Elizebeth Smith Friedman

Elizebeth Smith Friedman
Elizebeth Smith Friedman
Born Elizebeth Smith
(1892-08-26)August 26, 1892
Huntington, Indiana U.S.
Died October 31, 1980(1980-10-31) (aged 88)
Plainfield, New Jersey U.S.
Nationality American
Other names E.S. Friedman
Elizebeth S. Friedman
Occupation Cryptanalyst
Years active 1915–1980[]
Known for "America's first female cryptanalyst"[1]
William F. Friedman
Children 2

Elizebeth Smith Friedman (August 26, 1892 - October 31, 1980) was an expert cryptanalyst and author, and pioneer in U.S. cryptography.[2][3] She has been called "America's first female cryptanalyst".[4][5][1]

Early life and education

Friedman was born in Huntington, Indiana, to John Marion Smith, a Quaker dairyman, banker, and politician, and Sopha Smith (née Strock). Friedman was the youngest of nine surviving children (a tenth died in infancy) and grew up on a farm.[1]

From 1911 to 1913, Friedman attended the University of Wooster in Ohio, but she left when her mother became ill. In 1913, Friedman transferred to Hillsdale College in Michigan since it was closer to home. In 1915, she graduated with a major in English literature.[6] She was a member of Pi Beta Phi. Having exhibited her interest in languages, she had also studied Latin, Greek, and German, and minored "in a great many other things." Only she and one other sibling[which?] attended college.[1] In fall of 1915, Elizebeth became the substitute principal of a public high school in Wabash, Indiana. This position was short lived, however, and in the spring of 1916, she quit and moved back in with her parents.[7]

Career

William F. Friedman and Elizebeth Smith Friedman

Riverbank Laboratories

Friedman was interviewed by a librarian at Riverbank Laboratories, who then spoke with Colonel George Fabyan, who owned Riverbank. The librarian conveyed Friedman's love of Shakespeare, among other things, to Fabyan. Fabyan, a wealthy textile merchant, soon met Friedman, and they discussed what life would be like at Riverbank, Fabyan's great estate located in Geneva, Illinois. He told her that she would assist a Boston woman, Elizabeth Wells Gallup, and her sister with Gallup's attempt to prove that Sir Francis Bacon had written Shakespeare's plays and sonnets, by decrypting enciphered messages that were supposed to have been contained within the plays and poems.[1] Friedman began working at Riverbank in 1916.[8]

At Riverbank Laboratories, Friedman founded one of the first facilities in the U.S. to study cryptography. Riverbank gathered historical information on secret writing. Until MI8, the Army's Cipher Bureau, was created during World War I, Riverbank was the only facility in the U.S. capable of solving enciphered messages. Military cryptography had been deemphasized after the Civil War. During World War I, several U.S. Government departments asked Riverbank Labs for help or sent personnel there for training. Among those was Agnes Meyer Driscoll, who came on behalf of the Navy.

Among the staff of fifteen at Riverbank was the man Elizebeth would marry in May 1917, William F. Friedman. The couple worked together for the next four years in the only cryptographic facility in the country, save Herbert Yardley's so-called "Black Chamber". In 1921, the Friedmans left Riverbank to work for the War Department in Washington, D.C.[9]

Government service

The Volstead Act (1919) forbade the manufacture, sale, import, or export of intoxicating liquors. Prevailing conditions during the period known as Prohibition (1920-33), however, encouraged illegal activity. Further, as radio equipment became less cumbersome, less conspicuous, and more sophisticated, it afforded the criminal element another means to circumvent the law. To avoid taxes and other fees, criminals smuggled liquor into the U.S.--and, to a lesser degree, narcotics, perfume, jewels, and even pinto beans. Enciphered communications about their criminal activities were relayed by bootleggers and smugglers to protect their operations.

