Rum Row to Router Logs: Gin, Static, and the Birth of American SIGINT

Rum Row to Router Logs: Gin, Static, and the Birth of American SIGINT
Photo by Edgar Chaparro / Unsplash

The Scene: Rum, Radios, and Ridiculous Codes

Picture it: late 1920s. A cold Atlantic dawn, waves slapping against the side of a Coast Guard cutter somewhere off New Jersey. In a small shack onshore, a woman sits hunched over a radio receiver, a pencil poised over a scrap of paper. The air crackles with static, then a stream of numbers and gibberish bursts through. Somewhere out there, a smuggler’s mother-ship is waiting, crates of Canadian whiskey bobbing in the hold.

Elizebeth Smith Friedman listens, sighs, and mutters, “If you’re going to use Havana as your cipher key, you deserve to be caught.”

Welcome to the forgotten spy war of the Prohibition era, when the United States Coast Guard learned to read rum-runners’ mail, and a handful of overworked cryptanalysts more or less invented modern American SIGINT.

The Dry Law That Soaked the Country

In 1920, the U.S. government, in its infinite wisdom, decided to make alcohol illegal. Because what could possibly go wrong? Instead of ending drinking, Prohibition birthed a billion-dollar black market. The coastlines became a giant conveyor belt of contraband; the Atlantic seaboard looked less like a moral utopia and more like a floating pub crawl.

Mother-ships, large vessels loaded with rum from the Caribbean or whisky from Canada, would hover just beyond the 12-mile territorial limit, selling booze to smaller “contact boats” that darted inland under cover of night. This floating marketplace was called Rum Row, and for the Coast Guard it was a logistical nightmare.

Patrol boats could chase speed-boats, sure, but by the time they reached the scene, the liquor was ashore, the crew gone, and someone in Washington was pretending this was working.

Then came short-wave radio. Smugglers discovered they could coordinate at a distance, relay timings, and shift rendezvous points, all without shouting across the water like idiots. By 1927, Rum Row had gone wireless.

And of course, because secrecy is intoxicating, they started encoding their radio chatter. They invented their own “secret” codes, which is a polite way of saying they were terrible at cryptography.

Enter Elizebeth Smith Friedman: The Coast Guard’s Secret Weapon

Before there were three-letter agencies and men in dark glasses, there was a woman with a pencil, a stack of intercepted radio messages, and the quiet conviction that no code was unbreakable, especially when written by drunkards.

Elizebeth Smith Friedman was not supposed to become a codebreaker. Born in 1892 in Indiana, she studied literature, adored Shakespeare, and took a job at Riverbank Laboratories under an eccentric millionaire obsessed with proving that Francis Bacon had written the Bard’s plays. (Yes, really. Academia has always been a bit unhinged.) Her role? Decipher “hidden ciphers” in Shakespeare’s folios. Spoiler: there weren’t any. But by the time she’d disproved the theory, she’d taught herself cryptanalysis, and discovered she was annoyingly good at it.

It was at Riverbank that she met William Friedman, a geneticist who shared both her interest in secret writing and her patience for nonsense. Together, they became America’s original cryptologic power couple. He went on to design the Army’s most advanced cipher systems. She, meanwhile, went on to catch mobsters.

By the late 1920s, Elizebeth had developed a reputation as the woman you called when your smugglers were smarter than your sailors. The U.S. Treasury Department, drowning in indecipherable shortwave chatter from rum-runners, summoned her to help. Her new battlefield wasn’t a laboratory but a cramped Coast Guard office lined with intercepted radio logs and the faint smell of tobacco and desperation.

Within months, she had turned chaos into method. She catalogued transmissions, mapped call signs, and cross-referenced frequencies like a human Enigma machine. Her tiny team, sometimes just two or three analysts, began cracking the smugglers’ codes at industrial scale. Between 1928 and 1930, they decrypted more than 12,000 messages, transforming encrypted babble into arrest warrants.

