TICOM

{{for| the academic institution abbreviated TICOM|Tilburg Institute of Comparative and Transnational Law}}

TICOM (Target Intelligence Committee) was a secret Allied project formed in World War II to find and seize German intelligence assets, particularly in the field of cryptology and signals intelligence.{{sfn|Rezabek|2017|loc=I Introduction}}

It operated alongside other Western Allied efforts to extract German scientific and technological information and personnel during and after the war, including Operation Paperclip (for rocketry), Operation Alsos (for nuclear information) and Operation Surgeon (for avionics).

History

The project was initiated by the British, but when the US Army Chief of Staff General George Marshall learnt of it, it soon became Anglo-American. The aim was to seek out and capture the cryptologic secrets of Germany. The concept was for teams of cryptologic experts, mainly drawn from the code-breaking center at Bletchley Park, to enter Germany with the front-line troops and capture the documents, technology and personnel of the various German signal intelligence organizations before these precious secrets could be destroyed, looted, or captured by the Soviets.{{sfn|Parrish|1986|p=276}}{{sfn|Rezabek|2017|loc=I Introduction: Origin of TICOM}} There were six such teams.{{sfn|Rezabek|2017|loc=III The Teams}}

  • Team 1 was tasked to capture German Geheimschreiber (secret writer) machines whose enciphered traffic was code named Fish
  • Team 2 was to assist Team 1 with transporting Field Marshal Kesselring's communications train to Britain (the so-called "Jellyfish Convoy"){{sfn|Rezabek|2012|loc=IV Case Studies: FISH and the Jellyfish Convoy}}
  • Team 3 was to investigate an intact German Signals intelligence unit called "Pers Z S"
  • Team 4 was to investigate in more detail the places in southern Germany that the Team 1 search had passed over quickly
  • Team 5: Following the serendipitous discovery of a waterproof box containing some of the archives of the Cipher Department of the High Command of the Wehrmacht (OKW/Chi) on the bed of Lake Schliersee, this team was tasked with recovering anything else of value from that lake
  • Team 6 aimed to capture and exploit material from the German Naval Intelligence Center and the German SIGINT headquarters

=OKW/''Chi'' (High Command)=

The Allied supposition that the Supreme Command of the German Armed Forces, the Oberkommando der Wehrmacht Chiffrierabteilung (abbreviated OKW/Chi) was the German equivalent of Bletchley Park, was found to be incorrect. Despite it being the top SIGINT agency in the German military, it did not set policy. It did not co-ordinate or direct the signal intelligence work of the different services. It concentrated instead on employing the best cryptanalysts to design Germany's own secure communications systems, and to assist the individual services organisations.{{sfn|Rezabek|2012|loc=II The Targets: OKW/Chi (High Command)}} These were:

  • The Army (Heer) OKH/GdNA, the Oberkommando des Heeres/General der Nachrichtenaufklärung{{sfn|Rezabek|2012|loc=II The Targets: GdNA (Army)}}
  • Air Force (Luftwaffe) Chi Stelle{{sfn|Rezabek|2012|loc=II The Targets: Chi Stelle (Air Force)}}
  • Navy (Kriegsmarine) Beobachtungsdienst or B-Dienst{{sfn|Rezabek|2012|loc=II The Targets: B-Dienst (Navy)}}
  • Foreign Office Pers ZS{{sfn|Rezabek|2012|loc=II The Targets: Pers ZS (Foreign Office)}}
  • Nazi Party Forschungsamt or FA{{sfn|Rezabek|2012|loc=II The Targets: FA (Nazi Party)}}

Drs Huttenhain and Fricke of OKW/Chi were requested to write about the methods of solution of the German machines.{{sfn|Huttenhain|Fricke|1945}} This covered the un-steckered Enigma, the steckered Enigmas; Hagelin B-36 and BC-38; the cipher teleprinters Siemens and Halske T52 a/b, T52/c; the Siemens SFM T43; and the Lorenz SZ 40, SZ42 a/b. They assumed Kerckhoffs's principle that how the machines worked would be known, and addressed only the solving of keys, not the breaking of the machines in the first place. This showed that, at least amongst the cryptographers, the un-steckered Enigma was clearly recognized as solvable. The Enigmas with the plugboard (Steckerbrett) were considered secure if used according to the instructions, but were less secure if stereotyped beginnings or routine phrases were used, or during the period of what they described as the "faulty indicator technique" - used up until May 1940. It was their opinion, however, that the steckered Enigma had never been solved.{{sfn|Huttenhain|Fricke|1945|pp=4,5}}

