<p><span class="pagenum"><SPAN name="Page_75" id="Page_75">[75]</SPAN></span></p>
<h2>UNCLE SAM, DETECTIVE</h2>
<p class="drop-cap">THE detective work accomplished by the United
States Government since its entry into the war has
been worthy of a Sherlock Holmes, and yet few persons,
reading only the results of this remarkably developed
system, have realized that a Government heretofore
finding it unnecessary to match wits with foreign spy
bureaus has suddenly taken a high rank in this unpleasant
but absolutely essential branch of war-making—as
it has in all others. The public read of the intercepted
dispatches from the Argentine to Germany by way of
Sweden, and of the Bernstorff messages, but without a
realization of the problem that a cipher dispatch presents
to one who has not the key. And probably the
average reader is unaware that, in both the army and
navy, experts have been trained to decipher code messages,
with the result that both the making and the
reading of such dispatches have been reduced to an
almost mathematical science. The Philadelphia <i>Press</i>,
in outlining the instruction given in this important work
at the Army Service schools, says:</p>
<p>What is taught the military will furnish an idea of
the task of the code experts in the State Department,
and of the basis of the science that has unmasked the
German plans with respect to vessels to be <i>spurlos
versenkt</i> and of legislators to be influenced through the
power of German gold.</p>
<p>“It may as well be stated,” says Capt. Parker Hitt—that<span class="pagenum"><SPAN name="Page_76" id="Page_76">[76]</SPAN></span>
is, he was a captain of infantry when he said it—“that
no practicable military cipher is mathematically
indecipherable if intercepted; the most that can be
expected is to delay for a longer or shorter time the
deciphering of the message by the interceptor.”</p>
<p>The young officer is warned that one doesn’t have to
rely in these times upon capturing messengers as they
speed by horse from post to post. All radio messages
may be picked up by every operator within the zone,
and the interesting information is given that if one can
run a fine wire within one hundred feet of a buzzer line
or within thirty feet of a telegraph line, whatever tidings
may be going over these mediums may be copied by
induction.</p>
<p>In order that the student may not lose heart, it is
pointed out in the beginning that many European powers
use ciphers that vary from extreme simplicity to “a
complexity which is more apparent than real.” And as
to amateurs, who make up ciphers for some special purpose,
it’s dollars to doughnuts that their messages will
be read just as easily as though they had printed them
in box-car letters.</p>
<p>At every headquarters of an army the intelligence
department of the General Staff stands ready to play
checkers with any formidable looking document that
comes along in cipher, and there is mighty little matter
in code that stands a ghost of a chance of getting by.</p>
<p>The scientific dissection of ciphers starts with the
examination of the general system of language communication,
which, with everybody excepting friend
Chinaman, is an alphabet composed of letters that
appear in conventional order.</p>
<p><span class="pagenum"><SPAN name="Page_77" id="Page_77">[77]</SPAN></span></p>
<p>It was early found by the keen-eyed gentlemen who
analyzed ciphers that if one took ten thousand words
of any language and counted the letters in them the
number of times that any one letter would recur
would be found practically identical with their recurrence
in any other ten thousand words. From this
discovery the experts made frequency tables, which
show just how many times one may expect to find a
letter e or any other letter in a given number of words
or letters. These tables were made for ten thousand
letters and for two hundred letters, so that one might
get an idea how often to expect to find given letters in
both long and short messages or documents.</p>
<p>Thus we find the following result:</p>
<div class="center">
<table border="0" cellpadding="0" cellspacing="0" summary="Code">
