The VENONA Project: Decrypting Soviet Espionage Cables, 1943—1980.
In a former girls' boarding school in Arlington, Virginia, a small team of U.S. Army cryptanalysts began in 1943 to copy and to attempt to break the diplomatic and intelligence cables sent between the Soviet consulate in New York and Moscow. The cables were encrypted under the one-time pad system, which is in principle unbreakable. The Soviet cipher staff in 1942, under wartime production pressure, had reused some of their pad pages. Three years of careful statistical work by Meredith Gardner began, in late 1946, to break the cables open. What emerged over the following decade was the documentary skeleton of the Soviet espionage networks in the United States in the 1940s.
AnomalyDesk is reader-supported. Articles may contain affiliate links to books and primary-document collections. Read our full funding disclosure.
What VENONA was, in a paragraph.
VENONA was a long-running and tightly compartmented U.S. Army (later NSA) signals-intelligence project to copy, catalog, and partially decrypt Soviet diplomatic and intelligence cable traffic that had been intercepted between February 1943 and 1948 from the New York, Washington, and San Francisco Soviet consulates and from a number of foreign Soviet posts. The traffic had been encrypted under a one-time pad cipher, a system that, when correctly used, produces output that no quantity of cryptanalytic effort can read. Soviet operational pressure during the war's worst year, 1942, had caused a fraction of the pad sheets to be duplicated and shipped to multiple posts; this duplication, combined with the Soviet practice of using different one-time pads for different categories of message, gave U.S. cryptanalysts statistical purchase. Gene Grabeel of the Signal Intelligence Service began the systematic collection of Soviet message tape on February 1, 1943. Meredith Gardner, joining the project after the war, achieved the first substantial readable decryptions in late 1946 and early 1947. The decryptions named, in cover-name or in plain text, the Soviet intelligence sources operating against the Manhattan Project, the State Department, the Treasury, the Office of Strategic Services, and other targets. Approximately 2,900 messages, out of an estimated several hundred thousand collected, were ever broken in whole or in part; the great majority of those bear only fragmentary text. The project ran in formal classification for thirty-seven years and was disclosed only on July 11, 1995, in a joint release of the NSA, CIA, and Department of Defense, on the recommendation of Senator Daniel Patrick Moynihan's Commission on Protecting and Reducing Government Secrecy. The release made public for the first time the documentary basis for what until then had been one of the most disputed factual questions in twentieth-century American history: the extent of Soviet penetration of the U.S. government in the 1940s.
The documented record.
October 1943: Gene Grabeel begins the work
Carter W. Clarke, then chief of the Army Special Branch, directed in early 1943 that the Soviet diplomatic traffic, which had been collected by U.S. intercept stations since the late 1930s as a routine byproduct of broader traffic-collection work, be made the subject of a formal cryptanalytic effort. Verified The project was housed at Arlington Hall Station, a former girls' boarding school converted to wartime use as the Signal Intelligence Service's principal cryptanalytic facility. Gene Grabeel, a young schoolteacher from Virginia who had joined the SIS in 1942, was assigned to the project on October 1, 1943, with one or two colleagues. The project's first task was sorting and inventory: by 1943 the SIS had accumulated a substantial backlog of intercepted Soviet diplomatic traffic that had not been systematically cataloged [1][2].
The work in the first three years was preparatory rather than productive. Grabeel and her small team sorted the traffic by cipher system — the Soviets used distinct one-time pads for diplomatic, GRU (military intelligence), KGB (originally NKVD/NKGB), trade, and naval traffic — and identified the message indicators that would later allow analysts to group messages by which pad had encrypted them. No substantial decryption was achieved before late 1946 [1][3].
The Soviet one-time pad reuse
The cryptographic vulnerability that made VENONA possible was the reuse of one-time pad sheets. Verified Under the Soviet cipher system in operational use during the war, each five-digit ciphertext group was the modulo-10 addition of a five-digit plaintext code group (drawn from a Soviet codebook) and a five-digit additive group (drawn from the one-time pad). When a pad page was used only once, the additive sequence was, in the relevant statistical sense, perfectly random, and no ciphertext-only attack could succeed.
In 1942, under intense wartime production pressure on the Soviet cipher printing facility, an estimated 35,000 pad pages were duplicated and shipped to multiple Soviet posts. Verified When two messages used the same additive page, an attack against the pair (the "depth" attack of classical cryptanalysis) became possible: the difference of the two ciphertexts equals the difference of the two plaintexts, and statistical and lexical work on the plaintext language can recover both. Compounded over many duplicated pages and many message pairs, the attack opens the system progressively. The Soviets recognized the error and ceased pad reuse by mid-1948, by which point the breakable traffic had already been intercepted and was preserved on tape and paper [3][4].
