Signal Security In The Ardennes Offensive 1944-1945
()
About this ebook
The study concludes that both armies had similar equipment, basic procedures, and training in the areas of communications, SIGSEC and SIGINT, and suffered similar deficiencies in these areas. Analysis, however, revealed a deep disparity concerning their use and importance. The Americans’ near complete lack of regard for tactical SIGINT was a major factor contributing to the success of Hitler’s deception. The U.S. Army relied heavily upon intelligence gleaned from the German ULTRA code, and American intelligence officers were untrained in the use of tactical signal intelligence, mainly using it to validate operational plans. This attitude is reflected also in the American emphasis on SIGSEC. The Germans, however, were more experienced in SIGINT and SIGSEC, and formed a structure and doctrine that focused on immediately influencing tactical operations.
Major Laurie G. Moe Buckhout
See Book Description
Related to Signal Security In The Ardennes Offensive 1944-1945
Related ebooks
XIX Tactical Air Command And Ultra - Patton’s Force Enhancers In The 1944 Campaign In France Rating: 0 out of 5 stars0 ratingsThe Secret Air War Over France: USAAF Special Operations Units In The French Campaign Of 1944 Rating: 0 out of 5 stars0 ratingsThe Impact Of Political-Military Relations On The Use Of German Military Power During Operation Barbarossa Rating: 0 out of 5 stars0 ratingsThe Luftwaffe And Its War Of Attrition Rating: 5 out of 5 stars5/5Provide by Parachute: Airdrop In Vietnam, 1954-1972 Rating: 0 out of 5 stars0 ratingsLooking Down the Corridors: Allied Aerial Espionage over East Germany and Berlin, 1945-1990 Rating: 4 out of 5 stars4/5Survey Of German Tactics 1918 Rating: 3 out of 5 stars3/5The Ranger Force At The Battle Of Cisterna Rating: 0 out of 5 stars0 ratingsGerman Military Intelligence Rating: 4 out of 5 stars4/5The British Army on the Western Front 1916 Rating: 2 out of 5 stars2/5The Vanguard Of American Volunteers In The Fighting Lines And In Humanitarian Service: August,1914-April, 1917 [Illustrated Edition] Rating: 0 out of 5 stars0 ratingsThe Command Is Forward Rating: 0 out of 5 stars0 ratingsAttack Transport; The Story Of The U.S.S. Doyen [Illustrated Edition] Rating: 0 out of 5 stars0 ratings"These Are My Credentials": The 199Th Light Infantry Brigade in the Republic of Vietnam, 1966-1970. Rating: 0 out of 5 stars0 ratingsSt Vith: Lion In The Way: 106th Infantry Division in World War II [Illustrated Edition] Rating: 0 out of 5 stars0 ratingsThe American bomb in Britain: US Air Forces' strategic presence, 1946–64 Rating: 0 out of 5 stars0 ratingsReturn of the Marauder Men Rating: 0 out of 5 stars0 ratingsAir Power And The Fight For Khe Sanh [Illustrated Edition] Rating: 0 out of 5 stars0 ratingsBlack Hawks over the Danube Rating: 0 out of 5 stars0 ratingsWalk Tall: With the 2Nd Battalion 1St Arvn Regiment Rating: 0 out of 5 stars0 ratingsFrom Salerno To Rome: General Mark W. Clark And The Challenges Of Coalition Warfare Rating: 0 out of 5 stars0 ratingsThe Story of the Great War, Volume 2 History of the European War from Official Sources Rating: 0 out of 5 stars0 ratingsIsland Victory: The Battle Of Kwajalein Atoll Rating: 0 out of 5 stars0 ratingsA Private In The Guards [Illustrated Edition] Rating: 0 out of 5 stars0 ratingsOperation Sea Lion: A Joint Critical Analysis Rating: 0 out of 5 stars0 ratingsShore Duty: A Year in Vietnam’S Junk Force Rating: 0 out of 5 stars0 ratingsThe Last Blitzkrieg Rating: 0 out of 5 stars0 ratingsCommando Tactics: The Second World War Rating: 0 out of 5 stars0 ratingsBerlin Teufelsberg: Outpost in the Middle of Enemy Territory Rating: 0 out of 5 stars0 ratings
