SOMERTON MAN MYSTERY

The Evidence The Facts In Detail In Depth

The Somerton Man Mystery, Tradecraft, Codes, Ciphers & Concealments, An introductory…

Part 1.

The whole issue of tradecraft, codes, ciphers and concealment is, as you will read, at the heart of espionage with information forming 90% and arguably more of the work of agents. 


The Somerton Man case is all about espionage and as we progress through this and subsequent articles, you may be able to recognise instances of the use of tradecraft.


But let’s be clear on this, it is and was no easy task, codes and ciphers can take years to fully crack. The Venona decrypts have only managed to reveal 15% of the messages sent in that form. In this first article, you will learn why that could be.


In the Somerton Man case, I have managed to partially decrypt just some of the codes and recovering several words, finding the codes was only the beginning of a major undertaking. How that turned out will be shown in due course.


Do not underestimate the complexity nor the ingenuity of those involved in the Somerton Man mystery.



TRADECRAFT, CODES, CIPHERS & CONCEALMENTS


WW2 & The Early Cold War


Between 1942 and 1950, intelligence agencies such as the OSS, MI6, NKVD, early CIA, Australian Military Intelligence, Special Branch, and ASIO employed a variety of sophisticated tools, methods, and techniques—collectively known as tradecraft—to conduct espionage and counterintelligence operations. These were the foundation years and beginnings of today's concealment and cryptographic techniques



Covert Communication Methods:

  • Codes and Ciphers: Agencies utilise complex encryption systems to secure messages. The OSS, for example, developed the "one-time pad," an encryption technique considered unbreakable when used correctly. The NKVD employed the "Vigenère cipher" to encode communications.
  • Microdots: Developed by the Germans and later adopted by Allied forces, microdots allowed for the reduction of documents to a dot-sized photograph, which could be embedded within innocuous materials like letters or postcards, making detection difficult. Often referred to as 'Duff'.
  • Numbers Stations and Burst Transmitters: Shortwave radio transmissions of coded numbers enabled agents to receive instructions covertly. Burst transmitters sent messages at high speed, reducing the risk of interception.

Espionage Techniques:

  • Dead Drops and Brush Passes: These methods facilitated the clandestine exchange of information. A dead drop involved leaving materials at a secret location for another party to retrieve, while a brush pass was a brief, seemingly accidental encounter during which items were discreetly passed between individuals.
  • Concealment Techniques: Intelligence operatives used everyday objects to hide documents or tools. The OSS's Research & Development Branch created gadgets like hollowed-out coins and pens that concealed microfilms or poisons.
     
    Wikipedia
  • Clandestine Photography: Miniature cameras, such as those disguised as matchboxes, were employed to surreptitiously photograph documents or installations. The OSS developed a 16mm camera concealed within a matchbox for the purpose.
     
    Wikipedia
  • Invisible Inks and UV/Infrared Lighting: Agents used invisible inks to write hidden messages that became visible only under ultraviolet or infrared light, allowing covert communication without arousing suspicion.

Counterintelligence Practices:

  • Double-Agent Operations: Agencies like MI6 and the OSS ran double agents to mislead enemy intelligence services. The British Double-Cross System (XX System) effectively turned German agents into double agents working for the Allies.
     
    CIA
  • Surveillance and Eavesdropping: Techniques such as wiretapping and the use of listening devices enabled agencies to monitor communications of interest. The OSS developed wiretap gadgets for such purposes.
     
    Wikipedia

Innovative Technologies:

  • Specialized Weapons and Gadgets: The OSS's Research & Development Branch produced devices like silenced pistols, explosive coal ("Black Joe"), and time-delay fuses for sabotage missions. These innovations enhanced the effectiveness of covert operations.
     
    Wikipedia
  • Joan-Eleanor System: This portable radio system allowed operatives to establish secure communication with aircraft, facilitating coordination during missions.
     
    Wikipedia

Australian Intelligence Agencies:

  • Australian Military Intelligence and Special Branch: During World War II and up to 1949 and the advent of ASIO, these agencies adopted similar tradecraft techniques as their Allied counterparts, including the use of codes, surveillance, and counterintelligence operations to protect national security.

  • ASIO (Australian Security Intelligence Organisation): Established in 1949, ASIO focused on counterespionage and internal security, employing tradecraft methods such as surveillance, informant networks, and covert communications to monitor and counteract espionage activities within Australia.
     
    Intelligence.gov.au

The period between 1942 and 1950 was marked by significant advancements in intelligence tradecraft, driven by the exigencies of World War II and the onset of the Cold War. These tools and techniques laid the foundation for modern espionage practices, reflecting a blend of ingenuity and adaptability in the face of evolving global threats.

