Brilliant Codebreakers Exposed Soviet Spies—And Launched the McCarthy Era

/ reader
Por: PeriodicoVirtual

Brilliant Codebreakers Exposed Soviet Spies—And Launched the McCarthy Era

Schoolteachers, archeologists, linguists and mathematicians worked on the Venona project breaking unbreakable Soviet code from WWII. They were heroes. But some had deep regrets.

In late 1942, Miss Gene Grabeel was dying of boredom in Madison Heights, a small town next to the little city of Lynchburg, Virginia. She was 22 years old, a graduate of Farmville State State Teacher’s College, and had landed a job teaching home economics, which included disciplines like cooking and sewing and other housewifely duties. Madison Heights felt like it was the middle of nowhere, a place best known in those days as home to an institution called the Virginia State Colony for Epileptics and Feebleminded.

By the end of 1942, the United States had been completely mobilized for war. With men deployed around the world to fight the Germans and the Nazis, women were given opportunities in the U.S. workforce, and even working for the military, that they’d never had before. Recruiting centers were set up in heartland towns like Lynchburg, where a young Signal Corps officer, Lt. Pasvo Carlson, was dispatched to “troll for civilian female volunteers,” as Howard Blum wrote in his recent history of the era’s code breakers, In the Enemy’s House.

The lieutenant promised women college graduates work near Washington D.C., with a starting salary of $1,800 a year plus Saturday bonuses, much more than a schoolteacher’s salary, but no description of the job itself. None whatsoever. Top secret, he said.

Sounded good to Grabeel, whose father gave her permission to head north and “push some papers around” for the next few months.

She would stay on the job for the next 36 years, working on what one British spy called “the greatest counterintelligence secret in the Western world,” first dubbed “The Blue Problem,” and then “VENONA”: the breaking of the Soviet code. Or, more precisely, parts of it.

“VENONA was the most terrible secret of all; it was incomplete,” Peter Wright, a former assistant director of Britain’s MI5 counterintelligence operations, wrote in his 1985 book Spycatcher. The unauthorized memoir, which the British government worked hard to suppress before its publication in 1987, was the first public use of the project’s code name. A decade before the existence of the program was officially acknowledged and some of its contents declassified, Wright described in vivid detail how VENONA worked, the impact it had, and some of the problems it created.

Grabeel‘s work and that of the growing team she was part of in the late 1940s, led by the brilliant linguist and mathematician Meredith Gardner, would contribute mightily to the exposure of Soviet spies who had stolen American nuclear secrets.

But some, including Gardner, had regrets. Wright met him in the early 1960s: “a quiet, scholarly man” who “felt very keenly that the cryptanalytical break he had made possible was a thing of mathematical beauty, and he was depressed at the use to which it had been put.”

Amid the anti-communist hysteria that erupted after the Soviets exploded an atomic bomb in August 1949, ending America’s monopoly on the apocalypse, some spies fingered by VENONA were arrested, and some executed.

Gardner would say, with a kind of naive sweetness, “I never wanted it to get anyone in trouble.” In Gardner’s mind, Wright tells us, “VENONA was almost an art form, and he did not want it sullied by crude McCarthyism.” But by the 1960s it was far too late for such second thoughts.

The problem that Gene Grabeel was first asked to address, and Gardner eventually took on as the war ended and the importance of his work on German and Japanese codes subsided, was what to do with tens of thousands of encrypted Soviet telegrams intercepted between 1942 and early 1946.

When Grabeel started work at Arlington Hall, the code-breaking center that was housed in a former women’s junior college just outside Washington, the Soviets were crucial allies in the fight against the Nazis and many in the West considered it bad form to spy on them. In Britain, according to Wright, Prime Minister Winston Churchill “had ordered all anti-Soviet intelligence work to cease during the wartime alliance.”

But Col. Carter W. Clarke, the deputy chief of U.S. Military Intelligence Service who was running the show at Arlington Hall, was suspicious of the Soviets and wanted to know what they were up to in America. His problem: lack of resources. He assigned Grabeel and a Russian-speaking lieutenant, two newcomers, to do what they could with the huge and growing backlog of Soviet intercepts.

Moscow Center, the heart of Soviet espionage, had used a system that should have been unbreakable: first encoding messages in four-number batches, then using specially issued “one-time pads” to code the code again. There were supposed to be only two copies of each pad: one for the sender in the field, and one at headquarters in Moscow Center. After a page on one of these pads was used to send a message, it was destroyed, ending any prayer outsiders might have of decryption.  As Blum writes in his book, “The Soviet cryptologists had, in effect, locked the door once; then locked it again; and, finally, just to be sure no one could get in, they threw away the key.”

