Category Archives: U.S.

Japanese Transport Code Language

From Code Girls, by Liza Mundy (Hachette, 2017), Kindle pp. 244-246:

The language of the 2468 [transport code] messages was telegraphic in style. Short, straightforward, and no-nonsense, the messages consisted of sailing schedules, harbormaster reports, reports on the water levels of ports and transportation of cargo. Sailing schedules were the simplest. These included the transport number, the date, the time the maru [ship name] would be arriving or leaving, and its destination. Others concerned the movement of troops or equipment. A few dealt with transportation of the wounded or ashes of the dead. The marus out there in the Pacific Ocean carried everything: food, oil, supplies, human remains.

When a new message arrived, Dot looked for stereotypes, which were words that occurred frequently in the same place. “Maru” was a common one, but there were others as well, depending on the origin and the goods being transported. For example, one station transmitting from Singapore—the #3 Sen San Yusoo—sent a regular report on the shipping of oil to Hiroshima, Manila, and Tokyo. Stereotyped words might include ship names and numbers; the number of kiloliters of light oil, crude oil, heavy oil, aviation gasoline, or other gasoline aboard; how many trips each ship would take, and when. Another Singapore station transmitted to Hiroshima, Tokyo, and Moji a report of ships leaving for Palembang. Stereotypes might include the ship number or name, the date and hour of departure, the speed, the course, and the date and hour of scheduled arrival at the mouth of the Musi River.

Another transmitted a daily weather report with data including wind velocity and direction, temperature, and condition of the surface of the Andaman Sea, the South China Sea, the Yellow Sea, and other faraway bodies of water. Dot handled a lot of weather reports. Sitting at her table in Arlington, Virginia, Dot was amused at how many bits and pieces of information she knew about what the weather was like eight thousand miles away.

Another station transmitted a report on small boats available for supply services. Mentioned might be steel barges, wooden barges, special boats, small boats, twenty-metric-ton boats, plywood barges, and cargo submarines.

A station at Surabaya originated a report on the departure of ships escorted by a single Navy plane, including the names and types of ships (motor, sail, fishing), number of barges being towed, date of departure and destination, speed, scheduled date of arrival, route, and daily position of ship on consecutive days at given hours. A report from Shanghai about a supply ship might include a message spelling out that the probable route was “from Shanghai along the coast to the Yangtze River up the Yangtze River to WUU (Buko) down the river to Nanking and finally across the East China Sea to Moji.”

Here is how Dot did her work: Let’s say she knew that the code group for “arriving” was 6286 and she knew where this word was likely to appear. She would find that place in the message and look at the GAT [“group as transmitted”] before her. Books at Arlington Hall listed common code words as well as possible enciphered versions. She would look for a match, or she could do the math in her head and strip out the additive herself. Sometimes—when they were desperate—the code breakers would take the code groups and encipher them with every possible additive. A smattering of 2468 code groups included:

4333 hassoo—to send things [発送]
4362 jinin—personnel [人員]
4400 kaisi—beginning, commencing [開始]
4277 kookoo—navigate, to sail [航行]
4237 toochaku yotei—scheduled to arrive [到着予定]
4273 hatsu yotei—scheduled to leave [発予定]

There were vocabulary words associated with sailing schedules. According to training materials compiled at Arlington Hall, atesaki [宛先] was “destination” or “address”; chaku [着] was “arriving”; dai ichi [第一] was “first”; honjitsu [本日] was “today.” Maru [丸] was “commercial ship”; sempakutu [船舶通] was “ship” [-tu for 通行 tsuukou ‘traffic, passage’?]; sempakutai [船舶隊] was “convoy unit”; teihaku [碇泊] was “anchoring”; yori [より] was “from”; yotei [予定] was “schedule.” Gunkan [軍艦] was “warship.” Chu [中] was “now [or ‘in the middle of, i.e., underway’].” Hatsusen [発船] was “ship leaving.” Hi [日] was “day”; hongetsu [本月] was “this month”; senghu [sic; 船上 senjou?] was “onboard ship”; shuzensen [修繕船] was “ship being repaired”; tosai sen [搭載船] was “ship loading.”

