Flicke also conducted intercept operation against both the Soviet espionage group, the Red Orchestra, operating in France, Germany and the Low Countries, but also, chiefly against the Rote Drei, a Soviet espionage network operating within Switzerland. In 1949, Flicke wrote the Die rote Kapelle, Kreuzlinger, 1949. The information in the book is inaccurate and occasionally misleading. After the war, his reputation was damaged mainly due to his sister and estranged wife were living in the Soviet occupation zone of Germany. He died on 1 October 1957.

Out stations
The intercept network ran special stations called Out Stations, described by Colonel Mettig as being directly subordinated to Group I at OKW/Chi instead of Lauf and deemed to be fairly small and often in foreign countries. They were administered by the Abwehr. Two were known to exist, one in Spain and one in Sofia. The Sofia outstations had considerable difficulty in contact OKW/Chi often using shortwave radio. The Intercept organisation in Spain was called Striker (German:Stuermer).

The Spain outstation employed around 50 men, around 1941. Communication between this outstation and OKW/Chi was by wireless and courier. One outstation was first located in the German consulate in Madrid, later in 1942 it moved to a night club and later to the edge of the city in 1942 to avoid conflicting radio signals. Other branch stations existed, one in a cattle ranch in Seville. The Seville branch station was established to listen to West African colonial traffic, with a staff of about 8 men. A branch station also existed in Barcelona and on Las Palmas in the Canary Islands. The Barcelona outstation was designed to monitor naval radio traffic in the Mediterranean and the Atlantic and had a staff of about 10 men. The Las Palmas branch station was established to intercept Portuguese colonial transmitters, French West Africa Army radio stations and specific transmitters in international communities. It was staffed with four radio operators with two receivers. The Seville branch station had to be closed down to save it from being raided by the Spanish police and removed it to Seville itself. The Seville and Barcelona stations were closed down in the summer of 1944, after the Normandy landings with only Madrid remaining and operated until May 1945.

The outstations conducted work with the official approval of the host country, e.g. in Spain. Extreme and elaborate security precautions were continually in operation to keep the network secret. Outstation personnel were forbidden to mix with the locals, ordered to travel in small groups, married men could not contact their wives and single men were forbidden to marry Spanish women. Certainly it was known that certain men conducted clandestine meetings with Spanish women who were known to be in high positions in both the Spanish government and military.

Other outstations existed in Rome, Belgrade, Vienna, Budapest, Bordeaux, also in Greece.

The interception system control loop was controlled by Group I of OKW/Chi. Colonel Mettig would prepare a monthly report in conjunction with Chief Cryptologist Wilhelm Fenner, of the most interesting links (that a listening station had made) as he appreciated them, based on this knowledge. This was sent to Section IV who examined the links, made decisions as to what to listen for, and this was fed back to the intercept station in question via the Abwehr. The control loop was continually refined to ensure that language desks who were solving specific traffic received new intercepts specific to that desk.

OKW/Chi would also receive traffic from other military agencies. These included the Reichspost, OKW/Fu and the Forschungsamt (Research bureau)Hermann Göring's personnel cipher bureau.

Around 500 people worked on the Lauf interception network when outstations were included.

Second system
Little is known about the second intercept system, which had its main station at Ludwigsfelde with branch stations at Koenigsberg, Gleiwitz, Muenster and Husum, except that it was subordinated to Chi II and Chi III, and that Ludwigsfelde station was very well equipped with 80 receiving sets. It was completely destroyed by an air attack on 2 January 1944 and was not back in operation until the autumn of 1944. Colonel Kettler stated under TICOM interrogation that it kept up a monthly average of 7,280 press reports, 7340 phone transmissions, 36,460 wireless messages and 12,330 line messages during the period from 1 January to 25 June 1944.

The bulk of interception was either ordinary Morse code or radio telephone, with little attempt to expand into other traffic types, e.g. Baudot

Application process
Applicants to the unit were generally academics who had achieved a doctorate, or individuals who had passed the First major State Examination e.g. Staatsexamen. These included philologists, jurists, mathematicians and natural scientists with full command of one foreign language and some acquaintance with another. Mathematicians only required one language. A normal requirement for entry included a good civic reputation and being physically fit, with excellent vision. Candidates had to pass an examination to prove their linguistic or mathematical skills. If they passed the examination, and the candidate was assigned a probationary position, they became a planmässiger (temporary) or if they achieved a permanent position, they became a Uberplanmässiger (permanent).

Training
Training was a regular occurrence at OKW. Occasionally training would be provided in elementary cryptology for those personnel who were considered neither a strategic ally, nor an ally who was not directly involved with Wehrmacht operations. Sometimes advanced courses would be undertaken, for particular groups within Wehrmacht. However, most of the training was for OKW personnel. When Dr Hüttenhain started in 1937, he was trained for six months and practiced on low grade Spanish government military systems. Generally, when a new member joined, who could speak a foreign language, they started as linguists and were gradually introduced into cryptology, working for two days per week in the six winter months. Later, advanced courses for more able candidates were undertaken, but the candidates were expected to undertake significant research work and work on new problems almost immediately after completion. In November 1944, the courses were dropped.

