Magic (cryptography) explained

Magic was an Allied cryptanalysis project during World War II. It involved the United States Army's Signals Intelligence Service (SIS) and the United States Navy's Communication Special Unit.

Codebreaking

Magic was set up to combine the US government's cryptologic capabilities in one organization dubbed the Research Bureau. Intelligence officers from the Army and Navy (and later civilian experts and technicians) were all under one roof. Although they worked on a series of codes and cyphers, their most important successes involved RED, BLUE, and PURPLE.

RED

In 1923, a US Navy officer acquired a stolen copy of the Secret Operating Code codebook used by the Imperial Japanese Navy during World War I. Photographs of the codebook were given to the cryptanalysts at the Research Desk and the processed code was kept in red-colored folders (to indicate its Top Secret classification). This code was called "RED".

BLUE

In 1930, the Japanese government created a more complex code that was codenamed BLUE, although RED was still being used for low-level communications. It was quickly broken by the Research Desk no later than 1932. US Military Intelligence COMINT listening stations began monitoring command-to-fleet, ship-to-ship, and land-based communications.

PURPLE

See main article: Purple code. After Japan's ally Germany declared war in the fall of 1939, the German government began sending technical assistance to upgrade their communications and cryptography capabilities. One part was to send them modified Enigma machines to secure Japan's high-level communications with Germany. The new code, codenamed PURPLE (from the color obtained by mixing red and blue), was baffling.

PURPLE, like Enigma, began its communications with the same line of code but then became an unfathomable jumble. Codebreakers tried to break PURPLE communiques by hand but found they could not. Then the codebreakers realized that it was not a manual additive or substitution code like RED and BLUE, but a machine-generated code similar to Germany's Enigma cipher. Decoding was slow and much of the traffic was still hard to break. By the time the traffic was decoded and translated, the contents were often out of date.

A reverse-engineered machine created in 1939 by a team of technicians led by William Friedman and Frank Rowlett could decrypt some of the PURPLE code by replicating some of the settings of the Japanese Enigma machines. This accelerated decoding and the addition of more translators on staff in 1942 made it easier and quicker to decipher the traffic intercepted.

PURPLE traffic

The Japanese Foreign Office used a cipher machine to encrypt its diplomatic messages. The machine was called "PURPLE" by U.S. cryptographers. A message was typed into the machine, which enciphered and sent it to an identical machine. The receiving machine could decipher the message only if set to the correct settings, or keys. American cryptographers built a machine that could decrypt these messages.

The PURPLE machine itself was first used by Japan in 1940. U.S. and British cryptographers had broken some PURPLE traffic well before the attack on Pearl Harbor. However, the PURPLE machines were used only by the Foreign Office to carry diplomatic traffic to its embassies. The Japanese Navy used a completely different crypto-system, known as JN-25.

U.S. analysts discovered no hint in PURPLE of the impending Japanese attack on Pearl Harbor. Nor could they, as the Japanese were very careful not to discuss their plan in Foreign Office communications. No detailed information about the planned attack was even available to the Japanese Foreign Office, as that agency was regarded by the military, particularly its more nationalist members, as insufficiently "reliable".

U.S. access to private Japanese diplomatic communications (even the most secret ones) was less useful than it might otherwise have been because policy in prewar Japan was controlled largely by military groups like the Imperial Way Faction, and not by the Foreign Office. The Foreign Office itself deliberately withheld from its embassies and consulates much of the information it did have, so the ability to read PURPLE messages was less than definitive regarding Japanese tactical or strategic military intentions.

U.S. cryptographers (see Station HYPO) had decrypted and translated the 14-part Japanese diplomatic message breaking off ongoing negotiations with the U.S. at 1 p.m. Washington time on 7 December 1941, even before the Japanese Embassy in Washington could do so. As a result of the deciphering and typing difficulties at the embassy, the note was delivered late to American Secretary of State Cordell Hull. When the two Japanese diplomats finally delivered the note, Hull had to pretend to be reading it for the first time, even though he already knew about the attack on Pearl Harbor.