Wars & Military For You
Art of War: The Definitive Interpretation of Sun Tzu's Classic Book of Strategy Rating: 4 out of 5 stars4/5Blitzed: Drugs in the Third Reich Rating: 4 out of 5 stars4/5Resistance: The Warsaw Ghetto Uprising Rating: 4 out of 5 stars4/5Sun Tzu's The Art of War: Bilingual Edition Complete Chinese and English Text Rating: 4 out of 5 stars4/5Masters of the Air: America's Bomber Boys Who Fought the Air War Against Nazi Germany Rating: 4 out of 5 stars4/5The Rise and Fall of the Third Reich Rating: 4 out of 5 stars4/5How to Hide an Empire: A History of the Greater United States Rating: 4 out of 5 stars4/5The Forgotten Highlander: An Incredible WWII Story of Survival in the Pacific Rating: 5 out of 5 stars5/5Killing the SS: The Hunt for the Worst War Criminals in History Rating: 4 out of 5 stars4/5The Art of War Rating: 4 out of 5 stars4/5Ordinary Men: Reserve Police Battalion 101 and the Final Solution in Poland Rating: 4 out of 5 stars4/5The Mysterious Case of Rudolf Diesel: Genius, Power, and Deception on the Eve of World War I Rating: 4 out of 5 stars4/5The God Delusion Rating: 4 out of 5 stars4/5The Art of War & Other Classics of Eastern Philosophy Rating: 4 out of 5 stars4/5Twilight of the Shadow Government: How Transparency Will Kill the Deep State Rating: 0 out of 5 stars0 ratingsThe Happiest Man on Earth: The Beautiful Life of an Auschwitz Survivor Rating: 5 out of 5 stars5/5On Killing: The Psychological Cost of Learning to Kill in War and Society Rating: 4 out of 5 stars4/5They Thought They Were Free: The Germans, 1933–45 Rating: 4 out of 5 stars4/5The Last Kingdom Rating: 4 out of 5 stars4/5The Unabomber Manifesto: Industrial Society and Its Future Rating: 5 out of 5 stars5/5Nuclear War: A Scenario Rating: 4 out of 5 stars4/5Dr. Seuss Goes to War: The World War II Editorial Cartoons of Theodor Seuss Geisel Rating: 4 out of 5 stars4/5The Ruin of Kasch Rating: 4 out of 5 stars4/5The Ethnic Cleansing of Palestine Rating: 4 out of 5 stars4/5Band of Brothers: E Company, 506th Regiment, 101st Airborne from Normandy to Hitler's Eagle's Nest Rating: 5 out of 5 stars5/5Doctors From Hell: The Horrific Account of Nazi Experiments on Humans Rating: 4 out of 5 stars4/5The History of the Peloponnesian War: With linked Table of Contents Rating: 4 out of 5 stars4/5Shogun: The Life of Tokugawa Ieyasu Rating: 0 out of 5 stars0 ratings
Related categories
Reviews for Signal Security In The Ardennes Offensive 1944-1945
0 ratings0 reviews
Book preview
Signal Security In The Ardennes Offensive 1944-1945 - Major Laurie G. Moe Buckhout
This edition is published by PICKLE PARTNERS PUBLISHING—www.picklepartnerspublishing.com
To join our mailing list for new titles or for issues with our books – picklepublishing@gmail.com
Or on Facebook
Text originally published in 1997 under the same title.
© Pickle Partners Publishing 2014, all rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted by any means, electrical, mechanical or otherwise without the written permission of the copyright holder.
Publisher’s Note
Although in most cases we have retained the Author’s original spelling and grammar to authentically reproduce the work of the Author and the original intent of such material, some additional notes and clarifications have been added for the modern reader’s benefit.
We have also made every effort to include all maps and illustrations of the original edition the limitations of formatting do not allow of including larger maps, we will upload as many of these maps as possible.