Assignment of duties was the same for all candidates, except those candidates who had been assigned to a section, who had an Assessor. In that case, the candidate had to write and post a report every three months. A record of activities was all kept in a diary by the candidate that was shown every month to the section head. The candidate also had to show proficiency in a lower course in cryptology taken over two years. At the earliest, the candidate could apply after three years for admission to the Second major State Examination for life to become a Beamter of the Higher Foreign Language Service of the Armed Forces. Admission to the examination required the permission of the section head and the chief cryptanalyst. In preparation for the examination, the candidate undertook lectures on diplomacy, Armed Forces organisation, Patent law and organisation disciplinary law.

Examination process
On the first day, the candidate had to translate 20 lines of cryptographic text from a foreign language into German; testing some simple cryptographic system, e.g. a linear slide or disc or some similar device. Solution required the solving of some basic systems with an attached analysis and criticism. Mathematicians followed a slightly different approach, solving a problem from cryptologic mathematics. The total length of the course was 6 hours.

The Examination Commission consisted of Wilhelm Fenner, Dr Erich Hüttenhain, one of the candidate's teachers and a representative of the Armed Forces Administrative Office.

The commission rated the candidates' results in 9 grades ranging from deficient to praise worthy. If a candidate intended to become an administrator in the legal branches, one point extra would be given on the legal portion was given preference, before averaging. In case of ties, that candidate was given preference whose character was rated higher. If the candidate failed, they were allowed to try again after a year. No third examination was allowed.

Government councillor
Candidates who passed the examination were appointed as Regierungsrät (Governing Counciller) with all the attendant rights and privileges of a senior position in the German civil service, including the legal right to old age pensions and provision for widows. As they were now officials of the Armed Forces they were permitted to wear the uniform of that branch of the German Armed Forces and took the appropriate oath.

Since Fenner and Hüttenhain had no experience to tell whether the requirement for new personnel in the time allowed would be met, nor if the course and examination was sufficient to create competent cryptanalysts, provisions were made that changes were effected by agreement between the examining commission and the office concerned, e.g. omissions of certain legal questions, extension of time added to enable the solving of the cryptanalytic problem. There was no desire to make the course a deadly formal test that was quite out of accord with realities. It was also agreed that only such Beamte who had served their required terms, should wear a uniform, lest the public criticize the unit adversely, since only an expert could tell the Beamten officer uniform.

Fenner believed the new rules were of value. Now anybody could know who could and who could not become an official, and those promoted had the satisfaction of knowing they had won the promotion by merit.

The examination was a Pro forma matter, as it called for proof of real knowledge and ability. Both examiner and examinee were expected to concentrate. Weeks of hard preparation went into the examinations since, despite the constant changes, they had to be kept equally difficult. Conscientious observance of all regulations and adherence to established channels called for real knowledge of the subject and real responsibility was undertaken by Fenner.

Liaison with Hungary
Hungary was the first country that Germany established signal intelligence relations with in 1922. In the early 1920s OKW/Chi tried to make an agreement with the Austrian cipher bureau in the Ballhausplatz, but they refused to collaborate. The Austrians had personal contact with the Hungarian cipher bureau, who learned of the matter and within weeks sent two men to Berlin, including Wilhelm Kabina, and within a few hours of arriving, an agreement was worked out to collaborate. The agreement remained in effect for over 20 years and the terms were loyally observed. All material and results were exchanged with the Hungarian cipher bureau, and an attempt was even made to divide the work between the two departments, but this had not worked in practice. In urgent cases, messages were passed from Budapest to OKW/Chi by telegraph. In cases where they had failed to intercept an important message, a telephonic request would be sent to Budapest, and any gaps would be filled by telegraph. The Hungarians were considered excellent at solving plain Balkan codes, but had never had any success with Greek traffic. Hungary helped OKW/Chi to solve the American military Attaché system, called the Black Code, by providing materials covertly extracted and photographed from American diplomatic baggage. Wilhelm Fenner however, considered them on the whole indifferent cryptanalysts and not as good as OKW/Chi.

Liaison with Finland
The liaison with the Finland cipher bureau, the Signals Intelligence Office (Viestitiedustelutoimisto) was less complete. Fenner visited the agency in Helsinki in 1927 to explore collaboration with Chi, but found that the Finnish had barely any organisation, but three years later it was an equal partner in cipher work. The Finnish contribution was exact clever decipherment rather than an exchange of intercepts. Reino Hallamaa was the Director. They worked on plain Allied codes, the Brown and Gray codes and the strip cipher. The Finnish had a slight liaison with the Hungarians and had an exchange of visits but no material was exchanged. The Hungarian cipher bureau also had a liaison with the Italian cipher bureau, Servizio Informazioni Militare but again no material was exchanged.

Liaison with Japan
At the beginning of the war, a representative from the Japanese cipher bureau visited OKW/Chi and give them the originals of the Brown and Gray Codes. Wilhelm Fenner never found out how they obtained the originals. No material was exchanged with the Japanese cipher bureau at any point.