1946: Meredith Gardner's first breakthrough
Meredith Gardner, a former assistant professor of Germanic languages who had spent the war on the German-traffic side of SIS cryptanalysis, transferred to the Soviet project after V-J Day. Verified Gardner's diary and the subsequent NSA internal histories date his first substantial recovery to December 1946, when he was able to read a 1944 cable from the New York KGB residency to Moscow containing a list of leading American atomic-bomb scientists then working at Los Alamos. Through 1947 and into 1948, Gardner and a slowly expanding team produced a steady stream of partial decryptions that identified Soviet intelligence work against U.S. targets [1][3][5].
The Manhattan Project identifications
Among the earliest and most consequential decryptions were those identifying Soviet penetration of the Manhattan Project. Verified A series of cables from 1944 and 1945 named or unambiguously described several sources within the atomic-weapons program. The cables, considered together with subsequent investigative work by the FBI's liaison to VENONA, Special Agent Robert Lamphere, supported the identifications of:
- Klaus Fuchs — the German-born British theoretical physicist who had worked at Los Alamos and was, the cables indicated, the Soviet source code-named CHARLES (later REST). Fuchs was arrested in the United Kingdom in February 1950 on the basis of FBI information passed to MI5; he confessed in interrogation and was sentenced to fourteen years' imprisonment [6][7].
- Theodore Hall — the Harvard-trained physicist who had been a youthful Los Alamos researcher and was identified in the cables as the Soviet source code-named MLAD (Russian for "young"). Hall was never prosecuted, because the FBI judged that prosecution would compromise the VENONA program; he remained under surveillance and was confronted by the FBI in 1951 but did not confess. His complicity was confirmed by him publicly only in 1995, on the heels of the VENONA release [8].
- Harry Gold — the courier who had passed Fuchs's material to Soviet handlers. Gold's identity was developed from a combination of VENONA leads and Fuchs's post-arrest cooperation; he was arrested in May 1950 and sentenced to thirty years' imprisonment [6].
- David Greenglass — the Army machinist at Los Alamos who had supplied his brother-in-law Julius Rosenberg with implosion-lens sketches. Greenglass was identified through Gold's cooperation, with VENONA references corroborating; he was arrested in June 1950 and sentenced to fifteen years' imprisonment in exchange for cooperation [6][9].
The Rosenberg cables
The cables identify a Soviet source code-named LIBERAL (earlier ANTENNA) and his wife code-named (in some readings) as a separate operational figure. Verified The combined judgment of the FBI's VENONA-cleared investigators, NSA cryptanalysts, and the released decryptions is that LIBERAL is Julius Rosenberg. Ethel Rosenberg appears in the cables in a substantially less operational role than Julius; the cables describe her as aware of and supportive of her husband's activities but do not describe her as a recruited Soviet source in the same sense [9][10]. Disputed The relative culpability of the two Rosenbergs — and in particular whether the death sentence handed down to both in 1951 was warranted on the basis of the actually available evidence — remains a contested historical question, on which the VENONA release substantially altered but did not close the debate [9][10][11].
The Alger Hiss identification
The most disputed of the major VENONA identifications is that of Alger Hiss, the senior State Department official accused in 1948 by Whittaker Chambers of having been a Soviet source in the 1930s. Disputed A 1945 cable from the GRU residency in Washington to Moscow refers to a source code-named ALES, whom NSA analyst Cecil J. Phillips and the FBI's subsequent investigation concluded in a 1969 internal memorandum was "probably Alger Hiss." The cable describes ALES as a State Department officer who had attended the Yalta conference and had then travelled to Moscow with Secretary Stettinius, a description that fits Hiss closely but is not unique. Subsequent reviews by historians including John Earl Haynes and Harvey Klehr have argued the identification is essentially certain; others, including Hiss's defenders, have argued that the same description fits a small number of other officials and that the identification is conjectural [12][13]. The released VENONA decryption does not settle the question on its face.