Dot’s workday consisted of messages that, once deciphered, said things like “PALAU DENDAI/ 2/ 43/ T.B./ TRANSPORT/ 918/ (/878/)/ 20th/ 18/ JI/ CHAKU/ ATESAKI/ DAVAO/ SEMPAKUTAI/ 4/ CEBU/ E.T./”

Leave a comment

Filed under economics, Japan, language, military, nationalism, science, U.S., war

Occupied Germany as Ethnic Wastebasket

From Orderly and Humane: The Expulsion of the Germans after the Second World War, by R. M. Douglas (Yale U. Press, 2012), Kindle pp. 192-193:

As 1946, the year of “organized expulsions,” began drawing to a close, each of the Big Three was feeling the strain. “At present,” Colonel Thicknesse warned, “we tend to regard occupied Germany as a waste-paper basket with a limitless capacity for the unwanted waste of the world. We are not convinced that this attitude is correct, either economically or politically.” According to figures reported to CRX [= Combined Repatriation Executive], by November the Soviet zone had admitted more than 1.8 million expellees from Poland and Czechoslovakia; the U.S. zone approximately 1.7 million from Czechoslovakia and Hungary (including 160,000 who had arrived via Austria); and the British zone more than 1.3 million from the Recovered Territories: a cumulative total of almost five million people. To this figure could be added a number which could not be precisely calculated—but certainly one in the hundreds of thousands for each occupation zone—of Volksdeutsche who had made their way under duress out of their countries of origin, but entered Germany as unregistered “infiltrees.” All were arriving in a country whose urban centers the Western Allies had gone to immense trouble and expense during the previous five years to level to the ground, an endeavor in which they had enjoyed considerable success and which had left Germany with “a worse housing problem than has ever before existed in any area of comparable size and population.” Even after every available camp, military base, school, church, barn, air raid shelter, and, in some cases, cave had been filled with expellees, the onrushing human tide continued to overwhelm the best efforts of the rudimentary German administration upon whose shoulders the occupying forces thrust the responsibility. As a rule, according to reception officers in all three occupation zones, the expellees were arriving in possession of little more than the—usually insufficient—clothing in which they stood. The overwhelming majority were women and children. Few could make any meaningful contribution in the short term to their own support. Hundreds of thousands needed immediate care, in hospitals, old-age homes, orphanages, or residential centers for the disabled, though the shortage of resources meant that a great many would not receive it.

This was not at all how the Allies had envisaged the population transfers when they had been sold on the idea during the war. Then the stated rationale had been to remove a cohort of “dangerous” Germans—above all, fit men of military age—who might threaten the security of the countries in which they lived. Instead, it had been the least dangerous Germans who had been deported, while the fit men were being held back for forced labor, and in many cases pressured to take out Polish or Czechoslovak nationality against their will. The occupying powers thus found themselves presented with a first-class social, economic, and humanitarian crisis that threatened to undo whatever plans they had made for German reconstruction, as well as to disrupt the economies of the expelling states for years to come. Predictably, each of the Big Three with the benefit of experience discovered its enthusiasm for this novel method of “stabilizing” the European continent shrinking to the vanishing point. After coping—or failing to cope—with the “wild expulsions” of 1945, and finding the “organized expulsions” of 1946 from their perspective to be less satisfactory yet, each of the Allied powers entered 1947 with the same overriding objective: to put an end to what was proving an intolerable burden to it as quickly as possible.

Leave a comment

Filed under Austria, Britain, Czechia, Germany, Hungary, labor, migration, military, nationalism, Poland, U.S., USSR, war

Cracking the Japanese Water Transport Code

From Code Girls, by Liza Mundy (Hachette, 2017), Kindle pp. 241-242:

Ambon. Canton. Davao. Haiphong. Hankow. Kiska. Kobe. Kuching. Kupang. Osaka. Palembang. Rabaul. Saigon. Takao. Wewak. Dot Braden until a few months earlier had never heard of most of these places. Now they ruled her life. They kept her running from the big table where she worked, over to the overlapper’s console, then back again to her spot at the big table. These were the names of places, somewhere in Asia or the South Pacific, likely to be mentioned toward the beginning of messages coded in 2468, the main Japanese water-transport code, or one of the other, smaller transport codes.

Or rather, they were some of the places. Transport code 2468 was massive; 2468 was everywhere; 2468 dominated the Pacific Ocean. Anything anybody needed was sent by water. Water was how the rice was transported, and the soldiers, and the spare airplane parts. To move the goods the Japanese Army needed, the marus were always sailing. Always leaving and arriving. A maru [丸] could be a tanker, a freighter, a cargo ship, a barge, a cable layer, a motor transport. [Japanese Navy ship names never use maru.] They plied between Hiroshima, Yokohama, Wewak, Saipan, Tokyo, Manila, the Truk Lagoon. Exotic places. It was not necessary for Dot to know how to pronounce the cities and ports, but it was helpful to know the four-digit code groups that stood for them. Code system 2468 commanded Dot’s attention, controlled Dot’s movements. It filled her brain.