Liaison with Italy
A representative from the Servizio Informazioni Militare (SIM), Brigadier General Vittorio Gamba visited OKW/Chi at the beginning of the war, and OKW/Chi was surprised. Chi had heard that the Italian bureau had some kind of organisation, but did not realise that the bureau would approach Berlin without an invitation. Gamba's two-day visit led to an arrangement to collaborate on French material. Fenner visited Gamba in Italy to organise matters, but during the entire stay, Fenner never saw a table of organisation or other information which would give him any insight into the size and workings of the bureau. However, Fenner considered them good bargainers and thieves. The Servizio Informazioni Militare provided OKW/Chi with a captured Swedish diplomatic codebook, and in return they exchanged their workings on Romanian and Yugoslavian positions. The enciphered Yugoslavian system had called for a lot of patient work to solve and it had bothered Chi. The Italians also had a Turkish code that Chi was trying hard to break. The Servizio Informazioni Militare was also interested in the French Army and diplomatic codes and ciphers and these were exchanged by courier, as these were its weakest points. Later OKW/Chi received a solved American code that was used by the Military Attache in Cairo. Fenner suspected that they had captured the code book, as OKW/Chi had previously worked on solving the code, but had set it aside as possibly too difficult. OKW/Chi was reading all Italian codes and ciphers.

At the time when Rome was interested in help with French systems, OKW/Chi considered the codes too weak, and insisted that Italian codes be improved, as the risk of important leaks was too great. Fenner did not think that the SIM was actually trying to block, merely that it was unable to do anything satisfactory due to lack of competent personnel. Also there was not the same honesty as was found with the Hungarian and Finnish agencies. Then some of the cryptanalysts in Italy began to complain that Gamba was too old. After the Fall of the Fascist regime in Italy when Benito Mussolini was deposed on 24–25 July 1943, the Servizio Informazioni Militare turned to OKW/Chi for help and cooperation. Generaloberst Alfred Jodl, however, forbade any further liaison, and from that point on, no agency contact was made or material exchanged.

Relations with Auswärtiges Amt
Dr Erich Hüttenhain stated that fierce resistance was met from other departments at any attempt to control the security of all the ciphers and key processes. The OKW/Chi was never allowed to know details of the ciphers used by Foreign office. Even in mid 1944, when Generalleutnant Albert Praun issued a decree [Ref 5.2], that unified the security of own key processes of all the cipher bureaux within OKW/Chi, Pers Z S ignored the order. Kurt Selchow, the Director of Pers Z S, was strongly opposed to the idea and preferred to remain independent.

Defensive cryptology
Defensive cryptology in this context enables secure communication between two individuals, in the presence of a third party. During World War II, defensive cryptology was synonymous with encryption, i.e. the conversion of information from a readable state to apparent nonsense. The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients, thereby precluding unwanted people from doing the same. German Armed Forces relied on a series of devices and processes to accomplish this task.

German high-level cryptologic systems were insecure for a number of reasons, although they were considered brilliantly conceived by TICOM agents. Large outlays of both personnel and resources by the Allies cost Germany dearly, from 1942 onwards. For example, Admiral Doenitz stated at his Nuremberg trial:


 * The Battle of the Atlantic was nearly won prior to July 1942; when German losses were within reasonable limits. But they jumped 300 per cent when Allied aircraft, aided by radar; which came like an epileptic stroke, were used in the fight. He reported 640 to 670 submarines and 30,000 men lost as a result of British and American action.

The OKW/Chi cipher department report blamed Radar on new aircraft. It was never realized, even to the end of the war and the trials, that cryptanalysts of the Government Code and Cypher School at Bletchley Park had broken the Air Force (Luftwaffe) Enigma and read all Air Force communications from 1942 onwards.

The chief German cryptological machine for defense was the Enigma machine. The OKW/Chi and the German armed forces failed to understand how insecure the system was. The Wehrmacht had a generally uneasy feeling regarding Enigma and their own key processes and missed a number of opportunities to definitively prove this. These were:


 * In October 1939, captured Polish prisoners of war, one called Ruźek stated under interrogation that the Enigma was being worked on [in Poland] in conjunction with the French. This was the result of three deciphered German messages being found by the Germans in a captured Spanish ship in 1939. Three separate interrogations took place between 1939 and 1943 with the last in Berlin. No word of the Polish Bombe or Bletchley Park was ever leaked. This became known as Case Wicher and they convinced themselves that the Enigma indicator system was probably at fault. It was followed up by OKW but testing never recovered any weaknesses.
 * In early 1944, mounting losses at Nazi Germany's Kriegsmarine, resulted in a navy cryptanalyst Frotiwein being ordered to test the four rotor navy Enigma. He broke the machine with known wheels on a crib of 25 letters. The evidence was not strong enough to discontinue the use of the device. OKW/Chi helped conduct the test using their own machine and soon afterwards started development of the variable-notch rotor (German: Lueckenfuellerwalz).
 * After the War, interrogations by TICOM of Dr Hüttenhain revealed the following:


 * One Allied PW in North Africa had said the United States and British operated with a very large joint 'park' of IBM (Hollerith) machinery, but this interrogation was never followed up. No personalities whatever were known.