Kim Philby's knowledge of VENONA
From his 1949 arrival in Washington as the British Secret Intelligence Service liaison to the FBI and CIA, Harold "Kim" Philby was briefed on VENONA in his capacity as the principal U.K. intelligence channel for the project. Verified Philby was at the time a long-standing Soviet agent (recruited by Arnold Deutsch in 1934). His regular meetings with FBI Special Agent Robert Lamphere through 1949 and 1950 gave him knowledge of which Soviet networks the VENONA decryptions were progressively unwrapping. The intelligence Philby passed back to Moscow allowed the Soviets to warn or withdraw a number of sources before American or British prosecution became possible — including, most famously, the warning that led to Donald Maclean's 1951 flight from London, accompanied by Guy Burgess. Philby's own exposure followed in 1951, although his formal resignation from SIS and his eventual 1963 defection to Moscow took longer to play out [3][6][14].
1980 termination and 1995 public release
The decryption effort continued at decreasing intensity through the 1950s, 1960s, and 1970s. Verified By the late 1970s, the productive cryptanalytic work was substantially complete; what remained was unreadable. NSA Director Bobby R. Inman closed the project formally on October 1, 1980 [1][15]. The classified VENONA material was retained at the NSA and at the FBI; selected references continued to inform internal counterintelligence work but the underlying program was no longer pursued.
The 1995 public release was the work of several years' deliberation. Verified Senator Daniel Patrick Moynihan's Commission on Protecting and Reducing Government Secrecy, established in 1994, recommended that the VENONA material be released on the grounds that its continued classification served no operational purpose and was distorting public understanding of the historical record. The joint NSA/CIA/DOD release of July 11, 1995 made the approximately 2,900 decrypted messages, in their partially recovered English translations, publicly available. Subsequent batches were released through 1996 and 1997, completing the open record now available through the NSA's FOIA Reading Room and the CIA library [1][15].
The official explanation.
The position of the NSA, the CIA, and the FBI on VENONA, in the 1995 release announcement and in subsequent documentation, is that the project was a successful counterintelligence-driven cryptanalytic effort whose value justified its long classification but whose continued classification had become a net cost to honest historical inquiry. Claimed The agencies' joint position is that the identifications of Fuchs, Gold, Greenglass, Hall, Julius Rosenberg, and a substantial number of other Soviet sources are well supported by the cables and corroborated by independent investigation, and that VENONA's evidentiary weight on these identifications is not seriously contestable [1][15].
The agencies have been more careful on the disputed identifications, of which Alger Hiss is the most prominent. The 1996 NSA monograph by Cecil J. Phillips, the analyst who developed the ALES identification, presents the case for the identification as a probable one rather than as a certain one; the released material does not settle the question to the standard of evidence that would convict in a criminal trial [12]. The agencies' position is that the released cables should be read with appropriate caution about the limits of cover-name attribution.
The institutional position on the program's nondisclosure to the prosecution in the Rosenberg case — that VENONA material was not introduced at trial in 1951 because doing so would have compromised the ongoing project — is acknowledged in the post-1995 documentation. The agencies have not, in their public posture, argued that the Rosenberg prosecutions would or would not have proceeded differently with the VENONA evidence available; they have noted only that the prosecutors made their case on the testimony of David Greenglass and Harry Gold and did not have access to the underlying cable material [6][10].
The unanswered questions.
The unreadable majority
Approximately 2,900 messages were partially decrypted out of an estimated several hundred thousand intercepted under the program. Unverified The proportion is not exact: the NSA's own estimates of total Soviet message volume captured under VENONA collection have varied across declassified internal documents from "approximately 200,000" to "perhaps 400,000" and beyond. The cryptanalytically unreadable majority is a substantial absence in the record. What we have is approximately 1 percent of the intercepted Soviet message traffic, and that 1 percent is itself, in the great majority of cases, only partially recoverable [1][3][15].
Specific identifications still in dispute
A number of cover-name identifications in the released decryptions remain disputed in the open scholarship. Disputed Beyond ALES, the cover-names ANTENNA / LIBERAL, MLAD, REST / CHARLES, and GOOSE are reasonably well identified; cover-names such as ANTON, MAY, SACHS, INFORMATOR, and several dozen others have either no identification, multiple competing identifications, or identifications resting only on circumstantial evidence. Some identifications confidently asserted by U.S. authorities in the 1940s and 1950s (notably for ANTENNA before its consolidation with LIBERAL) shifted over time as more cables were broken [10][12][13].