=FA Discovery=

The discovery in May 1945 of the Nazi Party's top secret FA signals intelligence and cryptanalytic agency at the Kaufbeuren Air Base in southern Bavaria came as a total surprise.{{sfn|Rezabek|2012|loc=II The Targets: FA (Nazi Party)}} The province of Luftwaffe chief Hermann Göring, it has been described as "the richest, most secret, the most Nazi, and the most influential" of all the German cryptanalytic intelligence agencies.{{sfn|Kahn|2000|p=178}}

=Russian "FISH" Discovery=

File:Russian Fish.jpg" for loading and shipment to England, June 1945.]]

The greatest success for TICOM was the capture of the "Russian Fish", a set of German wide-band receivers used to intercept Soviet high-level radio teletype signals. On May 21, 1945, a party of TICOM Team 1 received tip that a German POW had knowledge of certain signals intelligence equipment and documentation relating Russian traffic. After identifying the remaining members of the unit, they were all taken back to their previous base at Rosenheim. The prisoners recovered about 7 ½ tons of equipment. One of the machines was re-assembled and demonstrated. TICOM officer 1st Lt. Paul Whitaker later reported. "They were intercepting Russian traffic right while we were there…pretty soon they had shown us all we needed to see."{{sfn|Rezabek|2012|loc=IV Case Studies: Russian FISH}}{{Citation |title=TICOM Team 1 Report Appendix 14: Baudot Equipment Report on Gen Der Nach. Aufkl. Gruppe VI |url= https://drive.google.com/file/d/0B7sNVKDp-yiJMWM1ZTFmMjEtMmVhMC00MmI5LTg1NTYtNDIzZmFiZTYyNGM4/view}}

=Related efforts=

In Operation Stella Polaris the Finnish signals intelligence unit was evacuated to Sweden following the Finland/Soviet cease-fire in September 1944. The records, including cryptographic material, ended up in the hands of Americans.

See also

  • Ralph Tester, senior British codebreaker who worked on the TICOM project

Notes

{{reflist}}

References

  • {{Citation |last = Bamford |first = James |author-link = James Bamford |title = Body of Secrets: How America's NSA & Britain's GCHQ Eavesdrop On The World |place = London |publisher =Arrow |year = 2002 |edition = New |isbn = 978-0099427742 |title-link = Body of Secrets }} (includes material on the TICOM take)
  • {{Citation |last = Huttenhain |first = Orr |last2 = Fricke |title = OKW/Chi Cryptanalytic Research on Enigma, Hagelin and Cipher Teleprinter Messages |publisher = TICOM |year = 1945 |url = https://drive.google.com/file/d/0B7sNVKDp-yiJOWYxZWFmNDgtODUyMS00Y2FiLThkNWItYmQ5N2JmMzEyMzIz/view }}
  • {{Citation |last = Kahn |first = David |author-link = David Kahn (writer)|title = Hitler's Spies: German Military Intelligence In World War II |place= Cambridge, MA |publisher = Da Capo Press |year = 2000 |isbn = 978-0306809491}}
  • {{Citation | last = Parrish | first = Thomas | title = The Ultra Americans: The U.S. Role in Breaking the Nazi Codes | place = New York | publisher = Stein and Day | year = 1986 | isbn = 978-0-8128-3072-9 | url-access = registration | url = https://archive.org/details/ultraamericansth00parr }}
  • {{Citation |last = Rezabek |first = Randy |title = TICOM: The Last Great Secret of World War II |journal = Intelligence and National Security |volume = 27 |issue = 4 |pages = 513–530 |year = 2012 |doi = 10.1080/02684527.2012.688305 |url = https://zenodo.org/record/898714 }}
  • {{Citation |last = Rezabek |first = Randy |title = TICOM: the Hunt for Hitler's Codebreakers |publisher = Independently published |year = 2017 |url = http://www.ticomarchive.com/home |isbn = 978-1521969021 }}

Category:History of cryptography

Category:Espionage projects

Category:Operation Paperclip

Category:Operation Alsos

Category:Operation Surgeon

Category:Signals intelligence of World War II