German military cryptographers failed to realize that their Enigma, T52 and other systems were insecure. Although many attempts were made to try and validate the security of the Enigma, which the whole of the Wehrmacht secure communication cryptographic infrastructure rested on, they failed. The reason for this was they were unable to conduct sufficiently deep security tests to determine how secure they were. They were also unable to put forth the costly practical effort required to solve them. Their security tests were theoretical only, and they were unable to imagine what a large concerted effort at traffic analysis could achieve. A security measure which would have proved productive was the issue of new Enigma rotors. However, so many Enigma machines were out in the field that it would prove impractical to update them. OKW/Chi also felt that even if a particular Enigma unit was captured, it would still be considered secure, since no process was known by OKW/Chi that could break it. They also had not advanced sufficiently in cryptology to realize what could be achieved by a large combined engineering team. The Allies had undertaken that effort and had been rewarded with huge successes. Germany was also unable to cryptanalyze British and American high-grade systems (Ultra) carrying critical Allied data. As a result, OKW/Chi had no hint that their own high-grade systems were insecure.

Curiously, a number of systems were under development at OKW/Chi and at other agencies which would have been considered secure. The introduction of the pluggable reflector (German: Umkehrwalze D) called Uncle Dick at Bletchley Park. It was introduced in Spring 1945 and made obsolete the Bombe. This necessitated the development of the new updated Bombe, called the Duenna. Dr. Huettenhain said in TICOM interrogation:


 * The [Air Force] had introduced the pluggable reflector, but the Army said it was too much trouble.

A number of other possibly secure systems were developed including Fritz Menzer’s cipher device 39 (SG-39) (German: Schlüsselgerät 39). Invented in 1939, it was designed to replace the Enigma machine, but delays over its design ensured it was never rolled out. Only three devices were built. The cycle for an unmodified ENIGMA is 16,900. When configured according to Menzer's instructions, the SG-39 had a cycle length of 2.7 × 108 characters—more than 15,000 times as long as the Enigma.

Although it was unknown whether these new systems would have made OKW/Chi processes and devices secure, it would probably have complicated the Allied cryptanalytic effort.

Mechanical aids
Development of OKW/Chi cipher machines rested with the Ordnance office. Although OKW/Chi remit was to analyze a number of devices to find their perceived weaknesses, they never constructed any themselves.

The chief German cryptological machine was the Enigma machine. It was invented by the German engineer Arthur Scherbius at the end of World War I, was regarded as antiquated and was considered secure only when used properly, which was generally not the case later in the war. Director Fenner was instrumental in getting them introduced into use. One item alone, the variable-notch rotor (Lückenfüllerwalze) would have made the Enigma secure after 1942.

The Siemens and Halske T52-E (German:Geheimschreiber) i.e. the G-Schreiber was considered a secure teleprinter. It was considered modern but not mobile enough. By the end of 1944 planned developments were halted with no further practical work undertaken.

Enigma
In October 1942, after starting work at OKW/Chi, the mathematician Gisbert Hasenjaeger was trained in cryptology by Dr. Hüttenhain. Hasenjaeger was put into a newly formed department, whose principal responsibility was the defensive testing and security control of their own methods and devices. Hasenjaeger was ordered, by the mathematician Karl Stein (who was also conscripted at OKW/Chi), to examine the Enigma machine for cryptologic weaknesses, while Stein was to examine the Siemens and Halske T52 and the Lorenz SZ-42. The Enigma machine that Hasenjaeger examined was a variation that worked with three rotors and had no plug board. Germany sold this version to neutral countries to accrue foreign exchange. Hasenjaeger was presented with a 100 character encrypted message for analysis. He subsequently found a weakness which enabled the identification of the correct wiring rotors, and also the appropriate rotor positions, which enabled him to successfully decrypt the messages. Further success eluded him however. He crucially failed to identify the primary and most important weakness of the Enigma machine: the lack of fixed points (letters encrypting to themselves), due to the reflector, was missed. Hasenjaeger could take some comfort from the fact that even Alan Turing missed the weakness. Instead, the prize was left to Gordon Welchman, who used this knowledge to decrypt several hundred thousand Enigma messages during the war.

Siemens & Halske T-43
The Siemens & Halske T43 T-43 (German:Schlüssel-Fernschreibmaschine) was a cipher teleprinter, which used a one-time key tape to supply a sequence of keying characters instead of mechanical rotor wheels as in other T-series models. The teleprinter was developed in 1943 and introduced in 1944. A serious defect was discovered in the T-43 by Section IVa head Dr Stein in early 1944, but this was corrected. The defect enabled the reading of T-43 messages. Later when TICOM found the device, it was tested and found that the key tape was only pseudo-random, confirming the T-43 was insecure.