Her brilliance wasn’t just mathematical. It was psychological. Friedman realised that even in code, people have linguistic fingerprints: predictable habits, pet phrases, favourite numbers. Smugglers reused code words, slipped into half-plain text when tired, or couldn’t resist naming keys after their cargo. She caught them all. Her favourite trick was to guess the smuggler’s state of mind,“bored,” “hungover,” or “careless”, and start decoding from there.

What set her apart wasn’t only her intellect but her discipline. She wrote immaculate case reports that could survive both cross-examination and bureaucratic meddling. “The difficulty,” she once sighed, “is not in solving their codes, but in convincing them that they’ve been solved.”

So when you imagine the Coast Guard’s anti-smuggling crusade, forget the rugged sailors chasing boats through fog. Picture instead a bespectacled woman, head bowed over a notepad, dismantling an entire criminal empire one substitution cipher at a time, and occasionally pausing to tut at their spelling.

Friedman didn’t just decode crime; she professionalised intelligence. Her work led directly to the formation of the Coast Guard’s first dedicated cryptanalysis unit and set the precedent for modern intelligence-led policing. The NSA, decades later, would effectively trace its lineage back to her desk.

And yes, she did all this while raising two children, fending off mob threats, and politely tolerating being credited in court as “Mrs. Friedman, assistant to her husband.” Which is rich, considering William’s later military code systems would owe more than a little to her techniques.

History tends to remember the loud men with machines. But during Prohibition, America’s most potent weapon was a woman with perfect grammar, infinite patience, and a very low tolerance for stupid ciphers.

Counter-Intelligence Lessons from the Booze War

If you strip away the flapper dresses and bathtub gin, the smugglers’ communications look suspiciously like a modern encrypted network. Different tech, same problems. Friedman’s battles with bootleggers weren’t just an amusing historical footnote, they’re a living case study in how intelligence really works when the stakes are criminal, chaotic, and very human.

1. Metadata Beats Messages

You don’t need the content to find the story. Friedman and the Coast Guard used timing, call-sign reuse, and radio direction-finding to map entire smuggling operations. They didn’t have cloud analytics, they had clipboards and common sense.

In one of her more famous cases, Friedman used radio transmission logs alone to reconstruct a fleet’s movements, proving that an ostensibly Canadian ship, the I’m Alone, was actually American-run. No cipher cracked, no key found, just inference.

Modern intelligence teams call this “link analysis” or “network mapping.” Back then, it was just noticing things. The same principle applies today: who you talk to, when you talk, and how often you repeat yourself is often more revealing than the words themselves.

Today’s analysts still rely on this truth: metadata kills privacy faster than decryption ever will. Encrypted content may be sacred, but timestamps and IPs are the gossip column of the internet.

2. The Human Factor Is Always the Weakest Link

The smugglers’ downfall wasn’t their radios, it was their behaviour. They reused keys, wrote sloppy codebooks, and used “Havana” as a keyword. Friedman called this “the human fingerprint”, a blend of laziness, habit, and hubris that makes even strong systems fall apart.

A century later, little has changed. Today’s ransomware gangs still reuse SSH keys, post screenshots on social media, or log into compromised servers via the same VPN they use for Netflix.

The technology may evolve, but our capacity for operational idiocy is timeless. In counter-intelligence, you don’t need to out-think the system, you only need to out-wait human error.

And it’s not just carelessness; it’s predictability. Rum-runners slipped into half-plaintext when tired, repeated stock phrases, and wrote like themselves even when enciphered, giving Friedman stylistic “cribs.” Modern actors do the same with emoji habits, timestamp patterns, and device fingerprints. Even the best crypto can’t save a team that reuses boilerplate, syncs notes across personal clouds, or breaks radio silence to say “one last thing.” Practical mitigation is mind-numbingly boring, rotate keys on a schedule, enforce message templates, drill “no-comms means no-comms,” and audit for behavioural tells, but as Friedman proved, discipline beats mathematics every day of the week.