<tr>
<th colspan="3"><i>Letters</i></th>
</tr>
<tr>
<td align="right"> </td>
<td align="right"> 10000</td>
<td align="right"> 200</td>
</tr>
<tr>
<td align="right">A</td>
<td align="right">778</td>
<td align="right">16</td>
</tr>
<tr>
<td align="right">B</td>
<td align="right">141</td>
<td align="right">3</td>
</tr>
<tr>
<td align="right">C</td>
<td align="right">296</td>
<td align="right">6</td>
</tr>
<tr>
<td align="right">D</td>
<td align="right">402</td>
<td align="right">8</td>
</tr>
<tr>
<td align="right">E</td>
<td align="right">1277</td>
<td align="right">26</td>
</tr>
<tr>
<td align="right">F</td>
<td align="right">197</td>
<td align="right">4</td>
</tr>
<tr>
<td align="right">G</td>
<td align="right">174</td>
<td align="right">3</td>
</tr>
<tr>
<td align="right">H</td>
<td align="right">595</td>
<td align="right">12</td>
</tr>
<tr>
<td align="right">I</td>
<td align="right">667</td>
<td align="right">13</td>
</tr>
<tr>
<td align="right">J</td>
<td align="right">51</td>
<td align="right">1</td>
</tr>
<tr>
<td align="right">K</td>
<td align="right">74</td>
<td align="right">2</td>
</tr>
<tr>
<td align="right">L</td>
<td align="right">372</td>
<td align="right">7</td>
</tr>
<tr>
<td align="right">M</td>
<td align="right">288</td>
<td align="right">6</td>
</tr>
<tr>
<td align="right">N</td>
<td align="right">686</td>
<td align="right">14</td>
</tr>
<tr>
<td align="right">O</td>
<td align="right">807</td>
<td align="right">16</td>
</tr>
<tr>
<td align="right">P</td>
<td align="right">223</td>
<td align="right">4</td>
</tr>
<tr>
<td align="right">Q</td>
<td align="right">8</td>
<td align="right">..</td>
</tr>
<tr>
<td align="right">R</td>
<td align="right">651</td>
<td align="right">13</td>
</tr>
<tr>
<td align="right">S</td>
<td align="right">622</td>
<td align="right">12</td>
</tr>
<tr>
<td align="right">T</td>
<td align="right">855</td>
<td align="right">17</td>
</tr>
<tr>
<td align="right">U</td>
<td align="right">308</td>
<td align="right">6</td>
</tr>
<tr>
<td align="right">V</td>
<td align="right">112</td>
<td align="right">2</td>
</tr>
<tr>
<td align="right">W</td>
<td align="right">176</td>
<td align="right">3</td>
</tr>
<tr>
<td align="right">X</td>
<td align="right">27</td>
<td align="right">..</td>
</tr>
<tr>
<td align="right">Y</td>
<td align="right">196</td>
<td align="right">4</td>
</tr>
<tr>
<td align="right">Z</td>
<td align="right">17</td>
<td align="right">..</td>
</tr>
</table></div>
<p>It is found that in any text the vowels A E I O U
represent 38.37 per cent; that the consonants L N<span class="pagenum"><SPAN name="Page_78" id="Page_78">[78]</SPAN></span>
R S T represent 31.86 per cent, and that the consonants
J K Q X Z stand for only 1.77 per cent. One
doesn’t want to shy away from these figures as being
dry and dull, because they form part of a story as
interesting as any detective narrative that was ever
penned by a Conan Doyle.</p>
<p>For the usual purposes of figuring a cipher the first
group is given the value of 40 per cent, the second group
30 per cent, and the last 2 per cent. And then one is
introduced to the order of frequency in which letters
appear in ordinary text. It is:</p>
<p>E T O A N I R S H D L U C M P F Y W G B
V K J X Z Q.</p>
<p>Tables are then made for kinds of matter that is not
ordinary, taken from various kinds of telegraphic and
other documents, which will alter only slightly the percentage
values of the letters as shown in a table from
ordinary English.</p>
<p>Having gone along thus far, the expert figures how
many times he can expect to find two letters occurring
together. These are called digraphs, and one learns
that AH will show up once in a thousand letters, while
HA will be found twenty-six times. These double-letter
combinations form a separate table all of their own, and
the common ones are set aside, as TH, ER, ON, OR,
etc., so they can be readily guessed or mathematically
figured against any text.</p>
<p>Tables of frequency are figured out for the various
languages, particularly German, and the ciphers are
divided into two chief classes, substitution and transposition.
