01.07.2014 Views

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Ib) (1)<br />

, Ib) (3)<br />

OGA<br />

TO~ SECRET tJMBRA<br />

-<br />

In 1948 CIA, in cooperation with a Department-of State organization called.OPC<br />

(Office of Policy Coordination), began beaming/propaganda (some would say "news")<br />

broadcasts toward <strong>the</strong> Soviet Bloc. <strong>The</strong> operation was called Voice ofAmerica, and it lived<br />

a long and healthy life <strong>during</strong> <strong>the</strong> <strong>Cold</strong> <strong>War</strong>. Predictably, however, as soon as <strong>the</strong> VOA<br />

stations went on <strong>the</strong> air, <strong>the</strong> Communist nations at which/<strong>the</strong>y were targetted began<br />

jamming <strong>the</strong> broadcasts. Thus ensued, in February of 1948, yet ano<strong>the</strong>r area of intense<br />

competition between CIA and <strong>the</strong>cryptologic community,<br />

Tackling <strong>the</strong> problemofjamming would involve radi~ monitoring. CIA took on <strong>the</strong> job<br />

in 1949 and immediately began preparing a plan to/identify and locate <strong>the</strong> jammers and<br />

devise a solution./ln June 1950 an ad hoc group/of <strong>the</strong> lAC (Intelligence Advisory<br />

Committee. chaired by <strong>the</strong> DCI) approved a/preliminary monitoring plan, called<br />

I 1<br />

Just how Admiral Stone ofAFSA found/out about it is not known, but it was hard to<br />

keep secrets at <strong>the</strong> lAC level. In any case,Stone contacted <strong>the</strong> Department ofState (at <strong>the</strong><br />

time OPC was still officially part of State/ra<strong>the</strong>r than CIA) in July of 1950 to let <strong>the</strong>m<br />

know that he regarded this as an AFSA responsibility under NSCID 9. Hillenkoetter<br />

justified CIA activity to AFSAC as/being performed under <strong>the</strong> section of <strong>the</strong> National<br />

Security Act that permitted CIA to perform "such additional services of common concern<br />

as <strong>the</strong> National Security Council.determines can be more efficiently accomplished<br />

centrally...." This was a weak re.ed, and Hillenkoetter made his case even less plausible<br />

by stating that monitoring fa.eilities so established could be used for o<strong>the</strong>r purposes in time<br />

of war. Such a direct challenge to AFSA authority in COMINT brought a predictable<br />

AFSAC response, and in November USCIB took up <strong>the</strong> issue. USCIB concluded in<br />

November thatI // ~as a COMINT mission and should be headed by AFSA. A<br />

USCIB study costed <strong>the</strong> problem at $5 million and 355 people. But when <strong>the</strong> matter went<br />

before <strong>the</strong> NationalSecurity Council in early 1951, CIA won. <strong>The</strong> NSC directed that CIA<br />

be <strong>the</strong> focal pointfor a multi-agency attack on <strong>the</strong> jammingproblem.<br />

AFSA wro.te a supporting plan but continued to insist that it be given <strong>the</strong> mission.<br />

When Canine became director, he took forceful exception to CIA encroachment in <strong>the</strong><br />

I ~ituation. But Canine was handicapped by limited resources.I ~as<br />

going to be expensive, and when <strong>the</strong> SCAs were polled, <strong>the</strong>y offered only part-time DF<br />

facilities. NSA did not have <strong>the</strong> money to create a separate system just to monitor<br />

jamming, and <strong>the</strong> military services contended that <strong>the</strong>y could not provide <strong>the</strong><br />

communications to interlock a monitoring system anyway. So in February 1952 President<br />

Truman approved a plan for CIA to proceed on its own.<br />

HANDLE VIA TALENT KEYHOLE COMINT C<br />

EMS JOINTLY<br />

NOT RE<br />

FOREIGN NATIONALS<br />

102

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!