a. UNNECESSARY WORDS. Message whill be shortened by the deletion of
unnecessary words. Conjonctions, prepositions, punctuation marks,
and repetitions of any given word will be reduced to a minimum.
b. PUNCTUATION AND NUMBERS. To insure accuracy, the message drafter
will spell out, either in full or abbreviated form, punctuation marks
to be included in the message; numbers will be spelled out in full.
c. ABBREVIATIONS. Authorized abbreviations should be used whenever
practicable.
d. ADDRESSES AND SIGNATURES. Addresses and signatures within classified
messages will be reduced to a minimum. Messages from or to a given
station automatically are considered as from or to the commander
thereof. It is detrimental to security to include within all messages
from or within messages to a particular station tthe name or title of
the commander thereof or any individual in the command.
e. DRAFTER'S NOTATION. To assure proper classification of messages and
the use of appropriate cryptographic systems, the message drafter
should write on message form (but not as part of the message
transmitted): "This is an original message", or "This is an answer of a
(TOP SECRET) (SECRET) (CONFIDENTIAL) (RESTRICTED) (UNCLASSIFIED)
message."
{Author's remark: the variable spacing prevents Crib positionning.}
Digits
ZERO, ONE, TWO, THREE, FOUR, FIVE, SIX, SEVEN, EIGHT, NINE
Excerpt of TICOM DF-120:
The numbers (our main source of entry) are not written out anymore
but are sent as double letters:
1 is aa, 2 is bb, 3 is cc, … 0 is jj.
Cardinal
Excerpt of FM 24-5:
4 = FOUR
40 = FOUR ZERO (not FORTY)
400 = FOUR ZERO ZERO (not FOUR HUNDRED)
455 = FOUR FIVE FIVE
Ordinal
Excerpt of FM 24-5:
Ordinal numbers above the ordinal number 10th, when expressed in
figures followed by "d", or "th", are cryptographed merely as digits
spelled out without adding the "d" or "th".
Dates and hours
Excerpt of FM 24-5
28. ARMY AND NAVY METHODS OF SPECIFYING TIME
a. The Army and the Navy use 24-hour clock. In the 24-hour clock, time
is always expressed as a group of four numerals. The first two numerals
of the group denote the hour and the last two numerals the minute after
the hour. Ordinary or 12-hour time may be converted to 24-hour time by
adding 12 hours to all times from 1:00 PM to midnight, inclusive.
b. The date may be expressed in either of two ways :
(1) For the current month, the day may be indicated by preceding the
four-digit time group with a two-figure date group, indicating the day
of the month. For example 080600 ist he 8th day of the month and the
time is 6:00 AM.
(2) The date and time may be stated by using the four-digit time group,
followed by the month, day, and if desirable the year.
c. The heading of all messges, dispatches, reports, and orders
transmitted by radio, telegraph, or cable to the War Department will
include the date and the time of origin expressed by six digits as
prescribed in b(1) above. The date group, time group, or date-time
group may be omitted from messages, dispatches, reports, and orders
transmitted by radio in the abbreviated form or abbreviated normal
form when necessary.
d. Greenwich Civil Time is used within the Navy and in joint operations,
unless otherwise prescribed, and within the Army, in both the heading
and text of all communication in the following categories :
(1) Messages and orders from the War Department.
(2) Messages and reports to the War Deparment.
(3) Orders, reports, and other communication between headquarters not
having common local time.
(4) Communication with the armed forces of associated nations.
e. All the groups expressing Greenwich Civil Time, including those in
the headings of messages, will be desinated by the letter suffix Z
immediately following the last digit of the group. For example, 190225Z
indicates 2:25 AM on the 19th day of the current month Greewich Civil
Time.
Author's example of a time :
10:30PM (2230) will be coded by TWO TWO THREE ZERO HOURS
Important word, individual letter
An important word (a location for example) is repeated or spelled with
the standard phonetic alphabet.
Joint Army/Navy Phonetic Alphabet (1943) (for example in Signal Corps
Technical Information letter No14):
A: Able G: George M: Mike S: Sail/Sugar Y: Yoke
B: Baker H: How N: Nan T: Tare Z: Zebra
C: Charlie I: Item O: Oboe U: Uncle
D: Dog J: Jig P: Peter V: Victor
E: Easy K: King Q: Queen W: William
F: Fox L: Love R: Roger X: X-ray
In FM 24-5 (1942) and TM 11-454 (1942), Differences with 1943 version:
A:Afirm, C:Cast, H:Hypo, I:Inter, N:Negat, O:Option, P:Prep,
S:Sail, U:Unit, Z:Zed
The phonetic alphabet is also used to list individual letters, for
example:
FM 24-5: FOX MIKE TWO FOUR DASH FIVE
Addresses
Note: The manipulation of addresses are principaly described in the
FM 24-5 manual.