3. Small Teams Beat Big Bureaucracies

Friedman’s cryptanalytic cell was tiny, barely the size of a modern startup, yet it regularly outperformed entire federal departments. Why? Because it had autonomy and focus. Her team could pivot, improvise, and test ideas without waiting for a memo. That agility made them lethal. Modern intelligence agencies could do with less “task-force synergy” and more one woman, one pencil, one deadline. Big agencies gather data; small teams create insight. And that, as Friedman proved, is where the real power lies.

Small teams also compress the decision loop. In Elizebeth’s shop, the person who spotted the pattern was often the same person who drafted the brief, phoned the field office, and prepped the evidentiary chain, hours, not weeks. No hand-offs, no “pending approval,” no committee that meets every second Thursday unless there’s a bank holiday. That single-threaded responsibility is terrifying to bureaucrats and catnip to outcomes. The modern analogue is a fused cell, analyst, linguist, data engineer, and a lawyer who actually likes evidence, sat at the same table with the authority to act.

Finally, small teams are culturally harder to spoof. You can’t hide bad tradecraft in a five-person room where everyone knows your coffee order and your working notes. Peer review becomes ambient; red-teaming is just Tuesday. If you want to copy the Friedman model today: keep units lean (≤7), cross-functional by design, with fast tooling (scripts over platforms), explicit legal liaison from day one, and a mandate that values shipping a usable lead over producing a beautiful dashboard. Bureaucracies admire process; small teams deliver arrests.

4. Silence Speaks Volumes

When the smugglers realised they were being listened to, they sometimes stopped transmitting altogether. Ironically, that quiet made more noise to Friedman than their chatter ever did. The absence of a signal became a signal, a shaped hollow that hinted at fear, a change of plan, or a rendezvous about to happen.

The modern equivalent is not mystery; it’s migration. “Going dark” almost never means nothing is happening, it means the activity has slipped into a different mode, on a different medium, at a different tempo. A public channel may suddenly empty, yet the same devices still wander the same cell towers, phones still beacon to push-notification services, and familiar login hours keep their circadian rhythm. Content hides; plumbing struggles to.

Watch what moves during the quiet. A group falls silent on WhatsApp and, as if by magic, brand-new accounts appear on a smaller platform two hours later. Public Telegram noise collapses, yet you see fresh TLS fingerprints from the same hosts and a trickle of DNS lookups for odd, newly minted domains. There are no messages, but the app still reaches out for updates; there are no calls, but SIM swaps and handset IDs betray a hardware refresh; there’s no radio traffic, yet the same bodies pass the same cameras near the same safehouse on the same nights. In Prohibition, a break in the static often meant the boats had already cast off. Today, a lull in chat usually means someone has opened a shared drive, planted a one-time pad in a cloud bucket, or scheduled a narrow “window” call that leaves almost no residue.

Treat the quiet as a puzzle with three hypotheses: they’ve changed tools, they’ve changed keys, or they’ve changed cadence. Then try to break each guess with side-channel evidence, login timestamps, resolver queries, certificate pinning changes, new repository activity, a sudden bloom of VPN exit nodes. The moment of transition is where the seams show. People stand up new infrastructure badly; they reuse a burner too long; they forget that background telemetry continues even when the chat box is empty.

Above all, pair the mute button with eyes on. Friedman read radio silence alongside boat sightings; you can read chat silence alongside badge swipes, rideshare drops at ungodly hours, or familiar MAC addresses reappearing in the wrong postcode. Silence is not the end of the conversation. It’s the stage direction, exit left, re-enter masked, and if you follow it, you’ll usually find the actors huddled in the wings.