Insights into Historical Espionage Techniques

The Times & The Sunday Times

Pay attention, 007 ... the real-life Qs who devise deadly gadgetry

118 days ago


Pay attention, 007 ... the real-life Qs who devise deadly gadgetry


The Australian

Uncloaking the secret life of Molly

182 days ago

Sources


ENCRYPTION

During World War II, secret messages were often subjected to double encryption to enhance security. One notable method was the double transposition cipher, which involved rearranging the plaintext according to a set pattern and then repeating the process with a different pattern. This technique was employed by British secret service units, including the Special Operations Executive (SOE) and commando groups, throughout the war.

Google Arts & Culture


Another example of double encryption is found in the German military's use of the Enigma machine. The Enigma's indicator procedure required operators to select an initial rotor position (Grundstellung), choose a random message key, and then encrypt this message key twice. This double encryption of the message key added an extra layer of security, although flaws in this procedure were later exploited by Allied cryptanalysts.

Wikipedia


These instances illustrate how double encryption methods were implemented during World War II to secure communications against interception and decryption by adversaries.

Sources


During World War II, the security of military communications was paramount, leading to various strategies to protect sensitive information. One such method involved breaking lengthy messages into multiple parts, each encrypted separately. This approach not only managed the limitations of encryption devices but also enhanced security by reducing the risk associated with a single compromised message.


German Naval Communications:

The German Navy (Kriegsmarine) implemented a practice where longer messages were divided into segments, each encrypted with different message keys. This meant that even if an adversary managed to decrypt one segment, the others remained secure due to their unique encryption settings. Specifically, the Kriegsmarine limited messages to 250 characters; longer communications were split, and each part used a different message key.

Wikipedia


Allied Forces:

Allied forces adopted similar practices. By segmenting lengthy communications and applying varied encryption methods or keys to each part, they minimized the potential damage from any single intercepted and decrypted message. This compartmentalization ensured that even if one segment was compromised, the entirety of the information remained protected.


These strategies underscore the critical importance placed on communication security during World War II, reflecting the continuous evolution of cryptographic practices in response to emerging threats and technological advancements.

Sources


Logic dictated that every possible measure be taken to secure sensitive information, especially in high-stakes wartime or Cold War scenarios. At times, the stakes were so high that intelligence agencies and covert operators employed a wide array of techniques, both innovative as in created by the agents ‘on the fly’ and tried-and-tested, to protect their communications from interception and decryption. Your observation about numbers stations and manually constructed encrypted messages highlights key practices of the era.


Why They Used Multiple Layers of Security

  1. Numbers Stations
    Numbers stations were an essential tool for covert communication. Operatives working in enemy territory relied on these broadcasts to receive instructions encoded in seemingly random sequences of numbers. To protect these transmissions:
    • Messages were encrypted using one-time pads, considered unbreakable when used correctly.
    • Message segmentation ensured that even if one segment was intercepted and decoded, the full message couldn't be reconstructed.
    • Time-sensitive broadcasts limited the opportunity for enemies to decode transmissions.
  2. Manually Constructed Messages
    Covert operators frequently created encrypted messages by hand:
    • Double encryption (e.g., combining a transposition cipher with a substitution cipher) added complexity.
    • Messages were sometimes split into multiple transmissions and sent over several days or stations to confuse interceptors.
    • Operators frequently used book ciphers or customized codes based on a prearranged key, ensuring that even a captured operative couldn’t easily reveal the system.
  3. Layering Complexity to Confound Decoders
    • False headers or dummy messages: Some transmissions included decoy information to mislead enemy cryptanalysts.
    • Changes in encryption protocols: Regularly updating keys or encryption methods reduced the window for successful decryption by adversaries.
    • Message obfuscation: Subtle changes in format or encoding were deliberately designed to exhaust enemy resources and delay decryption.


The Ultimate Goal: Information Denial

For both senders and receivers, the aim was simple: deny the enemy access to actionable intelligence. The combination of segmented messages, varied encryption, and deceptive techniques ensured that even with substantial cryptanalytic resources, success was far from guaranteed. The logic and ingenuity behind these efforts remain a testament to the critical importance of securing information during wartime.


The Soviet Union employed a variety of sophisticated cryptographic methods to secure its communications. These methods evolved, reflecting advancements in technology and the increasing complexity of international espionage. In the next article we will cover some of their methods.






Post a Comment

Hi
Welcome to the Tamam Shud Blog, widely regarded as the leading and most trusted fact and evidence-based blog on the Somerton Man case. Please take a moment to review our comment guidelines here:

https://tamamshud.blogspot.com/p/tamam-shud-blog-rules.html

Visit our YouTube channel:
https://www.youtube.com/channel/UCOamLze8PyNDafjjBGGngJQ

Previous Post Next Post
/body>