Page 189 - The Secret War in the Italian front in WWI (1915-1918)
P. 189

CHAPTER NINE




                  Among the possible countermeasures, the systematic substitution of the Red Code with the Blue
                  Code “which differs from the Red Code only in the page numbering” was excluded .
                                                                                               19
                  However, the letter also contains some shoddy suggestions concerning for instance to use the Green
                  Cover Code for communications between High Commands and the Pocket Military Cipher for other
                  radio dispatches. The reasons given for these choices were the larger reliability of the former because its
                  limited usage and the latter pretty secrecy due to variable keys changing every week.
                  In sum, while the diagnosis seemed correct, the recommended therapy showed evident shortcomings.
                  Relying on the Pocket Military Cipher was evidently a mistake. On the other hand, the potential
                  spread of the Green Code - limited in fact during the following months - might have compromised
                  it, if a further protection by means for instance of an effective second encoding, should had not
                  been provided.
                  Contrary to the Intelligence Office suggestion, the Red Code was suspended only temporarily,
                  probably due to the lack of an effective alternative and it reappeared on 25 April with a different
                  page numbering and an extremely simple over-coding implemented by adding fixed or periodically
                  variable numbers to the code groups.
                  A weak form of overencoding based on addition or subtraction was frequently adopted also for
                  other  codes  such as the  M13,
                  used for communications with
                  Military  Attachés abroad and
                  with  the  colonies,  until  the
                  SI  Code introduction  in the
                  following year . Picture 9.3
                                20
                  shows the over-encoding table
                  for M13, to be applied as further
                  protection  to the periodically
                  changing page numbering in
                  a similar  way adopted  for the
                  Red Code, but valid even for an
                  entire year .
                            21
                  A similar  table  was adopted
                  in early 1917 in  Albania  for
                  communications  between the
                  Italian task force and the local   9.3 An over-encoding table for the M13 code (ISCAG Archive)
                  French General Headquarters.
                  However, in this case, the table could change in each single cryptogram, allowing the coding
                  operator to choose the numbers to add to or subtract from the code groups achieved from the
                  Mengarini Code. According to Figl, breaking this code - which had been strengthened by hiding
                  the address and reference number inside the encoded text of the dispatches - was the result of
                  German analysts’ long, hard work .
                                                 22




                  19  ibidem.
                  20   Intelligence Office, Istruzioni relative al cifrario diramato in data 31 gennaio 1916 (Instructions concerning the cipher
                  distributed on 31 January 1916), no. 380, 1 February 1916, AUSSME, Series E11, env.89.It is worth recalling the M13 is the

                  1913 edition of the Mengarini code.
                  21  Territorial Command of the Headquarters of the General Staff Corps, Intelligence Office, Aggiunte da inserirsi nel cifrario
                  distribuito il 31 gennaio 1916 (Additional items to be included in the cipher distributed on 31 January 1916), ibidem.
                  22  O.J. Horak, Oberst a.D. Andreas Figl, op. cit., p.178 - 179, 290.


                                                                                                     187
   184   185   186   187   188   189   190   191   192   193   194