SIGNAL SECURITY IN THE ARDENNES OFFENSIVE: 1944-1945
By
MAJ Laurie G. Moe Buckhout, USA,
TABLE OF CONTENTS
Contents
TABLE OF CONTENTS 4
ABSTRACT 5
ACKNOWLEDGMENTS 5
LIST OF ABBREVIATIONS 6
CHAPTER 1 — INTRODUCTION AND BACKGROUND 7
Background of Signal Security to 1944 9
CHAPTER II — AUTUMN 1944 17
The German Situation 17
The American Situation 21
CHAPTER III — U.S. COMMUNICATIONS AND SIGNAL SECURITY 1940-1941 23
Organization and Doctrine 23
Signal Security 27
Equipment 29
CHAPTER IV — THE ARDENNES OFFENSIVE: THE AMERICANS 32
Communications 36
Signal Security Equipment and Procedures 39
Personnel and Training 40
The Offensive 41
Exploitation of German Communications 44
Controlling Friendly Signal Security 44
Jamming and Interference 46
Conclusions 47
CHAPTER V — GERMAN SIGNAL SECURITY 48
Communications Equipment 53
Cryptographic Equipment 54
Actions Against the Americans 56
German Signal Security 59
CHAPTER VI — ANALYSIS AND CONCLUSIONS 61
Conclusion 66
APPENDIX A — ORDER OF BATTLE 69
APPENDIX B — FIGURES 72
APPENDIX C — 12TH ARMY GROUP SIGNAL SECURITY SURVEY-1945 82
REQUEST FROM THE PUBLISHER 83
SELECTED BIBLIOGRAPHY 84
Unpublished Works 84
Interviews 85
Manuscripts 86
Published Material 86
Official Records 86
Books 86
Articles 88
ABSTRACT
This thesis investigates the significance, theory and practice of tactical signal security (SIGSEC) during the Ardennes Offensive of 1944-1945. The work includes a brief introduction to the offensive and to the history of SIGSEC, and examines how the American and German armies safeguarded communications from the enemy. Inherent in this study was an investigation of actions taken by these armies to exploit their adversary’s SIGSEC and the processing and exploitation of the signal intelligence (SIGINT) they obtained.
The study concludes that both armies had similar equipment, basic procedures, and training in the areas of communications, SIGSEC and SIGINT, and suffered similar deficiencies in these areas. Analysis, however, revealed a deep disparity concerning their use and importance. The Americans’ near complete lack of regard for tactical SIGINT was a major factor contributing to the success of Hitler’s deception. The U.S. Army relied heavily upon intelligence gleaned from the German ULTRA code, and American intelligence officers were untrained in the use of tactical signal intelligence, mainly using it to validate operational plans. This attitude is reflected also in the American emphasis on SIGSEC. The Germans, however, were more experienced in SIGINT and SIGSEC, and formed a structure and doctrine that focused on immediately influencing tactical operations.
ACKNOWLEDGMENTS
I owe a significant debt of gratitude to the many who guided me along the way. I quite simply would never have attempted nor finished this work without the encouragement of Major Mike Farley. Dr. Samuel Lewis kindly gave me the benefit of his great depth and breadth of historical knowledge and aided me in discovering that American treasure, the National Archives. Mr. Rusty Rafferty at CARL saved me endless hours of searching. Major Mike Bell provided the very framework for this thesis as well as continuous azimuth checks and proofreads, and he and his wife Terri graciously brought me into their home for hot meals and warm companionship. My father, Colonel Wayne J. Moe, USA Infantry (Retired), and my mother, Audrey Jean Soblom Moe, former First Lieutenant, Army Air Corps, have supported me unfailingly over the years, and were the inspirations for this work. I offer a special thank you
to Paul for his loving support and gentle nudges toward completion.
LIST OF ABBREVIATIONS
AM:—Amplitude Modulation (AM):
BOS:—Battlefield Operating System
COMSEC:—Communications Security
DF:—Direction Finding
EHF:—Extremely high Frequency
ETO:—European Theater of Operations
FM:—Field Manual
FM:—Frequency Modulation
HNW:—Heeresnachtenrichtenwesens (Army Communications System)
OKH:—Oberkommando des Heeres (High command of the Army)
OKL:—Oberkommando der Luftwaffe (High Command of the Air Force)
OKM:—Oberkommando der Kriegsmarine (High Command of the Navy)
OKW:—Oberkommando der Wehrmacht (Armed Forces High Command)
RI:—Radio Intercept SIGSEC: Signal Security
SHAEF:—Supreme Headquarters Allied Expeditionary Force
SOI:—Signal Operating Instructions
SOP:—Standard Operating Procedure
TO&E:— Table of Organization and Equipment
TPS:—Telegraphie par sol.(earth telegraphy)
UHF:—Ultra High Frequency
VG: Volksgrenadier
VGD: Volksgrenadier Division
VHF:—Very High Frequency
WNV:—Wehrmachtnachtenrichtenverbindung (Armed Forces Signal Communications)
CHAPTER 1 — INTRODUCTION AND BACKGROUND
For many, the tremendous battle known as the Ardennes Offensive of 1944-1945 stands for a failure of Allied intelligence. This offensive, also called as the Battle of the Bulge
for the great salient created by the enemy in the American line, has long been said to have caught Allied forces completely unaware. The Germans, considered to have been exhausted morally and economically from long years of war and heavily taxed by two fronts, surprised the Americans with a ferocious attack along the Siegfried Line through the near impenetrable Ardennes forest, decimating entire units before being driven back amidst fierce fighting and high casualties.
