Read Decoding the IRA Online

Authors: Tom Mahon,James J. Gillogly

Tags: #Ireland, #General, #Politics: General & Reference, #Terrorism, #Cryptography - Ireland - History, #Political violence, #Europe, #Cryptography, #Ireland - History - 1922, #Europe - Ireland, #Guerrilla warfare - Ireland - History - 20th century, #History - General History, #Irish Republican Army - History, #Internal security, #Political violence - Ireland - History - 20th century, #Diaries; letters & journals, #History, #Ireland - History; Military, #20th century, #Ireland - History - 1922-, #History: World, #Northern Ireland, #Guerrilla warfare, #Revolutionary groups & movements

Decoding the IRA (3 page)

BOOK: Decoding the IRA
6.82Mb size Format: txt, pdf, ePub
ads

On rare occasions, words in Irish (which the IRA virtually never spelled correctly) or colloquial Irish expressions posed a temporary challenge to James – who was raised in America. The most memorable incident was when Moss Twomey recommended that an IRA volunteer visit a ‘call house' to meet a young lady. Now the American Merriam-Webster dictionary defines a call house as ‘a house or apartment where call girls may be procured' and James feared the worst.
8
However, shortly afterwards I received an e-mail back from him after he realised that the IRA's meaning of a call house was a place where contact could be secretly made with an IRA representative.

It was only after almost three years that the papers' full significance
became apparent as they revealed activities and facets of the IRA that have never been openly known before. They expose the full extent and nature of the organisation's relationship with the Soviet Union; military espionage in America; the IRA's interest in acquiring chemical weapons; methods and routes for importing arms and explosives; infiltration of the Gaelic Athletic Association in America; IRA security and intelligence techniques; new insight into the reaction of the IRA's leadership to the founding of Fianna Fáil; personality clashes, indiscipline and the state of readiness of the IRA.

Some of this information was truly bizarre, and when I came across the following message from Moss Twomey to the IRA's commander in Glasgow
‘could a ship or ships for China be burned or destroyed by scuttling or other means?'
I thought that ‘China' was a code word. But no, the IRA actually wanted to attack British ships sailing to China.
9
References to republican support for Chiang Kai-shek and the Chinese nationalists can be found in Brian Hanley's
The IRA: 1926–1936
and in contemporary issues of the IRA's newspaper,
An Phoblacht
. However, the ciphered documents add significantly to our knowledge of this unusual episode.

I have attempted to tell the story of the IRA in the context of the times. The IRA, like any other revolutionary group, can't be fully understood without reference to the interplay of contemporary factors such as ideology, the role of personalities, local and international political developments, financial and military resources, strategy and morale and discipline. The personalities of the leadership played an important part in the IRA, particularly as the organisation lacked a single unifying ideology. Additionally, knowledge of the many failed or aborted military attacks tells us as much about the organisation as the odd successful attack does. A history that emphasised one particular aspect of the IRA, such as the socialist ideology of some of its leaders, or concentrated on military activity would give a very incomplete and misleading picture of the organisation. I wanted to avoid this compartmentalisation and to give ‘a feel' as to what the IRA was really like and how its members saw themselves.

Researching this book has been an extremely enjoyable adventure and I frequently allowed myself be distracted when reading old newspapers
and documents. Trying to piece together the section on chemical weapons was quite a challenge given the (understandable) reticence of experts to talk in this post-September 11 world. At one time I contacted an employee of the US army's chemical corps and asked him about getting a copy of a book containing poison gas formulae which the IRA had given to the Soviets in 1927. When he refused, I told him I could get it on the internet or through an inter-library loan. He politely replied that if I did so I could be monitored and even visited by an unnamed government agency. So far, I haven't seen anyone searching my bin at night! Ironically, all the experts in chemical warfare I talked to gave me at least one piece of helpful information, though communication was frequently abruptly terminated on their part. I suppose most people who inquire about chemical warfare are either crazy or potentially dangerous – or both!

