A recent TV documentary reported on a spy radio transmitter that was placed near an East German army facility. The transmission schedule of this device was computed with a method that is not publicly known. Can a reader reverse-engineer this algorithm?

US crypto collector Marc Sachs has shown me a Burst Encoder from the 1950s. A video explains how this cleverly designed device works.