A job more unlike teaching Virginia schoolchildren would be hard to imagine. No longer was Dot Braden standing at a chalkboard, explaining physics formulas to eye-rolling teenagers, or ordering senior girls to march and salute. Instead, she was sitting head down at a table puzzling over words she had never heard before she came to Arlington Hall. “Sono.” “Indicator.” “Discriminant.” “GAT.” The sono [‘that, aforementioned’] was the number appended to messages that had been divided into parts before being transmitted. Sono #1 was the first part, Sono #2 was the second part, and so on. The discriminant was the number that identified the system—for instance, 2468. The indicator was the tiny clue that told you what book to look in. GAT stood for “group as transmitted”: the code group plus the cipher. The GATs were what you saw when you looked at the message for the first time.

Dot, of course, was not to utter any of these words outside the high wire double fences of the Arlington Hall compound. People were warned never to use, outside the building, the words they used inside it. “This material is extremely secret and must be treated with the utmost care,” one training document said. “Some of the words which you will consider elementary have been used only in this code, eg KAIBOTSU SU ‘to sink a ship’ [海没す ‘sea-reject do’?]. If you should mention this word to any one connected with the Axis or in some way succeed in letting it get into improper hands, this one fact alone would betray to the Japanese that we are reading their most recent transport code.”

Leave a comment

Filed under Asia, Japan, language, migration, military, nationalism, Pacific, science, U.S., war

Culture of U.S. Army Codebreakers, 1943

From Code Girls, by Liza Mundy (Hachette, 2017), Kindle pp. 207-209:

Unlike the Navy operation, the Army’s code-breaking operation at Arlington Hall was polyglot, open-minded, and nonhierarchical. Anybody could be in charge of anything. There was a wide assortment of ages and backgrounds working at its wooden tables. Bespectacled middle-aged men labored alongside pin-curled young women with names like Emerald and Velvet. Which is not to say that there wasn’t sexist condescension: One of the bookish men, a New York editor named William Smith, referred to Arlington Hall’s contingent of female southern workers as the “Jewels.” It was a lofty and rather snide reference to the number of women working there whose parents had seen fit to name them after precious stones. He wasn’t wrong: In addition to a profusion of Opals and Pearls, the workforce included a real Jewel—Jewel Hogan—who worked in the machine section. And there was Jeuel Bannister, the band director recruited out of South Carolina.

At Arlington Hall there also were “BIJs,” or born-in-Japans, the term for people who grew up in missionary families and worked in the translating section. There was the actor Tony Randall—later famous as Felix Unger in The Odd Couple—clowning around (at one point he danced on a table) as he waited for the intelligence summary to be taken to the Pentagon. There was an extended group of siblings and cousins—the Erskines—who had relocated as a family unit from Ohio. There was Sumner Redstone, the future billionaire media magnate, now a young officer in the translating unit. There was Julia Ward, former dean of students at Bryn Mawr, czar of a well-run library unit. There were nannies, beauticians, secretaries, restaurant hostesses. Josephine Palumbo at eighteen was virtually running the personnel unit, plucked out of McKinley High School in Washington. Tiny Jo Palumbo, daughter of an Italian immigrant laborer, was the person who swore in newcomers, and the sight of her administering the grave secrecy oath had inspired one code breaker to write a lyrical poem in her honor.

Unlike the Navy, Arlington Hall also had an African American code-breaking unit. This was not so much because the place was unusually liberal-minded, but rather because Eleanor Roosevelt—or somebody at the top—had declared that 12 to 15 percent of the Arlington Hall workforce should be black. It was poor recompense for the fact that many of Arlington’s black residents had been pushed out of their homes by the construction of the Pentagon and other military edifices, but work was welcome and this was better than nothing. Arlington Hall’s African American workers had to take segregated transport to get there, and many, even those who were college graduates, were given menial jobs as janitors and messengers. But there also was a special code-breaking unit whose existence was unknown to many of the white workers. The African American unit monitored the enciphered communications of companies and banks to see what was being transmitted in the global private sector and who was doing business with Hitler or Mitsubishi. They kept a library of 150 systems, with careful files of addresses and characteristics of all the world’s main commercial codes. There was no shortage of qualified people to staff it: Despite its segregated school system and the inequality of resources that accompanied segregation, the city of Washington had a number of highly regarded black public schools, as well as Howard, one of the country’s premier historically black universities. One of the team members, Annie Briggs, started out as a secretary and rose to head the production unit. Another, Ethel Just, led the expert translators. The team was led by a black man, William Coffee, who studied English at Knoxville College in Tennessee, started out as a janitor and waiter at Arlington Hall, and rose to this position.