Anti-prohibitionists provided Friedman and her team of cryptanalysts with numerous opportunities to hone their codebreaking skills during her employment with the U.S. Treasury Department. She led the cryptanalytic effort against international smuggling and drug-running radio and encoded messages, which the runners began to use extensively to conduct their operations.[10]

In 1923, Friedman was hired as a cryptanalyst for the U.S. Navy. This led to a position with the U.S. Treasury Department's Bureau of Prohibition and of Customs, which in 1927 established a joint effort with the Coast Guard Intelligence Division to monitor international smuggling, drug-running, and criminal activity domestically and internationally.[11] The smugglers and runners used encrypted radio messages to support their operations, presuming they would be able to communicate securely; however the unit was able to decrypt the messages. From 1927 to 1939, the unit was critical during a very active period of smuggling in the United States, and so was eventually folded into the U.S. Coast Guard. Friedman solved the bulk of intercepts collected by Coast Guard stations in San Francisco and Florida herself. In June 1928, she was sent to teach C.A. Housel, stationed with the Coordinator of the Pacific Coast Details, how to decrypt the rumrunner's messages.[12] Under her teaching, Housel was able to decode 3,300 messages within 21 months. In October and November 1929, she was then recruited in Houston, Texas, to solve 650 smuggling traffic cases that had been subpoenaed by the United States Attorney. In doing so, she decrypted 24 different coding systems used by the smugglers.[13]

Friedman's work was responsible for providing decoded information that resulted in the conviction of the narcotics-smuggling Ezra Brothers.[14]

Even though early codes and ciphers were very basic, their subsequent increase in complexity and resistance to solution was important to the financial success and growth of their operations. The extent of sophistication seemed to pose little problem for Friedman; she still mounted successful attacks against both simple substitution and transposition ciphers, and the more complex enciphered codes which eventually came into use. While working for the U.S. Coast Guard, the Bureau of Narcotics, the Bureau of Internal Revenue, the Bureau of Prohibition and Customs, and the Department of Justice, she solved over 12,000 rum-runners' messages in just three years.[15]

Friedman also perceived the need for a more dedicated effort against suspected communications. By 1931 she had convinced Congress of the need to create a headquartered, seven-person cryptanalytic section for this purpose. As her cryptanalytic responsibilities began to mount, Friedman sensed the need to teach other analysts cryptanalytic fundamentals, including deciphering techniques. By relieving her of a part of the burden, this allowed her time to attack the more atypical new systems as they cropped up and expedited the entire process from initial analysis through to solution. It also allowed her to stay one step ahead of the smugglers.

In addition to her cryptanalytic successes, she was often called to testify in cases against accused parties. The messages she deciphered or decoded enabled her to implicate several smugglers operating in the Gulf of Mexico and on the Pacific Coast. She subsequently testified in cases in Galveston and Houston, Texas, and New Orleans, Louisiana. Her efforts in 1933 resulted in convictions against thirty-five bootlegging ringleaders who were found to have violated the Volstead Act. Ringleaders were directly linked with suspected vessels as a result of the information arising out of her analysis.

The next year she played a major role in settling a dispute between the Canadian and U.S. governments over the true ownership of the sailing vessel I'm Alone.[16] It was flying the Canadian flag when it was sunk by a U.S. Coast Guard cutter for failing to heed a "heave to and be searched" signal. The Canadian government filed a $350,000 suit against the U.S., but the intelligence gleaned from the twenty-three messages decoded by Friedman indicated de facto U.S. ownership just as the U.S. had originally suspected. As a consequence, the true owners of the ship were identified and most of the Canadian claim was dismissed.[17]

Impressed with her work, the Canadian government sought Friedman's help in 1937 with an opium dealer problem which evolved into an outstanding case. She complied and eventually testified in the trial of Gordon Lim and several other Chinese. Her solution to a complicated unknown Chinese enciphered code, in spite of her unfamiliarity with the language, was key to the successful convictions.

Friedman left her mark on the fate of Velvalee Dickinson, whose path to and role in espionage are noteworthy.[18] Following high school and some college, Velvalee married the head of a brokerage firm that had Japanese-American clients. The Dickinsons' interest in Japan grew so much that they joined the Japanese-American Society, where they began to rub shoulders with members of the Japanese consulate. When the brokerage firm's success suffered a downturn, so too did the Dickinsons' role as proponents of good Japanese-American relations. At some point, the couple became spies for Japan. Velvalee became a major player, and her successful doll shop was a cover for her espionage. Known as the "Doll Woman," she corresponded with Japanese agents using the names of women she found in her business correspondence. Her correspondence, which contained encoded material addressing significant naval vessel movement in Pearl Harbor,[18] was analyzed and solved by Friedman. This analysis resulted in a guilty verdict against Dickinson.

Although Friedman worked closely with her husband as part of a team, many of her contributions to cryptology were unique. She deciphered many encoded messages throughout the Prohibition years and solved many notable cases, including some codes which were written in Mandarin Chinese.