Throughout the war, the Allies routinely read both German and Japanese cryptography. The Japanese Ambassador to Germany, General Hiroshi Ōshima, often sent priceless German military information to Tokyo. This information was routinely intercepted and read by Roosevelt, Churchill and Eisenhower. According to Lowman, "The Japanese considered the PURPLE system absolutely unbreakable… Most went to their graves refusing to believe the [cipher] had been broken by analytic means… They believed someone had betrayed their system."

Distribution prior to Pearl Harbor

Even so, the diplomatic information was of limited value to the U.S. because of its manner and its description. "Magic" was distributed in such a way that many policy-makers who had need of the information in it knew nothing of it, and those to whom it actually was distributed (at least before Pearl Harbor) saw each message only briefly, as the courier stood by to take it back, and in isolation from other messages (no copies or notes being permitted). Before Pearl Harbor, they saw only those decrypts thought "important enough" by the distributing Army or Navy officers.

Nonetheless, being able to read PURPLE messages gave the Allies a great advantage in the war. For instance, the Japanese ambassador to Germany, Baron Hiroshi Ōshima, produced long reports for Tokyo which were enciphered on the PURPLE machine. They included reports on personal discussions with Adolf Hitler and a report on a tour of the invasion defenses in Northern France (including the D-Day invasion beaches). General Marshall said that Ōshima was "our main basis of... information regarding Hitler's intentions in Europe".

Dewey and Marshall

During the 1944 election, Thomas Dewey threatened to make Pearl Harbor a campaign issue,[1] until General Marshall sent him a personal letter which said, in part:

To explain the critical nature of this set-up, which would be wiped out in an instant if the least suspicion were aroused regarding it, the Battle of Coral Sea was based on deciphered messages and therefore our few ships were in the right place at the right time. Further, we were able to concentrate our limited forces to meet their naval advance on Midway when otherwise we almost certainly would have been some 3000miles out of place. We had full information on the strength of their forces.

Dewey promised not to raise the issue, and kept his word.

Post-war debates

The break into the PURPLE system, and into Japanese messages generally, was the subject of acrimonious hearings in Congress post-World War II in connection with an attempt to decide who, if anyone, had allowed the disaster at Pearl Harbor to happen and who therefore should be blamed. During those hearings the Japanese learned, for the first time, the PURPLE cypher system had been broken. They had been continuing to use it, even after the War, with the encouragement of the American Occupation Government.

Much confusion over who in Washington or Hawaii knew what and when, especially as "we were decrypting their messages," has led some to conclude "someone in Washington" knew about the Pearl Harbor attack before it happened, and, since Pearl Harbor was not expecting to be attacked, the "failure to warn Hawaii one was coming must have been deliberate, since it could hardly have been mere oversight". However, PURPLE was a diplomatic, not a military code. Thus, only inferences could be drawn from PURPLE as to specific Japanese military actions.

History

When PURPLE was broken by the U.S. Army's Signals Intelligence Service (SIS),[2] several problems arose for the Americans: who would get the decrypts, which decrypts, how often, under what circumstances, and crucially (given interservice rivalries) who would do the delivering. Both the U.S. Navy and Army were insistent they alone handle all decrypted traffic delivery, especially to highly placed policy makers in the U.S. Eventually, after much to-ing and fro-ing, a compromise was reached: the Army would be responsible for the decrypts on one day, and the Navy the next.