In short, in its eclecticism and, often, its eccentricity, the atmosphere at Arlington Hall was unlike anything the U.S. military had ever produced.

Leave a comment

Filed under democracy, education, labor, language, military, nationalism, science, U.S., war

Code-breaking Triumph in the Solomons, 1943

From Code Girls, by Liza Mundy (Hachette, 2017), Kindle pp. 200-201:

The Navy women had just missed taking part in the code-breaking triumph at Midway, but ten months later they were fully embedded for, and actively engaged in, the other great code-breaking event of the Pacific naval war. On April 13, 1943, a message came through along the E-14 channel of JN-25, addressed to “Solomons Defense Force, Air Group 204, AirFlot 26, Commander Ballale Garrison Force.” The code breakers weren’t able to recover the whole message right away, but the fragments they did recover suggested that the commander in chief of the combined fleet—Admiral Yamamoto himself—was headed to Ballale Island (now Balalae) on April 18. Intelligence officers concluded that this was an inspection tour.

The initial break was made in the Pacific, but Washington also got busy, recovering additives and code groups so that blanks could be filled in. More messages were intercepted, and the fast-working, far-flung teams exchanged findings. Among those digging out code recoveries was Fran Steen from Goucher. The inter-island cipher JN-20 “carried further details” about Yamamoto’s upcoming trip, so Raven’s crew of women were busy as well, adding facts and insights. Together the code breakers were able to reconstruct Yamamoto’s precise itinerary, which called for a day of hops between Japanese bases in the Solomon Islands and New Britain. Their translation concluded that the commander would “depart RR (Rabaul) at 0600 in a medium attack plane escorted by six fighters; arrive RXZ (Ballale) at 0800”; depart at 1100 and land at RXP (Buin) at 1110; leave there at 1400 and return to Rabaul at 1540, traveling by plane and, at one point, minesweeper. He would be conducting an inspection tour and visiting the sick and wounded.

It was an extraordinary moment. The Americans knew exactly where the enemy’s most valuable—and irreplaceable—naval commander would be, and when. Yamamoto was known for punctuality. Far above the pay grade of those working additive recovery, Nimitz and other top war officials decided Yamamoto would be shot down. It was not a light decision, assassinating an enemy commander, but they made it. The itinerary, as one memo later put it, signed the admiral’s “death warrant.”

In what was known as Operation Vengeance, sixteen U.S. Army fighter planes, Lockheed P-38s, went into the air on April 18, taking off from a Guadalcanal airfield. They knew Yamamoto would be flying in a Japanese bomber the Americans called a Betty, escorted by Zero fighter planes. The Americans calculated their own flight plan to meet the route they anticipated Yamamoto would be taking, planning to encounter him over Bougainville. They flew for so long that the pilots were getting drowsy; the white coastline of Bougainville was racing beneath them when one of the pilots broke radio silence and shouted, “Bogeys! Eleven o’clock!” There they were, on the horizon: six Zeros, two Bettys. The Japanese did not see the Americans at first, but once they did, the escorting Zeros moved to block the U.S. fighter planes, firing so the bombers could escape. There was a hectic battle in which it never became clear who had shot down whom, but one Betty bomber plummeted into the trees, the other into the surf. Yamamoto’s body was found in the Bougainville jungle, his white-gloved hand clutching his sword.

Cheering broke out at the Naval Annex when they heard the news. The architect of the Pearl Harbor attack was dead. The payback felt complete.

Leave a comment

Filed under Japan, military, nationalism, Pacific, science, U.S., war

Cracking the Japanese Navy Code System, 1940s

From Code Girls, by Liza Mundy (Hachette, 2017), Kindle pp. 88-90:

On June 1, 1939, the Japanese fleet began using a code that the Allies came to call JN-25. The Japanese—who had moved to using numbers rather than characters—now employed a massive codebook containing about thirty thousand five-digit groups. They also had a new way of enciphering. Before the code was sent, each code group was enciphered by using math to apply an “additive.”