Siemens and Halske T-52
The T52 secure teleprinter, was tested on an ongoing basis over the war period. Versions T-52A and T52-B were tested by Dr. Hüttenhain in 1939 and found in his words: to be extraordinarily insecure. Versions A and B were already in production. T-52C was tested by Dr Doering, a mathematician stationed at Inspectorate 7/VI, in 1942 it was found to be insecure and could be broken using a text of 1000 letters. T-52D was also tested by Doering with help from OKW/Chi decipherment machinery and found to be insecure. Both Versions C and D were still being produced even though they were known to be insecure. OKW/Chi had no control over production, with difficulties presented by Army high command accepting their faults. Version T52-E was tested by Dr. Hüttenhain using the new decryption machinery and found to be also insecure. By the end of 1944, production had ceased.

Lorenz SZ-40
The original Lorenz SZ-40 began development in 1937 by the Army Ordnance Development and Testing Group Signal Branch, in conjunction with C. Lorenz AG. Originally no help from OKW/Chi was requested, but in late 1937, Dr. Hüttenhain, Senior Inspector Menzer of OKW/Chi and Dr. Werner Liebknecht, a cryptologic tester from C. Lorenz AG, tested the first SZ-40 and found it could be broken with 1000 letters of text without cribs. Only 100 of these were produced. Model SZ-42 was produced and found to be insecure. Versions A, B and C were designed in conjunction with Dr Hüttenhain and his assistant Dr Karl Stein. It is unknown if versions B and C were tested, however, it was found that version A was also tested and found to be insecure.

Offensive cryptology
Given some encrypted messages ("ciphertext"), the goal of the offensive cryptologist in this context, is for the cryptanalyst to gain as much information as possible about the original, unencrypted data ("plaintext") through whatever means possible.


 * Insufficient cooperation in the development of one's own procedures, faulty production and distribution of key documents, incomplete keying procedures, overlooked possibilities for compromises during the introduction of keying procedures, and many other causes can provide the unauthorized decryptor with opportunities.
 * Dr. Erich Hüttenhain 1978

Rapid analytic machinery
Although OKW/Chi were ahead in the use of mechanical aids before the war, these were mostly electro-mechanical devices, and little use was found for newer valve or electronic based devices. In fact the use of electro-mechanical cryptanalytic devices fell during the war. Although some work was done to prototype working models, in general it was mostly experimental work. Experiments did show one thing, that paper tape was far too slow, and that the future was photo-electric scanning of text.

OKW/Chi developed a series of teleprinter tape devices, to examine the periodicity or repetition of text, which employed early designs of photo-electric readers. They employed paper tapes, rather than celluloid film, which was used by the Allies. By the end of the war, the first German film device was in construction. TICOM reported that it was similar to the USA developed Tetragraph-Tester (Tetragraph). It had speed of around 10k letters per second, against the USA development device at 500k letters per second.

Interrogation of Dr Hüttenhain of OKW/Chi IVa by TICOM revealed:


 * By 1941, it had become clear that machines would be necessary for the dual - offensive and defensive - task of research, but engineers were not obtained until Autumn 1942 when the following were appointed: Two graduate engineers, Willi Jensen and Wilhelm Rotscheidt. both telecom experts; three working engineers, TODT, Schaeffer and Krachel and 25 mechanics.


 * They decided to use IBM Hollerith machines wherever possible, but it was found that this machinery was not suitable for all problems. The machines which resulted were built in a more generalized way than the immediate problem demanded so that they could be used again.

The following machines were built:

Digraph weight recorder
The digraph, i.e. Bigrams weight recorder (German: Bigramm-Suchgerät) was a search apparatus for making frequency evaluations of digraphs and recording the results. It was used to find expected sequences of Bigrams, which with a certain probability attached, indicated a possible weak point in a cryptographic system. It was built at a cost of ℛℳ6400 Reichsmarks, $5800 at 1945 conversion rate, and was the most expensive machine owned by OKW/Chi.

It was used to break the Japanese two-letter code (J-19) and would find a solution in less than two hours. According to Dr Hüttenhain:


 * The machine was once used to work on an English meteorology cipher... used by the Air Force Weather Service

The device made the solutions of a single transposition (Transposition cipher) easy. A message being studied must be broken into likely columns, with these matched against each other, with the resulting bigrams (Digraphs) examined for their suitability.

It consisted of a two teleprinter reading head, a relay-bank interpreter circuit, a plugboard weight assigner and a recording pen and drum. Each head read the tape using a photo-electric reader at a speed to 75 characters per second. The interpreter took the two readings and translating then from two separate letters reading into one digraphic reading, which it sent to the plugboard.

The plugboard contained 676 relays on its left side, corresponding to the number of Bigrams available in the Latin alphabet. These could be wired at will to any jack in any one of the five different sets of relays on the right hand side of the plugboard; these sets representing weights, i.e. each bigram could be assigned a weight from 1 to 5. For example, (D->5), (I->3),(O->1),(P->1). In this manner, the digraph DE was given the weight 5, the digraph IL the weight 3, the digraph PC and OX the weight 1. All other bigrams had a weight 0.