The writer in <i>The Press</i> says:</p>
<p>Now you will remember those percentages of vowels<span class="pagenum"><SPAN name="Page_79" id="Page_79">[79]</SPAN></span>
and consonants. Here is where they come in. When a
message is picked up the army expert counts the times
that the vowels recur, and if they do not check with
the 40 per cent for the common vowels, with the consonant
figures tallying within 5 per cent of the key, he
knows that he is up against a substitution cipher. The
transposition kind will check to a gnat’s heel.</p>
<p>When the expert knows exactly what he is up against
he is ready to apply the figures and patiently unravel
the story. It may take him hours, and maybe days, but
sooner or later he will get it to a certainty.</p>
<p>If he has picked up a transposition fellow he proceeds
to examine it geometrically, placing the letters
so that they form all sorts of squares and rectangles
that come under the heads of simple horizontals, simple
verticals, alternate horizontals, alternate verticals, simple
diagonals, alternate diagonals, spirals reading clockwise,
and spirals reading counter-clockwise. Once one
gets the arrangement of the letters, the reading is simple.</p>
<p>For instance, ILVGIOIAEITSRNMANHMNG
comes along the wire. It doesn’t figure for a substitution
cipher and you try the transposition plan. There
are twenty-one letters in it, and the number at once
suggests seven columns of three letters each. Try it on
your piano:</p>
<div class="center">
<table border="0" cellpadding="2" cellspacing="0" summary="another cipher">
<tr>
<td align="center">I </td>
<td align="center"> L </td>
<td align="center"> V </td>
<td align="center"> G </td>
<td align="center"> I </td>
<td align="center"> O </td>
<td align="center"> I</td>
</tr>
<tr>
<td align="center">A </td>
<td align="center"> E </td>
<td align="center"> I </td>
<td align="center"> T </td>
<td align="center"> S </td>
<td align="center"> R </td>
<td align="center"> N</td>
</tr>
<tr>
<td align="center">M </td>
<td align="center"> A </td>
<td align="center"> N </td>
<td align="center"> H </td>
<td align="center"> M </td>
<td align="center"> N </td>
<td align="center"> G</td>
</tr>
</table></div>
<p>And reading down each column in succession you get
“I am leaving this morning.”</p>
<p>After passing over several simple ciphers as not<span class="pagenum"><SPAN name="Page_80" id="Page_80">[80]</SPAN></span>
“classy” enough to engage the reader’s attention, the
writer takes up one of a much more complicated nature,
which, however, did not get by Uncle Sam’s code
wizards. Follow the deciphering of this example by
Captain Hitt:</p>
<p>He began with an advertisement which appeared in
a London newspaper, which read as follows:</p>
<p>“M. B. Will deposit £27 14<i>s.</i> 5<i>d.</i> to-morrow.”</p>
<p>The next day this advertisement in cipher appeared:</p>
<p>“<small>M. B. CT OSB UHGI TP IPEWF H CEWIL NSTTLE FJNVX
XTYLS FWKKHI BJLSI SQ VOI BKSM XMKUL SK NVPONPN
GSW OL IEAG NPSI HYJISFZ CYY NPUXQG TPRJA VXMXI AP
EHVPPR TH WPPNEL. UVZUA MMYVSF KNTS ZSZ UAJPQ
DLMMJXL JR RA PORTELOGJ CSULTWNI XMKUHW XGLN
ELCPOWY OL. ULJTL BVJ TLBWTPZ XLD K ZISZNK OSY
DL RYJUAJSSGK. TLFNS UVD W FQGCYL FJHVSI YJL NEXV
PO WTOL PYYYHSH GQBOH AGZTIQ EYFAX YPMP SQA CI
XEYVXNPPAII UV TLFTWMC FU WBWXGUHIWU. AIIWG HSI
YJVTI BJV XMQN SFX DQB LRTY TZ QTXLNISVZ. GIFT AII
UQSJGJ OHZ XFOWFV BXAI CTWY DSWTLTTTPKFRHG IVX
QCAFV TP DIIS JBF ESF JSC MCCF HNGK ESBP DJPQ NLU
CTW ROSB CSM.</small>”</p>
<p>Now just off-hand, the average man would shy away
from this combination as a bit of news that he really did
not care to read. But to the cipher fiend it was a thing
of joy, and it illustrates one of the many cases that they
are called upon to read, and the methods by which they
work.</p>
<p>As a starting-point the cipher-man assumed that the
text was in English because he got it out of an English
newspaper, but he did not stop there. He checked it
from a negative view-point by finding the letter <i>w</i> in it,
which does not occur in the Latin languages, and by
