From Wikipedia, the free encyclopedia
Jump to navigation Jump to search

TICOM (Target Intelligence Committee) was a secret Allied project formed in World War II to find and seize German intelligence assets, particularly in the field of cryptology and signals intelligence.[1]

It operated alongside other Western Allied efforts to extract German scientific and technological information and personnel during and after the war, including Operation Paperclip (for rocketry), Operation Alsos (for nuclear information) and Operation Surgeon (for avionics). Competition with the Soviet Union for these same spoils of war was intense, with direct payoffs including missile technology that led both to a heightened Cold War stalemate and landing a man on the Moon.


The project was initiated by the British, but when the US Army Chief of Staff General George Marshall learnt of it, it soon became Anglo-American. The aim was to seek out and capture the cryptologic secrets of Germany. The concept was for teams of cryptologic experts, mainly drawn from the code-breaking center at Bletchley Park, to enter Germany with the front-line troops and capture the documents, technology and personnel of the various German signal intelligence organizations before these precious secrets could be destroyed, looted, or captured by the Soviets.[2][3] There were six such teams.[4]

  • Team 1 was tasked to capture German Geheimschreiber (secret writer) machines whose enciphered traffic was code named Fish
  • Team 2 was to assist Team 1 with transporting Field Marshal Kesselring's communications train to Britain (the so-called "Jellyfish Convoy")[5]
  • Team 3 was to investigate an intact German Signals intelligence unit called "Pers Z S"
  • Team 4 was to investigate in more detail the places in southern Germany that the Team 1 search had passed over quickly
  • Team 5: Following the serendipitous discovery of a waterproof box containing some of the archives of the Cipher Department of the High Command of the Wehrmacht (OKW/Chi) on the bed of Lake Schliersee, this team was tasked with recovering anything else of value from that lake
  • Team 6 aimed to capture and exploit material from the German Naval Intelligence Center and the German SIGINT headquarters

OKW/Chi (High Command)[edit]

The Allied supposition that the Supreme Command of the German Armed Forces, the Oberkommando der Wehrmacht Chiffrierabteilung (abbreviated OKW/Chi) was the German equivalent of Bletchley Park, was found to be incorrect. Despite it being the top SIGINT agency in the German military, it did not set policy and did not co-ordinate or direct the signal intelligence work of the different services. It concentrated instead on employing the best cryptanalysts to design Germany's own secure communications systems, and to assist the individual services organisations.[6] These were:

  • The Army (Heer) OKH/GdNA, the Oberkommando ders Heeres/General der Nachrichten Autklaerung[7]
  • Air Force (Luftwaffe) Chi Stelle[8]
  • Navy (Kriegsmarine) Beobachtungsdienst or B-Dienst[9]
  • Foreign Office Pers ZS[10]
  • Nazi Party Forschungsamt or FA[11]

Drs Huttenhain and Fricke of OKW/Chi were requested to write about the methods of solution of the German machines.[12] This covered the un-steckered Enigma, the steckered Enigmas; Hagelin B-36 and BC-38; the cipher teleprinters Siemens and Halske T52 a/b, T52/c; the Siemens SFM T43; and the Lorenz SZ 40, SZ42 a/b. They assumed Kerckhoffs's principle that how the machines worked would be known, and addressed only the solving of keys, not the breaking of the machines in the first place. This showed that, at least amongst the cryptographers, the un-steckered Enigma was clearly recognized as solvable. The Enigmas with the plugboard (Steckerbrett) were considered secure if used according to the instructions, but were less secure if stereotyped beginnings or routine phrases were used, or during the period of what they described as the "faulty indicator technique" - used up until May 1940. It was their opinion, however, that the steckered Enigma had never been solved.[13]

FA Discovery[edit]

The discovery in May 1945 of the Nazi Party's top secret FA signals intelligence and cryptanalytic agency at the Kaufbeuren Air Base in southern Bavaria came as a total surprise.[11] The province of Luftwaffe chief Hermann Göring, it has been described as "the richest, most secret, the most Nazi, and the most influential" of all the German cryptanalytic intelligence agencies.[14]

Russian "FISH" Discovery[edit]

German prisoners prepare the "Russian Fish" for loading and shipment to England, June 1945.

The greatest success for TICOM was the capture of the "Russian Fish", a set of German wide-band receivers used to intercept Soviet high-level radio teletype signals. In May 21, 1945, a party of TICOM Team 1 received tip that a German POW had knowledge of certain signals intelligence equipment and documentation relating Russian traffic. After identifying the remaining members of the unit, they were all taken back to their previous base at Rosenheim. The prisoners recovered about 7 ½ tons of equipment. One of the machines was re-assembled and demonstrated. TICOM officer 1st Lt. Paul Whitaker later reported. "They were intercepting Russian traffic right while we were there…pretty soon they had shown us all we needed to see."[15][16]

Related efforts[edit]

In Operation Stella Polaris the Finnish signals intelligence unit was evacuated to Sweden following the end of the Finland/Soviet cease-fire in September 1944. The records, including cryptographic material, ended up in the hands of Americans.

See also[edit]

  • Ralph Tester, senior British codebreaker who worked on the TICOM project



  1. ^ Rezabek 2017, I Introduction.
  2. ^ Parrish 1986, p. 276.
  3. ^ Rezabek 2017, I Introduction: Origin of TICOM.
  4. ^ Rezabek 2017, III The Teams.
  5. ^ Razabek 2012, IV Case Studies: FISH and the Jellyfish Convoy.
  6. ^ Razabek 2012, II The Targets: OKW/Chi (High Command).
  7. ^ Razabek 2012, II The Targets: GdNA (Army).
  8. ^ Razabek 2012, II The Targets: Chi Stelle (Air Force).
  9. ^ Razabek 2012, II The Targets: B-Dienst (Navy).
  10. ^ Razabek 2012, II The Targets: Pers ZS (Foreign Office).
  11. ^ a b Razabek 2012, II The Targets: FA (Nazi Party).
  12. ^ Huttenhain & Fricke 1945.
  13. ^ Huttenhain & Fricke 1945, pp. 4,5.
  14. ^ Kahn, David (2000), Hitler's Spies: German Military Intelligence In World War II, Cambridge, MA: Da Capo Press, p. 178, ISBN 978-0306809491
  15. ^ TICOM Team 1 Report Appendix 14: Baudot Equipment Report on Gen Der Nach. Aufkl. Gruppe VI
  16. ^ Razabek 2012, IV Case Studies: Russian FISH.