The recording device was paper drum pen recorder, with the recording consisting of a cylindrical spiral, with undulations being recorded, whose heights varying with the weights assigned to the digraph. Two tapes with the message to be decrypted, were looped, with one tape being one or more character longer, so they would slide relative to each other. The result would be Kappa plot indicating, bigram by bigram, for every possible juxtaposition of the whole message against itself.

Analysis of the results would show visually (by dense undulations of the plot), along its length, the probability of a good match at each point along its length, became apparent.

It could also be used to discover coincidences (‘parallels’), which would be used to find interrupted repetitions.

Polygraphic coincidence counter
The Polygraphic coincidence counter (Frequency analysis) (German:Sägebock, English:Sawbuck) was a machine for recording the frequency of polygraphs occurring in a message, or for recording the frequency of polygraphic coincidences between messages. It was particularly useful for periodic substitutions. Polygraph sizes includes decagraphs. It had a cost of ℛℳ1580 Reichsmarks, $1200 at 1945 conversion rate.

The apparatus consisted of two teleprinters with paper tape photoelectric reading heads, a calculator (not described by TICOM) and ten different recorders. Each reader had a reading speed of 75 characters per second. Each recorder used a pen which made a dash on a paper strip 30 cm wide, wherever a signal was read from the calculator. During the first read of the full loop, each recorder would make a small vertical stroke every time a coincidence occurred. Thus, if there were 10 digraphic coincidences during the first full looping, the recorder number 2 made 10 small strokes, each above the other and so on. Another device, the trigram recording device output was chained to the bigram, and in a manner up to the Hasgram (10-gram) device. The devices automatically gave a Kappa plot for single characters, bigrams, etc. Although a hundred times faster that doing the method manually, working at 50 characters a second scanning speed for a text of 600 characters, it took two hours.

Dr Hüttenhain and Walther Fricke his assistant did not identify the types of cryptographic systems this device was constructed for. Dr Hüttenhain did state however:


 * The problem was to determine the periods in short periodic substitution by finding the distance between repeats in a message...It (the counter) could also find two Enigma machine messages in depth.

These types of machines were considered a class of Phase and Periodic Frequency Searching machines (German: Phase neuchgereat) also (German:Perioden-und-Phasensuchgerat).

Statistical Depth Increaser
The statistical depth increaser (German:Turmuhr, English:Tower clock) was a machine for testing sequences of 30 letters statistically against a given depth of similar sequences, to determine whether the message belonged to a given depth. (Substitution cipher)

It was used to decrypt the US Strip cipher when cribbing (Substitution cipher) was impossible. It cost of ℛℳ1100 Reichsmarks, $1015 at 1945 conversion rate.

The apparatus consisted of a single paper tape read with a standard teleprinter head, at a speed of 1.5 symbols per second. To paraphase TICOM - A storage device, by which any one of five different scores could be assigned, on a basis of frequency, to each of the letters in the 30 separate mono-alphabets that resulted from the 30 columns of depth; a distributor that rotated in synchronization with the tape stepping, and selected which set of 30 scores were to be used as basis for evaluating the successive cipher letters. A pen recording device was used.

Enciphered sections of encrypted test on the same generatrix (A curve that, when rotated about an axis, produces a solid figure), were superimposed properly. As a result, the letters within columns fell into successive and separate mono alphabets with characteristic frequencies. A new section of 30 letters of cipher text would have to "match" these alphabets, i.e., show a greater than random number of coincidences with them, before it could be added to this depth. The machine was used to test the probability of such a match. Weights were assigned each letter in each of the basic thirty alphabets, depending on the frequencies therein, and these weights were "stored" in the machine. Paper tape was read in sequences of 30 characters in succession. A long resultant stroke by the recording pen meant a greater total weight, therefore a long resultant stroke probably belonged to the basis set of superimposed sequences.

Dr Hüttenhain and Fricke stated:


 * The cipher text passages already recognized as the same key are stored in the calculating apparatus (not described to TICOM) of the tower clock as a basis on which to start. In such a way that each of the different substitution alphabets receive different scores according to the frequency of the cipher texts...

The machine was called Tower Clock because it ticked at every set of calculations.

Differencing calculator (non recording)
The Differencing calculator was a manually operated device which was designed to assist additive recovery in super-enciphered cipher coded messages, by speeding the differencing of depth of super-enciphered (codegroups) and the trail of likely additives therein. The machine cost of ℛℳ46 Reichsmarks, $40.00 at 1945 conversion rates. It was identical to the US Navy CXDG-CNN-10ADW, code name "Fruit" often called the NCR differencing calculator.

The German version had a capacity of thirty 5-figure code groups, as against the NCR capacity of 20. The German device was much slower to operate, though far simpler in operation.

This device could be operated by the cryptanalyst at their own desk.

Differencing calculator (recording)
The differencing calculator with recording (German:Differenzen Rechengereat, English:Differencing Calculating Apparatus) was a machine designed to compute a flag of difference for a set of enciphered code groups and record them. It consisted of two teleprinter tapes with photoelectric reading heads, a set of calculating relays and a recording electric teleprinter. The read heads operated at seven characters a second, bounded by the speed of the teleprinter where time was lost by the carriage return and line feed. It cost ℛℳ920 Reichsmarks, $800.00 at 1945 conversion rates.