The only topic more difficult to get information on than chemical warfare was the covert activities of the IRA and republicans in America. Not surprisingly for a clandestine organisation, there is a lack of documentation and material. However, much of the discussion in the Irish-American community is still rooted in stereotypes of English perfidy and IRA freedom fighters, which has stifled healthy debate and balanced research. When I contacted the Gaelic Athletic Association in New York with questions about the IRA the door was quickly shut – though I was able to get the information I needed at the New York Public Library. However, the process of creating ‘history' to satisfy the needs of the present, results in us forgetting the complexity of the struggles of the past and the sacrifices of ordinary men and women. History is about remembering in context, rather than inventing an imaginary past.

The value of these documents is that they are the nearest we can come to having an open and collegial conversation with IRA leaders such as Moss Twomey and Andy Cooney. Especially in the letters sent to America, Twomey and Cooney give their opinion on a whole range of topics – from the state of the IRA to distrust of Éamon de Valera. There are also detailed descriptions of IRA techniques and security procedures. However, at times the IRA deliberately communicated in an indirect manner or attempted to mislead the recipient. For instance, Twomey presented an overly upbeat assessment of the readiness of the IRA in a letter to America in early
1927 – to encourage fundraising in the US. Overall, the documents give a unique insight into what the IRA was actually like at the time.

This is a world of moral ambiguity: even a generally sympathetic figure such as Moss Twomey had a ruthless streak. And though the greatly respected George Gilmore endured considerable hardship in prison for the cause, the documents raise some suspicion that IRA money under his control went missing.

There were a number of pieces of information that James and I found to be particularly repugnant. One was a document written by the IRA in Offaly attempting to justify the execution of a group of local citizens, whom the writer claimed were ‘notorious spies'.
10
Other documents reveal IRA efforts to intimidate witnesses and jurors by threatening them or their families, while another sordid episode was the IRA's torture and killing of one of their own, Dan Turley, who was suspected of informing.

These papers can be compared to other sources of information on the IRA, such as the interviews IRA leaders gave in their old age to writers and journalists. Many of the interviews took place in the 1960s and 1970s and the IRA men were carefully preparing their legacy with a sanitised version of events. Their recollections were also subconsciously influenced by events that occurred in subsequent years. Though important books such as Uinseann MacEoin's
Survivors
and
The IRA in the Twilight Years
make fascinating reading, much is missing from them. In MacEoin's books, the Russian connection is largely missing and Connie Neenan in his interview does not mention his involvement in the IRA's espionage activities in America. There is no discussion of operational techniques that, even in the 1970s, might have compromised the IRA. As for the memoirs written by IRA veterans, Twomey himself dismissed many of them as ‘myths and legends'.
11
Ernie O'Malley's
On Another Man's Wound
is a classic of the genre and well worth the read. When Bowyer Bell's
The Secret Army
was first published in 1970, it was ground-breaking; however, it tells the story from the IRA's perspective and lacks sufficient critical assessment. Brian Hanley's recently published
The IRA: 1926 to 1936
is an excellent and invaluable history and particularly strong on the political background of the organisation.

Police and intelligence sources are a valuable adjunct to any study;
however, their information is often fragmentary, alarmist and even inaccurate. Police informants were frequently of dubious nature, while the police themselves had their own biases, coupled with a desire to satisfy their superiors. The primary obligation for the police and intelligence agencies was to curtail or destroy the IRA, not to understand it.

The source that comes nearest to these documents are the interviews Ernie O'Malley held with IRA veterans in the 1930s and recorded in the O'Malley Papers. These are refreshingly direct and honest, though again they avoid certain incidents and details.

I have tried to treat all those mentioned in this book (whether IRA members or not) with a mixture of sympathy and scepticism, which I believe produces the most balanced picture.

Throughout the papers, the names and addresses of many individuals and businesses are mentioned and are reproduced in this book. James and I are of the opinion that it is historically important to publish the un-censored contents of the papers. It conveys a full picture of the extent of the IRA's network throughout the Irish community at home and abroad, illustrates the IRA's
modus operandi
and is a way to remember the many people who contributed to a cause they believed in. However, in some cases the IRA may have been mistaken in their opinion of these people and businesses and any activities that occurred in businesses may have been unknown to the owners. Furthermore, the businesses described in this book relate to the period 1926–7 and not to any establishment currently operating with the same or similar name.

