Page 131 - The Secret War in the Italian front in WWI (1915-1918)
P. 131

CHAPTER SIX




                  Baudot code . With fewer consecutive words a lower number of combinations can be achieved:
                              39
                  four words give rose to 16 letters or symbols and so on.
                  Accepting a higher level of complexity, the letters obtained with the above-mentioned method
                  could be, for instance, assembled in couple, developing a small code where the combinations of
                  two letters correspond to syllables, words, or entire sentences.
                  Concealed ciphers are not suitable to convey long and complex messages. In order to increase,
                  although to a limited extent, the amount of information contained within a concise telegram, the first
                  letter of each word of the transmitted text may be associated with a number, according to an easily
                  memorized table (d, t = 1; y, n, z = 2; m, w = 3; etc.). In this case, with five words one can transmit
                  the same number of group of figures from 0 to 9, obtaining a number of combinations much greater
                  than that of the previous examples. Since each code group of many secret and commercial codes
                  in use between 1914 and 1918 usually comprised five figures, the just mentioned dissimulation
                  allows to transmit a secret word or an entire sentence with only five words in the dispatch .
                                                                                                    40
                  To make concealed ciphers ineffective, censorship tried to change, in suspect telegrams, the order
                  of words, or alter them while maintaining - a as far as possible - the original meaning of the
                  message.


                  concealed languages

                  Dispatches using these kinds of language can hide military information concerning movements
                  of troops, ships, etc. into text that apparently regards innocuous topics. During WWI, in order
                  to increase the security of telephone communications, all Armies systematically used concealed
                  vocabularies where words commonly occurring in military communications were replaced by
                  names related to different domains, such as historical, geographical, foods, beverages, etc.
                  Intelligence operators would also use even simpler concealed languages appropriate for short
                  telegraph communications. As the Head of Intelligence Service of the Italian 1  Army Tullio
                                                                                              st
                  Marchetti describes in his book , fiduciaries operating in the Austrian territories transmitted to him
                                              41
                  information on Austro-Hungarian troops activities by telegrams written in a concealed language
                  and conveyed through other agents at designated addresses in Switzerland .
                                                                                      42
                  Italian officers, prisoners of war in the Austro-Hungarian Empire, frequently offered an unexpected
                  Intelligence contribution by means of telegrams sent to their families containing some relevant
                  information  in concealed  languages,  probably  product  of customary  practice  in  telephone
                  communications on the front line. At times, this information proved to be effective, despite the

                  understandable difficulty and danger in collecting and telegraphing it from a prison camp.







                  39  In 1874 Emil Baudot patented the first numerical code made up of a sequence of five bits, namely 1 or 0. The 32 possible
                  combinations allows encoding alphabet letters but not 1-to-10 numbers. This problem was solved by means of a symbol
                  marking the transition from letters to numbers.
                  40   . During WWI, some German spies applied this method to telegraph dispatches, using ABC, a commercial code widespread
                  at international level. One of them was the famous Maria de Victorica or Baroness Maria von Kretschamn, probably the
                  daughter of a German general. She was arrested in New York in April 1918 and died two years later in prison. She became
                  famous after the leading character in spy stories transposed in some films. (H.O. Yardley, op. cit.,183 -187).
                  41  Tullio Marchetti, Ventotto anni nel Servizio. op. cit., p.153 -155.
                  42  According to Tullio Marchetti, “fiduciaries” were often “Unredeemed” (in Italian “Irredenti” i.e., people living in Italian
                  territories making part of the Austrian Empire), who provided information for patriotism, while “informers” did that for
                  money.


                                                                                                     129
   126   127   128   129   130   131   132   133   134   135   136