5. Make Intelligence Actionable

Friedman’s decrypts didn’t gather dust in filing cabinets; they turned into knocks on doors, impounded ships, and very awkward days in court. That wasn’t an accident. She wrote like a prosecutor’s best analyst and a judge’s favourite witness, plain, spare, and defensible. It’s the unfashionable truth of counter-intelligence: discovery is romantic, delivery is decisive. If your findings aren’t communicated clearly, promptly, and in a form someone can actually use, you haven’t done intelligence, you’ve done trivia.

Actionable intelligence begins with translation. The person steering a cutter, signing a warrant, or approving a raid does not want your exquisite frequency histogram; they want the “so what, so when, so where.” Friedman packaged her work as narratives with timestamps: this call sign equals this vessel; these transmissions map to this route; the rendezvous is tonight, here. Behind the scenes she kept the full methods and maths, but up front she led with the decision. Modern teams should do the same: headline the conclusion in one sentence, then layer the evidence and methodology underneath for those who must poke it.

The second pillar is chain-of-custody. Friedman understood that intelligence only matters if it survives a hostile cross-examination. Her notebooks show who captured the signal, when it was logged, how it was decrypted, and who touched it next. That boring paperwork is the bridge between “we think” and “we can prove.” In digital terms: preserve originals, hash everything, record tooling versions, keep analyst notes contemporaneous, and separate analytic judgment from factual observation. You’re not just catching bad actors; you’re building a story a court can believe.

Then comes timing. Intelligence decays. A perfect report delivered after the rendezvous is an elegant failure. Friedman’s office compressed the loop: intercept at dawn, decrypt at lunch, alert the field by dusk. Today that means aligning analysts, operators, and counsel so the product ships while it’s still warm. Be honest about uncertainty, confidence levels are not a vibe, but don’t hide behind perfectionism. Decision-makers can act on 80% if you tell them exactly which 20% is missing and how that might change the call.

Finally, speak human. Analysts love caveats; commanders love verbs. The trick is to keep both. “We assess with high confidence that Vessel X will meet Contact Boat Y between 2300–0100 near Buoy 9; probable cargo spirits; recommend interdiction window 2345–0015; legal basis attached.” That’s Friedman’s spirit: crisp recommendation first, reasoning and references to follow. If you must present to mixed audiences, build the artefacts accordingly, a one-page brief for action, a methods annex for scrutiny, an evidentiary packet for court. Same facts, different doors into the material.

In short: collect ruthlessly, analyse honestly, communicate unmistakably. Intelligence that cannot be used is indistinguishable from gossip, and gossip doesn’t win cases. Friedman’s genius wasn’t only that she broke codes; it was that she made the results legible to sailors, prosecutors, and judges, the only people who could turn her pencil marks into consequences.

6. Adapt or Die

By 1930, the rum-runners had sprinted from simple substitution ciphers to a menagerie of bespoke systems and wobbly codebooks. They rotated keys more often, split routes across mother-ships, and tried the radio equivalent of whispering behind their hands. Friedman’s answer wasn’t to worship any single method; it was to assume continuous change and build workflows that digested it. She treated new ciphers as new skins on the same animal: humans still re-used habits, messages still had structure, radio sets still left fingerprints. In other words, she hunted behaviour, not tools.

Modern adversaries do the same dance at broadband speed. One week it’s Telegram, the next it’s self-hosted Matrix, then a hop to dead-drop pads, stego in image EXIF, or voice notes dumped to cloud storage with links traded out-of-band. The goal is always the same: outrun your last compromise by changing surface area faster than the defender can re-orient. If you chase each new platform or crypto toy with a bespoke analytic gadget, you’ll die tired and late.

The counter is a capability, not product mindset. Instrument for change points, sudden shifts in timing, domain families, TLS fingerprints, device fleets, rather than for one app’s API. Maintain living playbooks that start with hypotheses (“they’ve switched medium / cadence / custody”) and force rapid falsification. Build primitives that travel: traffic baselining, entity resolution, long-tail DNS and certificate analytics, passive RF/telemetry correlation, and a legal pipeline that can ingest whatever you catch next without rewriting policy from scratch.

