National Security Agency - The Black Vault
National Security Agency - The Black Vault
National Security Agency - The Black Vault
- No tags were found...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
1970s<br />
1970s<br />
Vice Admiral Inman<br />
In 1977 General Allen gained his fourth<br />
star and became Commander of the U.S. Air<br />
Force Systems Command. He was replaced<br />
by Vice Admiral Bobby Ray Inman, USN, the<br />
fourth Director of the ‘70s era. Unlike some<br />
of his predecessors, he had an impressive<br />
intelligence background. Inman served in<br />
the Korean War and had assignments as an<br />
Operations Intelligence Analyst at NSA and as<br />
Assistant Chief of Staff for Intelligence to the<br />
Commander in Chief, U.S. Pacific Fleet. His prior<br />
assignment as Vice Director, Plans, Operations<br />
and Support at DIA also gave Inman invaluable<br />
experience in the complexities of intelligence.<br />
His tenure continued to focus on the Soviet/<br />
Warsaw Pact target, although transnational<br />
targets, such as terrorism and counternarcotics,<br />
<strong>The</strong> NESTOR system was developed in answer to the<br />
military’s need for lighter and more efficient communication<br />
systems. <strong>The</strong> Soldier above is using the KY-38 “manpack.”<br />
were beginning to come to the forefront. After<br />
serving as DIRNSA, VADM Inman went on<br />
to become Deputy Director and later Acting<br />
Director of the CIA.<br />
Securing Networks<br />
Developments in cryptographic technology<br />
boomed in the 1970s. <strong>The</strong> new public<br />
cryptography gave NSA a fresh challenge -- it<br />
had to not only keep up with, but find a way<br />
to stay ahead of the curve.<br />
Great leaps forward in computer and electronic<br />
network technology meant NSA had to become<br />
expert in securing information systems. As<br />
newer, faster, and more efficient ways of storing<br />
and moving information developed, the private<br />
sector and scientific community grew concerned<br />
about the security of their communications.<br />
Demands for protection led to rapid<br />
developments in publicly available cryptology.<br />
NSA struggled with this dilemma, largely<br />
because, while the <strong>Agency</strong> understood the<br />
need for robust public cryptography, its first<br />
mission was to maintain the cryptologic<br />
capabilities needed to protect the Nation.<br />
<strong>The</strong> fear was that the Nation’s adversaries<br />
would be able to easily buy U.S. commercially<br />
available encryption technology.<br />
<strong>The</strong> <strong>Agency</strong> and federal authorities realized<br />
that, while exporting the new technology<br />
was good for economic reasons, it needed<br />
to be balanced against security concerns.<br />
In sum, strong public cryptography could<br />
harden COMINT targets, and thus deny vital<br />
information to decision makers. On the other<br />
hand, if the <strong>Agency</strong> took too aggressive a<br />
stance, it would run the risk of being seen as<br />
curtailing the rights of American citizens. NSA<br />
had to proceed cautiously in its efforts to<br />
allow the free flow of commerce while at the<br />
same time doing what was needed to protect<br />
the Nation.<br />
But while the <strong>Agency</strong> was rightfully concerned<br />
about the challenges of public cryptography, its<br />
first obligation was securing government and<br />
military communications. Drawing on its vast<br />
expertise in the field, the <strong>Agency</strong> developed a<br />
group of cipher machines, including the first<br />
device that combined radio and encipherment<br />
in a single unit.<br />
During this time, NSA was also developing<br />
lighter and more efficient communication<br />
systems for military use. <strong>The</strong> Vietnam War<br />
taught the <strong>Agency</strong>’s system developers<br />
that troops in the field were reluctant to<br />
use communications equipment that was<br />
too heavy or cumbersome. As a result,<br />
the <strong>Agency</strong>’s communications security<br />
organization began to develop equipment<br />
better suited to COMSEC in a war zone.<br />
Under the NESTOR program a number of<br />
portable devices that retained high security<br />
and good voice quality were produced.<br />
<strong>The</strong> White House and Executive Branch<br />
In 1976 <strong>The</strong> White House directed NSA to<br />
look for solutions that would ensure U.S.<br />
communications were secure. By that time,<br />
senior officials had begun to realize the threat<br />
posed by Soviet monitoring of communications<br />
within the United States and the vulnerability of<br />
American communication networks.<br />
<strong>The</strong> <strong>National</strong> <strong>Security</strong> Decision Memorandum<br />
tasked NSA to work with the Office of<br />
Telecommunications Policy to develop<br />
an action plan for the express purpose of<br />
ensuring that “U.S. citizens and institutions<br />
have a reasonable expectation of privacy<br />
from foreign or domestic intercept.”<br />
<strong>The</strong> White House plan, implemented in<br />
1977, called for expedited measures to<br />
secure communications in the Washington,<br />
New York City, and San Francisco areas.<br />
<strong>The</strong> administration considered these areas<br />
as the most vulnerable to Soviet intercept<br />
efforts. <strong>The</strong>se proactive measures worked<br />
and were later extended more widely in the<br />
U.S. Preventive measures included shifting<br />
sensitive government communications from<br />
microwave to cable and bulk scrambling for<br />
microwave links (See Document D at end of<br />
chapter.). NSA’s success in this arena earned<br />
it the reputation it still enjoys as the world’s<br />
leader in strong communications security<br />
practices and devices.<br />
<strong>The</strong> Mayaguez Incident<br />
In May 1975, NSA issued a series of summary<br />
intelligence reports detailing the capture<br />
of American merchant sailors on the ship<br />
Mayaguez by the Khmer Rouge in Cambodia.<br />
<strong>The</strong> Mayaguez was a U.S. cargo ship involved<br />
in the support of U.S. forces in Southeast Asia.<br />
On May 7, 1975, the ship left Hong Kong on<br />
what was to be a routine voyage. On May 12,<br />
1975, the Mayaguez was 60 miles off the<br />
coast of Cambodia when it was attacked and<br />
boarded by Khmer Rouge naval forces and<br />
forced to follow the Cambodian ships toward<br />
the mainland.<br />
President Gerald Ford denounced the action<br />
as an “act of piracy” and demanded immediate<br />
release of the ship. Despite the attempts of<br />
the Ford administration to find a diplomatic<br />
solution, all efforts failed, and on May 14,<br />
the President ordered military action. A U.S.<br />
Marine Corps detachment in the Philippines<br />
was given the assignment and instructed to<br />
board the ship at sea.<br />
Early in the morning of that day, the Marine<br />
contingent boarded the Mayaguez and<br />
took control of the vessel. Shortly after the<br />
boarding, a Thai fishing boat approached<br />
the USS Wilson, which was supporting the<br />
amphibious assault. Aboard the fishing boat<br />
were a Thai crew and the 39 men of the<br />
Mayaguez. <strong>The</strong>y had been set free by their<br />
captors. By noon, all Mayaguez crewmen<br />
were back aboard their own ship.<br />
Since the resolution of the incident,<br />
historians and analysts have debated the<br />
reasons for the unexpected release of the<br />
Mayaguez crew. Some have proposed that<br />
either China or another nation with influence<br />
over the Khmer Rouge played a role, but the<br />
complete reason will never be known.<br />
Remote Keying<br />
Soviet espionage activities in the United<br />
States steadily grew in the 1970s, prompting<br />
56 60 Years of Defending Our Nation <strong>National</strong> <strong>Security</strong> <strong>Agency</strong> <strong>National</strong> <strong>Security</strong> <strong>Agency</strong> 60 Years of Defending Our Nation 57