01.07.2014 Views

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Ib) (1)<br />

Ib) (3)<br />

OGA<br />

Just\V~atwa~ lanyway? Jammers actually produced noncommunications<br />

signals, and <strong>the</strong> Army contended that <strong>the</strong>y were ELINT, not COMINT. <strong>The</strong> entire subject of<br />

ELI1'fI'\V8:S itlCl1a()S at<strong>the</strong> time, andI ~imply contributed to <strong>the</strong> disorder. <strong>The</strong><br />

services also saw electronic warfare applications, and <strong>the</strong>y wanted <strong>the</strong>ir own people in <strong>the</strong><br />

projectedNSA~controlle~<br />

~ites to send EW-related information to <strong>the</strong>ir parent<br />

services. NSA feared this approach because it would spread COMINT-related information<br />

outside codeword channels, and <strong>the</strong> services might turn <strong>the</strong> information into EW<br />

(electronic warfare) projects that would block COMINT hearability. This prompted NSA to<br />

appoint a committee to study <strong>the</strong> matter of jamming versus COMINT requirements. <strong>The</strong><br />

confusiohin definitions foreshadowed more serious divisions <strong>during</strong> <strong>the</strong> Vietnam era.<br />

directinvasion ofNSA's turf.<br />

his was a<br />

In<strong>the</strong> mid-1950s, a~<br />

~ontinuedalo~gan inconclusive course, various<br />

schemes emerged for <strong>the</strong> eventual institutionalization o~ I Most had as <strong>the</strong>ir<br />

central assumption that CIA would not continue in charge, and some placed NSA in<br />

control. <strong>The</strong> services wanted <strong>the</strong> mission but did not want to budget for it. One proposed<br />

plan would even have given <strong>the</strong> mission to <strong>the</strong> Federal Communications Commission. In<br />

late 1955, <strong>the</strong> secretary ofdefense put <strong>the</strong> matter to rest by decreeing that it was an ELINT<br />

mission and made <strong>the</strong> Air Force executive agent. <strong>The</strong> Air Force had only recently become<br />

executive agent for ELINT, and it had a central ELINT processing center. Since no resources<br />

were allocated to d~ \\ Iit became subsumed in <strong>the</strong> overall service ELINT mission.<br />

So in <strong>the</strong> end a separate monitoring system was not built. <strong>The</strong> jamming mission was<br />

handled as a corollary mission by <strong>the</strong> three SCAs, and when, in 1958, control ofELINT went<br />

to NSA, <strong>the</strong> threat posed b~ lvanished.91<br />

HANDLE VIA TALENT KEYHOLE COMINT<br />

YSTEMS JOINTLY<br />

NOT RELEA<br />

OREIGN NATIONALS<br />

103

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!