01.07.2014 Views

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

But this, said Baker, was not <strong>the</strong> whole story. <strong>Cryptology</strong> was a tremendously<br />

valuable asset to <strong>the</strong> nation, one which was producing most of <strong>the</strong> fast and reliable<br />

intelligence <strong>the</strong>n available. It was doing it,<br />

f-----,I':":--:--:-:--~<br />

y putting toge<strong>the</strong>r all <strong>the</strong><br />

crypto OglC system was capa e 0 squeezmg out 0<br />

information, ifit were properly mana.ged and funded.<br />

ofhis recommendations.<br />

In order to properly employ <strong>the</strong> cryptologic system, NSA needed to focus on <strong>the</strong><br />

important things.1<br />

Ihad monopolized <strong>the</strong> talents of too<br />

many smart people. <strong>The</strong>y/should be spread throughout <strong>the</strong> organization,<br />

This<br />

meant. in many casesireallocating resources to ALLO and ACOM or to different divisions<br />

I IWhat <strong>the</strong>y had learned workingI I<br />

could,nowbe employed against o<strong>the</strong>~<br />

13<br />

NSA should forget about.developing a general-purpose computer and go for more<br />

RAMs. Baker was not impressed with Project LIGHTNING; he wanted smaller but more<br />

cost-effective efforts.<br />

<strong>The</strong> Agency was receiving stupendous volumes of intercepted material, a product of<br />

<strong>the</strong>/rapid expansion of ove:rseas collection sites. Computers should be employed in<br />

processingthis take, ~otha.tanalysts could be free from manuaI1ylog'gin~__~~_~~<br />

Machines should~Jsobe employed at collection sites to re~llce<strong>the</strong> pile ofmaterial that had<br />

to be.forward~d;This,to Baker, was <strong>the</strong> next grea,tfield ofcomputer applications at NSA,14<br />

EClloing <strong>the</strong> recommendations of <strong>the</strong> Hoover Commission, Baker felt that pure<br />

cryptanalytic research should be removed outside NSA, to a Los Alamos-style institute.<br />

This would i[';olatepure research from a production organization and reduce <strong>the</strong><br />

temptationto employ <strong>the</strong> best minds in <strong>the</strong> day-to-day tasks ofgetting out <strong>the</strong> news. 1S<br />

Ib) (1)<br />

Ib) (3) -50 USC 403<br />

Ib) (3) -18 USC 798<br />

Ib) (3) -P,L, 86-36<br />

IIAN'BhtJ '{fA TAhl'Jff'f' IttJYIIehtJ eeMHiT eeN'Tfteh !¥is'f'tJMS6eHiThY<br />

NOT REI E AS Aau TQ FQR~IGn PMTfeN'AhS<br />

257 ~urlRA

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!