Aside from information that was incomplete, repetitious or inconsequential, James and I have omitted nothing we deemed to be of significance.

Chapter 1

CHAPTER 1

Breaking the Ciphers

James J. Gillogly

Did courier at Xmas give you copy of Woolworth edition of novel
The Scarlet Letter
, which was to be used for keys for cipher?

Moss Twomey to Connie Neenan, 24 February 1927, using the old key

Re: Yours of 16th inst. I cannot decipher your code. Has the keyword been changed? If so I have not received the new keyword.

Staff Captain Wilson to chief of staff, 29 April 1926

Many challenge ciphers float into my office over the transom, but this was my favourite sort: an unsolved cipher in an unknown system, whose content was a mystery to everyone now living.
1
One of the greatest intellectual thrills is experienced at the moment you break an old cipher and realise that you are the only person in the world who knows this particular bit of history. The first six ciphers arrived on the mailing list of the American Cryptogram Association, forwarded by a cryptanalyst who had tried unsuccessfully to break them using many of the standard methods.
2
This seemed promising: the ciphers were clearly going to be challenging but ultimately quite likely solvable, since effective attacks have been developed for many of the ciphers used in the first few decades of the twentieth century.

One key to solving an unknown cipher is a positive attitude: if you believe you have a good chance of breaking it, you may well be correct. If you believe you will not be able to crack it, you are almost certainly correct. Another key is persistence: cryptanalysis often involves many false leads, and if you allow those to discourage you, the game is lost. As an example, I first encountered in 1968 a mysterious vellum document called the Voynich Manuscript
3
in David Kahn's classic,
The Codebreakers
.
4
This small book is written in an unknown script with fancifully obscure illustrations, dates back to the early seventeenth century or earlier, and has successfully resisted all attempts to extract clear meaning from it.
5
Over this forty-year period I have tried dozens of approaches, started an international mailing list discussing the manuscript's history and potential attacks on it, and coordinated efforts to transcribe it into a form suitable for computer analysis. None of these efforts has produced a solution, but we now know a good deal more about it than when we started, and there's a good chance that if meaning is found in the manuscript, our spade-work will have helped unearth it.

Like many cryptanalysts I am much less interested in the actual content of cipher messages than in the process of decrypting them. For me the challenge comes from discovering the method used and inventing attacks to decrypt them. Although I am originally of Irish descent, my ancestors emigrated from Ireland in 1803, so any necessary historical and geographical context had to come from my co-author. Little of this context was needed for the actual solution of these messages, though, since for the most part the decryption process was unambiguous.

Diagnosing the first cipher

The first cipher in the set of six messages sent to the mailing list was the upper cipher shown in Figure 3, with 151 letters.
6

Figure 3. The first cipher, 16 June 1927.

I needed to determine which of the two basic cipher types was used to encrypt this message: transposition or substitution.
7
Cryptograms found in newspaper puzzles use substitution: one letter substitutes for another but the letters remain in their original order. For example, LETTER might become
OHWWHU
by advancing each letter three places in the alphabet – the system used by Julius Caesar.
8
Transposition ciphers leave each letter's identity intact, but shuffle the letters around so that the message becomes unreadable. One common method used for this shuffling process is columnar transposition. The sender and receiver agree on a key – for example, a single word like MONARCHY.

BOOK: Decoding the IRA
6.82Mb size Format: txt, pdf, ePub
ads

Other books

Cartas Marruecas by José Cadalso
Espía de Dios by Juan Gómez-Jurado
Double Dragon Seduction by Kali Willows
Perdita by Joan Smith
Captain and a Corset by Wine, Mary
Barely a Lady by Dreyer, Eileen
Harvest, Quietus #1 by Shauna King
Borribles Go For Broke, The by de Larrabeiti, Michael