During World War II, Friedman's Coast Guard unit was transferred to the Navy where they solved a difficult Enigma machine code used by German Naval Intelligence.[19] The work of Friedman's Unit 387 (Coast Guard Cryptanalytic Unit) was often in support of the Federal Bureau of Investigation and J. Edgar Hoover, and was not always credited.[10]

After World War II, Friedman became a consultant to, and created communications security systems for, the International Monetary Fund.

Retirement

After retirement from government service, Friedman and her husband, who had long been Shakespeare enthusiasts, collaborated on a manuscript entitled "The Cryptologist Looks at Shakespeare," eventually published as The Shakespearean Ciphers Examined.[20] It won awards from the Folger Shakespeare Library and the American Shakespeare Theatre and Academy. In this book, the Friedmans dismissed Baconians such as Gallup and Ignatius Donnelly with such technical proficiency and finesse that the book won far more acclaim than did others that addressed the same topic.[21]

The work that Gallup had done earlier for Col. Fabyan at Riverbank operated on two assumptions: That Bacon invented a biliteral cipher and that the cipher used in the original printed Shakespeare folios employed "an odd variety of typefaces." The Friedmans, however, "in a classic demonstration of their life's work," buried a hidden Baconian cipher on a page in their publication. It was an italicized phrase which, using the different type faces, expressed their final assessment of the controversy: "I did not write the plays. F. Bacon."[] Their book is regarded as the definitive work, if not the final word, on the subject.

Following her husband's death in 1969,[22][23] Friedman devoted much of retirement life to compiling a library and bibliography of his work. This "most extensive private collection of cryptographic material in the world" was lodged in the George C. Marshall Research Library in Lexington, Virginia.[2]

"Our office doesn't make 'em, we only break 'em," said Friedman to a visitor who tried to sell her code-making assistance. The NSA notes that she did "break 'em" many times over a variety of targets. Her successes led to the conviction of many violators of the Volstead Act.[1]

Personal life

The unusual spelling of her name (it is more commonly spelled "Elizabeth") is attributed to her mother, who disliked the prospect of Elizebeth ever being called "Eliza."[1][9]

In 1917, Friedman married William F. Friedman, who later became a notable cryptographer credited with numerous contributions to cryptology, a field to which she introduced him.[24]

They had two children, Barbara Friedman (later Atchison) (born 1923), and John Ramsay Friedman (1926-2010).[25][26]

Friedman died on October 31, 1980, in the Abbott Manor Nursing Home in Plainfield, New Jersey, at the age of 88.[2] She is buried with her husband at Arlington National Cemetery.[27]

Works and publications

For references to other material, see http://marshallfoundation.org/library/wp-content/uploads/sites/16/2014/09/Friedman_Collection_Guide_September_2014.pdf

See also

References

This article incorporates text from a publication now in the public domain: Cryptologic Hall of Honor: Elizebeth S. Friedman