All that Grabeel and her colleagues could do at first was try to sort the traffic by its point of origin, which might suggest it was either for trade or for diplomatic correspondence. Eventually, as the end of the war approached, experienced cryptanalysts were moved onto the VENONA team, and one, Lt. Richard Hallock, a former archeology student who had translated texts from Babylonian dialects, searched the traffic methodically for repetitions of number sequences. There should be none because of the one-time pad encryption, but, still he tried.  And then, there they were. Just a handful, but a clear indication that some one-time pads were being used more than once.

As Blum reports, in the desperate days when the Soviet capital was under siege in 1941 and the towers of the Kremlin in sight of German binoculars, Moscow Center had started churning out and distributing triplicate copies of "one-time" pads. At the end of the war in 1945, a special team from U.S. military intelligence scouring Germany found a partially burned Soviet code book the Nazis had obtained, but had not been able to exploit. Using these clues, and working with an early IBM punch-card computer, plus a rapidly growing team of researchers, many of them women,  Meredith Gardner achieved the first huge breakthrough on the VENONA project some months after he was transferred there in January 1946.

When the Soviets were communicating in Russian, their code was impenetrable. But when they had to transmit an unfamiliar name or concept, they spelled it out letter by letter. And to signal what they were doing, they would write “spell” at the beginning of a word or phrase, then “endspell” when they’d finished it.

By identifying where these spell/endspell passages appeared, and comparing them to other known information about Soviet operations, interests and contacts, Gardner was able to start breaking down the encryption and building a rough picture of the Soviet code book. But only after months of work did he finally manage to pull a message into the clear, one from 1944 mistakenly predicting that Franklin Roosevelt would win the popular vote but lose in the electoral college. (Russian interest in American elections goes way back.)

What had been desultory monitoring of potential Soviet activities got a major push in 1946 after the defection of a cipher clerk, Igor Gouzenko, working at the Soviet embassy in Ottawa, and the confessions of a an American woman, Elizabeth Bentley, working as a courier for a Soviet spy network. Both outlined massive Soviet espionage operations against Moscow’s supposed allies throughout the war, especially against the United States, with nuclear secrets the priority.

As bits and pieces of the Soviet cable traffic from years past came to light, Gardner and his team were discovering dozens of names and, more often, code names that suggested Soviet penetration agents were embedded deep in the American government and scientific community.

One after another, when possible, the guilty parties were tracked down. But did mention of your name make you a guilty party?

Yet during the manic pursuit of communists led by Rep. Richard Nixon and Sen. Joseph McCarthy at the end of the 1940s and in the early 1950s, with aftershocks lasting for decades, the VENONA intercepts and decryptions were never revealed to the public, a policy lamented even by the Central Intelligence Agency’s in-house historian who feels they could have laid to rest many conspiracy theories.

“The Venona cables could have been released well before the 1990s, it appears in retrospect, without damaging national security,” writes John Ehrman on the CIA website. “A Soviet agent within the Army Security Agency, William Weisband, had told Moscow of the Venona decryption program during the late 1940s. The United States learned of Weisband's activities in 1950, by which time the Soviets had closed down or lost many of their US networks.”

Actually, it was worse than that. Other spies had direct access to the VENONA operaton. And contrary to Ehrman’s evaluation of the VENONA cables 20 years ago, their release in 1995 and 1996 did not end the debate about what they actually proved.

As Peter Wright pointed out in Spycatcher, “incomplete” hardly begins to describe the holes in the records revealed by VENONA, and the release of some 2,900 of the decoded, deciphered and translated cables, while it sounds like a lot, was a tiny fraction of the traffic intercepted. Eventually, the National Security Agency (NSA)  in the United States, and the Government Communications Headquarters (GCHQ) as well as MI5 got in on the act in the U.K., trying to find information that about Soviet activities that could help the code breakers. “For years [they] employed teams of researchers scouring the world searching for ‘collateral,’” Wright tells us. “But despite the effort less than 1 percent of the 200,000 messages we held were ever broken into, and many of those were broken only to the extent of a few words.”

Amy Knight, author of How the Cold War Began, notes, “Venona must be treated with caution by historians.” While some cables seemed to confirm the guilt of Soviet spies, might there be others that established their innocence? With as much as 99 percent of the traffic unknowable, that is hard to say. And the brief opportunity to examine classified Russian intelligence traffic opened up in the early 1990s has been shut down long since by former KGB agent and current Russian President Vladimir Putin.


Do you have any presale question to ask?

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been.