finding that the last fifteen words of the message had<span class="pagenum"><SPAN name="Page_81" id="Page_81">[81]</SPAN></span>
from two to four letters each, which would have been
impossible in German.</p>
<p>Then he proceeds to analyze. The message has 108
groups that are presumably words, and there are 473
letters in it. This makes an average of 4.4 letters to the
group, whereas one versed in the art normally expects
about five. There are ninety vowels of the AEIOU
group and seventy-eight letters JKQXZ. Harking
back to that first statement of percentages, it is certain
that this is a substitution cipher because the percentage
does not check with the transposition averages.</p>
<p>The canny man with the sharp pencil then looks for
recurring groups and similar groups in his message and
he finds that they are:</p>
<p>AIIWG AII BKSM BKAI CT CTWY CTW
DLMMJXL DL ESF ESBP FJNVX FJHVSI NPSI
NPUXQG OSB OSY ROSB OL OL PORTELOGJ PO
SQ SQA TP TP TLBWTPZ TLFNS TLFTWMC
UVZUA UVD UV SMKUL XMKUHW YJL YJVTI.</p>
<p>Passing along by the elimination route he refers to his
frequency tables to see how often the same letters occur,
and he finds that they are all out of proportion, and he
can proceed to hunt the key for several alphabets.</p>
<p>He factors the recurring groups like a small boy doing
a sum in arithmetic when he wants to find out how many
numbers multiplied by each other will produce a larger
one. The number of letters between recurring groups
and words is counted and dissected in this wise:</p>
<div class="center">
<table border="0" cellpadding="1" cellspacing="0" summary="calculations">
<tr>
<td align="left">AII </td>
<td align="right"> AII </td>
<td align="right">45,</td>
<td align="left">which equals 3x3x5</td>
</tr>
<tr>
<td align="left">BK </td>
<td align="right"> BK </td>
<td align="right">345,</td>
<td align="left">which equals 23x3x5</td>
</tr>
<tr>
<td align="left">CT </td>
<td align="right"> CT </td>
<td align="right">403,</td>
<td align="left">no factors<span class="pagenum"><SPAN name="Page_82" id="Page_82">[82]</SPAN></span></td>
</tr>
<tr>
<td align="left">CTW </td>
<td align="right"> CTW </td>
<td align="right">60,</td>
<td align="left">which equals 2x2x2x5</td>
</tr>
<tr>
<td align="left">DL </td>
<td align="right"> DL </td>
<td align="right">75,</td>
<td align="left">which equals 3x5x5</td>
</tr>
<tr>
<td align="left">ES </td>
<td align="right"> ES </td>
<td align="right">14,</td>
<td align="left">which equals 2x7</td>
</tr>
<tr>
<td align="left">FJ </td>
<td align="right"> FJ </td>
<td align="right">187,</td>
<td align="left">no factors</td>
</tr>
<tr>
<td align="left">NP </td>
<td align="right"> NP </td>
<td align="right">14,</td>
<td align="left">which equals 2x7</td>
</tr>
<tr>
<td align="left">OL </td>
<td align="right"> OL </td>
<td align="right">120,</td>
<td align="left">which equals 2x2x2x3x5</td>
</tr>
<tr>
<td align="left">OS </td>
<td align="right"> OS </td>
<td align="right">220,</td>
<td align="left">which equals 11x2x2x5</td>
</tr>
<tr>
<td align="left">OSB </td>
<td align="right"> OSB </td>
<td align="right">465,</td>
<td align="left">which equals 31x3x5</td>
</tr>
<tr>
<td align="left">PO </td>
<td align="right"> PO </td>
<td align="right">105,</td>
<td align="left">which equals 7x3x5</td>
</tr>
<tr>
<td align="left">SQ </td>
<td align="right"> SQ </td>
<td align="right">250,</td>
<td align="left">which equals 2x5x5x5</td>
</tr>
<tr>
<td align="left">TLF </td>
<td align="right"> TLF </td>
<td align="right">80,</td>
<td align="left">which equals 2x2x2x2x5</td>
</tr>
<tr>
<td align="left">TP </td>
<td align="right"> TP </td>
<td align="right">405,</td>
<td align="left">which equals 3x3x3x3x5</td>
</tr>
<tr>
<td align="left">UV </td>
<td align="right"> UV </td>
<td align="right">115,</td>
<td align="left">which equals 23x5</td>
</tr>
<tr>
<td align="left">XMKU </td>
<td align="right"> XMKU </td>
<td align="right">120,</td>
<td align="left">which equals 2x2x2x3x5</td>
</tr>
<tr>
<td align="left">UV </td>
<td align="right"> UV </td>
<td align="right">73,</td>
<td align="left">no factors</td>
</tr>