The Soviet side of the story
What the Soviet intelligence services knew of VENONA, beyond what Kim Philby passed them between 1949 and 1951, is partially but not comprehensively documented in the post-1991 Russian archival openings. Disputed The Mitrokhin Archive (the notes that KGB archivist Vasili Mitrokhin smuggled out of Russia in 1992) contains substantial corroboration of VENONA-derived identifications but does not, in the released portions, comprehensively describe the Soviet counterintelligence response to the project. Whether the Soviets understood the scale of the U.S. cryptanalytic success before Philby's briefing, what they did between 1948 (when they ceased pad reuse) and 1949 (when Philby arrived in Washington), and what was attempted to extract additional sources before exposure, is partially documented but not fully [14][16].
The Rosenberg sentencing question
Whether Judge Irving Kaufman's decision to impose the death penalty on both Ethel and Julius Rosenberg was sound on the evidence available to him — and what the VENONA-informed picture of Ethel's relatively peripheral operational role implies for the proportionality of her sentence — remains a contested historical-and-ethical question. Disputed The 2008 deathbed statement of Morton Sobell, the Rosenbergs' co-defendant, that Ethel was aware of but had not been operationally involved in her husband's espionage, is broadly consistent with the cables but is not a substitute for the cables. The historiographic debate on this question has been substantially informed but not closed by the VENONA release [9][10][11].
The destroyed material question
NSA's own internal histories indicate that an unknown but possibly substantial volume of VENONA working-paper material was destroyed under routine classified-records destruction schedules in the 1960s and 1970s, before the 1995 decision to declassify the program. Unverified What was lost in those routine destructions has not been characterized in the open record [1][15].
Primary material.
The accessible primary record on the VENONA Project is held principally at four locations:
- The NSA's FOIA Reading Room (nsa.gov/news-features/declassified-documents) hosts the complete public release of the approximately 2,900 decrypted messages, in their partially recovered English translations, along with the introductory monographs prepared by NSA's Center for Cryptologic History.
- The National Archives (NARA) holds the FBI's VENONA-related case files, partially released under FOIA, and the records of the Moynihan Commission whose 1995 recommendation led to the public release.
- The Wilson Center Cold War International History Project hosts a substantial collection of cross-referenced VENONA decryptions, Russian-side material from the Mitrokhin Archive, and the Haynes/Klehr/Vassiliev research notebooks.
- The NSA Center for Cryptologic History at Fort Meade retains the agency's internal-history monographs on the program, of which the principal ones (Phillips on ALES; Benson and Warner on the project as a whole) have been released in declassified form.
Critical individual documents include: the original NSA-released English translations of the approximately 2,900 decrypted messages, organized by year and originating consulate; the Robert L. Benson and Michael Warner edited volume VENONA: Soviet Espionage and the American Response, 1939–1957 (NSA/CIA, 1996); the Cecil J. Phillips internal NSA monograph on the ALES identification (released 1996); the FBI's Robert Lamphere case files; and the 1995 Commission on Protecting and Reducing Government Secrecy report and supporting documents.
The sequence.
- Late 1930s U.S. Army intercept stations begin routine collection of Soviet diplomatic radio traffic alongside other foreign-traffic targets.
- 1942 Soviet cipher production under wartime pressure duplicates an estimated 35,000 one-time pad pages, the vulnerability that will later enable VENONA.
- February 1, 1943 Carter W. Clarke directs the systematic cryptanalytic attack on Soviet diplomatic traffic at Arlington Hall Station.
- October 1, 1943 Gene Grabeel assigned to the project as one of its first cryptanalysts.
- 1944–1945 Soviet New York and Washington residencies send the cables that will later be decrypted to name Soviet penetration of the Manhattan Project, the State Department, the OSS, and the Treasury.
- Mid-1948 Soviets cease one-time pad reuse, closing the vulnerability; intercepted earlier traffic remains potentially readable.
- December 1946 Meredith Gardner achieves first substantial decryption of a 1944 KGB cable.
- 1947–1949 Identifications of Klaus Fuchs (as CHARLES/REST), Theodore Hall (as MLAD), Harry Gold, and Julius Rosenberg (as ANTENNA/LIBERAL) developed by Gardner and FBI liaison Robert Lamphere.
- October 1949 Kim Philby arrives in Washington as SIS liaison; is briefed on VENONA; passes warning to Moscow.
- February 2, 1950 Klaus Fuchs arrested in London on the basis of FBI information from VENONA.
- May 23, 1950 Harry Gold arrested in Philadelphia.
- June 16, 1950 David Greenglass arrested.
