While visiting in Sierra Vista, AZ. we were invited by an old army buddy to visit Fort Huachuca's (Wa-chu-ka) museums. This military installation was of particular interest to me as my father had been stationed there for a brief time during WW II. My parents lived in Bisbee for a while and then moved to Tombstone. I can remember as a child hearing stores of the old west and life in Arizona. The Fort was created in March of 1877 by the 6th US Cavalry as a protection for the local ranchers from marauding Apaches headed up by a particularly aggressive Chief named Geronimo. The Fort soon became home to the famous "Buffalo soldiers", the all black Cavalry unit of the army. Today much of its size has been reduced but the Fort is none the less an active intregal part of our Nation's defense system. It houses several sections of army intelligence including an electronic surveillance unit. This was particularly nice for my walking mornings, as on most days they flew a surveillance blimp a thousand feet or so in the air at the east end of the base about 2 and half miles from the trailer park. It made a delightful navigational beacon both day and night. The Mexican border is only a few miles away where such balloons are employed spotting undocumented crossings of the Rio Grande on foot. One museum houses some interesting artifacts from Army Intelligence. It featured Captain Parker Hitt who was 34 years old in 1911 when the Signal school at Fort Leavenworth conducted its first conference on military cryptology. The infantry officer had interrupted his studies in civil engineering at Purdue university to join the Army in 1898. He served in the Philippines, Alaska and California before attending the Signal School and then becoming an instructor at the institution. He possessed a flair for solving ciphers and deciphered coded messages intercepted from Mexico from both the agents of Pancho Villa and the Constitutionalists, the latter code becoming known as the Mexican Army Cipher Desk. As a Colonel, Parker Hitt went to France with the American Expeditionary Force and served on Pershing's staff before becoming the Chief Signal Officer for the 1st Division. Hitt wrote the U.S. Army's first publication on cryptology in 1915 when his Manual for Solution of Military Ciphers was printed at Fort Leavenworth. From 1914 to 1917, Hitt developed a code machine that, after some improvements by Joseph Mauborgne, Chief of the Signal Corps' Engineering and Research Division would become, in 1922, the Army's M-94. It was used up until WW II. In the 1930s it was replaced by the M-138a, which incorporated some more improvements on Hitt's prototype. His hand crafted prototype is on display. The Corps of Intelligence Police formed in World War I was renamed the Counter Intelligence Corps (CIC) in 1942. In the U.S. the CIC was responsible for the security of the Manhattan Project, the secrete scientific work on the atomic bomb, and performed censorship duties for all mail arriving from overseas. Counter Intelligence Corps detachments were assigned to each Army division in the North African, European and Pacific theaters, with a total of 241 CIC detachments operating during the war. Overseas the CIC secured captured enemy headquarters, interrogated prisoners, and impounded enemy documents. They arrested or surveilled any suspected enemy agents. They surveyed and protected public utilities, supply depots and other potential targets of sabotage. They seized radio stations and telephone switchboards, halting all communications and turning over any communications data to the Signal Corps personnel. They shut down presses and seized mail for censorship teams. They cooperated with local provost marshals on matters of law and order. CIC operatives familiarized themselves with the local economic, political and social conditions and cultivated well placed informants. I was particularly delighted to find one of the infamous "Enigma" coding machines who's part has been the subject of many a great spy story of the WW II era. Secure radio communications are indispensable in modern war. To safeguard their messages, the Nazi forces relied on the Enigma machine, a compact, battery-powered Electro-mechanical cipher device. The three rotors of the version of the enigma used by most elements of the Wehrmacht permitted 1,560,000 permutations for each character. Additional security was provided by a plug-board which further scrambled each letter. Messages keys were changed every 24 hours. The German High Command felt that the Enigma was unbreakable. They gambled everything on the cryptographic security of the "Glowworm" machine, as the Enigma was sometimes called. Fortunately for the course of the world history, they lost. The secret of the Enigma was broken early in World War II by expert British crypto-analysts working out of temporary huts on the grounds of Bletchiey Park, an English country mansion. The British were able to build on prior work by the Poles and the French. The fact that the Enigma had been broken was a closely guarded secret for 30 years. The intelligence obtained by decrypting Enigma messages and other high-level systems was known as ULTRA and was disseminated under the closest controls. When the Unites States joined the war, this intelligence was shared. Ultimately, US Army detachments helped in the effort. ULTRA gave Eisenhower and his subordinates an unparalleled insight into the workings of the German High command.
***THE END ***