American Cryptology during the Cold War - The Black Vault
American Cryptology during the Cold War - The Black Vault
American Cryptology during the Cold War - The Black Vault
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
T~<br />
special operations.) JCS had used security as justification for <strong>the</strong> denial of ULTRA to OSS,<br />
but <strong>the</strong> British were at least as security conscious as <strong>the</strong> <strong>American</strong>s, and <strong>the</strong>y seemed able<br />
to get COMINT of <strong>the</strong> highest sensitivity to those in <strong>the</strong> HUMINT business who needed it.<br />
<strong>The</strong> outright denial ofULTRA to OSSjust did not make sense. 61<br />
Truman discontinued OSS immediately after <strong>the</strong> end of <strong>the</strong> war, partly to rid himself<br />
ofDonovan, who was not in favor with <strong>the</strong> president. But within six months Truman once<br />
again had himself an intelligence organization, called <strong>the</strong> Central Intelligence Group.<br />
CIG was bedeviled by <strong>the</strong> same problems that submerged AFSA - lack of its own budget<br />
and personnel resources (people were loaned in from o<strong>the</strong>r intelligence organizations),<br />
absence of a congressional mandate, and lack of firm direction from <strong>the</strong> top. But <strong>the</strong> idea<br />
was <strong>the</strong> same as that ofAFSA - to establish central control ofU.S. intelligence operations.<br />
When CIA was created in 1947, succeeding CIG, it got its congressional mandate, its<br />
budget, and its own personnel. It still lacked firm leadership, but that was remedied in<br />
1950 with <strong>the</strong> appointment of General Walter Bedell Smith as DCI. Smith had been<br />
Eisenhower's chiefofstaffin Europe, and he knew how to run a tight ship. Tussling with<br />
"Beetle" Smith was like landing in a cactus patch.<br />
Ib) (1)<br />
Ib) (3)<br />
OGA<br />
In <strong>the</strong> early days <strong>the</strong> only high-level COMINT available to CIG was a copy of <strong>the</strong> MAGIC<br />
Summary put out by <strong>the</strong> Army, which was available in <strong>the</strong> Pentagon. In <strong>the</strong> very early<br />
days, only fifty people in CIG had a COMINT clearance. But in June of 1946 Hoyt<br />
Vandenberg became DCI. Vandenberg was fresh from a tour as chairman of USCIB and<br />
knew <strong>the</strong> value ofCOMINT. In December he created an organization within CIG, called <strong>the</strong><br />
Advisory Council, to deal with what he hoped would be a flood ofCOMINT reports.<br />
For a while <strong>the</strong>re were few reports to disseminate. Requests for access to COMINT<br />
reports were generally denied. But in early 1947, two CIG organizations began to get<br />
involved with COMINT operations. <strong>The</strong> first was OSO (Office of Special Operations, <strong>the</strong><br />
clandestine organization), which in March proposed to <strong>the</strong> Army and <strong>the</strong> Navy that <strong>the</strong>y<br />
begin a Joint Counterintelligence Center (JCIC), using COMINT as <strong>the</strong> basic source of<br />
information. <strong>The</strong> services received this enthusiastically, and JCIC was established at<br />
Nebraska Avenue, with <strong>the</strong> understanding that it would eventually move to CIG. (It<br />
moved to CIA in 1949.)<br />
At about <strong>the</strong> same time, Colonel Robert Schukraft, chief of <strong>the</strong> Communications<br />
Division at CIG, was establishing a relationship with ASA. Schukraft had been a key<br />
figure in wartime Army COMINT and knew many of <strong>the</strong> people involved in <strong>the</strong> COMINT<br />
business. He began a relationship with Frank Rowlett at ASA\<br />
HANDLE VIA TALENT KEYHOLE COMI<br />
L SYSTEMS JOINTLY<br />
NOT R<br />
TO FOREIGN NATIONALS<br />
87