Research and Technology - Forensic Science Communications - April 2006
April 2006 - Volume 8 - Number 2
Research and Technology
Code Breaking in Law Enforcement: A 400-Year History
Dorn Vernessa Samuel
Cryptanalysis and Racketeering Records Unit
Introduction | The Unabomber | The Zodiac Killer | The Hollow Nickel Case | William and Elizebeth Friedman | The Teapot Dome Scandal | Abraham Lincoln’s Assassination | Mary, Queen of Scots | Conclusion | References
In February 2004, 11-year-old Carlie Brucia was abducted and murdered in Sarasota, Florida. While in a county jail awaiting trial, the suspect in the case, Joseph Peter Smith, wrote an enciphered message to his brother (Figure 1). The seemingly random series of symbols and numbers was sent to the FBI for analysis. The FBI determined that Smith enciphered the message by replacing letters of the alphabet with a series of one- or two-character combinations of numerals and symbols. To further complicate decryption, he wrote the message from right to left, starting at the bottom of the page and working his way up. Despite these obstacles, FBI cryptanalysts were able to quickly decipher the message, which contained incriminating references to hiding evidence and moving the body. On November 17, 2005, the jury convicted Smith in the abduction and murder of Carlie Brucia.
I WLSH L HAD SOMTHLN JULCY TO SAY OH OK THE BACKPACK AND CLOTHES WENT IN FOUR DIFFERENT DUMPSTERS THAT MONDAY I CAME TO YOUR HOUSE FOR ADVISE I WENT IT I LEFT IT OUT IN THE OPEN I DRAGED THE BODY TO WHERE ST WAS FOUND DESTROY THIS AFTER DECIFERING IT AND SHUT UP
Figure 1: Joseph Peter Smith’s message to his brother, after being deciphered
Cryptanalysis is the art of solving secret codes and ciphers. In courtrooms throughout history, cryptanalysis has played a key role in bringing criminals to justice. This article provides a historical overview of the role cryptanalysis has played in major cases over the past 400 years.
It is well known that criminals use codes and ciphers to communicate to others. However, when the Unabomber, Theodore Kaczynski (Figure 2), documented his deeds, it was not intended for anyone but himself. Kaczynski kept notebooks in which he logged his crimes, his feelings about them, and detailed plans for future crimes. These notes were found in a handwritten numerical code that he used to disguise his writing, which was in both English and Spanish (Birch, personal communication, 2005; Gibson 2000). His attempts at secrecy proved futile, however. When he was finally identified, the case against him was sealed by the decryption and translation of the content of those notebooks.
Figure 2: Unabomber Theodore John Kaczynski
Unlike the Unabomber, who did not want his cryptic notations to be made public, the notorious Zodiac killer demanded that his ciphers be published in public newspapers. He thrived on the notoriety that the messages brought and even boasted of the strength of his ciphers. Despite his claims, Zodiac’s most famous cipher (Figure 3) was broken within a few hours by a husband and wife team of amateur code breakers. Other Zodiac ciphers remain unsolved, and the Zodiac killer has never been brought to justice.
Figure 3: One of the Zodiac killer’s enciphered messages
The inner workings of a Soviet spy ring were uncovered with the crack of a nickel by a Brooklyn newspaper delivery boy. When the unsuspecting boy dropped the nickel on the sidewalk, it split apart to reveal a microphotograph with a series of numbers (Figure 4). The numbered code, the product of a Soviet one-time pad encryption system, was not broken until 1957, after Soviet KGB officer Reino Hayhanen defected to the United States. The information he provided on Soviet codes and cryptosystems helped the FBI Laboratory break the code. The discovery of the hollow nickel and its contents eventually led to the conviction of a Soviet spy best known by his alias Rudolf Abel. In 1962 Abel was exchanged for American pilot Francis Gary Powers, whose U-2 spy plane had been shot down over the Soviet Union two years earlier (Federal Bureau of Investigation n.d.; Federal Bureau of Investigation 2004).
Figure 4: The hollow nickel used by Soviet spies to conceal messages
In 1937 the Canadian government requested the services of an American cryptanalyst to decipher messages written in Chinese by members of a suspected opium-smuggling ring. Five suspects from Vancouver, British Columbia, were found guilty of trading ammunition and guns for opium (National Security Agency n.d.; U.S. Coast Guard 2002). The cryptanalyst that the Canadians sought was Elizebeth Friedman. How did the Canadians know about this pioneer of U.S. cryptology? Three years earlier, she was the key U.S. government witness for the I’m Alone case between the United States and Canada.