<tr>
<td align="left">YJ </td>
<td align="right"> YJ </td>
<td align="right">85,</td>
<td align="left">which equals 17x5</td>
</tr>
</table></div>
<p>Now the man who is doing the studying takes a squint
at this result and he sees that the dominant factor all
through the case is the figure 5, so he is reasonably sure
that five alphabets were used, and that the key-word
had, therefore, five letters, so he writes the message in
lines of five letters each and makes a frequency table
for each one of the five columns he has formed, and he
gets the following result:</p>
<div class="center">
<table border="0" cellpadding="1" cellspacing="0" summary="results of calculations">
<tr>
<td align="center"> Col. 1. </td>
<td align="center"> Col. 2. </td>
<td align="center"> Col. 3. </td>
<td align="center"> Col. 4. </td>
<td align="left">Col. 5.</td>
</tr>
<tr>
<td align="left">A 2</td>
<td align="left">A 9</td>
<td align="left">A 1</td>
<td align="left">A 1</td>
<td align="left">A 2</td>
</tr>
<tr>
<td align="left">B—</td>
<td align="left">B 3</td>
<td align="left">B 3</td>
<td align="left">B—</td>
<td align="left">B 7</td>
</tr>
<tr>
<td align="left">C 7</td>
<td align="left">C 1</td>
<td align="left">C 3</td>
<td align="left">C 4</td>
<td align="left">C—</td>
</tr>
<tr>
<td align="left">D 2</td>
<td align="left">D 2</td>
<td align="left">D 1</td>
<td align="left">D—</td>
<td align="left">D 3</td>
</tr>
<tr>
<td align="left">E 4</td>
<td align="left">E—</td>
<td align="left">E 2</td>
<td align="left">E 7</td>
<td align="left">E—</td>
</tr>
<tr>
<td align="left">F 3</td>
<td align="left">F—</td>
<td align="left">F 9</td>
<td align="left">F 3</td>
<td align="left">F 5<span class="pagenum"><SPAN name="Page_83" id="Page_83">[83]</SPAN></span></td>
</tr>
<tr>
<td align="left">G 9</td>
<td align="left">G—</td>
<td align="left">G 3</td>
<td align="left">G 2</td>
<td align="left">G 2</td>
</tr>
<tr>
<td align="left">H 3</td>
<td align="left">H 5</td>
<td align="left">H 3</td>
<td align="left">H 3</td>
<td align="left">H 2</td>
</tr>
<tr>
<td align="left">I 2</td>
<td align="left">I 2</td>
<td align="left">I 7</td>
<td align="left">I 17</td>
<td align="left">I 2</td>
</tr>
<tr>
<td align="left">J 5</td>
<td align="left">J 1</td>
<td align="left">J 6</td>
<td align="left">J—</td>
<td align="left">J 9</td>
</tr>
<tr>
<td align="left">K 6</td>
<td align="left">K 5</td>
<td align="left">K—</td>
<td align="left">K 1</td>
<td align="left">K 1</td>
</tr>
<tr>
<td align="left">L—</td>
<td align="left">L 19</td>
<td align="left">L 2</td>
<td align="left">L 5</td>
<td align="left">L 1</td>
</tr>
<tr>
<td align="left">M—</td>
<td align="left">M—</td>
<td align="left">M 7</td>
<td align="left">M 4</td>
<td align="left">M 3</td>
</tr>
<tr>
<td align="left">N 7</td>
<td align="left">N 3</td>
<td align="left">N 4</td>
<td align="left">N—</td>
<td align="left">N 5</td>
</tr>
<tr>
<td align="left">O 5</td>
<td align="left">O—</td>
<td align="left">O 9</td>
<td align="left">O 1</td>
<td align="left">O—</td>
</tr>
<tr>
<td align="left">P 7</td>
<td align="left">P 7</td>
<td align="left">P 8</td>
<td align="left">P 4</td>
<td align="left">P—</td>
</tr>
<tr>
<td align="left">Q 5</td>
<td align="left">Q—</td>
<td align="left">Q—</td>
<td align="left">Q 2</td>
<td align="left">Q 6</td>
</tr>
<tr>
<td align="left">R—</td>
<td align="left">R 1</td>
<td align="left">R 1</td>
<td align="left">R 6</td>
<td align="left">R 1</td>
</tr>
<tr>
<td align="left">S—</td>
<td align="left">S 8</td>
<td align="left">S 6</td>
<td align="left">S 12</td>
<td align="left">S 7</td>
</tr>
<tr>
<td align="left">T 7</td>
<td align="left">T 3</td>
<td align="left">T 5</td>
<td align="left">T 1</td>
<td align="left">T 14</td>
</tr>
<tr>
<td align="left">U 7</td>
<td align="left">U 3</td>
<td align="left">U 6</td>
<td align="left">U—</td>
<td align="left">U 1</td>
</tr>
<tr>
<td align="left">V 5</td>
<td align="left">V—</td>
<td align="left">V 2</td>
<td align="left">V 5</td>
<td align="left">V—</td>
</tr>
<tr>
<td align="left">W 3</td>
<td align="left">W 4</td>
<td align="left">W—</td>