The figure groups between which differences were to be made were on punched tape. A duplicate of the tape was made, with one blank group added with the two tapes looped and read at the same time. The calculating relays computed the difference (modulo 10) between the two groups and the teleprinter recorded it; the two tapes then stepped simultaneously and the difference between the second and third was computed and recorded; then between the third and fourth; and so on. On the second time around, since the duplicate tape was one group longer than the original, the offset was automatically changed so that the first group was now differenced with the third group, the second with the fourth, and so on. In this way every group was differenced with all other groups.

Likely additive selector
The likely additive selector (German:Witzkiste, English:Brainbox) was a simple device for removing additives from a column of super-enciphered code groups arranged in depth. It could be used with any four-digit encrypted code, whose frequency of decrypted code groups had been discovered from previous removal of additives. Five-digit codes used the differencing calculator. The cost of the device was unknown, but estimates put its price at less than ℛℳ57.5 Reichsmarks, $50.00 at 1945 conversion rates.

Simple counting apparatus
Dr Hüttenhain described it as follows:


 * By means of a simple counting apparatus, it is possible to quickly work our statistics, when there are more than 100 different elements.


 * 100 counting machines, (which were general post office machines), were put side by side. The text for which statistics are to be worked out in punched on tape. The perforated strip is read and a symbol in each case put in the corresponding counter. The counters are read off and their position photo recorded.


 * In practice this apparatus was used with success within the scope of the investigations into the security of our own system

The devices cost was approximately ℛℳ57.5 Reichsmarks equivalent to $50 1945 conversion rates.

Proposed repeat finder
The proposed repeat finder (German:Parallel Stellengeraet) was one of the first ultra high speed machines, planned and in production but not finished. It was designed to study from 20 to 25 letters for repetitions of 5 of more characters. Each message could be 500 letters in length, with the study of 10k letter of the message at any one time. Dr Hüttenhain states as follows:


 * The 10,000 letters were recorded one after another as 5-unit alphabetical symbols onto an ordinary film. A duplicate was made. Both strips were now to pass at high speed in front of a photocell reader. In the event the two strips being completely identical for at least 5 letters, this passage would be likewise registered without inertia [photocell].


 * The strips were to pass before the reading device at a speed of 10000 symbols per second. Accordingly, not quite three hours would have been required to [Work through 10000 letters] i.e. (10,000 x 10000 =100,000,000 comparisons.).

The US rapid analytic machine that was most nearly like the German device was the Tetragraph Tester by the Eastman Kodak Company for OP-20-G and the Army Security Agency. When Alan Turing arrived at OP-20-G on 20 November 1942, he was shown a run of the machine at that time. No report of the meeting was kept, but a report surfaced on 23 January 1943, RAM-2, [Indicating this was the second version, 2 of 3], that prior to 8 January, the device was working in an unreliable fashion. During testing, it was missing as much as 60% of hits which were known to exist which had been previously analyzed by hand. Although the Americans eventually perfected the machines, OKW/Chi found the device to be too sensitive for continuous use and with the very limited availability of materials and personnel, it was never completed.

Achievements
According to the TICOM interrogations during 1945, the following information about OKW/Chi successes was recorded and a table prepared which was recorded in Table 2–1 in Vol 1 Synopsis.

Mettig's response
When Colonel Mettig was asked point blank what was the greatest achievement of OKW/Chi, he hesitated. It became apparent that OKW/Chi had not achieved any outstanding cryptanalytic successes. However, OKW/Chi did have a number of successes, but generally its cryptologic successes were in what was considered by TICOM to be low and medium grade or medium security cipher systems.

OKW/Chi's cryptanalysis was not outstandingly successful against systems of high security. This may have been not only because the Allies high security systems were actually high security, in some part unsolvable to the Allies' cryptanalysts as well, but because the OKW/Chi cryptanalysts never became technically proficient enough to undertake the solution to these high-security systems.

TICOM agents considered OKW/Chi's greatest achievements were, the fast design and construction of Rapid Analytic Machinery, which were often built quickly under war conditions, e.g. bombing, and where lack of materials was an ever consistent and increasing concern and the continual productions of VN's, (Reliable Reports), up to 3000 per month, even when the war was almost over in January-February 1945, which was a remarkable achievement.

Fenner's response
Wilhelm Fenner was also asked point blank. Fenner stated that the greatest cryptanalytic triumph of OKW was the reading of the London-Warsaw traffic, which provided radio intelligence of the highest value. The messages were intercepted at Lauf and Treuenbrietzen and had 16 people engaged on solving them. Normally, messages which came in during the morning were solved by 1700 hours. In particular, the Polish High Command had an agent working in the Führer Headquarters (Fuhrerhauptquartier), who always sent the most accurate plans of the German High Command. When asked by TICOM if they were able to take any action, Fenner stated that as a result of reading these messages, that sometimes they were able to change the place or time of an attack but that usually the reports were of a long-term strategic nature and there was little they could do about it. They never succeeded in tracking down the agent.