The I’m Alone, a Canadian-flagged rumrunner, was sunk by the Coast Guard in the Gulf of Mexico, after its captain ignored an order to “heave to and be searched” (Mowry 2001). The Canadian government filed a $365,000 claim against the United States for the loss of its ship and cargo. To win the suit, the United States needed to prove that the ship was American-owned. Friedman’s decryption of 23 messages helped prove that the ship was owned by two men from New York City. The matter was settled between the two countries with an apology and $50,000 (Mowry 2001).
Friedman’s work in the I’m Alone case represented one of many ways she helped the U.S. government during Prohibition. She had been detailed to the Coast Guard to aid in the capture and prosecution of bootleggers following the passage of the Volstead Act, which enforced the 18th Amendment to the U.S. Constitution and prohibited the manufacture, sale, transportation, and possession of alcoholic beverages.
During Prohibition, Friedman decrypted thousands of messages and was able to link the ringleaders of numerous bootleg operations with suspected vessels. Friedman’s cryptanalytic work and testimony helped convict numerous rumrunners, including a large, powerful smuggling syndicate that ran a virtual smuggling monopoly in the Gulf of Mexico and on the West Coast (Mowry 2001).
Elizebeth Friedman was only half of the greatest marriage in the history of cryptology. Her husband, William Friedman, made significant contributions to the field of cryptanalysis, including breaking the Japanese diplomatic cipher (codenamed “Purple”) during World War II. Although William Friedman is best known for his wartime work, he also used his skills to support law enforcement. Both William and Elizebeth Friedman hold a place in the National Security Agency’s National Cryptologic Museum’s Hall of Honor (National Security Agency n.d.).
In 1924 William Friedman testified before a congressional committee regarding coded telegrams exchanged during the Teapot Dome scandal (Herzog 2000), which involved the secret leasing of U.S. government-owned lands to private developers in exchange for bribes. The oil-rich land was meant to provide U.S. naval ships with fuel in a national emergency. Then-Secretary of the Interior Albert Fall first got jurisdiction over the land transferred from the Department of the Navy to the Department of the Interior, then secretly leased the land to two oil companies. Friedman’s decryption of the coded telegrams led to a prison sentence for Fall and the resignation of other top government officials, including the Secretary of the Navy and the Attorney General (Bennett 1999; Herzog 2000).
On April 14, 1865, actor John Wilkes Booth shot President Abraham Lincoln as he watched a play at Ford’s Theatre in Washington, D.C. Lincoln died early the next morning. Did Booth work with a small group of coconspirators, or did he have the backing and approval of the Confederate government and its president, Jefferson Davis? Although controversy remains, some historians are convinced that Davis may have supported a plan to bomb the White House or kidnap Lincoln, if not to kill him at the theater (Linder 2002a; Linder 2002b; Wilkes, April 20, 2005; Wilkes, April 27, 2005).
Transcripts from the Lincoln Assassination Conspiracy Trial detail the use of ciphers between Booth, his fellow conspirators, and the Confederate government in Richmond, Virginia. According to the prosecuting attorney, the machine used to encrypt these ciphers was found in a room of the Confederate State Department in Richmond. An encrypted letter found in Booth’s possession was written using the same machine and, in the prosecutor’s opinion, further confirmed that Jefferson Davis and the Confederate government were involved in the plot (Linder 2002b).
The Military Commission convicted seven coconspirators. Four were put to death, including Mary Surratt, the first woman ever executed by the U.S. government. Three were sentenced to life in prison, and one received six years. An eighth coconspirator, John Surratt, who fled the United States following the assassination, was captured and then tried by a civilian court, which resulted in a hung jury. Together with a little-known Confederate agent named Sarah Slater, Surratt is believed to have transported enciphered messages from the Confederate government in Richmond to other Confederate agents in Canada. It is believed that these messages approved the assassination plot against Lincoln (Linder 2002a; Linder 2002b; Smith 2006).
Interestingly, Union officials had been reading Confederate ciphers throughout the Civil War. The same cannot be said for Confederate officials. They were so desperate in their decryption attempts that they published the Union’s encrypted messages in Southern newspapers, asking readers for help in deciphering them (Encyclopaedia Britannica 2006).