Here is how the additive method worked: When a Japanese cryptographer began encoding a single message, he would look in the codebook and find the five-digit group that stood for the word (or syllable or phrase or punctuation mark) he wanted. He would repeat that process until he got to the end of the message. Then he would get out a different book, called an additive book, turn to a page—selected at random—pick a five-digit number, and add that to the first code group. He would add the next additive to the second. And so on. The Japanese code makers used a peculiar kind of math called noncarrying or “false” addition. There was no carrying of digits, so 8 plus 7 would equal 5, rather than 15. If the code group for “maru” was, say, 13563, and the additive was 24968, the resulting group would be 37421 (1 + 2 =3; 3 + 4 = 7; 5 + 9 = 4; 6 + 6 = 2; 3 + 8 = 1). That was the group of digits that would be radioed. To crack a message, the Americans had to figure out the additive and subtract it to get the code group. Then they had to figure out what the code group stood for.

Once again, it was Agnes Driscoll who diagnosed the new system. Neither she nor anybody in the Navy operation had seen an additive cipher—everything up to then had been transposition, or switching—but she figured it out. It took her less than a year to make a dent. A March 1 status report for the unit “GYP-1” stated that for the “5-number system”—an early title for JN-25—“First break [was] made by Mrs. Driscoll. Solution progressing satisfactorily.” She worked on it for several more months before being transferred in late 1940 to German systems—a promotion in the sense that the Atlantic was beginning to emerge as the hot spot. The research team continued working their way through JN-25, using her methods.

The process of stripping additives and discerning the meaning of code groups was laborious and excruciating. Years after World War II ended, American code breakers who worked in Hawaii and Australia were still arguing with their D.C. counterparts over what certain code groups stood for. Much like the women who trained the men who would get to do the wartime flying, much like Elizebeth Friedman over at the Coast Guard, Agnes Driscoll taught the men in the field who did this. “In the Navy she was without peer as a cryptanalyst,” wrote Edwin Layton, who headed naval intelligence for Admiral Nimitz, the chief naval commander in the Pacific during the war. In December 1940, both code and cipher were changed, to a system the Allies called JN-25B; the team stripped the additives and built a partial bank of code words. Then, in early December 1941—days before Pearl Harbor—the additive books were changed. The codebooks were not. The U.S. Navy was able to recover a certain amount of the new system—but not enough—before the attack on Pearl Harbor happened and all hell broke loose.

“If the Japanese Navy had changed the code-book along with the cipher keys on 1 December 1941, there is no telling how badly the war in the Pacific would have gone,” said Laurance Safford.

As crushing as Pearl Harbor was, it was thanks in large part to Driscoll’s decades-long detective work—and to the example Elizebeth Friedman set for other women—that America did not enter the Second World War quite as blind as it might have seemed.

Leave a comment

Filed under Japan, language, military, nationalism, science, U.S., war

Two Methods of Encryption

From Code Girls, by Liza Mundy (Hachette, 2017), Kindle pp. 82-83:

Technically, there are two kinds of secret message systems. One kind is a code, in which an entire word or phrase is replaced by another word, a series of letters, or a string of numbers, known as a “code group.” A code may be used for secrecy, but also for brevity and truncation. Shorthand is a code in precisely this way and so, often, is modern-day texting. Common phrases, even long ones, can be compressed into short code groups, making messages faster and—when using cable, as many people did in the early decades of the twentieth century—cheaper to send. Saving money has always been important to governments, so the compression advantage is a big deal. Cable companies typically charged by the word, so the fact that stock phrases like “your request of last month has been approved” could be boiled down to a code group, as could the names of places or people or units, meant governments could save a good bit of money when sending telegrams. In the War Department’s “general address and signature” code that was employed in 1925, for example, the word “cavalry” was HUNUG, “Pursuit Squadron” was LYLIV, “Bombardment Squadron” was BEBAX, “Wagon Company” was DIGUF, “U.S. Naval Academy” was HOFOW, and “Fourth Division Air Service” was BABAZ. (Texting uses codes, like OMG and IMO, for much the same reason: brevity and, at times, concealment.) The best code is one in which code groups are randomly assigned, with no rhyme or reason that an enemy can discern. Codes are compiled and kept in codebooks, not unlike dictionaries, where the encoder can look up the word or phrase and the corresponding group that stands for it. But even random codes have an obvious vulnerability: Constant repetitious use of the same code groups in messages enables code breakers to tease out their meaning from context or position.