- July 17, 1950 Julius Rosenberg arrested; Ethel Rosenberg arrested August 11, 1950.
- June 19, 1953 Julius and Ethel Rosenberg executed at Sing Sing.
- 1969 Cecil J. Phillips circulates the internal NSA memorandum identifying ALES as "probably Alger Hiss."
- October 1, 1980 NSA Director Bobby R. Inman formally closes the VENONA project.
- July 11, 1995 Joint NSA, CIA, and Department of Defense release of the approximately 2,900 decrypted VENONA messages.
- 1996–1997 Additional batches of VENONA decryptions and supporting NSA monographs released, completing the open record.
Cases on this archive that connect.
COINTELPRO (File 009) — the FBI counterintelligence program. VENONA's identifications were one of the principal inputs to the FBI's 1950s domestic-security caseload, against which COINTELPRO's later operations were a separate and more institutionally aggressive response.
MK-Ultra (File 001) — the CIA mind-control program of the 1950s. MK-Ultra and VENONA are the two principal Cold War cryptologic-and-behavioral lines of effort whose institutional cultures shaped the agency landscape that the 1975 Church Committee would investigate.
The Pentagon Papers (File 023) — the 1971 disclosure of the Defense Department's classified Vietnam history. The Pentagon Papers and the VENONA release are bookend examples of how the U.S. classification system responds to questions of historical truth and current operational value.
The JFK Assassination (File 006) — the 1963 Dallas killing. VENONA's identifications of the Soviet networks of the 1940s form part of the Cold War intelligence backdrop against which Lee Harvey Oswald's 1959–1962 Soviet defection was investigated.
More related files coming as the archive grows. Planned: the Rosenberg case as a standalone file, the Hiss-Chambers case, the Cambridge Five, the Mitrokhin Archive.
Full bibliography.
- Benson, Robert L. and Warner, Michael (eds.), VENONA: Soviet Espionage and the American Response, 1939–1957, National Security Agency / Central Intelligence Agency, 1996. The principal official documentary publication on the project.
- Benson, Robert L., The Venona Story, NSA Center for Cryptologic History, 2001. Concise official summary of the project's history.
- National Security Agency, Center for Cryptologic History, monographs on Soviet cryptosystems and on the one-time pad reuse vulnerability, partially declassified release 1995–2008.
- Soviet cipher system documentation reconstructed from the VENONA decryptions, NSA technical monographs, partially declassified 1996.
- Gardner, Meredith, working notes and personal correspondence, partially held in the NSA Center for Cryptologic History archive; selected items released 1995–2010.
- Lamphere, Robert J. and Schachtman, Tom, The FBI-KGB War: A Special Agent's Story, Random House, 1986. Lamphere's first-person account as the FBI's principal VENONA liaison.
- Williams, Robert Chadwell, Klaus Fuchs, Atom Spy, Harvard University Press, 1987.
- Albright, Joseph and Kunstel, Marcia, Bombshell: The Secret Story of America's Unknown Atomic Spy Conspiracy, Times Books, 1997. The principal biographical treatment of Theodore Hall.
- Radosh, Ronald and Milton, Joyce, The Rosenberg File, 2nd ed., Yale University Press, 1997. Substantially revised after the VENONA release.
- Haynes, John Earl and Klehr, Harvey, Venona: Decoding Soviet Espionage in America, Yale University Press, 1999. The principal scholarly synthesis of the released material.
- Roberts, Sam, The Brother: The Untold Story of the Rosenberg Case, Random House, 2001 (rev. 2014). Includes coverage of David Greenglass's recantation and the Morton Sobell 2008 statement.
- Phillips, Cecil J., "What Made VENONA Possible?" and "The ALES Identification," NSA Center for Cryptologic History internal monographs, released 1996.
- Haynes, John Earl, Klehr, Harvey, and Vassiliev, Alexander, Spies: The Rise and Fall of the KGB in America, Yale University Press, 2009. Cross-references VENONA decryptions with Vassiliev's transcribed KGB archive notebooks.
- Andrew, Christopher and Mitrokhin, Vasili, The Sword and the Shield: The Mitrokhin Archive and the Secret History of the KGB, Basic Books, 1999.
- Moynihan, Daniel Patrick (Chair), Report of the Commission on Protecting and Reducing Government Secrecy, U.S. Government Printing Office, 1997. The institutional pathway for the 1995 release.
- Mitrokhin Archive, selected documents released through the Churchill Archives Centre, Cambridge, 2014 onward.