• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Intelligence 101

Teaching You About Intelligence Analysis

Online Intelligence Training – Foundation Training For Intelligence Analysts 

  • Get Started Here
  • HOMETake me back
  • ABOUTWhat We’re About
  • All-Source IntelligenceSee All Our Blog Posts Here
    • Analytical Tradecraft
    • All Source Intelligence
    • Criminal Intelligence
    • Human Intelligence (HUMINT)
    • Imagery Intelligence (IMINT)
    • Intelligence Agencies
    • Measurement and Signature Intelligence (MASINT)
    • Military Intelligence
    • Open Source Intelligence
    • Psychological Operations (PSYOPS)
    • SIGINT
    • Spying and Espionage
    • Surveillance
  • RESOURCESTools of the Trade
    • Frequently Asked Questions
    • Ebook
    • Open Source Intelligence Masterclass
    • Intelligence Analysts Bookshelf
  • CONTACTGet in contact

Cipher

Knowledge is Powe(r) – A Crash Course in Ciphers, Codes, and Cryptography

By Ben Stark on January 28, 2020 0

Knowledge is Powe(r) – A Crash Course in Ciphers, Codes, and Cryptography (Feat. Simon Bacon & William Friedman)

Welcome back Intel Analysts –

This week I stumbled across a little known photograph that took me down a rabbit hole of codes, ciphers and cryptic messages  –

Read on to find the hidden code in this image.

knowledge is power - hidden messages in plain sight intelligence101

For those following me on twitter or FB, I asked the importance of this 1918 image?

View full image here

Turns out, this photo contains a hidden message – a hidden code in plain sight!

Cool huh?

For context, the photo is of U.S. Army code breakers trained by William Friedman and his wife Elizebeth during WW1.

William and Elizebeth Friedman had astonishing careers in cryptanalysis, and William is known today as the father of modern American cryptology (Source).

If you look closely, you’ll note soldiers are either facing forward towards the camera, while others are facing to the side –

– a hidden code in plain sight

Using the Baconian Cipher (or Bacon’s Cipher) the soldiers can be divided into groups of 5, and the secret message decoded using the A/B system.

Before I give away the secret message however, let’s take a quick lesson into how codes, ciphers and cryptography work.

Codes – Codes are used to translate whole words into other words, phrases or numbers.

Ciphers – Change the individual characters into numbers, alternative letters or symbols.

Cryptography – Is the art / science of writing and deciphering codes.

Cryptanalysis – the term used for the study of methods for obtaining the meaning of encrypted information without access to the key normally required to do so. I.e. the study of how to crack encryption algorithms or their implementations.

How Ciphers Work?

Ciphers have three parts,

  1. the plain text – the letters or words revealed after the cipher is decoded
  2. the cover-text – the message used to conceal the plain text
  3. the key – used to decode the cover-text to reveal the plain text.

Famous Ciphers

The most famous of these is the enigma machine – which encoded German communications during WWII.

Enigma Intelligence101

Bacon’s A/B System 

Within the Baconian Cipher each letter of the plain text is replaced by a group of five ‘A’s, or ‘B’s – according to the key below:

Codes Ciphers and Cryptography - Intelligence101

In our context, Friedman employed the Baconian cipher with soldiers facing towards the camera, and others facing away.

The crucial part about Bacon’s system is that the a’s, and b’s do not actually need to be represented by the letters explicitly.

In his system, the a’s and b’s could be divided into any two distinct classes – such as fruit (e.g. apples & oranges) or open and shut windows in a photograph.

The secret message, hidden in plain sight was the famous Baconian motto “Knowledge is power,” but there were insufficient people to complete the ‘R’ (and apparently one soldier in the ‘W’ group looked the wrong way) –

 

William Friedman was particularly fond of this photo and kept this picture on his desk at home and in his office.

Friedman Desk at home

Bacon Binary System (Advanced) –

If you check out the Bacon system on Wikipedia it explains about using a binary set of numbers rather than the A/B system as described –

An advanced method of this cipher involves converting your coded message into binary code (1’s and 0’s) and overlaying it with a corresponding block of cover text.

Binary Intelligence101

Secret Message: “BACON TAUGHT ME HOW TO THINK”

Becomes:

00001 00000 00010 01110 01101 10011 00000 10100

00110 00111 10011 01100 00100 00111 01110 10110

10011 01110 10011 00111 01000 01101 01010.

Which can be hidden in a sentence of corresponding letters (23 blocks x 5 binary numbers = 115 characters).