The other type of system is called a cipher, in which a single letter—or number—is replaced by another single letter or number. Ciphers can be created by scrambling letters, which is called transposition—turning the word “brain,” for example, into “nirab.” Or a cipher can be achieved by replacing individual units with other units, a method called substitution: By substituting X for b, T for r, V for a, O for i, and P for n, for example, brain becomes “XTVOP.” For centuries, ciphers were created by hand, often by those clever Renaissance men who would line alphabets up against one another and create boxes and tables that gave a way to substitute one letter for another. But when radio and telegraph came along, messages could be sent much, much faster than a wigwag flag could do. Machines were needed that could encipher rapidly; and, because it became easier to spot simple patterns when so many messages were being sent and intercepted, more complicated ciphers were needed. People can make complex ciphers, but people make mistakes. Machines are less likely to do so. These machines created an early form of what would later be called encryption, which meant that people who broke them might be described as an early version of what would later be called hackers.

Leave a comment

Filed under education, language, military, nationalism, U.S., war

Hello Girls and Yeomanettes in World War I

From Code Girls, by Liza Mundy (Hachette, 2017), Kindle pp. 76, 81:

Parker Hitt was a champion of women and a believer in women’s intellectual abilities as well as their bedrock stamina. In Europe, Parker Hitt was charged with overseeing battlefield communications for the Army’s Signal Corps. The Americans, British, and French strung phone lines around Europe and needed telephone operators to connect the calls. Switchboard operation was women’s work, and male soldiers refused to do it. French operators were not as adept as American ones, so the Signal Corps recruited U.S. switchboard operators who were bilingual in English and French and loaded them into ships bound for Europe. Known as the “Hello Girls,” these were the first American women other than nurses to be sent by the U.S. military into harm’s way. The officers whose calls they connected often prefaced their conversations by saying, “Thank Heaven you’re here!” Parker Hitt pushed for the Hello Girls to be allowed to prove their competence and courage. They did so, remaining at their posts even when ordered to evacuate during bombing in Paris, and moving to the front lines, where they worked the switchboards during explosions and fires.

The U.S. Navy, meanwhile, was developing its own female secret weapon, as part of a code-breaking operation that, true to the prevailing climate, was kept jealously separate from the Army or any other rival entity. Upon America’s entry into World War I, the country had struggled to quickly enlarge its modest career Navy, and created a men’s naval reserve that permitted civilian men to serve during wartime, often as specialists with expertise in areas such as math or science. Even this influx wasn’t enough, however, and it occurred to Secretary of the Navy Josephus Daniels to wonder aloud whether there was any law “that says a yeoman must be a man.” Remarkably, there was not. Nowhere in the Naval Reserve Act of 1916 did it say that a naval yeoman had to be male. Thanks to that loophole, American women were permitted to enlist in the naval reserves during World War I, and the designation “Yeoman (F)” was created. The move was controversial, even shocking, to the public, but many more women hastened to enlist than the Navy had expected. To the women’s disappointment, they were not allowed to serve on ships (nurses, who were in a different category, could do so) but mostly worked as clerks and stenographers, facilitating the towering stacks of paperwork that the naval bureaucracy generates—the original yeoman’s work. During the first global conflict of the twentieth century, eleven thousand American women served as Yeoman (F)—also called yeomanettes.

Leave a comment

Filed under democracy, education, labor, language, military, U.S., war

U.S. Army vs. Navy Codebreaker Recruitment

From Code Girls, by Liza Mundy (Hachette, 2017), Kindle pp. 26-27, 32-38:

The Navy was a service that cared about status. It wanted women who were well connected socially, and there also seems to have been interest in knowing what the women looked like. The application asked that the women submit passport photos, some of which excited a bit of commentary. “I might point out that the passport photos will scarcely do justice to a number of the members of the course,” enthused Harvard’s Donald Menzel, saying that the women’s “appearance is such that large-scale photographs would be a grace to any naval office.”

Around the same time, another meeting was taking place. Twenty women’s colleges sent representatives to the elegant Mayflower Hotel in Washington, D.C., where the U.S. Army was working to forge its own ties with institutions that schooled women. Already it was clear that educated women would be needed for the broader war effort. As the country coped with an acute labor shortage, the inspector general of the Department of Labor noted that adult civilians would not be sufficient to stock an economy bereft of its male workers. Students would be needed, and it made sense to start with the female ones. So the Army worked to tap its own network of women’s colleges before the Navy could reach them; indeed, the Navy suspended its own efforts to set up training at Connecticut College when it learned that the Army had gotten there first.

