Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
TICOM
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==History== The project was initiated by the British, but when the US Army Chief of Staff General [[George Marshall]] learnt of it, it soon became Anglo-American. The aim was to seek out and capture the cryptologic secrets of Germany. The concept was for teams of cryptologic experts, mainly drawn from the code-breaking center at [[GCHQ#Government Code and Cypher School (GC&CS)|Bletchley Park]], to enter Germany with the front-line troops and capture the documents, technology and personnel of the various German signal intelligence organizations before these precious secrets could be destroyed, looted, or captured by the Soviets.{{sfn|Parrish|1986|p=276}}{{sfn|Rezabek|2017|loc=I Introduction: Origin of TICOM}} There were six such teams.{{sfn|Rezabek|2017|loc=III The Teams}} * Team 1 was tasked to capture German ''Geheimschreiber'' (secret writer) machines whose enciphered traffic was code named [[Fish (cryptography)|Fish]] * Team 2 was to assist Team 1 with transporting Field Marshal [[Albert Kesselring|Kesselring's]] communications train to Britain (the so-called "Jellyfish Convoy"){{sfn|Rezabek|2012|loc=IV Case Studies: FISH and the Jellyfish Convoy}} * Team 3 was to investigate an intact German Signals intelligence unit called "[[Pers Z S]]" * Team 4 was to investigate in more detail the places in southern Germany that the Team 1 search had passed over quickly * Team 5: Following the serendipitous discovery of a waterproof box containing some of the archives of the [[Cipher Department of the High Command of the Wehrmacht]] (OKW/''Chi'') on the bed of Lake [[Schliersee (lake)|Schliersee]], this team was tasked with recovering anything else of value from that lake * Team 6 aimed to capture and exploit material from the German Naval Intelligence Center and the German SIGINT headquarters ===OKW/''Chi'' (High Command)=== The Allied supposition that the Supreme Command of the German Armed Forces, the ''Oberkommando der Wehrmacht Chiffrierabteilung'' (abbreviated OKW/Chi) was the German equivalent of Bletchley Park, was found to be incorrect. Despite it being the top SIGINT agency in the German military, it did not set policy and did not co-ordinate or direct the signal intelligence work of the different services. It concentrated instead on employing the best cryptanalysts to design Germany's own secure communications systems, and to assist the individual services organisations.{{sfn|Rezabek|2012|loc=II The Targets: OKW/Chi (High Command)}} These were: * The Army (''Heer'') OKH/GdNA, the ''Oberkommando des Heeres/[[General der Nachrichtenaufklärung]]''{{sfn|Rezabek|2012|loc=II The Targets: GdNA (Army)}} * Air Force (''Luftwaffe'') ''Chi Stelle''{{sfn|Rezabek|2012|loc=II The Targets: Chi Stelle (Air Force)}} * Navy (''Kriegsmarine'') ''Beobachtungsdienst'' or ''B-Dienst''{{sfn|Rezabek|2012|loc=II The Targets: B-Dienst (Navy)}} * Foreign Office ''Pers ZS''{{sfn|Rezabek|2012|loc=II The Targets: Pers ZS (Foreign Office)}} * Nazi Party ''Forschungsamt'' or ''FA''{{sfn|Rezabek|2012|loc=II The Targets: FA (Nazi Party)}} Drs Huttenhain and Fricke of OKW/''Chi'' were requested to write about the methods of solution of the German machines.{{sfn|Huttenhain|Fricke|1945}} This covered the un-steckered [[Enigma (machine)|Enigma]], the [[Enigma (machine)#Plugboard|steckered]] Enigmas; [[C-36 (cipher machine)|Hagelin]] B-36 and BC-38; the cipher teleprinters [[Siemens and Halske T52]] a/b, T52/c; the Siemens SFM T43; and the Lorenz [[Lorenz cipher|SZ 40]], SZ42 a/b. They assumed [[Kerckhoffs's principle]] that how the machines worked would be known, and addressed only the solving of keys, not the breaking of the machines in the first place. This showed that, at least amongst the cryptographers, the un-steckered Enigma was clearly recognized as solvable. The Enigmas with the plugboard (''Steckerbrett'') were considered secure if used according to the instructions, but were less secure if stereotyped beginnings or routine phrases were used, or during the period of what they described as the "faulty indicator technique" - used up until May 1940. It was their opinion, however, that the steckered Enigma had never been solved.{{sfn|Huttenhain|Fricke|1945|pp=4,5}} ===FA Discovery=== The discovery in May 1945 of the [[Nazi Party]]'s top secret [[Research Office of the Reich Air Ministry|FA]] [[signals intelligence]] and cryptanalytic agency at the [[Kaufbeuren Air Base]] in southern [[Bavaria]] came as a total surprise.{{sfn|Rezabek|2012|loc=II The Targets: FA (Nazi Party)}} The province of [[Luftwaffe]] chief [[Hermann Göring]], it has been described as "the richest, most secret, the most Nazi, and the most influential" of all the German cryptanalytic intelligence agencies.{{sfn|Kahn|2000|p=178}} ===Russian "FISH" Discovery=== [[File:Russian Fish.jpg|thumb|German prisoners prepare the "Russian [[Fish (cryptography)|Fish]]" for loading and shipment to England, June 1945.]] The greatest success for TICOM was the capture of the "Russian Fish", a set of German wide-band receivers used to intercept Soviet high-level radio teletype signals. On May 21, 1945, a party of TICOM Team 1 received tip that a German [[Prisoner of war|POW]] had knowledge of certain signals intelligence equipment and documentation relating Russian traffic. After identifying the remaining members of the unit, they were all taken back to their previous base at Rosenheim. The prisoners recovered about 7 ½ tons of equipment. One of the machines was re-assembled and demonstrated. TICOM officer 1st Lt. Paul Whitaker later reported. "They were intercepting Russian traffic right while we were there…pretty soon they had shown us all we needed to see."{{sfn|Rezabek|2012|loc=IV Case Studies: Russian FISH}}<ref>{{Citation |title=TICOM Team 1 Report Appendix 14: Baudot Equipment Report on Gen Der Nach. Aufkl. Gruppe VI |url= https://drive.google.com/file/d/0B7sNVKDp-yiJMWM1ZTFmMjEtMmVhMC00MmI5LTg1NTYtNDIzZmFiZTYyNGM4/view}}</ref> ===Related efforts=== In [[Operation Stella Polaris]] the [[Finland|Finnish]] signals intelligence unit was evacuated to [[Sweden]] following the Finland/Soviet cease-fire in September 1944. The records, including cryptographic material, ended up in the hands of Americans.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)