Up to this point in the war, strategic and operational radio intercept indicators played a large part in the intelligence game. Once the British cryptological intelligentsia at Bletchley Park had broken ULTRA, the German code from the Enigma machine, the battle in the ether seemed won. How, then, were the Germans able to cloak an offensive of such great magnitude? Given the Allies’ ability to decipher the enemy’s highest level traffic and the increased awareness for communications security with which that capability must have imbued the Allies, how were the Germans able to detect U.S. Army forces with enough certainly to conduct the attack at known weak points in the American line? The answers to these question lie at least partially within the realm of tactical signal security (SIGSEC).
The purpose of this work is to examine the influence of signal security at the tactical level during the Ardennes Offensive. How did tactical American and German forces conduct SIGSEC operations and how did tactical SIGSEC affect the outcome of the battle? Secondary questions incidental to this topic are: How was SIGSEC practiced on both sides? What were the organizations and duties of the communications and intelligence units involved with SIGSEC? How were transmissions intercepted and analyzed? To what degree was either side aware of enemy monitoring and what actions were taken to prevent it?
The answer to these questions is important not only in a historical context but because signal security is playing a key role in the planning of communications at all levels of war, strategic, operational and tactical. As communications assets have grown in capability, transmitting more data more quickly, the amount of information transmitted has expanded to fill that capability. Virtually every battlefield operating system (BOS) relies heavily on communications to pass information on intelligence, maneuver, fire support and combat support and combat service support activities such as logistics and medical support. The U.S. Army’s current concept of Force XXI
involves a flattening of echelons of command which is largely enabled by communications. Digitized perspectives of the battlefield from equipment carried by the individual infantryman could conceivably be viewed by senior battlefield planners.
As more sources inject information into battlefield communications nets, the need for speed and bandwidth grows. Terrestrial line of sight radio links and small to medium capacity digital switches will quickly be swamped. The army will not only be expanding the capacity of these existing systems and their ability to swiftly handle tremendous quantities of data, but it will also be expanding into space with the use of single channel and wideband satellite systems on frequencies relatively unused to this period, such as extremely high frequency (EHF). As this latest information revolution occurs, however, army planners must remember that just as the enemy has detected, deciphered and exploited U.S. communications in the past, he will attempt to do so again. Although the U.S. Army now uses electronic variables to encrypt communications, soldiers will still lose the electronic fill devices containing the code. Different types of equipment still emit easily identifiable signatures: the army’s Mobile Subscriber Equipment (MSE) Remote Access Unit (RAU) transmits a marker beam as distinctive as any World War II German artillery radio, and communications and cryptological equipment will still get captured.
Fortunately, lessons learned, particularly over the last sixty years, have convinced military planners of the need to protect friendly signals from enemy interception and physical compromise. However, a cognizance of necessary protection is not all inclusive. Commanders at the tactical level, that which is defined by U.S. Army Field Manual 100-5 as concerned with the execution of battles and engagements,
{1} do not always have the experience and background to appreciate the potential lethality of poor communications security procedures. For this reason, and because the study of lower level SIGSEC during the Ardennes Offensive has been eschewed in favor of strategic and operational systems such as ULTRA,{2} this work will concentrate on tactical SIGSEC, that at army level and below. An examination of past practices may convince those who would doubt the efficacy of tactical signal security and those who would disbelieve the potentially disastrous effects of ignoring it.
For perspective, this thesis examines the background of