Disparate as their backgrounds were, the women who answered these summonses—that of the Navy and that of the Army—had a handful of qualities in common. They were smart and resourceful, and they had strived to acquire as much schooling as circumstances would permit, at a time when women received little encouragement or reward for doing so. They were adept at math or science or foreign languages, often all three. They were dutiful and patriotic. They were adventurous and willing. And they did not expect any public credit for the clandestine work they were entering into.

One of the best code-breaking assets is a good memory, and the only thing better than one person with a good memory is a lot of people with good memories. Every step of the process—the division of enemy traffic into separate systems; the noting of scattered coincidences; the building up of indexes and files; the managing of vast quantities of information; the ability to pick out the signal from the noise—enabled the great intuitive leaps. The precursor work during the war was almost always done by women, and many of those intuitive leaps were made by women as well.

Precisely because they did not expect to be celebrated or even promoted, the women tended to be collegial. This was in marked contrast to the Navy men—especially—who were fighting for recognition in a hotly careerist service. “The women who gathered together in our world worked very hard. None of us had an attitude of having to succeed or outdo one another, except in trivial ways,” recalled Ann Caracristi years later. “I mean, you wanted to be the first to solve a particular problem, or you wanted to be the first to get this recovery. But there was very little competition for, you know, for money, or anything of that nature, because everybody really assumed that when the war was over we would be leaving… The majority of the people considered it a temporary way of life.”

What is interesting about this generation of women is that they did understand that at some point they might have to work for pay. Forged by the Depression, they knew they might have to support themselves, even on a teacher’s salary, no matter how “good” a marriage they did or did not make. Some were sent to college with the idea that it would be ideal to meet a man, but their degree would permit them to “fall back” on teaching school. And some women went to college because they were, in fact, ambitious and planned to compete for the few spots in law or medical schools that were available to them.

Suddenly these women were wanted—for their minds. “Come at once; we could use you in Washington,” was the message conveyed to Jeuel Bannister, a high school band director who had taken an Army course on cryptanalysis at Winthrop College, in Rock Hill, South Carolina.

In the 1940s, the American labor force was strictly segregated by gender. There were newspaper want ads that read “Male Help Wanted” and others that read “Female Help Wanted.” For educated women, there was a tiny universe of jobs to be had, and these always paid less than men’s jobs did. But it turned out that the very jobs women had been relegated to were often the ones best suited to code-breaking work. Schoolteaching—with the learning it required—was chief among these. Knowledge of Latin and Greek; a close study of literature and ancient texts; facility with foreign languages; the ability to read closely, to think, to make sense of a large amount of data: These skills were perfect.

But there were other women’s jobs that turned out to be useful. Librarians were recruited to make sense of discarded tangles of coded messages. “Nothing had been filed. It was just a mess,” said Jaenn Coz, one of a number of code-breaking librarians who came to work for the Navy. “They sucked us out from all over the country.” Secretaries were good at filing and record keeping and at shorthand, which is itself a very real kind of code. Running office machines—tabulator, keypunch—was a woman’s occupation, and thousands were now needed to run the IBM machines that compared and overlapped multidigit code groups. Music majors were wanted; musical talent, which involves the ability to follow patterns, is an indicator of code-breaking prowess, so all that piano practicing that girls did paid off. Telephone switchboard operators were unintimidated by the most complex machines. In fact, the communications industry from its origins was one that had been considered suitable for women. Boys delivered telegrams, but women connected calls, in large part because women were considered more polite to callers.

Character also mattered. Here again, women’s colleges were ideal. All the schools had codes of comportment—curfews, housemothers, chaperones, rules about not smoking in your room and not having men visit you in private and not having sex and not wearing trousers or shorts in public. All of this enabled the women to sail through the military’s background checks. Bible colleges were even better; many of those graduates didn’t drink.