When addressee and sender addresses correspond directly to the Call
Signs, these are sufficient to handling the message. When addresses
specify commanding officers, the addressee address is inserted at
random within the body and near the beginning of the message preceded
by the word "For" (or "To"), and the identity of the writer of the
message near the end of the message preceded by the word "From". The
position of these insertions varies in order to maintain cryptographic
security.
The addresses are enclosed by parenthesis. As the punctuation marks
are spelled, a parenthesis is remplaced by the word "PAREN". Now, we
can understand the affirmation of the German cryptanalysts that the
word "PAREN" can always be found in a depth.
By war's end, PAREN was not the only way to frame an address, americans
also used CMA, PD, CLN or XXX (TICOM DF-120).
Exerpt of TM 11-469:
Addresses and signatures within classified messages will be reduced to
a minimum. Messages from or to a given command or station automatically
are considered as form or to the commander thereof. It is detrimental
to security to include within all messages from or within all messages
to a particular station the name or title of the commander thereof or
any individual in the command.
Never place cryptographed addresses or signatures at the beginning or
end of the cryptographed text. Bury them at random in the body of the
message.
Abbreviations
In TICOM DF-120, the German Cryptanalysts complained that the Americans
used a lot of abbreviations. This use in fact greatly increased
security.
In Message Book M-210, there is a partial list of authorized
abbreviations. The complete list is contained in FM 21-30 manual.
Other manuals contains abbreviations, for example the AR 850-150.
Here an exerpt of these documents.
Command Post: CP Number: NO Captain: CAPT
Command Officer: CO Truck: TRK Sergeant: SGT
General: GEN Battalion: BN Zone of Interior: Z of I
Colonel: COL Company: CO Year: YR
Lieutenant: LT Division: DIV December: DEC
Tank: TK Regiment: RGT West: W
Headquarters: HQ Brigade: BRIG Message: MSG
Brigade Adjutant: S-1 Infantry: INF
Intelligence Officer: S-2 Ordonance Officer:OO
Plans and training officer: S-3 Switchboard: SB
Supply Officer: S-4 Field Artillery: FA
Assistant chief of staff for personnel: G-1
Assistant chief of staff for military intelligence: G-2
Assistant chief of staff for plans and training: G-3
Assistant chief of staff for SUpply: G-4
Avoiding impact of stereotypes
Universal Stereotypes
Excerpt of TM 11-469:
The following words and types of words are considered universal
stereotypes and are to be avoided at the beginning and ending of
all messages.
Types of words:
- Compass directions.
- Correspondence symbols.
- Geographic names associated with the place of origin or
destination of message.
- Months.
- Names of persons readily associated with the place of origin
destination.
- Numbers.
- Phonetic-alphabet components
- Punctionation (including END, STOP, PD, CMA, QUOTE, UNQUOTE,
PAREN, etc.)
- Ranks, grades, titles.
Specific words:
ACKNOWLEDGE FOR REPEAT*
ACTION FROM REPLY*
ADVISE HEADQUARTERS REPORT*
ATTENTION IN REPLY REQUEST*
AUTHORITY INFORMATION RERAD*
CITE MAIN RETEL*
CONDITION MESSAGE REURAD*
DATE OUR SHIPMENT
DESIRED PACKAGE SIGNED
DUTY PARAPHRASE STATUS
EFFECTIVE RADIO SYSTEM
ENEMY RECEIPT* YEAR
FOLLOWING REFERENCE* YOUR
* At the beginning only.
{Author's note:
-
RERAD: Reradiation jamming = Receive-alter-etransmit a signal in order
to deceive the enemy.
-
RETEL: Referring to telegram.
-
REURAD: Refer to (Regarding) your message.
}
Need for Bisection or Padding
Excerpt of TM 11-469:
The presence of stereotypes might so facilitate the solution of
messages that an entire cryptographic system would be compromissed in
a very short time. Stereotyped beginning and endings, however are
dangers which can be avoided by the judicious use of bisection or
padding. Bisection or Padding will not be considered a substitute
for paraphrasing.
Bisection
Excerpt of TM 11-469:
Bisection will ordinarly be applied to any message having a stereotyped
beginning or ending, or both, except when the message is one of a
series of short routine reports which are periodically transmitted.
(Padding will be applied to short routine reports. ...)