Fenner placed the reading of the Turkish ciphers second in importance. The most important intelligence came from the American Cairo traffic, although this was not solved by OKW/Chi.

Further developments
In the last few decades, a number of military historians have continued the examination of military documentation in relation to World War II and a number of facts have emerged which seem to contradict the TICOM findings, which were highlighted by the Christos Website.

According to the TICOM reports in Volume 1, Table 2.1, the Japanese Purple [cipher] had not been read by the Germans, although it was attacked by AA/Pers Z. No mention was made of attacks by OKW/Chi or other German Axis agencies.

In TICOM Vol. 2, it states, "Although they were successful with the Japanese "Red" machine, they did not solve its successor, the "purple" machine."

The solving of the Japanese Purple, considered unbreakable by the Japanese, would indicate the OKW/Chi and the other German agencies were capable of solving high-level security systems. Certainly the Germans knew by 1941 (Purple Cipher - Weaknesses and cryptanalysis), that the purple cipher was insecure, although it is unknown whether OKW/Chi learned this.

The evidence for this revolves around Cort Rave. Dr Cort Rave had started working at OKW/Chi in 1941 and worked as a translator in the Japanese desk of Section IVb and had been detached in December 1943 to the Foreign Office cryptanalytic Section (AA/Pers Z) for training in the Chinese and Japanese Desks. He is listed as an OKW/Chi employee by TICOM, but was considered a minor light by TICOM with an inconsistent memory. However, Rave took the time to conduct personnel communication between the German naval historian Jürgen Rohwer and mathematician Dr. Otto Leiberich, while in advanced old age, as part of a fact finding process conducted by Rohwer, regarding German cryptological successes during World War II.

Rohwer is a naval historian who has written over 400 books and essays.

Dr. Otto Leiberich worked in OKW/Chi, but would work in the new German Chiffrierstelle from 1953, and from 1973, was the boss of Dr. Erich Hüttenhain, who was Director of the Central office of Encryption (ZfCh) between 1956 and 1973 and who was the boss of Leiberich. Leiberich became founder of Federal Office for Information Security (BSI) in 1990.

The contents of Dr Rave's letter, dated 01.03.96, were published in Dr Rohwer's book Stalin's Ocean-going Fleet: Soviet Naval Strategy and Shipbuilding Programs with the letter reference on page 143.

Rave stated that:
 * ...the Purple (cipher) has been broken by the Foreign Office and OKW/Chi....

A further piece of evidence was offered by author Dr Wilhelm F. Flicke, who is also described as an employee of OKW/Chi working in the intercept network at Lauf and whose book, War Secrets in the Ether (which was restricted (English translation) by the NSA, and Britain, until the early 1970s) described how many messages between Japanese military attache and later Japanese ambassador Hiroshi Ōshima to Nazi Germany, in Berlin, were intercepted at Lauf and deciphered by OKW/Chi.

The mathematician Otto Leiberich believed that the Purple cipher had been broken and considered certain individuals of OKW/Chi to have sufficient capability, insight and technical knowledge to break the cipher, even within certain constraints and the TICOM documentation seems to support it (TICOM I-25). However, no absolute proof exists to prove it.

German mathematicians who worked at OKW
From an examination of Friedrich L. Bauer book, ''Decrypted Secrets. Methods and Maxims of cryptography'' and the TICOM documentations, the following German mathematicians worked in or in conjunction with OKW:


 * Karl Stein - Head of the Division IVa (security of own process). Discoverer of Stein manifold
 * Gisbert Hasenjaeger - Tester of the Enigma. Discovered new proof of the completeness theorem of Kurt Gödel for predicate logic.
 * Walter Fricke Mathematicians who worked on security of German ciphers.
 * Heinrich Scholz - Worked in Division IVa.
 * Fritz Menzer Senior Inspector. Chief of section IIc. Dealt with development and production of special ciphers for government departments, industry, and the Main Reich Security Office (RSHA), developing of deciphering aids for agents.
 * Gottfried Köthe - theory of Topological Vector Spaces
 * Ernst Witt - Member of Mathematical Research department. Mathematical Discoveries Named After Ernst Witt
 * Helmut Grunsky - He worked in complex analysis and geometric function theory. He introduced Grunsky's theorem and the Grunsky inequalities
 * Georg Hamel
 * Oswald Teichmüller - Only temporarily employed at OKW. Introduced quasiconformal mappings and differential geometric methods into complex analysis. Described by Friedrich L. Bauer as an extreme Nazi and a true genius.
 * Wolfgang Franz - Member of Mathematical Research department. Expert in US diplomatic cipher. Made significant discoveries in Topology
 * Werner Kunz - Accurate proofreader.
 * Werner Weber - Member of section IVc.
 * Georg Aumann - Member of section IVc. Initial breaking of most difficult ciphers. Cryptanalytic theory. His doctoral student was Friedrich L. Bauer.
 * Otto Leiberich - Number theorist.
 * Alexander Aigner - Number theorist. Member of section IVc.
 * Johann Friedrich Schultz - Member of section IVc.