<td align="left">W 5</td>
<td align="left">W 7</td>
</tr>
<tr>
<td align="left">X 2</td>
<td align="left">X—</td>
<td align="left">X 4</td>
<td align="left">X 8</td>
<td align="left">X 6</td>
</tr>
<tr>
<td align="left">Y 4</td>
<td align="left">Y 5</td>
<td align="left">Y—</td>
<td align="left">Y 3</td>
<td align="left">Y 7</td>
</tr>
<tr>
<td align="left">Z—</td>
<td align="left">Z 5</td>
<td align="left">Z 3</td>
<td align="left">Z—</td>
<td align="left">Z 3</td>
</tr>
</table></div>
<p>Now, having erected these five enigmatical columns,
Captain Hitt juggles them until he uncovers the hidden
message, thus:</p>
<p>“In the table for column 1 the letter G occurs 9
times,” he says with an air of a man having found
something that is perfectly plain. “Let us consider it
tentatively as E.</p>
<p>“Then, if the cipher alphabet runs regularly and in
the direction of the regular alphabet, C (7 times) is
equal to A, and the cipher alphabet bears a close resemblance<span class="pagenum"><SPAN name="Page_84" id="Page_84">[84]</SPAN></span>
to the regular frequency table. Note that TUV
(equal to RST) occurring respectively 7, 7, and 5 times
and the non-occurrence of B, L, M, R, S, Z (equal to
Z, J, K, P, Q, and X, respectively).</p>
<p>“In the next table L occurs 19 times, and taking it for
E with the alphabet running the same way, A is equal
to H. The first word of our message, CT, thus becomes
AM when deciphered with these two alphabets, and the
first two letters of the key are CH.</p>
<p>“Similarly in the third table we may take either F or
O for E, but a casual examination shows that the former
is correct and A is equal to B.</p>
<p>“In the fourth table I is clearly E and A is equal
to E.</p>
<p>“The fifth table shows that T is equal to 14 and J is
equal to 9. If we take J as equal to E then T is equal to
O, and in view of the many Es already accounted for in
the other columns this may be all right. It checks as
correct if we apply the last three alphabets to the second
word of our message, OSB, which deciphers NOW.
Using these alphabets to decipher the whole message we
find it to read:</p>
<p>“‘M. B. Am now safe on board a barge moored below
Tower Bridge, where no one will think of looking for
me. Have good friends but little money owing to action
of police. Trust, little girl, you still believe in my innocence
although things seem against me. There are reasons
why I should not be questioned. Shall try to
embark before the mast in some outward-bound vessel.
Crews will not be scrutinized as sharply as passengers.
There are those who will let you know my movements.
Fear the police may tamper with your correspondence,<span class="pagenum"><SPAN name="Page_85" id="Page_85">[85]</SPAN></span>
but later on, when hue and cry have died down, will let
you know all.’”</p>
<p>It all seems simple to the man who follows the idea
closely, but Captain Hitt proceeds to make further
revelations of the art. He adds:</p>
<p>“The key to this message is CHBEF, which is not
intelligible as a word, but if put into figures, indicating
that the 2d, 7th, 1st, 4th, and 5th letter beyond the
corresponding letter of the message has been used as a
key it becomes 27145, and we connect it with the personal
which appeared in the same paper the day before
reading:</p>
<p>“‘M. B. Will deposit £27 14<i>s.</i> 5<i>d.</i> tomorrow.’”</p>
<p>This is only one of the many methods for getting
under the hide of a coded message that our bright men
of the Army and their cousins of the State and Navy
departments have worked out through years of study and
application.</p>
<hr class="tb" />
<h3>DRIVING IS TOO GOOD FOR THEM</h3>
<p>He—“And that night we drove the Germans back
two miles.”</p>
<p>She—“Drove them, indeed. I’d have made them
walk every step of it.”</p>
<hr class="tb" />
<h3>NOW THEY DON’T SPEAK</h3>
<p>The Host—“I thought of sending some of these cigars
out to the Front.”</p>
<p>The Victim—“Good idea! But how can you make
certain that the Germans will get them?”</p>
<hr class="chap" /></div>
<div style="break-after:column;"></div><br />