The following instructions will be observed by code room personnel
when bisection is applied to a message.
a. DIVISION OF MESSAGES. Divide the message into two segments between
two words not considered stereotyped or within a word, e below. For
example, the following message is divided between the words OF and CODE
REQUEST FULL INFORMATION CLARIFYING YOUR
RECOMMENDATION RE REVISION OF // CODE
ROOM PROCEDURE FOR LARGE HEADQUARTERS
The point at which messages are divided should not be the same but
should vary from message to message.
b. CONSONANTS. Select at random any consonant except X and Z. Repeat
the consonant to make a five-letter group, and place this group at
the end of the second segment.
c. TRANSPOSING. Transpose the two segments of the message, placing
the second segment first, followed by the five-letter group, and the
fist segment last so that the message will be cryptographed in the
following order :
SECOND SEGMENT.
FIVE-LETTER GROUP.
FIRST SEGMENT.
With R as the repeated consonant, the plain text of the example...
will read as follows :
CODE ROOM PROCEDURE FOR LARGE HEADQ-
UARTERS RRRRR REQUEST FULL INFORMATION
CLARIFYING YOUR RECOMMENDATION RE REVI-
SION OF
Padding
Excerpt of TM 11-469:
a. NEED : Padding will be applied, as needed, at either the beginning
or ending, or at both the beginning and ending of a message.
b. PADDING WORDS. Words for padding will be selected according to the
following instructions:
(1) Care will be taken to avoid the use of any word which could be
interpreted as having any relation to the text of the message. Words
indicating the beginning or ending of a message such as start or
that is all will not be used.
(2) Words used at the beginning will bear no relation to words used
at the end. For example, such beginnings and endings as the following
will not be used :
"trolley … car", "Chicago … Illinois."
(3) The type of words used for padding will vary form message to
message and within a single message. Names of cities, flowers, fruits,
etc. vill not be used habitually.
(4) Care will be taken that the words selected for padding do not
themselves become stereotyped. It is suggested that list of randomly
chosen of varying lengths be prepared and a check-off method used to
prevent repetition of words. A dictionary may be used for this purpose
as long as the words are chosen at random.
c. AMOUNT USED. The total amount of padding used will be varied from
message to message; within a single message the amount of padding used
at the beginning will differ from that used at the end.
d. SEPARATION OF PADDING. Padding will be separated from the beginning
and from the ending of the message by the insertion of any doubled
consonant except XX and ZZ.
e. REPONSIBLE PERSONNEL. Padding will be added at the point of origin
by code room only, and will be removed at the destination by code room
personnel prior to delivery of the message to the addressee.
f. EXAMPLES. Examples of the use of padding are as follows:
(1) STIPULATION CEREBELLUM AUTOMOBILE GRAMMATICAL GG CHARLIE FOUR
SEVEN DASH THREE ONE VICTOR SEVEN DEP BELEM ONE ZERO ZERO ZERO ZEBRA
ETA NATAL ONE TWO ZERO ZERO ZEBRA MM LABOR CIGARETTE CONGRESS
(2) OVERCOAT FF THREE BAKER ONE SEVEN DASH ABLE GEORGE THREE FIVE
DASH FOX THREE ONE EIGHT DASH THREE HOW FOX SIX ETA NATAL ZERO EIGHT
ZERO ZERO ZEBRA ETA BELEM ONE ZERO ZERO ZEBRA SS MASTADON HAGGARD
Paraphrasing
What?
Paraphrasing is the changing of the physical make-up of a message
without changing the meaning of the message.
When?
Excerpt of TM 11-469:
a. The content of a previously cryptographed message is released to
the public or given a wide distribution within the Army.
b. It is necessary to send in cryptographic form:
(1) All or portions of a message previously transmitted in plain
text.
(2) Extracts from publications, regulations, or instructions.
c. It is necessary to transmit in plain text all or portions of
message previously sent in cryptographic form.
d. A classified message is recryptographed in a different cryptographic
system.
e. A classified message is recryptographed in a different key of the
same system.
How?
Excerpt of TM 11-469:
Paraphrasing is accomplished by applying to the message as many of the
following processes as practicable:
a. Changing the sequence of paragraphs.
b. Changing the sequence of sentences.
c. Shifting the positions of the subject, predicate, and modifiers
in each sentence.
d. Changing from active to passive voice.
e. Substituting synonyms or equivalent expressions.
f. Changing the length of the paraphrased version of the message so
that the final cipher text will not ressemble the original cipher
text with respect to length.
