01.07.2014 Views

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

( 1)<br />

(3)-50 USC 403<br />

(3)-18 USC 798<br />

(3) -P.L. 86-36<br />

WhatItWas Like<br />

Military units tend to form around existing support organizations. Army units cluster<br />

at Army posts, Air Force organizations locate at existing Air Force bases, Navy units form<br />

at Navy bases. Cryptologic units, however, must go where <strong>the</strong>y can hear targets. Where<br />

<strong>the</strong>re is an existing military base, so much <strong>the</strong> better. But if <strong>the</strong>re is none, one must be<br />

built specifically for <strong>the</strong> collection organization. This condition was especially true in <strong>the</strong><br />

19505, when collection was done primarily to satisfy national, strategic requirements<br />

ItAm,LI!J VIA 'fALl!Jr,'f I{I!JYII6LI!J 66MIU'f 66r,'fft6L SYS'f'I!JMS d6fI{'f'L'[<br />

~f8'FRElbElAEl-ABbEl 'Y'8 F8RElI8U U:A'Y'I8UAbS<br />

132

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!