The distribution list eventually included some—but not all—military intelligence leaders in Washington and elsewhere, and some—but, again, not all—civilian policy leaders in Washington. The eventual routine for distribution included the following steps:

Decryption process

There were several prior steps needed before any decrypt was ready for distribution:

  1. Interception. The Japanese Foreign Office used both wireless transmission and cables to communicate with its off shore units. Wireless transmission was intercepted (if possible) at any of several listening stations (Hawaii, Guam, Bainbridge Island in Washington state, Dutch Harbor on an Alaska island, etc.) and the raw cypher groups were forwarded to Washington, D.C. Eventually, there were decryption stations (including a copy of the Army's PURPLE machine) in the Philippines as well. Cable traffic was (for many years before late 1941) collected at cable company offices by a military officer who made copies and started them to Washington. Cable traffic in Hawaii was not intercepted due to legal concerns until David Sarnoff of RCA agreed to allow it during a visit to Hawaii the first week of December 1941. At one point, intercepts were being mailed to (Army or Navy) Intelligence from the field.
  2. Deciphering. The raw intercept was deciphered by either the Army or the Navy (depending on the day). Deciphering was usually successful as the cipher had been broken.
  3. Translation. Having obtained the plain text, in Latin letters, it was translated. Because the Navy had more Japanese-speaking officers, much of the burden of translation fell onto the Navy. And because Japanese is a difficult language, with meaning highly dependent upon context, effective translation required not only fluent Japanese, but considerable knowledge of the context within which the message was sent.
  4. Evaluation. The translated decrypt had to be evaluated for its intelligence content. For example, is the ostensible content of the message meaningful? If it is, for instance, part of a power contest within the Foreign Office or some other part of the Japanese government, its meaning and implications would be quite different from a simple informational or instructional message to an Embassy. Or, might it be another message in a series whose meaning, taken together, is more than the meaning of any individual message. Thus, the fourteenth message to an Embassy instructing that Embassy to instruct Japanese merchant ships calling at that country to return to home waters before, say, the end of November would be more significant than a single such message meant for a single ship or port. Only after having evaluated a translated decrypt for its intelligence value could anyone decide whether it deserved to be distributed.

In the period before the attack on Pearl Harbor, the material was handled awkwardly and inefficiently, and was distributed even more awkwardly. Nevertheless, the extraordinary experience of reading a foreign government's most closely held communications, sometimes even before the intended recipient, was astonishing. It was so astonishing, someone (possibly President Roosevelt) called it magic. The name stuck.

Executive Order 9066

One aspect of Magic remains controversial to this day—the amount of involvement the intercepts played in the issuing of United States Executive Order 9066 on February 19, 1942, and subsequent Executive Order 9102 on March 18, which led to the creation of the Wartime Relocation Authority (WRA). This is often confused with the issue of internment, which was actually handled by the Justice Department's Immigration and Naturalization Service (INS) and affected all citizens of countries at war with the United States in any location.

Internment of "enemy aliens" by the U.S. government began two months prior to Executive Order 9066 on December 8, 1941, immediately after the attack at Pearl Harbor and included Germans and Italians, and not just the Japanese living on the U.S. West Coast.[3]

David Lowman in his book MAGIC: the Untold Story reports that the primary justification for the Japanese-American relocations and internments was to protect against espionage and sabotage, because Magic could not be mentioned during the war. Those defending the decision to evacuate and relocate when seen in context, notably blogger and investigative reporter Michelle Malkin, point to Magic intercepts as partial justification for EO 9066. Malkin cites 1984 testimony of the Undersecretary with the most Magic knowledge, who stated[4] that Magic "was a very important factor" in their considerations.

Extensive additional primary source documents are cited in Malkin's book In Defense of Internment[5] to argue that Magic intercepts discuss the development of a spy ring among Japanese Americans by the Japanese consulates, provide the type of espionage data being sent to Japan, and much more which raised a suspicion that many thousands in the Japanese American community were an espionage risk, including members of Kibei, Issei and Nisei.

In 1988, Congress passed and President Ronald Reagan signed legislation that apologized for the internment on behalf of the U.S. government. The legislation said that government actions were based on "race prejudice, war hysteria, and a failure of political leadership".[6] The hearings that produced this decision did not take into account the Magic intercepts.