The oldest documented case of cryptanalysis in law enforcement occurred more than 400 years ago. In the 16th century, Mary, Queen of Scots, plotted to assassinate her cousin, Elizabeth, Queen of England. She transcribed many communications to her coconspirators using ciphers (Figure 5) and hoped they would be secure. Fortunately for Queen Elizabeth, the plot was uncovered with the unraveling of the secret communications. Unfortunately for Mary, the deciphered messages revealed the conspiracy and led to her conviction and death sentence (The National Archives n.d.; Singh 1999).
Figure 5: Mary, Queen of Scots, used enciphered messages such as this one in her plan to assassinate her cousin, Queen Elizabeth of England.
Source: The National Archives, U.K. Reprinted with permission.
Cryptanalysis has played a critical role in law enforcement for the past 400 years. Although the methods and techniques used by criminals change over time, the need for secret communication ensures that criminals will continue to use codes and ciphers. Law enforcement cryptanalysts will continue to engage in the battle of wits between criminal code makers and law enforcement code breakers.
Bennett, Leslie E. One lesson from history: Appointment of special counsel in the investigation of the Teapot Dome scandal, A Summary of the Teapot Dome Scandal from the Brookings Institution [Online]. (1999). Available: http://www.brook.edu/gs/ic/teapotdome/teapotdome.htm.
Birch, Michael P. Federal Bureau of Investigation, personal communication, October 27, 2005.
Encyclopaedia Britannica Premium Service. Cryptology, Encyclopaedia Britannica [Online]. (2006). Available: http://www.britannica.com/eb/article-25638?query=Encoding%20system&ct=.
Federal Bureau of Investigation. A byte out of history: Hollow nickel, hidden agent, Headline Archives [Online]. (June 7, 2004). Available: http://www.fbi.gov/news/stories/2004/june/060704nickel.htm.
Federal Bureau of Investigation. Famous cases: Rudolph Ivanovich Abel (Hollow Nickel case), FBI History [Online]. (n.d.). Available: http://www.fbi.gov/libref/historic/famcases/abel/abel.htm.
Gibson, Gail. FBI’s global crime war short on language experts: Agency is facing translation backlog, Baltimore Sun [Online]. November 2, 2000. Available: http://www.unabombers.com/News/00-11-02-BS-NotebookInSpanish-3.htm.
Herzog, Brad. The best code cracker of them all, Cornell Alumni Magazine [Online]. (January–February 2000). Available: http://www.bradherzog.com/cornell_codecracker.htm.
Linder, Doug. The Lincoln assassination conspirators trial, Jurist: Legal News & Research [Online]. (2002a). Available: http://jurist.law.pitt.edu/famoustrials/lincoln.php.
Linder, Doug. Summation of the Hon. John Bingham, special judge advocate in the Lincoln Assassination Conspiracy Trial, The Trial of the Lincoln Assassination Conspirators [Online]. (2002b). Available: http://www.law.umkc.edu/faculty/projects/ftrials/lincolnconspiracy/lincolnaccount.html.
Mowry, David P. Listening to the rumrunners [Online]. (2001). Available: http://www.nsa.gov/publications/publi00018.cfm.
The National Archives, Mary’s ciphers, Secrets and Spies [Online]. (n.d.). Available: http://www.nationalarchives.gov.uk/spies/ciphers/mary/default.htm.
National Security Agency. Elizebeth S. Friedman: 1892–1980. Hall of Honor: These Were the Giants [Online]. (n.d.). Available: http://www.nsa.gov/honor/honor00005.cfm.
Singh, Simon. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Doubleday, New York, New York, 1999, pp. 32–44.
Smith, Tonia J. Sarah Slater, eHistory [Online]. (2006). Available: http://ehistory.osu.edu/world/PeopleView.cfm?PID=162.
U.S. Coast Guard. Elizabeth [sic] Smith Friedman, Coast Guard cryptanalyst, U.S. Coast Guard [Online] (January 2002). Available: http://www.uscg.mil/hq/g-cp/history/faqs/Elizabeth_Friedman.html. Citing U.S. Coast Guard. Cracks Chino code, Coast Guard Magazine (August 1938) 10:60.
Wilkes, Donald E. Jr. Lincoln assassinated! Flagpole Magazine [Online]. (April 20, 2005). Available: http://www.lawsch.uga.edu/academics/ profiles/dwilkes_more/other_6Lincoln1.html.
Wilkes, Donald E. Jr. Lincoln assassinated!, Part 2, Flagpole Magazine [Online]. (April 27, 2005). Available: http://www.lawsch.uga.edu/academics/ profiles/dwilkes_more/other_7Lincoln2.html.