Lastly, rehearse adaptation. Friedman’s shop compressed intercept → exploit loops because they drilled the boring stuff: logging discipline, method notes, common nomenclature. Your version is chaos exercises: rotate your own keys, burn your own infrastructure, and see whether your analysts can still stitch a narrative in 24 hours. Technology will keep mutating; that’s its job. Your job is to make mutation merely interesting, and never decisive.

7. Intelligence Is Only as Smart as Its Context

Friedman’s real magic trick wasn’t just turning gibberish into plaintext; it was turning plaintext into meaning. A call sign on paper is nothing. A call sign tied to a hull number, a habitual departure tide, a skipper’s preference for midnight runs and a warehouseman’s payday becomes a story. She treated every intercept as a clue in a living world, not a self-contained artifact, and that is where most modern analysis still falls over. Data is loud; context is legible.

Context starts with time and place. Friedman didn’t simply say “message at 03:12.” She asked what that hour meant for the tide table, which cutters were on duty, whether the moon was useful for navigation or suicidal for stealth. She annotated weather and sea state because a flat sea invites speedboats and a nor’easter invites lies. She stitched radio logs to harbour manifests, fuel receipts and eyewitness notes, so a spiky line on a graph resolved into a boat that left late because the engineer was drunk. When you add enough of these mundane particulars, patterns stop being mathematical curiosities and start being behaviour.

It also means resisting the temptation to let tools define the truth. A model can tell you two devices are “similar”; context tells you one is a deckhand’s battered handset and the other is a shore boss’s polished burner, and that they only ever co-locate on Fridays after payroll. Without that narrative spine, you get confident nonsense: elegant link charts that imply conspiracies where there are only coincident commuters, or, worse, you miss the conspiracy because it looks like commuters. Friedman’s notebooks are a masterclass in bias control: clear separation of observation from inference, dates on every judgment, and the courage to revise when a new sighting made yesterday’s tidy theory look daft.

Finally, context travels all the way to the customer. A beautiful analytic finding that cannot be explained to a cutter captain, a prosecutor or a policy aide is a museum piece. Friedman wrote with verbs and nouns the operators recognised: who will do what, where, and when, with how much confidence and why that matters now. The annex could carry the algebra; the brief carried the decision. If you want smarter intelligence, don’t just add more data, add more world.

Rum Row to Router Logs: The Continuum

Squint and the 1920s melts into the 2020s. Rum Row’s mother-ships loitering just beyond the 12-mile limit look a lot like bulletproof-hosting ASNs sitting just outside a regulator’s jurisdiction. The contact boats are your burner accounts and single-purpose bots, darting in from offshore servers to pick up payloads and scoot back into international bandwidth. The Coast Guard cutters become joint cyber takedown teams; HF/DF stations become passive DNS, certificate transparency feeds, and netflow sensors; call-signs turn into TLS fingerprints and device IDs. Same coastline, different salt.

The logistics rhyme too. Smugglers used pre-arranged windows and light signals; crews today use time-locked channels, expiring links, and one-shot pads in cloud buckets. A mother-ship’s manifest is now a C2 server’s task queue. Offloading crates at night has become staging data through throwaway CDNs or public repos disguised as “documentation updates.” In both eras, the cleverness is less in the cipher and more in the choreography, routes, timings, reliabilities, the human urge to keep Tuesday as “busy night” because Friday’s for football.

Even the economics refuse to change their clothes. Prohibition raised prices and attracted syndicates; modern platform bans and sanctions do the same, herding small crooks into larger, more professional crews that can afford better tooling and legal cover. That concentrates risk and, usefully, metadata. Rum Row taught the Coast Guard that if you can’t search every cove, you can still watch the choke points: reefs, tides, fuel docks. Today, you watch the peering edges, the exit nodes, the reseller rings for SIMs and cloud credits. Choke points are forever.