The following is the actual text of several Magic intercepts translated into English before and during the war and declassified and made public in 1978 by the U.S. government (The Magic Background of Pearl Harbor, Government Printing Office, 8 volumes)

Tokyo to Washington

Magic intercept Tokyo to Washington #44 – Jan 30, 1941

Intercept dated January 30, 1941 and noted as translated 2-7-41Numbered #44

Japanese U.S. consulates to Tokyo

Throughout the rest of 1941, some of the messages between Tokyo and its embassies and consulates continued to be intercepted.

In response to the ordered shift from propaganda efforts to espionage collection, the Japanese consulates throughout the western hemisphere reported their information normally through the use of diplomatic channels, but when time-sensitive through the use of PURPLE encoded messages. This provided vital clues to their progress directly to the U.S. President and his top advisers.

Intercepts in May 1941 from the consulates in Los Angeles and Seattle report that the Japanese were having success in obtaining information and cooperation from "second generation" Japanese Americans and others.

Magic intercept LA to Tokyo #067 – May 9, 1941

Intercept dated May 9, 1941 and translated 5-19-41Numbered #067

Magic intercept Seattle to Tokyo #45 – May 11, 1941

Intercept dated May 11, 1941 and translated 6-9-41Numbered # 45

Access by Roosevelt's cabinet

These intercepts plus other reports from the FBI and the Office of Naval Intelligence counter-espionage efforts, the TACHIBANA espionage case during summer 1941, FBI efforts against Japanese yakuza throughout the 1930s along the West Coast (the TOKOYO and TOYO CLUBs) were all available only to the most senior leaders in the Roosevelt cabinet. Even J. Edgar Hoover, Director of the FBI, was not privy to the existence of Magic intelligence.

Opposing viewpoint

Those who consider that Executive Order 9066 regarding Japanese American internment was not based on Magic intercepts, argue:

One theory is that Stimson wanted DeWitt to provide justifications that could be made public, because the Magic intercepts could not be made public.

The issue was inflamed due to the release of Malkin's 2004 book, In Defense of Internment, in which the Magic intercepts play a major role in the defense of her thesis.

Other Japanese ciphers

PURPLE was an enticing, but quite tactically limited, window into Japanese planning and policy because of the peculiar nature of Japanese policy making prior to the War (see above). Early on, a better tactical window was the Japanese Fleet Code (an encoded cypher), called JN-25 by U.S. Navy cryptanalysts. Breaking into the version in use in the months after December 7, 1941 provided enough information to lead to U.S. naval victories in the battles of the Coral Sea and Midway, stopping the initial Japanese advances to the south and eliminating the bulk of Japanese naval air power.

Later, broken JN-25 traffic provided the schedule and routing of the plane Admiral Isoroku Yamamoto would be flying in during an inspection tour in the southwest Pacific, giving USAAF pilots a chance to ambush the officer who had conceived the Pearl Harbor attack. Later still, access to Japanese Army messages from decrypts of Army communications traffic assisted in planning the island hopping campaign to the Philippines and beyond.

Another source of information was the Japanese Military Attaché code (known as JMA to the Allies) introduced in 1941. This was a fractionating transposition system based on two-letter code groups which stood for common words and phrases. The groups were written in a square grid according to an irregular pattern and read off vertically, similar to a disrupted columnar transposition. Then the letters were superenciphered using a pre-arranged table of alphabets. This system was broken by John Tiltman at Bletchley Park in 1942.

Other claimed breaks into PURPLE

The 1992 book The Sword and the Shield: The Mitrokhin Archive and the Secret History of the KGB, by Christopher Andrew, based on the Mitrokhin Archive smuggled out of Russia in the early 1990s by a KGB archivist, contains information about wartime Soviet knowledge of Japanese enciphered transmissions. It claims that the Soviets independently broke into Japanese PURPLE traffic (as well as the Red predecessor machine).

It claims that decrypted PURPLE messages contributed to the decision by Stalin to move troops from Far Eastern Asia to the area around Moscow for the counterattack against Germany in December 1941, as the messages convinced the Soviet government that there would not be a Japanese attack.

How secret was Magic?