Example
a. Original Message :
DESTRUCTION OF BRIDGE AT WETBURG ACCOM-
PLISHED GERMAN RECONNAISSANCE FORCE CON-
SISTING OF BATTALION REINFORCED BY PLA-
TOON OF LIGHT TANKS TRAPPED ON WEST SIDE
OF RIVER AND NOW MOVING NORTH BETWEEN
HILLS FOUR THREE TWO AND FIVE ZERO SEVEN
DASH ABLE UNDER SHELLING FROM OUR ARTIL-
LERY ENEMY EXPECTED TO ATTEMPT CROSSING
SOUTH OF PILCHEN THEIR SUCCESS PROBABLE
AGAINST OUT PRESENT STRENGHT UNLESS ADDI-
TIONAL ARTILLERY AND DIVE BOMBERS AT-
TACHED PD RECENT TANK DESTROYER REPLACE-
MENTS ADEQUATE
c. The completly paraphrased version now reads as follows :
NEED MORE CANNON AND DIVE BOMBERS TO PRE-
VENT ANTICIPATED GERMAN THRUST ACROSS
RIVER BELOW PILCHEN ADDED TANK DESTROY-
ERS SUFFICIENT WE HAVE TRAPPED ENEMY RE-
CONNAISSANCE BATTALION PLUS FEW LIGHT
TANKS PD BLEW UP WETBURG BRIDGE CATCHING
THEM ON THE WEST BANK PD AS THEY RETREAT
NORTH NOW BETWEEN HILLS FOUR THREE TWO
AND FIVE ZERO SEVEN DASH ABLE OUR GUNS
POUNDING THEM
A paraphrased version will be handled as a new and separate message,
and will bear no external relationship to the message which was
paraphrased. For example, the date-time group appearing in the
heading of the original message must not be used in the heading of
the paraphrased message. Necessary reference, susch as "Parapharase
of ______ (date-time group and/or originator's reference number),"
should be buried within the paraphrased version to enable the addressee
to make an accurate reference in his reply to the originator.
Security tags
The AR 380-5 describes the basic rules gouverning the classification
given to a document, a message or a cryptographic device. There are
several classification : top secret, secret, confidential or restrited.
All classified messages must be cryptographed.
Excerpt of TM 11-380 (1947)
c. Separate keys and separate key-list indicators will be provided at
all times for CONFIDENTIAL and RESTRICTED traffic except within a
division (or smaller tactical unit) preparing its own pin and lug
settings. In such units, the same pin and lug setting may be used for
CONFIDENTIAL and RESTRICTED traffic and the key-list indicators
omitted; all traffic will be considered CONFIDENTIAL unless otherwise
specified within the body of the message. If a message is RESTRICTED,
the designation XX RESTRICTED XX will be buried in the text before
encrypting. When the key-list indicator is omitted, the system indicator
will be substituted in its place, and will thus appear twice in the two
five-letter indicator groups.
...
i. Converter M-209-(*) will never be used for SECRET traffic except
when a system normally authorized for SECRET traffic is not available.
When a SECRET message must be enciphered by means of Converter M-209-(*),
the CONFIDENTIAL key will be used and the word SECRET, set off by two
X’s on each side, will be buried in the text before encrypting.
j. Converter M-209-(*) will not be used for CONFIDENTIAL traffic above
the level of corps or comparable organization except as authorized by
the Army Security Agency of the theater or the War Department.
k. Separate keys and separate key-list indicators will be provided at
all times for CONFIDENTIAL and RESTRICTED traffic except within a
division (or smaller tactical unit) preparing its own pin and lug
settings. In such units, the same pin and lug setting may be used for
CONFIDENTIAL and RESTRICTED traffic and the key-list indicators
omitted; all traffic will be considered CONFIDENTIAL unless otherwise
specified within the body of the message. If a message is RESTRICTED
the designation XX RESTRICTED XX Will be buried in the text before
encrypting. When the key-list indicator is omitted, the system indicator
will be substituted in its place, and will thus appear twice in the two
five-letter indicator groups.
References
-
War Department - FM 24-5, Signal Communication,
October 19, 1942
-
War Department - TM 11-469, Communication Security, December 1944
(This document describes bisection, padding, paraphrasing, ...)
-
War Department - AR 380-5, Safeguarding Military Information,
1939
(This document explains how to classify [top secret, ...] a document)
-
War Department - AR 850-150, Authorized Abbreviations and Symbols,
-
War Department - TM 11-454, The Radio Operator,
1942
-
Message Book M-210 -
ilord
NF6X
-
War Department - FM-21-30, Conventional Signs, Military Symbols,
and Abbreviations,
(1941)
-
War Department - TM 11-380, Converter M-209, M-209A, M-209B (cipher),
17 March 1944
-
War Department - TM 11-380, Converter M-209, M-209A, M-209B (cipher),
(1947)
-
Signal Corps Technical Information letter -
No14
-
TICOM -
DF-120
-
National Archives and Records Service Franklin D.Roosevelt library
Churchill to Roosevelt - 1942
(Example of drafted texts with numbers and punctuations spelled)
-
Naval Telecommunication Procedure (1997)
NTP 3(J)
- San Francisco Maritime National Park Association
ECM page
In this page, there is a paragraph about drafting
(COMPLIANCE WITH OPERATING PROCEDURES)