01.07.2014 Views

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Tap SECRET~RA<br />

One o<strong>the</strong>r wartime accomplishment would become significant in later years. In 1944<br />

<strong>the</strong> British and <strong>American</strong>s established a Target Intelligence Committee (TICOM) to<br />

interrogate captured German COMINT personnel. <strong>The</strong> major objective was COMSEC - to<br />

determine how well <strong>the</strong> German cryptologists had exploited Allied communications. <strong>The</strong><br />

flip side of that effort was COMINT - to see how well <strong>the</strong> Germans were doing against o<strong>the</strong>r,<br />

and particularly Soviet, communications. TICOM was at Bletchley Park, headquarters for<br />

<strong>the</strong> British cryptologic service, Government Code and Cipher School (GC&CS). Six teams<br />

of <strong>American</strong> and British COMINTers were dispatched to <strong>the</strong> battlefields of <strong>the</strong> Continent.<br />

<strong>The</strong>y sent <strong>the</strong>ir "take" to <strong>the</strong> Document Center at GC&CS. <strong>The</strong> original documents<br />

remained <strong>the</strong>re while <strong>the</strong> microfilm copies were sent on to Washington. TICOM teams<br />

also captured equipment. One-of-a-kind equipment remained at GC&CS, while duplicates<br />

were sent to <strong>the</strong> United States.<br />

<strong>The</strong> new system was so successful that teams were established in <strong>the</strong> Pacific, with <strong>the</strong><br />

British taking <strong>the</strong> lead in Sou<strong>the</strong>ast Asia, <strong>the</strong> United States in <strong>the</strong> Central Pacific and<br />

Japan, and joint <strong>American</strong> and Australian teams in Rabaul and Borneo. Although<br />

TICOM was formally dissolved in November of 1945, <strong>American</strong> and British experts<br />

continued to exploit <strong>the</strong> material for years afterward, and TICOM was later re-created in<br />

<strong>the</strong> United States as TAREX (Target Exploitation), minus British participation.<br />

If <strong>the</strong> strength of <strong>American</strong> SIGINT was in providing militarily useful information, its<br />

weakness was in its organization. <strong>The</strong> Army and Navy were at constant loggerheads over<br />

<strong>the</strong> control of cryptology, and at times <strong>the</strong> factional disputes were little short of<br />

catastrophic. British historian Ronald Lewin, a great admirer of <strong>American</strong> technical<br />

ingenuity which yielded <strong>the</strong> SIGINT bonanza, was frankly contemptuous ofour inability to<br />

get along:<br />

<strong>The</strong> old antagonism and suspicion between Army and Navy persisted in a manner that may at<br />

times seem infantile, until it be remembered that tribal loyalty, narrowness of vision. and sheer<br />

egocentricity can make even <strong>the</strong> most senior and hardened officers occasionally enter a second<br />

childhood. l<br />

Army and Navy cryptologic organizations had a long and inglorious history of failing<br />

to coordinate <strong>the</strong>ir efforts, dating back to <strong>the</strong> 1920s. In 1940, when <strong>the</strong> Army's success in<br />

breaking Japanese diplomatic cipher systems became known to <strong>the</strong> Navy, <strong>the</strong>re ensued<br />

lengthy and difficult negotiations to determine how <strong>the</strong> effort was to be divided. <strong>The</strong>y<br />

finally arrived at a Solomonic solution by which <strong>the</strong> Army processed Japanese diplomatic<br />

traffic originating (i.e., cipher date) on even days of <strong>the</strong> month while <strong>the</strong> Navy would<br />

process traffic from odd days. This resulted in a fair division politically, but from <strong>the</strong><br />

standpoint ofcryptanalytic continuity it was a horror. To make matters even worse, <strong>the</strong>re<br />

was in those days no thought, no concept, of centralized and coordinated intelligence<br />

analysis. What little analysis and interpretation was done (and <strong>the</strong>re was very little<br />

indeed) was accomplished by each service on <strong>the</strong> traffic which it had decrypted, leaving for<br />

each a checkerboard pattern of information in which every o<strong>the</strong>r day was left out. This<br />

IIltNBbS VIA ¥zItbSfff I(fi]YII6Lfi] e6MHof¥ e6H'fft6L S i S¥fi]MS J6IIof'fL i<br />

NOT RIP Ii: A ~ A IH..Ji: TQ ¥QRJi:lQl'T l'TATIQl'TlzbS<br />

3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!