01.07.2014 Views

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>the</strong> country, equipped with <strong>the</strong> finest resources money could buy, but it would be worth it<br />

ifeven a portion of<strong>the</strong> Sovie~<br />

Isystems were unlocked. Canine hailed<br />

<strong>the</strong> potential resource augmentation with glee, but cautioned against a total commitment<br />

before NSA had thoroughly analyzed <strong>the</strong> prospects for successs. USCIB supported him. 9<br />

Cryptologic personnel requirements weighed heavily on <strong>the</strong> committee. Clark urged<br />

an improved grade structure, including <strong>the</strong> addition of supergrades, higher pay for<br />

consultants, improved assignment ofservice officer personnel, better perquisites for NSA<br />

people assigned overseas (to be <strong>the</strong> equivalent of those received by CIA), and NSA<br />

exemption from <strong>the</strong> Classification Act. To improve <strong>the</strong> revolving door nature of military<br />

intercept operators (few ofwhom stayed in <strong>the</strong> service past <strong>the</strong>ir initial enlistment), Clark<br />

urged <strong>the</strong> assignment ofcivilians to intercept positions overseas. 10<br />

Clark andhis committee were concerned about two o<strong>the</strong>r potential problems. <strong>The</strong> first<br />

was <strong>the</strong> state of COMINT requirements, which were expressed in a document called <strong>the</strong><br />

Master Requirements List. This, <strong>the</strong>y said, was about <strong>the</strong> size of <strong>the</strong> Washington phone<br />

directory,/and about as specific. And since customers wanted COMINT to tell <strong>the</strong>m<br />

everything, without narrowing <strong>the</strong> target fur<strong>the</strong>r, NSA simply specified its own<br />

requirements. This had been going on so long that <strong>the</strong>re was danger that <strong>the</strong> cryptologic<br />

community would become completely isolated from its customers and insensitive to<br />

<strong>the</strong>m.11<br />

What was occurring in requirements, <strong>the</strong>y felt, was also true in security. COMINT<br />

security had become so tight that cryptologists were isolated from <strong>the</strong>ir customers. In time<br />

of war <strong>the</strong>re was real danger that essential information would not get to <strong>the</strong> battlefield<br />

because of clearance restrictions. Thus <strong>the</strong> system would defeat itself and become a<br />

vestigial appendage. 12 It was a debate that would rage for years within <strong>the</strong> intelligence<br />

community.<br />

<strong>The</strong> Killian Board<br />

Eisenhower's preoccupation with <strong>the</strong> Soviet nuclear threat spawned a number of<br />

committees to look at <strong>American</strong> vulnerability. By far <strong>the</strong> most important of those was <strong>the</strong><br />

Scientific Advisory Committee, commonly known as <strong>the</strong> Killian Board. In July of 1954<br />

Eisenhower asked Dr. James R. Killian of MIT to head a study of <strong>the</strong> country's capability<br />

to warn ofsurprise attack. Killian named a panel of <strong>the</strong> elite from academia, <strong>the</strong> scientific<br />

community, and <strong>the</strong> military.<br />

Ib) (1)<br />

Ib) (3) -P.L. 86-36<br />

Ib) (3) -50 USC 403<br />

Ib) (3) -18 USC 798<br />

IffdiBbEl YIlt 'i'/rbBU'f RBYIf6LB e6MIN'f e6N'fft6L S"iS'fBTtfS 461N'fLY<br />

NOT REI E A ~ A AU '1'9 F8RBI8N ItA:'fI6I(*LS<br />

229

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!