Public notice had actually been served that Japanese cryptography was dangerously inadequate by the Chicago Tribune, which published a series of stories just after Midway, starting on 7 June 1942, which claimed (correctly) that victory was due in large part to the U.S. breaking into Japanese crypto systems (in this case, the JN-25 cypher, though which system(s) had been broken was not mentioned in the newspaper stories). The Tribune claimed the story was written by Stanley Johnston from his own knowledge (and Jane's).

Ronald Lewin points out that the story repeats the layout and errors of a signal from Admiral Nimitz which Johnston saw while on the transport Barnett. Nimitz was reprimanded by Admiral King for sending the dispatch to Task Force commanders on a channel available to nearly all ships. The Lexington's executive officer, Commander Morton T. Seligman was assigned to shore duty and retired early.

However, neither the Japanese nor anyone who might have told them seem to have noticed either the Tribune coverage, or the stories based on the Tribune account published in other U.S. papers. Nor did they notice announcements made on the floor of the United States Congress to the same effect. There were no changes in Japanese cryptography connected with those newspaper accounts or Congressional disclosures.

Alvin Kernan was an aviation ordnanceman on board the aircraft carriers and the during the war. During that time, he was awarded the Navy Cross. In his book Crossing the Line, he states that when the carrier returned to Pearl Harbor to resupply before the Battle of Midway, the crew knew that the Japanese code had been broken and that U.S. naval forces were preparing to engage the Japanese fleet at Midway. He insists that he "…exactly remembers the occasion on which I was told, with full details about ships and dates…" despite the later insistence that the breaking of the code was kept secret.

U.S. Navy Commander I.J. Galantin, who retired as an Admiral, refers several times to Magic in his 1988 book about his Pacific theater war patrols as captain of the U.S. submarine . However, Galantin refers to Magic as "Ultra" which was actually the name given to the breaking of the German code. Upon receiving one message from Pacific Fleet command, directing him off normal station to intercept Japanese vessels due to a Magic message, Galantin writes. "I had written my night orders carefully. I made no reference to Ultra and stressed only the need to be very alert for targets in this fruitful area". Galantin had previously mentioned in his book that all submarine captains were aware of "Ultra" (Magic).

In addition, Army Chief of Staff George C. Marshall discovered early in the war that Magic documents were being widely read at the White House, and that "…at one time over 500 people were reading messages we had intercepted from the Japanese… Everyone seemed to be reading them" .

Fiction

Neal Stephenson's novel Cryptonomicon includes a fictionalized version of Magic, with the Japanese cryptosystem being named "Indigo" rather than "PURPLE".

James Bond is given the products of the fictionalized "MAGIC 44" decryption programme in You Only Live Twice as a bargaining chip when he is deployed to negotiate for intelligence concessions from Tiger Tanaka, head of Japanese intelligence.

The W.E.B. Griffin series The Corps is a fictionalized account of United States Navy and Marine Corps intelligence operations in the Pacific Theater during World War II. Many of the main characters in the novels, both fictional and historical, have access to and use intelligence from Magic.

See also

Sources

Further reading

Notes and References

  1. Web site: Certain Aspects of MAGIC in the Cryptological Background of the Various Official Investigations into the Attack on Pearl Harbor (SRH-125) . William F. . Friedman . 45–47 .
  2. Web site: Preliminary Historical Report of the Solution of the "B" Machine . William F. . Friedman . October 14, 1940 . https://web.archive.org/web/20130404171310/http://cryptocellar.web.cern.ch/cryptocellar/PURPLE_History.pdf . April 4, 2013 . dead . Cryptocellar.web.cern.ch.
  3. Stephen Fox, "The Unknown Internment: An Oral History of the Relocation of Italian Americans during World War II"
  4. http://www.mansell.com/eo9066/1984/IA213.html JAAWR Hearings (1984)
  5. Malkin (2004), cf entire chapters on subversives, spies, MAGIC, and the rationale for evacuation
  6. 100th Congress, S. 1009, reproduced at Internment archives. Retrieved September 19, 2006.