01.07.2014 Views

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 6<br />

<strong>Cryptology</strong> at Mid-decade<br />

Ib) (1)<br />

Ib) (3) -50 USC 403<br />

Ib) (3) -18 USC 798<br />

Ib) (3) -P.L. 86-36<br />

THE EARLY ASSESSMENTS<br />

It has become exceedingly difficult to obtain significantinformation from coV'ettoperations<br />

inside Russia.<br />

<strong>The</strong> security zones at <strong>the</strong> border, <strong>the</strong> general restrictions in <strong>the</strong> interior, <strong>the</strong><br />

thousands of security police, and <strong>the</strong> innumerable.informers among <strong>the</strong> populace.are brutally<br />

effective in limiting infiltration, exfiltration, and usefulness ofagents. <strong>The</strong>refore, we must more<br />

and more depend on science and technology to assist and to complement <strong>the</strong>·. best efforts of<br />

classical intelligence.<br />

<strong>The</strong> KillianBoard,1955<br />

<strong>The</strong> Eisenhower administration's intelligence focus was not on traditiOnal espionage ­<br />

it was on technical intelligence, whence, Eisenhower knew through personal experience<br />

<strong>during</strong> World <strong>War</strong> II, he couldobtain vast quantities of information. His concern over <strong>the</strong><br />

apparent breakdown in COMINT <strong>during</strong> <strong>the</strong> Korean <strong>War</strong> caused him to refocus again and<br />

again on NSA. Reportsabout NSA's performance began to flow back to hUn almost from<br />

<strong>the</strong> moment <strong>the</strong> Agency was created. <strong>The</strong> reports are important toclaybeca1.l.se <strong>the</strong>y<br />

indicate <strong>the</strong> direction that cryptology was to travel in subsequent years.<br />

<strong>The</strong> Robertson Committee<br />

<strong>The</strong> first reports on NSA were a product ofPresident Eisenhower's concern with Soviet<br />

I-----.,fapabilities. In <strong>the</strong> summer of 1953, <strong>the</strong> National Security Council began<br />

examining America's strategic vulnerabilities, and,with it, <strong>the</strong> intelligence system that<br />

must provide <strong>the</strong> warning. But Canine adamantly opposed granting COMINT. clearances to<br />

<strong>the</strong> members of <strong>the</strong> panel, and USCIB backed him. Instead, Canine established a largely<br />

in-house examination of COMINT, chaired by Dr. H.. P. Robertson ofCaliforniaInstitute of<br />

Technology, a member of Canine's advisory panel, <strong>the</strong> NSA Scientific Advisory Board<br />

(NSASAB). Four of <strong>the</strong> seven members were from NSASAB, and <strong>the</strong> remaining two were<br />

from <strong>the</strong> Office of<strong>the</strong> Secretary of Defense. 1<br />

Robertson reported <strong>during</strong> <strong>the</strong> dark days after "<strong>Black</strong> Friday," whenSovi.etl<br />

was still an unrevealed mystery. I<br />

I<br />

I <strong>The</strong> immediate result of this was <strong>the</strong> intercept, in 1954,<br />

f This opened up a new world<br />

I<br />

I<br />

UA:NBbEl VIA 'f¥tLElN'f !ESYII6LEl e8MIH'f e8N'fR8J:: S"l"S'ffJMS 48H,'fJ::Y<br />

NOT REJ.EASABI E 1'0 ~QRi:I~H'fmr'fI8N:ALS<br />

227

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!