I found a corresponding sentence from a random Wikipedia page on Selective Hearing:

“Selective auditory attention is a type of selective attention where ones auditory directed at things people are interested in hearing.” (115 characters)

Which looks like this when it’s broken up the text into blocks of 5 (to match the binary code):

Selec | tivea | udito | ryatt | entio | nisat | ypeo | fsele | ctive | atten | tionw | hereo | nesau | ditor | ydire | cteda | tthin | gspeo | plear | einte | reste | dinhe | aring

And then overlay the blocks of text with the binary blocks:

00001 00000 00010 01110 01101 10011 00000 10100
Selec tivea udito ryatt entio nisat ypeo fsele
00110 00111 10011 0110 00100 00111 01110 10110
Ctive Atten Tionw Hereo Nesau Ditor Ydire cteda
10011 01110 10011 00111 01000 01101 01010  
Tthin Gspeo Plear Eninte Reste Dinhe aring

And finally, put it back together making the 1’s boldface within the sentence.

The cover-text is written as:

Selective auditory attention is a type of selective attention where ones auditory directed at things people are interested in hearing.

(Use the Bacon binary method to decipher the plain-text code from the cover-text)

Other Ciphers and Ways to Code Messages

Replacing letters with numbers

Replacing letters with numbers or a simple cipher like -e.g. A=1, B=2, etc, or a simple cipher like -e.g. A=1, B=2, etc,

The Pigpen Code

Pigpen Code Intelligence101

Can you decipher this code?  Pigpen decipher

or perhaps most famous;

Morse Code

International Morse Code, used for communicating via electronic communication, with lights or sound – Morse code is probably the most well-known form of code / cipher.

  1. The length of a dot is one unit, whereas the dash represents three units.
  2. The space between parts of the same letter is one unit.
  3. The space between letters is three units.
  4. The space between words is seven units.

Can you decipher: – .. – / — ..- … – / -… . / …. .- .-. -.. / .-. . — . — -… . .-. .. -. –. / .- .-.. .-.. / – …. . … . / -.. .. – … / .- -. -.. / -.. .- …. …

Want More?

For more on Wiliam Friedman’s Famous Photograph (and analysis) by the GC Marshall Foundation see the below video (5 mins)

Activity

Ok, you’ve got the brief –

You’re now an expert in codes so decipher the Pigpen code above – post in the comments once complete.

Happy code-breaking.

Primary Sidebar

Best of Intelligence101

  • PSYOPS: The ULTIMATE Guide to Psychological Operations (PSYOPS)
  • Known Unknowns: Unpacking Information Requirements and the Direction phase of the Intelligence Cycle
  • Intelligence Failures: 3 Reasons How (and Why) Intelligence F#$K-ups Occur
  • “I Need You To Tell Me What’s Going On Here”: Analyse the Situation and Provide a Quick Assessment
  • 7 Opportunities for Criminal Intelligence Professionals During the COIVD-19 Crisis

Get Our Newsletter

INTREP: Do You Want To Be A Better Intelligence Analyst? Want Weekly Intelligence Tips and Techniques? Join Our Mailing List Below...

100% privacy. No games, no B.S., no spam. When you sign up, we'll keep you posted with one an email per week.

Categories

  • About Intelligence 101 (1)
  • All Source Intelligence (3)
  • Become A Better Intelligence Analyst (19)
  • Bias (2)
  • Cipher & Crypto (1)
  • Counter-Intelligence (1)
  • Criminal Intelligence (1)
  • Cyber Intelligence (Hacking) (1)
  • Human Intelligence (HUMINT) (2)
  • Imagery Intelligence (IMINT) (1)
  • Intelligence 101 (11)
  • Intelligence Agencies (3)
  • Intelligence Case Studies (2)
  • Intelligence Cycle (1)
  • Intelligence Operations (2)
  • Intelligence Resources (3)
  • Intelligence Training (5)
  • Interview Series (2)
  • Measurement and Signature Intelligence (MASINT) (1)
  • Military Intelligence (1)
  • Open Source Intelligence (2)
  • Political Intelligence (1)
  • Psychological Operations (PSYOPS) (2)
  • Resources (1)
    • Product and Service Reviews (1)
  • Security Intelligence (1)
  • SIGINT (1)
  • Spying and Espionage (1)
  • Surveillance (1)
  • Uncategorized (8)

Intelligence Analysts Bookshelf_ Essential Reading For Intelligence Professionals
99 of the BEST Intelligence Resources
How do you coup?
Crowdsourced Intelligence: Advantages, Disadvantages & How You Can Get Involved!
Knowledge is Powe(r) – A Crash Course in Ciphers, Codes, and Cryptography (Feat. Simon Bacon & William Friedman)
Intelligence Training Scenario
Intelligence101 Foundation Training Online Intelligence Course
24 Lessons Learnt From a Decade of Intelligence_ How to create Intelligence that matters
  • About
  • Privacy Policy, Terms and Conditions
  • Get Started Here
  • Intelligence Frequently Asked Questions
  • Blog Posts
  • Intelligence101 – Online Intelligence Analysis Course
  • Free Intelligence Training: Review of Level 1 Intelligence Analysis Course by Robert Folker

Copyright © 2021 · Smart Passive Income Pro on Genesis Framework · WordPress · Log in