Leave a comment

Filed under democracy, economics, education, labor, migration, military, nationalism, U.S., war

The 1941 Boom in U.S. Codebreaking Jobs

From Code Girls, by Liza Mundy (Hachette, 2017), Kindle pp. 22-25:

During World War II, code breaking would come into its own as one of the most fruitful forms of intelligence that exists. Listening in on enemy conversations provides a verbatim, real-time way to know what that enemy is thinking and doing and arguing about and worrying over and planning. It provides information on strategy, troop movements, shipping itineraries, political alliances, battlefield casualties, pending attacks, and supply needs. The code breakers of World War II advanced what is known as signals intelligence—reading the coded transmissions of enemies, as well as (sometimes) of allies. They laid the groundwork for the now burgeoning field of cybersecurity, which entails protecting one’s data, networks, and communications against enemy attack. They pioneered work that would lead to the modern computing industry. After the war, the U.S. Army and Navy code-breaking operations merged to become what is now the National Security Agency. It was women who helped found the field of clandestine eavesdropping—much bigger and more controversial now than it was then—and it was women in many cases who shaped the early culture of the NSA.

The women also played a central role in shortening the war. Code breaking was crucial to Allied success in defeating Japan, both at sea and during the bloody amphibious assaults on Pacific islands against a foe that was dug in, literally—the cave fighting toward the end of the war was terrible, as were kamikaze attacks and other suicide missions—and willing to fight to the death. And in the all-important Atlantic theater, U.S. and British penetration of the Nazi Enigma cipher that German admiral Karl Dönitz used to direct his U-boat commanders helped bring about the total elimination of the Nazi submarine threat.

The chain of events that led to the women’s recruitment was a long one, but a signal moment occurred in September 1941, when U.S. Navy rear admiral Leigh Noyes wrote a letter to Ada Comstock, the president of Radcliffe College, the women’s counterpart to Harvard. For more than a year the Navy had been quietly recruiting male intelligence officers from elite colleges and universities, and now it was embarking on the same experiment with women. Noyes wanted to know whether Comstock would identify a group of Radcliffe students to be trained in cryptanalysis. He confided that the Navy was looking for “bright, close-mouthed native students”—that is, high-achieving women who had the sense and ability to keep a secret and who had been born in the United States and were free of close ties with other nations.

“Evidence of a flair for languages or for mathematics could be advantageous,” Noyes said, adding that “any intense sociological quirks would, of course, be undesirable.” Without stating what such “quirks” might be, the admiral suggested that a handful of promising seniors could enroll in a training course the Navy had developed.

“In the event of total war,” Noyes told her, “women will be needed for this work, and they can do it probably better than men.”

Ada Comstock was happy to comply. “It interests me very much and I should like to take whatever steps would be thought serviceable,” she promptly wrote to her friend Donald Menzel, an astronomy professor at Harvard who was serving as a point person for the broader naval recruiting effort. Astronomy is a mathematical science and a naval one—for centuries, navigation was done using the position of the sun and the stars—and many of the instructors who taught the secret course would come from the field.

At the Navy’s request, Comstock also approached leaders of other women’s schools. These deans and presidents were devoted to the cause of educating women and eager to defend liberty and freedom of thought against fascism and totalitarian belief systems. They also were keen to develop career opportunities for their students. The leaders savvily perceived that war might open up fields—and spots in graduate schools—that up to now had been closed to women. Even before Comstock received the Navy’s letter, many of the leaders had been strategizing over how they could provide what Virginia Gildersleeve, dean of Barnard College, called “trained brains” to a war effort that would depend on advances in science and math.

The women’s college leaders met at Mount Holyoke on October 31 and November 1, 1941, with representatives from Barnard, Bryn Mawr, Vassar, Wellesley, Radcliffe, Smith, and Mount Holyoke attending. Comstock told them about the Navy’s request and said Radcliffe would participate. She distributed some materials the Navy had developed: a “Guide for Instructors” and an “Introduction to Students.” The idea was that selected students would take the course during the remainder of their senior year, then go to work for the Navy, in Washington, as civilians. The “Guide for Instructors” assured them that no prior experience was necessary and that they would receive a “gouge,” or answers to the problems. The instructors would be given a few texts to jump-start their own education, including a work called Treatise on Cryptography, another titled Notes on Communications Security, and a pamphlet called The Contributions of the Cryptographic Bureaus in the World War—meaning World War I, the so-called war to end all wars.

The result was the wave of secret letters that appeared in college mailboxes in the fall of 1941, summoning surprised young women to secret meetings. Most were in the top 10 percent of their class, selected based on academic performance as well as character and loyalty and grit.

Leave a comment

Filed under Britain, economics, education, Germany, Japan, labor, language, military, nationalism, U.S., war