01.07.2014 Views

National Security Agency - The Black Vault

National Security Agency - The Black Vault

National Security Agency - The Black Vault

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1970s<br />

1970s<br />

Vice Admiral Inman<br />

In 1977 General Allen gained his fourth<br />

star and became Commander of the U.S. Air<br />

Force Systems Command. He was replaced<br />

by Vice Admiral Bobby Ray Inman, USN, the<br />

fourth Director of the ‘70s era. Unlike some<br />

of his predecessors, he had an impressive<br />

intelligence background. Inman served in<br />

the Korean War and had assignments as an<br />

Operations Intelligence Analyst at NSA and as<br />

Assistant Chief of Staff for Intelligence to the<br />

Commander in Chief, U.S. Pacific Fleet. His prior<br />

assignment as Vice Director, Plans, Operations<br />

and Support at DIA also gave Inman invaluable<br />

experience in the complexities of intelligence.<br />

His tenure continued to focus on the Soviet/<br />

Warsaw Pact target, although transnational<br />

targets, such as terrorism and counternarcotics,<br />

<strong>The</strong> NESTOR system was developed in answer to the<br />

military’s need for lighter and more efficient communication<br />

systems. <strong>The</strong> Soldier above is using the KY-38 “manpack.”<br />

were beginning to come to the forefront. After<br />

serving as DIRNSA, VADM Inman went on<br />

to become Deputy Director and later Acting<br />

Director of the CIA.<br />

Securing Networks<br />

Developments in cryptographic technology<br />

boomed in the 1970s. <strong>The</strong> new public<br />

cryptography gave NSA a fresh challenge -- it<br />

had to not only keep up with, but find a way<br />

to stay ahead of the curve.<br />

Great leaps forward in computer and electronic<br />

network technology meant NSA had to become<br />

expert in securing information systems. As<br />

newer, faster, and more efficient ways of storing<br />

and moving information developed, the private<br />

sector and scientific community grew concerned<br />

about the security of their communications.<br />

Demands for protection led to rapid<br />

developments in publicly available cryptology.<br />

NSA struggled with this dilemma, largely<br />

because, while the <strong>Agency</strong> understood the<br />

need for robust public cryptography, its first<br />

mission was to maintain the cryptologic<br />

capabilities needed to protect the Nation.<br />

<strong>The</strong> fear was that the Nation’s adversaries<br />

would be able to easily buy U.S. commercially<br />

available encryption technology.<br />

<strong>The</strong> <strong>Agency</strong> and federal authorities realized<br />

that, while exporting the new technology<br />

was good for economic reasons, it needed<br />

to be balanced against security concerns.<br />

In sum, strong public cryptography could<br />

harden COMINT targets, and thus deny vital<br />

information to decision makers. On the other<br />

hand, if the <strong>Agency</strong> took too aggressive a<br />

stance, it would run the risk of being seen as<br />

curtailing the rights of American citizens. NSA<br />

had to proceed cautiously in its efforts to<br />

allow the free flow of commerce while at the<br />

same time doing what was needed to protect<br />

the Nation.<br />

But while the <strong>Agency</strong> was rightfully concerned<br />

about the challenges of public cryptography, its<br />

first obligation was securing government and<br />

military communications. Drawing on its vast<br />

expertise in the field, the <strong>Agency</strong> developed a<br />

group of cipher machines, including the first<br />

device that combined radio and encipherment<br />

in a single unit.<br />

During this time, NSA was also developing<br />

lighter and more efficient communication<br />

systems for military use. <strong>The</strong> Vietnam War<br />

taught the <strong>Agency</strong>’s system developers<br />

that troops in the field were reluctant to<br />

use communications equipment that was<br />

too heavy or cumbersome. As a result,<br />

the <strong>Agency</strong>’s communications security<br />

organization began to develop equipment<br />

better suited to COMSEC in a war zone.<br />

Under the NESTOR program a number of<br />

portable devices that retained high security<br />

and good voice quality were produced.<br />

<strong>The</strong> White House and Executive Branch<br />

In 1976 <strong>The</strong> White House directed NSA to<br />

look for solutions that would ensure U.S.<br />

communications were secure. By that time,<br />

senior officials had begun to realize the threat<br />

posed by Soviet monitoring of communications<br />

within the United States and the vulnerability of<br />

American communication networks.<br />

<strong>The</strong> <strong>National</strong> <strong>Security</strong> Decision Memorandum<br />

tasked NSA to work with the Office of<br />

Telecommunications Policy to develop<br />

an action plan for the express purpose of<br />

ensuring that “U.S. citizens and institutions<br />

have a reasonable expectation of privacy<br />

from foreign or domestic intercept.”<br />

<strong>The</strong> White House plan, implemented in<br />

1977, called for expedited measures to<br />

secure communications in the Washington,<br />

New York City, and San Francisco areas.<br />

<strong>The</strong> administration considered these areas<br />

as the most vulnerable to Soviet intercept<br />

efforts. <strong>The</strong>se proactive measures worked<br />

and were later extended more widely in the<br />

U.S. Preventive measures included shifting<br />

sensitive government communications from<br />

microwave to cable and bulk scrambling for<br />

microwave links (See Document D at end of<br />

chapter.). NSA’s success in this arena earned<br />

it the reputation it still enjoys as the world’s<br />

leader in strong communications security<br />

practices and devices.<br />

<strong>The</strong> Mayaguez Incident<br />

In May 1975, NSA issued a series of summary<br />

intelligence reports detailing the capture<br />

of American merchant sailors on the ship<br />

Mayaguez by the Khmer Rouge in Cambodia.<br />

<strong>The</strong> Mayaguez was a U.S. cargo ship involved<br />

in the support of U.S. forces in Southeast Asia.<br />

On May 7, 1975, the ship left Hong Kong on<br />

what was to be a routine voyage. On May 12,<br />

1975, the Mayaguez was 60 miles off the<br />

coast of Cambodia when it was attacked and<br />

boarded by Khmer Rouge naval forces and<br />

forced to follow the Cambodian ships toward<br />

the mainland.<br />

President Gerald Ford denounced the action<br />

as an “act of piracy” and demanded immediate<br />

release of the ship. Despite the attempts of<br />

the Ford administration to find a diplomatic<br />

solution, all efforts failed, and on May 14,<br />

the President ordered military action. A U.S.<br />

Marine Corps detachment in the Philippines<br />

was given the assignment and instructed to<br />

board the ship at sea.<br />

Early in the morning of that day, the Marine<br />

contingent boarded the Mayaguez and<br />

took control of the vessel. Shortly after the<br />

boarding, a Thai fishing boat approached<br />

the USS Wilson, which was supporting the<br />

amphibious assault. Aboard the fishing boat<br />

were a Thai crew and the 39 men of the<br />

Mayaguez. <strong>The</strong>y had been set free by their<br />

captors. By noon, all Mayaguez crewmen<br />

were back aboard their own ship.<br />

Since the resolution of the incident,<br />

historians and analysts have debated the<br />

reasons for the unexpected release of the<br />

Mayaguez crew. Some have proposed that<br />

either China or another nation with influence<br />

over the Khmer Rouge played a role, but the<br />

complete reason will never be known.<br />

Remote Keying<br />

Soviet espionage activities in the United<br />

States steadily grew in the 1970s, prompting<br />

56 60 Years of Defending Our Nation <strong>National</strong> <strong>Security</strong> <strong>Agency</strong> <strong>National</strong> <strong>Security</strong> <strong>Agency</strong> 60 Years of Defending Our Nation 57

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!