There’s a cautionary echo here as well. The Prohibition state mistook repression for strategy and created a market it couldn’t police; modern defenders risk the same when they fetishise platform bans without planning for displacement. Drive comms off one shiny app and you don’t end the party, you just move it to a dimmer bar with no bouncer. The Friedman lesson is to map the whole nightlife, not just the pub you dislike: understand where people will go, what habits they’ll carry, and which bits of plumbing they can’t help using along the way.

Most of all, the continuum is moral as much as technical. The Coast Guard’s victories mattered because they connected intercepts to outcomes with legal process and a sense of proportion; ours should too. It’s tempting to throw more sensors at the sea and call it strategy. Better to remember that the real leverage still lives where it always has: in the patterns people can’t stop repeating, the routes they’re too lazy to change, and the stories they don’t realise they’re telling, whether over short-wave static or inside a neat little router log.

A Sarcastic History of American SIGINT, Brought to You by Gin

And so to the great origin myth of American signals intelligence, not forged beneath fluttering battle flags, but in a damp radio hut while half the country argued about cocktails. The Coast Guard didn’t so much design a cryptologic programme as stumble into one, then kept stumbling until it looked intentional. Bless them.

If this story had opening credits, they’d roll past Riverbank Laboratories first: a millionaire’s country estate where a fabulously confident crank tried to prove Francis Bacon wrote Shakespeare and, by accident, bankrolled America’s codebreaking training montage. From literary séance to SIGINT boot camp, the most American career pivot since “tax attorney turned barbecue influencer.” Out of that oddball greenhouse stepped Elizebeth Smith Friedman, the patron saint of “your key is ‘Havana,’ you clown,” who converted mob bluster into court exhibits with nothing more than a pencil, a ledger, and a withering respect for grammar. Inevitably there was William F. Friedman, the husband you’d been warned about, a geneticist who wandered in, blinked twice, invented half the field, and later shepherded the Army’s Signals Intelligence Service as if it were a side hustle.

Hovering nearby is Herbert O. Yardley and his Black Chamber, America’s first peacetime codebreaking shop, which performed rather well until Secretary of State Stimson closed it with the immortal line, “Gentlemen do not read each other’s mail.” Adorable. Five minutes later, everyone returned to reading the mail, only with better stationery and fewer interviews. The Navy’s OP-20-G then turned radio rooms into something properly frightening, proving that direction-finding plus stubbornness beats glamour every day that ends in “-y.” And somewhere in this scrum, the Coast Guard’s own Unit 387 institutionalised Elizebeth’s magic tricks, lending bureaucratic dignity to what had started as a pencil, a radio log, and an attitude.

Put less politely: American SIGINT did not spring fully formed from a Pentagon PowerPoint. It sloshed out of Prohibition like a spilled martini, hardened during the Yardley melodrama, professionalised under the Friedmans, and scaled with OP-20-G and SIS until Arlington Hall and its post-war heirs made it a lifestyle choice. The real superpower was never just machines; it was paperwork with consequences, taking raw intercepts, bolting on context, and walking the result into rooms where someone could sign something regrettable.

Which is why the moral isn’t “get a bigger sensor.” It’s “get a better story.” The Coast Guard’s gin-soaked SIGINT worked because it made sense to sailors, prosecutors, and judges on a Tuesday. Do that in the twenty-first century, translate your router logs into decisions, keep your chain of custody boring, and cultivate at least one analyst who can write a sentence that lands, and you’ll be fine. Or at least as fine as anyone can be while chasing criminals who still use “my_dogs_name_followed_by_123,” just on a zero-trust network. Raise a glass (legally obtained, do calm down) to those gloriously improvised beginnings. American SIGINT started with rum, radio, and a woman who refused to let bad ciphers live. Everything after that is merely scaling.

Read more