  1. ^ a b c d e f g "Cryptologic Hall of Honor: Elizebeth S. Friedman". Cryptologic Hall of Honor. National Security Agency. 3 May 2009. 
  2. ^ a b c Joyce, Maureen (2 November 1980). "Elizebeth Friedman Dies, Cryptanalyst, Pioneer in the Science of Code-Breaking". The Washington Post. 
  3. ^ "E.S. Friedman, 88, Cryptanalyst Who Broke Enemy Codes, Dies; Broke Bootleggers' Code". The New York Times. 3 November 1980.  closed access publication - behind paywall
  4. ^ "Elizebeth Smith Friedman Collection: Collection Guide" (Finding Aid). George C. Marshall Foundation. 2014. 
  5. ^ Sheldon, Rose Mary (2014). The Friedman Collection: An Analytical Guide (PDF). 
  6. ^ Noble, Breana (30 March 2017). "'A Life in Code' highlights first female cryptanalyst's accomplishments after Hillsdale". The Collegian. Hillsdale College. 
  7. ^ Jason, Fagone. The woman who smashed codes: a true story of love, spies, and the unlikely heroine who outwitted America's enemies (First ed.). New York, NY. ISBN 978-0062430489. OCLC 958781736. 
  8. ^ Kahn, David (1967). The Codebreakers:The Story of Secret Writing. New York, NY: MacMillian Publishing Co. Inc. p. 371. 
  9. ^ a b Mundy, Liza (2017). Code Girls. New York, NY: Hachette Books. p. 69. ISBN 978-0-316-35253-6. 
  10. ^ a b Jones, Leonard T. (16 October 1943). History of OP-20-GU (Coast Guard Cryptanalytic Unit) (Memorandum). Unit 387 (Coast Guard Cryptanalytic Unit). 
  11. ^ Mowry, David P. (2014). "Listening to the Rumrunners:Radio Intelligence During Prohibition" (PDF). NSA. 
  12. ^ Kahn, David (1996). The Code Breakers. Scribner. pp. 802-809. ISBN 9780684831305. 
  13. ^ Kahn, David (1967). The Codebreakers: The Story of Secret Writing. New York: NY: MacMillian Publishing Co. Inc. p. 803. 
  14. ^ Smith, G. Stuart (2017). A Life in Code: Pioneer Cryptanalyst Elizebeth Smith Friedman. Jefferson, NC: McFarland & Company, Inc. ISBN 978-1-476-66918-2. OCLC 963347429. 
  15. ^ Kahn, David (1967). The Codebreakers: The Story of Secret Writing. New York, NY: MacMillan Co. Inc. p. 806. 
  16. ^ "Claim of the British Ship "I'm Alone" v. United States". The American Journal of International Law. 29 (2): 326. April 1935. doi:10.2307/2190502. ISSN 0002-9300. JSTOR 2190502. OCLC 5545373404.  closed access publication - behind paywall
  17. ^ Skoglund, Nancy Galey (Spring 1968). "The "I'm Alone Case" A Tale from the Days of Prohibition". University of Rochester Library Bulletin. Rochester, NY: Rare Books, Special Collections and Preservation, University of Rochester. XXIII (3). 
  18. ^ a b Pollak, Michael (2013-04-26). "Answers to Questions About New York". The New York Times. ISSN 0362-4331. Retrieved . 
  19. ^ Fagone, Jason (2017). The Woman Who Smashed Codes. HarperCollins. pp. 197-202. ISBN 978006243048-9. 
  20. ^ Friedman, William F.; Friedman, Elizebeth S. (1957). The Shakespearean Ciphers Examined: An Analysis of Cryptographic Systems Used As Evidence That Some Author Other Than William Shakespeare Wrote the Plays Commonly Attributed to Him. Cambridge: Cambridge University Press. OCLC 718233. 
  21. ^ Grimes, William (3 February 2015). "'Decoding the Renaissance,' at the Folger Shakespeare". The New York Times. 
  22. ^ "William Friedman Dies; Broke Japanese Code" (PDF). The Evening Star. 3 November 1969. p. B-7. 
  23. ^ "William Friedman Dies; Broke Japanese Code; Truman Gave Cryptanalyst Highest Civilian Award; Marshall Said Work Saved Many American Lives" (PDF). The New York Times. 2 November 1969.  open access publication - free to read
  24. ^ Gaddy, David (foreword); Rowlett, Frank (foreword); Callimahos, Lambros; Chiles, James R. (1 January 2006). Center for Cryptologic History, ed. The Friedman Legacy: A Tribute to William and Elizebeth Friedman. Center for Cryptologic History, NSA. OCLC 601637108. 
  25. ^ Howes, Durward, ed. (1935). American Women: The Official Who's Who Among the Women of the Nation (1935-36). Los Angeles, CA: Richard Blank Publishing Company. p. 193. 
  26. ^ "John Friedman Obituary". legacy.com / Boston Globe Obituaries. 2010-09-26. Retrieved . 
  27. ^ Dunin, Elonka (17 April 2017). "Cipher on the William and Elizebeth Friedman tombstone at Arlington National Cemetery is solved" (PDF). Elonka.com. 

Further reading

External links


  This article uses material from the Wikipedia page available here. It is released under the Creative Commons Attribution-Share-Alike License 3.0.

Elizebeth_Smith_Friedman
 



 

Connect with defaultLogic
What We've Done
Led Digital Marketing Efforts of Top 500 e-Retailers.
Worked with Top Brands at Leading Agencies.
Successfully Managed Over $50 million in Digital Ad Spend.
Developed Strategies and Processes that Enabled Brands to Grow During an Economic Downturn.
Taught Advanced Internet Marketing Strategies at the graduate level.


Manage research, learning and skills at defaultlogic.com. Create an account using LinkedIn to manage and organize your omni-channel knowledge. defaultlogic.com is like a shopping cart for information -- helping you to save, discuss and share.


  Contact Us