01.07.2014 Views

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

In <strong>the</strong> fall of 1957, Sputnik went up, and <strong>the</strong> White House wanted all military and<br />

warning communications systems brought up to par. At <strong>the</strong> time, <strong>the</strong> COMINT Comnet was<br />

still in a state ofpartial being. NSA had managed to purloin some dedicated channels, and<br />

<strong>the</strong> cryptologic community operated a few relay centers around <strong>the</strong> world. But <strong>the</strong> system<br />

needed to be consolidated. More, it needed updated equipment, especially automated<br />

relays to get rid of torn tape relay arrangements. Moneys for <strong>the</strong>se improvements had<br />

managed to find <strong>the</strong>ir way into military budgets throughout <strong>the</strong> 1950s, but <strong>the</strong>y always<br />

seemed to disappear into <strong>the</strong> outyears as <strong>the</strong> services took care of more pressing<br />

requirements. All involved had grown cynical, and <strong>the</strong> budget for FY59 was not even<br />

covered with <strong>the</strong> fig leaf of outyear moneys. It contained nothing at all for <strong>the</strong> COMINT<br />

Comnet, and this was how <strong>the</strong> Eisenhower administration found it in early 1958. 41<br />

SECURING AMERICAN COMMUNICATIONS<br />

It became apparent to me early in my work in <strong>the</strong> Signal Intelligence Service that it was more<br />

important to secure our own messages than to read <strong>the</strong> communications ofo<strong>the</strong>rs.... I think it is<br />

imperative that our history show <strong>the</strong> importance of our communicatioJ:1s security effort as<br />

compared with intelligence production.<br />

Frank B. Rowlett<br />

<strong>The</strong> COMINT Comnet would be no good if it were not secure. <strong>The</strong> business of securing<br />

<strong>American</strong> communications had always been integrated with <strong>the</strong> task of breaking <strong>the</strong><br />

communications of o<strong>the</strong>r countries. Thus from <strong>the</strong> earliest days <strong>the</strong> cryptologic coin had<br />

two sides: COMINT and COMSEC. During World <strong>War</strong> II, Signal Intelligence Service had a<br />

COMSEC arm, and it produced COMSEC equipment and materials for <strong>the</strong> Army around <strong>the</strong><br />

world. In <strong>the</strong> Navy <strong>the</strong> integration was more tenuous and <strong>the</strong> COMSEC mission more<br />

diffuse, but closely allied offices of OP-20 were involved in both functions. When <strong>the</strong> Air<br />

Force was created, it gave COMSEC responsibilities to USAFSS. Thus <strong>the</strong> uniquely<br />

complementary aspects of COMINT and COMSEC were recognized from <strong>the</strong> first. <strong>The</strong>y were<br />

never, as <strong>the</strong>y were in Germany, divided among various organizations. Although <strong>the</strong> two<br />

were, as World <strong>War</strong> II naval cryptologist Joseph Eachus once said, "natural enemies," <strong>the</strong><br />

dependence ofone on <strong>the</strong> o<strong>the</strong>r was firmly established.<br />

<strong>The</strong> Era of<strong>the</strong> Wired Rotor<br />

Since <strong>the</strong> Revolutionary <strong>War</strong>, <strong>the</strong> U.S. government had been using manual (mostly<br />

paper-based) code systemsfor communicatio~ssecurity. With <strong>the</strong> advent of radio in <strong>the</strong><br />

early part of <strong>the</strong> twentieth century, communications security became even more<br />

important. At <strong>the</strong> time, only manual codes and ciphers were available. Encrypting and<br />

decrypting was a laborious process which slowed down communications and limited <strong>the</strong><br />

amount ofinformation that could be sent from place to place.<br />

IIA:!qf'LI!: VIA: 'fA:LI!lf('f Itl!lYII6LI!l eOMIn'f e6!qTftOL S fS'fI!lMS JOHq'fLY<br />

NOT REI.EASA HI F 1''' il"RI'JI8H !(JtTI6NALS<br />

211

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!